diff --git a/.pulumi-java-gen.version b/.pulumi-java-gen.version index 07feb823..47d04a52 100644 --- a/.pulumi-java-gen.version +++ b/.pulumi-java-gen.version @@ -1 +1 @@ -0.17.0 \ No newline at end of file +0.18.0 \ No newline at end of file diff --git a/examples/go.mod b/examples/go.mod index 10d00ba0..331e0eb0 100644 --- a/examples/go.mod +++ b/examples/go.mod @@ -2,7 +2,7 @@ module github.com/pulumi/pulumi-vault/examples/v6 go 1.21 -require github.com/pulumi/pulumi/pkg/v3 v3.140.0 +require github.com/pulumi/pulumi/pkg/v3 v3.142.0 require ( cloud.google.com/go v0.112.1 // indirect @@ -123,7 +123,7 @@ require ( github.com/pmezard/go-difflib v1.0.0 // indirect github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 // indirect github.com/pulumi/esc v0.10.0 // indirect - github.com/pulumi/pulumi/sdk/v3 v3.140.0 // indirect + github.com/pulumi/pulumi/sdk/v3 v3.142.0 // indirect github.com/rivo/uniseg v0.4.4 // indirect github.com/rogpeppe/go-internal v1.12.0 // indirect github.com/ryanuber/go-glob v1.0.0 // indirect diff --git a/examples/go.sum b/examples/go.sum index e2374cde..304740d7 100644 --- a/examples/go.sum +++ b/examples/go.sum @@ -339,10 +339,10 @@ github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 h1:vkHw5I/plNdTr435 github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231/go.mod h1:murToZ2N9hNJzewjHBgfFdXhZKjY3z5cYC1VXk+lbFE= github.com/pulumi/esc v0.10.0 h1:jzBKzkLVW0mePeanDRfqSQoCJ5yrkux0jIwAkUxpRKE= github.com/pulumi/esc v0.10.0/go.mod h1:2Bfa+FWj/xl8CKqRTWbWgDX0SOD4opdQgvYSURTGK2c= -github.com/pulumi/pulumi/pkg/v3 v3.140.0 h1:/bvHa19HY/6qHWvuAOVII8qr72MDGGczBWlPYlPo3j0= -github.com/pulumi/pulumi/pkg/v3 v3.140.0/go.mod h1:rcTtSyisd7BzZTugNk/s9zlYgX9S0S10+pha3Tko6yM= -github.com/pulumi/pulumi/sdk/v3 v3.140.0 h1:+Z/RBvdYg7tBNkBwk4p/FzlV7niBT3TbLAICq/Y0LDU= -github.com/pulumi/pulumi/sdk/v3 v3.140.0/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI= +github.com/pulumi/pulumi/pkg/v3 v3.142.0 h1:UE8TFyXrlxvPrATpd3Kl3En34KrFIFWOxxNAodywPNU= +github.com/pulumi/pulumi/pkg/v3 v3.142.0/go.mod h1:3k6WwRIT7veiDnk3Yo2NtqEYX+4dgLCrMIFvEOnjQqI= +github.com/pulumi/pulumi/sdk/v3 v3.142.0 h1:SmcVddGuvwAh3g3XUVQQ5gVRQUKH1yZ6iETpDNHIHlw= +github.com/pulumi/pulumi/sdk/v3 v3.142.0/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis= diff --git a/provider/cmd/pulumi-resource-vault/schema.json b/provider/cmd/pulumi-resource-vault/schema.json index 482306ad..2e0a69b5 100644 --- a/provider/cmd/pulumi-resource-vault/schema.json +++ b/provider/cmd/pulumi-resource-vault/schema.json @@ -6942,7 +6942,7 @@ } }, "vault:aws/authBackendLogin:AuthBackendLogin": { - "description": "Logs into a Vault server using an AWS auth backend. Login can be\naccomplished using a signed identity request from IAM or using ec2\ninstance metadata. For more information, see the [Vault\ndocumentation](https://www.vaultproject.io/docs/auth/aws.html).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```yaml\nresources:\n aws:\n type: vault:AuthBackend\n properties:\n type: aws\n path: aws\n example:\n type: vault:aws:AuthBackendClient\n properties:\n backend: ${aws.path}\n accessKey: '123456789012'\n secretKey: AWSSECRETKEYGOESHERE\n exampleAuthBackendRole:\n type: vault:aws:AuthBackendRole\n name: example\n properties:\n backend: ${aws.path}\n role: test-role\n authType: ec2\n boundAmiId: ami-8c1be5f6\n boundAccountId: '123456789012'\n boundVpcId: vpc-b61106d4\n boundSubnetId: vpc-133128f1\n boundIamInstanceProfileArns:\n - arn:aws:iam::123456789012:instance-profile/MyProfile\n ttl: 60\n maxTtl: 120\n tokenPolicies:\n - default\n - dev\n - prod\n options:\n dependson:\n - ${example}\n exampleAuthBackendLogin:\n type: vault:aws:AuthBackendLogin\n name: example\n properties:\n backend: ${exampleVaultAuthBackend.path}\n role: ${exampleAuthBackendRole.role}\n identity: BASE64ENCODEDIDENTITYDOCUMENT\n signature: BASE64ENCODEDSHA256IDENTITYDOCUMENTSIGNATURE\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Logs into a Vault server using an AWS auth backend. Login can be\naccomplished using a signed identity request from IAM or using ec2\ninstance metadata. For more information, see the [Vault\ndocumentation](https://www.vaultproject.io/docs/auth/aws.html).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```yaml\nresources:\n aws:\n type: vault:AuthBackend\n properties:\n type: aws\n path: aws\n example:\n type: vault:aws:AuthBackendClient\n properties:\n backend: ${aws.path}\n accessKey: '123456789012'\n secretKey: AWSSECRETKEYGOESHERE\n exampleAuthBackendRole:\n type: vault:aws:AuthBackendRole\n name: example\n properties:\n backend: ${aws.path}\n role: test-role\n authType: ec2\n boundAmiId: ami-8c1be5f6\n boundAccountId: '123456789012'\n boundVpcId: vpc-b61106d4\n boundSubnetId: vpc-133128f1\n boundIamInstanceProfileArns:\n - arn:aws:iam::123456789012:instance-profile/MyProfile\n ttl: 60\n maxTtl: 120\n tokenPolicies:\n - default\n - dev\n - prod\n options:\n dependsOn:\n - ${example}\n exampleAuthBackendLogin:\n type: vault:aws:AuthBackendLogin\n name: example\n properties:\n backend: ${exampleVaultAuthBackend.path}\n role: ${exampleAuthBackendRole.role}\n identity: BASE64ENCODEDIDENTITYDOCUMENT\n signature: BASE64ENCODEDSHA256IDENTITYDOCUMENTSIGNATURE\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "properties": { "accessor": { "type": "string", @@ -12007,7 +12007,7 @@ } }, "vault:gcp/secretBackend:SecretBackend": { - "description": "## Example Usage\n\nYou can setup the GCP secret backend with Workload Identity Federation (WIF) for a secret-less configuration:\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst gcp = new vault.gcp.SecretBackend(\"gcp\", {\n identityTokenKey: \"example-key\",\n identityTokenTtl: 1800,\n identityTokenAudience: \"\u003cTOKEN_AUDIENCE\u003e\",\n serviceAccountEmail: \"\u003cSERVICE_ACCOUNT_EMAIL\u003e\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ngcp = vault.gcp.SecretBackend(\"gcp\",\n identity_token_key=\"example-key\",\n identity_token_ttl=1800,\n identity_token_audience=\"\u003cTOKEN_AUDIENCE\u003e\",\n service_account_email=\"\u003cSERVICE_ACCOUNT_EMAIL\u003e\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var gcp = new Vault.Gcp.SecretBackend(\"gcp\", new()\n {\n IdentityTokenKey = \"example-key\",\n IdentityTokenTtl = 1800,\n IdentityTokenAudience = \"\u003cTOKEN_AUDIENCE\u003e\",\n ServiceAccountEmail = \"\u003cSERVICE_ACCOUNT_EMAIL\u003e\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := gcp.NewSecretBackend(ctx, \"gcp\", \u0026gcp.SecretBackendArgs{\n\t\t\tIdentityTokenKey: pulumi.String(\"example-key\"),\n\t\t\tIdentityTokenTtl: pulumi.Int(1800),\n\t\t\tIdentityTokenAudience: pulumi.String(\"\u003cTOKEN_AUDIENCE\u003e\"),\n\t\t\tServiceAccountEmail: pulumi.String(\"\u003cSERVICE_ACCOUNT_EMAIL\u003e\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.gcp.SecretBackend;\nimport com.pulumi.vault.gcp.SecretBackendArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var gcp = new SecretBackend(\"gcp\", SecretBackendArgs.builder()\n .identityTokenKey(\"example-key\")\n .identityTokenTtl(1800)\n .identityTokenAudience(\"\u003cTOKEN_AUDIENCE\u003e\")\n .serviceAccountEmail(\"\u003cSERVICE_ACCOUNT_EMAIL\u003e\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n gcp:\n type: vault:gcp:SecretBackend\n properties:\n identityTokenKey: example-key\n identityTokenTtl: 1800\n identityTokenAudience: \u003cTOKEN_AUDIENCE\u003e\n serviceAccountEmail: \u003cSERVICE_ACCOUNT_EMAIL\u003e\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst gcp = new vault.gcp.SecretBackend(\"gcp\", {credentials: std.file({\n input: \"credentials.json\",\n}).then(invoke =\u003e invoke.result)});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\ngcp = vault.gcp.SecretBackend(\"gcp\", credentials=std.file(input=\"credentials.json\").result)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var gcp = new Vault.Gcp.SecretBackend(\"gcp\", new()\n {\n Credentials = Std.File.Invoke(new()\n {\n Input = \"credentials.json\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"credentials.json\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = gcp.NewSecretBackend(ctx, \"gcp\", \u0026gcp.SecretBackendArgs{\n\t\t\tCredentials: pulumi.String(invokeFile.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.gcp.SecretBackend;\nimport com.pulumi.vault.gcp.SecretBackendArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var gcp = new SecretBackend(\"gcp\", SecretBackendArgs.builder()\n .credentials(StdFunctions.file(FileArgs.builder()\n .input(\"credentials.json\")\n .build()).result())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n gcp:\n type: vault:gcp:SecretBackend\n properties:\n credentials:\n fn::invoke:\n Function: std:file\n Arguments:\n input: credentials.json\n Return: result\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\nYou can setup the GCP secret backend with Workload Identity Federation (WIF) for a secret-less configuration:\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst gcp = new vault.gcp.SecretBackend(\"gcp\", {\n identityTokenKey: \"example-key\",\n identityTokenTtl: 1800,\n identityTokenAudience: \"\u003cTOKEN_AUDIENCE\u003e\",\n serviceAccountEmail: \"\u003cSERVICE_ACCOUNT_EMAIL\u003e\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ngcp = vault.gcp.SecretBackend(\"gcp\",\n identity_token_key=\"example-key\",\n identity_token_ttl=1800,\n identity_token_audience=\"\u003cTOKEN_AUDIENCE\u003e\",\n service_account_email=\"\u003cSERVICE_ACCOUNT_EMAIL\u003e\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var gcp = new Vault.Gcp.SecretBackend(\"gcp\", new()\n {\n IdentityTokenKey = \"example-key\",\n IdentityTokenTtl = 1800,\n IdentityTokenAudience = \"\u003cTOKEN_AUDIENCE\u003e\",\n ServiceAccountEmail = \"\u003cSERVICE_ACCOUNT_EMAIL\u003e\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := gcp.NewSecretBackend(ctx, \"gcp\", \u0026gcp.SecretBackendArgs{\n\t\t\tIdentityTokenKey: pulumi.String(\"example-key\"),\n\t\t\tIdentityTokenTtl: pulumi.Int(1800),\n\t\t\tIdentityTokenAudience: pulumi.String(\"\u003cTOKEN_AUDIENCE\u003e\"),\n\t\t\tServiceAccountEmail: pulumi.String(\"\u003cSERVICE_ACCOUNT_EMAIL\u003e\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.gcp.SecretBackend;\nimport com.pulumi.vault.gcp.SecretBackendArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var gcp = new SecretBackend(\"gcp\", SecretBackendArgs.builder()\n .identityTokenKey(\"example-key\")\n .identityTokenTtl(1800)\n .identityTokenAudience(\"\u003cTOKEN_AUDIENCE\u003e\")\n .serviceAccountEmail(\"\u003cSERVICE_ACCOUNT_EMAIL\u003e\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n gcp:\n type: vault:gcp:SecretBackend\n properties:\n identityTokenKey: example-key\n identityTokenTtl: 1800\n identityTokenAudience: \u003cTOKEN_AUDIENCE\u003e\n serviceAccountEmail: \u003cSERVICE_ACCOUNT_EMAIL\u003e\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst gcp = new vault.gcp.SecretBackend(\"gcp\", {credentials: std.file({\n input: \"credentials.json\",\n}).then(invoke =\u003e invoke.result)});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\ngcp = vault.gcp.SecretBackend(\"gcp\", credentials=std.file(input=\"credentials.json\").result)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var gcp = new Vault.Gcp.SecretBackend(\"gcp\", new()\n {\n Credentials = Std.File.Invoke(new()\n {\n Input = \"credentials.json\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"credentials.json\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = gcp.NewSecretBackend(ctx, \"gcp\", \u0026gcp.SecretBackendArgs{\n\t\t\tCredentials: pulumi.String(invokeFile.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.gcp.SecretBackend;\nimport com.pulumi.vault.gcp.SecretBackendArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var gcp = new SecretBackend(\"gcp\", SecretBackendArgs.builder()\n .credentials(StdFunctions.file(FileArgs.builder()\n .input(\"credentials.json\")\n .build()).result())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n gcp:\n type: vault:gcp:SecretBackend\n properties:\n credentials:\n fn::invoke:\n function: std:file\n arguments:\n input: credentials.json\n return: result\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "properties": { "accessor": { "type": "string", @@ -12182,7 +12182,7 @@ } }, "vault:gcp/secretImpersonatedAccount:SecretImpersonatedAccount": { - "description": "Creates a Impersonated Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.\n\nEach [impersonated account](https://www.vaultproject.io/docs/secrets/gcp/index.html#impersonated-accounts) is tied to a separately managed\nService Account.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as google from \"@pulumi/google\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst _this = new google.index.ServiceAccount(\"this\", {accountId: \"my-awesome-account\"});\nconst gcp = new vault.gcp.SecretBackend(\"gcp\", {\n path: \"gcp\",\n credentials: std.file({\n input: \"credentials.json\",\n }).then(invoke =\u003e invoke.result),\n});\nconst impersonatedAccount = new vault.gcp.SecretImpersonatedAccount(\"impersonated_account\", {\n backend: gcp.path,\n impersonatedAccount: \"this\",\n serviceAccountEmail: _this.email,\n tokenScopes: [\"https://www.googleapis.com/auth/cloud-platform\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_google as google\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nthis = google.index.ServiceAccount(\"this\", account_id=my-awesome-account)\ngcp = vault.gcp.SecretBackend(\"gcp\",\n path=\"gcp\",\n credentials=std.file(input=\"credentials.json\").result)\nimpersonated_account = vault.gcp.SecretImpersonatedAccount(\"impersonated_account\",\n backend=gcp.path,\n impersonated_account=\"this\",\n service_account_email=this[\"email\"],\n token_scopes=[\"https://www.googleapis.com/auth/cloud-platform\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Google = Pulumi.Google;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var @this = new Google.Index.ServiceAccount(\"this\", new()\n {\n AccountId = \"my-awesome-account\",\n });\n\n var gcp = new Vault.Gcp.SecretBackend(\"gcp\", new()\n {\n Path = \"gcp\",\n Credentials = Std.File.Invoke(new()\n {\n Input = \"credentials.json\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n var impersonatedAccount = new Vault.Gcp.SecretImpersonatedAccount(\"impersonated_account\", new()\n {\n Backend = gcp.Path,\n ImpersonatedAccount = \"this\",\n ServiceAccountEmail = @this.Email,\n TokenScopes = new[]\n {\n \"https://www.googleapis.com/auth/cloud-platform\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-google/sdk/go/google\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tthis, err := google.NewServiceAccount(ctx, \"this\", \u0026google.ServiceAccountArgs{\n\t\t\tAccountId: \"my-awesome-account\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"credentials.json\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tgcp, err := gcp.NewSecretBackend(ctx, \"gcp\", \u0026gcp.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"gcp\"),\n\t\t\tCredentials: pulumi.String(invokeFile.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = gcp.NewSecretImpersonatedAccount(ctx, \"impersonated_account\", \u0026gcp.SecretImpersonatedAccountArgs{\n\t\t\tBackend: gcp.Path,\n\t\t\tImpersonatedAccount: pulumi.String(\"this\"),\n\t\t\tServiceAccountEmail: this.Email,\n\t\t\tTokenScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://www.googleapis.com/auth/cloud-platform\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.google.serviceAccount;\nimport com.pulumi.google.ServiceAccountArgs;\nimport com.pulumi.vault.gcp.SecretBackend;\nimport com.pulumi.vault.gcp.SecretBackendArgs;\nimport com.pulumi.vault.gcp.SecretImpersonatedAccount;\nimport com.pulumi.vault.gcp.SecretImpersonatedAccountArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var this_ = new ServiceAccount(\"this\", ServiceAccountArgs.builder()\n .accountId(\"my-awesome-account\")\n .build());\n\n var gcp = new SecretBackend(\"gcp\", SecretBackendArgs.builder()\n .path(\"gcp\")\n .credentials(StdFunctions.file(FileArgs.builder()\n .input(\"credentials.json\")\n .build()).result())\n .build());\n\n var impersonatedAccount = new SecretImpersonatedAccount(\"impersonatedAccount\", SecretImpersonatedAccountArgs.builder()\n .backend(gcp.path())\n .impersonatedAccount(\"this\")\n .serviceAccountEmail(this_.email())\n .tokenScopes(\"https://www.googleapis.com/auth/cloud-platform\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n this:\n type: google:serviceAccount\n properties:\n accountId: my-awesome-account\n gcp:\n type: vault:gcp:SecretBackend\n properties:\n path: gcp\n credentials:\n fn::invoke:\n Function: std:file\n Arguments:\n input: credentials.json\n Return: result\n impersonatedAccount:\n type: vault:gcp:SecretImpersonatedAccount\n name: impersonated_account\n properties:\n backend: ${gcp.path}\n impersonatedAccount: this\n serviceAccountEmail: ${this.email}\n tokenScopes:\n - https://www.googleapis.com/auth/cloud-platform\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA impersonated account can be imported using its Vault Path. For example, referencing the example above,\n\n```sh\n$ pulumi import vault:gcp/secretImpersonatedAccount:SecretImpersonatedAccount impersonated_account gcp/impersonated-account/project_viewer\n```\n", + "description": "Creates a Impersonated Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.\n\nEach [impersonated account](https://www.vaultproject.io/docs/secrets/gcp/index.html#impersonated-accounts) is tied to a separately managed\nService Account.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as google from \"@pulumi/google\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst _this = new google.index.ServiceAccount(\"this\", {accountId: \"my-awesome-account\"});\nconst gcp = new vault.gcp.SecretBackend(\"gcp\", {\n path: \"gcp\",\n credentials: std.file({\n input: \"credentials.json\",\n }).then(invoke =\u003e invoke.result),\n});\nconst impersonatedAccount = new vault.gcp.SecretImpersonatedAccount(\"impersonated_account\", {\n backend: gcp.path,\n impersonatedAccount: \"this\",\n serviceAccountEmail: _this.email,\n tokenScopes: [\"https://www.googleapis.com/auth/cloud-platform\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_google as google\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nthis = google.index.ServiceAccount(\"this\", account_id=my-awesome-account)\ngcp = vault.gcp.SecretBackend(\"gcp\",\n path=\"gcp\",\n credentials=std.file(input=\"credentials.json\").result)\nimpersonated_account = vault.gcp.SecretImpersonatedAccount(\"impersonated_account\",\n backend=gcp.path,\n impersonated_account=\"this\",\n service_account_email=this[\"email\"],\n token_scopes=[\"https://www.googleapis.com/auth/cloud-platform\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Google = Pulumi.Google;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var @this = new Google.Index.ServiceAccount(\"this\", new()\n {\n AccountId = \"my-awesome-account\",\n });\n\n var gcp = new Vault.Gcp.SecretBackend(\"gcp\", new()\n {\n Path = \"gcp\",\n Credentials = Std.File.Invoke(new()\n {\n Input = \"credentials.json\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n var impersonatedAccount = new Vault.Gcp.SecretImpersonatedAccount(\"impersonated_account\", new()\n {\n Backend = gcp.Path,\n ImpersonatedAccount = \"this\",\n ServiceAccountEmail = @this.Email,\n TokenScopes = new[]\n {\n \"https://www.googleapis.com/auth/cloud-platform\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-google/sdk/go/google\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tthis, err := google.NewServiceAccount(ctx, \"this\", \u0026google.ServiceAccountArgs{\n\t\t\tAccountId: \"my-awesome-account\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"credentials.json\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tgcp, err := gcp.NewSecretBackend(ctx, \"gcp\", \u0026gcp.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"gcp\"),\n\t\t\tCredentials: pulumi.String(invokeFile.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = gcp.NewSecretImpersonatedAccount(ctx, \"impersonated_account\", \u0026gcp.SecretImpersonatedAccountArgs{\n\t\t\tBackend: gcp.Path,\n\t\t\tImpersonatedAccount: pulumi.String(\"this\"),\n\t\t\tServiceAccountEmail: this.Email,\n\t\t\tTokenScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://www.googleapis.com/auth/cloud-platform\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.google.serviceAccount;\nimport com.pulumi.google.ServiceAccountArgs;\nimport com.pulumi.vault.gcp.SecretBackend;\nimport com.pulumi.vault.gcp.SecretBackendArgs;\nimport com.pulumi.vault.gcp.SecretImpersonatedAccount;\nimport com.pulumi.vault.gcp.SecretImpersonatedAccountArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var this_ = new ServiceAccount(\"this\", ServiceAccountArgs.builder()\n .accountId(\"my-awesome-account\")\n .build());\n\n var gcp = new SecretBackend(\"gcp\", SecretBackendArgs.builder()\n .path(\"gcp\")\n .credentials(StdFunctions.file(FileArgs.builder()\n .input(\"credentials.json\")\n .build()).result())\n .build());\n\n var impersonatedAccount = new SecretImpersonatedAccount(\"impersonatedAccount\", SecretImpersonatedAccountArgs.builder()\n .backend(gcp.path())\n .impersonatedAccount(\"this\")\n .serviceAccountEmail(this_.email())\n .tokenScopes(\"https://www.googleapis.com/auth/cloud-platform\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n this:\n type: google:serviceAccount\n properties:\n accountId: my-awesome-account\n gcp:\n type: vault:gcp:SecretBackend\n properties:\n path: gcp\n credentials:\n fn::invoke:\n function: std:file\n arguments:\n input: credentials.json\n return: result\n impersonatedAccount:\n type: vault:gcp:SecretImpersonatedAccount\n name: impersonated_account\n properties:\n backend: ${gcp.path}\n impersonatedAccount: this\n serviceAccountEmail: ${this.email}\n tokenScopes:\n - https://www.googleapis.com/auth/cloud-platform\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA impersonated account can be imported using its Vault Path. For example, referencing the example above,\n\n```sh\n$ pulumi import vault:gcp/secretImpersonatedAccount:SecretImpersonatedAccount impersonated_account gcp/impersonated-account/project_viewer\n```\n", "properties": { "backend": { "type": "string", @@ -12304,7 +12304,7 @@ } }, "vault:gcp/secretRoleset:SecretRoleset": { - "description": "Creates a Roleset in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.\n\nEach Roleset is [tied](https://www.vaultproject.io/docs/secrets/gcp/index.html#service-accounts-are-tied-to-rolesets) to a Service Account, and can have one or more [bindings](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings) associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst project = \"my-awesome-project\";\nconst gcp = new vault.gcp.SecretBackend(\"gcp\", {\n path: \"gcp\",\n credentials: std.file({\n input: \"credentials.json\",\n }).then(invoke =\u003e invoke.result),\n});\nconst roleset = new vault.gcp.SecretRoleset(\"roleset\", {\n backend: gcp.path,\n roleset: \"project_viewer\",\n secretType: \"access_token\",\n project: project,\n tokenScopes: [\"https://www.googleapis.com/auth/cloud-platform\"],\n bindings: [{\n resource: `//cloudresourcemanager.googleapis.com/projects/${project}`,\n roles: [\"roles/viewer\"],\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nproject = \"my-awesome-project\"\ngcp = vault.gcp.SecretBackend(\"gcp\",\n path=\"gcp\",\n credentials=std.file(input=\"credentials.json\").result)\nroleset = vault.gcp.SecretRoleset(\"roleset\",\n backend=gcp.path,\n roleset=\"project_viewer\",\n secret_type=\"access_token\",\n project=project,\n token_scopes=[\"https://www.googleapis.com/auth/cloud-platform\"],\n bindings=[{\n \"resource\": f\"//cloudresourcemanager.googleapis.com/projects/{project}\",\n \"roles\": [\"roles/viewer\"],\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var project = \"my-awesome-project\";\n\n var gcp = new Vault.Gcp.SecretBackend(\"gcp\", new()\n {\n Path = \"gcp\",\n Credentials = Std.File.Invoke(new()\n {\n Input = \"credentials.json\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n var roleset = new Vault.Gcp.SecretRoleset(\"roleset\", new()\n {\n Backend = gcp.Path,\n Roleset = \"project_viewer\",\n SecretType = \"access_token\",\n Project = project,\n TokenScopes = new[]\n {\n \"https://www.googleapis.com/auth/cloud-platform\",\n },\n Bindings = new[]\n {\n new Vault.Gcp.Inputs.SecretRolesetBindingArgs\n {\n Resource = $\"//cloudresourcemanager.googleapis.com/projects/{project}\",\n Roles = new[]\n {\n \"roles/viewer\",\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tproject := \"my-awesome-project\"\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"credentials.json\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tgcp, err := gcp.NewSecretBackend(ctx, \"gcp\", \u0026gcp.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"gcp\"),\n\t\t\tCredentials: pulumi.String(invokeFile.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = gcp.NewSecretRoleset(ctx, \"roleset\", \u0026gcp.SecretRolesetArgs{\n\t\t\tBackend: gcp.Path,\n\t\t\tRoleset: pulumi.String(\"project_viewer\"),\n\t\t\tSecretType: pulumi.String(\"access_token\"),\n\t\t\tProject: pulumi.String(project),\n\t\t\tTokenScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://www.googleapis.com/auth/cloud-platform\"),\n\t\t\t},\n\t\t\tBindings: gcp.SecretRolesetBindingArray{\n\t\t\t\t\u0026gcp.SecretRolesetBindingArgs{\n\t\t\t\t\tResource: pulumi.Sprintf(\"//cloudresourcemanager.googleapis.com/projects/%v\", project),\n\t\t\t\t\tRoles: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"roles/viewer\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.gcp.SecretBackend;\nimport com.pulumi.vault.gcp.SecretBackendArgs;\nimport com.pulumi.vault.gcp.SecretRoleset;\nimport com.pulumi.vault.gcp.SecretRolesetArgs;\nimport com.pulumi.vault.gcp.inputs.SecretRolesetBindingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var project = \"my-awesome-project\";\n\n var gcp = new SecretBackend(\"gcp\", SecretBackendArgs.builder()\n .path(\"gcp\")\n .credentials(StdFunctions.file(FileArgs.builder()\n .input(\"credentials.json\")\n .build()).result())\n .build());\n\n var roleset = new SecretRoleset(\"roleset\", SecretRolesetArgs.builder()\n .backend(gcp.path())\n .roleset(\"project_viewer\")\n .secretType(\"access_token\")\n .project(project)\n .tokenScopes(\"https://www.googleapis.com/auth/cloud-platform\")\n .bindings(SecretRolesetBindingArgs.builder()\n .resource(String.format(\"//cloudresourcemanager.googleapis.com/projects/%s\", project))\n .roles(\"roles/viewer\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n gcp:\n type: vault:gcp:SecretBackend\n properties:\n path: gcp\n credentials:\n fn::invoke:\n Function: std:file\n Arguments:\n input: credentials.json\n Return: result\n roleset:\n type: vault:gcp:SecretRoleset\n properties:\n backend: ${gcp.path}\n roleset: project_viewer\n secretType: access_token\n project: ${project}\n tokenScopes:\n - https://www.googleapis.com/auth/cloud-platform\n bindings:\n - resource: //cloudresourcemanager.googleapis.com/projects/${project}\n roles:\n - roles/viewer\nvariables:\n project: my-awesome-project\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA roleset can be imported using its Vault Path. For example, referencing the example above,\n\n```sh\n$ pulumi import vault:gcp/secretRoleset:SecretRoleset roleset gcp/roleset/project_viewer\n```\n", + "description": "Creates a Roleset in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.\n\nEach Roleset is [tied](https://www.vaultproject.io/docs/secrets/gcp/index.html#service-accounts-are-tied-to-rolesets) to a Service Account, and can have one or more [bindings](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings) associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst project = \"my-awesome-project\";\nconst gcp = new vault.gcp.SecretBackend(\"gcp\", {\n path: \"gcp\",\n credentials: std.file({\n input: \"credentials.json\",\n }).then(invoke =\u003e invoke.result),\n});\nconst roleset = new vault.gcp.SecretRoleset(\"roleset\", {\n backend: gcp.path,\n roleset: \"project_viewer\",\n secretType: \"access_token\",\n project: project,\n tokenScopes: [\"https://www.googleapis.com/auth/cloud-platform\"],\n bindings: [{\n resource: `//cloudresourcemanager.googleapis.com/projects/${project}`,\n roles: [\"roles/viewer\"],\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nproject = \"my-awesome-project\"\ngcp = vault.gcp.SecretBackend(\"gcp\",\n path=\"gcp\",\n credentials=std.file(input=\"credentials.json\").result)\nroleset = vault.gcp.SecretRoleset(\"roleset\",\n backend=gcp.path,\n roleset=\"project_viewer\",\n secret_type=\"access_token\",\n project=project,\n token_scopes=[\"https://www.googleapis.com/auth/cloud-platform\"],\n bindings=[{\n \"resource\": f\"//cloudresourcemanager.googleapis.com/projects/{project}\",\n \"roles\": [\"roles/viewer\"],\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var project = \"my-awesome-project\";\n\n var gcp = new Vault.Gcp.SecretBackend(\"gcp\", new()\n {\n Path = \"gcp\",\n Credentials = Std.File.Invoke(new()\n {\n Input = \"credentials.json\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n var roleset = new Vault.Gcp.SecretRoleset(\"roleset\", new()\n {\n Backend = gcp.Path,\n Roleset = \"project_viewer\",\n SecretType = \"access_token\",\n Project = project,\n TokenScopes = new[]\n {\n \"https://www.googleapis.com/auth/cloud-platform\",\n },\n Bindings = new[]\n {\n new Vault.Gcp.Inputs.SecretRolesetBindingArgs\n {\n Resource = $\"//cloudresourcemanager.googleapis.com/projects/{project}\",\n Roles = new[]\n {\n \"roles/viewer\",\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tproject := \"my-awesome-project\"\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"credentials.json\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tgcp, err := gcp.NewSecretBackend(ctx, \"gcp\", \u0026gcp.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"gcp\"),\n\t\t\tCredentials: pulumi.String(invokeFile.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = gcp.NewSecretRoleset(ctx, \"roleset\", \u0026gcp.SecretRolesetArgs{\n\t\t\tBackend: gcp.Path,\n\t\t\tRoleset: pulumi.String(\"project_viewer\"),\n\t\t\tSecretType: pulumi.String(\"access_token\"),\n\t\t\tProject: pulumi.String(project),\n\t\t\tTokenScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://www.googleapis.com/auth/cloud-platform\"),\n\t\t\t},\n\t\t\tBindings: gcp.SecretRolesetBindingArray{\n\t\t\t\t\u0026gcp.SecretRolesetBindingArgs{\n\t\t\t\t\tResource: pulumi.Sprintf(\"//cloudresourcemanager.googleapis.com/projects/%v\", project),\n\t\t\t\t\tRoles: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"roles/viewer\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.gcp.SecretBackend;\nimport com.pulumi.vault.gcp.SecretBackendArgs;\nimport com.pulumi.vault.gcp.SecretRoleset;\nimport com.pulumi.vault.gcp.SecretRolesetArgs;\nimport com.pulumi.vault.gcp.inputs.SecretRolesetBindingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var project = \"my-awesome-project\";\n\n var gcp = new SecretBackend(\"gcp\", SecretBackendArgs.builder()\n .path(\"gcp\")\n .credentials(StdFunctions.file(FileArgs.builder()\n .input(\"credentials.json\")\n .build()).result())\n .build());\n\n var roleset = new SecretRoleset(\"roleset\", SecretRolesetArgs.builder()\n .backend(gcp.path())\n .roleset(\"project_viewer\")\n .secretType(\"access_token\")\n .project(project)\n .tokenScopes(\"https://www.googleapis.com/auth/cloud-platform\")\n .bindings(SecretRolesetBindingArgs.builder()\n .resource(String.format(\"//cloudresourcemanager.googleapis.com/projects/%s\", project))\n .roles(\"roles/viewer\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n gcp:\n type: vault:gcp:SecretBackend\n properties:\n path: gcp\n credentials:\n fn::invoke:\n function: std:file\n arguments:\n input: credentials.json\n return: result\n roleset:\n type: vault:gcp:SecretRoleset\n properties:\n backend: ${gcp.path}\n roleset: project_viewer\n secretType: access_token\n project: ${project}\n tokenScopes:\n - https://www.googleapis.com/auth/cloud-platform\n bindings:\n - resource: //cloudresourcemanager.googleapis.com/projects/${project}\n roles:\n - roles/viewer\nvariables:\n project: my-awesome-project\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA roleset can be imported using its Vault Path. For example, referencing the example above,\n\n```sh\n$ pulumi import vault:gcp/secretRoleset:SecretRoleset roleset gcp/roleset/project_viewer\n```\n", "properties": { "backend": { "type": "string", @@ -12451,7 +12451,7 @@ } }, "vault:gcp/secretStaticAccount:SecretStaticAccount": { - "description": "Creates a Static Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.\n\nEach [static account](https://www.vaultproject.io/docs/secrets/gcp/index.html#static-accounts) is tied to a separately managed\nService Account, and can have one or more [bindings](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings) associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as google from \"@pulumi/google\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst _this = new google.index.ServiceAccount(\"this\", {accountId: \"my-awesome-account\"});\nconst gcp = new vault.gcp.SecretBackend(\"gcp\", {\n path: \"gcp\",\n credentials: std.file({\n input: \"credentials.json\",\n }).then(invoke =\u003e invoke.result),\n});\nconst staticAccount = new vault.gcp.SecretStaticAccount(\"static_account\", {\n backend: gcp.path,\n staticAccount: \"project_viewer\",\n secretType: \"access_token\",\n tokenScopes: [\"https://www.googleapis.com/auth/cloud-platform\"],\n serviceAccountEmail: _this.email,\n bindings: [{\n resource: `//cloudresourcemanager.googleapis.com/projects/${_this.project}`,\n roles: [\"roles/viewer\"],\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_google as google\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nthis = google.index.ServiceAccount(\"this\", account_id=my-awesome-account)\ngcp = vault.gcp.SecretBackend(\"gcp\",\n path=\"gcp\",\n credentials=std.file(input=\"credentials.json\").result)\nstatic_account = vault.gcp.SecretStaticAccount(\"static_account\",\n backend=gcp.path,\n static_account=\"project_viewer\",\n secret_type=\"access_token\",\n token_scopes=[\"https://www.googleapis.com/auth/cloud-platform\"],\n service_account_email=this[\"email\"],\n bindings=[{\n \"resource\": f\"//cloudresourcemanager.googleapis.com/projects/{this['project']}\",\n \"roles\": [\"roles/viewer\"],\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Google = Pulumi.Google;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var @this = new Google.Index.ServiceAccount(\"this\", new()\n {\n AccountId = \"my-awesome-account\",\n });\n\n var gcp = new Vault.Gcp.SecretBackend(\"gcp\", new()\n {\n Path = \"gcp\",\n Credentials = Std.File.Invoke(new()\n {\n Input = \"credentials.json\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n var staticAccount = new Vault.Gcp.SecretStaticAccount(\"static_account\", new()\n {\n Backend = gcp.Path,\n StaticAccount = \"project_viewer\",\n SecretType = \"access_token\",\n TokenScopes = new[]\n {\n \"https://www.googleapis.com/auth/cloud-platform\",\n },\n ServiceAccountEmail = @this.Email,\n Bindings = new[]\n {\n new Vault.Gcp.Inputs.SecretStaticAccountBindingArgs\n {\n Resource = $\"//cloudresourcemanager.googleapis.com/projects/{@this.Project}\",\n Roles = new[]\n {\n \"roles/viewer\",\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-google/sdk/go/google\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tthis, err := google.NewServiceAccount(ctx, \"this\", \u0026google.ServiceAccountArgs{\n\t\t\tAccountId: \"my-awesome-account\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"credentials.json\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tgcp, err := gcp.NewSecretBackend(ctx, \"gcp\", \u0026gcp.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"gcp\"),\n\t\t\tCredentials: pulumi.String(invokeFile.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = gcp.NewSecretStaticAccount(ctx, \"static_account\", \u0026gcp.SecretStaticAccountArgs{\n\t\t\tBackend: gcp.Path,\n\t\t\tStaticAccount: pulumi.String(\"project_viewer\"),\n\t\t\tSecretType: pulumi.String(\"access_token\"),\n\t\t\tTokenScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://www.googleapis.com/auth/cloud-platform\"),\n\t\t\t},\n\t\t\tServiceAccountEmail: this.Email,\n\t\t\tBindings: gcp.SecretStaticAccountBindingArray{\n\t\t\t\t\u0026gcp.SecretStaticAccountBindingArgs{\n\t\t\t\t\tResource: pulumi.Sprintf(\"//cloudresourcemanager.googleapis.com/projects/%v\", this.Project),\n\t\t\t\t\tRoles: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"roles/viewer\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.google.serviceAccount;\nimport com.pulumi.google.ServiceAccountArgs;\nimport com.pulumi.vault.gcp.SecretBackend;\nimport com.pulumi.vault.gcp.SecretBackendArgs;\nimport com.pulumi.vault.gcp.SecretStaticAccount;\nimport com.pulumi.vault.gcp.SecretStaticAccountArgs;\nimport com.pulumi.vault.gcp.inputs.SecretStaticAccountBindingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var this_ = new ServiceAccount(\"this\", ServiceAccountArgs.builder()\n .accountId(\"my-awesome-account\")\n .build());\n\n var gcp = new SecretBackend(\"gcp\", SecretBackendArgs.builder()\n .path(\"gcp\")\n .credentials(StdFunctions.file(FileArgs.builder()\n .input(\"credentials.json\")\n .build()).result())\n .build());\n\n var staticAccount = new SecretStaticAccount(\"staticAccount\", SecretStaticAccountArgs.builder()\n .backend(gcp.path())\n .staticAccount(\"project_viewer\")\n .secretType(\"access_token\")\n .tokenScopes(\"https://www.googleapis.com/auth/cloud-platform\")\n .serviceAccountEmail(this_.email())\n .bindings(SecretStaticAccountBindingArgs.builder()\n .resource(String.format(\"//cloudresourcemanager.googleapis.com/projects/%s\", this_.project()))\n .roles(\"roles/viewer\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n this:\n type: google:serviceAccount\n properties:\n accountId: my-awesome-account\n gcp:\n type: vault:gcp:SecretBackend\n properties:\n path: gcp\n credentials:\n fn::invoke:\n Function: std:file\n Arguments:\n input: credentials.json\n Return: result\n staticAccount:\n type: vault:gcp:SecretStaticAccount\n name: static_account\n properties:\n backend: ${gcp.path}\n staticAccount: project_viewer\n secretType: access_token\n tokenScopes:\n - https://www.googleapis.com/auth/cloud-platform\n serviceAccountEmail: ${this.email}\n bindings:\n - resource: //cloudresourcemanager.googleapis.com/projects/${this.project}\n roles:\n - roles/viewer\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA static account can be imported using its Vault Path. For example, referencing the example above,\n\n```sh\n$ pulumi import vault:gcp/secretStaticAccount:SecretStaticAccount static_account gcp/static-account/project_viewer\n```\n", + "description": "Creates a Static Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.\n\nEach [static account](https://www.vaultproject.io/docs/secrets/gcp/index.html#static-accounts) is tied to a separately managed\nService Account, and can have one or more [bindings](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings) associated with it.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as google from \"@pulumi/google\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst _this = new google.index.ServiceAccount(\"this\", {accountId: \"my-awesome-account\"});\nconst gcp = new vault.gcp.SecretBackend(\"gcp\", {\n path: \"gcp\",\n credentials: std.file({\n input: \"credentials.json\",\n }).then(invoke =\u003e invoke.result),\n});\nconst staticAccount = new vault.gcp.SecretStaticAccount(\"static_account\", {\n backend: gcp.path,\n staticAccount: \"project_viewer\",\n secretType: \"access_token\",\n tokenScopes: [\"https://www.googleapis.com/auth/cloud-platform\"],\n serviceAccountEmail: _this.email,\n bindings: [{\n resource: `//cloudresourcemanager.googleapis.com/projects/${_this.project}`,\n roles: [\"roles/viewer\"],\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_google as google\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nthis = google.index.ServiceAccount(\"this\", account_id=my-awesome-account)\ngcp = vault.gcp.SecretBackend(\"gcp\",\n path=\"gcp\",\n credentials=std.file(input=\"credentials.json\").result)\nstatic_account = vault.gcp.SecretStaticAccount(\"static_account\",\n backend=gcp.path,\n static_account=\"project_viewer\",\n secret_type=\"access_token\",\n token_scopes=[\"https://www.googleapis.com/auth/cloud-platform\"],\n service_account_email=this[\"email\"],\n bindings=[{\n \"resource\": f\"//cloudresourcemanager.googleapis.com/projects/{this['project']}\",\n \"roles\": [\"roles/viewer\"],\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Google = Pulumi.Google;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var @this = new Google.Index.ServiceAccount(\"this\", new()\n {\n AccountId = \"my-awesome-account\",\n });\n\n var gcp = new Vault.Gcp.SecretBackend(\"gcp\", new()\n {\n Path = \"gcp\",\n Credentials = Std.File.Invoke(new()\n {\n Input = \"credentials.json\",\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n var staticAccount = new Vault.Gcp.SecretStaticAccount(\"static_account\", new()\n {\n Backend = gcp.Path,\n StaticAccount = \"project_viewer\",\n SecretType = \"access_token\",\n TokenScopes = new[]\n {\n \"https://www.googleapis.com/auth/cloud-platform\",\n },\n ServiceAccountEmail = @this.Email,\n Bindings = new[]\n {\n new Vault.Gcp.Inputs.SecretStaticAccountBindingArgs\n {\n Resource = $\"//cloudresourcemanager.googleapis.com/projects/{@this.Project}\",\n Roles = new[]\n {\n \"roles/viewer\",\n },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-google/sdk/go/google\"\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tthis, err := google.NewServiceAccount(ctx, \"this\", \u0026google.ServiceAccountArgs{\n\t\t\tAccountId: \"my-awesome-account\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"credentials.json\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tgcp, err := gcp.NewSecretBackend(ctx, \"gcp\", \u0026gcp.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"gcp\"),\n\t\t\tCredentials: pulumi.String(invokeFile.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = gcp.NewSecretStaticAccount(ctx, \"static_account\", \u0026gcp.SecretStaticAccountArgs{\n\t\t\tBackend: gcp.Path,\n\t\t\tStaticAccount: pulumi.String(\"project_viewer\"),\n\t\t\tSecretType: pulumi.String(\"access_token\"),\n\t\t\tTokenScopes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https://www.googleapis.com/auth/cloud-platform\"),\n\t\t\t},\n\t\t\tServiceAccountEmail: this.Email,\n\t\t\tBindings: gcp.SecretStaticAccountBindingArray{\n\t\t\t\t\u0026gcp.SecretStaticAccountBindingArgs{\n\t\t\t\t\tResource: pulumi.Sprintf(\"//cloudresourcemanager.googleapis.com/projects/%v\", this.Project),\n\t\t\t\t\tRoles: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"roles/viewer\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.google.serviceAccount;\nimport com.pulumi.google.ServiceAccountArgs;\nimport com.pulumi.vault.gcp.SecretBackend;\nimport com.pulumi.vault.gcp.SecretBackendArgs;\nimport com.pulumi.vault.gcp.SecretStaticAccount;\nimport com.pulumi.vault.gcp.SecretStaticAccountArgs;\nimport com.pulumi.vault.gcp.inputs.SecretStaticAccountBindingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var this_ = new ServiceAccount(\"this\", ServiceAccountArgs.builder()\n .accountId(\"my-awesome-account\")\n .build());\n\n var gcp = new SecretBackend(\"gcp\", SecretBackendArgs.builder()\n .path(\"gcp\")\n .credentials(StdFunctions.file(FileArgs.builder()\n .input(\"credentials.json\")\n .build()).result())\n .build());\n\n var staticAccount = new SecretStaticAccount(\"staticAccount\", SecretStaticAccountArgs.builder()\n .backend(gcp.path())\n .staticAccount(\"project_viewer\")\n .secretType(\"access_token\")\n .tokenScopes(\"https://www.googleapis.com/auth/cloud-platform\")\n .serviceAccountEmail(this_.email())\n .bindings(SecretStaticAccountBindingArgs.builder()\n .resource(String.format(\"//cloudresourcemanager.googleapis.com/projects/%s\", this_.project()))\n .roles(\"roles/viewer\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n this:\n type: google:serviceAccount\n properties:\n accountId: my-awesome-account\n gcp:\n type: vault:gcp:SecretBackend\n properties:\n path: gcp\n credentials:\n fn::invoke:\n function: std:file\n arguments:\n input: credentials.json\n return: result\n staticAccount:\n type: vault:gcp:SecretStaticAccount\n name: static_account\n properties:\n backend: ${gcp.path}\n staticAccount: project_viewer\n secretType: access_token\n tokenScopes:\n - https://www.googleapis.com/auth/cloud-platform\n serviceAccountEmail: ${this.email}\n bindings:\n - resource: //cloudresourcemanager.googleapis.com/projects/${this.project}\n roles:\n - roles/viewer\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nA static account can be imported using its Vault Path. For example, referencing the example above,\n\n```sh\n$ pulumi import vault:gcp/secretStaticAccount:SecretStaticAccount static_account gcp/static-account/project_viewer\n```\n", "properties": { "backend": { "type": "string", @@ -12596,7 +12596,7 @@ } }, "vault:generic/endpoint:Endpoint": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst userpass = new vault.AuthBackend(\"userpass\", {type: \"userpass\"});\nconst u1 = new vault.generic.Endpoint(\"u1\", {\n path: \"auth/userpass/users/u1\",\n ignoreAbsentFields: true,\n dataJson: `{\n \"policies\": [\"p1\"],\n \"password\": \"changeme\"\n}\n`,\n}, {\n dependsOn: [userpass],\n});\nconst u1Token = new vault.generic.Endpoint(\"u1_token\", {\n path: \"auth/userpass/login/u1\",\n disableRead: true,\n disableDelete: true,\n dataJson: `{\n \"password\": \"changeme\"\n}\n`,\n}, {\n dependsOn: [u1],\n});\nconst u1Entity = new vault.generic.Endpoint(\"u1_entity\", {\n disableRead: true,\n disableDelete: true,\n path: \"identity/lookup/entity\",\n ignoreAbsentFields: true,\n writeFields: [\"id\"],\n dataJson: `{\n \"alias_name\": \"u1\",\n \"alias_mount_accessor\": vault_auth_backend.userpass.accessor\n}\n`,\n}, {\n dependsOn: [u1Token],\n});\nexport const u1Id = u1Entity.writeData.id;\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nuserpass = vault.AuthBackend(\"userpass\", type=\"userpass\")\nu1 = vault.generic.Endpoint(\"u1\",\n path=\"auth/userpass/users/u1\",\n ignore_absent_fields=True,\n data_json=\"\"\"{\n \"policies\": [\"p1\"],\n \"password\": \"changeme\"\n}\n\"\"\",\n opts = pulumi.ResourceOptions(depends_on=[userpass]))\nu1_token = vault.generic.Endpoint(\"u1_token\",\n path=\"auth/userpass/login/u1\",\n disable_read=True,\n disable_delete=True,\n data_json=\"\"\"{\n \"password\": \"changeme\"\n}\n\"\"\",\n opts = pulumi.ResourceOptions(depends_on=[u1]))\nu1_entity = vault.generic.Endpoint(\"u1_entity\",\n disable_read=True,\n disable_delete=True,\n path=\"identity/lookup/entity\",\n ignore_absent_fields=True,\n write_fields=[\"id\"],\n data_json=\"\"\"{\n \"alias_name\": \"u1\",\n \"alias_mount_accessor\": vault_auth_backend.userpass.accessor\n}\n\"\"\",\n opts = pulumi.ResourceOptions(depends_on=[u1_token]))\npulumi.export(\"u1Id\", u1_entity.write_data[\"id\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var userpass = new Vault.AuthBackend(\"userpass\", new()\n {\n Type = \"userpass\",\n });\n\n var u1 = new Vault.Generic.Endpoint(\"u1\", new()\n {\n Path = \"auth/userpass/users/u1\",\n IgnoreAbsentFields = true,\n DataJson = @\"{\n \"\"policies\"\": [\"\"p1\"\"],\n \"\"password\"\": \"\"changeme\"\"\n}\n\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n userpass,\n },\n });\n\n var u1Token = new Vault.Generic.Endpoint(\"u1_token\", new()\n {\n Path = \"auth/userpass/login/u1\",\n DisableRead = true,\n DisableDelete = true,\n DataJson = @\"{\n \"\"password\"\": \"\"changeme\"\"\n}\n\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n u1,\n },\n });\n\n var u1Entity = new Vault.Generic.Endpoint(\"u1_entity\", new()\n {\n DisableRead = true,\n DisableDelete = true,\n Path = \"identity/lookup/entity\",\n IgnoreAbsentFields = true,\n WriteFields = new[]\n {\n \"id\",\n },\n DataJson = @\"{\n \"\"alias_name\"\": \"\"u1\"\",\n \"\"alias_mount_accessor\"\": vault_auth_backend.userpass.accessor\n}\n\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n u1Token,\n },\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"u1Id\"] = u1Entity.WriteData.Apply(writeData =\u003e writeData.Id),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/generic\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tuserpass, err := vault.NewAuthBackend(ctx, \"userpass\", \u0026vault.AuthBackendArgs{\n\t\t\tType: pulumi.String(\"userpass\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tu1, err := generic.NewEndpoint(ctx, \"u1\", \u0026generic.EndpointArgs{\n\t\t\tPath: pulumi.String(\"auth/userpass/users/u1\"),\n\t\t\tIgnoreAbsentFields: pulumi.Bool(true),\n\t\t\tDataJson: pulumi.String(\"{\\n \\\"policies\\\": [\\\"p1\\\"],\\n \\\"password\\\": \\\"changeme\\\"\\n}\\n\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tuserpass,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tu1Token, err := generic.NewEndpoint(ctx, \"u1_token\", \u0026generic.EndpointArgs{\n\t\t\tPath: pulumi.String(\"auth/userpass/login/u1\"),\n\t\t\tDisableRead: pulumi.Bool(true),\n\t\t\tDisableDelete: pulumi.Bool(true),\n\t\t\tDataJson: pulumi.String(\"{\\n \\\"password\\\": \\\"changeme\\\"\\n}\\n\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tu1,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tu1Entity, err := generic.NewEndpoint(ctx, \"u1_entity\", \u0026generic.EndpointArgs{\n\t\t\tDisableRead: pulumi.Bool(true),\n\t\t\tDisableDelete: pulumi.Bool(true),\n\t\t\tPath: pulumi.String(\"identity/lookup/entity\"),\n\t\t\tIgnoreAbsentFields: pulumi.Bool(true),\n\t\t\tWriteFields: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"id\"),\n\t\t\t},\n\t\t\tDataJson: pulumi.String(\"{\\n \\\"alias_name\\\": \\\"u1\\\",\\n \\\"alias_mount_accessor\\\": vault_auth_backend.userpass.accessor\\n}\\n\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tu1Token,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"u1Id\", u1Entity.WriteData.ApplyT(func(writeData map[string]string) (string, error) {\n\t\t\treturn writeData.Id, nil\n\t\t}).(pulumi.StringOutput))\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.AuthBackend;\nimport com.pulumi.vault.AuthBackendArgs;\nimport com.pulumi.vault.generic.Endpoint;\nimport com.pulumi.vault.generic.EndpointArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var userpass = new AuthBackend(\"userpass\", AuthBackendArgs.builder()\n .type(\"userpass\")\n .build());\n\n var u1 = new Endpoint(\"u1\", EndpointArgs.builder()\n .path(\"auth/userpass/users/u1\")\n .ignoreAbsentFields(true)\n .dataJson(\"\"\"\n{\n \"policies\": [\"p1\"],\n \"password\": \"changeme\"\n}\n \"\"\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(userpass)\n .build());\n\n var u1Token = new Endpoint(\"u1Token\", EndpointArgs.builder()\n .path(\"auth/userpass/login/u1\")\n .disableRead(true)\n .disableDelete(true)\n .dataJson(\"\"\"\n{\n \"password\": \"changeme\"\n}\n \"\"\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(u1)\n .build());\n\n var u1Entity = new Endpoint(\"u1Entity\", EndpointArgs.builder()\n .disableRead(true)\n .disableDelete(true)\n .path(\"identity/lookup/entity\")\n .ignoreAbsentFields(true)\n .writeFields(\"id\")\n .dataJson(\"\"\"\n{\n \"alias_name\": \"u1\",\n \"alias_mount_accessor\": vault_auth_backend.userpass.accessor\n}\n \"\"\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(u1Token)\n .build());\n\n ctx.export(\"u1Id\", u1Entity.writeData().applyValue(writeData -\u003e writeData.id()));\n }\n}\n```\n```yaml\nresources:\n userpass:\n type: vault:AuthBackend\n properties:\n type: userpass\n u1:\n type: vault:generic:Endpoint\n properties:\n path: auth/userpass/users/u1\n ignoreAbsentFields: true\n dataJson: |\n {\n \"policies\": [\"p1\"],\n \"password\": \"changeme\"\n }\n options:\n dependson:\n - ${userpass}\n u1Token:\n type: vault:generic:Endpoint\n name: u1_token\n properties:\n path: auth/userpass/login/u1\n disableRead: true\n disableDelete: true\n dataJson: |\n {\n \"password\": \"changeme\"\n }\n options:\n dependson:\n - ${u1}\n u1Entity:\n type: vault:generic:Endpoint\n name: u1_entity\n properties:\n disableRead: true\n disableDelete: true\n path: identity/lookup/entity\n ignoreAbsentFields: true\n writeFields:\n - id\n dataJson: |\n {\n \"alias_name\": \"u1\",\n \"alias_mount_accessor\": vault_auth_backend.userpass.accessor\n }\n options:\n dependson:\n - ${u1Token}\noutputs:\n u1Id: ${u1Entity.writeData.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `create` or `update` capability\n(depending on whether the resource already exists) on the given path. If\n`disable_delete` is false, the `delete` capability is also required. If\n`disable_read` is false, the `read` capability is required.\n\n## Import\n\nImport is not supported for this resource.\n\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst userpass = new vault.AuthBackend(\"userpass\", {type: \"userpass\"});\nconst u1 = new vault.generic.Endpoint(\"u1\", {\n path: \"auth/userpass/users/u1\",\n ignoreAbsentFields: true,\n dataJson: `{\n \"policies\": [\"p1\"],\n \"password\": \"changeme\"\n}\n`,\n}, {\n dependsOn: [userpass],\n});\nconst u1Token = new vault.generic.Endpoint(\"u1_token\", {\n path: \"auth/userpass/login/u1\",\n disableRead: true,\n disableDelete: true,\n dataJson: `{\n \"password\": \"changeme\"\n}\n`,\n}, {\n dependsOn: [u1],\n});\nconst u1Entity = new vault.generic.Endpoint(\"u1_entity\", {\n disableRead: true,\n disableDelete: true,\n path: \"identity/lookup/entity\",\n ignoreAbsentFields: true,\n writeFields: [\"id\"],\n dataJson: `{\n \"alias_name\": \"u1\",\n \"alias_mount_accessor\": vault_auth_backend.userpass.accessor\n}\n`,\n}, {\n dependsOn: [u1Token],\n});\nexport const u1Id = u1Entity.writeData.id;\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nuserpass = vault.AuthBackend(\"userpass\", type=\"userpass\")\nu1 = vault.generic.Endpoint(\"u1\",\n path=\"auth/userpass/users/u1\",\n ignore_absent_fields=True,\n data_json=\"\"\"{\n \"policies\": [\"p1\"],\n \"password\": \"changeme\"\n}\n\"\"\",\n opts = pulumi.ResourceOptions(depends_on=[userpass]))\nu1_token = vault.generic.Endpoint(\"u1_token\",\n path=\"auth/userpass/login/u1\",\n disable_read=True,\n disable_delete=True,\n data_json=\"\"\"{\n \"password\": \"changeme\"\n}\n\"\"\",\n opts = pulumi.ResourceOptions(depends_on=[u1]))\nu1_entity = vault.generic.Endpoint(\"u1_entity\",\n disable_read=True,\n disable_delete=True,\n path=\"identity/lookup/entity\",\n ignore_absent_fields=True,\n write_fields=[\"id\"],\n data_json=\"\"\"{\n \"alias_name\": \"u1\",\n \"alias_mount_accessor\": vault_auth_backend.userpass.accessor\n}\n\"\"\",\n opts = pulumi.ResourceOptions(depends_on=[u1_token]))\npulumi.export(\"u1Id\", u1_entity.write_data[\"id\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var userpass = new Vault.AuthBackend(\"userpass\", new()\n {\n Type = \"userpass\",\n });\n\n var u1 = new Vault.Generic.Endpoint(\"u1\", new()\n {\n Path = \"auth/userpass/users/u1\",\n IgnoreAbsentFields = true,\n DataJson = @\"{\n \"\"policies\"\": [\"\"p1\"\"],\n \"\"password\"\": \"\"changeme\"\"\n}\n\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n userpass,\n },\n });\n\n var u1Token = new Vault.Generic.Endpoint(\"u1_token\", new()\n {\n Path = \"auth/userpass/login/u1\",\n DisableRead = true,\n DisableDelete = true,\n DataJson = @\"{\n \"\"password\"\": \"\"changeme\"\"\n}\n\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n u1,\n },\n });\n\n var u1Entity = new Vault.Generic.Endpoint(\"u1_entity\", new()\n {\n DisableRead = true,\n DisableDelete = true,\n Path = \"identity/lookup/entity\",\n IgnoreAbsentFields = true,\n WriteFields = new[]\n {\n \"id\",\n },\n DataJson = @\"{\n \"\"alias_name\"\": \"\"u1\"\",\n \"\"alias_mount_accessor\"\": vault_auth_backend.userpass.accessor\n}\n\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n u1Token,\n },\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"u1Id\"] = u1Entity.WriteData.Apply(writeData =\u003e writeData.Id),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/generic\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tuserpass, err := vault.NewAuthBackend(ctx, \"userpass\", \u0026vault.AuthBackendArgs{\n\t\t\tType: pulumi.String(\"userpass\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tu1, err := generic.NewEndpoint(ctx, \"u1\", \u0026generic.EndpointArgs{\n\t\t\tPath: pulumi.String(\"auth/userpass/users/u1\"),\n\t\t\tIgnoreAbsentFields: pulumi.Bool(true),\n\t\t\tDataJson: pulumi.String(\"{\\n \\\"policies\\\": [\\\"p1\\\"],\\n \\\"password\\\": \\\"changeme\\\"\\n}\\n\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tuserpass,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tu1Token, err := generic.NewEndpoint(ctx, \"u1_token\", \u0026generic.EndpointArgs{\n\t\t\tPath: pulumi.String(\"auth/userpass/login/u1\"),\n\t\t\tDisableRead: pulumi.Bool(true),\n\t\t\tDisableDelete: pulumi.Bool(true),\n\t\t\tDataJson: pulumi.String(\"{\\n \\\"password\\\": \\\"changeme\\\"\\n}\\n\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tu1,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tu1Entity, err := generic.NewEndpoint(ctx, \"u1_entity\", \u0026generic.EndpointArgs{\n\t\t\tDisableRead: pulumi.Bool(true),\n\t\t\tDisableDelete: pulumi.Bool(true),\n\t\t\tPath: pulumi.String(\"identity/lookup/entity\"),\n\t\t\tIgnoreAbsentFields: pulumi.Bool(true),\n\t\t\tWriteFields: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"id\"),\n\t\t\t},\n\t\t\tDataJson: pulumi.String(\"{\\n \\\"alias_name\\\": \\\"u1\\\",\\n \\\"alias_mount_accessor\\\": vault_auth_backend.userpass.accessor\\n}\\n\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tu1Token,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"u1Id\", u1Entity.WriteData.ApplyT(func(writeData map[string]string) (string, error) {\n\t\t\treturn writeData.Id, nil\n\t\t}).(pulumi.StringOutput))\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.AuthBackend;\nimport com.pulumi.vault.AuthBackendArgs;\nimport com.pulumi.vault.generic.Endpoint;\nimport com.pulumi.vault.generic.EndpointArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var userpass = new AuthBackend(\"userpass\", AuthBackendArgs.builder()\n .type(\"userpass\")\n .build());\n\n var u1 = new Endpoint(\"u1\", EndpointArgs.builder()\n .path(\"auth/userpass/users/u1\")\n .ignoreAbsentFields(true)\n .dataJson(\"\"\"\n{\n \"policies\": [\"p1\"],\n \"password\": \"changeme\"\n}\n \"\"\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(userpass)\n .build());\n\n var u1Token = new Endpoint(\"u1Token\", EndpointArgs.builder()\n .path(\"auth/userpass/login/u1\")\n .disableRead(true)\n .disableDelete(true)\n .dataJson(\"\"\"\n{\n \"password\": \"changeme\"\n}\n \"\"\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(u1)\n .build());\n\n var u1Entity = new Endpoint(\"u1Entity\", EndpointArgs.builder()\n .disableRead(true)\n .disableDelete(true)\n .path(\"identity/lookup/entity\")\n .ignoreAbsentFields(true)\n .writeFields(\"id\")\n .dataJson(\"\"\"\n{\n \"alias_name\": \"u1\",\n \"alias_mount_accessor\": vault_auth_backend.userpass.accessor\n}\n \"\"\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(u1Token)\n .build());\n\n ctx.export(\"u1Id\", u1Entity.writeData().applyValue(writeData -\u003e writeData.id()));\n }\n}\n```\n```yaml\nresources:\n userpass:\n type: vault:AuthBackend\n properties:\n type: userpass\n u1:\n type: vault:generic:Endpoint\n properties:\n path: auth/userpass/users/u1\n ignoreAbsentFields: true\n dataJson: |\n {\n \"policies\": [\"p1\"],\n \"password\": \"changeme\"\n }\n options:\n dependsOn:\n - ${userpass}\n u1Token:\n type: vault:generic:Endpoint\n name: u1_token\n properties:\n path: auth/userpass/login/u1\n disableRead: true\n disableDelete: true\n dataJson: |\n {\n \"password\": \"changeme\"\n }\n options:\n dependsOn:\n - ${u1}\n u1Entity:\n type: vault:generic:Endpoint\n name: u1_entity\n properties:\n disableRead: true\n disableDelete: true\n path: identity/lookup/entity\n ignoreAbsentFields: true\n writeFields:\n - id\n dataJson: |\n {\n \"alias_name\": \"u1\",\n \"alias_mount_accessor\": vault_auth_backend.userpass.accessor\n }\n options:\n dependsOn:\n - ${u1Token}\noutputs:\n u1Id: ${u1Entity.writeData.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `create` or `update` capability\n(depending on whether the resource already exists) on the given path. If\n`disable_delete` is false, the `delete` capability is also required. If\n`disable_read` is false, the `read` capability is required.\n\n## Import\n\nImport is not supported for this resource.\n\n", "properties": { "dataJson": { "type": "string", @@ -16007,7 +16007,7 @@ } }, "vault:index/certAuthBackendRole:CertAuthBackendRole": { - "description": "Provides a resource to create a role in an [Cert auth backend within Vault](https://www.vaultproject.io/docs/auth/cert.html).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst cert = new vault.AuthBackend(\"cert\", {\n path: \"cert\",\n type: \"cert\",\n});\nconst certCertAuthBackendRole = new vault.CertAuthBackendRole(\"cert\", {\n name: \"foo\",\n certificate: std.file({\n input: \"/path/to/certs/ca-cert.pem\",\n }).then(invoke =\u003e invoke.result),\n backend: cert.path,\n allowedNames: [\n \"foo.example.org\",\n \"baz.example.org\",\n ],\n tokenTtl: 300,\n tokenMaxTtl: 600,\n tokenPolicies: [\"foo\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\ncert = vault.AuthBackend(\"cert\",\n path=\"cert\",\n type=\"cert\")\ncert_cert_auth_backend_role = vault.CertAuthBackendRole(\"cert\",\n name=\"foo\",\n certificate=std.file(input=\"/path/to/certs/ca-cert.pem\").result,\n backend=cert.path,\n allowed_names=[\n \"foo.example.org\",\n \"baz.example.org\",\n ],\n token_ttl=300,\n token_max_ttl=600,\n token_policies=[\"foo\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var cert = new Vault.AuthBackend(\"cert\", new()\n {\n Path = \"cert\",\n Type = \"cert\",\n });\n\n var certCertAuthBackendRole = new Vault.CertAuthBackendRole(\"cert\", new()\n {\n Name = \"foo\",\n Certificate = Std.File.Invoke(new()\n {\n Input = \"/path/to/certs/ca-cert.pem\",\n }).Apply(invoke =\u003e invoke.Result),\n Backend = cert.Path,\n AllowedNames = new[]\n {\n \"foo.example.org\",\n \"baz.example.org\",\n },\n TokenTtl = 300,\n TokenMaxTtl = 600,\n TokenPolicies = new[]\n {\n \"foo\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcert, err := vault.NewAuthBackend(ctx, \"cert\", \u0026vault.AuthBackendArgs{\n\t\t\tPath: pulumi.String(\"cert\"),\n\t\t\tType: pulumi.String(\"cert\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/certs/ca-cert.pem\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = vault.NewCertAuthBackendRole(ctx, \"cert\", \u0026vault.CertAuthBackendRoleArgs{\n\t\t\tName: pulumi.String(\"foo\"),\n\t\t\tCertificate: pulumi.String(invokeFile.Result),\n\t\t\tBackend: cert.Path,\n\t\t\tAllowedNames: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"foo.example.org\"),\n\t\t\t\tpulumi.String(\"baz.example.org\"),\n\t\t\t},\n\t\t\tTokenTtl: pulumi.Int(300),\n\t\t\tTokenMaxTtl: pulumi.Int(600),\n\t\t\tTokenPolicies: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"foo\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.AuthBackend;\nimport com.pulumi.vault.AuthBackendArgs;\nimport com.pulumi.vault.CertAuthBackendRole;\nimport com.pulumi.vault.CertAuthBackendRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var cert = new AuthBackend(\"cert\", AuthBackendArgs.builder()\n .path(\"cert\")\n .type(\"cert\")\n .build());\n\n var certCertAuthBackendRole = new CertAuthBackendRole(\"certCertAuthBackendRole\", CertAuthBackendRoleArgs.builder()\n .name(\"foo\")\n .certificate(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/certs/ca-cert.pem\")\n .build()).result())\n .backend(cert.path())\n .allowedNames( \n \"foo.example.org\",\n \"baz.example.org\")\n .tokenTtl(300)\n .tokenMaxTtl(600)\n .tokenPolicies(\"foo\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n cert:\n type: vault:AuthBackend\n properties:\n path: cert\n type: cert\n certCertAuthBackendRole:\n type: vault:CertAuthBackendRole\n name: cert\n properties:\n name: foo\n certificate:\n fn::invoke:\n Function: std:file\n Arguments:\n input: /path/to/certs/ca-cert.pem\n Return: result\n backend: ${cert.path}\n allowedNames:\n - foo.example.org\n - baz.example.org\n tokenTtl: 300\n tokenMaxTtl: 600\n tokenPolicies:\n - foo\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Provides a resource to create a role in an [Cert auth backend within Vault](https://www.vaultproject.io/docs/auth/cert.html).\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst cert = new vault.AuthBackend(\"cert\", {\n path: \"cert\",\n type: \"cert\",\n});\nconst certCertAuthBackendRole = new vault.CertAuthBackendRole(\"cert\", {\n name: \"foo\",\n certificate: std.file({\n input: \"/path/to/certs/ca-cert.pem\",\n }).then(invoke =\u003e invoke.result),\n backend: cert.path,\n allowedNames: [\n \"foo.example.org\",\n \"baz.example.org\",\n ],\n tokenTtl: 300,\n tokenMaxTtl: 600,\n tokenPolicies: [\"foo\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\ncert = vault.AuthBackend(\"cert\",\n path=\"cert\",\n type=\"cert\")\ncert_cert_auth_backend_role = vault.CertAuthBackendRole(\"cert\",\n name=\"foo\",\n certificate=std.file(input=\"/path/to/certs/ca-cert.pem\").result,\n backend=cert.path,\n allowed_names=[\n \"foo.example.org\",\n \"baz.example.org\",\n ],\n token_ttl=300,\n token_max_ttl=600,\n token_policies=[\"foo\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var cert = new Vault.AuthBackend(\"cert\", new()\n {\n Path = \"cert\",\n Type = \"cert\",\n });\n\n var certCertAuthBackendRole = new Vault.CertAuthBackendRole(\"cert\", new()\n {\n Name = \"foo\",\n Certificate = Std.File.Invoke(new()\n {\n Input = \"/path/to/certs/ca-cert.pem\",\n }).Apply(invoke =\u003e invoke.Result),\n Backend = cert.Path,\n AllowedNames = new[]\n {\n \"foo.example.org\",\n \"baz.example.org\",\n },\n TokenTtl = 300,\n TokenMaxTtl = 600,\n TokenPolicies = new[]\n {\n \"foo\",\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcert, err := vault.NewAuthBackend(ctx, \"cert\", \u0026vault.AuthBackendArgs{\n\t\t\tPath: pulumi.String(\"cert\"),\n\t\t\tType: pulumi.String(\"cert\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/certs/ca-cert.pem\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = vault.NewCertAuthBackendRole(ctx, \"cert\", \u0026vault.CertAuthBackendRoleArgs{\n\t\t\tName: pulumi.String(\"foo\"),\n\t\t\tCertificate: pulumi.String(invokeFile.Result),\n\t\t\tBackend: cert.Path,\n\t\t\tAllowedNames: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"foo.example.org\"),\n\t\t\t\tpulumi.String(\"baz.example.org\"),\n\t\t\t},\n\t\t\tTokenTtl: pulumi.Int(300),\n\t\t\tTokenMaxTtl: pulumi.Int(600),\n\t\t\tTokenPolicies: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"foo\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.AuthBackend;\nimport com.pulumi.vault.AuthBackendArgs;\nimport com.pulumi.vault.CertAuthBackendRole;\nimport com.pulumi.vault.CertAuthBackendRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var cert = new AuthBackend(\"cert\", AuthBackendArgs.builder()\n .path(\"cert\")\n .type(\"cert\")\n .build());\n\n var certCertAuthBackendRole = new CertAuthBackendRole(\"certCertAuthBackendRole\", CertAuthBackendRoleArgs.builder()\n .name(\"foo\")\n .certificate(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/certs/ca-cert.pem\")\n .build()).result())\n .backend(cert.path())\n .allowedNames( \n \"foo.example.org\",\n \"baz.example.org\")\n .tokenTtl(300)\n .tokenMaxTtl(600)\n .tokenPolicies(\"foo\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n cert:\n type: vault:AuthBackend\n properties:\n path: cert\n type: cert\n certCertAuthBackendRole:\n type: vault:CertAuthBackendRole\n name: cert\n properties:\n name: foo\n certificate:\n fn::invoke:\n function: std:file\n arguments:\n input: /path/to/certs/ca-cert.pem\n return: result\n backend: ${cert.path}\n allowedNames:\n - foo.example.org\n - baz.example.org\n tokenTtl: 300\n tokenMaxTtl: 600\n tokenPolicies:\n - foo\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "properties": { "allowedCommonNames": { "type": "array", @@ -18234,7 +18234,7 @@ } }, "vault:index/quotaLeaseCount:QuotaLeaseCount": { - "description": "Manage lease count quotas which enforce the number of leases that can be created.\nA lease count quota can be created at the root level or defined on a namespace or mount by\nspecifying a path when creating the quota.\n\nSee [Vault's Documentation](https://www.vaultproject.io/docs/enterprise/lease-count-quotas) for more\ninformation. \n\n**Note** this feature is available only with Vault Enterprise.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst global = new vault.QuotaLeaseCount(\"global\", {\n name: \"global\",\n path: \"\",\n maxLeases: 100,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nglobal_ = vault.QuotaLeaseCount(\"global\",\n name=\"global\",\n path=\"\",\n max_leases=100)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var @global = new Vault.QuotaLeaseCount(\"global\", new()\n {\n Name = \"global\",\n Path = \"\",\n MaxLeases = 100,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.NewQuotaLeaseCount(ctx, \"global\", \u0026vault.QuotaLeaseCountArgs{\n\t\t\tName: pulumi.String(\"global\"),\n\t\t\tPath: pulumi.String(\"\"),\n\t\t\tMaxLeases: pulumi.Int(100),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.QuotaLeaseCount;\nimport com.pulumi.vault.QuotaLeaseCountArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var global = new QuotaLeaseCount(\"global\", QuotaLeaseCountArgs.builder()\n .name(\"global\")\n .path(\"\")\n .maxLeases(100)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n global:\n type: vault:QuotaLeaseCount\n properties:\n name: global\n path:\n maxLeases: 100\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nLease count quotas can be imported using their names\n\n```sh\n$ pulumi import vault:index/quotaLeaseCount:QuotaLeaseCount global global\n```\n", + "description": "Manage lease count quotas which enforce the number of leases that can be created.\nA lease count quota can be created at the root level or defined on a namespace or mount by\nspecifying a path when creating the quota.\n\nSee [Vault's Documentation](https://www.vaultproject.io/docs/enterprise/lease-count-quotas) for more\ninformation. \n\n**Note** this feature is available only with Vault Enterprise.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst global = new vault.QuotaLeaseCount(\"global\", {\n name: \"global\",\n path: \"\",\n maxLeases: 100,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nglobal_ = vault.QuotaLeaseCount(\"global\",\n name=\"global\",\n path=\"\",\n max_leases=100)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var @global = new Vault.QuotaLeaseCount(\"global\", new()\n {\n Name = \"global\",\n Path = \"\",\n MaxLeases = 100,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.NewQuotaLeaseCount(ctx, \"global\", \u0026vault.QuotaLeaseCountArgs{\n\t\t\tName: pulumi.String(\"global\"),\n\t\t\tPath: pulumi.String(\"\"),\n\t\t\tMaxLeases: pulumi.Int(100),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.QuotaLeaseCount;\nimport com.pulumi.vault.QuotaLeaseCountArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var global = new QuotaLeaseCount(\"global\", QuotaLeaseCountArgs.builder()\n .name(\"global\")\n .path(\"\")\n .maxLeases(100)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n global:\n type: vault:QuotaLeaseCount\n properties:\n name: global\n path: \"\"\n maxLeases: 100\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nLease count quotas can be imported using their names\n\n```sh\n$ pulumi import vault:index/quotaLeaseCount:QuotaLeaseCount global global\n```\n", "properties": { "inheritable": { "type": "boolean", @@ -18330,7 +18330,7 @@ } }, "vault:index/quotaRateLimit:QuotaRateLimit": { - "description": "Manage rate limit quotas which enforce API rate limiting using a token bucket algorithm.\nA rate limit quota can be created at the root level or defined on a namespace or mount by\nspecifying a path when creating the quota.\n\nSee [Vault's Documentation](https://www.vaultproject.io/docs/concepts/resource-quotas) for more\ninformation.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst global = new vault.QuotaRateLimit(\"global\", {\n name: \"global\",\n path: \"\",\n rate: 100,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nglobal_ = vault.QuotaRateLimit(\"global\",\n name=\"global\",\n path=\"\",\n rate=100)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var @global = new Vault.QuotaRateLimit(\"global\", new()\n {\n Name = \"global\",\n Path = \"\",\n Rate = 100,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.NewQuotaRateLimit(ctx, \"global\", \u0026vault.QuotaRateLimitArgs{\n\t\t\tName: pulumi.String(\"global\"),\n\t\t\tPath: pulumi.String(\"\"),\n\t\t\tRate: pulumi.Float64(100),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.QuotaRateLimit;\nimport com.pulumi.vault.QuotaRateLimitArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var global = new QuotaRateLimit(\"global\", QuotaRateLimitArgs.builder()\n .name(\"global\")\n .path(\"\")\n .rate(100)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n global:\n type: vault:QuotaRateLimit\n properties:\n name: global\n path:\n rate: 100\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRate limit quotas can be imported using their names\n\n```sh\n$ pulumi import vault:index/quotaRateLimit:QuotaRateLimit global global\n```\n", + "description": "Manage rate limit quotas which enforce API rate limiting using a token bucket algorithm.\nA rate limit quota can be created at the root level or defined on a namespace or mount by\nspecifying a path when creating the quota.\n\nSee [Vault's Documentation](https://www.vaultproject.io/docs/concepts/resource-quotas) for more\ninformation.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst global = new vault.QuotaRateLimit(\"global\", {\n name: \"global\",\n path: \"\",\n rate: 100,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nglobal_ = vault.QuotaRateLimit(\"global\",\n name=\"global\",\n path=\"\",\n rate=100)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var @global = new Vault.QuotaRateLimit(\"global\", new()\n {\n Name = \"global\",\n Path = \"\",\n Rate = 100,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.NewQuotaRateLimit(ctx, \"global\", \u0026vault.QuotaRateLimitArgs{\n\t\t\tName: pulumi.String(\"global\"),\n\t\t\tPath: pulumi.String(\"\"),\n\t\t\tRate: pulumi.Float64(100),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.QuotaRateLimit;\nimport com.pulumi.vault.QuotaRateLimitArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var global = new QuotaRateLimit(\"global\", QuotaRateLimitArgs.builder()\n .name(\"global\")\n .path(\"\")\n .rate(100)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n global:\n type: vault:QuotaRateLimit\n properties:\n name: global\n path: \"\"\n rate: 100\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRate limit quotas can be imported using their names\n\n```sh\n$ pulumi import vault:index/quotaRateLimit:QuotaRateLimit global global\n```\n", "properties": { "blockInterval": { "type": "integer", @@ -18564,7 +18564,7 @@ } }, "vault:index/raftSnapshotAgentConfig:RaftSnapshotAgentConfig": { - "description": "## Example Usage\n\n### Local Storage\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst localBackups = new vault.RaftSnapshotAgentConfig(\"local_backups\", {\n name: \"local\",\n intervalSeconds: 86400,\n retain: 7,\n pathPrefix: \"/opt/vault/snapshots/\",\n storageType: \"local\",\n localMaxSpace: 10000000,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nlocal_backups = vault.RaftSnapshotAgentConfig(\"local_backups\",\n name=\"local\",\n interval_seconds=86400,\n retain=7,\n path_prefix=\"/opt/vault/snapshots/\",\n storage_type=\"local\",\n local_max_space=10000000)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var localBackups = new Vault.RaftSnapshotAgentConfig(\"local_backups\", new()\n {\n Name = \"local\",\n IntervalSeconds = 86400,\n Retain = 7,\n PathPrefix = \"/opt/vault/snapshots/\",\n StorageType = \"local\",\n LocalMaxSpace = 10000000,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.NewRaftSnapshotAgentConfig(ctx, \"local_backups\", \u0026vault.RaftSnapshotAgentConfigArgs{\n\t\t\tName: pulumi.String(\"local\"),\n\t\t\tIntervalSeconds: pulumi.Int(86400),\n\t\t\tRetain: pulumi.Int(7),\n\t\t\tPathPrefix: pulumi.String(\"/opt/vault/snapshots/\"),\n\t\t\tStorageType: pulumi.String(\"local\"),\n\t\t\tLocalMaxSpace: pulumi.Int(10000000),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.RaftSnapshotAgentConfig;\nimport com.pulumi.vault.RaftSnapshotAgentConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var localBackups = new RaftSnapshotAgentConfig(\"localBackups\", RaftSnapshotAgentConfigArgs.builder()\n .name(\"local\")\n .intervalSeconds(86400)\n .retain(7)\n .pathPrefix(\"/opt/vault/snapshots/\")\n .storageType(\"local\")\n .localMaxSpace(10000000)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n localBackups:\n type: vault:RaftSnapshotAgentConfig\n name: local_backups\n properties:\n name: local\n intervalSeconds: 86400 # 24h\n retain: 7\n pathPrefix: /opt/vault/snapshots/\n storageType: local\n localMaxSpace: 1e+07\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### AWS S3\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as aws from \"@pulumi/aws\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new pulumi.Config();\nconst awsAccessKeyId = config.requireObject(\"awsAccessKeyId\");\nconst awsSecretAccessKey = config.requireObject(\"awsSecretAccessKey\");\nconst current = aws.getRegion({});\nconst s3Backups = new vault.RaftSnapshotAgentConfig(\"s3_backups\", {\n name: \"s3\",\n intervalSeconds: 86400,\n retain: 7,\n pathPrefix: \"/path/in/bucket\",\n storageType: \"aws-s3\",\n awsS3Bucket: \"my-bucket\",\n awsS3Region: current.then(current =\u003e current.name),\n awsAccessKeyId: awsAccessKeyId,\n awsSecretAccessKey: awsSecretAccessKey,\n awsS3EnableKms: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_aws as aws\nimport pulumi_vault as vault\n\nconfig = pulumi.Config()\naws_access_key_id = config.require_object(\"awsAccessKeyId\")\naws_secret_access_key = config.require_object(\"awsSecretAccessKey\")\ncurrent = aws.get_region()\ns3_backups = vault.RaftSnapshotAgentConfig(\"s3_backups\",\n name=\"s3\",\n interval_seconds=86400,\n retain=7,\n path_prefix=\"/path/in/bucket\",\n storage_type=\"aws-s3\",\n aws_s3_bucket=\"my-bucket\",\n aws_s3_region=current.name,\n aws_access_key_id=aws_access_key_id,\n aws_secret_access_key=aws_secret_access_key,\n aws_s3_enable_kms=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Aws = Pulumi.Aws;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Config();\n var awsAccessKeyId = config.RequireObject\u003cdynamic\u003e(\"awsAccessKeyId\");\n var awsSecretAccessKey = config.RequireObject\u003cdynamic\u003e(\"awsSecretAccessKey\");\n var current = Aws.GetRegion.Invoke();\n\n var s3Backups = new Vault.RaftSnapshotAgentConfig(\"s3_backups\", new()\n {\n Name = \"s3\",\n IntervalSeconds = 86400,\n Retain = 7,\n PathPrefix = \"/path/in/bucket\",\n StorageType = \"aws-s3\",\n AwsS3Bucket = \"my-bucket\",\n AwsS3Region = current.Apply(getRegionResult =\u003e getRegionResult.Name),\n AwsAccessKeyId = awsAccessKeyId,\n AwsSecretAccessKey = awsSecretAccessKey,\n AwsS3EnableKms = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-aws/sdk/v5/go/aws\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi/config\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcfg := config.New(ctx, \"\")\n\t\tawsAccessKeyId := cfg.RequireObject(\"awsAccessKeyId\")\n\t\tawsSecretAccessKey := cfg.RequireObject(\"awsSecretAccessKey\")\n\t\tcurrent, err := aws.GetRegion(ctx, \u0026aws.GetRegionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = vault.NewRaftSnapshotAgentConfig(ctx, \"s3_backups\", \u0026vault.RaftSnapshotAgentConfigArgs{\n\t\t\tName: pulumi.String(\"s3\"),\n\t\t\tIntervalSeconds: pulumi.Int(86400),\n\t\t\tRetain: pulumi.Int(7),\n\t\t\tPathPrefix: pulumi.String(\"/path/in/bucket\"),\n\t\t\tStorageType: pulumi.String(\"aws-s3\"),\n\t\t\tAwsS3Bucket: pulumi.String(\"my-bucket\"),\n\t\t\tAwsS3Region: pulumi.String(current.Name),\n\t\t\tAwsAccessKeyId: pulumi.Any(awsAccessKeyId),\n\t\t\tAwsSecretAccessKey: pulumi.Any(awsSecretAccessKey),\n\t\t\tAwsS3EnableKms: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.aws.AwsFunctions;\nimport com.pulumi.aws.inputs.GetRegionArgs;\nimport com.pulumi.vault.RaftSnapshotAgentConfig;\nimport com.pulumi.vault.RaftSnapshotAgentConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var config = ctx.config();\n final var awsAccessKeyId = config.get(\"awsAccessKeyId\");\n final var awsSecretAccessKey = config.get(\"awsSecretAccessKey\");\n final var current = AwsFunctions.getRegion();\n\n var s3Backups = new RaftSnapshotAgentConfig(\"s3Backups\", RaftSnapshotAgentConfigArgs.builder()\n .name(\"s3\")\n .intervalSeconds(86400)\n .retain(7)\n .pathPrefix(\"/path/in/bucket\")\n .storageType(\"aws-s3\")\n .awsS3Bucket(\"my-bucket\")\n .awsS3Region(current.applyValue(getRegionResult -\u003e getRegionResult.name()))\n .awsAccessKeyId(awsAccessKeyId)\n .awsSecretAccessKey(awsSecretAccessKey)\n .awsS3EnableKms(true)\n .build());\n\n }\n}\n```\n```yaml\nconfiguration:\n awsAccessKeyId:\n type: dynamic\n awsSecretAccessKey:\n type: dynamic\nresources:\n s3Backups:\n type: vault:RaftSnapshotAgentConfig\n name: s3_backups\n properties:\n name: s3\n intervalSeconds: 86400 # 24h\n retain: 7\n pathPrefix: /path/in/bucket\n storageType: aws-s3\n awsS3Bucket: my-bucket\n awsS3Region: ${current.name}\n awsAccessKeyId: ${awsAccessKeyId}\n awsSecretAccessKey: ${awsSecretAccessKey}\n awsS3EnableKms: true\nvariables:\n current:\n fn::invoke:\n Function: aws:getRegion\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Azure BLOB\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new pulumi.Config();\nconst azureAccountName = config.requireObject(\"azureAccountName\");\nconst azureAccountKey = config.requireObject(\"azureAccountKey\");\nconst azureBackups = new vault.RaftSnapshotAgentConfig(\"azure_backups\", {\n name: \"azure_backup\",\n intervalSeconds: 86400,\n retain: 7,\n pathPrefix: \"/\",\n storageType: \"azure-blob\",\n azureContainerName: \"vault-blob\",\n azureAccountName: azureAccountName,\n azureAccountKey: azureAccountKey,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nconfig = pulumi.Config()\nazure_account_name = config.require_object(\"azureAccountName\")\nazure_account_key = config.require_object(\"azureAccountKey\")\nazure_backups = vault.RaftSnapshotAgentConfig(\"azure_backups\",\n name=\"azure_backup\",\n interval_seconds=86400,\n retain=7,\n path_prefix=\"/\",\n storage_type=\"azure-blob\",\n azure_container_name=\"vault-blob\",\n azure_account_name=azure_account_name,\n azure_account_key=azure_account_key)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Config();\n var azureAccountName = config.RequireObject\u003cdynamic\u003e(\"azureAccountName\");\n var azureAccountKey = config.RequireObject\u003cdynamic\u003e(\"azureAccountKey\");\n var azureBackups = new Vault.RaftSnapshotAgentConfig(\"azure_backups\", new()\n {\n Name = \"azure_backup\",\n IntervalSeconds = 86400,\n Retain = 7,\n PathPrefix = \"/\",\n StorageType = \"azure-blob\",\n AzureContainerName = \"vault-blob\",\n AzureAccountName = azureAccountName,\n AzureAccountKey = azureAccountKey,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi/config\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcfg := config.New(ctx, \"\")\n\t\tazureAccountName := cfg.RequireObject(\"azureAccountName\")\n\t\tazureAccountKey := cfg.RequireObject(\"azureAccountKey\")\n\t\t_, err := vault.NewRaftSnapshotAgentConfig(ctx, \"azure_backups\", \u0026vault.RaftSnapshotAgentConfigArgs{\n\t\t\tName: pulumi.String(\"azure_backup\"),\n\t\t\tIntervalSeconds: pulumi.Int(86400),\n\t\t\tRetain: pulumi.Int(7),\n\t\t\tPathPrefix: pulumi.String(\"/\"),\n\t\t\tStorageType: pulumi.String(\"azure-blob\"),\n\t\t\tAzureContainerName: pulumi.String(\"vault-blob\"),\n\t\t\tAzureAccountName: pulumi.Any(azureAccountName),\n\t\t\tAzureAccountKey: pulumi.Any(azureAccountKey),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.RaftSnapshotAgentConfig;\nimport com.pulumi.vault.RaftSnapshotAgentConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var config = ctx.config();\n final var azureAccountName = config.get(\"azureAccountName\");\n final var azureAccountKey = config.get(\"azureAccountKey\");\n var azureBackups = new RaftSnapshotAgentConfig(\"azureBackups\", RaftSnapshotAgentConfigArgs.builder()\n .name(\"azure_backup\")\n .intervalSeconds(86400)\n .retain(7)\n .pathPrefix(\"/\")\n .storageType(\"azure-blob\")\n .azureContainerName(\"vault-blob\")\n .azureAccountName(azureAccountName)\n .azureAccountKey(azureAccountKey)\n .build());\n\n }\n}\n```\n```yaml\nconfiguration:\n azureAccountName:\n type: dynamic\n azureAccountKey:\n type: dynamic\nresources:\n azureBackups:\n type: vault:RaftSnapshotAgentConfig\n name: azure_backups\n properties:\n name: azure_backup\n intervalSeconds: 86400 # 24h\n retain: 7\n pathPrefix: /\n storageType: azure-blob\n azureContainerName: vault-blob\n azureAccountName: ${azureAccountName}\n azureAccountKey: ${azureAccountKey}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRaft Snapshot Agent Configurations can be imported using the `name`, e.g.\n\n```sh\n$ pulumi import vault:index/raftSnapshotAgentConfig:RaftSnapshotAgentConfig local local\n```\n", + "description": "## Example Usage\n\n### Local Storage\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst localBackups = new vault.RaftSnapshotAgentConfig(\"local_backups\", {\n name: \"local\",\n intervalSeconds: 86400,\n retain: 7,\n pathPrefix: \"/opt/vault/snapshots/\",\n storageType: \"local\",\n localMaxSpace: 10000000,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nlocal_backups = vault.RaftSnapshotAgentConfig(\"local_backups\",\n name=\"local\",\n interval_seconds=86400,\n retain=7,\n path_prefix=\"/opt/vault/snapshots/\",\n storage_type=\"local\",\n local_max_space=10000000)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var localBackups = new Vault.RaftSnapshotAgentConfig(\"local_backups\", new()\n {\n Name = \"local\",\n IntervalSeconds = 86400,\n Retain = 7,\n PathPrefix = \"/opt/vault/snapshots/\",\n StorageType = \"local\",\n LocalMaxSpace = 10000000,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.NewRaftSnapshotAgentConfig(ctx, \"local_backups\", \u0026vault.RaftSnapshotAgentConfigArgs{\n\t\t\tName: pulumi.String(\"local\"),\n\t\t\tIntervalSeconds: pulumi.Int(86400),\n\t\t\tRetain: pulumi.Int(7),\n\t\t\tPathPrefix: pulumi.String(\"/opt/vault/snapshots/\"),\n\t\t\tStorageType: pulumi.String(\"local\"),\n\t\t\tLocalMaxSpace: pulumi.Int(10000000),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.RaftSnapshotAgentConfig;\nimport com.pulumi.vault.RaftSnapshotAgentConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var localBackups = new RaftSnapshotAgentConfig(\"localBackups\", RaftSnapshotAgentConfigArgs.builder()\n .name(\"local\")\n .intervalSeconds(86400)\n .retain(7)\n .pathPrefix(\"/opt/vault/snapshots/\")\n .storageType(\"local\")\n .localMaxSpace(10000000)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n localBackups:\n type: vault:RaftSnapshotAgentConfig\n name: local_backups\n properties:\n name: local\n intervalSeconds: 86400 # 24h\n retain: 7\n pathPrefix: /opt/vault/snapshots/\n storageType: local\n localMaxSpace: 1e+07\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### AWS S3\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as aws from \"@pulumi/aws\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new pulumi.Config();\nconst awsAccessKeyId = config.requireObject(\"awsAccessKeyId\");\nconst awsSecretAccessKey = config.requireObject(\"awsSecretAccessKey\");\nconst current = aws.getRegion({});\nconst s3Backups = new vault.RaftSnapshotAgentConfig(\"s3_backups\", {\n name: \"s3\",\n intervalSeconds: 86400,\n retain: 7,\n pathPrefix: \"/path/in/bucket\",\n storageType: \"aws-s3\",\n awsS3Bucket: \"my-bucket\",\n awsS3Region: current.then(current =\u003e current.name),\n awsAccessKeyId: awsAccessKeyId,\n awsSecretAccessKey: awsSecretAccessKey,\n awsS3EnableKms: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_aws as aws\nimport pulumi_vault as vault\n\nconfig = pulumi.Config()\naws_access_key_id = config.require_object(\"awsAccessKeyId\")\naws_secret_access_key = config.require_object(\"awsSecretAccessKey\")\ncurrent = aws.get_region()\ns3_backups = vault.RaftSnapshotAgentConfig(\"s3_backups\",\n name=\"s3\",\n interval_seconds=86400,\n retain=7,\n path_prefix=\"/path/in/bucket\",\n storage_type=\"aws-s3\",\n aws_s3_bucket=\"my-bucket\",\n aws_s3_region=current.name,\n aws_access_key_id=aws_access_key_id,\n aws_secret_access_key=aws_secret_access_key,\n aws_s3_enable_kms=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Aws = Pulumi.Aws;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Config();\n var awsAccessKeyId = config.RequireObject\u003cdynamic\u003e(\"awsAccessKeyId\");\n var awsSecretAccessKey = config.RequireObject\u003cdynamic\u003e(\"awsSecretAccessKey\");\n var current = Aws.GetRegion.Invoke();\n\n var s3Backups = new Vault.RaftSnapshotAgentConfig(\"s3_backups\", new()\n {\n Name = \"s3\",\n IntervalSeconds = 86400,\n Retain = 7,\n PathPrefix = \"/path/in/bucket\",\n StorageType = \"aws-s3\",\n AwsS3Bucket = \"my-bucket\",\n AwsS3Region = current.Apply(getRegionResult =\u003e getRegionResult.Name),\n AwsAccessKeyId = awsAccessKeyId,\n AwsSecretAccessKey = awsSecretAccessKey,\n AwsS3EnableKms = true,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-aws/sdk/v5/go/aws\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi/config\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcfg := config.New(ctx, \"\")\n\t\tawsAccessKeyId := cfg.RequireObject(\"awsAccessKeyId\")\n\t\tawsSecretAccessKey := cfg.RequireObject(\"awsSecretAccessKey\")\n\t\tcurrent, err := aws.GetRegion(ctx, \u0026aws.GetRegionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = vault.NewRaftSnapshotAgentConfig(ctx, \"s3_backups\", \u0026vault.RaftSnapshotAgentConfigArgs{\n\t\t\tName: pulumi.String(\"s3\"),\n\t\t\tIntervalSeconds: pulumi.Int(86400),\n\t\t\tRetain: pulumi.Int(7),\n\t\t\tPathPrefix: pulumi.String(\"/path/in/bucket\"),\n\t\t\tStorageType: pulumi.String(\"aws-s3\"),\n\t\t\tAwsS3Bucket: pulumi.String(\"my-bucket\"),\n\t\t\tAwsS3Region: pulumi.String(current.Name),\n\t\t\tAwsAccessKeyId: pulumi.Any(awsAccessKeyId),\n\t\t\tAwsSecretAccessKey: pulumi.Any(awsSecretAccessKey),\n\t\t\tAwsS3EnableKms: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.aws.AwsFunctions;\nimport com.pulumi.aws.inputs.GetRegionArgs;\nimport com.pulumi.vault.RaftSnapshotAgentConfig;\nimport com.pulumi.vault.RaftSnapshotAgentConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var config = ctx.config();\n final var awsAccessKeyId = config.get(\"awsAccessKeyId\");\n final var awsSecretAccessKey = config.get(\"awsSecretAccessKey\");\n final var current = AwsFunctions.getRegion();\n\n var s3Backups = new RaftSnapshotAgentConfig(\"s3Backups\", RaftSnapshotAgentConfigArgs.builder()\n .name(\"s3\")\n .intervalSeconds(86400)\n .retain(7)\n .pathPrefix(\"/path/in/bucket\")\n .storageType(\"aws-s3\")\n .awsS3Bucket(\"my-bucket\")\n .awsS3Region(current.applyValue(getRegionResult -\u003e getRegionResult.name()))\n .awsAccessKeyId(awsAccessKeyId)\n .awsSecretAccessKey(awsSecretAccessKey)\n .awsS3EnableKms(true)\n .build());\n\n }\n}\n```\n```yaml\nconfiguration:\n awsAccessKeyId:\n type: dynamic\n awsSecretAccessKey:\n type: dynamic\nresources:\n s3Backups:\n type: vault:RaftSnapshotAgentConfig\n name: s3_backups\n properties:\n name: s3\n intervalSeconds: 86400 # 24h\n retain: 7\n pathPrefix: /path/in/bucket\n storageType: aws-s3\n awsS3Bucket: my-bucket\n awsS3Region: ${current.name}\n awsAccessKeyId: ${awsAccessKeyId}\n awsSecretAccessKey: ${awsSecretAccessKey}\n awsS3EnableKms: true\nvariables:\n current:\n fn::invoke:\n function: aws:getRegion\n arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Azure BLOB\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new pulumi.Config();\nconst azureAccountName = config.requireObject(\"azureAccountName\");\nconst azureAccountKey = config.requireObject(\"azureAccountKey\");\nconst azureBackups = new vault.RaftSnapshotAgentConfig(\"azure_backups\", {\n name: \"azure_backup\",\n intervalSeconds: 86400,\n retain: 7,\n pathPrefix: \"/\",\n storageType: \"azure-blob\",\n azureContainerName: \"vault-blob\",\n azureAccountName: azureAccountName,\n azureAccountKey: azureAccountKey,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nconfig = pulumi.Config()\nazure_account_name = config.require_object(\"azureAccountName\")\nazure_account_key = config.require_object(\"azureAccountKey\")\nazure_backups = vault.RaftSnapshotAgentConfig(\"azure_backups\",\n name=\"azure_backup\",\n interval_seconds=86400,\n retain=7,\n path_prefix=\"/\",\n storage_type=\"azure-blob\",\n azure_container_name=\"vault-blob\",\n azure_account_name=azure_account_name,\n azure_account_key=azure_account_key)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Config();\n var azureAccountName = config.RequireObject\u003cdynamic\u003e(\"azureAccountName\");\n var azureAccountKey = config.RequireObject\u003cdynamic\u003e(\"azureAccountKey\");\n var azureBackups = new Vault.RaftSnapshotAgentConfig(\"azure_backups\", new()\n {\n Name = \"azure_backup\",\n IntervalSeconds = 86400,\n Retain = 7,\n PathPrefix = \"/\",\n StorageType = \"azure-blob\",\n AzureContainerName = \"vault-blob\",\n AzureAccountName = azureAccountName,\n AzureAccountKey = azureAccountKey,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi/config\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcfg := config.New(ctx, \"\")\n\t\tazureAccountName := cfg.RequireObject(\"azureAccountName\")\n\t\tazureAccountKey := cfg.RequireObject(\"azureAccountKey\")\n\t\t_, err := vault.NewRaftSnapshotAgentConfig(ctx, \"azure_backups\", \u0026vault.RaftSnapshotAgentConfigArgs{\n\t\t\tName: pulumi.String(\"azure_backup\"),\n\t\t\tIntervalSeconds: pulumi.Int(86400),\n\t\t\tRetain: pulumi.Int(7),\n\t\t\tPathPrefix: pulumi.String(\"/\"),\n\t\t\tStorageType: pulumi.String(\"azure-blob\"),\n\t\t\tAzureContainerName: pulumi.String(\"vault-blob\"),\n\t\t\tAzureAccountName: pulumi.Any(azureAccountName),\n\t\t\tAzureAccountKey: pulumi.Any(azureAccountKey),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.RaftSnapshotAgentConfig;\nimport com.pulumi.vault.RaftSnapshotAgentConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var config = ctx.config();\n final var azureAccountName = config.get(\"azureAccountName\");\n final var azureAccountKey = config.get(\"azureAccountKey\");\n var azureBackups = new RaftSnapshotAgentConfig(\"azureBackups\", RaftSnapshotAgentConfigArgs.builder()\n .name(\"azure_backup\")\n .intervalSeconds(86400)\n .retain(7)\n .pathPrefix(\"/\")\n .storageType(\"azure-blob\")\n .azureContainerName(\"vault-blob\")\n .azureAccountName(azureAccountName)\n .azureAccountKey(azureAccountKey)\n .build());\n\n }\n}\n```\n```yaml\nconfiguration:\n azureAccountName:\n type: dynamic\n azureAccountKey:\n type: dynamic\nresources:\n azureBackups:\n type: vault:RaftSnapshotAgentConfig\n name: azure_backups\n properties:\n name: azure_backup\n intervalSeconds: 86400 # 24h\n retain: 7\n pathPrefix: /\n storageType: azure-blob\n azureContainerName: vault-blob\n azureAccountName: ${azureAccountName}\n azureAccountKey: ${azureAccountKey}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRaft Snapshot Agent Configurations can be imported using the `name`, e.g.\n\n```sh\n$ pulumi import vault:index/raftSnapshotAgentConfig:RaftSnapshotAgentConfig local local\n```\n", "properties": { "awsAccessKeyId": { "type": "string", @@ -21054,7 +21054,7 @@ } }, "vault:kubernetes/secretBackend:SecretBackend": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new vault.kubernetes.SecretBackend(\"config\", {\n path: \"kubernetes\",\n description: \"kubernetes secrets engine description\",\n defaultLeaseTtlSeconds: 43200,\n maxLeaseTtlSeconds: 86400,\n kubernetesHost: \"https://127.0.0.1:61233\",\n kubernetesCaCert: std.file({\n input: \"/path/to/cert\",\n }).then(invoke =\u003e invoke.result),\n serviceAccountJwt: std.file({\n input: \"/path/to/token\",\n }).then(invoke =\u003e invoke.result),\n disableLocalCaJwt: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nconfig = vault.kubernetes.SecretBackend(\"config\",\n path=\"kubernetes\",\n description=\"kubernetes secrets engine description\",\n default_lease_ttl_seconds=43200,\n max_lease_ttl_seconds=86400,\n kubernetes_host=\"https://127.0.0.1:61233\",\n kubernetes_ca_cert=std.file(input=\"/path/to/cert\").result,\n service_account_jwt=std.file(input=\"/path/to/token\").result,\n disable_local_ca_jwt=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Vault.Kubernetes.SecretBackend(\"config\", new()\n {\n Path = \"kubernetes\",\n Description = \"kubernetes secrets engine description\",\n DefaultLeaseTtlSeconds = 43200,\n MaxLeaseTtlSeconds = 86400,\n KubernetesHost = \"https://127.0.0.1:61233\",\n KubernetesCaCert = Std.File.Invoke(new()\n {\n Input = \"/path/to/cert\",\n }).Apply(invoke =\u003e invoke.Result),\n ServiceAccountJwt = Std.File.Invoke(new()\n {\n Input = \"/path/to/token\",\n }).Apply(invoke =\u003e invoke.Result),\n DisableLocalCaJwt = false,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/cert\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile1, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/token\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kubernetes.NewSecretBackend(ctx, \"config\", \u0026kubernetes.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"kubernetes\"),\n\t\t\tDescription: pulumi.String(\"kubernetes secrets engine description\"),\n\t\t\tDefaultLeaseTtlSeconds: pulumi.Int(43200),\n\t\t\tMaxLeaseTtlSeconds: pulumi.Int(86400),\n\t\t\tKubernetesHost: pulumi.String(\"https://127.0.0.1:61233\"),\n\t\t\tKubernetesCaCert: pulumi.String(invokeFile.Result),\n\t\t\tServiceAccountJwt: pulumi.String(invokeFile1.Result),\n\t\t\tDisableLocalCaJwt: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.kubernetes.SecretBackend;\nimport com.pulumi.vault.kubernetes.SecretBackendArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var config = new SecretBackend(\"config\", SecretBackendArgs.builder()\n .path(\"kubernetes\")\n .description(\"kubernetes secrets engine description\")\n .defaultLeaseTtlSeconds(43200)\n .maxLeaseTtlSeconds(86400)\n .kubernetesHost(\"https://127.0.0.1:61233\")\n .kubernetesCaCert(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/cert\")\n .build()).result())\n .serviceAccountJwt(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/token\")\n .build()).result())\n .disableLocalCaJwt(false)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n config:\n type: vault:kubernetes:SecretBackend\n properties:\n path: kubernetes\n description: kubernetes secrets engine description\n defaultLeaseTtlSeconds: 43200\n maxLeaseTtlSeconds: 86400\n kubernetesHost: https://127.0.0.1:61233\n kubernetesCaCert:\n fn::invoke:\n Function: std:file\n Arguments:\n input: /path/to/cert\n Return: result\n serviceAccountJwt:\n fn::invoke:\n Function: std:file\n Arguments:\n input: /path/to/token\n Return: result\n disableLocalCaJwt: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Kubernetes secret backend can be imported using its `path` e.g.\n\n```sh\n$ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes\n```\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new vault.kubernetes.SecretBackend(\"config\", {\n path: \"kubernetes\",\n description: \"kubernetes secrets engine description\",\n defaultLeaseTtlSeconds: 43200,\n maxLeaseTtlSeconds: 86400,\n kubernetesHost: \"https://127.0.0.1:61233\",\n kubernetesCaCert: std.file({\n input: \"/path/to/cert\",\n }).then(invoke =\u003e invoke.result),\n serviceAccountJwt: std.file({\n input: \"/path/to/token\",\n }).then(invoke =\u003e invoke.result),\n disableLocalCaJwt: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nconfig = vault.kubernetes.SecretBackend(\"config\",\n path=\"kubernetes\",\n description=\"kubernetes secrets engine description\",\n default_lease_ttl_seconds=43200,\n max_lease_ttl_seconds=86400,\n kubernetes_host=\"https://127.0.0.1:61233\",\n kubernetes_ca_cert=std.file(input=\"/path/to/cert\").result,\n service_account_jwt=std.file(input=\"/path/to/token\").result,\n disable_local_ca_jwt=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Vault.Kubernetes.SecretBackend(\"config\", new()\n {\n Path = \"kubernetes\",\n Description = \"kubernetes secrets engine description\",\n DefaultLeaseTtlSeconds = 43200,\n MaxLeaseTtlSeconds = 86400,\n KubernetesHost = \"https://127.0.0.1:61233\",\n KubernetesCaCert = Std.File.Invoke(new()\n {\n Input = \"/path/to/cert\",\n }).Apply(invoke =\u003e invoke.Result),\n ServiceAccountJwt = Std.File.Invoke(new()\n {\n Input = \"/path/to/token\",\n }).Apply(invoke =\u003e invoke.Result),\n DisableLocalCaJwt = false,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/cert\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile1, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/token\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kubernetes.NewSecretBackend(ctx, \"config\", \u0026kubernetes.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"kubernetes\"),\n\t\t\tDescription: pulumi.String(\"kubernetes secrets engine description\"),\n\t\t\tDefaultLeaseTtlSeconds: pulumi.Int(43200),\n\t\t\tMaxLeaseTtlSeconds: pulumi.Int(86400),\n\t\t\tKubernetesHost: pulumi.String(\"https://127.0.0.1:61233\"),\n\t\t\tKubernetesCaCert: pulumi.String(invokeFile.Result),\n\t\t\tServiceAccountJwt: pulumi.String(invokeFile1.Result),\n\t\t\tDisableLocalCaJwt: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.kubernetes.SecretBackend;\nimport com.pulumi.vault.kubernetes.SecretBackendArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var config = new SecretBackend(\"config\", SecretBackendArgs.builder()\n .path(\"kubernetes\")\n .description(\"kubernetes secrets engine description\")\n .defaultLeaseTtlSeconds(43200)\n .maxLeaseTtlSeconds(86400)\n .kubernetesHost(\"https://127.0.0.1:61233\")\n .kubernetesCaCert(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/cert\")\n .build()).result())\n .serviceAccountJwt(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/token\")\n .build()).result())\n .disableLocalCaJwt(false)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n config:\n type: vault:kubernetes:SecretBackend\n properties:\n path: kubernetes\n description: kubernetes secrets engine description\n defaultLeaseTtlSeconds: 43200\n maxLeaseTtlSeconds: 86400\n kubernetesHost: https://127.0.0.1:61233\n kubernetesCaCert:\n fn::invoke:\n function: std:file\n arguments:\n input: /path/to/cert\n return: result\n serviceAccountJwt:\n fn::invoke:\n function: std:file\n arguments:\n input: /path/to/token\n return: result\n disableLocalCaJwt: false\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Kubernetes secret backend can be imported using its `path` e.g.\n\n```sh\n$ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes\n```\n", "properties": { "accessor": { "type": "string", @@ -21425,7 +21425,7 @@ } }, "vault:kubernetes/secretBackendRole:SecretBackendRole": { - "description": "## Example Usage\n\nExample using `service_account_name` mode:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new vault.kubernetes.SecretBackend(\"config\", {\n path: \"kubernetes\",\n description: \"kubernetes secrets engine description\",\n kubernetesHost: \"https://127.0.0.1:61233\",\n kubernetesCaCert: std.file({\n input: \"/path/to/cert\",\n }).then(invoke =\u003e invoke.result),\n serviceAccountJwt: std.file({\n input: \"/path/to/token\",\n }).then(invoke =\u003e invoke.result),\n disableLocalCaJwt: false,\n});\nconst sa_example = new vault.kubernetes.SecretBackendRole(\"sa-example\", {\n backend: config.path,\n name: \"service-account-name-role\",\n allowedKubernetesNamespaces: [\"*\"],\n tokenMaxTtl: 43200,\n tokenDefaultTtl: 21600,\n serviceAccountName: \"test-service-account-with-generated-token\",\n extraLabels: {\n id: \"abc123\",\n name: \"some_name\",\n },\n extraAnnotations: {\n env: \"development\",\n location: \"earth\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nconfig = vault.kubernetes.SecretBackend(\"config\",\n path=\"kubernetes\",\n description=\"kubernetes secrets engine description\",\n kubernetes_host=\"https://127.0.0.1:61233\",\n kubernetes_ca_cert=std.file(input=\"/path/to/cert\").result,\n service_account_jwt=std.file(input=\"/path/to/token\").result,\n disable_local_ca_jwt=False)\nsa_example = vault.kubernetes.SecretBackendRole(\"sa-example\",\n backend=config.path,\n name=\"service-account-name-role\",\n allowed_kubernetes_namespaces=[\"*\"],\n token_max_ttl=43200,\n token_default_ttl=21600,\n service_account_name=\"test-service-account-with-generated-token\",\n extra_labels={\n \"id\": \"abc123\",\n \"name\": \"some_name\",\n },\n extra_annotations={\n \"env\": \"development\",\n \"location\": \"earth\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Vault.Kubernetes.SecretBackend(\"config\", new()\n {\n Path = \"kubernetes\",\n Description = \"kubernetes secrets engine description\",\n KubernetesHost = \"https://127.0.0.1:61233\",\n KubernetesCaCert = Std.File.Invoke(new()\n {\n Input = \"/path/to/cert\",\n }).Apply(invoke =\u003e invoke.Result),\n ServiceAccountJwt = Std.File.Invoke(new()\n {\n Input = \"/path/to/token\",\n }).Apply(invoke =\u003e invoke.Result),\n DisableLocalCaJwt = false,\n });\n\n var sa_example = new Vault.Kubernetes.SecretBackendRole(\"sa-example\", new()\n {\n Backend = config.Path,\n Name = \"service-account-name-role\",\n AllowedKubernetesNamespaces = new[]\n {\n \"*\",\n },\n TokenMaxTtl = 43200,\n TokenDefaultTtl = 21600,\n ServiceAccountName = \"test-service-account-with-generated-token\",\n ExtraLabels = \n {\n { \"id\", \"abc123\" },\n { \"name\", \"some_name\" },\n },\n ExtraAnnotations = \n {\n { \"env\", \"development\" },\n { \"location\", \"earth\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/cert\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile1, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/token\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfig, err := kubernetes.NewSecretBackend(ctx, \"config\", \u0026kubernetes.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"kubernetes\"),\n\t\t\tDescription: pulumi.String(\"kubernetes secrets engine description\"),\n\t\t\tKubernetesHost: pulumi.String(\"https://127.0.0.1:61233\"),\n\t\t\tKubernetesCaCert: pulumi.String(invokeFile.Result),\n\t\t\tServiceAccountJwt: pulumi.String(invokeFile1.Result),\n\t\t\tDisableLocalCaJwt: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kubernetes.NewSecretBackendRole(ctx, \"sa-example\", \u0026kubernetes.SecretBackendRoleArgs{\n\t\t\tBackend: config.Path,\n\t\t\tName: pulumi.String(\"service-account-name-role\"),\n\t\t\tAllowedKubernetesNamespaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"*\"),\n\t\t\t},\n\t\t\tTokenMaxTtl: pulumi.Int(43200),\n\t\t\tTokenDefaultTtl: pulumi.Int(21600),\n\t\t\tServiceAccountName: pulumi.String(\"test-service-account-with-generated-token\"),\n\t\t\tExtraLabels: pulumi.StringMap{\n\t\t\t\t\"id\": pulumi.String(\"abc123\"),\n\t\t\t\t\"name\": pulumi.String(\"some_name\"),\n\t\t\t},\n\t\t\tExtraAnnotations: pulumi.StringMap{\n\t\t\t\t\"env\": pulumi.String(\"development\"),\n\t\t\t\t\"location\": pulumi.String(\"earth\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.kubernetes.SecretBackend;\nimport com.pulumi.vault.kubernetes.SecretBackendArgs;\nimport com.pulumi.vault.kubernetes.SecretBackendRole;\nimport com.pulumi.vault.kubernetes.SecretBackendRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var config = new SecretBackend(\"config\", SecretBackendArgs.builder()\n .path(\"kubernetes\")\n .description(\"kubernetes secrets engine description\")\n .kubernetesHost(\"https://127.0.0.1:61233\")\n .kubernetesCaCert(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/cert\")\n .build()).result())\n .serviceAccountJwt(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/token\")\n .build()).result())\n .disableLocalCaJwt(false)\n .build());\n\n var sa_example = new SecretBackendRole(\"sa-example\", SecretBackendRoleArgs.builder()\n .backend(config.path())\n .name(\"service-account-name-role\")\n .allowedKubernetesNamespaces(\"*\")\n .tokenMaxTtl(43200)\n .tokenDefaultTtl(21600)\n .serviceAccountName(\"test-service-account-with-generated-token\")\n .extraLabels(Map.ofEntries(\n Map.entry(\"id\", \"abc123\"),\n Map.entry(\"name\", \"some_name\")\n ))\n .extraAnnotations(Map.ofEntries(\n Map.entry(\"env\", \"development\"),\n Map.entry(\"location\", \"earth\")\n ))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n config:\n type: vault:kubernetes:SecretBackend\n properties:\n path: kubernetes\n description: kubernetes secrets engine description\n kubernetesHost: https://127.0.0.1:61233\n kubernetesCaCert:\n fn::invoke:\n Function: std:file\n Arguments:\n input: /path/to/cert\n Return: result\n serviceAccountJwt:\n fn::invoke:\n Function: std:file\n Arguments:\n input: /path/to/token\n Return: result\n disableLocalCaJwt: false\n sa-example:\n type: vault:kubernetes:SecretBackendRole\n properties:\n backend: ${config.path}\n name: service-account-name-role\n allowedKubernetesNamespaces:\n - '*'\n tokenMaxTtl: 43200\n tokenDefaultTtl: 21600\n serviceAccountName: test-service-account-with-generated-token\n extraLabels:\n id: abc123\n name: some_name\n extraAnnotations:\n env: development\n location: earth\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\nExample using `kubernetes_role_name` mode:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new vault.kubernetes.SecretBackend(\"config\", {\n path: \"kubernetes\",\n description: \"kubernetes secrets engine description\",\n kubernetesHost: \"https://127.0.0.1:61233\",\n kubernetesCaCert: std.file({\n input: \"/path/to/cert\",\n }).then(invoke =\u003e invoke.result),\n serviceAccountJwt: std.file({\n input: \"/path/to/token\",\n }).then(invoke =\u003e invoke.result),\n disableLocalCaJwt: false,\n});\nconst name_example = new vault.kubernetes.SecretBackendRole(\"name-example\", {\n backend: config.path,\n name: \"service-account-name-role\",\n allowedKubernetesNamespaces: [\"*\"],\n tokenMaxTtl: 43200,\n tokenDefaultTtl: 21600,\n kubernetesRoleName: \"vault-k8s-secrets-role\",\n extraLabels: {\n id: \"abc123\",\n name: \"some_name\",\n },\n extraAnnotations: {\n env: \"development\",\n location: \"earth\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nconfig = vault.kubernetes.SecretBackend(\"config\",\n path=\"kubernetes\",\n description=\"kubernetes secrets engine description\",\n kubernetes_host=\"https://127.0.0.1:61233\",\n kubernetes_ca_cert=std.file(input=\"/path/to/cert\").result,\n service_account_jwt=std.file(input=\"/path/to/token\").result,\n disable_local_ca_jwt=False)\nname_example = vault.kubernetes.SecretBackendRole(\"name-example\",\n backend=config.path,\n name=\"service-account-name-role\",\n allowed_kubernetes_namespaces=[\"*\"],\n token_max_ttl=43200,\n token_default_ttl=21600,\n kubernetes_role_name=\"vault-k8s-secrets-role\",\n extra_labels={\n \"id\": \"abc123\",\n \"name\": \"some_name\",\n },\n extra_annotations={\n \"env\": \"development\",\n \"location\": \"earth\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Vault.Kubernetes.SecretBackend(\"config\", new()\n {\n Path = \"kubernetes\",\n Description = \"kubernetes secrets engine description\",\n KubernetesHost = \"https://127.0.0.1:61233\",\n KubernetesCaCert = Std.File.Invoke(new()\n {\n Input = \"/path/to/cert\",\n }).Apply(invoke =\u003e invoke.Result),\n ServiceAccountJwt = Std.File.Invoke(new()\n {\n Input = \"/path/to/token\",\n }).Apply(invoke =\u003e invoke.Result),\n DisableLocalCaJwt = false,\n });\n\n var name_example = new Vault.Kubernetes.SecretBackendRole(\"name-example\", new()\n {\n Backend = config.Path,\n Name = \"service-account-name-role\",\n AllowedKubernetesNamespaces = new[]\n {\n \"*\",\n },\n TokenMaxTtl = 43200,\n TokenDefaultTtl = 21600,\n KubernetesRoleName = \"vault-k8s-secrets-role\",\n ExtraLabels = \n {\n { \"id\", \"abc123\" },\n { \"name\", \"some_name\" },\n },\n ExtraAnnotations = \n {\n { \"env\", \"development\" },\n { \"location\", \"earth\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/cert\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile1, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/token\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfig, err := kubernetes.NewSecretBackend(ctx, \"config\", \u0026kubernetes.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"kubernetes\"),\n\t\t\tDescription: pulumi.String(\"kubernetes secrets engine description\"),\n\t\t\tKubernetesHost: pulumi.String(\"https://127.0.0.1:61233\"),\n\t\t\tKubernetesCaCert: pulumi.String(invokeFile.Result),\n\t\t\tServiceAccountJwt: pulumi.String(invokeFile1.Result),\n\t\t\tDisableLocalCaJwt: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kubernetes.NewSecretBackendRole(ctx, \"name-example\", \u0026kubernetes.SecretBackendRoleArgs{\n\t\t\tBackend: config.Path,\n\t\t\tName: pulumi.String(\"service-account-name-role\"),\n\t\t\tAllowedKubernetesNamespaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"*\"),\n\t\t\t},\n\t\t\tTokenMaxTtl: pulumi.Int(43200),\n\t\t\tTokenDefaultTtl: pulumi.Int(21600),\n\t\t\tKubernetesRoleName: pulumi.String(\"vault-k8s-secrets-role\"),\n\t\t\tExtraLabels: pulumi.StringMap{\n\t\t\t\t\"id\": pulumi.String(\"abc123\"),\n\t\t\t\t\"name\": pulumi.String(\"some_name\"),\n\t\t\t},\n\t\t\tExtraAnnotations: pulumi.StringMap{\n\t\t\t\t\"env\": pulumi.String(\"development\"),\n\t\t\t\t\"location\": pulumi.String(\"earth\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.kubernetes.SecretBackend;\nimport com.pulumi.vault.kubernetes.SecretBackendArgs;\nimport com.pulumi.vault.kubernetes.SecretBackendRole;\nimport com.pulumi.vault.kubernetes.SecretBackendRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var config = new SecretBackend(\"config\", SecretBackendArgs.builder()\n .path(\"kubernetes\")\n .description(\"kubernetes secrets engine description\")\n .kubernetesHost(\"https://127.0.0.1:61233\")\n .kubernetesCaCert(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/cert\")\n .build()).result())\n .serviceAccountJwt(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/token\")\n .build()).result())\n .disableLocalCaJwt(false)\n .build());\n\n var name_example = new SecretBackendRole(\"name-example\", SecretBackendRoleArgs.builder()\n .backend(config.path())\n .name(\"service-account-name-role\")\n .allowedKubernetesNamespaces(\"*\")\n .tokenMaxTtl(43200)\n .tokenDefaultTtl(21600)\n .kubernetesRoleName(\"vault-k8s-secrets-role\")\n .extraLabels(Map.ofEntries(\n Map.entry(\"id\", \"abc123\"),\n Map.entry(\"name\", \"some_name\")\n ))\n .extraAnnotations(Map.ofEntries(\n Map.entry(\"env\", \"development\"),\n Map.entry(\"location\", \"earth\")\n ))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n config:\n type: vault:kubernetes:SecretBackend\n properties:\n path: kubernetes\n description: kubernetes secrets engine description\n kubernetesHost: https://127.0.0.1:61233\n kubernetesCaCert:\n fn::invoke:\n Function: std:file\n Arguments:\n input: /path/to/cert\n Return: result\n serviceAccountJwt:\n fn::invoke:\n Function: std:file\n Arguments:\n input: /path/to/token\n Return: result\n disableLocalCaJwt: false\n name-example:\n type: vault:kubernetes:SecretBackendRole\n properties:\n backend: ${config.path}\n name: service-account-name-role\n allowedKubernetesNamespaces:\n - '*'\n tokenMaxTtl: 43200\n tokenDefaultTtl: 21600\n kubernetesRoleName: vault-k8s-secrets-role\n extraLabels:\n id: abc123\n name: some_name\n extraAnnotations:\n env: development\n location: earth\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\nExample using `generated_role_rules` mode:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new vault.kubernetes.SecretBackend(\"config\", {\n path: \"kubernetes\",\n description: \"kubernetes secrets engine description\",\n kubernetesHost: \"https://127.0.0.1:61233\",\n kubernetesCaCert: std.file({\n input: \"/path/to/cert\",\n }).then(invoke =\u003e invoke.result),\n serviceAccountJwt: std.file({\n input: \"/path/to/token\",\n }).then(invoke =\u003e invoke.result),\n disableLocalCaJwt: false,\n});\nconst rules_example = new vault.kubernetes.SecretBackendRole(\"rules-example\", {\n backend: config.path,\n name: \"service-account-name-role\",\n allowedKubernetesNamespaces: [\"*\"],\n tokenMaxTtl: 43200,\n tokenDefaultTtl: 21600,\n kubernetesRoleType: \"Role\",\n generatedRoleRules: `rules:\n- apiGroups: [\"\"]\n resources: [\"pods\"]\n verbs: [\"list\"]\n`,\n extraLabels: {\n id: \"abc123\",\n name: \"some_name\",\n },\n extraAnnotations: {\n env: \"development\",\n location: \"earth\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nconfig = vault.kubernetes.SecretBackend(\"config\",\n path=\"kubernetes\",\n description=\"kubernetes secrets engine description\",\n kubernetes_host=\"https://127.0.0.1:61233\",\n kubernetes_ca_cert=std.file(input=\"/path/to/cert\").result,\n service_account_jwt=std.file(input=\"/path/to/token\").result,\n disable_local_ca_jwt=False)\nrules_example = vault.kubernetes.SecretBackendRole(\"rules-example\",\n backend=config.path,\n name=\"service-account-name-role\",\n allowed_kubernetes_namespaces=[\"*\"],\n token_max_ttl=43200,\n token_default_ttl=21600,\n kubernetes_role_type=\"Role\",\n generated_role_rules=\"\"\"rules:\n- apiGroups: [\"\"]\n resources: [\"pods\"]\n verbs: [\"list\"]\n\"\"\",\n extra_labels={\n \"id\": \"abc123\",\n \"name\": \"some_name\",\n },\n extra_annotations={\n \"env\": \"development\",\n \"location\": \"earth\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Vault.Kubernetes.SecretBackend(\"config\", new()\n {\n Path = \"kubernetes\",\n Description = \"kubernetes secrets engine description\",\n KubernetesHost = \"https://127.0.0.1:61233\",\n KubernetesCaCert = Std.File.Invoke(new()\n {\n Input = \"/path/to/cert\",\n }).Apply(invoke =\u003e invoke.Result),\n ServiceAccountJwt = Std.File.Invoke(new()\n {\n Input = \"/path/to/token\",\n }).Apply(invoke =\u003e invoke.Result),\n DisableLocalCaJwt = false,\n });\n\n var rules_example = new Vault.Kubernetes.SecretBackendRole(\"rules-example\", new()\n {\n Backend = config.Path,\n Name = \"service-account-name-role\",\n AllowedKubernetesNamespaces = new[]\n {\n \"*\",\n },\n TokenMaxTtl = 43200,\n TokenDefaultTtl = 21600,\n KubernetesRoleType = \"Role\",\n GeneratedRoleRules = @\"rules:\n- apiGroups: [\"\"\"\"]\n resources: [\"\"pods\"\"]\n verbs: [\"\"list\"\"]\n\",\n ExtraLabels = \n {\n { \"id\", \"abc123\" },\n { \"name\", \"some_name\" },\n },\n ExtraAnnotations = \n {\n { \"env\", \"development\" },\n { \"location\", \"earth\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/cert\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile1, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/token\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfig, err := kubernetes.NewSecretBackend(ctx, \"config\", \u0026kubernetes.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"kubernetes\"),\n\t\t\tDescription: pulumi.String(\"kubernetes secrets engine description\"),\n\t\t\tKubernetesHost: pulumi.String(\"https://127.0.0.1:61233\"),\n\t\t\tKubernetesCaCert: pulumi.String(invokeFile.Result),\n\t\t\tServiceAccountJwt: pulumi.String(invokeFile1.Result),\n\t\t\tDisableLocalCaJwt: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kubernetes.NewSecretBackendRole(ctx, \"rules-example\", \u0026kubernetes.SecretBackendRoleArgs{\n\t\t\tBackend: config.Path,\n\t\t\tName: pulumi.String(\"service-account-name-role\"),\n\t\t\tAllowedKubernetesNamespaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"*\"),\n\t\t\t},\n\t\t\tTokenMaxTtl: pulumi.Int(43200),\n\t\t\tTokenDefaultTtl: pulumi.Int(21600),\n\t\t\tKubernetesRoleType: pulumi.String(\"Role\"),\n\t\t\tGeneratedRoleRules: pulumi.String(\"rules:\\n- apiGroups: [\\\"\\\"]\\n resources: [\\\"pods\\\"]\\n verbs: [\\\"list\\\"]\\n\"),\n\t\t\tExtraLabels: pulumi.StringMap{\n\t\t\t\t\"id\": pulumi.String(\"abc123\"),\n\t\t\t\t\"name\": pulumi.String(\"some_name\"),\n\t\t\t},\n\t\t\tExtraAnnotations: pulumi.StringMap{\n\t\t\t\t\"env\": pulumi.String(\"development\"),\n\t\t\t\t\"location\": pulumi.String(\"earth\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.kubernetes.SecretBackend;\nimport com.pulumi.vault.kubernetes.SecretBackendArgs;\nimport com.pulumi.vault.kubernetes.SecretBackendRole;\nimport com.pulumi.vault.kubernetes.SecretBackendRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var config = new SecretBackend(\"config\", SecretBackendArgs.builder()\n .path(\"kubernetes\")\n .description(\"kubernetes secrets engine description\")\n .kubernetesHost(\"https://127.0.0.1:61233\")\n .kubernetesCaCert(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/cert\")\n .build()).result())\n .serviceAccountJwt(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/token\")\n .build()).result())\n .disableLocalCaJwt(false)\n .build());\n\n var rules_example = new SecretBackendRole(\"rules-example\", SecretBackendRoleArgs.builder()\n .backend(config.path())\n .name(\"service-account-name-role\")\n .allowedKubernetesNamespaces(\"*\")\n .tokenMaxTtl(43200)\n .tokenDefaultTtl(21600)\n .kubernetesRoleType(\"Role\")\n .generatedRoleRules(\"\"\"\nrules:\n- apiGroups: [\"\"]\n resources: [\"pods\"]\n verbs: [\"list\"]\n \"\"\")\n .extraLabels(Map.ofEntries(\n Map.entry(\"id\", \"abc123\"),\n Map.entry(\"name\", \"some_name\")\n ))\n .extraAnnotations(Map.ofEntries(\n Map.entry(\"env\", \"development\"),\n Map.entry(\"location\", \"earth\")\n ))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n config:\n type: vault:kubernetes:SecretBackend\n properties:\n path: kubernetes\n description: kubernetes secrets engine description\n kubernetesHost: https://127.0.0.1:61233\n kubernetesCaCert:\n fn::invoke:\n Function: std:file\n Arguments:\n input: /path/to/cert\n Return: result\n serviceAccountJwt:\n fn::invoke:\n Function: std:file\n Arguments:\n input: /path/to/token\n Return: result\n disableLocalCaJwt: false\n rules-example:\n type: vault:kubernetes:SecretBackendRole\n properties:\n backend: ${config.path}\n name: service-account-name-role\n allowedKubernetesNamespaces:\n - '*'\n tokenMaxTtl: 43200\n tokenDefaultTtl: 21600\n kubernetesRoleType: Role\n generatedRoleRules: |\n rules:\n - apiGroups: [\"\"]\n resources: [\"pods\"]\n verbs: [\"list\"]\n extraLabels:\n id: abc123\n name: some_name\n extraAnnotations:\n env: development\n location: earth\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Kubernetes secret backend role can be imported using the full path to the role\n\nof the form: `\u003cbackend_path\u003e/roles/\u003crole_name\u003e` e.g.\n\n```sh\n$ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role\n```\n\n", + "description": "## Example Usage\n\nExample using `service_account_name` mode:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new vault.kubernetes.SecretBackend(\"config\", {\n path: \"kubernetes\",\n description: \"kubernetes secrets engine description\",\n kubernetesHost: \"https://127.0.0.1:61233\",\n kubernetesCaCert: std.file({\n input: \"/path/to/cert\",\n }).then(invoke =\u003e invoke.result),\n serviceAccountJwt: std.file({\n input: \"/path/to/token\",\n }).then(invoke =\u003e invoke.result),\n disableLocalCaJwt: false,\n});\nconst sa_example = new vault.kubernetes.SecretBackendRole(\"sa-example\", {\n backend: config.path,\n name: \"service-account-name-role\",\n allowedKubernetesNamespaces: [\"*\"],\n tokenMaxTtl: 43200,\n tokenDefaultTtl: 21600,\n serviceAccountName: \"test-service-account-with-generated-token\",\n extraLabels: {\n id: \"abc123\",\n name: \"some_name\",\n },\n extraAnnotations: {\n env: \"development\",\n location: \"earth\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nconfig = vault.kubernetes.SecretBackend(\"config\",\n path=\"kubernetes\",\n description=\"kubernetes secrets engine description\",\n kubernetes_host=\"https://127.0.0.1:61233\",\n kubernetes_ca_cert=std.file(input=\"/path/to/cert\").result,\n service_account_jwt=std.file(input=\"/path/to/token\").result,\n disable_local_ca_jwt=False)\nsa_example = vault.kubernetes.SecretBackendRole(\"sa-example\",\n backend=config.path,\n name=\"service-account-name-role\",\n allowed_kubernetes_namespaces=[\"*\"],\n token_max_ttl=43200,\n token_default_ttl=21600,\n service_account_name=\"test-service-account-with-generated-token\",\n extra_labels={\n \"id\": \"abc123\",\n \"name\": \"some_name\",\n },\n extra_annotations={\n \"env\": \"development\",\n \"location\": \"earth\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Vault.Kubernetes.SecretBackend(\"config\", new()\n {\n Path = \"kubernetes\",\n Description = \"kubernetes secrets engine description\",\n KubernetesHost = \"https://127.0.0.1:61233\",\n KubernetesCaCert = Std.File.Invoke(new()\n {\n Input = \"/path/to/cert\",\n }).Apply(invoke =\u003e invoke.Result),\n ServiceAccountJwt = Std.File.Invoke(new()\n {\n Input = \"/path/to/token\",\n }).Apply(invoke =\u003e invoke.Result),\n DisableLocalCaJwt = false,\n });\n\n var sa_example = new Vault.Kubernetes.SecretBackendRole(\"sa-example\", new()\n {\n Backend = config.Path,\n Name = \"service-account-name-role\",\n AllowedKubernetesNamespaces = new[]\n {\n \"*\",\n },\n TokenMaxTtl = 43200,\n TokenDefaultTtl = 21600,\n ServiceAccountName = \"test-service-account-with-generated-token\",\n ExtraLabels = \n {\n { \"id\", \"abc123\" },\n { \"name\", \"some_name\" },\n },\n ExtraAnnotations = \n {\n { \"env\", \"development\" },\n { \"location\", \"earth\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/cert\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile1, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/token\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfig, err := kubernetes.NewSecretBackend(ctx, \"config\", \u0026kubernetes.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"kubernetes\"),\n\t\t\tDescription: pulumi.String(\"kubernetes secrets engine description\"),\n\t\t\tKubernetesHost: pulumi.String(\"https://127.0.0.1:61233\"),\n\t\t\tKubernetesCaCert: pulumi.String(invokeFile.Result),\n\t\t\tServiceAccountJwt: pulumi.String(invokeFile1.Result),\n\t\t\tDisableLocalCaJwt: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kubernetes.NewSecretBackendRole(ctx, \"sa-example\", \u0026kubernetes.SecretBackendRoleArgs{\n\t\t\tBackend: config.Path,\n\t\t\tName: pulumi.String(\"service-account-name-role\"),\n\t\t\tAllowedKubernetesNamespaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"*\"),\n\t\t\t},\n\t\t\tTokenMaxTtl: pulumi.Int(43200),\n\t\t\tTokenDefaultTtl: pulumi.Int(21600),\n\t\t\tServiceAccountName: pulumi.String(\"test-service-account-with-generated-token\"),\n\t\t\tExtraLabels: pulumi.StringMap{\n\t\t\t\t\"id\": pulumi.String(\"abc123\"),\n\t\t\t\t\"name\": pulumi.String(\"some_name\"),\n\t\t\t},\n\t\t\tExtraAnnotations: pulumi.StringMap{\n\t\t\t\t\"env\": pulumi.String(\"development\"),\n\t\t\t\t\"location\": pulumi.String(\"earth\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.kubernetes.SecretBackend;\nimport com.pulumi.vault.kubernetes.SecretBackendArgs;\nimport com.pulumi.vault.kubernetes.SecretBackendRole;\nimport com.pulumi.vault.kubernetes.SecretBackendRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var config = new SecretBackend(\"config\", SecretBackendArgs.builder()\n .path(\"kubernetes\")\n .description(\"kubernetes secrets engine description\")\n .kubernetesHost(\"https://127.0.0.1:61233\")\n .kubernetesCaCert(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/cert\")\n .build()).result())\n .serviceAccountJwt(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/token\")\n .build()).result())\n .disableLocalCaJwt(false)\n .build());\n\n var sa_example = new SecretBackendRole(\"sa-example\", SecretBackendRoleArgs.builder()\n .backend(config.path())\n .name(\"service-account-name-role\")\n .allowedKubernetesNamespaces(\"*\")\n .tokenMaxTtl(43200)\n .tokenDefaultTtl(21600)\n .serviceAccountName(\"test-service-account-with-generated-token\")\n .extraLabels(Map.ofEntries(\n Map.entry(\"id\", \"abc123\"),\n Map.entry(\"name\", \"some_name\")\n ))\n .extraAnnotations(Map.ofEntries(\n Map.entry(\"env\", \"development\"),\n Map.entry(\"location\", \"earth\")\n ))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n config:\n type: vault:kubernetes:SecretBackend\n properties:\n path: kubernetes\n description: kubernetes secrets engine description\n kubernetesHost: https://127.0.0.1:61233\n kubernetesCaCert:\n fn::invoke:\n function: std:file\n arguments:\n input: /path/to/cert\n return: result\n serviceAccountJwt:\n fn::invoke:\n function: std:file\n arguments:\n input: /path/to/token\n return: result\n disableLocalCaJwt: false\n sa-example:\n type: vault:kubernetes:SecretBackendRole\n properties:\n backend: ${config.path}\n name: service-account-name-role\n allowedKubernetesNamespaces:\n - '*'\n tokenMaxTtl: 43200\n tokenDefaultTtl: 21600\n serviceAccountName: test-service-account-with-generated-token\n extraLabels:\n id: abc123\n name: some_name\n extraAnnotations:\n env: development\n location: earth\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\nExample using `kubernetes_role_name` mode:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new vault.kubernetes.SecretBackend(\"config\", {\n path: \"kubernetes\",\n description: \"kubernetes secrets engine description\",\n kubernetesHost: \"https://127.0.0.1:61233\",\n kubernetesCaCert: std.file({\n input: \"/path/to/cert\",\n }).then(invoke =\u003e invoke.result),\n serviceAccountJwt: std.file({\n input: \"/path/to/token\",\n }).then(invoke =\u003e invoke.result),\n disableLocalCaJwt: false,\n});\nconst name_example = new vault.kubernetes.SecretBackendRole(\"name-example\", {\n backend: config.path,\n name: \"service-account-name-role\",\n allowedKubernetesNamespaces: [\"*\"],\n tokenMaxTtl: 43200,\n tokenDefaultTtl: 21600,\n kubernetesRoleName: \"vault-k8s-secrets-role\",\n extraLabels: {\n id: \"abc123\",\n name: \"some_name\",\n },\n extraAnnotations: {\n env: \"development\",\n location: \"earth\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nconfig = vault.kubernetes.SecretBackend(\"config\",\n path=\"kubernetes\",\n description=\"kubernetes secrets engine description\",\n kubernetes_host=\"https://127.0.0.1:61233\",\n kubernetes_ca_cert=std.file(input=\"/path/to/cert\").result,\n service_account_jwt=std.file(input=\"/path/to/token\").result,\n disable_local_ca_jwt=False)\nname_example = vault.kubernetes.SecretBackendRole(\"name-example\",\n backend=config.path,\n name=\"service-account-name-role\",\n allowed_kubernetes_namespaces=[\"*\"],\n token_max_ttl=43200,\n token_default_ttl=21600,\n kubernetes_role_name=\"vault-k8s-secrets-role\",\n extra_labels={\n \"id\": \"abc123\",\n \"name\": \"some_name\",\n },\n extra_annotations={\n \"env\": \"development\",\n \"location\": \"earth\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Vault.Kubernetes.SecretBackend(\"config\", new()\n {\n Path = \"kubernetes\",\n Description = \"kubernetes secrets engine description\",\n KubernetesHost = \"https://127.0.0.1:61233\",\n KubernetesCaCert = Std.File.Invoke(new()\n {\n Input = \"/path/to/cert\",\n }).Apply(invoke =\u003e invoke.Result),\n ServiceAccountJwt = Std.File.Invoke(new()\n {\n Input = \"/path/to/token\",\n }).Apply(invoke =\u003e invoke.Result),\n DisableLocalCaJwt = false,\n });\n\n var name_example = new Vault.Kubernetes.SecretBackendRole(\"name-example\", new()\n {\n Backend = config.Path,\n Name = \"service-account-name-role\",\n AllowedKubernetesNamespaces = new[]\n {\n \"*\",\n },\n TokenMaxTtl = 43200,\n TokenDefaultTtl = 21600,\n KubernetesRoleName = \"vault-k8s-secrets-role\",\n ExtraLabels = \n {\n { \"id\", \"abc123\" },\n { \"name\", \"some_name\" },\n },\n ExtraAnnotations = \n {\n { \"env\", \"development\" },\n { \"location\", \"earth\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/cert\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile1, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/token\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfig, err := kubernetes.NewSecretBackend(ctx, \"config\", \u0026kubernetes.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"kubernetes\"),\n\t\t\tDescription: pulumi.String(\"kubernetes secrets engine description\"),\n\t\t\tKubernetesHost: pulumi.String(\"https://127.0.0.1:61233\"),\n\t\t\tKubernetesCaCert: pulumi.String(invokeFile.Result),\n\t\t\tServiceAccountJwt: pulumi.String(invokeFile1.Result),\n\t\t\tDisableLocalCaJwt: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kubernetes.NewSecretBackendRole(ctx, \"name-example\", \u0026kubernetes.SecretBackendRoleArgs{\n\t\t\tBackend: config.Path,\n\t\t\tName: pulumi.String(\"service-account-name-role\"),\n\t\t\tAllowedKubernetesNamespaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"*\"),\n\t\t\t},\n\t\t\tTokenMaxTtl: pulumi.Int(43200),\n\t\t\tTokenDefaultTtl: pulumi.Int(21600),\n\t\t\tKubernetesRoleName: pulumi.String(\"vault-k8s-secrets-role\"),\n\t\t\tExtraLabels: pulumi.StringMap{\n\t\t\t\t\"id\": pulumi.String(\"abc123\"),\n\t\t\t\t\"name\": pulumi.String(\"some_name\"),\n\t\t\t},\n\t\t\tExtraAnnotations: pulumi.StringMap{\n\t\t\t\t\"env\": pulumi.String(\"development\"),\n\t\t\t\t\"location\": pulumi.String(\"earth\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.kubernetes.SecretBackend;\nimport com.pulumi.vault.kubernetes.SecretBackendArgs;\nimport com.pulumi.vault.kubernetes.SecretBackendRole;\nimport com.pulumi.vault.kubernetes.SecretBackendRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var config = new SecretBackend(\"config\", SecretBackendArgs.builder()\n .path(\"kubernetes\")\n .description(\"kubernetes secrets engine description\")\n .kubernetesHost(\"https://127.0.0.1:61233\")\n .kubernetesCaCert(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/cert\")\n .build()).result())\n .serviceAccountJwt(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/token\")\n .build()).result())\n .disableLocalCaJwt(false)\n .build());\n\n var name_example = new SecretBackendRole(\"name-example\", SecretBackendRoleArgs.builder()\n .backend(config.path())\n .name(\"service-account-name-role\")\n .allowedKubernetesNamespaces(\"*\")\n .tokenMaxTtl(43200)\n .tokenDefaultTtl(21600)\n .kubernetesRoleName(\"vault-k8s-secrets-role\")\n .extraLabels(Map.ofEntries(\n Map.entry(\"id\", \"abc123\"),\n Map.entry(\"name\", \"some_name\")\n ))\n .extraAnnotations(Map.ofEntries(\n Map.entry(\"env\", \"development\"),\n Map.entry(\"location\", \"earth\")\n ))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n config:\n type: vault:kubernetes:SecretBackend\n properties:\n path: kubernetes\n description: kubernetes secrets engine description\n kubernetesHost: https://127.0.0.1:61233\n kubernetesCaCert:\n fn::invoke:\n function: std:file\n arguments:\n input: /path/to/cert\n return: result\n serviceAccountJwt:\n fn::invoke:\n function: std:file\n arguments:\n input: /path/to/token\n return: result\n disableLocalCaJwt: false\n name-example:\n type: vault:kubernetes:SecretBackendRole\n properties:\n backend: ${config.path}\n name: service-account-name-role\n allowedKubernetesNamespaces:\n - '*'\n tokenMaxTtl: 43200\n tokenDefaultTtl: 21600\n kubernetesRoleName: vault-k8s-secrets-role\n extraLabels:\n id: abc123\n name: some_name\n extraAnnotations:\n env: development\n location: earth\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\nExample using `generated_role_rules` mode:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new vault.kubernetes.SecretBackend(\"config\", {\n path: \"kubernetes\",\n description: \"kubernetes secrets engine description\",\n kubernetesHost: \"https://127.0.0.1:61233\",\n kubernetesCaCert: std.file({\n input: \"/path/to/cert\",\n }).then(invoke =\u003e invoke.result),\n serviceAccountJwt: std.file({\n input: \"/path/to/token\",\n }).then(invoke =\u003e invoke.result),\n disableLocalCaJwt: false,\n});\nconst rules_example = new vault.kubernetes.SecretBackendRole(\"rules-example\", {\n backend: config.path,\n name: \"service-account-name-role\",\n allowedKubernetesNamespaces: [\"*\"],\n tokenMaxTtl: 43200,\n tokenDefaultTtl: 21600,\n kubernetesRoleType: \"Role\",\n generatedRoleRules: `rules:\n- apiGroups: [\"\"]\n resources: [\"pods\"]\n verbs: [\"list\"]\n`,\n extraLabels: {\n id: \"abc123\",\n name: \"some_name\",\n },\n extraAnnotations: {\n env: \"development\",\n location: \"earth\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nconfig = vault.kubernetes.SecretBackend(\"config\",\n path=\"kubernetes\",\n description=\"kubernetes secrets engine description\",\n kubernetes_host=\"https://127.0.0.1:61233\",\n kubernetes_ca_cert=std.file(input=\"/path/to/cert\").result,\n service_account_jwt=std.file(input=\"/path/to/token\").result,\n disable_local_ca_jwt=False)\nrules_example = vault.kubernetes.SecretBackendRole(\"rules-example\",\n backend=config.path,\n name=\"service-account-name-role\",\n allowed_kubernetes_namespaces=[\"*\"],\n token_max_ttl=43200,\n token_default_ttl=21600,\n kubernetes_role_type=\"Role\",\n generated_role_rules=\"\"\"rules:\n- apiGroups: [\"\"]\n resources: [\"pods\"]\n verbs: [\"list\"]\n\"\"\",\n extra_labels={\n \"id\": \"abc123\",\n \"name\": \"some_name\",\n },\n extra_annotations={\n \"env\": \"development\",\n \"location\": \"earth\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Vault.Kubernetes.SecretBackend(\"config\", new()\n {\n Path = \"kubernetes\",\n Description = \"kubernetes secrets engine description\",\n KubernetesHost = \"https://127.0.0.1:61233\",\n KubernetesCaCert = Std.File.Invoke(new()\n {\n Input = \"/path/to/cert\",\n }).Apply(invoke =\u003e invoke.Result),\n ServiceAccountJwt = Std.File.Invoke(new()\n {\n Input = \"/path/to/token\",\n }).Apply(invoke =\u003e invoke.Result),\n DisableLocalCaJwt = false,\n });\n\n var rules_example = new Vault.Kubernetes.SecretBackendRole(\"rules-example\", new()\n {\n Backend = config.Path,\n Name = \"service-account-name-role\",\n AllowedKubernetesNamespaces = new[]\n {\n \"*\",\n },\n TokenMaxTtl = 43200,\n TokenDefaultTtl = 21600,\n KubernetesRoleType = \"Role\",\n GeneratedRoleRules = @\"rules:\n- apiGroups: [\"\"\"\"]\n resources: [\"\"pods\"\"]\n verbs: [\"\"list\"\"]\n\",\n ExtraLabels = \n {\n { \"id\", \"abc123\" },\n { \"name\", \"some_name\" },\n },\n ExtraAnnotations = \n {\n { \"env\", \"development\" },\n { \"location\", \"earth\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/cert\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile1, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/token\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfig, err := kubernetes.NewSecretBackend(ctx, \"config\", \u0026kubernetes.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"kubernetes\"),\n\t\t\tDescription: pulumi.String(\"kubernetes secrets engine description\"),\n\t\t\tKubernetesHost: pulumi.String(\"https://127.0.0.1:61233\"),\n\t\t\tKubernetesCaCert: pulumi.String(invokeFile.Result),\n\t\t\tServiceAccountJwt: pulumi.String(invokeFile1.Result),\n\t\t\tDisableLocalCaJwt: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = kubernetes.NewSecretBackendRole(ctx, \"rules-example\", \u0026kubernetes.SecretBackendRoleArgs{\n\t\t\tBackend: config.Path,\n\t\t\tName: pulumi.String(\"service-account-name-role\"),\n\t\t\tAllowedKubernetesNamespaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"*\"),\n\t\t\t},\n\t\t\tTokenMaxTtl: pulumi.Int(43200),\n\t\t\tTokenDefaultTtl: pulumi.Int(21600),\n\t\t\tKubernetesRoleType: pulumi.String(\"Role\"),\n\t\t\tGeneratedRoleRules: pulumi.String(\"rules:\\n- apiGroups: [\\\"\\\"]\\n resources: [\\\"pods\\\"]\\n verbs: [\\\"list\\\"]\\n\"),\n\t\t\tExtraLabels: pulumi.StringMap{\n\t\t\t\t\"id\": pulumi.String(\"abc123\"),\n\t\t\t\t\"name\": pulumi.String(\"some_name\"),\n\t\t\t},\n\t\t\tExtraAnnotations: pulumi.StringMap{\n\t\t\t\t\"env\": pulumi.String(\"development\"),\n\t\t\t\t\"location\": pulumi.String(\"earth\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.kubernetes.SecretBackend;\nimport com.pulumi.vault.kubernetes.SecretBackendArgs;\nimport com.pulumi.vault.kubernetes.SecretBackendRole;\nimport com.pulumi.vault.kubernetes.SecretBackendRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var config = new SecretBackend(\"config\", SecretBackendArgs.builder()\n .path(\"kubernetes\")\n .description(\"kubernetes secrets engine description\")\n .kubernetesHost(\"https://127.0.0.1:61233\")\n .kubernetesCaCert(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/cert\")\n .build()).result())\n .serviceAccountJwt(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/token\")\n .build()).result())\n .disableLocalCaJwt(false)\n .build());\n\n var rules_example = new SecretBackendRole(\"rules-example\", SecretBackendRoleArgs.builder()\n .backend(config.path())\n .name(\"service-account-name-role\")\n .allowedKubernetesNamespaces(\"*\")\n .tokenMaxTtl(43200)\n .tokenDefaultTtl(21600)\n .kubernetesRoleType(\"Role\")\n .generatedRoleRules(\"\"\"\nrules:\n- apiGroups: [\"\"]\n resources: [\"pods\"]\n verbs: [\"list\"]\n \"\"\")\n .extraLabels(Map.ofEntries(\n Map.entry(\"id\", \"abc123\"),\n Map.entry(\"name\", \"some_name\")\n ))\n .extraAnnotations(Map.ofEntries(\n Map.entry(\"env\", \"development\"),\n Map.entry(\"location\", \"earth\")\n ))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n config:\n type: vault:kubernetes:SecretBackend\n properties:\n path: kubernetes\n description: kubernetes secrets engine description\n kubernetesHost: https://127.0.0.1:61233\n kubernetesCaCert:\n fn::invoke:\n function: std:file\n arguments:\n input: /path/to/cert\n return: result\n serviceAccountJwt:\n fn::invoke:\n function: std:file\n arguments:\n input: /path/to/token\n return: result\n disableLocalCaJwt: false\n rules-example:\n type: vault:kubernetes:SecretBackendRole\n properties:\n backend: ${config.path}\n name: service-account-name-role\n allowedKubernetesNamespaces:\n - '*'\n tokenMaxTtl: 43200\n tokenDefaultTtl: 21600\n kubernetesRoleType: Role\n generatedRoleRules: |\n rules:\n - apiGroups: [\"\"]\n resources: [\"pods\"]\n verbs: [\"list\"]\n extraLabels:\n id: abc123\n name: some_name\n extraAnnotations:\n env: development\n location: earth\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nThe Kubernetes secret backend role can be imported using the full path to the role\n\nof the form: `\u003cbackend_path\u003e/roles/\u003crole_name\u003e` e.g.\n\n```sh\n$ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role\n```\n\n", "properties": { "allowedKubernetesNamespaceSelector": { "type": "string", @@ -24742,7 +24742,7 @@ } }, "vault:pkiSecret/secretBackendCert:SecretBackendCert": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst app = new vault.pkisecret.SecretBackendCert(\"app\", {\n backend: intermediate.path,\n name: test.name,\n commonName: \"app.my.domain\",\n}, {\n dependsOn: [admin],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\napp = vault.pki_secret.SecretBackendCert(\"app\",\n backend=intermediate[\"path\"],\n name=test[\"name\"],\n common_name=\"app.my.domain\",\n opts = pulumi.ResourceOptions(depends_on=[admin]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var app = new Vault.PkiSecret.SecretBackendCert(\"app\", new()\n {\n Backend = intermediate.Path,\n Name = test.Name,\n CommonName = \"app.my.domain\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n admin,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := pkiSecret.NewSecretBackendCert(ctx, \"app\", \u0026pkiSecret.SecretBackendCertArgs{\n\t\t\tBackend: pulumi.Any(intermediate.Path),\n\t\t\tName: pulumi.Any(test.Name),\n\t\t\tCommonName: pulumi.String(\"app.my.domain\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tadmin,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.pkiSecret.SecretBackendCert;\nimport com.pulumi.vault.pkiSecret.SecretBackendCertArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var app = new SecretBackendCert(\"app\", SecretBackendCertArgs.builder()\n .backend(intermediate.path())\n .name(test.name())\n .commonName(\"app.my.domain\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(admin)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n app:\n type: vault:pkiSecret:SecretBackendCert\n properties:\n backend: ${intermediate.path}\n name: ${test.name}\n commonName: app.my.domain\n options:\n dependson:\n - ${admin}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst app = new vault.pkisecret.SecretBackendCert(\"app\", {\n backend: intermediate.path,\n name: test.name,\n commonName: \"app.my.domain\",\n}, {\n dependsOn: [admin],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\napp = vault.pki_secret.SecretBackendCert(\"app\",\n backend=intermediate[\"path\"],\n name=test[\"name\"],\n common_name=\"app.my.domain\",\n opts = pulumi.ResourceOptions(depends_on=[admin]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var app = new Vault.PkiSecret.SecretBackendCert(\"app\", new()\n {\n Backend = intermediate.Path,\n Name = test.Name,\n CommonName = \"app.my.domain\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n admin,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := pkiSecret.NewSecretBackendCert(ctx, \"app\", \u0026pkiSecret.SecretBackendCertArgs{\n\t\t\tBackend: pulumi.Any(intermediate.Path),\n\t\t\tName: pulumi.Any(test.Name),\n\t\t\tCommonName: pulumi.String(\"app.my.domain\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tadmin,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.pkiSecret.SecretBackendCert;\nimport com.pulumi.vault.pkiSecret.SecretBackendCertArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var app = new SecretBackendCert(\"app\", SecretBackendCertArgs.builder()\n .backend(intermediate.path())\n .name(test.name())\n .commonName(\"app.my.domain\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(admin)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n app:\n type: vault:pkiSecret:SecretBackendCert\n properties:\n backend: ${intermediate.path}\n name: ${test.name}\n commonName: app.my.domain\n options:\n dependsOn:\n - ${admin}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "properties": { "altNames": { "type": "array", @@ -25111,7 +25111,7 @@ } }, "vault:pkiSecret/secretBackendConfigCa:SecretBackendConfigCa": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst intermediate = new vault.pkisecret.SecretBackendConfigCa(\"intermediate\", {\n backend: intermediateVaultMount.path,\n pemBundle: `-----BEGIN RSA PRIVATE KEY-----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\nLxLkWDajIyjeFn21Ttb42L9pBo3TAQIxUenom/lP2SQTvCKBiPai\n-----END RSA PRIVATE KEY-----\n-----BEGIN CERTIFICATE-----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\nMUR4qFxeUOW/GJGccMUd\n-----END CERTIFICATE-----\n`,\n}, {\n dependsOn: [intermediateVaultMount],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nintermediate = vault.pki_secret.SecretBackendConfigCa(\"intermediate\",\n backend=intermediate_vault_mount[\"path\"],\n pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----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\nLxLkWDajIyjeFn21Ttb42L9pBo3TAQIxUenom/lP2SQTvCKBiPai\n-----END RSA PRIVATE KEY-----\n-----BEGIN CERTIFICATE-----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\nMUR4qFxeUOW/GJGccMUd\n-----END CERTIFICATE-----\n\"\"\",\n opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var intermediate = new Vault.PkiSecret.SecretBackendConfigCa(\"intermediate\", new()\n {\n Backend = intermediateVaultMount.Path,\n PemBundle = @\"-----BEGIN RSA PRIVATE KEY-----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\nLxLkWDajIyjeFn21Ttb42L9pBo3TAQIxUenom/lP2SQTvCKBiPai\n-----END RSA PRIVATE KEY-----\n-----BEGIN CERTIFICATE-----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\nMUR4qFxeUOW/GJGccMUd\n-----END CERTIFICATE-----\n\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n intermediateVaultMount,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := pkiSecret.NewSecretBackendConfigCa(ctx, \"intermediate\", \u0026pkiSecret.SecretBackendConfigCaArgs{\n\t\t\tBackend: pulumi.Any(intermediateVaultMount.Path),\n\t\t\tPemBundle: pulumi.String(`-----BEGIN RSA PRIVATE KEY-----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\nLxLkWDajIyjeFn21Ttb42L9pBo3TAQIxUenom/lP2SQTvCKBiPai\n-----END RSA PRIVATE KEY-----\n-----BEGIN CERTIFICATE-----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\nMUR4qFxeUOW/GJGccMUd\n-----END CERTIFICATE-----\n`),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tintermediateVaultMount,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.pkiSecret.SecretBackendConfigCa;\nimport com.pulumi.vault.pkiSecret.SecretBackendConfigCaArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var intermediate = new SecretBackendConfigCa(\"intermediate\", SecretBackendConfigCaArgs.builder()\n .backend(intermediateVaultMount.path())\n .pemBundle(\"\"\"\n-----BEGIN RSA PRIVATE KEY-----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\nLxLkWDajIyjeFn21Ttb42L9pBo3TAQIxUenom/lP2SQTvCKBiPai\n-----END RSA PRIVATE KEY-----\n-----BEGIN CERTIFICATE-----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\nMUR4qFxeUOW/GJGccMUd\n-----END CERTIFICATE-----\n \"\"\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(intermediateVaultMount)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n intermediate:\n type: vault:pkiSecret:SecretBackendConfigCa\n properties:\n backend: ${intermediateVaultMount.path}\n pemBundle: |\n -----BEGIN RSA PRIVATE KEY-----\n MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/\n 5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o\n ++N0leLTIUAhq339p3O1onAOUO1k4sHfmCwfrDpTn2hcx4URa5Pzzb1fHigusjIH\n 1mcGdncaA6Z2CzO1w4E8kPOUukIDrcZT4faOZrWUIQZKQw2JzTyKJ+ZMDCZq2TFz\n WwpL3eG48wB7J7mibFQ/9nFvxpIflBjDAZ8QiqkwYr5N0DNsTxcfTCSeubfJDCUf\n IWwFZhLitzwOxazazUQKXX/SPMQ1l/L9o3nnHwIDAQABAoIBAAQidJQcDPsl62fc\n Txxx7TpiMhvewfKu2TkMGX18V+EzxxR364+BxHSQTB3fvIkHeTGBGJrw0WdyX8PI\n Ja/NwZYeHLXWcLbKtcFd8WDiEoNh91Oq1HMzOc/MBcpYv94RSAX7MEkHs2YIAvHE\n RufFV86hVhC1d/JLYjkz5CHi+Fd9XTYjBK78tHhJd4IJPu5LYvwlmzC1zeS7s1Tg\n QW1FQuVDV8tWa4PMTrQHwfaGqn95AKc+tbg+ubpCiWl5bBNI3Ghuh4sAC9dMdAkd\n w27i29O9/Y3XJSSGUZlZqDBP4YU388RgHpzLDUxgRcaQt9vdeEz6frULPW67e9D2\n mPPDzjECgYEA4aPOwvnSwGoOKsS6vANGy4Ajsq09PR+1ltMJUR5kDlXGuZWI72eX\n 3/GAnovDuCp0tbYt0r7Fmkfel0Ore7SYM18TH5QGpPddcZLvKUf7AchCIOYY0Te3\n pS9+7S1lEGrLXyuox4N26Ov6wHVrmZTcQoZsDWbjYxNNsNACsiQNjGMCgYEA3SvQ\n Jets9e9SgNVvao2TijX+/vcNKRfcWB71T9Xc4BuSNEu5+ZLtptlwaSnVCVu1Xilk\n sWDh+3EhByl4EteENPvE/7A2s1sfcDOprvg0r52aBZKeTp0AukrT8+Ad4hap7g1x\n 2Lz11MFDkhRqt2KqQaIL+5Mq5WfptbBJ0YI7ARUCgYAD6iSfK1hlsDFYupsGwgPL\n agi0g97pHZC38idaOe3AdeqBs79xb9mpr/XsSj52Bn6J3IRFALxK5e5Nr4XdGo/9\n bCvXw2iuGgCMBOGTVMVdDY1gJr3Ne2r7Oay5Dq2PMFsg5pACDhzVA6sRBbh9LKD5\n on1jaiKNyHrzk1hIoOl/QwKBgA+Ov2uLbfS2yvTpDpdOMiyss603r6NOXF+Ofe8J\n uinBhr1K/mAB59muveuH18Z6vv1KqByaFgtb39jjH+Eja9dWRns95/sh08pOuAbo\n yrv3uBfgQmaBQMXZ8aLcBv4aXgWyyGlYkWpP1fL2oLMZq6RGQ9WEeqX8c0ImjmrA\n YGopAoGBAJZPFlZi2Rfq4MfFZp/X1/zM09hphZwkxkSI+RnsjDUjTgB8CuQul5ep\n KWE98yLw4C25Cqw5fKKQ2addizLnZCAIfJKVNRjYLWlWyGQydDEUzqwXlSLS9LVX\n LxLkWDajIyjeFn21Ttb42L9pBo3TAQIxUenom/lP2SQTvCKBiPai\n -----END RSA PRIVATE KEY-----\n -----BEGIN CERTIFICATE-----\n MIIDazCCAlOgAwIBAgIUahce2sCO7Bom/Rznd5HsNAlr1NgwDQYJKoZIhvcNAQEL\n BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM\n GEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0xODEyMDIwMTAxNDRaFw00NjEy\n MTUwMTAxNDRaMEUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEw\n HwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQwggEiMA0GCSqGSIb3DQEB\n AQUAA4IBDwAwggEKAoIBAQDC8Qd4kJecWCLzysTV1NfoUd0E8rTBKN52HTLBWcJn\n EtZsG//k/K2NNwI92t9buDax9s/A6B79YXdfYp5hI/xLFkDRzObPpAOyl4b3bUmR\n la3Knmj743SV4tMhQCGrff2nc7WicA5Q7WTiwd+YLB+sOlOfaFzHhRFrk/PNvV8e\n KC6yMgfWZwZ2dxoDpnYLM7XDgTyQ85S6QgOtxlPh9o5mtZQhBkpDDYnNPIon5kwM\n JmrZMXNbCkvd4bjzAHsnuaJsVD/2cW/Gkh+UGMMBnxCKqTBivk3QM2xPFx9MJJ65\n t8kMJR8hbAVmEuK3PA7FrNrNRApdf9I8xDWX8v2jeecfAgMBAAGjUzBRMB0GA1Ud\n DgQWBBQXGfrns8OqxTGKsXG5pDZS/WyyYDAfBgNVHSMEGDAWgBQXGfrns8OqxTGK\n sXG5pDZS/WyyYDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCt\n 8aUX26cl2PgdIEByZSHAX5G+2b0IEtTclPkl4uDyyKRY4dVq6gK3ueVSU5eUmBip\n JbV5aRetovGOcV//8vbxkZm/ntQ8Oo+2sfGR5lIzd0UdlOr5pkD6g3bFy/zJ+4DR\n DAe8fklUacfz6CFmD+H8GyHm+fKmF+mjr4oOGQW6OegRDJHuiipUk2lJyuXdlPSa\n FpNRO2sGbjn000ANinFgnFiVzGDnx0/G1Kii/6GWrI6rrdVmXioQzF+8AloWckeB\n +hbmbwkwQa/JrLb5SWcBDOXSgtn1Li3XF5AQQBBjA3pOlyBXqnI94Irw89Lv9uPT\n MUR4qFxeUOW/GJGccMUd\n -----END CERTIFICATE-----\n options:\n dependson:\n - ${intermediateVaultMount}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst intermediate = new vault.pkisecret.SecretBackendConfigCa(\"intermediate\", {\n backend: intermediateVaultMount.path,\n pemBundle: `-----BEGIN RSA PRIVATE KEY-----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\nLxLkWDajIyjeFn21Ttb42L9pBo3TAQIxUenom/lP2SQTvCKBiPai\n-----END RSA PRIVATE KEY-----\n-----BEGIN CERTIFICATE-----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\nMUR4qFxeUOW/GJGccMUd\n-----END CERTIFICATE-----\n`,\n}, {\n dependsOn: [intermediateVaultMount],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nintermediate = vault.pki_secret.SecretBackendConfigCa(\"intermediate\",\n backend=intermediate_vault_mount[\"path\"],\n pem_bundle=\"\"\"-----BEGIN RSA PRIVATE KEY-----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\nLxLkWDajIyjeFn21Ttb42L9pBo3TAQIxUenom/lP2SQTvCKBiPai\n-----END RSA PRIVATE KEY-----\n-----BEGIN CERTIFICATE-----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\nMUR4qFxeUOW/GJGccMUd\n-----END CERTIFICATE-----\n\"\"\",\n opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var intermediate = new Vault.PkiSecret.SecretBackendConfigCa(\"intermediate\", new()\n {\n Backend = intermediateVaultMount.Path,\n PemBundle = @\"-----BEGIN RSA PRIVATE KEY-----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\nLxLkWDajIyjeFn21Ttb42L9pBo3TAQIxUenom/lP2SQTvCKBiPai\n-----END RSA PRIVATE KEY-----\n-----BEGIN CERTIFICATE-----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\nMUR4qFxeUOW/GJGccMUd\n-----END CERTIFICATE-----\n\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n intermediateVaultMount,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := pkiSecret.NewSecretBackendConfigCa(ctx, \"intermediate\", \u0026pkiSecret.SecretBackendConfigCaArgs{\n\t\t\tBackend: pulumi.Any(intermediateVaultMount.Path),\n\t\t\tPemBundle: pulumi.String(`-----BEGIN RSA PRIVATE KEY-----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\nLxLkWDajIyjeFn21Ttb42L9pBo3TAQIxUenom/lP2SQTvCKBiPai\n-----END RSA PRIVATE KEY-----\n-----BEGIN CERTIFICATE-----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\nMUR4qFxeUOW/GJGccMUd\n-----END CERTIFICATE-----\n`),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tintermediateVaultMount,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.pkiSecret.SecretBackendConfigCa;\nimport com.pulumi.vault.pkiSecret.SecretBackendConfigCaArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var intermediate = new SecretBackendConfigCa(\"intermediate\", SecretBackendConfigCaArgs.builder()\n .backend(intermediateVaultMount.path())\n .pemBundle(\"\"\"\n-----BEGIN RSA PRIVATE KEY-----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\nLxLkWDajIyjeFn21Ttb42L9pBo3TAQIxUenom/lP2SQTvCKBiPai\n-----END RSA PRIVATE KEY-----\n-----BEGIN CERTIFICATE-----\nMIIDazCCAlOgAwIBAgIUahce2sCO7Bom/Rznd5HsNAlr1NgwDQYJKoZIhvcNAQEL\nBQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM\nGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0xODEyMDIwMTAxNDRaFw00NjEy\nMTUwMTAxNDRaMEUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEw\nHwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQwggEiMA0GCSqGSIb3DQEB\nAQUAA4IBDwAwggEKAoIBAQDC8Qd4kJecWCLzysTV1NfoUd0E8rTBKN52HTLBWcJn\nEtZsG//k/K2NNwI92t9buDax9s/A6B79YXdfYp5hI/xLFkDRzObPpAOyl4b3bUmR\nla3Knmj743SV4tMhQCGrff2nc7WicA5Q7WTiwd+YLB+sOlOfaFzHhRFrk/PNvV8e\nKC6yMgfWZwZ2dxoDpnYLM7XDgTyQ85S6QgOtxlPh9o5mtZQhBkpDDYnNPIon5kwM\nJmrZMXNbCkvd4bjzAHsnuaJsVD/2cW/Gkh+UGMMBnxCKqTBivk3QM2xPFx9MJJ65\nt8kMJR8hbAVmEuK3PA7FrNrNRApdf9I8xDWX8v2jeecfAgMBAAGjUzBRMB0GA1Ud\nDgQWBBQXGfrns8OqxTGKsXG5pDZS/WyyYDAfBgNVHSMEGDAWgBQXGfrns8OqxTGK\nsXG5pDZS/WyyYDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCt\n8aUX26cl2PgdIEByZSHAX5G+2b0IEtTclPkl4uDyyKRY4dVq6gK3ueVSU5eUmBip\nJbV5aRetovGOcV//8vbxkZm/ntQ8Oo+2sfGR5lIzd0UdlOr5pkD6g3bFy/zJ+4DR\nDAe8fklUacfz6CFmD+H8GyHm+fKmF+mjr4oOGQW6OegRDJHuiipUk2lJyuXdlPSa\nFpNRO2sGbjn000ANinFgnFiVzGDnx0/G1Kii/6GWrI6rrdVmXioQzF+8AloWckeB\n+hbmbwkwQa/JrLb5SWcBDOXSgtn1Li3XF5AQQBBjA3pOlyBXqnI94Irw89Lv9uPT\nMUR4qFxeUOW/GJGccMUd\n-----END CERTIFICATE-----\n \"\"\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(intermediateVaultMount)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n intermediate:\n type: vault:pkiSecret:SecretBackendConfigCa\n properties:\n backend: ${intermediateVaultMount.path}\n pemBundle: |\n -----BEGIN RSA PRIVATE KEY-----\n MIIEowIBAAKCAQEAwvEHeJCXnFgi88rE1dTX6FHdBPK0wSjedh0ywVnCZxLWbBv/\n 5PytjTcCPdrfW7g2sfbPwOge/WF3X2KeYSP8SxZA0czmz6QDspeG921JkZWtyp5o\n ++N0leLTIUAhq339p3O1onAOUO1k4sHfmCwfrDpTn2hcx4URa5Pzzb1fHigusjIH\n 1mcGdncaA6Z2CzO1w4E8kPOUukIDrcZT4faOZrWUIQZKQw2JzTyKJ+ZMDCZq2TFz\n WwpL3eG48wB7J7mibFQ/9nFvxpIflBjDAZ8QiqkwYr5N0DNsTxcfTCSeubfJDCUf\n IWwFZhLitzwOxazazUQKXX/SPMQ1l/L9o3nnHwIDAQABAoIBAAQidJQcDPsl62fc\n Txxx7TpiMhvewfKu2TkMGX18V+EzxxR364+BxHSQTB3fvIkHeTGBGJrw0WdyX8PI\n Ja/NwZYeHLXWcLbKtcFd8WDiEoNh91Oq1HMzOc/MBcpYv94RSAX7MEkHs2YIAvHE\n RufFV86hVhC1d/JLYjkz5CHi+Fd9XTYjBK78tHhJd4IJPu5LYvwlmzC1zeS7s1Tg\n QW1FQuVDV8tWa4PMTrQHwfaGqn95AKc+tbg+ubpCiWl5bBNI3Ghuh4sAC9dMdAkd\n w27i29O9/Y3XJSSGUZlZqDBP4YU388RgHpzLDUxgRcaQt9vdeEz6frULPW67e9D2\n mPPDzjECgYEA4aPOwvnSwGoOKsS6vANGy4Ajsq09PR+1ltMJUR5kDlXGuZWI72eX\n 3/GAnovDuCp0tbYt0r7Fmkfel0Ore7SYM18TH5QGpPddcZLvKUf7AchCIOYY0Te3\n pS9+7S1lEGrLXyuox4N26Ov6wHVrmZTcQoZsDWbjYxNNsNACsiQNjGMCgYEA3SvQ\n Jets9e9SgNVvao2TijX+/vcNKRfcWB71T9Xc4BuSNEu5+ZLtptlwaSnVCVu1Xilk\n sWDh+3EhByl4EteENPvE/7A2s1sfcDOprvg0r52aBZKeTp0AukrT8+Ad4hap7g1x\n 2Lz11MFDkhRqt2KqQaIL+5Mq5WfptbBJ0YI7ARUCgYAD6iSfK1hlsDFYupsGwgPL\n agi0g97pHZC38idaOe3AdeqBs79xb9mpr/XsSj52Bn6J3IRFALxK5e5Nr4XdGo/9\n bCvXw2iuGgCMBOGTVMVdDY1gJr3Ne2r7Oay5Dq2PMFsg5pACDhzVA6sRBbh9LKD5\n on1jaiKNyHrzk1hIoOl/QwKBgA+Ov2uLbfS2yvTpDpdOMiyss603r6NOXF+Ofe8J\n uinBhr1K/mAB59muveuH18Z6vv1KqByaFgtb39jjH+Eja9dWRns95/sh08pOuAbo\n yrv3uBfgQmaBQMXZ8aLcBv4aXgWyyGlYkWpP1fL2oLMZq6RGQ9WEeqX8c0ImjmrA\n YGopAoGBAJZPFlZi2Rfq4MfFZp/X1/zM09hphZwkxkSI+RnsjDUjTgB8CuQul5ep\n KWE98yLw4C25Cqw5fKKQ2addizLnZCAIfJKVNRjYLWlWyGQydDEUzqwXlSLS9LVX\n LxLkWDajIyjeFn21Ttb42L9pBo3TAQIxUenom/lP2SQTvCKBiPai\n -----END RSA PRIVATE KEY-----\n -----BEGIN CERTIFICATE-----\n MIIDazCCAlOgAwIBAgIUahce2sCO7Bom/Rznd5HsNAlr1NgwDQYJKoZIhvcNAQEL\n BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM\n GEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0xODEyMDIwMTAxNDRaFw00NjEy\n MTUwMTAxNDRaMEUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEw\n HwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQwggEiMA0GCSqGSIb3DQEB\n AQUAA4IBDwAwggEKAoIBAQDC8Qd4kJecWCLzysTV1NfoUd0E8rTBKN52HTLBWcJn\n EtZsG//k/K2NNwI92t9buDax9s/A6B79YXdfYp5hI/xLFkDRzObPpAOyl4b3bUmR\n la3Knmj743SV4tMhQCGrff2nc7WicA5Q7WTiwd+YLB+sOlOfaFzHhRFrk/PNvV8e\n KC6yMgfWZwZ2dxoDpnYLM7XDgTyQ85S6QgOtxlPh9o5mtZQhBkpDDYnNPIon5kwM\n JmrZMXNbCkvd4bjzAHsnuaJsVD/2cW/Gkh+UGMMBnxCKqTBivk3QM2xPFx9MJJ65\n t8kMJR8hbAVmEuK3PA7FrNrNRApdf9I8xDWX8v2jeecfAgMBAAGjUzBRMB0GA1Ud\n DgQWBBQXGfrns8OqxTGKsXG5pDZS/WyyYDAfBgNVHSMEGDAWgBQXGfrns8OqxTGK\n sXG5pDZS/WyyYDAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCt\n 8aUX26cl2PgdIEByZSHAX5G+2b0IEtTclPkl4uDyyKRY4dVq6gK3ueVSU5eUmBip\n JbV5aRetovGOcV//8vbxkZm/ntQ8Oo+2sfGR5lIzd0UdlOr5pkD6g3bFy/zJ+4DR\n DAe8fklUacfz6CFmD+H8GyHm+fKmF+mjr4oOGQW6OegRDJHuiipUk2lJyuXdlPSa\n FpNRO2sGbjn000ANinFgnFiVzGDnx0/G1Kii/6GWrI6rrdVmXioQzF+8AloWckeB\n +hbmbwkwQa/JrLb5SWcBDOXSgtn1Li3XF5AQQBBjA3pOlyBXqnI94Irw89Lv9uPT\n MUR4qFxeUOW/GJGccMUd\n -----END CERTIFICATE-----\n options:\n dependsOn:\n - ${intermediateVaultMount}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "properties": { "backend": { "type": "string", @@ -25552,7 +25552,7 @@ } }, "vault:pkiSecret/secretBackendIntermediateCertRequest:SecretBackendIntermediateCertRequest": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst test = new vault.pkisecret.SecretBackendIntermediateCertRequest(\"test\", {\n backend: pki.path,\n type: \"internal\",\n commonName: \"app.my.domain\",\n}, {\n dependsOn: [pki],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ntest = vault.pki_secret.SecretBackendIntermediateCertRequest(\"test\",\n backend=pki[\"path\"],\n type=\"internal\",\n common_name=\"app.my.domain\",\n opts = pulumi.ResourceOptions(depends_on=[pki]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var test = new Vault.PkiSecret.SecretBackendIntermediateCertRequest(\"test\", new()\n {\n Backend = pki.Path,\n Type = \"internal\",\n CommonName = \"app.my.domain\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n pki,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := pkiSecret.NewSecretBackendIntermediateCertRequest(ctx, \"test\", \u0026pkiSecret.SecretBackendIntermediateCertRequestArgs{\n\t\t\tBackend: pulumi.Any(pki.Path),\n\t\t\tType: pulumi.String(\"internal\"),\n\t\t\tCommonName: pulumi.String(\"app.my.domain\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tpki,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.pkiSecret.SecretBackendIntermediateCertRequest;\nimport com.pulumi.vault.pkiSecret.SecretBackendIntermediateCertRequestArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var test = new SecretBackendIntermediateCertRequest(\"test\", SecretBackendIntermediateCertRequestArgs.builder()\n .backend(pki.path())\n .type(\"internal\")\n .commonName(\"app.my.domain\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(pki)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n test:\n type: vault:pkiSecret:SecretBackendIntermediateCertRequest\n properties:\n backend: ${pki.path}\n type: internal\n commonName: app.my.domain\n options:\n dependson:\n - ${pki}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst test = new vault.pkisecret.SecretBackendIntermediateCertRequest(\"test\", {\n backend: pki.path,\n type: \"internal\",\n commonName: \"app.my.domain\",\n}, {\n dependsOn: [pki],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ntest = vault.pki_secret.SecretBackendIntermediateCertRequest(\"test\",\n backend=pki[\"path\"],\n type=\"internal\",\n common_name=\"app.my.domain\",\n opts = pulumi.ResourceOptions(depends_on=[pki]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var test = new Vault.PkiSecret.SecretBackendIntermediateCertRequest(\"test\", new()\n {\n Backend = pki.Path,\n Type = \"internal\",\n CommonName = \"app.my.domain\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n pki,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := pkiSecret.NewSecretBackendIntermediateCertRequest(ctx, \"test\", \u0026pkiSecret.SecretBackendIntermediateCertRequestArgs{\n\t\t\tBackend: pulumi.Any(pki.Path),\n\t\t\tType: pulumi.String(\"internal\"),\n\t\t\tCommonName: pulumi.String(\"app.my.domain\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tpki,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.pkiSecret.SecretBackendIntermediateCertRequest;\nimport com.pulumi.vault.pkiSecret.SecretBackendIntermediateCertRequestArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var test = new SecretBackendIntermediateCertRequest(\"test\", SecretBackendIntermediateCertRequestArgs.builder()\n .backend(pki.path())\n .type(\"internal\")\n .commonName(\"app.my.domain\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(pki)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n test:\n type: vault:pkiSecret:SecretBackendIntermediateCertRequest\n properties:\n backend: ${pki.path}\n type: internal\n commonName: app.my.domain\n options:\n dependsOn:\n - ${pki}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "properties": { "addBasicConstraints": { "type": "boolean", @@ -27189,7 +27189,7 @@ } }, "vault:pkiSecret/secretBackendRootCert:SecretBackendRootCert": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst test = new vault.pkisecret.SecretBackendRootCert(\"test\", {\n backend: pki.path,\n type: \"internal\",\n commonName: \"Root CA\",\n ttl: \"315360000\",\n format: \"pem\",\n privateKeyFormat: \"der\",\n keyType: \"rsa\",\n keyBits: 4096,\n excludeCnFromSans: true,\n ou: \"My OU\",\n organization: \"My organization\",\n}, {\n dependsOn: [pki],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ntest = vault.pki_secret.SecretBackendRootCert(\"test\",\n backend=pki[\"path\"],\n type=\"internal\",\n common_name=\"Root CA\",\n ttl=\"315360000\",\n format=\"pem\",\n private_key_format=\"der\",\n key_type=\"rsa\",\n key_bits=4096,\n exclude_cn_from_sans=True,\n ou=\"My OU\",\n organization=\"My organization\",\n opts = pulumi.ResourceOptions(depends_on=[pki]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var test = new Vault.PkiSecret.SecretBackendRootCert(\"test\", new()\n {\n Backend = pki.Path,\n Type = \"internal\",\n CommonName = \"Root CA\",\n Ttl = \"315360000\",\n Format = \"pem\",\n PrivateKeyFormat = \"der\",\n KeyType = \"rsa\",\n KeyBits = 4096,\n ExcludeCnFromSans = true,\n Ou = \"My OU\",\n Organization = \"My organization\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n pki,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := pkiSecret.NewSecretBackendRootCert(ctx, \"test\", \u0026pkiSecret.SecretBackendRootCertArgs{\n\t\t\tBackend: pulumi.Any(pki.Path),\n\t\t\tType: pulumi.String(\"internal\"),\n\t\t\tCommonName: pulumi.String(\"Root CA\"),\n\t\t\tTtl: pulumi.String(\"315360000\"),\n\t\t\tFormat: pulumi.String(\"pem\"),\n\t\t\tPrivateKeyFormat: pulumi.String(\"der\"),\n\t\t\tKeyType: pulumi.String(\"rsa\"),\n\t\t\tKeyBits: pulumi.Int(4096),\n\t\t\tExcludeCnFromSans: pulumi.Bool(true),\n\t\t\tOu: pulumi.String(\"My OU\"),\n\t\t\tOrganization: pulumi.String(\"My organization\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tpki,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCert;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCertArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var test = new SecretBackendRootCert(\"test\", SecretBackendRootCertArgs.builder()\n .backend(pki.path())\n .type(\"internal\")\n .commonName(\"Root CA\")\n .ttl(\"315360000\")\n .format(\"pem\")\n .privateKeyFormat(\"der\")\n .keyType(\"rsa\")\n .keyBits(4096)\n .excludeCnFromSans(true)\n .ou(\"My OU\")\n .organization(\"My organization\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(pki)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n test:\n type: vault:pkiSecret:SecretBackendRootCert\n properties:\n backend: ${pki.path}\n type: internal\n commonName: Root CA\n ttl: '315360000'\n format: pem\n privateKeyFormat: der\n keyType: rsa\n keyBits: 4096\n excludeCnFromSans: true\n ou: My OU\n organization: My organization\n options:\n dependson:\n - ${pki}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst test = new vault.pkisecret.SecretBackendRootCert(\"test\", {\n backend: pki.path,\n type: \"internal\",\n commonName: \"Root CA\",\n ttl: \"315360000\",\n format: \"pem\",\n privateKeyFormat: \"der\",\n keyType: \"rsa\",\n keyBits: 4096,\n excludeCnFromSans: true,\n ou: \"My OU\",\n organization: \"My organization\",\n}, {\n dependsOn: [pki],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ntest = vault.pki_secret.SecretBackendRootCert(\"test\",\n backend=pki[\"path\"],\n type=\"internal\",\n common_name=\"Root CA\",\n ttl=\"315360000\",\n format=\"pem\",\n private_key_format=\"der\",\n key_type=\"rsa\",\n key_bits=4096,\n exclude_cn_from_sans=True,\n ou=\"My OU\",\n organization=\"My organization\",\n opts = pulumi.ResourceOptions(depends_on=[pki]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var test = new Vault.PkiSecret.SecretBackendRootCert(\"test\", new()\n {\n Backend = pki.Path,\n Type = \"internal\",\n CommonName = \"Root CA\",\n Ttl = \"315360000\",\n Format = \"pem\",\n PrivateKeyFormat = \"der\",\n KeyType = \"rsa\",\n KeyBits = 4096,\n ExcludeCnFromSans = true,\n Ou = \"My OU\",\n Organization = \"My organization\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n pki,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := pkiSecret.NewSecretBackendRootCert(ctx, \"test\", \u0026pkiSecret.SecretBackendRootCertArgs{\n\t\t\tBackend: pulumi.Any(pki.Path),\n\t\t\tType: pulumi.String(\"internal\"),\n\t\t\tCommonName: pulumi.String(\"Root CA\"),\n\t\t\tTtl: pulumi.String(\"315360000\"),\n\t\t\tFormat: pulumi.String(\"pem\"),\n\t\t\tPrivateKeyFormat: pulumi.String(\"der\"),\n\t\t\tKeyType: pulumi.String(\"rsa\"),\n\t\t\tKeyBits: pulumi.Int(4096),\n\t\t\tExcludeCnFromSans: pulumi.Bool(true),\n\t\t\tOu: pulumi.String(\"My OU\"),\n\t\t\tOrganization: pulumi.String(\"My organization\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tpki,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCert;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCertArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var test = new SecretBackendRootCert(\"test\", SecretBackendRootCertArgs.builder()\n .backend(pki.path())\n .type(\"internal\")\n .commonName(\"Root CA\")\n .ttl(\"315360000\")\n .format(\"pem\")\n .privateKeyFormat(\"der\")\n .keyType(\"rsa\")\n .keyBits(4096)\n .excludeCnFromSans(true)\n .ou(\"My OU\")\n .organization(\"My organization\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(pki)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n test:\n type: vault:pkiSecret:SecretBackendRootCert\n properties:\n backend: ${pki.path}\n type: internal\n commonName: Root CA\n ttl: '315360000'\n format: pem\n privateKeyFormat: der\n keyType: rsa\n keyBits: 4096\n excludeCnFromSans: true\n ou: My OU\n organization: My organization\n options:\n dependsOn:\n - ${pki}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "properties": { "altNames": { "type": "array", @@ -27699,7 +27699,7 @@ } }, "vault:pkiSecret/secretBackendRootSignIntermediate:SecretBackendRootSignIntermediate": { - "description": "Creates PKI certificate.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst root = new vault.pkisecret.SecretBackendRootSignIntermediate(\"root\", {\n backend: rootVaultMount.path,\n csr: intermediate.csr,\n commonName: \"Intermediate CA\",\n excludeCnFromSans: true,\n ou: \"My OU\",\n organization: \"My organization\",\n}, {\n dependsOn: [intermediate],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nroot = vault.pki_secret.SecretBackendRootSignIntermediate(\"root\",\n backend=root_vault_mount[\"path\"],\n csr=intermediate[\"csr\"],\n common_name=\"Intermediate CA\",\n exclude_cn_from_sans=True,\n ou=\"My OU\",\n organization=\"My organization\",\n opts = pulumi.ResourceOptions(depends_on=[intermediate]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var root = new Vault.PkiSecret.SecretBackendRootSignIntermediate(\"root\", new()\n {\n Backend = rootVaultMount.Path,\n Csr = intermediate.Csr,\n CommonName = \"Intermediate CA\",\n ExcludeCnFromSans = true,\n Ou = \"My OU\",\n Organization = \"My organization\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n intermediate,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := pkiSecret.NewSecretBackendRootSignIntermediate(ctx, \"root\", \u0026pkiSecret.SecretBackendRootSignIntermediateArgs{\n\t\t\tBackend: pulumi.Any(rootVaultMount.Path),\n\t\t\tCsr: pulumi.Any(intermediate.Csr),\n\t\t\tCommonName: pulumi.String(\"Intermediate CA\"),\n\t\t\tExcludeCnFromSans: pulumi.Bool(true),\n\t\t\tOu: pulumi.String(\"My OU\"),\n\t\t\tOrganization: pulumi.String(\"My organization\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tintermediate,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootSignIntermediate;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootSignIntermediateArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var root = new SecretBackendRootSignIntermediate(\"root\", SecretBackendRootSignIntermediateArgs.builder()\n .backend(rootVaultMount.path())\n .csr(intermediate.csr())\n .commonName(\"Intermediate CA\")\n .excludeCnFromSans(true)\n .ou(\"My OU\")\n .organization(\"My organization\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(intermediate)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n root:\n type: vault:pkiSecret:SecretBackendRootSignIntermediate\n properties:\n backend: ${rootVaultMount.path}\n csr: ${intermediate.csr}\n commonName: Intermediate CA\n excludeCnFromSans: true\n ou: My OU\n organization: My organization\n options:\n dependson:\n - ${intermediate}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Creates PKI certificate.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst root = new vault.pkisecret.SecretBackendRootSignIntermediate(\"root\", {\n backend: rootVaultMount.path,\n csr: intermediate.csr,\n commonName: \"Intermediate CA\",\n excludeCnFromSans: true,\n ou: \"My OU\",\n organization: \"My organization\",\n}, {\n dependsOn: [intermediate],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nroot = vault.pki_secret.SecretBackendRootSignIntermediate(\"root\",\n backend=root_vault_mount[\"path\"],\n csr=intermediate[\"csr\"],\n common_name=\"Intermediate CA\",\n exclude_cn_from_sans=True,\n ou=\"My OU\",\n organization=\"My organization\",\n opts = pulumi.ResourceOptions(depends_on=[intermediate]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var root = new Vault.PkiSecret.SecretBackendRootSignIntermediate(\"root\", new()\n {\n Backend = rootVaultMount.Path,\n Csr = intermediate.Csr,\n CommonName = \"Intermediate CA\",\n ExcludeCnFromSans = true,\n Ou = \"My OU\",\n Organization = \"My organization\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n intermediate,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := pkiSecret.NewSecretBackendRootSignIntermediate(ctx, \"root\", \u0026pkiSecret.SecretBackendRootSignIntermediateArgs{\n\t\t\tBackend: pulumi.Any(rootVaultMount.Path),\n\t\t\tCsr: pulumi.Any(intermediate.Csr),\n\t\t\tCommonName: pulumi.String(\"Intermediate CA\"),\n\t\t\tExcludeCnFromSans: pulumi.Bool(true),\n\t\t\tOu: pulumi.String(\"My OU\"),\n\t\t\tOrganization: pulumi.String(\"My organization\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tintermediate,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootSignIntermediate;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootSignIntermediateArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var root = new SecretBackendRootSignIntermediate(\"root\", SecretBackendRootSignIntermediateArgs.builder()\n .backend(rootVaultMount.path())\n .csr(intermediate.csr())\n .commonName(\"Intermediate CA\")\n .excludeCnFromSans(true)\n .ou(\"My OU\")\n .organization(\"My organization\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(intermediate)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n root:\n type: vault:pkiSecret:SecretBackendRootSignIntermediate\n properties:\n backend: ${rootVaultMount.path}\n csr: ${intermediate.csr}\n commonName: Intermediate CA\n excludeCnFromSans: true\n ou: My OU\n organization: My organization\n options:\n dependsOn:\n - ${intermediate}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "properties": { "altNames": { "type": "array", @@ -28134,7 +28134,7 @@ } }, "vault:pkiSecret/secretBackendSign:SecretBackendSign": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst test = new vault.pkisecret.SecretBackendSign(\"test\", {\n backend: pki.path,\n name: admin.name,\n csr: `-----BEGIN CERTIFICATE REQUEST-----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\no3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=\n-----END CERTIFICATE REQUEST-----\n`,\n commonName: \"test.my.domain\",\n}, {\n dependsOn: [admin],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ntest = vault.pki_secret.SecretBackendSign(\"test\",\n backend=pki[\"path\"],\n name=admin[\"name\"],\n csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----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\no3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=\n-----END CERTIFICATE REQUEST-----\n\"\"\",\n common_name=\"test.my.domain\",\n opts = pulumi.ResourceOptions(depends_on=[admin]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var test = new Vault.PkiSecret.SecretBackendSign(\"test\", new()\n {\n Backend = pki.Path,\n Name = admin.Name,\n Csr = @\"-----BEGIN CERTIFICATE REQUEST-----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\no3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=\n-----END CERTIFICATE REQUEST-----\n\",\n CommonName = \"test.my.domain\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n admin,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := pkiSecret.NewSecretBackendSign(ctx, \"test\", \u0026pkiSecret.SecretBackendSignArgs{\n\t\t\tBackend: pulumi.Any(pki.Path),\n\t\t\tName: pulumi.Any(admin.Name),\n\t\t\tCsr: pulumi.String(`-----BEGIN CERTIFICATE REQUEST-----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\no3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=\n-----END CERTIFICATE REQUEST-----\n`),\n\t\t\tCommonName: pulumi.String(\"test.my.domain\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tadmin,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.pkiSecret.SecretBackendSign;\nimport com.pulumi.vault.pkiSecret.SecretBackendSignArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var test = new SecretBackendSign(\"test\", SecretBackendSignArgs.builder()\n .backend(pki.path())\n .name(admin.name())\n .csr(\"\"\"\n-----BEGIN CERTIFICATE REQUEST-----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\no3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=\n-----END CERTIFICATE REQUEST-----\n \"\"\")\n .commonName(\"test.my.domain\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(admin)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n test:\n type: vault:pkiSecret:SecretBackendSign\n properties:\n backend: ${pki.path}\n name: ${admin.name}\n csr: |\n -----BEGIN CERTIFICATE REQUEST-----\n MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx\n ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy\n dC50ZXN0Lm15LmRvbWFpbjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB\n AJupYCQ8UVCWII1Zof1c6YcSSaM9hEaDU78cfKP5RoSeH10BvrWRfT+mzCONVpNP\n CW9Iabtvk6hm0ot6ilnndEyVJbc0g7hdDLBX5BM25D+DGZGJRKUz1V+uBrWmXtIt\n Vonj7JTDTe7ViH0GDsB7CvqXFGXO2a2cDYBchLkL6vQiFPshxvUsLtwxuy/qdYgy\n X6ya+AUoZcoQGy1XxNjfH6cPtWSWQGEp1oPR6vL9hU3laTZb3C+VV4jZem+he8/0\n V+qV6fLG92WTXm2hmf8nrtUqqJ+C7mW/RJod+TviviBadIX0OHXW7k5HVsZood01\n te8vMRUNJNiZfa9EMIK5oncbQn0LcM3Wo9VrjpL7jREb/4HCS2gswYGv7hzk9cCS\n kVY4rDucchKbApuI3kfzmO7GFOF5eiSkYZpY/czNn7VVM3WCu6dpOX4+3rhgrZQw\n kY14L930DaLVRUgve/zKVP2D2GHdEOs+MbV7s96UgigT9pXly/yHPj+1sSYqmnaD\n 5b7jSeJusmzO/nrwXVGLsnezR87VzHl9Ux9g5s6zh+R+PrZuVxYsLvoUpaasH47O\n gIcBzSb/6pSGZKAUizmYsHsR1k88dAvsQ+FsUDaNokdi9VndEB4QPmiFmjyLV+0I\n 1TFoXop4sW11NPz1YCq+IxnYrEaIN3PyhY0GvBJDFY1/AgMBAAGgADANBgkqhkiG\n 9w0BAQsFAAOCAgEActuqnqS8Y9UF7e08w7tR3FPzGecWreuvxILrlFEZJxiLPFqL\n It7uJvtypCVQvz6UQzKdBYO7tMpRaWViB8DrWzXNZjLMrg+QHcpveg8C0Ett4scG\n fnvLk6fTDFYrnGvwHTqiHos5i0y3bFLyS1BGwSpdLAykGtvC+VM8mRyw/Y7CPcKN\n 77kebY/9xduW1g2uxWLr0x90RuQDv9psPojT+59tRLGSp5Kt0IeD3QtnAZEFE4aN\n vt+Pd69eg3BgZ8ZeDgoqAw3yppvOkpAFiE5pw2qPZaM4SRphl4d2Lek2zNIMyZqv\n do5zh356HOgXtDaSg0POnRGrN/Ua+LMCRTg6GEPUnx9uQb/zt8Zu0hIexDGyykp1\n OGqtWlv/Nc8UYuS38v0BeB6bMPeoqQUjkqs8nHlAEFn0KlgYdtDC+7SdQx6wS4te\n dBKRNDfC4lS3jYJgs55jHqonZgkpSi3bamlxpfpW0ukGBcmq91wRe4bOw/4uD/vf\n UwqMWOdCYcU3mdYNjTWy22ORW3SGFQxMBwpUEURCSoeqWr6aJeQ7KAYkx1PrB5T8\n OTEc13lWf+B0PU9UJuGTsmpIuImPDVd0EVDayr3mT5dDbqTVDbe8ppf2IswABmf0\n o3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=\n -----END CERTIFICATE REQUEST-----\n commonName: test.my.domain\n options:\n dependson:\n - ${admin}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst test = new vault.pkisecret.SecretBackendSign(\"test\", {\n backend: pki.path,\n name: admin.name,\n csr: `-----BEGIN CERTIFICATE REQUEST-----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\no3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=\n-----END CERTIFICATE REQUEST-----\n`,\n commonName: \"test.my.domain\",\n}, {\n dependsOn: [admin],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ntest = vault.pki_secret.SecretBackendSign(\"test\",\n backend=pki[\"path\"],\n name=admin[\"name\"],\n csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----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\no3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=\n-----END CERTIFICATE REQUEST-----\n\"\"\",\n common_name=\"test.my.domain\",\n opts = pulumi.ResourceOptions(depends_on=[admin]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var test = new Vault.PkiSecret.SecretBackendSign(\"test\", new()\n {\n Backend = pki.Path,\n Name = admin.Name,\n Csr = @\"-----BEGIN CERTIFICATE REQUEST-----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\no3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=\n-----END CERTIFICATE REQUEST-----\n\",\n CommonName = \"test.my.domain\",\n }, new CustomResourceOptions\n {\n DependsOn =\n {\n admin,\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := pkiSecret.NewSecretBackendSign(ctx, \"test\", \u0026pkiSecret.SecretBackendSignArgs{\n\t\t\tBackend: pulumi.Any(pki.Path),\n\t\t\tName: pulumi.Any(admin.Name),\n\t\t\tCsr: pulumi.String(`-----BEGIN CERTIFICATE REQUEST-----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\no3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=\n-----END CERTIFICATE REQUEST-----\n`),\n\t\t\tCommonName: pulumi.String(\"test.my.domain\"),\n\t\t}, pulumi.DependsOn([]pulumi.Resource{\n\t\t\tadmin,\n\t\t}))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.pkiSecret.SecretBackendSign;\nimport com.pulumi.vault.pkiSecret.SecretBackendSignArgs;\nimport com.pulumi.resources.CustomResourceOptions;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var test = new SecretBackendSign(\"test\", SecretBackendSignArgs.builder()\n .backend(pki.path())\n .name(admin.name())\n .csr(\"\"\"\n-----BEGIN CERTIFICATE REQUEST-----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\no3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=\n-----END CERTIFICATE REQUEST-----\n \"\"\")\n .commonName(\"test.my.domain\")\n .build(), CustomResourceOptions.builder()\n .dependsOn(admin)\n .build());\n\n }\n}\n```\n```yaml\nresources:\n test:\n type: vault:pkiSecret:SecretBackendSign\n properties:\n backend: ${pki.path}\n name: ${admin.name}\n csr: |\n -----BEGIN CERTIFICATE REQUEST-----\n MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx\n ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy\n dC50ZXN0Lm15LmRvbWFpbjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB\n AJupYCQ8UVCWII1Zof1c6YcSSaM9hEaDU78cfKP5RoSeH10BvrWRfT+mzCONVpNP\n CW9Iabtvk6hm0ot6ilnndEyVJbc0g7hdDLBX5BM25D+DGZGJRKUz1V+uBrWmXtIt\n Vonj7JTDTe7ViH0GDsB7CvqXFGXO2a2cDYBchLkL6vQiFPshxvUsLtwxuy/qdYgy\n X6ya+AUoZcoQGy1XxNjfH6cPtWSWQGEp1oPR6vL9hU3laTZb3C+VV4jZem+he8/0\n V+qV6fLG92WTXm2hmf8nrtUqqJ+C7mW/RJod+TviviBadIX0OHXW7k5HVsZood01\n te8vMRUNJNiZfa9EMIK5oncbQn0LcM3Wo9VrjpL7jREb/4HCS2gswYGv7hzk9cCS\n kVY4rDucchKbApuI3kfzmO7GFOF5eiSkYZpY/czNn7VVM3WCu6dpOX4+3rhgrZQw\n kY14L930DaLVRUgve/zKVP2D2GHdEOs+MbV7s96UgigT9pXly/yHPj+1sSYqmnaD\n 5b7jSeJusmzO/nrwXVGLsnezR87VzHl9Ux9g5s6zh+R+PrZuVxYsLvoUpaasH47O\n gIcBzSb/6pSGZKAUizmYsHsR1k88dAvsQ+FsUDaNokdi9VndEB4QPmiFmjyLV+0I\n 1TFoXop4sW11NPz1YCq+IxnYrEaIN3PyhY0GvBJDFY1/AgMBAAGgADANBgkqhkiG\n 9w0BAQsFAAOCAgEActuqnqS8Y9UF7e08w7tR3FPzGecWreuvxILrlFEZJxiLPFqL\n It7uJvtypCVQvz6UQzKdBYO7tMpRaWViB8DrWzXNZjLMrg+QHcpveg8C0Ett4scG\n fnvLk6fTDFYrnGvwHTqiHos5i0y3bFLyS1BGwSpdLAykGtvC+VM8mRyw/Y7CPcKN\n 77kebY/9xduW1g2uxWLr0x90RuQDv9psPojT+59tRLGSp5Kt0IeD3QtnAZEFE4aN\n vt+Pd69eg3BgZ8ZeDgoqAw3yppvOkpAFiE5pw2qPZaM4SRphl4d2Lek2zNIMyZqv\n do5zh356HOgXtDaSg0POnRGrN/Ua+LMCRTg6GEPUnx9uQb/zt8Zu0hIexDGyykp1\n OGqtWlv/Nc8UYuS38v0BeB6bMPeoqQUjkqs8nHlAEFn0KlgYdtDC+7SdQx6wS4te\n dBKRNDfC4lS3jYJgs55jHqonZgkpSi3bamlxpfpW0ukGBcmq91wRe4bOw/4uD/vf\n UwqMWOdCYcU3mdYNjTWy22ORW3SGFQxMBwpUEURCSoeqWr6aJeQ7KAYkx1PrB5T8\n OTEc13lWf+B0PU9UJuGTsmpIuImPDVd0EVDayr3mT5dDbqTVDbe8ppf2IswABmf0\n o3DybUeUmknYjl109rdSf+76nuREICHatxXgN3xCMFuBaN4WLO+ksd6Y1Ys=\n -----END CERTIFICATE REQUEST-----\n commonName: test.my.domain\n options:\n dependsOn:\n - ${admin}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "properties": { "altNames": { "type": "array", @@ -28633,7 +28633,7 @@ } }, "vault:rabbitMq/secretBackendRole:SecretBackendRole": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst rabbitmq = new vault.rabbitmq.SecretBackend(\"rabbitmq\", {\n connectionUri: \"https://.....\",\n username: \"user\",\n password: \"password\",\n});\nconst role = new vault.rabbitmq.SecretBackendRole(\"role\", {\n backend: rabbitmq.path,\n name: \"deploy\",\n tags: \"tag1,tag2\",\n vhosts: [{\n host: \"/\",\n configure: \"\",\n read: \".*\",\n write: \"\",\n }],\n vhostTopics: [{\n vhosts: [{\n topic: \"amq.topic\",\n read: \".*\",\n write: \"\",\n }],\n host: \"/\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nrabbitmq = vault.rabbit_mq.SecretBackend(\"rabbitmq\",\n connection_uri=\"https://.....\",\n username=\"user\",\n password=\"password\")\nrole = vault.rabbit_mq.SecretBackendRole(\"role\",\n backend=rabbitmq.path,\n name=\"deploy\",\n tags=\"tag1,tag2\",\n vhosts=[{\n \"host\": \"/\",\n \"configure\": \"\",\n \"read\": \".*\",\n \"write\": \"\",\n }],\n vhost_topics=[{\n \"vhosts\": [{\n \"topic\": \"amq.topic\",\n \"read\": \".*\",\n \"write\": \"\",\n }],\n \"host\": \"/\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var rabbitmq = new Vault.RabbitMQ.SecretBackend(\"rabbitmq\", new()\n {\n ConnectionUri = \"https://.....\",\n Username = \"user\",\n Password = \"password\",\n });\n\n var role = new Vault.RabbitMQ.SecretBackendRole(\"role\", new()\n {\n Backend = rabbitmq.Path,\n Name = \"deploy\",\n Tags = \"tag1,tag2\",\n Vhosts = new[]\n {\n new Vault.RabbitMQ.Inputs.SecretBackendRoleVhostArgs\n {\n Host = \"/\",\n Configure = \"\",\n Read = \".*\",\n Write = \"\",\n },\n },\n VhostTopics = new[]\n {\n new Vault.RabbitMQ.Inputs.SecretBackendRoleVhostTopicArgs\n {\n Vhosts = new[]\n {\n new Vault.RabbitMQ.Inputs.SecretBackendRoleVhostTopicVhostArgs\n {\n Topic = \"amq.topic\",\n Read = \".*\",\n Write = \"\",\n },\n },\n Host = \"/\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/rabbitMq\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\trabbitmq, err := rabbitMq.NewSecretBackend(ctx, \"rabbitmq\", \u0026rabbitMq.SecretBackendArgs{\n\t\t\tConnectionUri: pulumi.String(\"https://.....\"),\n\t\t\tUsername: pulumi.String(\"user\"),\n\t\t\tPassword: pulumi.String(\"password\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = rabbitMq.NewSecretBackendRole(ctx, \"role\", \u0026rabbitMq.SecretBackendRoleArgs{\n\t\t\tBackend: rabbitmq.Path,\n\t\t\tName: pulumi.String(\"deploy\"),\n\t\t\tTags: pulumi.String(\"tag1,tag2\"),\n\t\t\tVhosts: rabbitmq.SecretBackendRoleVhostArray{\n\t\t\t\t\u0026rabbitmq.SecretBackendRoleVhostArgs{\n\t\t\t\t\tHost: pulumi.String(\"/\"),\n\t\t\t\t\tConfigure: pulumi.String(\"\"),\n\t\t\t\t\tRead: pulumi.String(\".*\"),\n\t\t\t\t\tWrite: pulumi.String(\"\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tVhostTopics: rabbitmq.SecretBackendRoleVhostTopicArray{\n\t\t\t\t\u0026rabbitmq.SecretBackendRoleVhostTopicArgs{\n\t\t\t\t\tVhosts: rabbitmq.SecretBackendRoleVhostTopicVhostArray{\n\t\t\t\t\t\t\u0026rabbitmq.SecretBackendRoleVhostTopicVhostArgs{\n\t\t\t\t\t\t\tTopic: pulumi.String(\"amq.topic\"),\n\t\t\t\t\t\t\tRead: pulumi.String(\".*\"),\n\t\t\t\t\t\t\tWrite: pulumi.String(\"\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tHost: pulumi.String(\"/\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.rabbitMq.SecretBackend;\nimport com.pulumi.vault.rabbitMq.SecretBackendArgs;\nimport com.pulumi.vault.rabbitMq.SecretBackendRole;\nimport com.pulumi.vault.rabbitMq.SecretBackendRoleArgs;\nimport com.pulumi.vault.rabbitMq.inputs.SecretBackendRoleVhostArgs;\nimport com.pulumi.vault.rabbitMq.inputs.SecretBackendRoleVhostTopicArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var rabbitmq = new SecretBackend(\"rabbitmq\", SecretBackendArgs.builder()\n .connectionUri(\"https://.....\")\n .username(\"user\")\n .password(\"password\")\n .build());\n\n var role = new SecretBackendRole(\"role\", SecretBackendRoleArgs.builder()\n .backend(rabbitmq.path())\n .name(\"deploy\")\n .tags(\"tag1,tag2\")\n .vhosts(SecretBackendRoleVhostArgs.builder()\n .host(\"/\")\n .configure(\"\")\n .read(\".*\")\n .write(\"\")\n .build())\n .vhostTopics(SecretBackendRoleVhostTopicArgs.builder()\n .vhosts(SecretBackendRoleVhostTopicVhostArgs.builder()\n .topic(\"amq.topic\")\n .read(\".*\")\n .write(\"\")\n .build())\n .host(\"/\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n rabbitmq:\n type: vault:rabbitMq:SecretBackend\n properties:\n connectionUri: https://.....\n username: user\n password: password\n role:\n type: vault:rabbitMq:SecretBackendRole\n properties:\n backend: ${rabbitmq.path}\n name: deploy\n tags: tag1,tag2\n vhosts:\n - host: /\n configure:\n read: .*\n write:\n vhostTopics:\n - vhosts:\n - topic: amq.topic\n read: .*\n write:\n host: /\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRabbitMQ secret backend roles can be imported using the `path`, e.g.\n\n```sh\n$ pulumi import vault:rabbitMq/secretBackendRole:SecretBackendRole role rabbitmq/roles/deploy\n```\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst rabbitmq = new vault.rabbitmq.SecretBackend(\"rabbitmq\", {\n connectionUri: \"https://.....\",\n username: \"user\",\n password: \"password\",\n});\nconst role = new vault.rabbitmq.SecretBackendRole(\"role\", {\n backend: rabbitmq.path,\n name: \"deploy\",\n tags: \"tag1,tag2\",\n vhosts: [{\n host: \"/\",\n configure: \"\",\n read: \".*\",\n write: \"\",\n }],\n vhostTopics: [{\n vhosts: [{\n topic: \"amq.topic\",\n read: \".*\",\n write: \"\",\n }],\n host: \"/\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nrabbitmq = vault.rabbit_mq.SecretBackend(\"rabbitmq\",\n connection_uri=\"https://.....\",\n username=\"user\",\n password=\"password\")\nrole = vault.rabbit_mq.SecretBackendRole(\"role\",\n backend=rabbitmq.path,\n name=\"deploy\",\n tags=\"tag1,tag2\",\n vhosts=[{\n \"host\": \"/\",\n \"configure\": \"\",\n \"read\": \".*\",\n \"write\": \"\",\n }],\n vhost_topics=[{\n \"vhosts\": [{\n \"topic\": \"amq.topic\",\n \"read\": \".*\",\n \"write\": \"\",\n }],\n \"host\": \"/\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var rabbitmq = new Vault.RabbitMQ.SecretBackend(\"rabbitmq\", new()\n {\n ConnectionUri = \"https://.....\",\n Username = \"user\",\n Password = \"password\",\n });\n\n var role = new Vault.RabbitMQ.SecretBackendRole(\"role\", new()\n {\n Backend = rabbitmq.Path,\n Name = \"deploy\",\n Tags = \"tag1,tag2\",\n Vhosts = new[]\n {\n new Vault.RabbitMQ.Inputs.SecretBackendRoleVhostArgs\n {\n Host = \"/\",\n Configure = \"\",\n Read = \".*\",\n Write = \"\",\n },\n },\n VhostTopics = new[]\n {\n new Vault.RabbitMQ.Inputs.SecretBackendRoleVhostTopicArgs\n {\n Vhosts = new[]\n {\n new Vault.RabbitMQ.Inputs.SecretBackendRoleVhostTopicVhostArgs\n {\n Topic = \"amq.topic\",\n Read = \".*\",\n Write = \"\",\n },\n },\n Host = \"/\",\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/rabbitMq\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\trabbitmq, err := rabbitMq.NewSecretBackend(ctx, \"rabbitmq\", \u0026rabbitMq.SecretBackendArgs{\n\t\t\tConnectionUri: pulumi.String(\"https://.....\"),\n\t\t\tUsername: pulumi.String(\"user\"),\n\t\t\tPassword: pulumi.String(\"password\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = rabbitMq.NewSecretBackendRole(ctx, \"role\", \u0026rabbitMq.SecretBackendRoleArgs{\n\t\t\tBackend: rabbitmq.Path,\n\t\t\tName: pulumi.String(\"deploy\"),\n\t\t\tTags: pulumi.String(\"tag1,tag2\"),\n\t\t\tVhosts: rabbitmq.SecretBackendRoleVhostArray{\n\t\t\t\t\u0026rabbitmq.SecretBackendRoleVhostArgs{\n\t\t\t\t\tHost: pulumi.String(\"/\"),\n\t\t\t\t\tConfigure: pulumi.String(\"\"),\n\t\t\t\t\tRead: pulumi.String(\".*\"),\n\t\t\t\t\tWrite: pulumi.String(\"\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tVhostTopics: rabbitmq.SecretBackendRoleVhostTopicArray{\n\t\t\t\t\u0026rabbitmq.SecretBackendRoleVhostTopicArgs{\n\t\t\t\t\tVhosts: rabbitmq.SecretBackendRoleVhostTopicVhostArray{\n\t\t\t\t\t\t\u0026rabbitmq.SecretBackendRoleVhostTopicVhostArgs{\n\t\t\t\t\t\t\tTopic: pulumi.String(\"amq.topic\"),\n\t\t\t\t\t\t\tRead: pulumi.String(\".*\"),\n\t\t\t\t\t\t\tWrite: pulumi.String(\"\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tHost: pulumi.String(\"/\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.rabbitMq.SecretBackend;\nimport com.pulumi.vault.rabbitMq.SecretBackendArgs;\nimport com.pulumi.vault.rabbitMq.SecretBackendRole;\nimport com.pulumi.vault.rabbitMq.SecretBackendRoleArgs;\nimport com.pulumi.vault.rabbitMq.inputs.SecretBackendRoleVhostArgs;\nimport com.pulumi.vault.rabbitMq.inputs.SecretBackendRoleVhostTopicArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var rabbitmq = new SecretBackend(\"rabbitmq\", SecretBackendArgs.builder()\n .connectionUri(\"https://.....\")\n .username(\"user\")\n .password(\"password\")\n .build());\n\n var role = new SecretBackendRole(\"role\", SecretBackendRoleArgs.builder()\n .backend(rabbitmq.path())\n .name(\"deploy\")\n .tags(\"tag1,tag2\")\n .vhosts(SecretBackendRoleVhostArgs.builder()\n .host(\"/\")\n .configure(\"\")\n .read(\".*\")\n .write(\"\")\n .build())\n .vhostTopics(SecretBackendRoleVhostTopicArgs.builder()\n .vhosts(SecretBackendRoleVhostTopicVhostArgs.builder()\n .topic(\"amq.topic\")\n .read(\".*\")\n .write(\"\")\n .build())\n .host(\"/\")\n .build())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n rabbitmq:\n type: vault:rabbitMq:SecretBackend\n properties:\n connectionUri: https://.....\n username: user\n password: password\n role:\n type: vault:rabbitMq:SecretBackendRole\n properties:\n backend: ${rabbitmq.path}\n name: deploy\n tags: tag1,tag2\n vhosts:\n - host: /\n configure: \"\"\n read: .*\n write: \"\"\n vhostTopics:\n - vhosts:\n - topic: amq.topic\n read: .*\n write: \"\"\n host: /\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nRabbitMQ secret backend roles can be imported using the `path`, e.g.\n\n```sh\n$ pulumi import vault:rabbitMq/secretBackendRole:SecretBackendRole role rabbitmq/roles/deploy\n```\n", "properties": { "backend": { "type": "string", @@ -29678,7 +29678,7 @@ } }, "vault:secrets/syncGcpDestination:SyncGcpDestination": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst gcp = new vault.secrets.SyncGcpDestination(\"gcp\", {\n name: \"gcp-dest\",\n projectId: \"gcp-project-id\",\n credentials: std.file({\n input: credentialsFile,\n }).then(invoke =\u003e invoke.result),\n secretNameTemplate: \"vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}\",\n customTags: {\n foo: \"bar\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\ngcp = vault.secrets.SyncGcpDestination(\"gcp\",\n name=\"gcp-dest\",\n project_id=\"gcp-project-id\",\n credentials=std.file(input=credentials_file).result,\n secret_name_template=\"vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}\",\n custom_tags={\n \"foo\": \"bar\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var gcp = new Vault.Secrets.SyncGcpDestination(\"gcp\", new()\n {\n Name = \"gcp-dest\",\n ProjectId = \"gcp-project-id\",\n Credentials = Std.File.Invoke(new()\n {\n Input = credentialsFile,\n }).Apply(invoke =\u003e invoke.Result),\n SecretNameTemplate = \"vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}\",\n CustomTags = \n {\n { \"foo\", \"bar\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/secrets\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: credentialsFile,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = secrets.NewSyncGcpDestination(ctx, \"gcp\", \u0026secrets.SyncGcpDestinationArgs{\n\t\t\tName: pulumi.String(\"gcp-dest\"),\n\t\t\tProjectId: pulumi.String(\"gcp-project-id\"),\n\t\t\tCredentials: pulumi.String(invokeFile.Result),\n\t\t\tSecretNameTemplate: pulumi.String(\"vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}\"),\n\t\t\tCustomTags: pulumi.StringMap{\n\t\t\t\t\"foo\": pulumi.String(\"bar\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.secrets.SyncGcpDestination;\nimport com.pulumi.vault.secrets.SyncGcpDestinationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var gcp = new SyncGcpDestination(\"gcp\", SyncGcpDestinationArgs.builder()\n .name(\"gcp-dest\")\n .projectId(\"gcp-project-id\")\n .credentials(StdFunctions.file(FileArgs.builder()\n .input(credentialsFile)\n .build()).result())\n .secretNameTemplate(\"vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}\")\n .customTags(Map.of(\"foo\", \"bar\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n gcp:\n type: vault:secrets:SyncGcpDestination\n properties:\n name: gcp-dest\n projectId: gcp-project-id\n credentials:\n fn::invoke:\n Function: std:file\n Arguments:\n input: ${credentialsFile}\n Return: result\n secretNameTemplate: vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}\n customTags:\n foo: bar\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nGCP Secrets sync destinations can be imported using the `name`, e.g.\n\n```sh\n$ pulumi import vault:secrets/syncGcpDestination:SyncGcpDestination gcp gcp-dest\n```\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst gcp = new vault.secrets.SyncGcpDestination(\"gcp\", {\n name: \"gcp-dest\",\n projectId: \"gcp-project-id\",\n credentials: std.file({\n input: credentialsFile,\n }).then(invoke =\u003e invoke.result),\n secretNameTemplate: \"vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}\",\n customTags: {\n foo: \"bar\",\n },\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\ngcp = vault.secrets.SyncGcpDestination(\"gcp\",\n name=\"gcp-dest\",\n project_id=\"gcp-project-id\",\n credentials=std.file(input=credentials_file).result,\n secret_name_template=\"vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}\",\n custom_tags={\n \"foo\": \"bar\",\n })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var gcp = new Vault.Secrets.SyncGcpDestination(\"gcp\", new()\n {\n Name = \"gcp-dest\",\n ProjectId = \"gcp-project-id\",\n Credentials = Std.File.Invoke(new()\n {\n Input = credentialsFile,\n }).Apply(invoke =\u003e invoke.Result),\n SecretNameTemplate = \"vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}\",\n CustomTags = \n {\n { \"foo\", \"bar\" },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/secrets\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: credentialsFile,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = secrets.NewSyncGcpDestination(ctx, \"gcp\", \u0026secrets.SyncGcpDestinationArgs{\n\t\t\tName: pulumi.String(\"gcp-dest\"),\n\t\t\tProjectId: pulumi.String(\"gcp-project-id\"),\n\t\t\tCredentials: pulumi.String(invokeFile.Result),\n\t\t\tSecretNameTemplate: pulumi.String(\"vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}\"),\n\t\t\tCustomTags: pulumi.StringMap{\n\t\t\t\t\"foo\": pulumi.String(\"bar\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.secrets.SyncGcpDestination;\nimport com.pulumi.vault.secrets.SyncGcpDestinationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var gcp = new SyncGcpDestination(\"gcp\", SyncGcpDestinationArgs.builder()\n .name(\"gcp-dest\")\n .projectId(\"gcp-project-id\")\n .credentials(StdFunctions.file(FileArgs.builder()\n .input(credentialsFile)\n .build()).result())\n .secretNameTemplate(\"vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}\")\n .customTags(Map.of(\"foo\", \"bar\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n gcp:\n type: vault:secrets:SyncGcpDestination\n properties:\n name: gcp-dest\n projectId: gcp-project-id\n credentials:\n fn::invoke:\n function: std:file\n arguments:\n input: ${credentialsFile}\n return: result\n secretNameTemplate: vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}\n customTags:\n foo: bar\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nGCP Secrets sync destinations can be imported using the `name`, e.g.\n\n```sh\n$ pulumi import vault:secrets/syncGcpDestination:SyncGcpDestination gcp gcp-dest\n```\n", "properties": { "credentials": { "type": "string", @@ -29953,7 +29953,7 @@ } }, "vault:secrets/syncGithubApps:SyncGithubApps": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst github_apps = new vault.secrets.SyncGithubApps(\"github-apps\", {\n name: \"gh-apps\",\n appId: appId,\n privateKey: std.file({\n input: privatekeyFile,\n }).then(invoke =\u003e invoke.result),\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\ngithub_apps = vault.secrets.SyncGithubApps(\"github-apps\",\n name=\"gh-apps\",\n app_id=app_id,\n private_key=std.file(input=privatekey_file).result)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var github_apps = new Vault.Secrets.SyncGithubApps(\"github-apps\", new()\n {\n Name = \"gh-apps\",\n AppId = appId,\n PrivateKey = Std.File.Invoke(new()\n {\n Input = privatekeyFile,\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/secrets\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: privatekeyFile,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = secrets.NewSyncGithubApps(ctx, \"github-apps\", \u0026secrets.SyncGithubAppsArgs{\n\t\t\tName: pulumi.String(\"gh-apps\"),\n\t\t\tAppId: pulumi.Any(appId),\n\t\t\tPrivateKey: pulumi.String(invokeFile.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.secrets.SyncGithubApps;\nimport com.pulumi.vault.secrets.SyncGithubAppsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var github_apps = new SyncGithubApps(\"github-apps\", SyncGithubAppsArgs.builder()\n .name(\"gh-apps\")\n .appId(appId)\n .privateKey(StdFunctions.file(FileArgs.builder()\n .input(privatekeyFile)\n .build()).result())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n github-apps:\n type: vault:secrets:SyncGithubApps\n properties:\n name: gh-apps\n appId: ${appId}\n privateKey:\n fn::invoke:\n Function: std:file\n Arguments:\n input: ${privatekeyFile}\n Return: result\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nGitHub Apps Secrets sync configuration endpoint can be imported using the `name`, e.g.\n\n```sh\n$ pulumi import vault:secrets/syncGithubApps:SyncGithubApps gh github-apps\n```\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst github_apps = new vault.secrets.SyncGithubApps(\"github-apps\", {\n name: \"gh-apps\",\n appId: appId,\n privateKey: std.file({\n input: privatekeyFile,\n }).then(invoke =\u003e invoke.result),\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\ngithub_apps = vault.secrets.SyncGithubApps(\"github-apps\",\n name=\"gh-apps\",\n app_id=app_id,\n private_key=std.file(input=privatekey_file).result)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var github_apps = new Vault.Secrets.SyncGithubApps(\"github-apps\", new()\n {\n Name = \"gh-apps\",\n AppId = appId,\n PrivateKey = Std.File.Invoke(new()\n {\n Input = privatekeyFile,\n }).Apply(invoke =\u003e invoke.Result),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/secrets\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: privatekeyFile,\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = secrets.NewSyncGithubApps(ctx, \"github-apps\", \u0026secrets.SyncGithubAppsArgs{\n\t\t\tName: pulumi.String(\"gh-apps\"),\n\t\t\tAppId: pulumi.Any(appId),\n\t\t\tPrivateKey: pulumi.String(invokeFile.Result),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.secrets.SyncGithubApps;\nimport com.pulumi.vault.secrets.SyncGithubAppsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var github_apps = new SyncGithubApps(\"github-apps\", SyncGithubAppsArgs.builder()\n .name(\"gh-apps\")\n .appId(appId)\n .privateKey(StdFunctions.file(FileArgs.builder()\n .input(privatekeyFile)\n .build()).result())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n github-apps:\n type: vault:secrets:SyncGithubApps\n properties:\n name: gh-apps\n appId: ${appId}\n privateKey:\n fn::invoke:\n function: std:file\n arguments:\n input: ${privatekeyFile}\n return: result\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nGitHub Apps Secrets sync configuration endpoint can be imported using the `name`, e.g.\n\n```sh\n$ pulumi import vault:secrets/syncGithubApps:SyncGithubApps gh github-apps\n```\n", "properties": { "appId": { "type": "integer", @@ -32189,7 +32189,7 @@ } }, "vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId": { - "description": "Reads the Role ID of an AppRole from a Vault server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nexport = async () =\u003e {\n const role = await vault.appRole.getAuthBackendRoleId({\n backend: \"my-approle-backend\",\n roleName: \"my-role\",\n });\n return {\n \"role-id\": role.roleId,\n };\n}\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nrole = vault.appRole.get_auth_backend_role_id(backend=\"my-approle-backend\",\n role_name=\"my-role\")\npulumi.export(\"role-id\", role.role_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var role = Vault.AppRole.GetAuthBackendRoleId.Invoke(new()\n {\n Backend = \"my-approle-backend\",\n RoleName = \"my-role\",\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"role-id\"] = role.Apply(getAuthBackendRoleIdResult =\u003e getAuthBackendRoleIdResult.RoleId),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/appRole\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\trole, err := appRole.GetAuthBackendRoleId(ctx, \u0026approle.GetAuthBackendRoleIdArgs{\n\t\t\tBackend: pulumi.StringRef(\"my-approle-backend\"),\n\t\t\tRoleName: \"my-role\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"role-id\", role.RoleId)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.appRole.AppRoleFunctions;\nimport com.pulumi.vault.appRole.inputs.GetAuthBackendRoleIdArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var role = AppRoleFunctions.getAuthBackendRoleId(GetAuthBackendRoleIdArgs.builder()\n .backend(\"my-approle-backend\")\n .roleName(\"my-role\")\n .build());\n\n ctx.export(\"role-id\", role.applyValue(getAuthBackendRoleIdResult -\u003e getAuthBackendRoleIdResult.roleId()));\n }\n}\n```\n```yaml\nvariables:\n role:\n fn::invoke:\n Function: vault:appRole:getAuthBackendRoleId\n Arguments:\n backend: my-approle-backend\n roleName: my-role\noutputs:\n role-id: ${role.roleId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Reads the Role ID of an AppRole from a Vault server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nexport = async () =\u003e {\n const role = await vault.appRole.getAuthBackendRoleId({\n backend: \"my-approle-backend\",\n roleName: \"my-role\",\n });\n return {\n \"role-id\": role.roleId,\n };\n}\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nrole = vault.appRole.get_auth_backend_role_id(backend=\"my-approle-backend\",\n role_name=\"my-role\")\npulumi.export(\"role-id\", role.role_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var role = Vault.AppRole.GetAuthBackendRoleId.Invoke(new()\n {\n Backend = \"my-approle-backend\",\n RoleName = \"my-role\",\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"role-id\"] = role.Apply(getAuthBackendRoleIdResult =\u003e getAuthBackendRoleIdResult.RoleId),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/appRole\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\trole, err := appRole.GetAuthBackendRoleId(ctx, \u0026approle.GetAuthBackendRoleIdArgs{\n\t\t\tBackend: pulumi.StringRef(\"my-approle-backend\"),\n\t\t\tRoleName: \"my-role\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"role-id\", role.RoleId)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.appRole.AppRoleFunctions;\nimport com.pulumi.vault.appRole.inputs.GetAuthBackendRoleIdArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var role = AppRoleFunctions.getAuthBackendRoleId(GetAuthBackendRoleIdArgs.builder()\n .backend(\"my-approle-backend\")\n .roleName(\"my-role\")\n .build());\n\n ctx.export(\"role-id\", role.applyValue(getAuthBackendRoleIdResult -\u003e getAuthBackendRoleIdResult.roleId()));\n }\n}\n```\n```yaml\nvariables:\n role:\n fn::invoke:\n function: vault:appRole:getAuthBackendRoleId\n arguments:\n backend: my-approle-backend\n roleName: my-role\noutputs:\n role-id: ${role.roleId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getAuthBackendRoleId.\n", "properties": { @@ -32244,7 +32244,7 @@ } }, "vault:aws/getAccessCredentials:getAccessCredentials": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```yaml\nresources:\n aws:\n type: vault:aws:SecretBackend\n properties:\n accessKey: AKIA.....\n secretKey: SECRETKEYFROMAWS\n role:\n type: vault:aws:SecretBackendRole\n properties:\n backend: ${aws.path}\n name: test\n policy: |\n {\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"iam:*\",\n \"Resource\": \"*\"\n }\n ]\n }\nvariables:\n # generally, these blocks would be in a different module\n creds:\n fn::invoke:\n Function: vault:aws:getAccessCredentials\n Arguments:\n backend: ${aws.path}\n role: ${role.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```yaml\nresources:\n aws:\n type: vault:aws:SecretBackend\n properties:\n accessKey: AKIA.....\n secretKey: SECRETKEYFROMAWS\n role:\n type: vault:aws:SecretBackendRole\n properties:\n backend: ${aws.path}\n name: test\n policy: |\n {\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": \"iam:*\",\n \"Resource\": \"*\"\n }\n ]\n }\nvariables:\n # generally, these blocks would be in a different module\n creds:\n fn::invoke:\n function: vault:aws:getAccessCredentials\n arguments:\n backend: ${aws.path}\n role: ${role.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getAccessCredentials.\n", "properties": { @@ -32415,7 +32415,7 @@ } }, "vault:azure/getAccessCredentials:getAccessCredentials": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst creds = vault.azure.getAccessCredentials({\n role: \"my-role\",\n validateCreds: true,\n numSequentialSuccesses: 8,\n numSecondsBetweenTests: 1,\n maxCredValidationSeconds: 300,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ncreds = vault.azure.get_access_credentials(role=\"my-role\",\n validate_creds=True,\n num_sequential_successes=8,\n num_seconds_between_tests=1,\n max_cred_validation_seconds=300)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var creds = Vault.Azure.GetAccessCredentials.Invoke(new()\n {\n Role = \"my-role\",\n ValidateCreds = true,\n NumSequentialSuccesses = 8,\n NumSecondsBetweenTests = 1,\n MaxCredValidationSeconds = 300,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/azure\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := azure.GetAccessCredentials(ctx, \u0026azure.GetAccessCredentialsArgs{\n\t\t\tRole: \"my-role\",\n\t\t\tValidateCreds: pulumi.BoolRef(true),\n\t\t\tNumSequentialSuccesses: pulumi.IntRef(8),\n\t\t\tNumSecondsBetweenTests: pulumi.IntRef(1),\n\t\t\tMaxCredValidationSeconds: pulumi.IntRef(300),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.azure.AzureFunctions;\nimport com.pulumi.vault.azure.inputs.GetAccessCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var creds = AzureFunctions.getAccessCredentials(GetAccessCredentialsArgs.builder()\n .role(\"my-role\")\n .validateCreds(true)\n .numSequentialSuccesses(8)\n .numSecondsBetweenTests(1)\n .maxCredValidationSeconds(300)\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n creds:\n fn::invoke:\n Function: vault:azure:getAccessCredentials\n Arguments:\n role: my-role\n validateCreds: true\n numSequentialSuccesses: 8\n numSecondsBetweenTests: 1\n maxCredValidationSeconds: 300\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Caveats\n\nThe `validate_creds` option requires read-access to the `backend` config endpoint.\nIf the effective Vault role does not have the required permissions then valid values \nare required to be set for: `subscription_id`, `tenant_id`, `environment`.\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst creds = vault.azure.getAccessCredentials({\n role: \"my-role\",\n validateCreds: true,\n numSequentialSuccesses: 8,\n numSecondsBetweenTests: 1,\n maxCredValidationSeconds: 300,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ncreds = vault.azure.get_access_credentials(role=\"my-role\",\n validate_creds=True,\n num_sequential_successes=8,\n num_seconds_between_tests=1,\n max_cred_validation_seconds=300)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var creds = Vault.Azure.GetAccessCredentials.Invoke(new()\n {\n Role = \"my-role\",\n ValidateCreds = true,\n NumSequentialSuccesses = 8,\n NumSecondsBetweenTests = 1,\n MaxCredValidationSeconds = 300,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/azure\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := azure.GetAccessCredentials(ctx, \u0026azure.GetAccessCredentialsArgs{\n\t\t\tRole: \"my-role\",\n\t\t\tValidateCreds: pulumi.BoolRef(true),\n\t\t\tNumSequentialSuccesses: pulumi.IntRef(8),\n\t\t\tNumSecondsBetweenTests: pulumi.IntRef(1),\n\t\t\tMaxCredValidationSeconds: pulumi.IntRef(300),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.azure.AzureFunctions;\nimport com.pulumi.vault.azure.inputs.GetAccessCredentialsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var creds = AzureFunctions.getAccessCredentials(GetAccessCredentialsArgs.builder()\n .role(\"my-role\")\n .validateCreds(true)\n .numSequentialSuccesses(8)\n .numSecondsBetweenTests(1)\n .maxCredValidationSeconds(300)\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n creds:\n fn::invoke:\n function: vault:azure:getAccessCredentials\n arguments:\n role: my-role\n validateCreds: true\n numSequentialSuccesses: 8\n numSecondsBetweenTests: 1\n maxCredValidationSeconds: 300\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Caveats\n\nThe `validate_creds` option requires read-access to the `backend` config endpoint.\nIf the effective Vault role does not have the required permissions then valid values \nare required to be set for: `subscription_id`, `tenant_id`, `environment`.\n", "inputs": { "description": "A collection of arguments for invoking getAccessCredentials.\n", "properties": { @@ -32543,7 +32543,7 @@ } }, "vault:gcp/getAuthBackendRole:getAuthBackendRole": { - "description": "Reads a GCP auth role from a Vault server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nexport = async () =\u003e {\n const role = await vault.gcp.getAuthBackendRole({\n backend: \"my-gcp-backend\",\n roleName: \"my-role\",\n });\n return {\n \"role-id\": role.roleId,\n };\n}\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nrole = vault.gcp.get_auth_backend_role(backend=\"my-gcp-backend\",\n role_name=\"my-role\")\npulumi.export(\"role-id\", role.role_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var role = Vault.Gcp.GetAuthBackendRole.Invoke(new()\n {\n Backend = \"my-gcp-backend\",\n RoleName = \"my-role\",\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"role-id\"] = role.Apply(getAuthBackendRoleResult =\u003e getAuthBackendRoleResult.RoleId),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\trole, err := gcp.LookupAuthBackendRole(ctx, \u0026gcp.LookupAuthBackendRoleArgs{\n\t\t\tBackend: pulumi.StringRef(\"my-gcp-backend\"),\n\t\t\tRoleName: \"my-role\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"role-id\", role.RoleId)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.gcp.GcpFunctions;\nimport com.pulumi.vault.gcp.inputs.GetAuthBackendRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var role = GcpFunctions.getAuthBackendRole(GetAuthBackendRoleArgs.builder()\n .backend(\"my-gcp-backend\")\n .roleName(\"my-role\")\n .build());\n\n ctx.export(\"role-id\", role.applyValue(getAuthBackendRoleResult -\u003e getAuthBackendRoleResult.roleId()));\n }\n}\n```\n```yaml\nvariables:\n role:\n fn::invoke:\n Function: vault:gcp:getAuthBackendRole\n Arguments:\n backend: my-gcp-backend\n roleName: my-role\noutputs:\n role-id: ${role.roleId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "Reads a GCP auth role from a Vault server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nexport = async () =\u003e {\n const role = await vault.gcp.getAuthBackendRole({\n backend: \"my-gcp-backend\",\n roleName: \"my-role\",\n });\n return {\n \"role-id\": role.roleId,\n };\n}\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nrole = vault.gcp.get_auth_backend_role(backend=\"my-gcp-backend\",\n role_name=\"my-role\")\npulumi.export(\"role-id\", role.role_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var role = Vault.Gcp.GetAuthBackendRole.Invoke(new()\n {\n Backend = \"my-gcp-backend\",\n RoleName = \"my-role\",\n });\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"role-id\"] = role.Apply(getAuthBackendRoleResult =\u003e getAuthBackendRoleResult.RoleId),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\trole, err := gcp.LookupAuthBackendRole(ctx, \u0026gcp.LookupAuthBackendRoleArgs{\n\t\t\tBackend: pulumi.StringRef(\"my-gcp-backend\"),\n\t\t\tRoleName: \"my-role\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"role-id\", role.RoleId)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.gcp.GcpFunctions;\nimport com.pulumi.vault.gcp.inputs.GetAuthBackendRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var role = GcpFunctions.getAuthBackendRole(GetAuthBackendRoleArgs.builder()\n .backend(\"my-gcp-backend\")\n .roleName(\"my-role\")\n .build());\n\n ctx.export(\"role-id\", role.applyValue(getAuthBackendRoleResult -\u003e getAuthBackendRoleResult.roleId()));\n }\n}\n```\n```yaml\nvariables:\n role:\n fn::invoke:\n function: vault:gcp:getAuthBackendRole\n arguments:\n backend: my-gcp-backend\n roleName: my-role\noutputs:\n role-id: ${role.roleId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getAuthBackendRole.\n", "properties": { @@ -32735,7 +32735,7 @@ } }, "vault:generic/getSecret:getSecret": { - "description": "## Example Usage\n\n### Generic secret\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst rundeckAuth = vault.generic.getSecret({\n path: \"secret/rundeck_auth\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nrundeck_auth = vault.generic.get_secret(path=\"secret/rundeck_auth\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var rundeckAuth = Vault.Generic.GetSecret.Invoke(new()\n {\n Path = \"secret/rundeck_auth\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/generic\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := generic.LookupSecret(ctx, \u0026generic.LookupSecretArgs{\n\t\t\tPath: \"secret/rundeck_auth\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.generic.GenericFunctions;\nimport com.pulumi.vault.generic.inputs.GetSecretArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var rundeckAuth = GenericFunctions.getSecret(GetSecretArgs.builder()\n .path(\"secret/rundeck_auth\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n rundeckAuth:\n fn::invoke:\n Function: vault:generic:getSecret\n Arguments:\n path: secret/rundeck_auth\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### KV \n\nFor this example, consider `example` as a path for a KV engine.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nfunction notImplemented(message: string) {\n throw new Error(message);\n}\n\nconst exampleCreds = vault.generic.getSecret({\n path: \"example/creds\",\n});\nconst exampleTemplate = notImplemented(\"The template_file data resource is not yet supported.\");\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\n\ndef not_implemented(msg):\n raise NotImplementedError(msg)\n\nexample_creds = vault.generic.get_secret(path=\"example/creds\")\nexample_template = not_implemented(\"The template_file data resource is not yet supported.\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\n\t\nobject NotImplemented(string errorMessage) \n{\n throw new System.NotImplementedException(errorMessage);\n}\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleCreds = Vault.Generic.GetSecret.Invoke(new()\n {\n Path = \"example/creds\",\n });\n\n var exampleTemplate = NotImplemented(\"The template_file data resource is not yet supported.\");\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/generic\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc notImplemented(message string) pulumi.AnyOutput {\n\tpanic(message)\n}\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := generic.LookupSecret(ctx, \u0026generic.LookupSecretArgs{\n\t\t\tPath: \"example/creds\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = notImplemented(\"The template_file data resource is not yet supported.\")\n\t\treturn nil\n\t})\n}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `read` capability on the given path.\n", + "description": "## Example Usage\n\n### Generic secret\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst rundeckAuth = vault.generic.getSecret({\n path: \"secret/rundeck_auth\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nrundeck_auth = vault.generic.get_secret(path=\"secret/rundeck_auth\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var rundeckAuth = Vault.Generic.GetSecret.Invoke(new()\n {\n Path = \"secret/rundeck_auth\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/generic\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := generic.LookupSecret(ctx, \u0026generic.LookupSecretArgs{\n\t\t\tPath: \"secret/rundeck_auth\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.generic.GenericFunctions;\nimport com.pulumi.vault.generic.inputs.GetSecretArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var rundeckAuth = GenericFunctions.getSecret(GetSecretArgs.builder()\n .path(\"secret/rundeck_auth\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n rundeckAuth:\n fn::invoke:\n function: vault:generic:getSecret\n arguments:\n path: secret/rundeck_auth\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### KV \n\nFor this example, consider `example` as a path for a KV engine.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nfunction notImplemented(message: string) {\n throw new Error(message);\n}\n\nconst exampleCreds = vault.generic.getSecret({\n path: \"example/creds\",\n});\nconst exampleTemplate = notImplemented(\"The template_file data resource is not yet supported.\");\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\n\ndef not_implemented(msg):\n raise NotImplementedError(msg)\n\nexample_creds = vault.generic.get_secret(path=\"example/creds\")\nexample_template = not_implemented(\"The template_file data resource is not yet supported.\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\n\t\nobject NotImplemented(string errorMessage) \n{\n throw new System.NotImplementedException(errorMessage);\n}\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var exampleCreds = Vault.Generic.GetSecret.Invoke(new()\n {\n Path = \"example/creds\",\n });\n\n var exampleTemplate = NotImplemented(\"The template_file data resource is not yet supported.\");\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/generic\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc notImplemented(message string) pulumi.AnyOutput {\n\tpanic(message)\n}\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := generic.LookupSecret(ctx, \u0026generic.LookupSecretArgs{\n\t\t\tPath: \"example/creds\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = notImplemented(\"The template_file data resource is not yet supported.\")\n\t\treturn nil\n\t})\n}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `read` capability on the given path.\n", "inputs": { "description": "A collection of arguments for invoking getSecret.\n", "properties": { @@ -32823,7 +32823,7 @@ } }, "vault:identity/getEntity:getEntity": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst entity = vault.identity.getEntity({\n entityName: \"entity_12345\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nentity = vault.identity.get_entity(entity_name=\"entity_12345\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var entity = Vault.Identity.GetEntity.Invoke(new()\n {\n EntityName = \"entity_12345\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/identity\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := identity.LookupEntity(ctx, \u0026identity.LookupEntityArgs{\n\t\t\tEntityName: pulumi.StringRef(\"entity_12345\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.identity.IdentityFunctions;\nimport com.pulumi.vault.identity.inputs.GetEntityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var entity = IdentityFunctions.getEntity(GetEntityArgs.builder()\n .entityName(\"entity_12345\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n entity:\n fn::invoke:\n Function: vault:identity:getEntity\n Arguments:\n entityName: entity_12345\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `update` capability on `/identity/lookup/entity`.\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst entity = vault.identity.getEntity({\n entityName: \"entity_12345\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nentity = vault.identity.get_entity(entity_name=\"entity_12345\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var entity = Vault.Identity.GetEntity.Invoke(new()\n {\n EntityName = \"entity_12345\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/identity\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := identity.LookupEntity(ctx, \u0026identity.LookupEntityArgs{\n\t\t\tEntityName: pulumi.StringRef(\"entity_12345\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.identity.IdentityFunctions;\nimport com.pulumi.vault.identity.inputs.GetEntityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var entity = IdentityFunctions.getEntity(GetEntityArgs.builder()\n .entityName(\"entity_12345\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n entity:\n fn::invoke:\n function: vault:identity:getEntity\n arguments:\n entityName: entity_12345\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `update` capability on `/identity/lookup/entity`.\n", "inputs": { "description": "A collection of arguments for invoking getEntity.\n", "properties": { @@ -32974,7 +32974,7 @@ } }, "vault:identity/getGroup:getGroup": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst group = vault.identity.getGroup({\n groupName: \"user\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ngroup = vault.identity.get_group(group_name=\"user\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var @group = Vault.Identity.GetGroup.Invoke(new()\n {\n GroupName = \"user\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/identity\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := identity.LookupGroup(ctx, \u0026identity.LookupGroupArgs{\n\t\t\tGroupName: pulumi.StringRef(\"user\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.identity.IdentityFunctions;\nimport com.pulumi.vault.identity.inputs.GetGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var group = IdentityFunctions.getGroup(GetGroupArgs.builder()\n .groupName(\"user\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n group:\n fn::invoke:\n Function: vault:identity:getGroup\n Arguments:\n groupName: user\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `create` capability on `/identity/lookup/group`.\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst group = vault.identity.getGroup({\n groupName: \"user\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ngroup = vault.identity.get_group(group_name=\"user\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var @group = Vault.Identity.GetGroup.Invoke(new()\n {\n GroupName = \"user\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/identity\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := identity.LookupGroup(ctx, \u0026identity.LookupGroupArgs{\n\t\t\tGroupName: pulumi.StringRef(\"user\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.identity.IdentityFunctions;\nimport com.pulumi.vault.identity.inputs.GetGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var group = IdentityFunctions.getGroup(GetGroupArgs.builder()\n .groupName(\"user\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n group:\n fn::invoke:\n function: vault:identity:getGroup\n arguments:\n groupName: user\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `create` capability on `/identity/lookup/group`.\n", "inputs": { "description": "A collection of arguments for invoking getGroup.\n", "properties": { @@ -33155,7 +33155,7 @@ } }, "vault:identity/getOidcClientCreds:getOidcClientCreds": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst app = new vault.identity.OidcClient(\"app\", {\n name: \"application\",\n redirectUris: [\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n ],\n idTokenTtl: 2400,\n accessTokenTtl: 7200,\n});\nconst creds = vault.identity.getOidcClientCredsOutput({\n name: app.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\napp = vault.identity.OidcClient(\"app\",\n name=\"application\",\n redirect_uris=[\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n ],\n id_token_ttl=2400,\n access_token_ttl=7200)\ncreds = vault.identity.get_oidc_client_creds_output(name=app.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var app = new Vault.Identity.OidcClient(\"app\", new()\n {\n Name = \"application\",\n RedirectUris = new[]\n {\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n },\n IdTokenTtl = 2400,\n AccessTokenTtl = 7200,\n });\n\n var creds = Vault.Identity.GetOidcClientCreds.Invoke(new()\n {\n Name = app.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/identity\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tapp, err := identity.NewOidcClient(ctx, \"app\", \u0026identity.OidcClientArgs{\n\t\t\tName: pulumi.String(\"application\"),\n\t\t\tRedirectUris: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\"),\n\t\t\t\tpulumi.String(\"http://127.0.0.1:8251/callback\"),\n\t\t\t\tpulumi.String(\"http://127.0.0.1:8080/callback\"),\n\t\t\t},\n\t\t\tIdTokenTtl: pulumi.Int(2400),\n\t\t\tAccessTokenTtl: pulumi.Int(7200),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = identity.GetOidcClientCredsOutput(ctx, identity.GetOidcClientCredsOutputArgs{\n\t\t\tName: app.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.identity.OidcClient;\nimport com.pulumi.vault.identity.OidcClientArgs;\nimport com.pulumi.vault.identity.IdentityFunctions;\nimport com.pulumi.vault.identity.inputs.GetOidcClientCredsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var app = new OidcClient(\"app\", OidcClientArgs.builder()\n .name(\"application\")\n .redirectUris( \n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\")\n .idTokenTtl(2400)\n .accessTokenTtl(7200)\n .build());\n\n final var creds = IdentityFunctions.getOidcClientCreds(GetOidcClientCredsArgs.builder()\n .name(app.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n app:\n type: vault:identity:OidcClient\n properties:\n name: application\n redirectUris:\n - http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\n - http://127.0.0.1:8251/callback\n - http://127.0.0.1:8080/callback\n idTokenTtl: 2400\n accessTokenTtl: 7200\nvariables:\n creds:\n fn::invoke:\n Function: vault:identity:getOidcClientCreds\n Arguments:\n name: ${app.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst app = new vault.identity.OidcClient(\"app\", {\n name: \"application\",\n redirectUris: [\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n ],\n idTokenTtl: 2400,\n accessTokenTtl: 7200,\n});\nconst creds = vault.identity.getOidcClientCredsOutput({\n name: app.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\napp = vault.identity.OidcClient(\"app\",\n name=\"application\",\n redirect_uris=[\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n ],\n id_token_ttl=2400,\n access_token_ttl=7200)\ncreds = vault.identity.get_oidc_client_creds_output(name=app.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var app = new Vault.Identity.OidcClient(\"app\", new()\n {\n Name = \"application\",\n RedirectUris = new[]\n {\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n },\n IdTokenTtl = 2400,\n AccessTokenTtl = 7200,\n });\n\n var creds = Vault.Identity.GetOidcClientCreds.Invoke(new()\n {\n Name = app.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/identity\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tapp, err := identity.NewOidcClient(ctx, \"app\", \u0026identity.OidcClientArgs{\n\t\t\tName: pulumi.String(\"application\"),\n\t\t\tRedirectUris: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\"),\n\t\t\t\tpulumi.String(\"http://127.0.0.1:8251/callback\"),\n\t\t\t\tpulumi.String(\"http://127.0.0.1:8080/callback\"),\n\t\t\t},\n\t\t\tIdTokenTtl: pulumi.Int(2400),\n\t\t\tAccessTokenTtl: pulumi.Int(7200),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = identity.GetOidcClientCredsOutput(ctx, identity.GetOidcClientCredsOutputArgs{\n\t\t\tName: app.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.identity.OidcClient;\nimport com.pulumi.vault.identity.OidcClientArgs;\nimport com.pulumi.vault.identity.IdentityFunctions;\nimport com.pulumi.vault.identity.inputs.GetOidcClientCredsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var app = new OidcClient(\"app\", OidcClientArgs.builder()\n .name(\"application\")\n .redirectUris( \n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\")\n .idTokenTtl(2400)\n .accessTokenTtl(7200)\n .build());\n\n final var creds = IdentityFunctions.getOidcClientCreds(GetOidcClientCredsArgs.builder()\n .name(app.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n app:\n type: vault:identity:OidcClient\n properties:\n name: application\n redirectUris:\n - http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\n - http://127.0.0.1:8251/callback\n - http://127.0.0.1:8080/callback\n idTokenTtl: 2400\n accessTokenTtl: 7200\nvariables:\n creds:\n fn::invoke:\n function: vault:identity:getOidcClientCreds\n arguments:\n name: ${app.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getOidcClientCreds.\n", "properties": { @@ -33207,7 +33207,7 @@ } }, "vault:identity/getOidcOpenidConfig:getOidcOpenidConfig": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst key = new vault.identity.OidcKey(\"key\", {\n name: \"key\",\n allowedClientIds: [\"*\"],\n rotationPeriod: 3600,\n verificationTtl: 3600,\n});\nconst app = new vault.identity.OidcClient(\"app\", {\n name: \"application\",\n key: key.name,\n redirectUris: [\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n ],\n idTokenTtl: 2400,\n accessTokenTtl: 7200,\n});\nconst provider = new vault.identity.OidcProvider(\"provider\", {\n name: \"provider\",\n allowedClientIds: [test.clientId],\n});\nconst config = vault.identity.getOidcOpenidConfigOutput({\n name: provider.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nkey = vault.identity.OidcKey(\"key\",\n name=\"key\",\n allowed_client_ids=[\"*\"],\n rotation_period=3600,\n verification_ttl=3600)\napp = vault.identity.OidcClient(\"app\",\n name=\"application\",\n key=key.name,\n redirect_uris=[\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n ],\n id_token_ttl=2400,\n access_token_ttl=7200)\nprovider = vault.identity.OidcProvider(\"provider\",\n name=\"provider\",\n allowed_client_ids=[test[\"clientId\"]])\nconfig = vault.identity.get_oidc_openid_config_output(name=provider.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var key = new Vault.Identity.OidcKey(\"key\", new()\n {\n Name = \"key\",\n AllowedClientIds = new[]\n {\n \"*\",\n },\n RotationPeriod = 3600,\n VerificationTtl = 3600,\n });\n\n var app = new Vault.Identity.OidcClient(\"app\", new()\n {\n Name = \"application\",\n Key = key.Name,\n RedirectUris = new[]\n {\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n },\n IdTokenTtl = 2400,\n AccessTokenTtl = 7200,\n });\n\n var provider = new Vault.Identity.OidcProvider(\"provider\", new()\n {\n Name = \"provider\",\n AllowedClientIds = new[]\n {\n test.ClientId,\n },\n });\n\n var config = Vault.Identity.GetOidcOpenidConfig.Invoke(new()\n {\n Name = provider.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/identity\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkey, err := identity.NewOidcKey(ctx, \"key\", \u0026identity.OidcKeyArgs{\n\t\t\tName: pulumi.String(\"key\"),\n\t\t\tAllowedClientIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"*\"),\n\t\t\t},\n\t\t\tRotationPeriod: pulumi.Int(3600),\n\t\t\tVerificationTtl: pulumi.Int(3600),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = identity.NewOidcClient(ctx, \"app\", \u0026identity.OidcClientArgs{\n\t\t\tName: pulumi.String(\"application\"),\n\t\t\tKey: key.Name,\n\t\t\tRedirectUris: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\"),\n\t\t\t\tpulumi.String(\"http://127.0.0.1:8251/callback\"),\n\t\t\t\tpulumi.String(\"http://127.0.0.1:8080/callback\"),\n\t\t\t},\n\t\t\tIdTokenTtl: pulumi.Int(2400),\n\t\t\tAccessTokenTtl: pulumi.Int(7200),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprovider, err := identity.NewOidcProvider(ctx, \"provider\", \u0026identity.OidcProviderArgs{\n\t\t\tName: pulumi.String(\"provider\"),\n\t\t\tAllowedClientIds: pulumi.StringArray{\n\t\t\t\ttest.ClientId,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = identity.GetOidcOpenidConfigOutput(ctx, identity.GetOidcOpenidConfigOutputArgs{\n\t\t\tName: provider.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.identity.OidcKey;\nimport com.pulumi.vault.identity.OidcKeyArgs;\nimport com.pulumi.vault.identity.OidcClient;\nimport com.pulumi.vault.identity.OidcClientArgs;\nimport com.pulumi.vault.identity.OidcProvider;\nimport com.pulumi.vault.identity.OidcProviderArgs;\nimport com.pulumi.vault.identity.IdentityFunctions;\nimport com.pulumi.vault.identity.inputs.GetOidcOpenidConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var key = new OidcKey(\"key\", OidcKeyArgs.builder()\n .name(\"key\")\n .allowedClientIds(\"*\")\n .rotationPeriod(3600)\n .verificationTtl(3600)\n .build());\n\n var app = new OidcClient(\"app\", OidcClientArgs.builder()\n .name(\"application\")\n .key(key.name())\n .redirectUris( \n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\")\n .idTokenTtl(2400)\n .accessTokenTtl(7200)\n .build());\n\n var provider = new OidcProvider(\"provider\", OidcProviderArgs.builder()\n .name(\"provider\")\n .allowedClientIds(test.clientId())\n .build());\n\n final var config = IdentityFunctions.getOidcOpenidConfig(GetOidcOpenidConfigArgs.builder()\n .name(provider.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n key:\n type: vault:identity:OidcKey\n properties:\n name: key\n allowedClientIds:\n - '*'\n rotationPeriod: 3600\n verificationTtl: 3600\n app:\n type: vault:identity:OidcClient\n properties:\n name: application\n key: ${key.name}\n redirectUris:\n - http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\n - http://127.0.0.1:8251/callback\n - http://127.0.0.1:8080/callback\n idTokenTtl: 2400\n accessTokenTtl: 7200\n provider:\n type: vault:identity:OidcProvider\n properties:\n name: provider\n allowedClientIds:\n - ${test.clientId}\nvariables:\n config:\n fn::invoke:\n Function: vault:identity:getOidcOpenidConfig\n Arguments:\n name: ${provider.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst key = new vault.identity.OidcKey(\"key\", {\n name: \"key\",\n allowedClientIds: [\"*\"],\n rotationPeriod: 3600,\n verificationTtl: 3600,\n});\nconst app = new vault.identity.OidcClient(\"app\", {\n name: \"application\",\n key: key.name,\n redirectUris: [\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n ],\n idTokenTtl: 2400,\n accessTokenTtl: 7200,\n});\nconst provider = new vault.identity.OidcProvider(\"provider\", {\n name: \"provider\",\n allowedClientIds: [test.clientId],\n});\nconst config = vault.identity.getOidcOpenidConfigOutput({\n name: provider.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nkey = vault.identity.OidcKey(\"key\",\n name=\"key\",\n allowed_client_ids=[\"*\"],\n rotation_period=3600,\n verification_ttl=3600)\napp = vault.identity.OidcClient(\"app\",\n name=\"application\",\n key=key.name,\n redirect_uris=[\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n ],\n id_token_ttl=2400,\n access_token_ttl=7200)\nprovider = vault.identity.OidcProvider(\"provider\",\n name=\"provider\",\n allowed_client_ids=[test[\"clientId\"]])\nconfig = vault.identity.get_oidc_openid_config_output(name=provider.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var key = new Vault.Identity.OidcKey(\"key\", new()\n {\n Name = \"key\",\n AllowedClientIds = new[]\n {\n \"*\",\n },\n RotationPeriod = 3600,\n VerificationTtl = 3600,\n });\n\n var app = new Vault.Identity.OidcClient(\"app\", new()\n {\n Name = \"application\",\n Key = key.Name,\n RedirectUris = new[]\n {\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n },\n IdTokenTtl = 2400,\n AccessTokenTtl = 7200,\n });\n\n var provider = new Vault.Identity.OidcProvider(\"provider\", new()\n {\n Name = \"provider\",\n AllowedClientIds = new[]\n {\n test.ClientId,\n },\n });\n\n var config = Vault.Identity.GetOidcOpenidConfig.Invoke(new()\n {\n Name = provider.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/identity\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkey, err := identity.NewOidcKey(ctx, \"key\", \u0026identity.OidcKeyArgs{\n\t\t\tName: pulumi.String(\"key\"),\n\t\t\tAllowedClientIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"*\"),\n\t\t\t},\n\t\t\tRotationPeriod: pulumi.Int(3600),\n\t\t\tVerificationTtl: pulumi.Int(3600),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = identity.NewOidcClient(ctx, \"app\", \u0026identity.OidcClientArgs{\n\t\t\tName: pulumi.String(\"application\"),\n\t\t\tKey: key.Name,\n\t\t\tRedirectUris: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\"),\n\t\t\t\tpulumi.String(\"http://127.0.0.1:8251/callback\"),\n\t\t\t\tpulumi.String(\"http://127.0.0.1:8080/callback\"),\n\t\t\t},\n\t\t\tIdTokenTtl: pulumi.Int(2400),\n\t\t\tAccessTokenTtl: pulumi.Int(7200),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprovider, err := identity.NewOidcProvider(ctx, \"provider\", \u0026identity.OidcProviderArgs{\n\t\t\tName: pulumi.String(\"provider\"),\n\t\t\tAllowedClientIds: pulumi.StringArray{\n\t\t\t\ttest.ClientId,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = identity.GetOidcOpenidConfigOutput(ctx, identity.GetOidcOpenidConfigOutputArgs{\n\t\t\tName: provider.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.identity.OidcKey;\nimport com.pulumi.vault.identity.OidcKeyArgs;\nimport com.pulumi.vault.identity.OidcClient;\nimport com.pulumi.vault.identity.OidcClientArgs;\nimport com.pulumi.vault.identity.OidcProvider;\nimport com.pulumi.vault.identity.OidcProviderArgs;\nimport com.pulumi.vault.identity.IdentityFunctions;\nimport com.pulumi.vault.identity.inputs.GetOidcOpenidConfigArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var key = new OidcKey(\"key\", OidcKeyArgs.builder()\n .name(\"key\")\n .allowedClientIds(\"*\")\n .rotationPeriod(3600)\n .verificationTtl(3600)\n .build());\n\n var app = new OidcClient(\"app\", OidcClientArgs.builder()\n .name(\"application\")\n .key(key.name())\n .redirectUris( \n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\")\n .idTokenTtl(2400)\n .accessTokenTtl(7200)\n .build());\n\n var provider = new OidcProvider(\"provider\", OidcProviderArgs.builder()\n .name(\"provider\")\n .allowedClientIds(test.clientId())\n .build());\n\n final var config = IdentityFunctions.getOidcOpenidConfig(GetOidcOpenidConfigArgs.builder()\n .name(provider.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n key:\n type: vault:identity:OidcKey\n properties:\n name: key\n allowedClientIds:\n - '*'\n rotationPeriod: 3600\n verificationTtl: 3600\n app:\n type: vault:identity:OidcClient\n properties:\n name: application\n key: ${key.name}\n redirectUris:\n - http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\n - http://127.0.0.1:8251/callback\n - http://127.0.0.1:8080/callback\n idTokenTtl: 2400\n accessTokenTtl: 7200\n provider:\n type: vault:identity:OidcProvider\n properties:\n name: provider\n allowedClientIds:\n - ${test.clientId}\nvariables:\n config:\n fn::invoke:\n function: vault:identity:getOidcOpenidConfig\n arguments:\n name: ${provider.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getOidcOpenidConfig.\n", "properties": { @@ -33326,7 +33326,7 @@ } }, "vault:identity/getOidcPublicKeys:getOidcPublicKeys": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst key = new vault.identity.OidcKey(\"key\", {\n name: \"key\",\n allowedClientIds: [\"*\"],\n rotationPeriod: 3600,\n verificationTtl: 3600,\n});\nconst app = new vault.identity.OidcClient(\"app\", {\n name: \"application\",\n key: key.name,\n redirectUris: [\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n ],\n idTokenTtl: 2400,\n accessTokenTtl: 7200,\n});\nconst provider = new vault.identity.OidcProvider(\"provider\", {\n name: \"provider\",\n allowedClientIds: [test.clientId],\n});\nconst publicKeys = vault.identity.getOidcPublicKeysOutput({\n name: provider.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nkey = vault.identity.OidcKey(\"key\",\n name=\"key\",\n allowed_client_ids=[\"*\"],\n rotation_period=3600,\n verification_ttl=3600)\napp = vault.identity.OidcClient(\"app\",\n name=\"application\",\n key=key.name,\n redirect_uris=[\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n ],\n id_token_ttl=2400,\n access_token_ttl=7200)\nprovider = vault.identity.OidcProvider(\"provider\",\n name=\"provider\",\n allowed_client_ids=[test[\"clientId\"]])\npublic_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var key = new Vault.Identity.OidcKey(\"key\", new()\n {\n Name = \"key\",\n AllowedClientIds = new[]\n {\n \"*\",\n },\n RotationPeriod = 3600,\n VerificationTtl = 3600,\n });\n\n var app = new Vault.Identity.OidcClient(\"app\", new()\n {\n Name = \"application\",\n Key = key.Name,\n RedirectUris = new[]\n {\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n },\n IdTokenTtl = 2400,\n AccessTokenTtl = 7200,\n });\n\n var provider = new Vault.Identity.OidcProvider(\"provider\", new()\n {\n Name = \"provider\",\n AllowedClientIds = new[]\n {\n test.ClientId,\n },\n });\n\n var publicKeys = Vault.Identity.GetOidcPublicKeys.Invoke(new()\n {\n Name = provider.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/identity\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkey, err := identity.NewOidcKey(ctx, \"key\", \u0026identity.OidcKeyArgs{\n\t\t\tName: pulumi.String(\"key\"),\n\t\t\tAllowedClientIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"*\"),\n\t\t\t},\n\t\t\tRotationPeriod: pulumi.Int(3600),\n\t\t\tVerificationTtl: pulumi.Int(3600),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = identity.NewOidcClient(ctx, \"app\", \u0026identity.OidcClientArgs{\n\t\t\tName: pulumi.String(\"application\"),\n\t\t\tKey: key.Name,\n\t\t\tRedirectUris: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\"),\n\t\t\t\tpulumi.String(\"http://127.0.0.1:8251/callback\"),\n\t\t\t\tpulumi.String(\"http://127.0.0.1:8080/callback\"),\n\t\t\t},\n\t\t\tIdTokenTtl: pulumi.Int(2400),\n\t\t\tAccessTokenTtl: pulumi.Int(7200),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprovider, err := identity.NewOidcProvider(ctx, \"provider\", \u0026identity.OidcProviderArgs{\n\t\t\tName: pulumi.String(\"provider\"),\n\t\t\tAllowedClientIds: pulumi.StringArray{\n\t\t\t\ttest.ClientId,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = identity.GetOidcPublicKeysOutput(ctx, identity.GetOidcPublicKeysOutputArgs{\n\t\t\tName: provider.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.identity.OidcKey;\nimport com.pulumi.vault.identity.OidcKeyArgs;\nimport com.pulumi.vault.identity.OidcClient;\nimport com.pulumi.vault.identity.OidcClientArgs;\nimport com.pulumi.vault.identity.OidcProvider;\nimport com.pulumi.vault.identity.OidcProviderArgs;\nimport com.pulumi.vault.identity.IdentityFunctions;\nimport com.pulumi.vault.identity.inputs.GetOidcPublicKeysArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var key = new OidcKey(\"key\", OidcKeyArgs.builder()\n .name(\"key\")\n .allowedClientIds(\"*\")\n .rotationPeriod(3600)\n .verificationTtl(3600)\n .build());\n\n var app = new OidcClient(\"app\", OidcClientArgs.builder()\n .name(\"application\")\n .key(key.name())\n .redirectUris( \n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\")\n .idTokenTtl(2400)\n .accessTokenTtl(7200)\n .build());\n\n var provider = new OidcProvider(\"provider\", OidcProviderArgs.builder()\n .name(\"provider\")\n .allowedClientIds(test.clientId())\n .build());\n\n final var publicKeys = IdentityFunctions.getOidcPublicKeys(GetOidcPublicKeysArgs.builder()\n .name(provider.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n key:\n type: vault:identity:OidcKey\n properties:\n name: key\n allowedClientIds:\n - '*'\n rotationPeriod: 3600\n verificationTtl: 3600\n app:\n type: vault:identity:OidcClient\n properties:\n name: application\n key: ${key.name}\n redirectUris:\n - http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\n - http://127.0.0.1:8251/callback\n - http://127.0.0.1:8080/callback\n idTokenTtl: 2400\n accessTokenTtl: 7200\n provider:\n type: vault:identity:OidcProvider\n properties:\n name: provider\n allowedClientIds:\n - ${test.clientId}\nvariables:\n publicKeys:\n fn::invoke:\n Function: vault:identity:getOidcPublicKeys\n Arguments:\n name: ${provider.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst key = new vault.identity.OidcKey(\"key\", {\n name: \"key\",\n allowedClientIds: [\"*\"],\n rotationPeriod: 3600,\n verificationTtl: 3600,\n});\nconst app = new vault.identity.OidcClient(\"app\", {\n name: \"application\",\n key: key.name,\n redirectUris: [\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n ],\n idTokenTtl: 2400,\n accessTokenTtl: 7200,\n});\nconst provider = new vault.identity.OidcProvider(\"provider\", {\n name: \"provider\",\n allowedClientIds: [test.clientId],\n});\nconst publicKeys = vault.identity.getOidcPublicKeysOutput({\n name: provider.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nkey = vault.identity.OidcKey(\"key\",\n name=\"key\",\n allowed_client_ids=[\"*\"],\n rotation_period=3600,\n verification_ttl=3600)\napp = vault.identity.OidcClient(\"app\",\n name=\"application\",\n key=key.name,\n redirect_uris=[\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n ],\n id_token_ttl=2400,\n access_token_ttl=7200)\nprovider = vault.identity.OidcProvider(\"provider\",\n name=\"provider\",\n allowed_client_ids=[test[\"clientId\"]])\npublic_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var key = new Vault.Identity.OidcKey(\"key\", new()\n {\n Name = \"key\",\n AllowedClientIds = new[]\n {\n \"*\",\n },\n RotationPeriod = 3600,\n VerificationTtl = 3600,\n });\n\n var app = new Vault.Identity.OidcClient(\"app\", new()\n {\n Name = \"application\",\n Key = key.Name,\n RedirectUris = new[]\n {\n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\",\n },\n IdTokenTtl = 2400,\n AccessTokenTtl = 7200,\n });\n\n var provider = new Vault.Identity.OidcProvider(\"provider\", new()\n {\n Name = \"provider\",\n AllowedClientIds = new[]\n {\n test.ClientId,\n },\n });\n\n var publicKeys = Vault.Identity.GetOidcPublicKeys.Invoke(new()\n {\n Name = provider.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/identity\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkey, err := identity.NewOidcKey(ctx, \"key\", \u0026identity.OidcKeyArgs{\n\t\t\tName: pulumi.String(\"key\"),\n\t\t\tAllowedClientIds: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"*\"),\n\t\t\t},\n\t\t\tRotationPeriod: pulumi.Int(3600),\n\t\t\tVerificationTtl: pulumi.Int(3600),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = identity.NewOidcClient(ctx, \"app\", \u0026identity.OidcClientArgs{\n\t\t\tName: pulumi.String(\"application\"),\n\t\t\tKey: key.Name,\n\t\t\tRedirectUris: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\"),\n\t\t\t\tpulumi.String(\"http://127.0.0.1:8251/callback\"),\n\t\t\t\tpulumi.String(\"http://127.0.0.1:8080/callback\"),\n\t\t\t},\n\t\t\tIdTokenTtl: pulumi.Int(2400),\n\t\t\tAccessTokenTtl: pulumi.Int(7200),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprovider, err := identity.NewOidcProvider(ctx, \"provider\", \u0026identity.OidcProviderArgs{\n\t\t\tName: pulumi.String(\"provider\"),\n\t\t\tAllowedClientIds: pulumi.StringArray{\n\t\t\t\ttest.ClientId,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = identity.GetOidcPublicKeysOutput(ctx, identity.GetOidcPublicKeysOutputArgs{\n\t\t\tName: provider.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.identity.OidcKey;\nimport com.pulumi.vault.identity.OidcKeyArgs;\nimport com.pulumi.vault.identity.OidcClient;\nimport com.pulumi.vault.identity.OidcClientArgs;\nimport com.pulumi.vault.identity.OidcProvider;\nimport com.pulumi.vault.identity.OidcProviderArgs;\nimport com.pulumi.vault.identity.IdentityFunctions;\nimport com.pulumi.vault.identity.inputs.GetOidcPublicKeysArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var key = new OidcKey(\"key\", OidcKeyArgs.builder()\n .name(\"key\")\n .allowedClientIds(\"*\")\n .rotationPeriod(3600)\n .verificationTtl(3600)\n .build());\n\n var app = new OidcClient(\"app\", OidcClientArgs.builder()\n .name(\"application\")\n .key(key.name())\n .redirectUris( \n \"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\",\n \"http://127.0.0.1:8251/callback\",\n \"http://127.0.0.1:8080/callback\")\n .idTokenTtl(2400)\n .accessTokenTtl(7200)\n .build());\n\n var provider = new OidcProvider(\"provider\", OidcProviderArgs.builder()\n .name(\"provider\")\n .allowedClientIds(test.clientId())\n .build());\n\n final var publicKeys = IdentityFunctions.getOidcPublicKeys(GetOidcPublicKeysArgs.builder()\n .name(provider.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n key:\n type: vault:identity:OidcKey\n properties:\n name: key\n allowedClientIds:\n - '*'\n rotationPeriod: 3600\n verificationTtl: 3600\n app:\n type: vault:identity:OidcClient\n properties:\n name: application\n key: ${key.name}\n redirectUris:\n - http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback\n - http://127.0.0.1:8251/callback\n - http://127.0.0.1:8080/callback\n idTokenTtl: 2400\n accessTokenTtl: 7200\n provider:\n type: vault:identity:OidcProvider\n properties:\n name: provider\n allowedClientIds:\n - ${test.clientId}\nvariables:\n publicKeys:\n fn::invoke:\n function: vault:identity:getOidcPublicKeys\n arguments:\n name: ${provider.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getOidcPublicKeys.\n", "properties": { @@ -33378,7 +33378,7 @@ } }, "vault:index/getAuthBackend:getAuthBackend": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst example = vault.getAuthBackend({\n path: \"userpass\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nexample = vault.get_auth_backend(path=\"userpass\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Vault.GetAuthBackend.Invoke(new()\n {\n Path = \"userpass\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.LookupAuthBackend(ctx, \u0026vault.LookupAuthBackendArgs{\n\t\t\tPath: \"userpass\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetAuthBackendArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = VaultFunctions.getAuthBackend(GetAuthBackendArgs.builder()\n .path(\"userpass\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n example:\n fn::invoke:\n Function: vault:getAuthBackend\n Arguments:\n path: userpass\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst example = vault.getAuthBackend({\n path: \"userpass\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nexample = vault.get_auth_backend(path=\"userpass\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Vault.GetAuthBackend.Invoke(new()\n {\n Path = \"userpass\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.LookupAuthBackend(ctx, \u0026vault.LookupAuthBackendArgs{\n\t\t\tPath: \"userpass\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetAuthBackendArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = VaultFunctions.getAuthBackend(GetAuthBackendArgs.builder()\n .path(\"userpass\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n example:\n fn::invoke:\n function: vault:getAuthBackend\n arguments:\n path: userpass\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getAuthBackend.\n", "properties": { @@ -33454,7 +33454,7 @@ } }, "vault:index/getAuthBackends:getAuthBackends": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst example = vault.getAuthBackends({});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nexample = vault.get_auth_backends()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Vault.GetAuthBackends.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.GetAuthBackends(ctx, \u0026vault.GetAuthBackendsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetAuthBackendsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = VaultFunctions.getAuthBackends();\n\n }\n}\n```\n```yaml\nvariables:\n example:\n fn::invoke:\n Function: vault:getAuthBackends\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst example-filter = vault.getAuthBackends({\n type: \"kubernetes\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nexample_filter = vault.get_auth_backends(type=\"kubernetes\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example_filter = Vault.GetAuthBackends.Invoke(new()\n {\n Type = \"kubernetes\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.GetAuthBackends(ctx, \u0026vault.GetAuthBackendsArgs{\n\t\t\tType: pulumi.StringRef(\"kubernetes\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetAuthBackendsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example-filter = VaultFunctions.getAuthBackends(GetAuthBackendsArgs.builder()\n .type(\"kubernetes\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n example-filter:\n fn::invoke:\n Function: vault:getAuthBackends\n Arguments:\n type: kubernetes\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst example = vault.getAuthBackends({});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nexample = vault.get_auth_backends()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Vault.GetAuthBackends.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.GetAuthBackends(ctx, \u0026vault.GetAuthBackendsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetAuthBackendsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = VaultFunctions.getAuthBackends();\n\n }\n}\n```\n```yaml\nvariables:\n example:\n fn::invoke:\n function: vault:getAuthBackends\n arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst example-filter = vault.getAuthBackends({\n type: \"kubernetes\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nexample_filter = vault.get_auth_backends(type=\"kubernetes\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example_filter = Vault.GetAuthBackends.Invoke(new()\n {\n Type = \"kubernetes\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.GetAuthBackends(ctx, \u0026vault.GetAuthBackendsArgs{\n\t\t\tType: pulumi.StringRef(\"kubernetes\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetAuthBackendsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example-filter = VaultFunctions.getAuthBackends(GetAuthBackendsArgs.builder()\n .type(\"kubernetes\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n example-filter:\n fn::invoke:\n function: vault:getAuthBackends\n arguments:\n type: kubernetes\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getAuthBackends.\n", "properties": { @@ -33507,7 +33507,7 @@ } }, "vault:index/getNamespace:getNamespace": { - "description": "## Example Usage\n\n### Current namespace\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst current = vault.getNamespace({});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ncurrent = vault.get_namespace()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Vault.GetNamespace.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.LookupNamespace(ctx, \u0026vault.LookupNamespaceArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = VaultFunctions.getNamespace();\n\n }\n}\n```\n```yaml\nvariables:\n current:\n fn::invoke:\n Function: vault:getNamespace\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Single namespace\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst ns1 = vault.getNamespace({\n path: \"ns1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nns1 = vault.get_namespace(path=\"ns1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var ns1 = Vault.GetNamespace.Invoke(new()\n {\n Path = \"ns1\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.LookupNamespace(ctx, \u0026vault.LookupNamespaceArgs{\n\t\t\tPath: pulumi.StringRef(\"ns1\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var ns1 = VaultFunctions.getNamespace(GetNamespaceArgs.builder()\n .path(\"ns1\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n ns1:\n fn::invoke:\n Function: vault:getNamespace\n Arguments:\n path: ns1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Nested namespace\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst child = vault.getNamespace({\n namespace: \"parent\",\n path: \"child\",\n});\nconst fullPath = child.then(child =\u003e child.id);\n// -\u003e foo/parent/child/\nconst pathFq = child.then(child =\u003e child.pathFq);\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nchild = vault.get_namespace(namespace=\"parent\",\n path=\"child\")\nfull_path = child.id\n# -\u003e foo/parent/child/\npath_fq = child.path_fq\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var child = Vault.GetNamespace.Invoke(new()\n {\n Namespace = \"parent\",\n Path = \"child\",\n });\n\n var fullPath = child.Apply(getNamespaceResult =\u003e getNamespaceResult.Id);\n\n // -\u003e foo/parent/child/\n var pathFq = child.Apply(getNamespaceResult =\u003e getNamespaceResult.PathFq);\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tchild, err := vault.LookupNamespace(ctx, \u0026vault.LookupNamespaceArgs{\n\t\t\tNamespace: pulumi.StringRef(\"parent\"),\n\t\t\tPath: pulumi.StringRef(\"child\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ := child.Id\n\t\t// -\u003e foo/parent/child/\n\t\t_ := child.PathFq\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var child = VaultFunctions.getNamespace(GetNamespaceArgs.builder()\n .namespace(\"parent\")\n .path(\"child\")\n .build());\n\n final var fullPath = child.applyValue(getNamespaceResult -\u003e getNamespaceResult.id());\n\n // -\u003e foo/parent/child/\n final var pathFq = child.applyValue(getNamespaceResult -\u003e getNamespaceResult.pathFq());\n\n }\n}\n```\n```yaml\nvariables:\n child:\n fn::invoke:\n Function: vault:getNamespace\n Arguments:\n namespace: parent\n path: child\n fullPath: ${child.id}\n # -\u003e foo/parent/child/\n pathFq: ${child.pathFq}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n### Current namespace\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst current = vault.getNamespace({});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ncurrent = vault.get_namespace()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var current = Vault.GetNamespace.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.LookupNamespace(ctx, \u0026vault.LookupNamespaceArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var current = VaultFunctions.getNamespace();\n\n }\n}\n```\n```yaml\nvariables:\n current:\n fn::invoke:\n function: vault:getNamespace\n arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Single namespace\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst ns1 = vault.getNamespace({\n path: \"ns1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nns1 = vault.get_namespace(path=\"ns1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var ns1 = Vault.GetNamespace.Invoke(new()\n {\n Path = \"ns1\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.LookupNamespace(ctx, \u0026vault.LookupNamespaceArgs{\n\t\t\tPath: pulumi.StringRef(\"ns1\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var ns1 = VaultFunctions.getNamespace(GetNamespaceArgs.builder()\n .path(\"ns1\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n ns1:\n fn::invoke:\n function: vault:getNamespace\n arguments:\n path: ns1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Nested namespace\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst child = vault.getNamespace({\n namespace: \"parent\",\n path: \"child\",\n});\nconst fullPath = child.then(child =\u003e child.id);\n// -\u003e foo/parent/child/\nconst pathFq = child.then(child =\u003e child.pathFq);\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nchild = vault.get_namespace(namespace=\"parent\",\n path=\"child\")\nfull_path = child.id\n# -\u003e foo/parent/child/\npath_fq = child.path_fq\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var child = Vault.GetNamespace.Invoke(new()\n {\n Namespace = \"parent\",\n Path = \"child\",\n });\n\n var fullPath = child.Apply(getNamespaceResult =\u003e getNamespaceResult.Id);\n\n // -\u003e foo/parent/child/\n var pathFq = child.Apply(getNamespaceResult =\u003e getNamespaceResult.PathFq);\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tchild, err := vault.LookupNamespace(ctx, \u0026vault.LookupNamespaceArgs{\n\t\t\tNamespace: pulumi.StringRef(\"parent\"),\n\t\t\tPath: pulumi.StringRef(\"child\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ := child.Id\n\t\t// -\u003e foo/parent/child/\n\t\t_ := child.PathFq\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var child = VaultFunctions.getNamespace(GetNamespaceArgs.builder()\n .namespace(\"parent\")\n .path(\"child\")\n .build());\n\n final var fullPath = child.applyValue(getNamespaceResult -\u003e getNamespaceResult.id());\n\n // -\u003e foo/parent/child/\n final var pathFq = child.applyValue(getNamespaceResult -\u003e getNamespaceResult.pathFq());\n\n }\n}\n```\n```yaml\nvariables:\n child:\n fn::invoke:\n function: vault:getNamespace\n arguments:\n namespace: parent\n path: child\n fullPath: ${child.id}\n # -\u003e foo/parent/child/\n pathFq: ${child.pathFq}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getNamespace.\n", "properties": { @@ -33563,7 +33563,7 @@ } }, "vault:index/getNamespaces:getNamespaces": { - "description": "## Example Usage\n\n### Child namespaces\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst children = vault.getNamespaces({});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nchildren = vault.get_namespaces()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var children = Vault.GetNamespaces.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.GetNamespaces(ctx, \u0026vault.GetNamespacesArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespacesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var children = VaultFunctions.getNamespaces();\n\n }\n}\n```\n```yaml\nvariables:\n children:\n fn::invoke:\n Function: vault:getNamespaces\n Arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Nested namespace\n\nTo fetch the details of nested namespaces:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst children = vault.getNamespaces({\n namespace: \"parent\",\n});\nconst child = .reduce((__obj, [, ]) =\u003e ({ ...__obj, [__key]: vault.getNamespace({\n namespace: _arg0_.namespace,\n path: __key,\n}) }));\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nchildren = vault.get_namespaces(namespace=\"parent\")\nchild = {__key: vault.get_namespace(namespace=children.namespace,\n path=__key) for __key, __value in children.paths}\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var children = Vault.GetNamespaces.Invoke(new()\n {\n Namespace = \"parent\",\n });\n\n var child = .ToDictionary(item =\u003e {\n var __key = item.Key;\n return __key;\n }, item =\u003e {\n var __key = item.Key;\n return Vault.GetNamespace.Invoke(new()\n {\n Namespace = _arg0_.Namespace,\n Path = __key,\n });\n });\n\n});\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n### Child namespaces\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst children = vault.getNamespaces({});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nchildren = vault.get_namespaces()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var children = Vault.GetNamespaces.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := vault.GetNamespaces(ctx, \u0026vault.GetNamespacesArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNamespacesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var children = VaultFunctions.getNamespaces();\n\n }\n}\n```\n```yaml\nvariables:\n children:\n fn::invoke:\n function: vault:getNamespaces\n arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n### Nested namespace\n\nTo fetch the details of nested namespaces:\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst children = vault.getNamespaces({\n namespace: \"parent\",\n});\nconst child = .reduce((__obj, [, ]) =\u003e ({ ...__obj, [__key]: vault.getNamespace({\n namespace: _arg0_.namespace,\n path: __key,\n}) }));\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nchildren = vault.get_namespaces(namespace=\"parent\")\nchild = {__key: vault.get_namespace(namespace=children.namespace,\n path=__key) for __key, __value in children.paths}\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var children = Vault.GetNamespaces.Invoke(new()\n {\n Namespace = \"parent\",\n });\n\n var child = .ToDictionary(item =\u003e {\n var __key = item.Key;\n return __key;\n }, item =\u003e {\n var __key = item.Key;\n return Vault.GetNamespace.Invoke(new()\n {\n Namespace = _arg0_.Namespace,\n Path = __key,\n });\n });\n\n});\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getNamespaces.\n", "properties": { @@ -33601,7 +33601,7 @@ } }, "vault:index/getNomadAccessToken:getNomadAccessToken": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new vault.NomadSecretBackend(\"config\", {\n backend: \"nomad\",\n description: \"test description\",\n defaultLeaseTtlSeconds: 3600,\n maxLeaseTtlSeconds: 7200,\n address: \"https://127.0.0.1:4646\",\n token: \"ae20ceaa-...\",\n});\nconst test = new vault.NomadSecretRole(\"test\", {\n backend: config.backend,\n role: \"test\",\n type: \"client\",\n policies: [\"readonly\"],\n});\nconst token = pulumi.all([config.backend, test.role]).apply(([backend, role]) =\u003e vault.getNomadAccessTokenOutput({\n backend: backend,\n role: role,\n}));\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nconfig = vault.NomadSecretBackend(\"config\",\n backend=\"nomad\",\n description=\"test description\",\n default_lease_ttl_seconds=3600,\n max_lease_ttl_seconds=7200,\n address=\"https://127.0.0.1:4646\",\n token=\"ae20ceaa-...\")\ntest = vault.NomadSecretRole(\"test\",\n backend=config.backend,\n role=\"test\",\n type=\"client\",\n policies=[\"readonly\"])\ntoken = pulumi.Output.all(\n backend=config.backend,\n role=test.role\n).apply(lambda resolved_outputs: vault.get_nomad_access_token_output(backend=resolved_outputs['backend'],\n role=resolved_outputs['role']))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Vault.NomadSecretBackend(\"config\", new()\n {\n Backend = \"nomad\",\n Description = \"test description\",\n DefaultLeaseTtlSeconds = 3600,\n MaxLeaseTtlSeconds = 7200,\n Address = \"https://127.0.0.1:4646\",\n Token = \"ae20ceaa-...\",\n });\n\n var test = new Vault.NomadSecretRole(\"test\", new()\n {\n Backend = config.Backend,\n Role = \"test\",\n Type = \"client\",\n Policies = new[]\n {\n \"readonly\",\n },\n });\n\n var token = Vault.GetNomadAccessToken.Invoke(new()\n {\n Backend = config.Backend,\n Role = test.Role,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tconfig, err := vault.NewNomadSecretBackend(ctx, \"config\", \u0026vault.NomadSecretBackendArgs{\n\t\t\tBackend: pulumi.String(\"nomad\"),\n\t\t\tDescription: pulumi.String(\"test description\"),\n\t\t\tDefaultLeaseTtlSeconds: pulumi.Int(3600),\n\t\t\tMaxLeaseTtlSeconds: pulumi.Int(7200),\n\t\t\tAddress: pulumi.String(\"https://127.0.0.1:4646\"),\n\t\t\tToken: pulumi.String(\"ae20ceaa-...\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttest, err := vault.NewNomadSecretRole(ctx, \"test\", \u0026vault.NomadSecretRoleArgs{\n\t\t\tBackend: config.Backend,\n\t\t\tRole: pulumi.String(\"test\"),\n\t\t\tType: pulumi.String(\"client\"),\n\t\t\tPolicies: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"readonly\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = pulumi.All(config.Backend, test.Role).ApplyT(func(_args []interface{}) (vault.GetNomadAccessTokenResult, error) {\n\t\t\tbackend := _args[0].(*string)\n\t\t\trole := _args[1].(string)\n\t\t\treturn vault.GetNomadAccessTokenResult(interface{}(vault.GetNomadAccessTokenOutput(ctx, vault.GetNomadAccessTokenOutputArgs{\n\t\t\t\tBackend: backend,\n\t\t\t\tRole: role,\n\t\t\t}, nil))), nil\n\t\t}).(vault.GetNomadAccessTokenResultOutput)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.NomadSecretBackend;\nimport com.pulumi.vault.NomadSecretBackendArgs;\nimport com.pulumi.vault.NomadSecretRole;\nimport com.pulumi.vault.NomadSecretRoleArgs;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNomadAccessTokenArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var config = new NomadSecretBackend(\"config\", NomadSecretBackendArgs.builder()\n .backend(\"nomad\")\n .description(\"test description\")\n .defaultLeaseTtlSeconds(\"3600\")\n .maxLeaseTtlSeconds(\"7200\")\n .address(\"https://127.0.0.1:4646\")\n .token(\"ae20ceaa-...\")\n .build());\n\n var test = new NomadSecretRole(\"test\", NomadSecretRoleArgs.builder()\n .backend(config.backend())\n .role(\"test\")\n .type(\"client\")\n .policies(\"readonly\")\n .build());\n\n final var token = VaultFunctions.getNomadAccessToken(GetNomadAccessTokenArgs.builder()\n .backend(config.backend())\n .role(test.role())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n config:\n type: vault:NomadSecretBackend\n properties:\n backend: nomad\n description: test description\n defaultLeaseTtlSeconds: '3600'\n maxLeaseTtlSeconds: '7200'\n address: https://127.0.0.1:4646\n token: ae20ceaa-...\n test:\n type: vault:NomadSecretRole\n properties:\n backend: ${config.backend}\n role: test\n type: client\n policies:\n - readonly\nvariables:\n token:\n fn::invoke:\n Function: vault:getNomadAccessToken\n Arguments:\n backend: ${config.backend}\n role: ${test.role}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new vault.NomadSecretBackend(\"config\", {\n backend: \"nomad\",\n description: \"test description\",\n defaultLeaseTtlSeconds: 3600,\n maxLeaseTtlSeconds: 7200,\n address: \"https://127.0.0.1:4646\",\n token: \"ae20ceaa-...\",\n});\nconst test = new vault.NomadSecretRole(\"test\", {\n backend: config.backend,\n role: \"test\",\n type: \"client\",\n policies: [\"readonly\"],\n});\nconst token = pulumi.all([config.backend, test.role]).apply(([backend, role]) =\u003e vault.getNomadAccessTokenOutput({\n backend: backend,\n role: role,\n}));\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nconfig = vault.NomadSecretBackend(\"config\",\n backend=\"nomad\",\n description=\"test description\",\n default_lease_ttl_seconds=3600,\n max_lease_ttl_seconds=7200,\n address=\"https://127.0.0.1:4646\",\n token=\"ae20ceaa-...\")\ntest = vault.NomadSecretRole(\"test\",\n backend=config.backend,\n role=\"test\",\n type=\"client\",\n policies=[\"readonly\"])\ntoken = pulumi.Output.all(\n backend=config.backend,\n role=test.role\n).apply(lambda resolved_outputs: vault.get_nomad_access_token_output(backend=resolved_outputs['backend'],\n role=resolved_outputs['role']))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Vault.NomadSecretBackend(\"config\", new()\n {\n Backend = \"nomad\",\n Description = \"test description\",\n DefaultLeaseTtlSeconds = 3600,\n MaxLeaseTtlSeconds = 7200,\n Address = \"https://127.0.0.1:4646\",\n Token = \"ae20ceaa-...\",\n });\n\n var test = new Vault.NomadSecretRole(\"test\", new()\n {\n Backend = config.Backend,\n Role = \"test\",\n Type = \"client\",\n Policies = new[]\n {\n \"readonly\",\n },\n });\n\n var token = Vault.GetNomadAccessToken.Invoke(new()\n {\n Backend = config.Backend,\n Role = test.Role,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tconfig, err := vault.NewNomadSecretBackend(ctx, \"config\", \u0026vault.NomadSecretBackendArgs{\n\t\t\tBackend: pulumi.String(\"nomad\"),\n\t\t\tDescription: pulumi.String(\"test description\"),\n\t\t\tDefaultLeaseTtlSeconds: pulumi.Int(3600),\n\t\t\tMaxLeaseTtlSeconds: pulumi.Int(7200),\n\t\t\tAddress: pulumi.String(\"https://127.0.0.1:4646\"),\n\t\t\tToken: pulumi.String(\"ae20ceaa-...\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttest, err := vault.NewNomadSecretRole(ctx, \"test\", \u0026vault.NomadSecretRoleArgs{\n\t\t\tBackend: config.Backend,\n\t\t\tRole: pulumi.String(\"test\"),\n\t\t\tType: pulumi.String(\"client\"),\n\t\t\tPolicies: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"readonly\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = pulumi.All(config.Backend, test.Role).ApplyT(func(_args []interface{}) (vault.GetNomadAccessTokenResult, error) {\n\t\t\tbackend := _args[0].(*string)\n\t\t\trole := _args[1].(string)\n\t\t\treturn vault.GetNomadAccessTokenResult(interface{}(vault.GetNomadAccessTokenOutput(ctx, vault.GetNomadAccessTokenOutputArgs{\n\t\t\t\tBackend: backend,\n\t\t\t\tRole: role,\n\t\t\t}, nil))), nil\n\t\t}).(vault.GetNomadAccessTokenResultOutput)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.NomadSecretBackend;\nimport com.pulumi.vault.NomadSecretBackendArgs;\nimport com.pulumi.vault.NomadSecretRole;\nimport com.pulumi.vault.NomadSecretRoleArgs;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetNomadAccessTokenArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var config = new NomadSecretBackend(\"config\", NomadSecretBackendArgs.builder()\n .backend(\"nomad\")\n .description(\"test description\")\n .defaultLeaseTtlSeconds(\"3600\")\n .maxLeaseTtlSeconds(\"7200\")\n .address(\"https://127.0.0.1:4646\")\n .token(\"ae20ceaa-...\")\n .build());\n\n var test = new NomadSecretRole(\"test\", NomadSecretRoleArgs.builder()\n .backend(config.backend())\n .role(\"test\")\n .type(\"client\")\n .policies(\"readonly\")\n .build());\n\n final var token = VaultFunctions.getNomadAccessToken(GetNomadAccessTokenArgs.builder()\n .backend(config.backend())\n .role(test.role())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n config:\n type: vault:NomadSecretBackend\n properties:\n backend: nomad\n description: test description\n defaultLeaseTtlSeconds: '3600'\n maxLeaseTtlSeconds: '7200'\n address: https://127.0.0.1:4646\n token: ae20ceaa-...\n test:\n type: vault:NomadSecretRole\n properties:\n backend: ${config.backend}\n role: test\n type: client\n policies:\n - readonly\nvariables:\n token:\n fn::invoke:\n function: vault:getNomadAccessToken\n arguments:\n backend: ${config.backend}\n role: ${test.role}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getNomadAccessToken.\n", "properties": { @@ -33663,7 +33663,7 @@ } }, "vault:index/getPolicyDocument:getPolicyDocument": { - "description": "This is a data source which can be used to construct a HCL representation of an Vault policy document, for use with resources which expect policy documents, such as the `vault.Policy` resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst example = vault.getPolicyDocument({\n rules: [{\n path: \"secret/*\",\n capabilities: [\n \"create\",\n \"read\",\n \"update\",\n \"delete\",\n \"list\",\n ],\n description: \"allow all on secrets\",\n }],\n});\nconst examplePolicy = new vault.Policy(\"example\", {\n name: \"example_policy\",\n policy: example.then(example =\u003e example.hcl),\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nexample = vault.get_policy_document(rules=[{\n \"path\": \"secret/*\",\n \"capabilities\": [\n \"create\",\n \"read\",\n \"update\",\n \"delete\",\n \"list\",\n ],\n \"description\": \"allow all on secrets\",\n}])\nexample_policy = vault.Policy(\"example\",\n name=\"example_policy\",\n policy=example.hcl)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Vault.GetPolicyDocument.Invoke(new()\n {\n Rules = new[]\n {\n new Vault.Inputs.GetPolicyDocumentRuleInputArgs\n {\n Path = \"secret/*\",\n Capabilities = new[]\n {\n \"create\",\n \"read\",\n \"update\",\n \"delete\",\n \"list\",\n },\n Description = \"allow all on secrets\",\n },\n },\n });\n\n var examplePolicy = new Vault.Policy(\"example\", new()\n {\n Name = \"example_policy\",\n PolicyContents = example.Apply(getPolicyDocumentResult =\u003e getPolicyDocumentResult.Hcl),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := vault.GetPolicyDocument(ctx, \u0026vault.GetPolicyDocumentArgs{\n\t\t\tRules: []vault.GetPolicyDocumentRule{\n\t\t\t\t{\n\t\t\t\t\tPath: \"secret/*\",\n\t\t\t\t\tCapabilities: []string{\n\t\t\t\t\t\t\"create\",\n\t\t\t\t\t\t\"read\",\n\t\t\t\t\t\t\"update\",\n\t\t\t\t\t\t\"delete\",\n\t\t\t\t\t\t\"list\",\n\t\t\t\t\t},\n\t\t\t\t\tDescription: pulumi.StringRef(\"allow all on secrets\"),\n\t\t\t\t},\n\t\t\t},\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = vault.NewPolicy(ctx, \"example\", \u0026vault.PolicyArgs{\n\t\t\tName: pulumi.String(\"example_policy\"),\n\t\t\tPolicy: pulumi.String(example.Hcl),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetPolicyDocumentArgs;\nimport com.pulumi.vault.Policy;\nimport com.pulumi.vault.PolicyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = VaultFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()\n .rules(GetPolicyDocumentRuleArgs.builder()\n .path(\"secret/*\")\n .capabilities( \n \"create\",\n \"read\",\n \"update\",\n \"delete\",\n \"list\")\n .description(\"allow all on secrets\")\n .build())\n .build());\n\n var examplePolicy = new Policy(\"examplePolicy\", PolicyArgs.builder()\n .name(\"example_policy\")\n .policy(example.applyValue(getPolicyDocumentResult -\u003e getPolicyDocumentResult.hcl()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n examplePolicy:\n type: vault:Policy\n name: example\n properties:\n name: example_policy\n policy: ${example.hcl}\nvariables:\n example:\n fn::invoke:\n Function: vault:getPolicyDocument\n Arguments:\n rules:\n - path: secret/*\n capabilities:\n - create\n - read\n - update\n - delete\n - list\n description: allow all on secrets\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "This is a data source which can be used to construct a HCL representation of an Vault policy document, for use with resources which expect policy documents, such as the `vault.Policy` resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst example = vault.getPolicyDocument({\n rules: [{\n path: \"secret/*\",\n capabilities: [\n \"create\",\n \"read\",\n \"update\",\n \"delete\",\n \"list\",\n ],\n description: \"allow all on secrets\",\n }],\n});\nconst examplePolicy = new vault.Policy(\"example\", {\n name: \"example_policy\",\n policy: example.then(example =\u003e example.hcl),\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nexample = vault.get_policy_document(rules=[{\n \"path\": \"secret/*\",\n \"capabilities\": [\n \"create\",\n \"read\",\n \"update\",\n \"delete\",\n \"list\",\n ],\n \"description\": \"allow all on secrets\",\n}])\nexample_policy = vault.Policy(\"example\",\n name=\"example_policy\",\n policy=example.hcl)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = Vault.GetPolicyDocument.Invoke(new()\n {\n Rules = new[]\n {\n new Vault.Inputs.GetPolicyDocumentRuleInputArgs\n {\n Path = \"secret/*\",\n Capabilities = new[]\n {\n \"create\",\n \"read\",\n \"update\",\n \"delete\",\n \"list\",\n },\n Description = \"allow all on secrets\",\n },\n },\n });\n\n var examplePolicy = new Vault.Policy(\"example\", new()\n {\n Name = \"example_policy\",\n PolicyContents = example.Apply(getPolicyDocumentResult =\u003e getPolicyDocumentResult.Hcl),\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := vault.GetPolicyDocument(ctx, \u0026vault.GetPolicyDocumentArgs{\n\t\t\tRules: []vault.GetPolicyDocumentRule{\n\t\t\t\t{\n\t\t\t\t\tPath: \"secret/*\",\n\t\t\t\t\tCapabilities: []string{\n\t\t\t\t\t\t\"create\",\n\t\t\t\t\t\t\"read\",\n\t\t\t\t\t\t\"update\",\n\t\t\t\t\t\t\"delete\",\n\t\t\t\t\t\t\"list\",\n\t\t\t\t\t},\n\t\t\t\t\tDescription: pulumi.StringRef(\"allow all on secrets\"),\n\t\t\t\t},\n\t\t\t},\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = vault.NewPolicy(ctx, \"example\", \u0026vault.PolicyArgs{\n\t\t\tName: pulumi.String(\"example_policy\"),\n\t\t\tPolicy: pulumi.String(example.Hcl),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetPolicyDocumentArgs;\nimport com.pulumi.vault.Policy;\nimport com.pulumi.vault.PolicyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var example = VaultFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()\n .rules(GetPolicyDocumentRuleArgs.builder()\n .path(\"secret/*\")\n .capabilities( \n \"create\",\n \"read\",\n \"update\",\n \"delete\",\n \"list\")\n .description(\"allow all on secrets\")\n .build())\n .build());\n\n var examplePolicy = new Policy(\"examplePolicy\", PolicyArgs.builder()\n .name(\"example_policy\")\n .policy(example.applyValue(getPolicyDocumentResult -\u003e getPolicyDocumentResult.hcl()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n examplePolicy:\n type: vault:Policy\n name: example\n properties:\n name: example_policy\n policy: ${example.hcl}\nvariables:\n example:\n fn::invoke:\n function: vault:getPolicyDocument\n arguments:\n rules:\n - path: secret/*\n capabilities:\n - create\n - read\n - update\n - delete\n - list\n description: allow all on secrets\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getPolicyDocument.\n", "properties": { @@ -33710,7 +33710,7 @@ } }, "vault:index/getRaftAutopilotState:getRaftAutopilotState": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nexport = async () =\u003e {\n const main = await vault.getRaftAutopilotState({});\n return {\n \"failure-tolerance\": main.failureTolerance,\n };\n}\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nmain = vault.get_raft_autopilot_state()\npulumi.export(\"failure-tolerance\", main.failure_tolerance)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var main = Vault.GetRaftAutopilotState.Invoke();\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"failure-tolerance\"] = main.Apply(getRaftAutopilotStateResult =\u003e getRaftAutopilotStateResult.FailureTolerance),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tmain, err := vault.GetRaftAutopilotState(ctx, \u0026vault.GetRaftAutopilotStateArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"failure-tolerance\", main.FailureTolerance)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetRaftAutopilotStateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var main = VaultFunctions.getRaftAutopilotState();\n\n ctx.export(\"failure-tolerance\", main.applyValue(getRaftAutopilotStateResult -\u003e getRaftAutopilotStateResult.failureTolerance()));\n }\n}\n```\n```yaml\nvariables:\n main:\n fn::invoke:\n Function: vault:getRaftAutopilotState\n Arguments: {}\noutputs:\n failure-tolerance: ${main.failureTolerance}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nexport = async () =\u003e {\n const main = await vault.getRaftAutopilotState({});\n return {\n \"failure-tolerance\": main.failureTolerance,\n };\n}\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nmain = vault.get_raft_autopilot_state()\npulumi.export(\"failure-tolerance\", main.failure_tolerance)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var main = Vault.GetRaftAutopilotState.Invoke();\n\n return new Dictionary\u003cstring, object?\u003e\n {\n [\"failure-tolerance\"] = main.Apply(getRaftAutopilotStateResult =\u003e getRaftAutopilotStateResult.FailureTolerance),\n };\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tmain, err := vault.GetRaftAutopilotState(ctx, \u0026vault.GetRaftAutopilotStateArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tctx.Export(\"failure-tolerance\", main.FailureTolerance)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.VaultFunctions;\nimport com.pulumi.vault.inputs.GetRaftAutopilotStateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var main = VaultFunctions.getRaftAutopilotState();\n\n ctx.export(\"failure-tolerance\", main.applyValue(getRaftAutopilotStateResult -\u003e getRaftAutopilotStateResult.failureTolerance()));\n }\n}\n```\n```yaml\nvariables:\n main:\n fn::invoke:\n function: vault:getRaftAutopilotState\n arguments: {}\noutputs:\n failure-tolerance: ${main.failureTolerance}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getRaftAutopilotState.\n", "properties": { @@ -34077,7 +34077,7 @@ } }, "vault:kubernetes/getServiceAccountToken:getServiceAccountToken": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new vault.kubernetes.SecretBackend(\"config\", {\n path: \"kubernetes\",\n description: \"kubernetes secrets engine description\",\n kubernetesHost: \"https://127.0.0.1:61233\",\n kubernetesCaCert: std.file({\n input: \"/path/to/cert\",\n }).then(invoke =\u003e invoke.result),\n serviceAccountJwt: std.file({\n input: \"/path/to/token\",\n }).then(invoke =\u003e invoke.result),\n disableLocalCaJwt: false,\n});\nconst role = new vault.kubernetes.SecretBackendRole(\"role\", {\n backend: config.path,\n name: \"service-account-name-role\",\n allowedKubernetesNamespaces: [\"*\"],\n tokenMaxTtl: 43200,\n tokenDefaultTtl: 21600,\n serviceAccountName: \"test-service-account-with-generated-token\",\n extraLabels: {\n id: \"abc123\",\n name: \"some_name\",\n },\n extraAnnotations: {\n env: \"development\",\n location: \"earth\",\n },\n});\nconst token = vault.kubernetes.getServiceAccountTokenOutput({\n backend: config.path,\n role: role.name,\n kubernetesNamespace: \"test\",\n clusterRoleBinding: false,\n ttl: \"1h\",\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nconfig = vault.kubernetes.SecretBackend(\"config\",\n path=\"kubernetes\",\n description=\"kubernetes secrets engine description\",\n kubernetes_host=\"https://127.0.0.1:61233\",\n kubernetes_ca_cert=std.file(input=\"/path/to/cert\").result,\n service_account_jwt=std.file(input=\"/path/to/token\").result,\n disable_local_ca_jwt=False)\nrole = vault.kubernetes.SecretBackendRole(\"role\",\n backend=config.path,\n name=\"service-account-name-role\",\n allowed_kubernetes_namespaces=[\"*\"],\n token_max_ttl=43200,\n token_default_ttl=21600,\n service_account_name=\"test-service-account-with-generated-token\",\n extra_labels={\n \"id\": \"abc123\",\n \"name\": \"some_name\",\n },\n extra_annotations={\n \"env\": \"development\",\n \"location\": \"earth\",\n })\ntoken = vault.kubernetes.get_service_account_token_output(backend=config.path,\n role=role.name,\n kubernetes_namespace=\"test\",\n cluster_role_binding=False,\n ttl=\"1h\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Vault.Kubernetes.SecretBackend(\"config\", new()\n {\n Path = \"kubernetes\",\n Description = \"kubernetes secrets engine description\",\n KubernetesHost = \"https://127.0.0.1:61233\",\n KubernetesCaCert = Std.File.Invoke(new()\n {\n Input = \"/path/to/cert\",\n }).Apply(invoke =\u003e invoke.Result),\n ServiceAccountJwt = Std.File.Invoke(new()\n {\n Input = \"/path/to/token\",\n }).Apply(invoke =\u003e invoke.Result),\n DisableLocalCaJwt = false,\n });\n\n var role = new Vault.Kubernetes.SecretBackendRole(\"role\", new()\n {\n Backend = config.Path,\n Name = \"service-account-name-role\",\n AllowedKubernetesNamespaces = new[]\n {\n \"*\",\n },\n TokenMaxTtl = 43200,\n TokenDefaultTtl = 21600,\n ServiceAccountName = \"test-service-account-with-generated-token\",\n ExtraLabels = \n {\n { \"id\", \"abc123\" },\n { \"name\", \"some_name\" },\n },\n ExtraAnnotations = \n {\n { \"env\", \"development\" },\n { \"location\", \"earth\" },\n },\n });\n\n var token = Vault.Kubernetes.GetServiceAccountToken.Invoke(new()\n {\n Backend = config.Path,\n Role = role.Name,\n KubernetesNamespace = \"test\",\n ClusterRoleBinding = false,\n Ttl = \"1h\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/cert\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile1, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/token\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfig, err := kubernetes.NewSecretBackend(ctx, \"config\", \u0026kubernetes.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"kubernetes\"),\n\t\t\tDescription: pulumi.String(\"kubernetes secrets engine description\"),\n\t\t\tKubernetesHost: pulumi.String(\"https://127.0.0.1:61233\"),\n\t\t\tKubernetesCaCert: pulumi.String(invokeFile.Result),\n\t\t\tServiceAccountJwt: pulumi.String(invokeFile1.Result),\n\t\t\tDisableLocalCaJwt: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\trole, err := kubernetes.NewSecretBackendRole(ctx, \"role\", \u0026kubernetes.SecretBackendRoleArgs{\n\t\t\tBackend: config.Path,\n\t\t\tName: pulumi.String(\"service-account-name-role\"),\n\t\t\tAllowedKubernetesNamespaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"*\"),\n\t\t\t},\n\t\t\tTokenMaxTtl: pulumi.Int(43200),\n\t\t\tTokenDefaultTtl: pulumi.Int(21600),\n\t\t\tServiceAccountName: pulumi.String(\"test-service-account-with-generated-token\"),\n\t\t\tExtraLabels: pulumi.StringMap{\n\t\t\t\t\"id\": pulumi.String(\"abc123\"),\n\t\t\t\t\"name\": pulumi.String(\"some_name\"),\n\t\t\t},\n\t\t\tExtraAnnotations: pulumi.StringMap{\n\t\t\t\t\"env\": pulumi.String(\"development\"),\n\t\t\t\t\"location\": pulumi.String(\"earth\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = kubernetes.GetServiceAccountTokenOutput(ctx, kubernetes.GetServiceAccountTokenOutputArgs{\n\t\t\tBackend: config.Path,\n\t\t\tRole: role.Name,\n\t\t\tKubernetesNamespace: pulumi.String(\"test\"),\n\t\t\tClusterRoleBinding: pulumi.Bool(false),\n\t\t\tTtl: pulumi.String(\"1h\"),\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.kubernetes.SecretBackend;\nimport com.pulumi.vault.kubernetes.SecretBackendArgs;\nimport com.pulumi.vault.kubernetes.SecretBackendRole;\nimport com.pulumi.vault.kubernetes.SecretBackendRoleArgs;\nimport com.pulumi.vault.kubernetes.KubernetesFunctions;\nimport com.pulumi.vault.kubernetes.inputs.GetServiceAccountTokenArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var config = new SecretBackend(\"config\", SecretBackendArgs.builder()\n .path(\"kubernetes\")\n .description(\"kubernetes secrets engine description\")\n .kubernetesHost(\"https://127.0.0.1:61233\")\n .kubernetesCaCert(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/cert\")\n .build()).result())\n .serviceAccountJwt(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/token\")\n .build()).result())\n .disableLocalCaJwt(false)\n .build());\n\n var role = new SecretBackendRole(\"role\", SecretBackendRoleArgs.builder()\n .backend(config.path())\n .name(\"service-account-name-role\")\n .allowedKubernetesNamespaces(\"*\")\n .tokenMaxTtl(43200)\n .tokenDefaultTtl(21600)\n .serviceAccountName(\"test-service-account-with-generated-token\")\n .extraLabels(Map.ofEntries(\n Map.entry(\"id\", \"abc123\"),\n Map.entry(\"name\", \"some_name\")\n ))\n .extraAnnotations(Map.ofEntries(\n Map.entry(\"env\", \"development\"),\n Map.entry(\"location\", \"earth\")\n ))\n .build());\n\n final var token = KubernetesFunctions.getServiceAccountToken(GetServiceAccountTokenArgs.builder()\n .backend(config.path())\n .role(role.name())\n .kubernetesNamespace(\"test\")\n .clusterRoleBinding(false)\n .ttl(\"1h\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n config:\n type: vault:kubernetes:SecretBackend\n properties:\n path: kubernetes\n description: kubernetes secrets engine description\n kubernetesHost: https://127.0.0.1:61233\n kubernetesCaCert:\n fn::invoke:\n Function: std:file\n Arguments:\n input: /path/to/cert\n Return: result\n serviceAccountJwt:\n fn::invoke:\n Function: std:file\n Arguments:\n input: /path/to/token\n Return: result\n disableLocalCaJwt: false\n role:\n type: vault:kubernetes:SecretBackendRole\n properties:\n backend: ${config.path}\n name: service-account-name-role\n allowedKubernetesNamespaces:\n - '*'\n tokenMaxTtl: 43200\n tokenDefaultTtl: 21600\n serviceAccountName: test-service-account-with-generated-token\n extraLabels:\n id: abc123\n name: some_name\n extraAnnotations:\n env: development\n location: earth\nvariables:\n token:\n fn::invoke:\n Function: vault:kubernetes:getServiceAccountToken\n Arguments:\n backend: ${config.path}\n role: ${role.name}\n kubernetesNamespace: test\n clusterRoleBinding: false\n ttl: 1h\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as std from \"@pulumi/std\";\nimport * as vault from \"@pulumi/vault\";\n\nconst config = new vault.kubernetes.SecretBackend(\"config\", {\n path: \"kubernetes\",\n description: \"kubernetes secrets engine description\",\n kubernetesHost: \"https://127.0.0.1:61233\",\n kubernetesCaCert: std.file({\n input: \"/path/to/cert\",\n }).then(invoke =\u003e invoke.result),\n serviceAccountJwt: std.file({\n input: \"/path/to/token\",\n }).then(invoke =\u003e invoke.result),\n disableLocalCaJwt: false,\n});\nconst role = new vault.kubernetes.SecretBackendRole(\"role\", {\n backend: config.path,\n name: \"service-account-name-role\",\n allowedKubernetesNamespaces: [\"*\"],\n tokenMaxTtl: 43200,\n tokenDefaultTtl: 21600,\n serviceAccountName: \"test-service-account-with-generated-token\",\n extraLabels: {\n id: \"abc123\",\n name: \"some_name\",\n },\n extraAnnotations: {\n env: \"development\",\n location: \"earth\",\n },\n});\nconst token = vault.kubernetes.getServiceAccountTokenOutput({\n backend: config.path,\n role: role.name,\n kubernetesNamespace: \"test\",\n clusterRoleBinding: false,\n ttl: \"1h\",\n});\n```\n```python\nimport pulumi\nimport pulumi_std as std\nimport pulumi_vault as vault\n\nconfig = vault.kubernetes.SecretBackend(\"config\",\n path=\"kubernetes\",\n description=\"kubernetes secrets engine description\",\n kubernetes_host=\"https://127.0.0.1:61233\",\n kubernetes_ca_cert=std.file(input=\"/path/to/cert\").result,\n service_account_jwt=std.file(input=\"/path/to/token\").result,\n disable_local_ca_jwt=False)\nrole = vault.kubernetes.SecretBackendRole(\"role\",\n backend=config.path,\n name=\"service-account-name-role\",\n allowed_kubernetes_namespaces=[\"*\"],\n token_max_ttl=43200,\n token_default_ttl=21600,\n service_account_name=\"test-service-account-with-generated-token\",\n extra_labels={\n \"id\": \"abc123\",\n \"name\": \"some_name\",\n },\n extra_annotations={\n \"env\": \"development\",\n \"location\": \"earth\",\n })\ntoken = vault.kubernetes.get_service_account_token_output(backend=config.path,\n role=role.name,\n kubernetes_namespace=\"test\",\n cluster_role_binding=False,\n ttl=\"1h\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Std = Pulumi.Std;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var config = new Vault.Kubernetes.SecretBackend(\"config\", new()\n {\n Path = \"kubernetes\",\n Description = \"kubernetes secrets engine description\",\n KubernetesHost = \"https://127.0.0.1:61233\",\n KubernetesCaCert = Std.File.Invoke(new()\n {\n Input = \"/path/to/cert\",\n }).Apply(invoke =\u003e invoke.Result),\n ServiceAccountJwt = Std.File.Invoke(new()\n {\n Input = \"/path/to/token\",\n }).Apply(invoke =\u003e invoke.Result),\n DisableLocalCaJwt = false,\n });\n\n var role = new Vault.Kubernetes.SecretBackendRole(\"role\", new()\n {\n Backend = config.Path,\n Name = \"service-account-name-role\",\n AllowedKubernetesNamespaces = new[]\n {\n \"*\",\n },\n TokenMaxTtl = 43200,\n TokenDefaultTtl = 21600,\n ServiceAccountName = \"test-service-account-with-generated-token\",\n ExtraLabels = \n {\n { \"id\", \"abc123\" },\n { \"name\", \"some_name\" },\n },\n ExtraAnnotations = \n {\n { \"env\", \"development\" },\n { \"location\", \"earth\" },\n },\n });\n\n var token = Vault.Kubernetes.GetServiceAccountToken.Invoke(new()\n {\n Backend = config.Path,\n Role = role.Name,\n KubernetesNamespace = \"test\",\n ClusterRoleBinding = false,\n Ttl = \"1h\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-std/sdk/go/std\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tinvokeFile, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/cert\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tinvokeFile1, err := std.File(ctx, \u0026std.FileArgs{\n\t\t\tInput: \"/path/to/token\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tconfig, err := kubernetes.NewSecretBackend(ctx, \"config\", \u0026kubernetes.SecretBackendArgs{\n\t\t\tPath: pulumi.String(\"kubernetes\"),\n\t\t\tDescription: pulumi.String(\"kubernetes secrets engine description\"),\n\t\t\tKubernetesHost: pulumi.String(\"https://127.0.0.1:61233\"),\n\t\t\tKubernetesCaCert: pulumi.String(invokeFile.Result),\n\t\t\tServiceAccountJwt: pulumi.String(invokeFile1.Result),\n\t\t\tDisableLocalCaJwt: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\trole, err := kubernetes.NewSecretBackendRole(ctx, \"role\", \u0026kubernetes.SecretBackendRoleArgs{\n\t\t\tBackend: config.Path,\n\t\t\tName: pulumi.String(\"service-account-name-role\"),\n\t\t\tAllowedKubernetesNamespaces: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"*\"),\n\t\t\t},\n\t\t\tTokenMaxTtl: pulumi.Int(43200),\n\t\t\tTokenDefaultTtl: pulumi.Int(21600),\n\t\t\tServiceAccountName: pulumi.String(\"test-service-account-with-generated-token\"),\n\t\t\tExtraLabels: pulumi.StringMap{\n\t\t\t\t\"id\": pulumi.String(\"abc123\"),\n\t\t\t\t\"name\": pulumi.String(\"some_name\"),\n\t\t\t},\n\t\t\tExtraAnnotations: pulumi.StringMap{\n\t\t\t\t\"env\": pulumi.String(\"development\"),\n\t\t\t\t\"location\": pulumi.String(\"earth\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = kubernetes.GetServiceAccountTokenOutput(ctx, kubernetes.GetServiceAccountTokenOutputArgs{\n\t\t\tBackend: config.Path,\n\t\t\tRole: role.Name,\n\t\t\tKubernetesNamespace: pulumi.String(\"test\"),\n\t\t\tClusterRoleBinding: pulumi.Bool(false),\n\t\t\tTtl: pulumi.String(\"1h\"),\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.kubernetes.SecretBackend;\nimport com.pulumi.vault.kubernetes.SecretBackendArgs;\nimport com.pulumi.vault.kubernetes.SecretBackendRole;\nimport com.pulumi.vault.kubernetes.SecretBackendRoleArgs;\nimport com.pulumi.vault.kubernetes.KubernetesFunctions;\nimport com.pulumi.vault.kubernetes.inputs.GetServiceAccountTokenArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var config = new SecretBackend(\"config\", SecretBackendArgs.builder()\n .path(\"kubernetes\")\n .description(\"kubernetes secrets engine description\")\n .kubernetesHost(\"https://127.0.0.1:61233\")\n .kubernetesCaCert(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/cert\")\n .build()).result())\n .serviceAccountJwt(StdFunctions.file(FileArgs.builder()\n .input(\"/path/to/token\")\n .build()).result())\n .disableLocalCaJwt(false)\n .build());\n\n var role = new SecretBackendRole(\"role\", SecretBackendRoleArgs.builder()\n .backend(config.path())\n .name(\"service-account-name-role\")\n .allowedKubernetesNamespaces(\"*\")\n .tokenMaxTtl(43200)\n .tokenDefaultTtl(21600)\n .serviceAccountName(\"test-service-account-with-generated-token\")\n .extraLabels(Map.ofEntries(\n Map.entry(\"id\", \"abc123\"),\n Map.entry(\"name\", \"some_name\")\n ))\n .extraAnnotations(Map.ofEntries(\n Map.entry(\"env\", \"development\"),\n Map.entry(\"location\", \"earth\")\n ))\n .build());\n\n final var token = KubernetesFunctions.getServiceAccountToken(GetServiceAccountTokenArgs.builder()\n .backend(config.path())\n .role(role.name())\n .kubernetesNamespace(\"test\")\n .clusterRoleBinding(false)\n .ttl(\"1h\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n config:\n type: vault:kubernetes:SecretBackend\n properties:\n path: kubernetes\n description: kubernetes secrets engine description\n kubernetesHost: https://127.0.0.1:61233\n kubernetesCaCert:\n fn::invoke:\n function: std:file\n arguments:\n input: /path/to/cert\n return: result\n serviceAccountJwt:\n fn::invoke:\n function: std:file\n arguments:\n input: /path/to/token\n return: result\n disableLocalCaJwt: false\n role:\n type: vault:kubernetes:SecretBackendRole\n properties:\n backend: ${config.path}\n name: service-account-name-role\n allowedKubernetesNamespaces:\n - '*'\n tokenMaxTtl: 43200\n tokenDefaultTtl: 21600\n serviceAccountName: test-service-account-with-generated-token\n extraLabels:\n id: abc123\n name: some_name\n extraAnnotations:\n env: development\n location: earth\nvariables:\n token:\n fn::invoke:\n function: vault:kubernetes:getServiceAccountToken\n arguments:\n backend: ${config.path}\n role: ${role.name}\n kubernetesNamespace: test\n clusterRoleBinding: false\n ttl: 1h\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getServiceAccountToken.\n", "properties": { @@ -34181,7 +34181,7 @@ } }, "vault:kv/getSecret:getSecret": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst kvv1 = new vault.Mount(\"kvv1\", {\n path: \"kvv1\",\n type: \"kv\",\n options: {\n version: \"1\",\n },\n description: \"KV Version 1 secret engine mount\",\n});\nconst secret = new vault.kv.Secret(\"secret\", {\n path: pulumi.interpolate`${kvv1.path}/secret`,\n dataJson: JSON.stringify({\n zip: \"zap\",\n foo: \"bar\",\n }),\n});\nconst secretData = vault.kv.getSecretOutput({\n path: secret.path,\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_vault as vault\n\nkvv1 = vault.Mount(\"kvv1\",\n path=\"kvv1\",\n type=\"kv\",\n options={\n \"version\": \"1\",\n },\n description=\"KV Version 1 secret engine mount\")\nsecret = vault.kv.Secret(\"secret\",\n path=kvv1.path.apply(lambda path: f\"{path}/secret\"),\n data_json=json.dumps({\n \"zip\": \"zap\",\n \"foo\": \"bar\",\n }))\nsecret_data = vault.kv.get_secret_output(path=secret.path)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var kvv1 = new Vault.Mount(\"kvv1\", new()\n {\n Path = \"kvv1\",\n Type = \"kv\",\n Options = \n {\n { \"version\", \"1\" },\n },\n Description = \"KV Version 1 secret engine mount\",\n });\n\n var secret = new Vault.Kv.Secret(\"secret\", new()\n {\n Path = kvv1.Path.Apply(path =\u003e $\"{path}/secret\"),\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"zip\"] = \"zap\",\n [\"foo\"] = \"bar\",\n }),\n });\n\n var secretData = Vault.kv.GetSecret.Invoke(new()\n {\n Path = secret.Path,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kv\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkvv1, err := vault.NewMount(ctx, \"kvv1\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"kvv1\"),\n\t\t\tType: pulumi.String(\"kv\"),\n\t\t\tOptions: pulumi.StringMap{\n\t\t\t\t\"version\": pulumi.String(\"1\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"KV Version 1 secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"zip\": \"zap\",\n\t\t\t\"foo\": \"bar\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\tsecret, err := kv.NewSecret(ctx, \"secret\", \u0026kv.SecretArgs{\n\t\t\tPath: kvv1.Path.ApplyT(func(path string) (string, error) {\n\t\t\t\treturn fmt.Sprintf(\"%v/secret\", path), nil\n\t\t\t}).(pulumi.StringOutput),\n\t\t\tDataJson: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = kv.LookupSecretOutput(ctx, kv.GetSecretOutputArgs{\n\t\t\tPath: secret.Path,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.kv.Secret;\nimport com.pulumi.vault.kv.SecretArgs;\nimport com.pulumi.vault.kv.KvFunctions;\nimport com.pulumi.vault.kv.inputs.GetSecretArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var kvv1 = new Mount(\"kvv1\", MountArgs.builder()\n .path(\"kvv1\")\n .type(\"kv\")\n .options(Map.of(\"version\", \"1\"))\n .description(\"KV Version 1 secret engine mount\")\n .build());\n\n var secret = new Secret(\"secret\", SecretArgs.builder()\n .path(kvv1.path().applyValue(path -\u003e String.format(\"%s/secret\", path)))\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"zip\", \"zap\"),\n jsonProperty(\"foo\", \"bar\")\n )))\n .build());\n\n final var secretData = KvFunctions.getSecret(GetSecretArgs.builder()\n .path(secret.path())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n kvv1:\n type: vault:Mount\n properties:\n path: kvv1\n type: kv\n options:\n version: '1'\n description: KV Version 1 secret engine mount\n secret:\n type: vault:kv:Secret\n properties:\n path: ${kvv1.path}/secret\n dataJson:\n fn::toJSON:\n zip: zap\n foo: bar\nvariables:\n secretData:\n fn::invoke:\n Function: vault:kv:getSecret\n Arguments:\n path: ${secret.path}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `read` capability on the given path.\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst kvv1 = new vault.Mount(\"kvv1\", {\n path: \"kvv1\",\n type: \"kv\",\n options: {\n version: \"1\",\n },\n description: \"KV Version 1 secret engine mount\",\n});\nconst secret = new vault.kv.Secret(\"secret\", {\n path: pulumi.interpolate`${kvv1.path}/secret`,\n dataJson: JSON.stringify({\n zip: \"zap\",\n foo: \"bar\",\n }),\n});\nconst secretData = vault.kv.getSecretOutput({\n path: secret.path,\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_vault as vault\n\nkvv1 = vault.Mount(\"kvv1\",\n path=\"kvv1\",\n type=\"kv\",\n options={\n \"version\": \"1\",\n },\n description=\"KV Version 1 secret engine mount\")\nsecret = vault.kv.Secret(\"secret\",\n path=kvv1.path.apply(lambda path: f\"{path}/secret\"),\n data_json=json.dumps({\n \"zip\": \"zap\",\n \"foo\": \"bar\",\n }))\nsecret_data = vault.kv.get_secret_output(path=secret.path)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var kvv1 = new Vault.Mount(\"kvv1\", new()\n {\n Path = \"kvv1\",\n Type = \"kv\",\n Options = \n {\n { \"version\", \"1\" },\n },\n Description = \"KV Version 1 secret engine mount\",\n });\n\n var secret = new Vault.Kv.Secret(\"secret\", new()\n {\n Path = kvv1.Path.Apply(path =\u003e $\"{path}/secret\"),\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"zip\"] = \"zap\",\n [\"foo\"] = \"bar\",\n }),\n });\n\n var secretData = Vault.kv.GetSecret.Invoke(new()\n {\n Path = secret.Path,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kv\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkvv1, err := vault.NewMount(ctx, \"kvv1\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"kvv1\"),\n\t\t\tType: pulumi.String(\"kv\"),\n\t\t\tOptions: pulumi.StringMap{\n\t\t\t\t\"version\": pulumi.String(\"1\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"KV Version 1 secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"zip\": \"zap\",\n\t\t\t\"foo\": \"bar\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\tsecret, err := kv.NewSecret(ctx, \"secret\", \u0026kv.SecretArgs{\n\t\t\tPath: kvv1.Path.ApplyT(func(path string) (string, error) {\n\t\t\t\treturn fmt.Sprintf(\"%v/secret\", path), nil\n\t\t\t}).(pulumi.StringOutput),\n\t\t\tDataJson: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = kv.LookupSecretOutput(ctx, kv.GetSecretOutputArgs{\n\t\t\tPath: secret.Path,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.kv.Secret;\nimport com.pulumi.vault.kv.SecretArgs;\nimport com.pulumi.vault.kv.KvFunctions;\nimport com.pulumi.vault.kv.inputs.GetSecretArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var kvv1 = new Mount(\"kvv1\", MountArgs.builder()\n .path(\"kvv1\")\n .type(\"kv\")\n .options(Map.of(\"version\", \"1\"))\n .description(\"KV Version 1 secret engine mount\")\n .build());\n\n var secret = new Secret(\"secret\", SecretArgs.builder()\n .path(kvv1.path().applyValue(path -\u003e String.format(\"%s/secret\", path)))\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"zip\", \"zap\"),\n jsonProperty(\"foo\", \"bar\")\n )))\n .build());\n\n final var secretData = KvFunctions.getSecret(GetSecretArgs.builder()\n .path(secret.path())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n kvv1:\n type: vault:Mount\n properties:\n path: kvv1\n type: kv\n options:\n version: '1'\n description: KV Version 1 secret engine mount\n secret:\n type: vault:kv:Secret\n properties:\n path: ${kvv1.path}/secret\n dataJson:\n fn::toJSON:\n zip: zap\n foo: bar\nvariables:\n secretData:\n fn::invoke:\n function: vault:kv:getSecret\n arguments:\n path: ${secret.path}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `read` capability on the given path.\n", "inputs": { "description": "A collection of arguments for invoking getSecret.\n", "properties": { @@ -34253,7 +34253,7 @@ } }, "vault:kv/getSecretSubkeysV2:getSecretSubkeysV2": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst kvv2 = new vault.Mount(\"kvv2\", {\n path: \"kvv2\",\n type: \"kv\",\n options: {\n version: \"2\",\n },\n description: \"KV Version 2 secret engine mount\",\n});\nconst awsSecret = new vault.kv.SecretV2(\"aws_secret\", {\n mount: kvv2.path,\n name: \"aws_secret\",\n dataJson: JSON.stringify({\n zip: \"zap\",\n foo: \"bar\",\n }),\n});\nconst test = vault.kv.getSecretSubkeysV2Output({\n mount: kvv2.path,\n name: awsSecret.name,\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_vault as vault\n\nkvv2 = vault.Mount(\"kvv2\",\n path=\"kvv2\",\n type=\"kv\",\n options={\n \"version\": \"2\",\n },\n description=\"KV Version 2 secret engine mount\")\naws_secret = vault.kv.SecretV2(\"aws_secret\",\n mount=kvv2.path,\n name=\"aws_secret\",\n data_json=json.dumps({\n \"zip\": \"zap\",\n \"foo\": \"bar\",\n }))\ntest = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,\n name=aws_secret.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var kvv2 = new Vault.Mount(\"kvv2\", new()\n {\n Path = \"kvv2\",\n Type = \"kv\",\n Options = \n {\n { \"version\", \"2\" },\n },\n Description = \"KV Version 2 secret engine mount\",\n });\n\n var awsSecret = new Vault.Kv.SecretV2(\"aws_secret\", new()\n {\n Mount = kvv2.Path,\n Name = \"aws_secret\",\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"zip\"] = \"zap\",\n [\"foo\"] = \"bar\",\n }),\n });\n\n var test = Vault.kv.GetSecretSubkeysV2.Invoke(new()\n {\n Mount = kvv2.Path,\n Name = awsSecret.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kv\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkvv2, err := vault.NewMount(ctx, \"kvv2\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"kvv2\"),\n\t\t\tType: pulumi.String(\"kv\"),\n\t\t\tOptions: pulumi.StringMap{\n\t\t\t\t\"version\": pulumi.String(\"2\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"KV Version 2 secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"zip\": \"zap\",\n\t\t\t\"foo\": \"bar\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\tawsSecret, err := kv.NewSecretV2(ctx, \"aws_secret\", \u0026kv.SecretV2Args{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: pulumi.String(\"aws_secret\"),\n\t\t\tDataJson: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = kv.GetSecretSubkeysV2Output(ctx, kv.GetSecretSubkeysV2OutputArgs{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: awsSecret.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.kv.SecretV2;\nimport com.pulumi.vault.kv.SecretV2Args;\nimport com.pulumi.vault.kv.KvFunctions;\nimport com.pulumi.vault.kv.inputs.GetSecretSubkeysV2Args;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var kvv2 = new Mount(\"kvv2\", MountArgs.builder()\n .path(\"kvv2\")\n .type(\"kv\")\n .options(Map.of(\"version\", \"2\"))\n .description(\"KV Version 2 secret engine mount\")\n .build());\n\n var awsSecret = new SecretV2(\"awsSecret\", SecretV2Args.builder()\n .mount(kvv2.path())\n .name(\"aws_secret\")\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"zip\", \"zap\"),\n jsonProperty(\"foo\", \"bar\")\n )))\n .build());\n\n final var test = KvFunctions.getSecretSubkeysV2(GetSecretSubkeysV2Args.builder()\n .mount(kvv2.path())\n .name(awsSecret.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n kvv2:\n type: vault:Mount\n properties:\n path: kvv2\n type: kv\n options:\n version: '2'\n description: KV Version 2 secret engine mount\n awsSecret:\n type: vault:kv:SecretV2\n name: aws_secret\n properties:\n mount: ${kvv2.path}\n name: aws_secret\n dataJson:\n fn::toJSON:\n zip: zap\n foo: bar\nvariables:\n test:\n fn::invoke:\n Function: vault:kv:getSecretSubkeysV2\n Arguments:\n mount: ${kvv2.path}\n name: ${awsSecret.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `read` capability on the given path.\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst kvv2 = new vault.Mount(\"kvv2\", {\n path: \"kvv2\",\n type: \"kv\",\n options: {\n version: \"2\",\n },\n description: \"KV Version 2 secret engine mount\",\n});\nconst awsSecret = new vault.kv.SecretV2(\"aws_secret\", {\n mount: kvv2.path,\n name: \"aws_secret\",\n dataJson: JSON.stringify({\n zip: \"zap\",\n foo: \"bar\",\n }),\n});\nconst test = vault.kv.getSecretSubkeysV2Output({\n mount: kvv2.path,\n name: awsSecret.name,\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_vault as vault\n\nkvv2 = vault.Mount(\"kvv2\",\n path=\"kvv2\",\n type=\"kv\",\n options={\n \"version\": \"2\",\n },\n description=\"KV Version 2 secret engine mount\")\naws_secret = vault.kv.SecretV2(\"aws_secret\",\n mount=kvv2.path,\n name=\"aws_secret\",\n data_json=json.dumps({\n \"zip\": \"zap\",\n \"foo\": \"bar\",\n }))\ntest = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,\n name=aws_secret.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var kvv2 = new Vault.Mount(\"kvv2\", new()\n {\n Path = \"kvv2\",\n Type = \"kv\",\n Options = \n {\n { \"version\", \"2\" },\n },\n Description = \"KV Version 2 secret engine mount\",\n });\n\n var awsSecret = new Vault.Kv.SecretV2(\"aws_secret\", new()\n {\n Mount = kvv2.Path,\n Name = \"aws_secret\",\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"zip\"] = \"zap\",\n [\"foo\"] = \"bar\",\n }),\n });\n\n var test = Vault.kv.GetSecretSubkeysV2.Invoke(new()\n {\n Mount = kvv2.Path,\n Name = awsSecret.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kv\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkvv2, err := vault.NewMount(ctx, \"kvv2\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"kvv2\"),\n\t\t\tType: pulumi.String(\"kv\"),\n\t\t\tOptions: pulumi.StringMap{\n\t\t\t\t\"version\": pulumi.String(\"2\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"KV Version 2 secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"zip\": \"zap\",\n\t\t\t\"foo\": \"bar\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\tawsSecret, err := kv.NewSecretV2(ctx, \"aws_secret\", \u0026kv.SecretV2Args{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: pulumi.String(\"aws_secret\"),\n\t\t\tDataJson: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = kv.GetSecretSubkeysV2Output(ctx, kv.GetSecretSubkeysV2OutputArgs{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: awsSecret.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.kv.SecretV2;\nimport com.pulumi.vault.kv.SecretV2Args;\nimport com.pulumi.vault.kv.KvFunctions;\nimport com.pulumi.vault.kv.inputs.GetSecretSubkeysV2Args;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var kvv2 = new Mount(\"kvv2\", MountArgs.builder()\n .path(\"kvv2\")\n .type(\"kv\")\n .options(Map.of(\"version\", \"2\"))\n .description(\"KV Version 2 secret engine mount\")\n .build());\n\n var awsSecret = new SecretV2(\"awsSecret\", SecretV2Args.builder()\n .mount(kvv2.path())\n .name(\"aws_secret\")\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"zip\", \"zap\"),\n jsonProperty(\"foo\", \"bar\")\n )))\n .build());\n\n final var test = KvFunctions.getSecretSubkeysV2(GetSecretSubkeysV2Args.builder()\n .mount(kvv2.path())\n .name(awsSecret.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n kvv2:\n type: vault:Mount\n properties:\n path: kvv2\n type: kv\n options:\n version: '2'\n description: KV Version 2 secret engine mount\n awsSecret:\n type: vault:kv:SecretV2\n name: aws_secret\n properties:\n mount: ${kvv2.path}\n name: aws_secret\n dataJson:\n fn::toJSON:\n zip: zap\n foo: bar\nvariables:\n test:\n fn::invoke:\n function: vault:kv:getSecretSubkeysV2\n arguments:\n mount: ${kvv2.path}\n name: ${awsSecret.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `read` capability on the given path.\n", "inputs": { "description": "A collection of arguments for invoking getSecretSubkeysV2.\n", "properties": { @@ -34336,7 +34336,7 @@ } }, "vault:kv/getSecretV2:getSecretV2": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst kvv2 = new vault.Mount(\"kvv2\", {\n path: \"kvv2\",\n type: \"kv\",\n options: {\n version: \"2\",\n },\n description: \"KV Version 2 secret engine mount\",\n});\nconst exampleSecretV2 = new vault.kv.SecretV2(\"example\", {\n mount: kvv2.path,\n name: \"secret\",\n deleteAllVersions: true,\n dataJson: JSON.stringify({\n zip: \"zap\",\n foo: \"bar\",\n }),\n});\nconst example = vault.kv.getSecretV2Output({\n mount: kvv2.path,\n name: exampleSecretV2.name,\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_vault as vault\n\nkvv2 = vault.Mount(\"kvv2\",\n path=\"kvv2\",\n type=\"kv\",\n options={\n \"version\": \"2\",\n },\n description=\"KV Version 2 secret engine mount\")\nexample_secret_v2 = vault.kv.SecretV2(\"example\",\n mount=kvv2.path,\n name=\"secret\",\n delete_all_versions=True,\n data_json=json.dumps({\n \"zip\": \"zap\",\n \"foo\": \"bar\",\n }))\nexample = vault.kv.get_secret_v2_output(mount=kvv2.path,\n name=example_secret_v2.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var kvv2 = new Vault.Mount(\"kvv2\", new()\n {\n Path = \"kvv2\",\n Type = \"kv\",\n Options = \n {\n { \"version\", \"2\" },\n },\n Description = \"KV Version 2 secret engine mount\",\n });\n\n var exampleSecretV2 = new Vault.Kv.SecretV2(\"example\", new()\n {\n Mount = kvv2.Path,\n Name = \"secret\",\n DeleteAllVersions = true,\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"zip\"] = \"zap\",\n [\"foo\"] = \"bar\",\n }),\n });\n\n var example = Vault.kv.GetSecretV2.Invoke(new()\n {\n Mount = kvv2.Path,\n Name = exampleSecretV2.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kv\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkvv2, err := vault.NewMount(ctx, \"kvv2\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"kvv2\"),\n\t\t\tType: pulumi.String(\"kv\"),\n\t\t\tOptions: pulumi.StringMap{\n\t\t\t\t\"version\": pulumi.String(\"2\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"KV Version 2 secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"zip\": \"zap\",\n\t\t\t\"foo\": \"bar\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\texampleSecretV2, err := kv.NewSecretV2(ctx, \"example\", \u0026kv.SecretV2Args{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: pulumi.String(\"secret\"),\n\t\t\tDeleteAllVersions: pulumi.Bool(true),\n\t\t\tDataJson: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = kv.LookupSecretV2Output(ctx, kv.GetSecretV2OutputArgs{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: exampleSecretV2.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.kv.SecretV2;\nimport com.pulumi.vault.kv.SecretV2Args;\nimport com.pulumi.vault.kv.KvFunctions;\nimport com.pulumi.vault.kv.inputs.GetSecretV2Args;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var kvv2 = new Mount(\"kvv2\", MountArgs.builder()\n .path(\"kvv2\")\n .type(\"kv\")\n .options(Map.of(\"version\", \"2\"))\n .description(\"KV Version 2 secret engine mount\")\n .build());\n\n var exampleSecretV2 = new SecretV2(\"exampleSecretV2\", SecretV2Args.builder()\n .mount(kvv2.path())\n .name(\"secret\")\n .deleteAllVersions(true)\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"zip\", \"zap\"),\n jsonProperty(\"foo\", \"bar\")\n )))\n .build());\n\n final var example = KvFunctions.getSecretV2(GetSecretV2Args.builder()\n .mount(kvv2.path())\n .name(exampleSecretV2.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n kvv2:\n type: vault:Mount\n properties:\n path: kvv2\n type: kv\n options:\n version: '2'\n description: KV Version 2 secret engine mount\n exampleSecretV2:\n type: vault:kv:SecretV2\n name: example\n properties:\n mount: ${kvv2.path}\n name: secret\n deleteAllVersions: true\n dataJson:\n fn::toJSON:\n zip: zap\n foo: bar\nvariables:\n example:\n fn::invoke:\n Function: vault:kv:getSecretV2\n Arguments:\n mount: ${kvv2.path}\n name: ${exampleSecretV2.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `read` capability on the given path.\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst kvv2 = new vault.Mount(\"kvv2\", {\n path: \"kvv2\",\n type: \"kv\",\n options: {\n version: \"2\",\n },\n description: \"KV Version 2 secret engine mount\",\n});\nconst exampleSecretV2 = new vault.kv.SecretV2(\"example\", {\n mount: kvv2.path,\n name: \"secret\",\n deleteAllVersions: true,\n dataJson: JSON.stringify({\n zip: \"zap\",\n foo: \"bar\",\n }),\n});\nconst example = vault.kv.getSecretV2Output({\n mount: kvv2.path,\n name: exampleSecretV2.name,\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_vault as vault\n\nkvv2 = vault.Mount(\"kvv2\",\n path=\"kvv2\",\n type=\"kv\",\n options={\n \"version\": \"2\",\n },\n description=\"KV Version 2 secret engine mount\")\nexample_secret_v2 = vault.kv.SecretV2(\"example\",\n mount=kvv2.path,\n name=\"secret\",\n delete_all_versions=True,\n data_json=json.dumps({\n \"zip\": \"zap\",\n \"foo\": \"bar\",\n }))\nexample = vault.kv.get_secret_v2_output(mount=kvv2.path,\n name=example_secret_v2.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var kvv2 = new Vault.Mount(\"kvv2\", new()\n {\n Path = \"kvv2\",\n Type = \"kv\",\n Options = \n {\n { \"version\", \"2\" },\n },\n Description = \"KV Version 2 secret engine mount\",\n });\n\n var exampleSecretV2 = new Vault.Kv.SecretV2(\"example\", new()\n {\n Mount = kvv2.Path,\n Name = \"secret\",\n DeleteAllVersions = true,\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"zip\"] = \"zap\",\n [\"foo\"] = \"bar\",\n }),\n });\n\n var example = Vault.kv.GetSecretV2.Invoke(new()\n {\n Mount = kvv2.Path,\n Name = exampleSecretV2.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kv\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkvv2, err := vault.NewMount(ctx, \"kvv2\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"kvv2\"),\n\t\t\tType: pulumi.String(\"kv\"),\n\t\t\tOptions: pulumi.StringMap{\n\t\t\t\t\"version\": pulumi.String(\"2\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"KV Version 2 secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"zip\": \"zap\",\n\t\t\t\"foo\": \"bar\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\texampleSecretV2, err := kv.NewSecretV2(ctx, \"example\", \u0026kv.SecretV2Args{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: pulumi.String(\"secret\"),\n\t\t\tDeleteAllVersions: pulumi.Bool(true),\n\t\t\tDataJson: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = kv.LookupSecretV2Output(ctx, kv.GetSecretV2OutputArgs{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: exampleSecretV2.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.kv.SecretV2;\nimport com.pulumi.vault.kv.SecretV2Args;\nimport com.pulumi.vault.kv.KvFunctions;\nimport com.pulumi.vault.kv.inputs.GetSecretV2Args;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var kvv2 = new Mount(\"kvv2\", MountArgs.builder()\n .path(\"kvv2\")\n .type(\"kv\")\n .options(Map.of(\"version\", \"2\"))\n .description(\"KV Version 2 secret engine mount\")\n .build());\n\n var exampleSecretV2 = new SecretV2(\"exampleSecretV2\", SecretV2Args.builder()\n .mount(kvv2.path())\n .name(\"secret\")\n .deleteAllVersions(true)\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"zip\", \"zap\"),\n jsonProperty(\"foo\", \"bar\")\n )))\n .build());\n\n final var example = KvFunctions.getSecretV2(GetSecretV2Args.builder()\n .mount(kvv2.path())\n .name(exampleSecretV2.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n kvv2:\n type: vault:Mount\n properties:\n path: kvv2\n type: kv\n options:\n version: '2'\n description: KV Version 2 secret engine mount\n exampleSecretV2:\n type: vault:kv:SecretV2\n name: example\n properties:\n mount: ${kvv2.path}\n name: secret\n deleteAllVersions: true\n dataJson:\n fn::toJSON:\n zip: zap\n foo: bar\nvariables:\n example:\n fn::invoke:\n function: vault:kv:getSecretV2\n arguments:\n mount: ${kvv2.path}\n name: ${exampleSecretV2.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `read` capability on the given path.\n", "inputs": { "description": "A collection of arguments for invoking getSecretV2.\n", "properties": { @@ -34437,7 +34437,7 @@ } }, "vault:kv/getSecretsList:getSecretsList": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst kvv1 = new vault.Mount(\"kvv1\", {\n path: \"kvv1\",\n type: \"kv\",\n options: {\n version: \"1\",\n },\n description: \"KV Version 1 secret engine mount\",\n});\nconst awsSecret = new vault.kv.Secret(\"aws_secret\", {\n path: pulumi.interpolate`${kvv1.path}/aws-secret`,\n dataJson: JSON.stringify({\n zip: \"zap\",\n }),\n});\nconst azureSecret = new vault.kv.Secret(\"azure_secret\", {\n path: pulumi.interpolate`${kvv1.path}/azure-secret`,\n dataJson: JSON.stringify({\n foo: \"bar\",\n }),\n});\nconst secrets = vault.kv.getSecretsListOutput({\n path: kvv1.path,\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_vault as vault\n\nkvv1 = vault.Mount(\"kvv1\",\n path=\"kvv1\",\n type=\"kv\",\n options={\n \"version\": \"1\",\n },\n description=\"KV Version 1 secret engine mount\")\naws_secret = vault.kv.Secret(\"aws_secret\",\n path=kvv1.path.apply(lambda path: f\"{path}/aws-secret\"),\n data_json=json.dumps({\n \"zip\": \"zap\",\n }))\nazure_secret = vault.kv.Secret(\"azure_secret\",\n path=kvv1.path.apply(lambda path: f\"{path}/azure-secret\"),\n data_json=json.dumps({\n \"foo\": \"bar\",\n }))\nsecrets = vault.kv.get_secrets_list_output(path=kvv1.path)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var kvv1 = new Vault.Mount(\"kvv1\", new()\n {\n Path = \"kvv1\",\n Type = \"kv\",\n Options = \n {\n { \"version\", \"1\" },\n },\n Description = \"KV Version 1 secret engine mount\",\n });\n\n var awsSecret = new Vault.Kv.Secret(\"aws_secret\", new()\n {\n Path = kvv1.Path.Apply(path =\u003e $\"{path}/aws-secret\"),\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"zip\"] = \"zap\",\n }),\n });\n\n var azureSecret = new Vault.Kv.Secret(\"azure_secret\", new()\n {\n Path = kvv1.Path.Apply(path =\u003e $\"{path}/azure-secret\"),\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"foo\"] = \"bar\",\n }),\n });\n\n var secrets = Vault.kv.GetSecretsList.Invoke(new()\n {\n Path = kvv1.Path,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kv\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkvv1, err := vault.NewMount(ctx, \"kvv1\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"kvv1\"),\n\t\t\tType: pulumi.String(\"kv\"),\n\t\t\tOptions: pulumi.StringMap{\n\t\t\t\t\"version\": pulumi.String(\"1\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"KV Version 1 secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"zip\": \"zap\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\t_, err = kv.NewSecret(ctx, \"aws_secret\", \u0026kv.SecretArgs{\n\t\t\tPath: kvv1.Path.ApplyT(func(path string) (string, error) {\n\t\t\t\treturn fmt.Sprintf(\"%v/aws-secret\", path), nil\n\t\t\t}).(pulumi.StringOutput),\n\t\t\tDataJson: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON1, err := json.Marshal(map[string]interface{}{\n\t\t\t\"foo\": \"bar\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson1 := string(tmpJSON1)\n\t\t_, err = kv.NewSecret(ctx, \"azure_secret\", \u0026kv.SecretArgs{\n\t\t\tPath: kvv1.Path.ApplyT(func(path string) (string, error) {\n\t\t\t\treturn fmt.Sprintf(\"%v/azure-secret\", path), nil\n\t\t\t}).(pulumi.StringOutput),\n\t\t\tDataJson: pulumi.String(json1),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = kv.GetSecretsListOutput(ctx, kv.GetSecretsListOutputArgs{\n\t\t\tPath: kvv1.Path,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.kv.Secret;\nimport com.pulumi.vault.kv.SecretArgs;\nimport com.pulumi.vault.kv.KvFunctions;\nimport com.pulumi.vault.kv.inputs.GetSecretsListArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var kvv1 = new Mount(\"kvv1\", MountArgs.builder()\n .path(\"kvv1\")\n .type(\"kv\")\n .options(Map.of(\"version\", \"1\"))\n .description(\"KV Version 1 secret engine mount\")\n .build());\n\n var awsSecret = new Secret(\"awsSecret\", SecretArgs.builder()\n .path(kvv1.path().applyValue(path -\u003e String.format(\"%s/aws-secret\", path)))\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"zip\", \"zap\")\n )))\n .build());\n\n var azureSecret = new Secret(\"azureSecret\", SecretArgs.builder()\n .path(kvv1.path().applyValue(path -\u003e String.format(\"%s/azure-secret\", path)))\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"foo\", \"bar\")\n )))\n .build());\n\n final var secrets = KvFunctions.getSecretsList(GetSecretsListArgs.builder()\n .path(kvv1.path())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n kvv1:\n type: vault:Mount\n properties:\n path: kvv1\n type: kv\n options:\n version: '1'\n description: KV Version 1 secret engine mount\n awsSecret:\n type: vault:kv:Secret\n name: aws_secret\n properties:\n path: ${kvv1.path}/aws-secret\n dataJson:\n fn::toJSON:\n zip: zap\n azureSecret:\n type: vault:kv:Secret\n name: azure_secret\n properties:\n path: ${kvv1.path}/azure-secret\n dataJson:\n fn::toJSON:\n foo: bar\nvariables:\n secrets:\n fn::invoke:\n Function: vault:kv:getSecretsList\n Arguments:\n path: ${kvv1.path}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `read` capability on the given path.\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst kvv1 = new vault.Mount(\"kvv1\", {\n path: \"kvv1\",\n type: \"kv\",\n options: {\n version: \"1\",\n },\n description: \"KV Version 1 secret engine mount\",\n});\nconst awsSecret = new vault.kv.Secret(\"aws_secret\", {\n path: pulumi.interpolate`${kvv1.path}/aws-secret`,\n dataJson: JSON.stringify({\n zip: \"zap\",\n }),\n});\nconst azureSecret = new vault.kv.Secret(\"azure_secret\", {\n path: pulumi.interpolate`${kvv1.path}/azure-secret`,\n dataJson: JSON.stringify({\n foo: \"bar\",\n }),\n});\nconst secrets = vault.kv.getSecretsListOutput({\n path: kvv1.path,\n});\n```\n```python\nimport pulumi\nimport json\nimport pulumi_vault as vault\n\nkvv1 = vault.Mount(\"kvv1\",\n path=\"kvv1\",\n type=\"kv\",\n options={\n \"version\": \"1\",\n },\n description=\"KV Version 1 secret engine mount\")\naws_secret = vault.kv.Secret(\"aws_secret\",\n path=kvv1.path.apply(lambda path: f\"{path}/aws-secret\"),\n data_json=json.dumps({\n \"zip\": \"zap\",\n }))\nazure_secret = vault.kv.Secret(\"azure_secret\",\n path=kvv1.path.apply(lambda path: f\"{path}/azure-secret\"),\n data_json=json.dumps({\n \"foo\": \"bar\",\n }))\nsecrets = vault.kv.get_secrets_list_output(path=kvv1.path)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var kvv1 = new Vault.Mount(\"kvv1\", new()\n {\n Path = \"kvv1\",\n Type = \"kv\",\n Options = \n {\n { \"version\", \"1\" },\n },\n Description = \"KV Version 1 secret engine mount\",\n });\n\n var awsSecret = new Vault.Kv.Secret(\"aws_secret\", new()\n {\n Path = kvv1.Path.Apply(path =\u003e $\"{path}/aws-secret\"),\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"zip\"] = \"zap\",\n }),\n });\n\n var azureSecret = new Vault.Kv.Secret(\"azure_secret\", new()\n {\n Path = kvv1.Path.Apply(path =\u003e $\"{path}/azure-secret\"),\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"foo\"] = \"bar\",\n }),\n });\n\n var secrets = Vault.kv.GetSecretsList.Invoke(new()\n {\n Path = kvv1.Path,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kv\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkvv1, err := vault.NewMount(ctx, \"kvv1\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"kvv1\"),\n\t\t\tType: pulumi.String(\"kv\"),\n\t\t\tOptions: pulumi.StringMap{\n\t\t\t\t\"version\": pulumi.String(\"1\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"KV Version 1 secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"zip\": \"zap\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\t_, err = kv.NewSecret(ctx, \"aws_secret\", \u0026kv.SecretArgs{\n\t\t\tPath: kvv1.Path.ApplyT(func(path string) (string, error) {\n\t\t\t\treturn fmt.Sprintf(\"%v/aws-secret\", path), nil\n\t\t\t}).(pulumi.StringOutput),\n\t\t\tDataJson: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON1, err := json.Marshal(map[string]interface{}{\n\t\t\t\"foo\": \"bar\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson1 := string(tmpJSON1)\n\t\t_, err = kv.NewSecret(ctx, \"azure_secret\", \u0026kv.SecretArgs{\n\t\t\tPath: kvv1.Path.ApplyT(func(path string) (string, error) {\n\t\t\t\treturn fmt.Sprintf(\"%v/azure-secret\", path), nil\n\t\t\t}).(pulumi.StringOutput),\n\t\t\tDataJson: pulumi.String(json1),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = kv.GetSecretsListOutput(ctx, kv.GetSecretsListOutputArgs{\n\t\t\tPath: kvv1.Path,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.kv.Secret;\nimport com.pulumi.vault.kv.SecretArgs;\nimport com.pulumi.vault.kv.KvFunctions;\nimport com.pulumi.vault.kv.inputs.GetSecretsListArgs;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var kvv1 = new Mount(\"kvv1\", MountArgs.builder()\n .path(\"kvv1\")\n .type(\"kv\")\n .options(Map.of(\"version\", \"1\"))\n .description(\"KV Version 1 secret engine mount\")\n .build());\n\n var awsSecret = new Secret(\"awsSecret\", SecretArgs.builder()\n .path(kvv1.path().applyValue(path -\u003e String.format(\"%s/aws-secret\", path)))\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"zip\", \"zap\")\n )))\n .build());\n\n var azureSecret = new Secret(\"azureSecret\", SecretArgs.builder()\n .path(kvv1.path().applyValue(path -\u003e String.format(\"%s/azure-secret\", path)))\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"foo\", \"bar\")\n )))\n .build());\n\n final var secrets = KvFunctions.getSecretsList(GetSecretsListArgs.builder()\n .path(kvv1.path())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n kvv1:\n type: vault:Mount\n properties:\n path: kvv1\n type: kv\n options:\n version: '1'\n description: KV Version 1 secret engine mount\n awsSecret:\n type: vault:kv:Secret\n name: aws_secret\n properties:\n path: ${kvv1.path}/aws-secret\n dataJson:\n fn::toJSON:\n zip: zap\n azureSecret:\n type: vault:kv:Secret\n name: azure_secret\n properties:\n path: ${kvv1.path}/azure-secret\n dataJson:\n fn::toJSON:\n foo: bar\nvariables:\n secrets:\n fn::invoke:\n function: vault:kv:getSecretsList\n arguments:\n path: ${kvv1.path}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `read` capability on the given path.\n", "inputs": { "description": "A collection of arguments for invoking getSecretsList.\n", "properties": { @@ -34487,7 +34487,7 @@ } }, "vault:kv/getSecretsListV2:getSecretsListV2": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst kvv2 = new vault.Mount(\"kvv2\", {\n path: \"kvv2\",\n type: \"kv\",\n options: {\n version: \"2\",\n },\n description: \"KV Version 2 secret engine mount\",\n});\nconst awsSecret = new vault.kv.SecretV2(\"aws_secret\", {\n mount: kvv2.path,\n name: \"aws_secret\",\n dataJson: JSON.stringify({\n zip: \"zap\",\n }),\n});\nconst azureSecret = new vault.kv.SecretV2(\"azure_secret\", {\n mount: kvv2.path,\n name: \"azure_secret\",\n dataJson: JSON.stringify({\n foo: \"bar\",\n }),\n});\nconst nestedSecret = new vault.kv.SecretV2(\"nested_secret\", {\n mount: kvv2.path,\n name: pulumi.interpolate`${azureSecret.name}/dev`,\n dataJson: JSON.stringify({\n password: \"test\",\n }),\n});\nconst secrets = vault.kv.getSecretsListV2Output({\n mount: kvv2.path,\n});\nconst nestedSecrets = kvv2.path.apply(path =\u003e vault.kv.getSecretsListV2Output({\n mount: path,\n name: test2.name,\n}));\n```\n```python\nimport pulumi\nimport json\nimport pulumi_vault as vault\n\nkvv2 = vault.Mount(\"kvv2\",\n path=\"kvv2\",\n type=\"kv\",\n options={\n \"version\": \"2\",\n },\n description=\"KV Version 2 secret engine mount\")\naws_secret = vault.kv.SecretV2(\"aws_secret\",\n mount=kvv2.path,\n name=\"aws_secret\",\n data_json=json.dumps({\n \"zip\": \"zap\",\n }))\nazure_secret = vault.kv.SecretV2(\"azure_secret\",\n mount=kvv2.path,\n name=\"azure_secret\",\n data_json=json.dumps({\n \"foo\": \"bar\",\n }))\nnested_secret = vault.kv.SecretV2(\"nested_secret\",\n mount=kvv2.path,\n name=azure_secret.name.apply(lambda name: f\"{name}/dev\"),\n data_json=json.dumps({\n \"password\": \"test\",\n }))\nsecrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)\nnested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,\n name=test2[\"name\"]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var kvv2 = new Vault.Mount(\"kvv2\", new()\n {\n Path = \"kvv2\",\n Type = \"kv\",\n Options = \n {\n { \"version\", \"2\" },\n },\n Description = \"KV Version 2 secret engine mount\",\n });\n\n var awsSecret = new Vault.Kv.SecretV2(\"aws_secret\", new()\n {\n Mount = kvv2.Path,\n Name = \"aws_secret\",\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"zip\"] = \"zap\",\n }),\n });\n\n var azureSecret = new Vault.Kv.SecretV2(\"azure_secret\", new()\n {\n Mount = kvv2.Path,\n Name = \"azure_secret\",\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"foo\"] = \"bar\",\n }),\n });\n\n var nestedSecret = new Vault.Kv.SecretV2(\"nested_secret\", new()\n {\n Mount = kvv2.Path,\n Name = azureSecret.Name.Apply(name =\u003e $\"{name}/dev\"),\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"password\"] = \"test\",\n }),\n });\n\n var secrets = Vault.kv.GetSecretsListV2.Invoke(new()\n {\n Mount = kvv2.Path,\n });\n\n var nestedSecrets = Vault.kv.GetSecretsListV2.Invoke(new()\n {\n Mount = kvv2.Path,\n Name = test2.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kv\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkvv2, err := vault.NewMount(ctx, \"kvv2\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"kvv2\"),\n\t\t\tType: pulumi.String(\"kv\"),\n\t\t\tOptions: pulumi.StringMap{\n\t\t\t\t\"version\": pulumi.String(\"2\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"KV Version 2 secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"zip\": \"zap\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\t_, err = kv.NewSecretV2(ctx, \"aws_secret\", \u0026kv.SecretV2Args{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: pulumi.String(\"aws_secret\"),\n\t\t\tDataJson: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON1, err := json.Marshal(map[string]interface{}{\n\t\t\t\"foo\": \"bar\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson1 := string(tmpJSON1)\n\t\tazureSecret, err := kv.NewSecretV2(ctx, \"azure_secret\", \u0026kv.SecretV2Args{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: pulumi.String(\"azure_secret\"),\n\t\t\tDataJson: pulumi.String(json1),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON2, err := json.Marshal(map[string]interface{}{\n\t\t\t\"password\": \"test\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson2 := string(tmpJSON2)\n\t\t_, err = kv.NewSecretV2(ctx, \"nested_secret\", \u0026kv.SecretV2Args{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: azureSecret.Name.ApplyT(func(name string) (string, error) {\n\t\t\t\treturn fmt.Sprintf(\"%v/dev\", name), nil\n\t\t\t}).(pulumi.StringOutput),\n\t\t\tDataJson: pulumi.String(json2),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = kv.GetSecretsListV2Output(ctx, kv.GetSecretsListV2OutputArgs{\n\t\t\tMount: kvv2.Path,\n\t\t}, nil)\n\t\t_ = kvv2.Path.ApplyT(func(path string) (kv.GetSecretsListV2Result, error) {\n\t\t\treturn kv.GetSecretsListV2Result(interface{}(kv.GetSecretsListV2Output(ctx, kv.GetSecretsListV2OutputArgs{\n\t\t\t\tMount: path,\n\t\t\t\tName: test2.Name,\n\t\t\t}, nil))), nil\n\t\t}).(kv.GetSecretsListV2ResultOutput)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.kv.SecretV2;\nimport com.pulumi.vault.kv.SecretV2Args;\nimport com.pulumi.vault.kv.KvFunctions;\nimport com.pulumi.vault.kv.inputs.GetSecretsListV2Args;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var kvv2 = new Mount(\"kvv2\", MountArgs.builder()\n .path(\"kvv2\")\n .type(\"kv\")\n .options(Map.of(\"version\", \"2\"))\n .description(\"KV Version 2 secret engine mount\")\n .build());\n\n var awsSecret = new SecretV2(\"awsSecret\", SecretV2Args.builder()\n .mount(kvv2.path())\n .name(\"aws_secret\")\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"zip\", \"zap\")\n )))\n .build());\n\n var azureSecret = new SecretV2(\"azureSecret\", SecretV2Args.builder()\n .mount(kvv2.path())\n .name(\"azure_secret\")\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"foo\", \"bar\")\n )))\n .build());\n\n var nestedSecret = new SecretV2(\"nestedSecret\", SecretV2Args.builder()\n .mount(kvv2.path())\n .name(azureSecret.name().applyValue(name -\u003e String.format(\"%s/dev\", name)))\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"password\", \"test\")\n )))\n .build());\n\n final var secrets = KvFunctions.getSecretsListV2(GetSecretsListV2Args.builder()\n .mount(kvv2.path())\n .build());\n\n final var nestedSecrets = KvFunctions.getSecretsListV2(GetSecretsListV2Args.builder()\n .mount(kvv2.path())\n .name(test2.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n kvv2:\n type: vault:Mount\n properties:\n path: kvv2\n type: kv\n options:\n version: '2'\n description: KV Version 2 secret engine mount\n awsSecret:\n type: vault:kv:SecretV2\n name: aws_secret\n properties:\n mount: ${kvv2.path}\n name: aws_secret\n dataJson:\n fn::toJSON:\n zip: zap\n azureSecret:\n type: vault:kv:SecretV2\n name: azure_secret\n properties:\n mount: ${kvv2.path}\n name: azure_secret\n dataJson:\n fn::toJSON:\n foo: bar\n nestedSecret:\n type: vault:kv:SecretV2\n name: nested_secret\n properties:\n mount: ${kvv2.path}\n name: ${azureSecret.name}/dev\n dataJson:\n fn::toJSON:\n password: test\nvariables:\n secrets:\n fn::invoke:\n Function: vault:kv:getSecretsListV2\n Arguments:\n mount: ${kvv2.path}\n nestedSecrets:\n fn::invoke:\n Function: vault:kv:getSecretsListV2\n Arguments:\n mount: ${kvv2.path}\n name: ${test2.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `read` capability on the given path.\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst kvv2 = new vault.Mount(\"kvv2\", {\n path: \"kvv2\",\n type: \"kv\",\n options: {\n version: \"2\",\n },\n description: \"KV Version 2 secret engine mount\",\n});\nconst awsSecret = new vault.kv.SecretV2(\"aws_secret\", {\n mount: kvv2.path,\n name: \"aws_secret\",\n dataJson: JSON.stringify({\n zip: \"zap\",\n }),\n});\nconst azureSecret = new vault.kv.SecretV2(\"azure_secret\", {\n mount: kvv2.path,\n name: \"azure_secret\",\n dataJson: JSON.stringify({\n foo: \"bar\",\n }),\n});\nconst nestedSecret = new vault.kv.SecretV2(\"nested_secret\", {\n mount: kvv2.path,\n name: pulumi.interpolate`${azureSecret.name}/dev`,\n dataJson: JSON.stringify({\n password: \"test\",\n }),\n});\nconst secrets = vault.kv.getSecretsListV2Output({\n mount: kvv2.path,\n});\nconst nestedSecrets = kvv2.path.apply(path =\u003e vault.kv.getSecretsListV2Output({\n mount: path,\n name: test2.name,\n}));\n```\n```python\nimport pulumi\nimport json\nimport pulumi_vault as vault\n\nkvv2 = vault.Mount(\"kvv2\",\n path=\"kvv2\",\n type=\"kv\",\n options={\n \"version\": \"2\",\n },\n description=\"KV Version 2 secret engine mount\")\naws_secret = vault.kv.SecretV2(\"aws_secret\",\n mount=kvv2.path,\n name=\"aws_secret\",\n data_json=json.dumps({\n \"zip\": \"zap\",\n }))\nazure_secret = vault.kv.SecretV2(\"azure_secret\",\n mount=kvv2.path,\n name=\"azure_secret\",\n data_json=json.dumps({\n \"foo\": \"bar\",\n }))\nnested_secret = vault.kv.SecretV2(\"nested_secret\",\n mount=kvv2.path,\n name=azure_secret.name.apply(lambda name: f\"{name}/dev\"),\n data_json=json.dumps({\n \"password\": \"test\",\n }))\nsecrets = vault.kv.get_secrets_list_v2_output(mount=kvv2.path)\nnested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,\n name=test2[\"name\"]))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing System.Text.Json;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var kvv2 = new Vault.Mount(\"kvv2\", new()\n {\n Path = \"kvv2\",\n Type = \"kv\",\n Options = \n {\n { \"version\", \"2\" },\n },\n Description = \"KV Version 2 secret engine mount\",\n });\n\n var awsSecret = new Vault.Kv.SecretV2(\"aws_secret\", new()\n {\n Mount = kvv2.Path,\n Name = \"aws_secret\",\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"zip\"] = \"zap\",\n }),\n });\n\n var azureSecret = new Vault.Kv.SecretV2(\"azure_secret\", new()\n {\n Mount = kvv2.Path,\n Name = \"azure_secret\",\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"foo\"] = \"bar\",\n }),\n });\n\n var nestedSecret = new Vault.Kv.SecretV2(\"nested_secret\", new()\n {\n Mount = kvv2.Path,\n Name = azureSecret.Name.Apply(name =\u003e $\"{name}/dev\"),\n DataJson = JsonSerializer.Serialize(new Dictionary\u003cstring, object?\u003e\n {\n [\"password\"] = \"test\",\n }),\n });\n\n var secrets = Vault.kv.GetSecretsListV2.Invoke(new()\n {\n Mount = kvv2.Path,\n });\n\n var nestedSecrets = Vault.kv.GetSecretsListV2.Invoke(new()\n {\n Mount = kvv2.Path,\n Name = test2.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"encoding/json\"\n\t\"fmt\"\n\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kv\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tkvv2, err := vault.NewMount(ctx, \"kvv2\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"kvv2\"),\n\t\t\tType: pulumi.String(\"kv\"),\n\t\t\tOptions: pulumi.StringMap{\n\t\t\t\t\"version\": pulumi.String(\"2\"),\n\t\t\t},\n\t\t\tDescription: pulumi.String(\"KV Version 2 secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON0, err := json.Marshal(map[string]interface{}{\n\t\t\t\"zip\": \"zap\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson0 := string(tmpJSON0)\n\t\t_, err = kv.NewSecretV2(ctx, \"aws_secret\", \u0026kv.SecretV2Args{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: pulumi.String(\"aws_secret\"),\n\t\t\tDataJson: pulumi.String(json0),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON1, err := json.Marshal(map[string]interface{}{\n\t\t\t\"foo\": \"bar\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson1 := string(tmpJSON1)\n\t\tazureSecret, err := kv.NewSecretV2(ctx, \"azure_secret\", \u0026kv.SecretV2Args{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: pulumi.String(\"azure_secret\"),\n\t\t\tDataJson: pulumi.String(json1),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttmpJSON2, err := json.Marshal(map[string]interface{}{\n\t\t\t\"password\": \"test\",\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tjson2 := string(tmpJSON2)\n\t\t_, err = kv.NewSecretV2(ctx, \"nested_secret\", \u0026kv.SecretV2Args{\n\t\t\tMount: kvv2.Path,\n\t\t\tName: azureSecret.Name.ApplyT(func(name string) (string, error) {\n\t\t\t\treturn fmt.Sprintf(\"%v/dev\", name), nil\n\t\t\t}).(pulumi.StringOutput),\n\t\t\tDataJson: pulumi.String(json2),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = kv.GetSecretsListV2Output(ctx, kv.GetSecretsListV2OutputArgs{\n\t\t\tMount: kvv2.Path,\n\t\t}, nil)\n\t\t_ = kvv2.Path.ApplyT(func(path string) (kv.GetSecretsListV2Result, error) {\n\t\t\treturn kv.GetSecretsListV2Result(interface{}(kv.GetSecretsListV2Output(ctx, kv.GetSecretsListV2OutputArgs{\n\t\t\t\tMount: path,\n\t\t\t\tName: test2.Name,\n\t\t\t}, nil))), nil\n\t\t}).(kv.GetSecretsListV2ResultOutput)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.kv.SecretV2;\nimport com.pulumi.vault.kv.SecretV2Args;\nimport com.pulumi.vault.kv.KvFunctions;\nimport com.pulumi.vault.kv.inputs.GetSecretsListV2Args;\nimport static com.pulumi.codegen.internal.Serialization.*;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var kvv2 = new Mount(\"kvv2\", MountArgs.builder()\n .path(\"kvv2\")\n .type(\"kv\")\n .options(Map.of(\"version\", \"2\"))\n .description(\"KV Version 2 secret engine mount\")\n .build());\n\n var awsSecret = new SecretV2(\"awsSecret\", SecretV2Args.builder()\n .mount(kvv2.path())\n .name(\"aws_secret\")\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"zip\", \"zap\")\n )))\n .build());\n\n var azureSecret = new SecretV2(\"azureSecret\", SecretV2Args.builder()\n .mount(kvv2.path())\n .name(\"azure_secret\")\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"foo\", \"bar\")\n )))\n .build());\n\n var nestedSecret = new SecretV2(\"nestedSecret\", SecretV2Args.builder()\n .mount(kvv2.path())\n .name(azureSecret.name().applyValue(name -\u003e String.format(\"%s/dev\", name)))\n .dataJson(serializeJson(\n jsonObject(\n jsonProperty(\"password\", \"test\")\n )))\n .build());\n\n final var secrets = KvFunctions.getSecretsListV2(GetSecretsListV2Args.builder()\n .mount(kvv2.path())\n .build());\n\n final var nestedSecrets = KvFunctions.getSecretsListV2(GetSecretsListV2Args.builder()\n .mount(kvv2.path())\n .name(test2.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n kvv2:\n type: vault:Mount\n properties:\n path: kvv2\n type: kv\n options:\n version: '2'\n description: KV Version 2 secret engine mount\n awsSecret:\n type: vault:kv:SecretV2\n name: aws_secret\n properties:\n mount: ${kvv2.path}\n name: aws_secret\n dataJson:\n fn::toJSON:\n zip: zap\n azureSecret:\n type: vault:kv:SecretV2\n name: azure_secret\n properties:\n mount: ${kvv2.path}\n name: azure_secret\n dataJson:\n fn::toJSON:\n foo: bar\n nestedSecret:\n type: vault:kv:SecretV2\n name: nested_secret\n properties:\n mount: ${kvv2.path}\n name: ${azureSecret.name}/dev\n dataJson:\n fn::toJSON:\n password: test\nvariables:\n secrets:\n fn::invoke:\n function: vault:kv:getSecretsListV2\n arguments:\n mount: ${kvv2.path}\n nestedSecrets:\n fn::invoke:\n function: vault:kv:getSecretsListV2\n arguments:\n mount: ${kvv2.path}\n name: ${test2.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `read` capability on the given path.\n", "inputs": { "description": "A collection of arguments for invoking getSecretsListV2.\n", "properties": { @@ -34701,7 +34701,7 @@ } }, "vault:pkiSecret/getBackendConfigEst:getBackendConfigEst": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst pki = new vault.Mount(\"pki\", {\n path: \"pki\",\n type: \"pki\",\n description: \"PKI secret engine mount\",\n});\nconst estConfig = vault.pkiSecret.getBackendConfigEstOutput({\n backend: pki.path,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\npki = vault.Mount(\"pki\",\n path=\"pki\",\n type=\"pki\",\n description=\"PKI secret engine mount\")\nest_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var pki = new Vault.Mount(\"pki\", new()\n {\n Path = \"pki\",\n Type = \"pki\",\n Description = \"PKI secret engine mount\",\n });\n\n var estConfig = Vault.PkiSecret.GetBackendConfigEst.Invoke(new()\n {\n Backend = pki.Path,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tpki, err := vault.NewMount(ctx, \"pki\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"pki\"),\n\t\t\tType: pulumi.String(\"pki\"),\n\t\t\tDescription: pulumi.String(\"PKI secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = pkiSecret.GetBackendConfigEstOutput(ctx, pkisecret.GetBackendConfigEstOutputArgs{\n\t\t\tBackend: pki.Path,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.pkiSecret.PkiSecretFunctions;\nimport com.pulumi.vault.pkiSecret.inputs.GetBackendConfigEstArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var pki = new Mount(\"pki\", MountArgs.builder()\n .path(\"pki\")\n .type(\"pki\")\n .description(\"PKI secret engine mount\")\n .build());\n\n final var estConfig = PkiSecretFunctions.getBackendConfigEst(GetBackendConfigEstArgs.builder()\n .backend(pki.path())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n pki:\n type: vault:Mount\n properties:\n path: pki\n type: pki\n description: PKI secret engine mount\nvariables:\n estConfig:\n fn::invoke:\n Function: vault:pkiSecret:getBackendConfigEst\n Arguments:\n backend: ${pki.path}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst pki = new vault.Mount(\"pki\", {\n path: \"pki\",\n type: \"pki\",\n description: \"PKI secret engine mount\",\n});\nconst estConfig = vault.pkiSecret.getBackendConfigEstOutput({\n backend: pki.path,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\npki = vault.Mount(\"pki\",\n path=\"pki\",\n type=\"pki\",\n description=\"PKI secret engine mount\")\nest_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var pki = new Vault.Mount(\"pki\", new()\n {\n Path = \"pki\",\n Type = \"pki\",\n Description = \"PKI secret engine mount\",\n });\n\n var estConfig = Vault.PkiSecret.GetBackendConfigEst.Invoke(new()\n {\n Backend = pki.Path,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tpki, err := vault.NewMount(ctx, \"pki\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"pki\"),\n\t\t\tType: pulumi.String(\"pki\"),\n\t\t\tDescription: pulumi.String(\"PKI secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = pkiSecret.GetBackendConfigEstOutput(ctx, pkisecret.GetBackendConfigEstOutputArgs{\n\t\t\tBackend: pki.Path,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.pkiSecret.PkiSecretFunctions;\nimport com.pulumi.vault.pkiSecret.inputs.GetBackendConfigEstArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var pki = new Mount(\"pki\", MountArgs.builder()\n .path(\"pki\")\n .type(\"pki\")\n .description(\"PKI secret engine mount\")\n .build());\n\n final var estConfig = PkiSecretFunctions.getBackendConfigEst(GetBackendConfigEstArgs.builder()\n .backend(pki.path())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n pki:\n type: vault:Mount\n properties:\n path: pki\n type: pki\n description: PKI secret engine mount\nvariables:\n estConfig:\n fn::invoke:\n function: vault:pkiSecret:getBackendConfigEst\n arguments:\n backend: ${pki.path}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getBackendConfigEst.\n", "properties": { @@ -34792,7 +34792,7 @@ } }, "vault:pkiSecret/getBackendIssuer:getBackendIssuer": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst pki = new vault.Mount(\"pki\", {\n path: \"pki\",\n type: \"pki\",\n description: \"PKI secret engine mount\",\n});\nconst root = new vault.pkisecret.SecretBackendRootCert(\"root\", {\n backend: pki.path,\n type: \"internal\",\n commonName: \"example\",\n ttl: \"86400\",\n issuerName: \"example\",\n});\nconst example = root.issuerId.apply(issuerId =\u003e vault.pkiSecret.getBackendIssuerOutput({\n backend: root.path,\n issuerRef: issuerId,\n}));\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\npki = vault.Mount(\"pki\",\n path=\"pki\",\n type=\"pki\",\n description=\"PKI secret engine mount\")\nroot = vault.pki_secret.SecretBackendRootCert(\"root\",\n backend=pki.path,\n type=\"internal\",\n common_name=\"example\",\n ttl=\"86400\",\n issuer_name=\"example\")\nexample = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,\n issuer_ref=issuer_id))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var pki = new Vault.Mount(\"pki\", new()\n {\n Path = \"pki\",\n Type = \"pki\",\n Description = \"PKI secret engine mount\",\n });\n\n var root = new Vault.PkiSecret.SecretBackendRootCert(\"root\", new()\n {\n Backend = pki.Path,\n Type = \"internal\",\n CommonName = \"example\",\n Ttl = \"86400\",\n IssuerName = \"example\",\n });\n\n var example = Vault.PkiSecret.GetBackendIssuer.Invoke(new()\n {\n Backend = root.Path,\n IssuerRef = root.IssuerId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tpki, err := vault.NewMount(ctx, \"pki\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"pki\"),\n\t\t\tType: pulumi.String(\"pki\"),\n\t\t\tDescription: pulumi.String(\"PKI secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\troot, err := pkiSecret.NewSecretBackendRootCert(ctx, \"root\", \u0026pkiSecret.SecretBackendRootCertArgs{\n\t\t\tBackend: pki.Path,\n\t\t\tType: pulumi.String(\"internal\"),\n\t\t\tCommonName: pulumi.String(\"example\"),\n\t\t\tTtl: pulumi.String(\"86400\"),\n\t\t\tIssuerName: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = root.IssuerId.ApplyT(func(issuerId string) (pkisecret.GetBackendIssuerResult, error) {\n\t\t\treturn pkisecret.GetBackendIssuerResult(interface{}(pkiSecret.GetBackendIssuerOutput(ctx, pkisecret.GetBackendIssuerOutputArgs{\n\t\t\t\tBackend: root.Path,\n\t\t\t\tIssuerRef: issuerId,\n\t\t\t}, nil))), nil\n\t\t}).(pkisecret.GetBackendIssuerResultOutput)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCert;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCertArgs;\nimport com.pulumi.vault.pkiSecret.PkiSecretFunctions;\nimport com.pulumi.vault.pkiSecret.inputs.GetBackendIssuerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var pki = new Mount(\"pki\", MountArgs.builder()\n .path(\"pki\")\n .type(\"pki\")\n .description(\"PKI secret engine mount\")\n .build());\n\n var root = new SecretBackendRootCert(\"root\", SecretBackendRootCertArgs.builder()\n .backend(pki.path())\n .type(\"internal\")\n .commonName(\"example\")\n .ttl(\"86400\")\n .issuerName(\"example\")\n .build());\n\n final var example = PkiSecretFunctions.getBackendIssuer(GetBackendIssuerArgs.builder()\n .backend(root.path())\n .issuerRef(root.issuerId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n pki:\n type: vault:Mount\n properties:\n path: pki\n type: pki\n description: PKI secret engine mount\n root:\n type: vault:pkiSecret:SecretBackendRootCert\n properties:\n backend: ${pki.path}\n type: internal\n commonName: example\n ttl: '86400'\n issuerName: example\nvariables:\n example:\n fn::invoke:\n Function: vault:pkiSecret:getBackendIssuer\n Arguments:\n backend: ${root.path}\n issuerRef: ${root.issuerId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst pki = new vault.Mount(\"pki\", {\n path: \"pki\",\n type: \"pki\",\n description: \"PKI secret engine mount\",\n});\nconst root = new vault.pkisecret.SecretBackendRootCert(\"root\", {\n backend: pki.path,\n type: \"internal\",\n commonName: \"example\",\n ttl: \"86400\",\n issuerName: \"example\",\n});\nconst example = root.issuerId.apply(issuerId =\u003e vault.pkiSecret.getBackendIssuerOutput({\n backend: root.path,\n issuerRef: issuerId,\n}));\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\npki = vault.Mount(\"pki\",\n path=\"pki\",\n type=\"pki\",\n description=\"PKI secret engine mount\")\nroot = vault.pki_secret.SecretBackendRootCert(\"root\",\n backend=pki.path,\n type=\"internal\",\n common_name=\"example\",\n ttl=\"86400\",\n issuer_name=\"example\")\nexample = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,\n issuer_ref=issuer_id))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var pki = new Vault.Mount(\"pki\", new()\n {\n Path = \"pki\",\n Type = \"pki\",\n Description = \"PKI secret engine mount\",\n });\n\n var root = new Vault.PkiSecret.SecretBackendRootCert(\"root\", new()\n {\n Backend = pki.Path,\n Type = \"internal\",\n CommonName = \"example\",\n Ttl = \"86400\",\n IssuerName = \"example\",\n });\n\n var example = Vault.PkiSecret.GetBackendIssuer.Invoke(new()\n {\n Backend = root.Path,\n IssuerRef = root.IssuerId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tpki, err := vault.NewMount(ctx, \"pki\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"pki\"),\n\t\t\tType: pulumi.String(\"pki\"),\n\t\t\tDescription: pulumi.String(\"PKI secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\troot, err := pkiSecret.NewSecretBackendRootCert(ctx, \"root\", \u0026pkiSecret.SecretBackendRootCertArgs{\n\t\t\tBackend: pki.Path,\n\t\t\tType: pulumi.String(\"internal\"),\n\t\t\tCommonName: pulumi.String(\"example\"),\n\t\t\tTtl: pulumi.String(\"86400\"),\n\t\t\tIssuerName: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = root.IssuerId.ApplyT(func(issuerId string) (pkisecret.GetBackendIssuerResult, error) {\n\t\t\treturn pkisecret.GetBackendIssuerResult(interface{}(pkiSecret.GetBackendIssuerOutput(ctx, pkisecret.GetBackendIssuerOutputArgs{\n\t\t\t\tBackend: root.Path,\n\t\t\t\tIssuerRef: issuerId,\n\t\t\t}, nil))), nil\n\t\t}).(pkisecret.GetBackendIssuerResultOutput)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCert;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCertArgs;\nimport com.pulumi.vault.pkiSecret.PkiSecretFunctions;\nimport com.pulumi.vault.pkiSecret.inputs.GetBackendIssuerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var pki = new Mount(\"pki\", MountArgs.builder()\n .path(\"pki\")\n .type(\"pki\")\n .description(\"PKI secret engine mount\")\n .build());\n\n var root = new SecretBackendRootCert(\"root\", SecretBackendRootCertArgs.builder()\n .backend(pki.path())\n .type(\"internal\")\n .commonName(\"example\")\n .ttl(\"86400\")\n .issuerName(\"example\")\n .build());\n\n final var example = PkiSecretFunctions.getBackendIssuer(GetBackendIssuerArgs.builder()\n .backend(root.path())\n .issuerRef(root.issuerId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n pki:\n type: vault:Mount\n properties:\n path: pki\n type: pki\n description: PKI secret engine mount\n root:\n type: vault:pkiSecret:SecretBackendRootCert\n properties:\n backend: ${pki.path}\n type: internal\n commonName: example\n ttl: '86400'\n issuerName: example\nvariables:\n example:\n fn::invoke:\n function: vault:pkiSecret:getBackendIssuer\n arguments:\n backend: ${root.path}\n issuerRef: ${root.issuerId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getBackendIssuer.\n", "properties": { @@ -34890,7 +34890,7 @@ } }, "vault:pkiSecret/getBackendIssuers:getBackendIssuers": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst pki = new vault.Mount(\"pki\", {\n path: \"pki\",\n type: \"pki\",\n description: \"PKI secret engine mount\",\n});\nconst root = new vault.pkisecret.SecretBackendRootCert(\"root\", {\n backend: pki.path,\n type: \"internal\",\n commonName: \"example\",\n ttl: \"86400\",\n issuerName: \"example\",\n});\nconst test = vault.pkiSecret.getBackendIssuersOutput({\n backend: root.backend,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\npki = vault.Mount(\"pki\",\n path=\"pki\",\n type=\"pki\",\n description=\"PKI secret engine mount\")\nroot = vault.pki_secret.SecretBackendRootCert(\"root\",\n backend=pki.path,\n type=\"internal\",\n common_name=\"example\",\n ttl=\"86400\",\n issuer_name=\"example\")\ntest = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var pki = new Vault.Mount(\"pki\", new()\n {\n Path = \"pki\",\n Type = \"pki\",\n Description = \"PKI secret engine mount\",\n });\n\n var root = new Vault.PkiSecret.SecretBackendRootCert(\"root\", new()\n {\n Backend = pki.Path,\n Type = \"internal\",\n CommonName = \"example\",\n Ttl = \"86400\",\n IssuerName = \"example\",\n });\n\n var test = Vault.PkiSecret.GetBackendIssuers.Invoke(new()\n {\n Backend = root.Backend,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tpki, err := vault.NewMount(ctx, \"pki\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"pki\"),\n\t\t\tType: pulumi.String(\"pki\"),\n\t\t\tDescription: pulumi.String(\"PKI secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\troot, err := pkiSecret.NewSecretBackendRootCert(ctx, \"root\", \u0026pkiSecret.SecretBackendRootCertArgs{\n\t\t\tBackend: pki.Path,\n\t\t\tType: pulumi.String(\"internal\"),\n\t\t\tCommonName: pulumi.String(\"example\"),\n\t\t\tTtl: pulumi.String(\"86400\"),\n\t\t\tIssuerName: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = pkiSecret.GetBackendIssuersOutput(ctx, pkisecret.GetBackendIssuersOutputArgs{\n\t\t\tBackend: root.Backend,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCert;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCertArgs;\nimport com.pulumi.vault.pkiSecret.PkiSecretFunctions;\nimport com.pulumi.vault.pkiSecret.inputs.GetBackendIssuersArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var pki = new Mount(\"pki\", MountArgs.builder()\n .path(\"pki\")\n .type(\"pki\")\n .description(\"PKI secret engine mount\")\n .build());\n\n var root = new SecretBackendRootCert(\"root\", SecretBackendRootCertArgs.builder()\n .backend(pki.path())\n .type(\"internal\")\n .commonName(\"example\")\n .ttl(\"86400\")\n .issuerName(\"example\")\n .build());\n\n final var test = PkiSecretFunctions.getBackendIssuers(GetBackendIssuersArgs.builder()\n .backend(root.backend())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n pki:\n type: vault:Mount\n properties:\n path: pki\n type: pki\n description: PKI secret engine mount\n root:\n type: vault:pkiSecret:SecretBackendRootCert\n properties:\n backend: ${pki.path}\n type: internal\n commonName: example\n ttl: '86400'\n issuerName: example\nvariables:\n test:\n fn::invoke:\n Function: vault:pkiSecret:getBackendIssuers\n Arguments:\n backend: ${root.backend}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst pki = new vault.Mount(\"pki\", {\n path: \"pki\",\n type: \"pki\",\n description: \"PKI secret engine mount\",\n});\nconst root = new vault.pkisecret.SecretBackendRootCert(\"root\", {\n backend: pki.path,\n type: \"internal\",\n commonName: \"example\",\n ttl: \"86400\",\n issuerName: \"example\",\n});\nconst test = vault.pkiSecret.getBackendIssuersOutput({\n backend: root.backend,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\npki = vault.Mount(\"pki\",\n path=\"pki\",\n type=\"pki\",\n description=\"PKI secret engine mount\")\nroot = vault.pki_secret.SecretBackendRootCert(\"root\",\n backend=pki.path,\n type=\"internal\",\n common_name=\"example\",\n ttl=\"86400\",\n issuer_name=\"example\")\ntest = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var pki = new Vault.Mount(\"pki\", new()\n {\n Path = \"pki\",\n Type = \"pki\",\n Description = \"PKI secret engine mount\",\n });\n\n var root = new Vault.PkiSecret.SecretBackendRootCert(\"root\", new()\n {\n Backend = pki.Path,\n Type = \"internal\",\n CommonName = \"example\",\n Ttl = \"86400\",\n IssuerName = \"example\",\n });\n\n var test = Vault.PkiSecret.GetBackendIssuers.Invoke(new()\n {\n Backend = root.Backend,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tpki, err := vault.NewMount(ctx, \"pki\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"pki\"),\n\t\t\tType: pulumi.String(\"pki\"),\n\t\t\tDescription: pulumi.String(\"PKI secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\troot, err := pkiSecret.NewSecretBackendRootCert(ctx, \"root\", \u0026pkiSecret.SecretBackendRootCertArgs{\n\t\t\tBackend: pki.Path,\n\t\t\tType: pulumi.String(\"internal\"),\n\t\t\tCommonName: pulumi.String(\"example\"),\n\t\t\tTtl: pulumi.String(\"86400\"),\n\t\t\tIssuerName: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = pkiSecret.GetBackendIssuersOutput(ctx, pkisecret.GetBackendIssuersOutputArgs{\n\t\t\tBackend: root.Backend,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCert;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCertArgs;\nimport com.pulumi.vault.pkiSecret.PkiSecretFunctions;\nimport com.pulumi.vault.pkiSecret.inputs.GetBackendIssuersArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var pki = new Mount(\"pki\", MountArgs.builder()\n .path(\"pki\")\n .type(\"pki\")\n .description(\"PKI secret engine mount\")\n .build());\n\n var root = new SecretBackendRootCert(\"root\", SecretBackendRootCertArgs.builder()\n .backend(pki.path())\n .type(\"internal\")\n .commonName(\"example\")\n .ttl(\"86400\")\n .issuerName(\"example\")\n .build());\n\n final var test = PkiSecretFunctions.getBackendIssuers(GetBackendIssuersArgs.builder()\n .backend(root.backend())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n pki:\n type: vault:Mount\n properties:\n path: pki\n type: pki\n description: PKI secret engine mount\n root:\n type: vault:pkiSecret:SecretBackendRootCert\n properties:\n backend: ${pki.path}\n type: internal\n commonName: example\n ttl: '86400'\n issuerName: example\nvariables:\n test:\n fn::invoke:\n function: vault:pkiSecret:getBackendIssuers\n arguments:\n backend: ${root.backend}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getBackendIssuers.\n", "properties": { @@ -34953,7 +34953,7 @@ } }, "vault:pkiSecret/getBackendKey:getBackendKey": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst pki = new vault.Mount(\"pki\", {\n path: \"pki\",\n type: \"pki\",\n description: \"PKI secret engine mount\",\n});\nconst key = new vault.pkisecret.SecretBackendKey(\"key\", {\n backend: pki.path,\n type: \"internal\",\n keyName: \"example\",\n keyType: \"rsa\",\n keyBits: 4096,\n});\nconst example = key.keyId.apply(keyId =\u003e vault.pkiSecret.getBackendKeyOutput({\n backend: keyVaultMount.path,\n keyRef: keyId,\n}));\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\npki = vault.Mount(\"pki\",\n path=\"pki\",\n type=\"pki\",\n description=\"PKI secret engine mount\")\nkey = vault.pki_secret.SecretBackendKey(\"key\",\n backend=pki.path,\n type=\"internal\",\n key_name=\"example\",\n key_type=\"rsa\",\n key_bits=4096)\nexample = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount[\"path\"],\n key_ref=key_id))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var pki = new Vault.Mount(\"pki\", new()\n {\n Path = \"pki\",\n Type = \"pki\",\n Description = \"PKI secret engine mount\",\n });\n\n var key = new Vault.PkiSecret.SecretBackendKey(\"key\", new()\n {\n Backend = pki.Path,\n Type = \"internal\",\n KeyName = \"example\",\n KeyType = \"rsa\",\n KeyBits = 4096,\n });\n\n var example = Vault.PkiSecret.GetBackendKey.Invoke(new()\n {\n Backend = keyVaultMount.Path,\n KeyRef = key.KeyId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tpki, err := vault.NewMount(ctx, \"pki\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"pki\"),\n\t\t\tType: pulumi.String(\"pki\"),\n\t\t\tDescription: pulumi.String(\"PKI secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tkey, err := pkiSecret.NewSecretBackendKey(ctx, \"key\", \u0026pkiSecret.SecretBackendKeyArgs{\n\t\t\tBackend: pki.Path,\n\t\t\tType: pulumi.String(\"internal\"),\n\t\t\tKeyName: pulumi.String(\"example\"),\n\t\t\tKeyType: pulumi.String(\"rsa\"),\n\t\t\tKeyBits: pulumi.Int(4096),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = key.KeyId.ApplyT(func(keyId string) (pkisecret.GetBackendKeyResult, error) {\n\t\t\treturn pkisecret.GetBackendKeyResult(interface{}(pkiSecret.GetBackendKeyOutput(ctx, pkisecret.GetBackendKeyOutputArgs{\n\t\t\t\tBackend: keyVaultMount.Path,\n\t\t\t\tKeyRef: keyId,\n\t\t\t}, nil))), nil\n\t\t}).(pkisecret.GetBackendKeyResultOutput)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.pkiSecret.SecretBackendKey;\nimport com.pulumi.vault.pkiSecret.SecretBackendKeyArgs;\nimport com.pulumi.vault.pkiSecret.PkiSecretFunctions;\nimport com.pulumi.vault.pkiSecret.inputs.GetBackendKeyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var pki = new Mount(\"pki\", MountArgs.builder()\n .path(\"pki\")\n .type(\"pki\")\n .description(\"PKI secret engine mount\")\n .build());\n\n var key = new SecretBackendKey(\"key\", SecretBackendKeyArgs.builder()\n .backend(pki.path())\n .type(\"internal\")\n .keyName(\"example\")\n .keyType(\"rsa\")\n .keyBits(\"4096\")\n .build());\n\n final var example = PkiSecretFunctions.getBackendKey(GetBackendKeyArgs.builder()\n .backend(keyVaultMount.path())\n .keyRef(key.keyId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n pki:\n type: vault:Mount\n properties:\n path: pki\n type: pki\n description: PKI secret engine mount\n key:\n type: vault:pkiSecret:SecretBackendKey\n properties:\n backend: ${pki.path}\n type: internal\n keyName: example\n keyType: rsa\n keyBits: '4096'\nvariables:\n example:\n fn::invoke:\n Function: vault:pkiSecret:getBackendKey\n Arguments:\n backend: ${keyVaultMount.path}\n keyRef: ${key.keyId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst pki = new vault.Mount(\"pki\", {\n path: \"pki\",\n type: \"pki\",\n description: \"PKI secret engine mount\",\n});\nconst key = new vault.pkisecret.SecretBackendKey(\"key\", {\n backend: pki.path,\n type: \"internal\",\n keyName: \"example\",\n keyType: \"rsa\",\n keyBits: 4096,\n});\nconst example = key.keyId.apply(keyId =\u003e vault.pkiSecret.getBackendKeyOutput({\n backend: keyVaultMount.path,\n keyRef: keyId,\n}));\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\npki = vault.Mount(\"pki\",\n path=\"pki\",\n type=\"pki\",\n description=\"PKI secret engine mount\")\nkey = vault.pki_secret.SecretBackendKey(\"key\",\n backend=pki.path,\n type=\"internal\",\n key_name=\"example\",\n key_type=\"rsa\",\n key_bits=4096)\nexample = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount[\"path\"],\n key_ref=key_id))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var pki = new Vault.Mount(\"pki\", new()\n {\n Path = \"pki\",\n Type = \"pki\",\n Description = \"PKI secret engine mount\",\n });\n\n var key = new Vault.PkiSecret.SecretBackendKey(\"key\", new()\n {\n Backend = pki.Path,\n Type = \"internal\",\n KeyName = \"example\",\n KeyType = \"rsa\",\n KeyBits = 4096,\n });\n\n var example = Vault.PkiSecret.GetBackendKey.Invoke(new()\n {\n Backend = keyVaultMount.Path,\n KeyRef = key.KeyId,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tpki, err := vault.NewMount(ctx, \"pki\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"pki\"),\n\t\t\tType: pulumi.String(\"pki\"),\n\t\t\tDescription: pulumi.String(\"PKI secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tkey, err := pkiSecret.NewSecretBackendKey(ctx, \"key\", \u0026pkiSecret.SecretBackendKeyArgs{\n\t\t\tBackend: pki.Path,\n\t\t\tType: pulumi.String(\"internal\"),\n\t\t\tKeyName: pulumi.String(\"example\"),\n\t\t\tKeyType: pulumi.String(\"rsa\"),\n\t\t\tKeyBits: pulumi.Int(4096),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = key.KeyId.ApplyT(func(keyId string) (pkisecret.GetBackendKeyResult, error) {\n\t\t\treturn pkisecret.GetBackendKeyResult(interface{}(pkiSecret.GetBackendKeyOutput(ctx, pkisecret.GetBackendKeyOutputArgs{\n\t\t\t\tBackend: keyVaultMount.Path,\n\t\t\t\tKeyRef: keyId,\n\t\t\t}, nil))), nil\n\t\t}).(pkisecret.GetBackendKeyResultOutput)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.pkiSecret.SecretBackendKey;\nimport com.pulumi.vault.pkiSecret.SecretBackendKeyArgs;\nimport com.pulumi.vault.pkiSecret.PkiSecretFunctions;\nimport com.pulumi.vault.pkiSecret.inputs.GetBackendKeyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var pki = new Mount(\"pki\", MountArgs.builder()\n .path(\"pki\")\n .type(\"pki\")\n .description(\"PKI secret engine mount\")\n .build());\n\n var key = new SecretBackendKey(\"key\", SecretBackendKeyArgs.builder()\n .backend(pki.path())\n .type(\"internal\")\n .keyName(\"example\")\n .keyType(\"rsa\")\n .keyBits(\"4096\")\n .build());\n\n final var example = PkiSecretFunctions.getBackendKey(GetBackendKeyArgs.builder()\n .backend(keyVaultMount.path())\n .keyRef(key.keyId())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n pki:\n type: vault:Mount\n properties:\n path: pki\n type: pki\n description: PKI secret engine mount\n key:\n type: vault:pkiSecret:SecretBackendKey\n properties:\n backend: ${pki.path}\n type: internal\n keyName: example\n keyType: rsa\n keyBits: '4096'\nvariables:\n example:\n fn::invoke:\n function: vault:pkiSecret:getBackendKey\n arguments:\n backend: ${keyVaultMount.path}\n keyRef: ${key.keyId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getBackendKey.\n", "properties": { @@ -35020,7 +35020,7 @@ } }, "vault:pkiSecret/getBackendKeys:getBackendKeys": { - "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst pki = new vault.Mount(\"pki\", {\n path: \"pki\",\n type: \"pki\",\n description: \"PKI secret engine mount\",\n});\nconst root = new vault.pkisecret.SecretBackendRootCert(\"root\", {\n backend: pki.path,\n type: \"internal\",\n commonName: \"example\",\n ttl: \"86400\",\n keyName: \"example\",\n});\nconst example = vault.pkiSecret.getBackendKeysOutput({\n backend: root.backend,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\npki = vault.Mount(\"pki\",\n path=\"pki\",\n type=\"pki\",\n description=\"PKI secret engine mount\")\nroot = vault.pki_secret.SecretBackendRootCert(\"root\",\n backend=pki.path,\n type=\"internal\",\n common_name=\"example\",\n ttl=\"86400\",\n key_name=\"example\")\nexample = vault.pkiSecret.get_backend_keys_output(backend=root.backend)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var pki = new Vault.Mount(\"pki\", new()\n {\n Path = \"pki\",\n Type = \"pki\",\n Description = \"PKI secret engine mount\",\n });\n\n var root = new Vault.PkiSecret.SecretBackendRootCert(\"root\", new()\n {\n Backend = pki.Path,\n Type = \"internal\",\n CommonName = \"example\",\n Ttl = \"86400\",\n KeyName = \"example\",\n });\n\n var example = Vault.PkiSecret.GetBackendKeys.Invoke(new()\n {\n Backend = root.Backend,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tpki, err := vault.NewMount(ctx, \"pki\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"pki\"),\n\t\t\tType: pulumi.String(\"pki\"),\n\t\t\tDescription: pulumi.String(\"PKI secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\troot, err := pkiSecret.NewSecretBackendRootCert(ctx, \"root\", \u0026pkiSecret.SecretBackendRootCertArgs{\n\t\t\tBackend: pki.Path,\n\t\t\tType: pulumi.String(\"internal\"),\n\t\t\tCommonName: pulumi.String(\"example\"),\n\t\t\tTtl: pulumi.String(\"86400\"),\n\t\t\tKeyName: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = pkiSecret.GetBackendKeysOutput(ctx, pkisecret.GetBackendKeysOutputArgs{\n\t\t\tBackend: root.Backend,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCert;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCertArgs;\nimport com.pulumi.vault.pkiSecret.PkiSecretFunctions;\nimport com.pulumi.vault.pkiSecret.inputs.GetBackendKeysArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var pki = new Mount(\"pki\", MountArgs.builder()\n .path(\"pki\")\n .type(\"pki\")\n .description(\"PKI secret engine mount\")\n .build());\n\n var root = new SecretBackendRootCert(\"root\", SecretBackendRootCertArgs.builder()\n .backend(pki.path())\n .type(\"internal\")\n .commonName(\"example\")\n .ttl(\"86400\")\n .keyName(\"example\")\n .build());\n\n final var example = PkiSecretFunctions.getBackendKeys(GetBackendKeysArgs.builder()\n .backend(root.backend())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n pki:\n type: vault:Mount\n properties:\n path: pki\n type: pki\n description: PKI secret engine mount\n root:\n type: vault:pkiSecret:SecretBackendRootCert\n properties:\n backend: ${pki.path}\n type: internal\n commonName: example\n ttl: '86400'\n keyName: example\nvariables:\n example:\n fn::invoke:\n Function: vault:pkiSecret:getBackendKeys\n Arguments:\n backend: ${root.backend}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst pki = new vault.Mount(\"pki\", {\n path: \"pki\",\n type: \"pki\",\n description: \"PKI secret engine mount\",\n});\nconst root = new vault.pkisecret.SecretBackendRootCert(\"root\", {\n backend: pki.path,\n type: \"internal\",\n commonName: \"example\",\n ttl: \"86400\",\n keyName: \"example\",\n});\nconst example = vault.pkiSecret.getBackendKeysOutput({\n backend: root.backend,\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\npki = vault.Mount(\"pki\",\n path=\"pki\",\n type=\"pki\",\n description=\"PKI secret engine mount\")\nroot = vault.pki_secret.SecretBackendRootCert(\"root\",\n backend=pki.path,\n type=\"internal\",\n common_name=\"example\",\n ttl=\"86400\",\n key_name=\"example\")\nexample = vault.pkiSecret.get_backend_keys_output(backend=root.backend)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var pki = new Vault.Mount(\"pki\", new()\n {\n Path = \"pki\",\n Type = \"pki\",\n Description = \"PKI secret engine mount\",\n });\n\n var root = new Vault.PkiSecret.SecretBackendRootCert(\"root\", new()\n {\n Backend = pki.Path,\n Type = \"internal\",\n CommonName = \"example\",\n Ttl = \"86400\",\n KeyName = \"example\",\n });\n\n var example = Vault.PkiSecret.GetBackendKeys.Invoke(new()\n {\n Backend = root.Backend,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkiSecret\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tpki, err := vault.NewMount(ctx, \"pki\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"pki\"),\n\t\t\tType: pulumi.String(\"pki\"),\n\t\t\tDescription: pulumi.String(\"PKI secret engine mount\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\troot, err := pkiSecret.NewSecretBackendRootCert(ctx, \"root\", \u0026pkiSecret.SecretBackendRootCertArgs{\n\t\t\tBackend: pki.Path,\n\t\t\tType: pulumi.String(\"internal\"),\n\t\t\tCommonName: pulumi.String(\"example\"),\n\t\t\tTtl: pulumi.String(\"86400\"),\n\t\t\tKeyName: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = pkiSecret.GetBackendKeysOutput(ctx, pkisecret.GetBackendKeysOutputArgs{\n\t\t\tBackend: root.Backend,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCert;\nimport com.pulumi.vault.pkiSecret.SecretBackendRootCertArgs;\nimport com.pulumi.vault.pkiSecret.PkiSecretFunctions;\nimport com.pulumi.vault.pkiSecret.inputs.GetBackendKeysArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var pki = new Mount(\"pki\", MountArgs.builder()\n .path(\"pki\")\n .type(\"pki\")\n .description(\"PKI secret engine mount\")\n .build());\n\n var root = new SecretBackendRootCert(\"root\", SecretBackendRootCertArgs.builder()\n .backend(pki.path())\n .type(\"internal\")\n .commonName(\"example\")\n .ttl(\"86400\")\n .keyName(\"example\")\n .build());\n\n final var example = PkiSecretFunctions.getBackendKeys(GetBackendKeysArgs.builder()\n .backend(root.backend())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n pki:\n type: vault:Mount\n properties:\n path: pki\n type: pki\n description: PKI secret engine mount\n root:\n type: vault:pkiSecret:SecretBackendRootCert\n properties:\n backend: ${pki.path}\n type: internal\n commonName: example\n ttl: '86400'\n keyName: example\nvariables:\n example:\n fn::invoke:\n function: vault:pkiSecret:getBackendKeys\n arguments:\n backend: ${root.backend}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getBackendKeys.\n", "properties": { @@ -35083,7 +35083,7 @@ } }, "vault:transform/getDecode:getDecode": { - "description": "This data source supports the \"/transform/decode/{role_name}\" Vault endpoint.\n\nIt decodes the provided value using a named role.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst transform = new vault.Mount(\"transform\", {\n path: \"transform\",\n type: \"transform\",\n});\nconst ccn_fpe = new vault.transform.Transformation(\"ccn-fpe\", {\n path: transform.path,\n name: \"ccn-fpe\",\n type: \"fpe\",\n template: \"builtin/creditcardnumber\",\n tweakSource: \"internal\",\n allowedRoles: [\"payments\"],\n});\nconst payments = new vault.transform.Role(\"payments\", {\n path: ccn_fpe.path,\n name: \"payments\",\n transformations: [\"ccn-fpe\"],\n});\nconst test = vault.transform.getDecodeOutput({\n path: payments.path,\n roleName: \"payments\",\n value: \"9300-3376-4943-8903\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ntransform = vault.Mount(\"transform\",\n path=\"transform\",\n type=\"transform\")\nccn_fpe = vault.transform.Transformation(\"ccn-fpe\",\n path=transform.path,\n name=\"ccn-fpe\",\n type=\"fpe\",\n template=\"builtin/creditcardnumber\",\n tweak_source=\"internal\",\n allowed_roles=[\"payments\"])\npayments = vault.transform.Role(\"payments\",\n path=ccn_fpe.path,\n name=\"payments\",\n transformations=[\"ccn-fpe\"])\ntest = vault.transform.get_decode_output(path=payments.path,\n role_name=\"payments\",\n value=\"9300-3376-4943-8903\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var transform = new Vault.Mount(\"transform\", new()\n {\n Path = \"transform\",\n Type = \"transform\",\n });\n\n var ccn_fpe = new Vault.Transform.Transformation(\"ccn-fpe\", new()\n {\n Path = transform.Path,\n Name = \"ccn-fpe\",\n Type = \"fpe\",\n Template = \"builtin/creditcardnumber\",\n TweakSource = \"internal\",\n AllowedRoles = new[]\n {\n \"payments\",\n },\n });\n\n var payments = new Vault.Transform.Role(\"payments\", new()\n {\n Path = ccn_fpe.Path,\n Name = \"payments\",\n Transformations = new[]\n {\n \"ccn-fpe\",\n },\n });\n\n var test = Vault.Transform.GetDecode.Invoke(new()\n {\n Path = payments.Path,\n RoleName = \"payments\",\n Value = \"9300-3376-4943-8903\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/transform\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttransform, err := vault.NewMount(ctx, \"transform\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"transform\"),\n\t\t\tType: pulumi.String(\"transform\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = transform.NewTransformation(ctx, \"ccn-fpe\", \u0026transform.TransformationArgs{\n\t\t\tPath: transform.Path,\n\t\t\tName: pulumi.String(\"ccn-fpe\"),\n\t\t\tType: pulumi.String(\"fpe\"),\n\t\t\tTemplate: pulumi.String(\"builtin/creditcardnumber\"),\n\t\t\tTweakSource: pulumi.String(\"internal\"),\n\t\t\tAllowedRoles: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"payments\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tpayments, err := transform.NewRole(ctx, \"payments\", \u0026transform.RoleArgs{\n\t\t\tPath: ccn_fpe.Path,\n\t\t\tName: pulumi.String(\"payments\"),\n\t\t\tTransformations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ccn-fpe\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = transform.GetDecodeOutput(ctx, transform.GetDecodeOutputArgs{\n\t\t\tPath: payments.Path,\n\t\t\tRoleName: pulumi.String(\"payments\"),\n\t\t\tValue: pulumi.String(\"9300-3376-4943-8903\"),\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.transform.Transformation;\nimport com.pulumi.vault.transform.TransformationArgs;\nimport com.pulumi.vault.transform.Role;\nimport com.pulumi.vault.transform.RoleArgs;\nimport com.pulumi.vault.transform.TransformFunctions;\nimport com.pulumi.vault.transform.inputs.GetDecodeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var transform = new Mount(\"transform\", MountArgs.builder()\n .path(\"transform\")\n .type(\"transform\")\n .build());\n\n var ccn_fpe = new Transformation(\"ccn-fpe\", TransformationArgs.builder()\n .path(transform.path())\n .name(\"ccn-fpe\")\n .type(\"fpe\")\n .template(\"builtin/creditcardnumber\")\n .tweakSource(\"internal\")\n .allowedRoles(\"payments\")\n .build());\n\n var payments = new Role(\"payments\", RoleArgs.builder()\n .path(ccn_fpe.path())\n .name(\"payments\")\n .transformations(\"ccn-fpe\")\n .build());\n\n final var test = TransformFunctions.getDecode(GetDecodeArgs.builder()\n .path(payments.path())\n .roleName(\"payments\")\n .value(\"9300-3376-4943-8903\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n transform:\n type: vault:Mount\n properties:\n path: transform\n type: transform\n ccn-fpe:\n type: vault:transform:Transformation\n properties:\n path: ${transform.path}\n name: ccn-fpe\n type: fpe\n template: builtin/creditcardnumber\n tweakSource: internal\n allowedRoles:\n - payments\n payments:\n type: vault:transform:Role\n properties:\n path: ${[\"ccn-fpe\"].path}\n name: payments\n transformations:\n - ccn-fpe\nvariables:\n test:\n fn::invoke:\n Function: vault:transform:getDecode\n Arguments:\n path: ${payments.path}\n roleName: payments\n value: 9300-3376-4943-8903\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "This data source supports the \"/transform/decode/{role_name}\" Vault endpoint.\n\nIt decodes the provided value using a named role.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst transform = new vault.Mount(\"transform\", {\n path: \"transform\",\n type: \"transform\",\n});\nconst ccn_fpe = new vault.transform.Transformation(\"ccn-fpe\", {\n path: transform.path,\n name: \"ccn-fpe\",\n type: \"fpe\",\n template: \"builtin/creditcardnumber\",\n tweakSource: \"internal\",\n allowedRoles: [\"payments\"],\n});\nconst payments = new vault.transform.Role(\"payments\", {\n path: ccn_fpe.path,\n name: \"payments\",\n transformations: [\"ccn-fpe\"],\n});\nconst test = vault.transform.getDecodeOutput({\n path: payments.path,\n roleName: \"payments\",\n value: \"9300-3376-4943-8903\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ntransform = vault.Mount(\"transform\",\n path=\"transform\",\n type=\"transform\")\nccn_fpe = vault.transform.Transformation(\"ccn-fpe\",\n path=transform.path,\n name=\"ccn-fpe\",\n type=\"fpe\",\n template=\"builtin/creditcardnumber\",\n tweak_source=\"internal\",\n allowed_roles=[\"payments\"])\npayments = vault.transform.Role(\"payments\",\n path=ccn_fpe.path,\n name=\"payments\",\n transformations=[\"ccn-fpe\"])\ntest = vault.transform.get_decode_output(path=payments.path,\n role_name=\"payments\",\n value=\"9300-3376-4943-8903\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var transform = new Vault.Mount(\"transform\", new()\n {\n Path = \"transform\",\n Type = \"transform\",\n });\n\n var ccn_fpe = new Vault.Transform.Transformation(\"ccn-fpe\", new()\n {\n Path = transform.Path,\n Name = \"ccn-fpe\",\n Type = \"fpe\",\n Template = \"builtin/creditcardnumber\",\n TweakSource = \"internal\",\n AllowedRoles = new[]\n {\n \"payments\",\n },\n });\n\n var payments = new Vault.Transform.Role(\"payments\", new()\n {\n Path = ccn_fpe.Path,\n Name = \"payments\",\n Transformations = new[]\n {\n \"ccn-fpe\",\n },\n });\n\n var test = Vault.Transform.GetDecode.Invoke(new()\n {\n Path = payments.Path,\n RoleName = \"payments\",\n Value = \"9300-3376-4943-8903\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/transform\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttransform, err := vault.NewMount(ctx, \"transform\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"transform\"),\n\t\t\tType: pulumi.String(\"transform\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = transform.NewTransformation(ctx, \"ccn-fpe\", \u0026transform.TransformationArgs{\n\t\t\tPath: transform.Path,\n\t\t\tName: pulumi.String(\"ccn-fpe\"),\n\t\t\tType: pulumi.String(\"fpe\"),\n\t\t\tTemplate: pulumi.String(\"builtin/creditcardnumber\"),\n\t\t\tTweakSource: pulumi.String(\"internal\"),\n\t\t\tAllowedRoles: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"payments\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tpayments, err := transform.NewRole(ctx, \"payments\", \u0026transform.RoleArgs{\n\t\t\tPath: ccn_fpe.Path,\n\t\t\tName: pulumi.String(\"payments\"),\n\t\t\tTransformations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ccn-fpe\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = transform.GetDecodeOutput(ctx, transform.GetDecodeOutputArgs{\n\t\t\tPath: payments.Path,\n\t\t\tRoleName: pulumi.String(\"payments\"),\n\t\t\tValue: pulumi.String(\"9300-3376-4943-8903\"),\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.transform.Transformation;\nimport com.pulumi.vault.transform.TransformationArgs;\nimport com.pulumi.vault.transform.Role;\nimport com.pulumi.vault.transform.RoleArgs;\nimport com.pulumi.vault.transform.TransformFunctions;\nimport com.pulumi.vault.transform.inputs.GetDecodeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var transform = new Mount(\"transform\", MountArgs.builder()\n .path(\"transform\")\n .type(\"transform\")\n .build());\n\n var ccn_fpe = new Transformation(\"ccn-fpe\", TransformationArgs.builder()\n .path(transform.path())\n .name(\"ccn-fpe\")\n .type(\"fpe\")\n .template(\"builtin/creditcardnumber\")\n .tweakSource(\"internal\")\n .allowedRoles(\"payments\")\n .build());\n\n var payments = new Role(\"payments\", RoleArgs.builder()\n .path(ccn_fpe.path())\n .name(\"payments\")\n .transformations(\"ccn-fpe\")\n .build());\n\n final var test = TransformFunctions.getDecode(GetDecodeArgs.builder()\n .path(payments.path())\n .roleName(\"payments\")\n .value(\"9300-3376-4943-8903\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n transform:\n type: vault:Mount\n properties:\n path: transform\n type: transform\n ccn-fpe:\n type: vault:transform:Transformation\n properties:\n path: ${transform.path}\n name: ccn-fpe\n type: fpe\n template: builtin/creditcardnumber\n tweakSource: internal\n allowedRoles:\n - payments\n payments:\n type: vault:transform:Role\n properties:\n path: ${[\"ccn-fpe\"].path}\n name: payments\n transformations:\n - ccn-fpe\nvariables:\n test:\n fn::invoke:\n function: vault:transform:getDecode\n arguments:\n path: ${payments.path}\n roleName: payments\n value: 9300-3376-4943-8903\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getDecode.\n", "properties": { @@ -35203,7 +35203,7 @@ } }, "vault:transform/getEncode:getEncode": { - "description": "This data source supports the \"/transform/encode/{role_name}\" Vault endpoint.\n\nIt encodes the provided value using a named role.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst transform = new vault.Mount(\"transform\", {\n path: \"transform\",\n type: \"transform\",\n});\nconst ccn_fpe = new vault.transform.Transformation(\"ccn-fpe\", {\n path: transform.path,\n name: \"ccn-fpe\",\n type: \"fpe\",\n template: \"builtin/creditcardnumber\",\n tweakSource: \"internal\",\n allowedRoles: [\"payments\"],\n});\nconst payments = new vault.transform.Role(\"payments\", {\n path: ccn_fpe.path,\n name: \"payments\",\n transformations: [\"ccn-fpe\"],\n});\nconst test = vault.transform.getEncodeOutput({\n path: payments.path,\n roleName: \"payments\",\n batchInputs: [{\n value: \"1111-2222-3333-4444\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ntransform = vault.Mount(\"transform\",\n path=\"transform\",\n type=\"transform\")\nccn_fpe = vault.transform.Transformation(\"ccn-fpe\",\n path=transform.path,\n name=\"ccn-fpe\",\n type=\"fpe\",\n template=\"builtin/creditcardnumber\",\n tweak_source=\"internal\",\n allowed_roles=[\"payments\"])\npayments = vault.transform.Role(\"payments\",\n path=ccn_fpe.path,\n name=\"payments\",\n transformations=[\"ccn-fpe\"])\ntest = vault.transform.get_encode_output(path=payments.path,\n role_name=\"payments\",\n batch_inputs=[{\n \"value\": \"1111-2222-3333-4444\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var transform = new Vault.Mount(\"transform\", new()\n {\n Path = \"transform\",\n Type = \"transform\",\n });\n\n var ccn_fpe = new Vault.Transform.Transformation(\"ccn-fpe\", new()\n {\n Path = transform.Path,\n Name = \"ccn-fpe\",\n Type = \"fpe\",\n Template = \"builtin/creditcardnumber\",\n TweakSource = \"internal\",\n AllowedRoles = new[]\n {\n \"payments\",\n },\n });\n\n var payments = new Vault.Transform.Role(\"payments\", new()\n {\n Path = ccn_fpe.Path,\n Name = \"payments\",\n Transformations = new[]\n {\n \"ccn-fpe\",\n },\n });\n\n var test = Vault.Transform.GetEncode.Invoke(new()\n {\n Path = payments.Path,\n RoleName = \"payments\",\n BatchInputs = new[]\n {\n \n {\n { \"value\", \"1111-2222-3333-4444\" },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/transform\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttransform, err := vault.NewMount(ctx, \"transform\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"transform\"),\n\t\t\tType: pulumi.String(\"transform\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = transform.NewTransformation(ctx, \"ccn-fpe\", \u0026transform.TransformationArgs{\n\t\t\tPath: transform.Path,\n\t\t\tName: pulumi.String(\"ccn-fpe\"),\n\t\t\tType: pulumi.String(\"fpe\"),\n\t\t\tTemplate: pulumi.String(\"builtin/creditcardnumber\"),\n\t\t\tTweakSource: pulumi.String(\"internal\"),\n\t\t\tAllowedRoles: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"payments\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tpayments, err := transform.NewRole(ctx, \"payments\", \u0026transform.RoleArgs{\n\t\t\tPath: ccn_fpe.Path,\n\t\t\tName: pulumi.String(\"payments\"),\n\t\t\tTransformations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ccn-fpe\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = transform.GetEncodeOutput(ctx, transform.GetEncodeOutputArgs{\n\t\t\tPath: payments.Path,\n\t\t\tRoleName: pulumi.String(\"payments\"),\n\t\t\tBatchInputs: pulumi.StringMapArray{\n\t\t\t\tpulumi.StringMap{\n\t\t\t\t\t\"value\": pulumi.String(\"1111-2222-3333-4444\"),\n\t\t\t\t},\n\t\t\t},\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.transform.Transformation;\nimport com.pulumi.vault.transform.TransformationArgs;\nimport com.pulumi.vault.transform.Role;\nimport com.pulumi.vault.transform.RoleArgs;\nimport com.pulumi.vault.transform.TransformFunctions;\nimport com.pulumi.vault.transform.inputs.GetEncodeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var transform = new Mount(\"transform\", MountArgs.builder()\n .path(\"transform\")\n .type(\"transform\")\n .build());\n\n var ccn_fpe = new Transformation(\"ccn-fpe\", TransformationArgs.builder()\n .path(transform.path())\n .name(\"ccn-fpe\")\n .type(\"fpe\")\n .template(\"builtin/creditcardnumber\")\n .tweakSource(\"internal\")\n .allowedRoles(\"payments\")\n .build());\n\n var payments = new Role(\"payments\", RoleArgs.builder()\n .path(ccn_fpe.path())\n .name(\"payments\")\n .transformations(\"ccn-fpe\")\n .build());\n\n final var test = TransformFunctions.getEncode(GetEncodeArgs.builder()\n .path(payments.path())\n .roleName(\"payments\")\n .batchInputs(Map.of(\"value\", \"1111-2222-3333-4444\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n transform:\n type: vault:Mount\n properties:\n path: transform\n type: transform\n ccn-fpe:\n type: vault:transform:Transformation\n properties:\n path: ${transform.path}\n name: ccn-fpe\n type: fpe\n template: builtin/creditcardnumber\n tweakSource: internal\n allowedRoles:\n - payments\n payments:\n type: vault:transform:Role\n properties:\n path: ${[\"ccn-fpe\"].path}\n name: payments\n transformations:\n - ccn-fpe\nvariables:\n test:\n fn::invoke:\n Function: vault:transform:getEncode\n Arguments:\n path: ${payments.path}\n roleName: payments\n batchInputs:\n - value: 1111-2222-3333-4444\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "This data source supports the \"/transform/encode/{role_name}\" Vault endpoint.\n\nIt encodes the provided value using a named role.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst transform = new vault.Mount(\"transform\", {\n path: \"transform\",\n type: \"transform\",\n});\nconst ccn_fpe = new vault.transform.Transformation(\"ccn-fpe\", {\n path: transform.path,\n name: \"ccn-fpe\",\n type: \"fpe\",\n template: \"builtin/creditcardnumber\",\n tweakSource: \"internal\",\n allowedRoles: [\"payments\"],\n});\nconst payments = new vault.transform.Role(\"payments\", {\n path: ccn_fpe.path,\n name: \"payments\",\n transformations: [\"ccn-fpe\"],\n});\nconst test = vault.transform.getEncodeOutput({\n path: payments.path,\n roleName: \"payments\",\n batchInputs: [{\n value: \"1111-2222-3333-4444\",\n }],\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ntransform = vault.Mount(\"transform\",\n path=\"transform\",\n type=\"transform\")\nccn_fpe = vault.transform.Transformation(\"ccn-fpe\",\n path=transform.path,\n name=\"ccn-fpe\",\n type=\"fpe\",\n template=\"builtin/creditcardnumber\",\n tweak_source=\"internal\",\n allowed_roles=[\"payments\"])\npayments = vault.transform.Role(\"payments\",\n path=ccn_fpe.path,\n name=\"payments\",\n transformations=[\"ccn-fpe\"])\ntest = vault.transform.get_encode_output(path=payments.path,\n role_name=\"payments\",\n batch_inputs=[{\n \"value\": \"1111-2222-3333-4444\",\n }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var transform = new Vault.Mount(\"transform\", new()\n {\n Path = \"transform\",\n Type = \"transform\",\n });\n\n var ccn_fpe = new Vault.Transform.Transformation(\"ccn-fpe\", new()\n {\n Path = transform.Path,\n Name = \"ccn-fpe\",\n Type = \"fpe\",\n Template = \"builtin/creditcardnumber\",\n TweakSource = \"internal\",\n AllowedRoles = new[]\n {\n \"payments\",\n },\n });\n\n var payments = new Vault.Transform.Role(\"payments\", new()\n {\n Path = ccn_fpe.Path,\n Name = \"payments\",\n Transformations = new[]\n {\n \"ccn-fpe\",\n },\n });\n\n var test = Vault.Transform.GetEncode.Invoke(new()\n {\n Path = payments.Path,\n RoleName = \"payments\",\n BatchInputs = new[]\n {\n \n {\n { \"value\", \"1111-2222-3333-4444\" },\n },\n },\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault\"\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/transform\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttransform, err := vault.NewMount(ctx, \"transform\", \u0026vault.MountArgs{\n\t\t\tPath: pulumi.String(\"transform\"),\n\t\t\tType: pulumi.String(\"transform\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = transform.NewTransformation(ctx, \"ccn-fpe\", \u0026transform.TransformationArgs{\n\t\t\tPath: transform.Path,\n\t\t\tName: pulumi.String(\"ccn-fpe\"),\n\t\t\tType: pulumi.String(\"fpe\"),\n\t\t\tTemplate: pulumi.String(\"builtin/creditcardnumber\"),\n\t\t\tTweakSource: pulumi.String(\"internal\"),\n\t\t\tAllowedRoles: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"payments\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tpayments, err := transform.NewRole(ctx, \"payments\", \u0026transform.RoleArgs{\n\t\t\tPath: ccn_fpe.Path,\n\t\t\tName: pulumi.String(\"payments\"),\n\t\t\tTransformations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ccn-fpe\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = transform.GetEncodeOutput(ctx, transform.GetEncodeOutputArgs{\n\t\t\tPath: payments.Path,\n\t\t\tRoleName: pulumi.String(\"payments\"),\n\t\t\tBatchInputs: pulumi.StringMapArray{\n\t\t\t\tpulumi.StringMap{\n\t\t\t\t\t\"value\": pulumi.String(\"1111-2222-3333-4444\"),\n\t\t\t\t},\n\t\t\t},\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.Mount;\nimport com.pulumi.vault.MountArgs;\nimport com.pulumi.vault.transform.Transformation;\nimport com.pulumi.vault.transform.TransformationArgs;\nimport com.pulumi.vault.transform.Role;\nimport com.pulumi.vault.transform.RoleArgs;\nimport com.pulumi.vault.transform.TransformFunctions;\nimport com.pulumi.vault.transform.inputs.GetEncodeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var transform = new Mount(\"transform\", MountArgs.builder()\n .path(\"transform\")\n .type(\"transform\")\n .build());\n\n var ccn_fpe = new Transformation(\"ccn-fpe\", TransformationArgs.builder()\n .path(transform.path())\n .name(\"ccn-fpe\")\n .type(\"fpe\")\n .template(\"builtin/creditcardnumber\")\n .tweakSource(\"internal\")\n .allowedRoles(\"payments\")\n .build());\n\n var payments = new Role(\"payments\", RoleArgs.builder()\n .path(ccn_fpe.path())\n .name(\"payments\")\n .transformations(\"ccn-fpe\")\n .build());\n\n final var test = TransformFunctions.getEncode(GetEncodeArgs.builder()\n .path(payments.path())\n .roleName(\"payments\")\n .batchInputs(Map.of(\"value\", \"1111-2222-3333-4444\"))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n transform:\n type: vault:Mount\n properties:\n path: transform\n type: transform\n ccn-fpe:\n type: vault:transform:Transformation\n properties:\n path: ${transform.path}\n name: ccn-fpe\n type: fpe\n template: builtin/creditcardnumber\n tweakSource: internal\n allowedRoles:\n - payments\n payments:\n type: vault:transform:Role\n properties:\n path: ${[\"ccn-fpe\"].path}\n name: payments\n transformations:\n - ccn-fpe\nvariables:\n test:\n fn::invoke:\n function: vault:transform:getEncode\n arguments:\n path: ${payments.path}\n roleName: payments\n batchInputs:\n - value: 1111-2222-3333-4444\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getEncode.\n", "properties": { @@ -35323,7 +35323,7 @@ } }, "vault:transit/getDecrypt:getDecrypt": { - "description": "This is a data source which can be used to decrypt ciphertext using a Vault Transit key.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst test = vault.transit.getDecrypt({\n backend: \"transit\",\n key: \"test\",\n ciphertext: \"vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ntest = vault.transit.get_decrypt(backend=\"transit\",\n key=\"test\",\n ciphertext=\"vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var test = Vault.Transit.GetDecrypt.Invoke(new()\n {\n Backend = \"transit\",\n Key = \"test\",\n Ciphertext = \"vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/transit\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := transit.GetDecrypt(ctx, \u0026transit.GetDecryptArgs{\n\t\t\tBackend: \"transit\",\n\t\t\tKey: \"test\",\n\t\t\tCiphertext: \"vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.transit.TransitFunctions;\nimport com.pulumi.vault.transit.inputs.GetDecryptArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var test = TransitFunctions.getDecrypt(GetDecryptArgs.builder()\n .backend(\"transit\")\n .key(\"test\")\n .ciphertext(\"vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n test:\n fn::invoke:\n Function: vault:transit:getDecrypt\n Arguments:\n backend: transit\n key: test\n ciphertext: vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", + "description": "This is a data source which can be used to decrypt ciphertext using a Vault Transit key.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst test = vault.transit.getDecrypt({\n backend: \"transit\",\n key: \"test\",\n ciphertext: \"vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\ntest = vault.transit.get_decrypt(backend=\"transit\",\n key=\"test\",\n ciphertext=\"vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var test = Vault.Transit.GetDecrypt.Invoke(new()\n {\n Backend = \"transit\",\n Key = \"test\",\n Ciphertext = \"vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/transit\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := transit.GetDecrypt(ctx, \u0026transit.GetDecryptArgs{\n\t\t\tBackend: \"transit\",\n\t\t\tKey: \"test\",\n\t\t\tCiphertext: \"vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.transit.TransitFunctions;\nimport com.pulumi.vault.transit.inputs.GetDecryptArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var test = TransitFunctions.getDecrypt(GetDecryptArgs.builder()\n .backend(\"transit\")\n .key(\"test\")\n .ciphertext(\"vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n test:\n fn::invoke:\n function: vault:transit:getDecrypt\n arguments:\n backend: transit\n key: test\n ciphertext: vault:v1:S3GtnJ5GUNCWV+/pdL9+g1Feu/nzAv+RlmTmE91Tu0rBkeIU8MEb2nSspC/1IQ==\n```\n\u003c!--End PulumiCodeChooser --\u003e\n", "inputs": { "description": "A collection of arguments for invoking getDecrypt.\n", "properties": { diff --git a/provider/go.mod b/provider/go.mod index 2879c9cf..60c05e14 100644 --- a/provider/go.mod +++ b/provider/go.mod @@ -7,8 +7,8 @@ toolchain go1.22.7 require ( github.com/hashicorp/terraform-provider-vault v0.0.0 github.com/pulumi/providertest v0.1.3 - github.com/pulumi/pulumi-terraform-bridge/v3 v3.96.0 - github.com/pulumi/pulumi/sdk/v3 v3.140.0 + github.com/pulumi/pulumi-terraform-bridge/v3 v3.96.1-0.20241206114232-0852d643b60d + github.com/pulumi/pulumi/sdk/v3 v3.142.0 github.com/stretchr/testify v1.9.0 ) @@ -221,9 +221,9 @@ require ( github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 // indirect github.com/pulumi/esc v0.10.0 // indirect github.com/pulumi/inflector v0.1.1 // indirect - github.com/pulumi/pulumi-java/pkg v0.17.0 // indirect - github.com/pulumi/pulumi-yaml v1.11.2 // indirect - github.com/pulumi/pulumi/pkg/v3 v3.140.0 // indirect + github.com/pulumi/pulumi-java/pkg v0.18.0 // indirect + github.com/pulumi/pulumi-yaml v1.12.0 // indirect + github.com/pulumi/pulumi/pkg/v3 v3.142.0 // indirect github.com/pulumi/schema-tools v0.1.2 // indirect github.com/pulumi/terraform-diff-reader v0.0.2 // indirect github.com/rivo/uniseg v0.4.4 // indirect diff --git a/provider/go.sum b/provider/go.sum index 702fa548..8243b3cb 100644 --- a/provider/go.sum +++ b/provider/go.sum @@ -2870,16 +2870,16 @@ github.com/pulumi/inflector v0.1.1 h1:dvlxlWtXwOJTUUtcYDvwnl6Mpg33prhK+7mzeF+Sob github.com/pulumi/inflector v0.1.1/go.mod h1:HUFCjcPTz96YtTuUlwG3i3EZG4WlniBvR9bd+iJxCUY= github.com/pulumi/providertest v0.1.3 h1:GpNKRy/haNjRHiUA9bi4diU4Op2zf3axYXbga5AepHg= github.com/pulumi/providertest v0.1.3/go.mod h1:GcsqEGgSngwaNOD+kICJPIUQlnA911fGBU8HDlJvVL0= -github.com/pulumi/pulumi-java/pkg v0.17.0 h1:KmaVLrVmlkzShOfaJNJDlckorbFm8dM/C7L4hj6LX8U= -github.com/pulumi/pulumi-java/pkg v0.17.0/go.mod h1:ji4U4H7t81X4aaE88D9+z5CmKH/QoLwQi9N1iGl+2KQ= -github.com/pulumi/pulumi-terraform-bridge/v3 v3.96.0 h1:uJB3tM1j+9SKeXLCAx3DBVHsYk4ddXNrVoiqpgXal2Q= -github.com/pulumi/pulumi-terraform-bridge/v3 v3.96.0/go.mod h1:WnOTAfdtm5+kW3rIU0rLhxFSEHtJIMf19FdOU6NFXG0= -github.com/pulumi/pulumi-yaml v1.11.2 h1:MU7TTNbruGCSgNHhaBygjIbLWm3WSbd1q98GpMIgQzE= -github.com/pulumi/pulumi-yaml v1.11.2/go.mod h1:RdXRBupRGGAD1kbYNG1V1h6pyFnXisvQsl0AANvVjGI= -github.com/pulumi/pulumi/pkg/v3 v3.140.0 h1:/bvHa19HY/6qHWvuAOVII8qr72MDGGczBWlPYlPo3j0= -github.com/pulumi/pulumi/pkg/v3 v3.140.0/go.mod h1:rcTtSyisd7BzZTugNk/s9zlYgX9S0S10+pha3Tko6yM= -github.com/pulumi/pulumi/sdk/v3 v3.140.0 h1:+Z/RBvdYg7tBNkBwk4p/FzlV7niBT3TbLAICq/Y0LDU= -github.com/pulumi/pulumi/sdk/v3 v3.140.0/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI= +github.com/pulumi/pulumi-java/pkg v0.18.0 h1:3PApc5YegH69n6oubB63mqI97pF+oQywWr7ii4082Mw= +github.com/pulumi/pulumi-java/pkg v0.18.0/go.mod h1:YKYYFEb3Jvzf/dDJo0xOeEkIfBAMkkkdhXulauvEjmc= +github.com/pulumi/pulumi-terraform-bridge/v3 v3.96.1-0.20241206114232-0852d643b60d h1:vWIXiBALW2hDTtkxjfbLJqit6G3oxv5JDxlLs5GFH2Y= +github.com/pulumi/pulumi-terraform-bridge/v3 v3.96.1-0.20241206114232-0852d643b60d/go.mod h1:B/Auryr+yVUkLOMzgpFe7HLwKAtXc6YJwpAXfNGyLPk= +github.com/pulumi/pulumi-yaml v1.12.0 h1:ThJP+EBqeJyCnS6w6/PwcEFOT5o112qv0lObhefmFCk= +github.com/pulumi/pulumi-yaml v1.12.0/go.mod h1:EhZd1XDfuLa15O51qVVE16U6r8ldK9mLIBclqWCX27Y= +github.com/pulumi/pulumi/pkg/v3 v3.142.0 h1:UE8TFyXrlxvPrATpd3Kl3En34KrFIFWOxxNAodywPNU= +github.com/pulumi/pulumi/pkg/v3 v3.142.0/go.mod h1:3k6WwRIT7veiDnk3Yo2NtqEYX+4dgLCrMIFvEOnjQqI= +github.com/pulumi/pulumi/sdk/v3 v3.142.0 h1:SmcVddGuvwAh3g3XUVQQ5gVRQUKH1yZ6iETpDNHIHlw= +github.com/pulumi/pulumi/sdk/v3 v3.142.0/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI= github.com/pulumi/schema-tools v0.1.2 h1:Fd9xvUjgck4NA+7/jSk7InqCUT4Kj940+EcnbQKpfZo= github.com/pulumi/schema-tools v0.1.2/go.mod h1:62lgj52Tzq11eqWTIaKd+EVyYAu5dEcDJxMhTjvMO/k= github.com/pulumi/terraform-diff-reader v0.0.2 h1:kTE4nEXU3/SYXESvAIem+wyHMI3abqkI3OhJ0G04LLI= diff --git a/sdk/go.mod b/sdk/go.mod index 66a54a2b..7a1ed3df 100644 --- a/sdk/go.mod +++ b/sdk/go.mod @@ -4,7 +4,7 @@ go 1.21 require ( github.com/blang/semver v3.5.1+incompatible - github.com/pulumi/pulumi/sdk/v3 v3.140.0 + github.com/pulumi/pulumi/sdk/v3 v3.142.0 ) require ( diff --git a/sdk/go.sum b/sdk/go.sum index 5d5453c0..54cd0acd 100644 --- a/sdk/go.sum +++ b/sdk/go.sum @@ -150,8 +150,8 @@ github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231 h1:vkHw5I/plNdTr435 github.com/pulumi/appdash v0.0.0-20231130102222-75f619a67231/go.mod h1:murToZ2N9hNJzewjHBgfFdXhZKjY3z5cYC1VXk+lbFE= github.com/pulumi/esc v0.9.1 h1:HH5eEv8sgyxSpY5a8yePyqFXzA8cvBvapfH8457+mIs= github.com/pulumi/esc v0.9.1/go.mod h1:oEJ6bOsjYlQUpjf70GiX+CXn3VBmpwFDxUTlmtUN84c= -github.com/pulumi/pulumi/sdk/v3 v3.140.0 h1:+Z/RBvdYg7tBNkBwk4p/FzlV7niBT3TbLAICq/Y0LDU= -github.com/pulumi/pulumi/sdk/v3 v3.140.0/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI= +github.com/pulumi/pulumi/sdk/v3 v3.142.0 h1:SmcVddGuvwAh3g3XUVQQ5gVRQUKH1yZ6iETpDNHIHlw= +github.com/pulumi/pulumi/sdk/v3 v3.142.0/go.mod h1:PvKsX88co8XuwuPdzolMvew5lZV+4JmZfkeSjj7A6dI= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis= diff --git a/sdk/java/build.gradle b/sdk/java/build.gradle index bb0bed96..bca3386d 100644 --- a/sdk/java/build.gradle +++ b/sdk/java/build.gradle @@ -5,7 +5,7 @@ plugins { id("signing") id("java-library") id("maven-publish") - id("io.github.gradle-nexus.publish-plugin") version "1.1.0" + id("io.github.gradle-nexus.publish-plugin") version "2.0.0" } group = "com.pulumi" @@ -44,7 +44,7 @@ repositories { dependencies { implementation("com.google.code.findbugs:jsr305:3.0.2") implementation("com.google.code.gson:gson:2.8.9") - implementation("com.pulumi:pulumi:0.17.0") + implementation("com.pulumi:pulumi:0.18.0") } task sourcesJar(type: Jar) { diff --git a/sdk/nodejs/ad/getAccessCredentials.ts b/sdk/nodejs/ad/getAccessCredentials.ts index 0cac7272..c465dd56 100644 --- a/sdk/nodejs/ad/getAccessCredentials.ts +++ b/sdk/nodejs/ad/getAccessCredentials.ts @@ -66,7 +66,7 @@ export interface GetAccessCredentialsResult { /** * ## Example Usage */ -export function getAccessCredentialsOutput(args: GetAccessCredentialsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getAccessCredentialsOutput(args: GetAccessCredentialsOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:ad/getAccessCredentials:getAccessCredentials", { "backend": args.backend, diff --git a/sdk/nodejs/approle/getAuthBackendRoleId.ts b/sdk/nodejs/approle/getAuthBackendRoleId.ts index 8512a02e..54aa6864 100644 --- a/sdk/nodejs/approle/getAuthBackendRoleId.ts +++ b/sdk/nodejs/approle/getAuthBackendRoleId.ts @@ -91,7 +91,7 @@ export interface GetAuthBackendRoleIdResult { * } * ``` */ -export function getAuthBackendRoleIdOutput(args: GetAuthBackendRoleIdOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getAuthBackendRoleIdOutput(args: GetAuthBackendRoleIdOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId", { "backend": args.backend, diff --git a/sdk/nodejs/aws/getAccessCredentials.ts b/sdk/nodejs/aws/getAccessCredentials.ts index 81780ffd..ab5c3334 100644 --- a/sdk/nodejs/aws/getAccessCredentials.ts +++ b/sdk/nodejs/aws/getAccessCredentials.ts @@ -109,7 +109,7 @@ export interface GetAccessCredentialsResult { /** * ## Example Usage */ -export function getAccessCredentialsOutput(args: GetAccessCredentialsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getAccessCredentialsOutput(args: GetAccessCredentialsOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:aws/getAccessCredentials:getAccessCredentials", { "backend": args.backend, diff --git a/sdk/nodejs/aws/getStaticAccessCredentials.ts b/sdk/nodejs/aws/getStaticAccessCredentials.ts index 58b6c621..8145a38f 100644 --- a/sdk/nodejs/aws/getStaticAccessCredentials.ts +++ b/sdk/nodejs/aws/getStaticAccessCredentials.ts @@ -36,7 +36,7 @@ export interface GetStaticAccessCredentialsResult { readonly namespace?: string; readonly secretKey: string; } -export function getStaticAccessCredentialsOutput(args: GetStaticAccessCredentialsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getStaticAccessCredentialsOutput(args: GetStaticAccessCredentialsOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:aws/getStaticAccessCredentials:getStaticAccessCredentials", { "backend": args.backend, diff --git a/sdk/nodejs/azure/getAccessCredentials.ts b/sdk/nodejs/azure/getAccessCredentials.ts index 50006ee9..5225500e 100644 --- a/sdk/nodejs/azure/getAccessCredentials.ts +++ b/sdk/nodejs/azure/getAccessCredentials.ts @@ -170,7 +170,7 @@ export interface GetAccessCredentialsResult { * If the effective Vault role does not have the required permissions then valid values * are required to be set for: `subscriptionId`, `tenantId`, `environment`. */ -export function getAccessCredentialsOutput(args: GetAccessCredentialsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getAccessCredentialsOutput(args: GetAccessCredentialsOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:azure/getAccessCredentials:getAccessCredentials", { "backend": args.backend, diff --git a/sdk/nodejs/gcp/getAuthBackendRole.ts b/sdk/nodejs/gcp/getAuthBackendRole.ts index 94f0e0a3..ccbcc5b5 100644 --- a/sdk/nodejs/gcp/getAuthBackendRole.ts +++ b/sdk/nodejs/gcp/getAuthBackendRole.ts @@ -235,7 +235,7 @@ export interface GetAuthBackendRoleResult { * } * ``` */ -export function getAuthBackendRoleOutput(args: GetAuthBackendRoleOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getAuthBackendRoleOutput(args: GetAuthBackendRoleOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:gcp/getAuthBackendRole:getAuthBackendRole", { "backend": args.backend, diff --git a/sdk/nodejs/generic/getSecret.ts b/sdk/nodejs/generic/getSecret.ts index 54e93cda..3588739d 100644 --- a/sdk/nodejs/generic/getSecret.ts +++ b/sdk/nodejs/generic/getSecret.ts @@ -156,7 +156,7 @@ export interface GetSecretResult { * * Use of this resource requires the `read` capability on the given path. */ -export function getSecretOutput(args: GetSecretOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getSecretOutput(args: GetSecretOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:generic/getSecret:getSecret", { "namespace": args.namespace, diff --git a/sdk/nodejs/getAuthBackend.ts b/sdk/nodejs/getAuthBackend.ts index 6710508e..4184d345 100644 --- a/sdk/nodejs/getAuthBackend.ts +++ b/sdk/nodejs/getAuthBackend.ts @@ -92,7 +92,7 @@ export interface GetAuthBackendResult { * }); * ``` */ -export function getAuthBackendOutput(args: GetAuthBackendOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getAuthBackendOutput(args: GetAuthBackendOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:index/getAuthBackend:getAuthBackend", { "namespace": args.namespace, diff --git a/sdk/nodejs/getAuthBackends.ts b/sdk/nodejs/getAuthBackends.ts index 64017ffc..70968d7f 100644 --- a/sdk/nodejs/getAuthBackends.ts +++ b/sdk/nodejs/getAuthBackends.ts @@ -87,7 +87,7 @@ export interface GetAuthBackendsResult { * }); * ``` */ -export function getAuthBackendsOutput(args?: GetAuthBackendsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getAuthBackendsOutput(args?: GetAuthBackendsOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { args = args || {}; opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:index/getAuthBackends:getAuthBackends", { diff --git a/sdk/nodejs/getNamespace.ts b/sdk/nodejs/getNamespace.ts index a7962c56..224d805a 100644 --- a/sdk/nodejs/getNamespace.ts +++ b/sdk/nodejs/getNamespace.ts @@ -135,7 +135,7 @@ export interface GetNamespaceResult { * const pathFq = child.then(child => child.pathFq); * ``` */ -export function getNamespaceOutput(args?: GetNamespaceOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getNamespaceOutput(args?: GetNamespaceOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { args = args || {}; opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:index/getNamespace:getNamespace", { diff --git a/sdk/nodejs/getNamespaces.ts b/sdk/nodejs/getNamespaces.ts index f5d70024..5391c1a1 100644 --- a/sdk/nodejs/getNamespaces.ts +++ b/sdk/nodejs/getNamespaces.ts @@ -96,7 +96,7 @@ export interface GetNamespacesResult { * }) })); * ``` */ -export function getNamespacesOutput(args?: GetNamespacesOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getNamespacesOutput(args?: GetNamespacesOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { args = args || {}; opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:index/getNamespaces:getNamespaces", { diff --git a/sdk/nodejs/getNomadAccessToken.ts b/sdk/nodejs/getNomadAccessToken.ts index e85ee567..c1e47ba0 100644 --- a/sdk/nodejs/getNomadAccessToken.ts +++ b/sdk/nodejs/getNomadAccessToken.ts @@ -111,7 +111,7 @@ export interface GetNomadAccessTokenResult { * })); * ``` */ -export function getNomadAccessTokenOutput(args: GetNomadAccessTokenOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getNomadAccessTokenOutput(args: GetNomadAccessTokenOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:index/getNomadAccessToken:getNomadAccessToken", { "backend": args.backend, diff --git a/sdk/nodejs/getPolicyDocument.ts b/sdk/nodejs/getPolicyDocument.ts index 5beca3a9..1176fc3c 100644 --- a/sdk/nodejs/getPolicyDocument.ts +++ b/sdk/nodejs/getPolicyDocument.ts @@ -94,7 +94,7 @@ export interface GetPolicyDocumentResult { * }); * ``` */ -export function getPolicyDocumentOutput(args?: GetPolicyDocumentOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getPolicyDocumentOutput(args?: GetPolicyDocumentOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { args = args || {}; opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:index/getPolicyDocument:getPolicyDocument", { diff --git a/sdk/nodejs/getRaftAutopilotState.ts b/sdk/nodejs/getRaftAutopilotState.ts index 285771b7..1945e6d9 100644 --- a/sdk/nodejs/getRaftAutopilotState.ts +++ b/sdk/nodejs/getRaftAutopilotState.ts @@ -109,7 +109,7 @@ export interface GetRaftAutopilotStateResult { * } * ``` */ -export function getRaftAutopilotStateOutput(args?: GetRaftAutopilotStateOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getRaftAutopilotStateOutput(args?: GetRaftAutopilotStateOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { args = args || {}; opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:index/getRaftAutopilotState:getRaftAutopilotState", { diff --git a/sdk/nodejs/identity/getEntity.ts b/sdk/nodejs/identity/getEntity.ts index da4d05a3..6a2c2e1e 100644 --- a/sdk/nodejs/identity/getEntity.ts +++ b/sdk/nodejs/identity/getEntity.ts @@ -153,7 +153,7 @@ export interface GetEntityResult { * * Use of this resource requires the `update` capability on `/identity/lookup/entity`. */ -export function getEntityOutput(args?: GetEntityOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getEntityOutput(args?: GetEntityOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { args = args || {}; opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:identity/getEntity:getEntity", { diff --git a/sdk/nodejs/identity/getGroup.ts b/sdk/nodejs/identity/getGroup.ts index ce649d68..1b2c442e 100644 --- a/sdk/nodejs/identity/getGroup.ts +++ b/sdk/nodejs/identity/getGroup.ts @@ -175,7 +175,7 @@ export interface GetGroupResult { * * Use of this resource requires the `create` capability on `/identity/lookup/group`. */ -export function getGroupOutput(args?: GetGroupOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getGroupOutput(args?: GetGroupOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { args = args || {}; opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:identity/getGroup:getGroup", { diff --git a/sdk/nodejs/identity/getOidcClientCreds.ts b/sdk/nodejs/identity/getOidcClientCreds.ts index 829270f4..b0a21bfd 100644 --- a/sdk/nodejs/identity/getOidcClientCreds.ts +++ b/sdk/nodejs/identity/getOidcClientCreds.ts @@ -93,7 +93,7 @@ export interface GetOidcClientCredsResult { * }); * ``` */ -export function getOidcClientCredsOutput(args: GetOidcClientCredsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getOidcClientCredsOutput(args: GetOidcClientCredsOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:identity/getOidcClientCreds:getOidcClientCreds", { "name": args.name, diff --git a/sdk/nodejs/identity/getOidcOpenidConfig.ts b/sdk/nodejs/identity/getOidcOpenidConfig.ts index d64febe6..8d3341e8 100644 --- a/sdk/nodejs/identity/getOidcOpenidConfig.ts +++ b/sdk/nodejs/identity/getOidcOpenidConfig.ts @@ -156,7 +156,7 @@ export interface GetOidcOpenidConfigResult { * }); * ``` */ -export function getOidcOpenidConfigOutput(args: GetOidcOpenidConfigOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getOidcOpenidConfigOutput(args: GetOidcOpenidConfigOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:identity/getOidcOpenidConfig:getOidcOpenidConfig", { "name": args.name, diff --git a/sdk/nodejs/identity/getOidcPublicKeys.ts b/sdk/nodejs/identity/getOidcPublicKeys.ts index 5dbafdff..85cb2cd5 100644 --- a/sdk/nodejs/identity/getOidcPublicKeys.ts +++ b/sdk/nodejs/identity/getOidcPublicKeys.ts @@ -111,7 +111,7 @@ export interface GetOidcPublicKeysResult { * }); * ``` */ -export function getOidcPublicKeysOutput(args: GetOidcPublicKeysOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getOidcPublicKeysOutput(args: GetOidcPublicKeysOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:identity/getOidcPublicKeys:getOidcPublicKeys", { "name": args.name, diff --git a/sdk/nodejs/kubernetes/getAuthBackendConfig.ts b/sdk/nodejs/kubernetes/getAuthBackendConfig.ts index c15ffa0e..5927e186 100644 --- a/sdk/nodejs/kubernetes/getAuthBackendConfig.ts +++ b/sdk/nodejs/kubernetes/getAuthBackendConfig.ts @@ -115,7 +115,7 @@ export interface GetAuthBackendConfigResult { * documentation](https://www.vaultproject.io/api-docs/auth/kubernetes#read-config) for more * information. */ -export function getAuthBackendConfigOutput(args?: GetAuthBackendConfigOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getAuthBackendConfigOutput(args?: GetAuthBackendConfigOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { args = args || {}; opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig", { diff --git a/sdk/nodejs/kubernetes/getAuthBackendRole.ts b/sdk/nodejs/kubernetes/getAuthBackendRole.ts index 6d96061b..5a34c43c 100644 --- a/sdk/nodejs/kubernetes/getAuthBackendRole.ts +++ b/sdk/nodejs/kubernetes/getAuthBackendRole.ts @@ -195,7 +195,7 @@ export interface GetAuthBackendRoleResult { * documentation](https://www.vaultproject.io/api-docs/auth/kubernetes#read-role) for more * information. */ -export function getAuthBackendRoleOutput(args: GetAuthBackendRoleOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getAuthBackendRoleOutput(args: GetAuthBackendRoleOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:kubernetes/getAuthBackendRole:getAuthBackendRole", { "audience": args.audience, diff --git a/sdk/nodejs/kubernetes/getServiceAccountToken.ts b/sdk/nodejs/kubernetes/getServiceAccountToken.ts index e81d8b72..d6413375 100644 --- a/sdk/nodejs/kubernetes/getServiceAccountToken.ts +++ b/sdk/nodejs/kubernetes/getServiceAccountToken.ts @@ -183,7 +183,7 @@ export interface GetServiceAccountTokenResult { * }); * ``` */ -export function getServiceAccountTokenOutput(args: GetServiceAccountTokenOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getServiceAccountTokenOutput(args: GetServiceAccountTokenOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:kubernetes/getServiceAccountToken:getServiceAccountToken", { "backend": args.backend, diff --git a/sdk/nodejs/kv/getSecret.ts b/sdk/nodejs/kv/getSecret.ts index 311b68d7..750dd0df 100644 --- a/sdk/nodejs/kv/getSecret.ts +++ b/sdk/nodejs/kv/getSecret.ts @@ -128,7 +128,7 @@ export interface GetSecretResult { * * Use of this resource requires the `read` capability on the given path. */ -export function getSecretOutput(args: GetSecretOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getSecretOutput(args: GetSecretOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:kv/getSecret:getSecret", { "namespace": args.namespace, diff --git a/sdk/nodejs/kv/getSecretSubkeysV2.ts b/sdk/nodejs/kv/getSecretSubkeysV2.ts index ac1a8d67..031a57fb 100644 --- a/sdk/nodejs/kv/getSecretSubkeysV2.ts +++ b/sdk/nodejs/kv/getSecretSubkeysV2.ts @@ -143,7 +143,7 @@ export interface GetSecretSubkeysV2Result { * * Use of this resource requires the `read` capability on the given path. */ -export function getSecretSubkeysV2Output(args: GetSecretSubkeysV2OutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getSecretSubkeysV2Output(args: GetSecretSubkeysV2OutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:kv/getSecretSubkeysV2:getSecretSubkeysV2", { "depth": args.depth, diff --git a/sdk/nodejs/kv/getSecretV2.ts b/sdk/nodejs/kv/getSecretV2.ts index a6afd695..0163917e 100644 --- a/sdk/nodejs/kv/getSecretV2.ts +++ b/sdk/nodejs/kv/getSecretV2.ts @@ -158,7 +158,7 @@ export interface GetSecretV2Result { * * Use of this resource requires the `read` capability on the given path. */ -export function getSecretV2Output(args: GetSecretV2OutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getSecretV2Output(args: GetSecretV2OutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:kv/getSecretV2:getSecretV2", { "mount": args.mount, diff --git a/sdk/nodejs/kv/getSecretsList.ts b/sdk/nodejs/kv/getSecretsList.ts index e0bfd3f1..866ab686 100644 --- a/sdk/nodejs/kv/getSecretsList.ts +++ b/sdk/nodejs/kv/getSecretsList.ts @@ -116,7 +116,7 @@ export interface GetSecretsListResult { * * Use of this resource requires the `read` capability on the given path. */ -export function getSecretsListOutput(args: GetSecretsListOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getSecretsListOutput(args: GetSecretsListOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:kv/getSecretsList:getSecretsList", { "namespace": args.namespace, diff --git a/sdk/nodejs/kv/getSecretsListV2.ts b/sdk/nodejs/kv/getSecretsListV2.ts index f7749729..56405a7c 100644 --- a/sdk/nodejs/kv/getSecretsListV2.ts +++ b/sdk/nodejs/kv/getSecretsListV2.ts @@ -155,7 +155,7 @@ export interface GetSecretsListV2Result { * * Use of this resource requires the `read` capability on the given path. */ -export function getSecretsListV2Output(args: GetSecretsListV2OutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getSecretsListV2Output(args: GetSecretsListV2OutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:kv/getSecretsListV2:getSecretsListV2", { "mount": args.mount, diff --git a/sdk/nodejs/ldap/getDynamicCredentials.ts b/sdk/nodejs/ldap/getDynamicCredentials.ts index 67fecd18..7f6898cf 100644 --- a/sdk/nodejs/ldap/getDynamicCredentials.ts +++ b/sdk/nodejs/ldap/getDynamicCredentials.ts @@ -40,7 +40,7 @@ export interface GetDynamicCredentialsResult { readonly roleName: string; readonly username: string; } -export function getDynamicCredentialsOutput(args: GetDynamicCredentialsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getDynamicCredentialsOutput(args: GetDynamicCredentialsOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:ldap/getDynamicCredentials:getDynamicCredentials", { "mount": args.mount, diff --git a/sdk/nodejs/ldap/getStaticCredentials.ts b/sdk/nodejs/ldap/getStaticCredentials.ts index 56813602..90cad574 100644 --- a/sdk/nodejs/ldap/getStaticCredentials.ts +++ b/sdk/nodejs/ldap/getStaticCredentials.ts @@ -41,7 +41,7 @@ export interface GetStaticCredentialsResult { readonly ttl: number; readonly username: string; } -export function getStaticCredentialsOutput(args: GetStaticCredentialsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getStaticCredentialsOutput(args: GetStaticCredentialsOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:ldap/getStaticCredentials:getStaticCredentials", { "mount": args.mount, diff --git a/sdk/nodejs/pkisecret/getBackendConfigEst.ts b/sdk/nodejs/pkisecret/getBackendConfigEst.ts index 53bf881a..7fca8234 100644 --- a/sdk/nodejs/pkisecret/getBackendConfigEst.ts +++ b/sdk/nodejs/pkisecret/getBackendConfigEst.ts @@ -109,7 +109,7 @@ export interface GetBackendConfigEstResult { * }); * ``` */ -export function getBackendConfigEstOutput(args: GetBackendConfigEstOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getBackendConfigEstOutput(args: GetBackendConfigEstOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:pkiSecret/getBackendConfigEst:getBackendConfigEst", { "backend": args.backend, diff --git a/sdk/nodejs/pkisecret/getBackendIssuer.ts b/sdk/nodejs/pkisecret/getBackendIssuer.ts index 934bec6a..fd6b597a 100644 --- a/sdk/nodejs/pkisecret/getBackendIssuer.ts +++ b/sdk/nodejs/pkisecret/getBackendIssuer.ts @@ -130,7 +130,7 @@ export interface GetBackendIssuerResult { * })); * ``` */ -export function getBackendIssuerOutput(args: GetBackendIssuerOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getBackendIssuerOutput(args: GetBackendIssuerOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:pkiSecret/getBackendIssuer:getBackendIssuer", { "backend": args.backend, diff --git a/sdk/nodejs/pkisecret/getBackendIssuers.ts b/sdk/nodejs/pkisecret/getBackendIssuers.ts index fa0a16e2..9842f6b7 100644 --- a/sdk/nodejs/pkisecret/getBackendIssuers.ts +++ b/sdk/nodejs/pkisecret/getBackendIssuers.ts @@ -101,7 +101,7 @@ export interface GetBackendIssuersResult { * }); * ``` */ -export function getBackendIssuersOutput(args: GetBackendIssuersOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getBackendIssuersOutput(args: GetBackendIssuersOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:pkiSecret/getBackendIssuers:getBackendIssuers", { "backend": args.backend, diff --git a/sdk/nodejs/pkisecret/getBackendKey.ts b/sdk/nodejs/pkisecret/getBackendKey.ts index 299ea0e9..2832367c 100644 --- a/sdk/nodejs/pkisecret/getBackendKey.ts +++ b/sdk/nodejs/pkisecret/getBackendKey.ts @@ -109,7 +109,7 @@ export interface GetBackendKeyResult { * })); * ``` */ -export function getBackendKeyOutput(args: GetBackendKeyOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getBackendKeyOutput(args: GetBackendKeyOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:pkiSecret/getBackendKey:getBackendKey", { "backend": args.backend, diff --git a/sdk/nodejs/pkisecret/getBackendKeys.ts b/sdk/nodejs/pkisecret/getBackendKeys.ts index b5199edf..0d0d80a7 100644 --- a/sdk/nodejs/pkisecret/getBackendKeys.ts +++ b/sdk/nodejs/pkisecret/getBackendKeys.ts @@ -101,7 +101,7 @@ export interface GetBackendKeysResult { * }); * ``` */ -export function getBackendKeysOutput(args: GetBackendKeysOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getBackendKeysOutput(args: GetBackendKeysOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:pkiSecret/getBackendKeys:getBackendKeys", { "backend": args.backend, diff --git a/sdk/nodejs/transform/getDecode.ts b/sdk/nodejs/transform/getDecode.ts index ccfda7e3..0b0ec3e7 100644 --- a/sdk/nodejs/transform/getDecode.ts +++ b/sdk/nodejs/transform/getDecode.ts @@ -152,7 +152,7 @@ export interface GetDecodeResult { * }); * ``` */ -export function getDecodeOutput(args: GetDecodeOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getDecodeOutput(args: GetDecodeOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:transform/getDecode:getDecode", { "batchInputs": args.batchInputs, diff --git a/sdk/nodejs/transform/getEncode.ts b/sdk/nodejs/transform/getEncode.ts index 7fdc2d9f..30485cda 100644 --- a/sdk/nodejs/transform/getEncode.ts +++ b/sdk/nodejs/transform/getEncode.ts @@ -156,7 +156,7 @@ export interface GetEncodeResult { * }); * ``` */ -export function getEncodeOutput(args: GetEncodeOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getEncodeOutput(args: GetEncodeOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:transform/getEncode:getEncode", { "batchInputs": args.batchInputs, diff --git a/sdk/nodejs/transit/getDecrypt.ts b/sdk/nodejs/transit/getDecrypt.ts index 21e1ad7c..898a5e27 100644 --- a/sdk/nodejs/transit/getDecrypt.ts +++ b/sdk/nodejs/transit/getDecrypt.ts @@ -76,7 +76,7 @@ export interface GetDecryptResult { * }); * ``` */ -export function getDecryptOutput(args: GetDecryptOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getDecryptOutput(args: GetDecryptOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:transit/getDecrypt:getDecrypt", { "backend": args.backend, diff --git a/sdk/nodejs/transit/getEncrypt.ts b/sdk/nodejs/transit/getEncrypt.ts index 2117dd4d..54015a23 100644 --- a/sdk/nodejs/transit/getEncrypt.ts +++ b/sdk/nodejs/transit/getEncrypt.ts @@ -53,7 +53,7 @@ export interface GetEncryptResult { /** * This is a data source which can be used to encrypt plaintext using a Vault Transit key. */ -export function getEncryptOutput(args: GetEncryptOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output { +export function getEncryptOutput(args: GetEncryptOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output { opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("vault:transit/getEncrypt:getEncrypt", { "backend": args.backend, diff --git a/sdk/python/pulumi_vault/ad/get_access_credentials.py b/sdk/python/pulumi_vault/ad/get_access_credentials.py index 46705d25..86449bdb 100644 --- a/sdk/python/pulumi_vault/ad/get_access_credentials.py +++ b/sdk/python/pulumi_vault/ad/get_access_credentials.py @@ -147,7 +147,7 @@ def get_access_credentials(backend: Optional[str] = None, def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, role: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]: """ ## Example Usage @@ -165,7 +165,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, __args__['backend'] = backend __args__['namespace'] = namespace __args__['role'] = role - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:ad/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult) return __ret__.apply(lambda __response__: GetAccessCredentialsResult( backend=pulumi.get(__response__, 'backend'), diff --git a/sdk/python/pulumi_vault/approle/get_auth_backend_role_id.py b/sdk/python/pulumi_vault/approle/get_auth_backend_role_id.py index 3bacc1dd..f51371c5 100644 --- a/sdk/python/pulumi_vault/approle/get_auth_backend_role_id.py +++ b/sdk/python/pulumi_vault/approle/get_auth_backend_role_id.py @@ -131,7 +131,7 @@ def get_auth_backend_role_id(backend: Optional[str] = None, def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, role_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleIdResult]: """ Reads the Role ID of an AppRole from a Vault server. @@ -159,7 +159,7 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str] __args__['backend'] = backend __args__['namespace'] = namespace __args__['roleName'] = role_name - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:appRole/getAuthBackendRoleId:getAuthBackendRoleId', __args__, opts=opts, typ=GetAuthBackendRoleIdResult) return __ret__.apply(lambda __response__: GetAuthBackendRoleIdResult( backend=pulumi.get(__response__, 'backend'), diff --git a/sdk/python/pulumi_vault/aws/get_access_credentials.py b/sdk/python/pulumi_vault/aws/get_access_credentials.py index d84c7ef3..d4254bc2 100644 --- a/sdk/python/pulumi_vault/aws/get_access_credentials.py +++ b/sdk/python/pulumi_vault/aws/get_access_credentials.py @@ -258,7 +258,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, role_arn: Optional[pulumi.Input[Optional[str]]] = None, ttl: Optional[pulumi.Input[Optional[str]]] = None, type: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]: """ ## Example Usage @@ -291,7 +291,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, __args__['roleArn'] = role_arn __args__['ttl'] = ttl __args__['type'] = type - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:aws/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult) return __ret__.apply(lambda __response__: GetAccessCredentialsResult( access_key=pulumi.get(__response__, 'access_key'), diff --git a/sdk/python/pulumi_vault/aws/get_static_access_credentials.py b/sdk/python/pulumi_vault/aws/get_static_access_credentials.py index a99db483..5dab981a 100644 --- a/sdk/python/pulumi_vault/aws/get_static_access_credentials.py +++ b/sdk/python/pulumi_vault/aws/get_static_access_credentials.py @@ -118,7 +118,7 @@ def get_static_access_credentials(backend: Optional[str] = None, def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetStaticAccessCredentialsResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticAccessCredentialsResult]: """ Use this data source to access information about an existing resource. """ @@ -126,7 +126,7 @@ def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] = __args__['backend'] = backend __args__['name'] = name __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:aws/getStaticAccessCredentials:getStaticAccessCredentials', __args__, opts=opts, typ=GetStaticAccessCredentialsResult) return __ret__.apply(lambda __response__: GetStaticAccessCredentialsResult( access_key=pulumi.get(__response__, 'access_key'), diff --git a/sdk/python/pulumi_vault/azure/get_access_credentials.py b/sdk/python/pulumi_vault/azure/get_access_credentials.py index 4cb20829..423e95b8 100644 --- a/sdk/python/pulumi_vault/azure/get_access_credentials.py +++ b/sdk/python/pulumi_vault/azure/get_access_credentials.py @@ -313,7 +313,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, subscription_id: Optional[pulumi.Input[Optional[str]]] = None, tenant_id: Optional[pulumi.Input[Optional[str]]] = None, validate_creds: Optional[pulumi.Input[Optional[bool]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAccessCredentialsResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]: """ ## Example Usage @@ -378,7 +378,7 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None, __args__['subscriptionId'] = subscription_id __args__['tenantId'] = tenant_id __args__['validateCreds'] = validate_creds - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:azure/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult) return __ret__.apply(lambda __response__: GetAccessCredentialsResult( backend=pulumi.get(__response__, 'backend'), diff --git a/sdk/python/pulumi_vault/gcp/get_auth_backend_role.py b/sdk/python/pulumi_vault/gcp/get_auth_backend_role.py index a8ded0e5..102eb162 100644 --- a/sdk/python/pulumi_vault/gcp/get_auth_backend_role.py +++ b/sdk/python/pulumi_vault/gcp/get_auth_backend_role.py @@ -410,7 +410,7 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]] token_policies: Optional[pulumi.Input[Optional[Sequence[str]]]] = None, token_ttl: Optional[pulumi.Input[Optional[int]]] = None, token_type: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleResult]: """ Reads a GCP auth role from a Vault server. @@ -473,7 +473,7 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]] __args__['tokenPolicies'] = token_policies __args__['tokenTtl'] = token_ttl __args__['tokenType'] = token_type - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult) return __ret__.apply(lambda __response__: GetAuthBackendRoleResult( backend=pulumi.get(__response__, 'backend'), diff --git a/sdk/python/pulumi_vault/generic/get_secret.py b/sdk/python/pulumi_vault/generic/get_secret.py index 5a792e3d..dfec41b4 100644 --- a/sdk/python/pulumi_vault/generic/get_secret.py +++ b/sdk/python/pulumi_vault/generic/get_secret.py @@ -235,7 +235,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, path: Optional[pulumi.Input[str]] = None, version: Optional[pulumi.Input[Optional[int]]] = None, with_lease_start_time: Optional[pulumi.Input[Optional[bool]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]: """ ## Example Usage @@ -290,7 +290,7 @@ def not_implemented(msg): __args__['path'] = path __args__['version'] = version __args__['withLeaseStartTime'] = with_lease_start_time - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult) return __ret__.apply(lambda __response__: GetSecretResult( data=pulumi.get(__response__, 'data'), diff --git a/sdk/python/pulumi_vault/get_auth_backend.py b/sdk/python/pulumi_vault/get_auth_backend.py index a432b75f..da9fb71c 100644 --- a/sdk/python/pulumi_vault/get_auth_backend.py +++ b/sdk/python/pulumi_vault/get_auth_backend.py @@ -190,7 +190,7 @@ def get_auth_backend(namespace: Optional[str] = None, type=pulumi.get(__ret__, 'type')) def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, path: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendResult]: """ ## Example Usage @@ -211,7 +211,7 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N __args__ = dict() __args__['namespace'] = namespace __args__['path'] = path - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackend:getAuthBackend', __args__, opts=opts, typ=GetAuthBackendResult) return __ret__.apply(lambda __response__: GetAuthBackendResult( accessor=pulumi.get(__response__, 'accessor'), diff --git a/sdk/python/pulumi_vault/get_auth_backends.py b/sdk/python/pulumi_vault/get_auth_backends.py index cb07bf63..460219f2 100644 --- a/sdk/python/pulumi_vault/get_auth_backends.py +++ b/sdk/python/pulumi_vault/get_auth_backends.py @@ -132,7 +132,7 @@ def get_auth_backends(namespace: Optional[str] = None, type=pulumi.get(__ret__, 'type')) def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, type: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendsResult]: """ ## Example Usage @@ -160,7 +160,7 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] = __args__ = dict() __args__['namespace'] = namespace __args__['type'] = type - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:index/getAuthBackends:getAuthBackends', __args__, opts=opts, typ=GetAuthBackendsResult) return __ret__.apply(lambda __response__: GetAuthBackendsResult( accessors=pulumi.get(__response__, 'accessors'), diff --git a/sdk/python/pulumi_vault/get_namespace.py b/sdk/python/pulumi_vault/get_namespace.py index e890b80b..8e8b3155 100644 --- a/sdk/python/pulumi_vault/get_namespace.py +++ b/sdk/python/pulumi_vault/get_namespace.py @@ -168,7 +168,7 @@ def get_namespace(namespace: Optional[str] = None, path_fq=pulumi.get(__ret__, 'path_fq')) def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, path: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespaceResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetNamespaceResult]: """ ## Example Usage @@ -215,7 +215,7 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None __args__ = dict() __args__['namespace'] = namespace __args__['path'] = path - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespace:getNamespace', __args__, opts=opts, typ=GetNamespaceResult) return __ret__.apply(lambda __response__: GetNamespaceResult( custom_metadata=pulumi.get(__response__, 'custom_metadata'), diff --git a/sdk/python/pulumi_vault/get_namespaces.py b/sdk/python/pulumi_vault/get_namespaces.py index 679b0549..f437c05f 100644 --- a/sdk/python/pulumi_vault/get_namespaces.py +++ b/sdk/python/pulumi_vault/get_namespaces.py @@ -112,7 +112,7 @@ def get_namespaces(namespace: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace'), paths=pulumi.get(__ret__, 'paths')) def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNamespacesResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetNamespacesResult]: """ ## Example Usage @@ -145,7 +145,7 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non """ __args__ = dict() __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult) return __ret__.apply(lambda __response__: GetNamespacesResult( id=pulumi.get(__response__, 'id'), diff --git a/sdk/python/pulumi_vault/get_nomad_access_token.py b/sdk/python/pulumi_vault/get_nomad_access_token.py index 12508ba0..c2853b78 100644 --- a/sdk/python/pulumi_vault/get_nomad_access_token.py +++ b/sdk/python/pulumi_vault/get_nomad_access_token.py @@ -158,7 +158,7 @@ def get_nomad_access_token(backend: Optional[str] = None, def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, role: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetNomadAccessTokenResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetNomadAccessTokenResult]: """ ## Example Usage @@ -199,7 +199,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None, __args__['backend'] = backend __args__['namespace'] = namespace __args__['role'] = role - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:index/getNomadAccessToken:getNomadAccessToken', __args__, opts=opts, typ=GetNomadAccessTokenResult) return __ret__.apply(lambda __response__: GetNomadAccessTokenResult( accessor_id=pulumi.get(__response__, 'accessor_id'), diff --git a/sdk/python/pulumi_vault/get_policy_document.py b/sdk/python/pulumi_vault/get_policy_document.py index d4d11ef7..62ccc4f4 100644 --- a/sdk/python/pulumi_vault/get_policy_document.py +++ b/sdk/python/pulumi_vault/get_policy_document.py @@ -122,7 +122,7 @@ def get_policy_document(namespace: Optional[str] = None, rules=pulumi.get(__ret__, 'rules')) def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, rules: Optional[pulumi.Input[Optional[Sequence[Union['GetPolicyDocumentRuleArgs', 'GetPolicyDocumentRuleArgsDict']]]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetPolicyDocumentResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetPolicyDocumentResult]: """ This is a data source which can be used to construct a HCL representation of an Vault policy document, for use with resources which expect policy documents, such as the `Policy` resource. @@ -151,7 +151,7 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]] __args__ = dict() __args__['namespace'] = namespace __args__['rules'] = rules - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:index/getPolicyDocument:getPolicyDocument', __args__, opts=opts, typ=GetPolicyDocumentResult) return __ret__.apply(lambda __response__: GetPolicyDocumentResult( hcl=pulumi.get(__response__, 'hcl'), diff --git a/sdk/python/pulumi_vault/get_raft_autopilot_state.py b/sdk/python/pulumi_vault/get_raft_autopilot_state.py index 31f9a2d5..cc72e5bb 100644 --- a/sdk/python/pulumi_vault/get_raft_autopilot_state.py +++ b/sdk/python/pulumi_vault/get_raft_autopilot_state.py @@ -229,7 +229,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None, upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'), voters=pulumi.get(__ret__, 'voters')) def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetRaftAutopilotStateResult]: """ ## Example Usage @@ -249,7 +249,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st """ __args__ = dict() __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult) return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult( failure_tolerance=pulumi.get(__response__, 'failure_tolerance'), diff --git a/sdk/python/pulumi_vault/identity/get_entity.py b/sdk/python/pulumi_vault/identity/get_entity.py index 2fef1421..412199ed 100644 --- a/sdk/python/pulumi_vault/identity/get_entity.py +++ b/sdk/python/pulumi_vault/identity/get_entity.py @@ -322,7 +322,7 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None, entity_id: Optional[pulumi.Input[Optional[str]]] = None, entity_name: Optional[pulumi.Input[Optional[str]]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEntityResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetEntityResult]: """ ## Example Usage @@ -360,7 +360,7 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None, __args__['entityId'] = entity_id __args__['entityName'] = entity_name __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:identity/getEntity:getEntity', __args__, opts=opts, typ=GetEntityResult) return __ret__.apply(lambda __response__: GetEntityResult( alias_id=pulumi.get(__response__, 'alias_id'), diff --git a/sdk/python/pulumi_vault/identity/get_group.py b/sdk/python/pulumi_vault/identity/get_group.py index 6d3d1961..66d196d5 100644 --- a/sdk/python/pulumi_vault/identity/get_group.py +++ b/sdk/python/pulumi_vault/identity/get_group.py @@ -399,7 +399,7 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None, group_id: Optional[pulumi.Input[Optional[str]]] = None, group_name: Optional[pulumi.Input[Optional[str]]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetGroupResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetGroupResult]: """ ## Example Usage @@ -437,7 +437,7 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None, __args__['groupId'] = group_id __args__['groupName'] = group_name __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:identity/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult) return __ret__.apply(lambda __response__: GetGroupResult( alias_canonical_id=pulumi.get(__response__, 'alias_canonical_id'), diff --git a/sdk/python/pulumi_vault/identity/get_oidc_client_creds.py b/sdk/python/pulumi_vault/identity/get_oidc_client_creds.py index 49b87e74..fa93d3fa 100644 --- a/sdk/python/pulumi_vault/identity/get_oidc_client_creds.py +++ b/sdk/python/pulumi_vault/identity/get_oidc_client_creds.py @@ -135,7 +135,7 @@ def get_oidc_client_creds(name: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace')) def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcClientCredsResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetOidcClientCredsResult]: """ ## Example Usage @@ -165,7 +165,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None, __args__ = dict() __args__['name'] = name __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcClientCreds:getOidcClientCreds', __args__, opts=opts, typ=GetOidcClientCredsResult) return __ret__.apply(lambda __response__: GetOidcClientCredsResult( client_id=pulumi.get(__response__, 'client_id'), diff --git a/sdk/python/pulumi_vault/identity/get_oidc_openid_config.py b/sdk/python/pulumi_vault/identity/get_oidc_openid_config.py index 708925a2..e936e398 100644 --- a/sdk/python/pulumi_vault/identity/get_oidc_openid_config.py +++ b/sdk/python/pulumi_vault/identity/get_oidc_openid_config.py @@ -275,7 +275,7 @@ def get_oidc_openid_config(name: Optional[str] = None, userinfo_endpoint=pulumi.get(__ret__, 'userinfo_endpoint')) def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcOpenidConfigResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetOidcOpenidConfigResult]: """ ## Example Usage @@ -314,7 +314,7 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None, __args__ = dict() __args__['name'] = name __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcOpenidConfig:getOidcOpenidConfig', __args__, opts=opts, typ=GetOidcOpenidConfigResult) return __ret__.apply(lambda __response__: GetOidcOpenidConfigResult( authorization_endpoint=pulumi.get(__response__, 'authorization_endpoint'), diff --git a/sdk/python/pulumi_vault/identity/get_oidc_public_keys.py b/sdk/python/pulumi_vault/identity/get_oidc_public_keys.py index 39d2b3b8..5eeb57fd 100644 --- a/sdk/python/pulumi_vault/identity/get_oidc_public_keys.py +++ b/sdk/python/pulumi_vault/identity/get_oidc_public_keys.py @@ -131,7 +131,7 @@ def get_oidc_public_keys(name: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace')) def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcPublicKeysResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetOidcPublicKeysResult]: """ ## Example Usage @@ -170,7 +170,7 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None, __args__ = dict() __args__['name'] = name __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcPublicKeys:getOidcPublicKeys', __args__, opts=opts, typ=GetOidcPublicKeysResult) return __ret__.apply(lambda __response__: GetOidcPublicKeysResult( id=pulumi.get(__response__, 'id'), diff --git a/sdk/python/pulumi_vault/kubernetes/get_auth_backend_config.py b/sdk/python/pulumi_vault/kubernetes/get_auth_backend_config.py index 49194eb3..e15ed5f7 100644 --- a/sdk/python/pulumi_vault/kubernetes/get_auth_backend_config.py +++ b/sdk/python/pulumi_vault/kubernetes/get_auth_backend_config.py @@ -214,7 +214,7 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]] namespace: Optional[pulumi.Input[Optional[str]]] = None, pem_keys: Optional[pulumi.Input[Optional[Sequence[str]]]] = None, use_annotations_as_alias_metadata: Optional[pulumi.Input[Optional[bool]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendConfigResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendConfigResult]: """ Reads the Role of an Kubernetes from a Vault server. See the [Vault documentation](https://www.vaultproject.io/api-docs/auth/kubernetes#read-config) for more @@ -245,7 +245,7 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]] __args__['namespace'] = namespace __args__['pemKeys'] = pem_keys __args__['useAnnotationsAsAliasMetadata'] = use_annotations_as_alias_metadata - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult) return __ret__.apply(lambda __response__: GetAuthBackendConfigResult( backend=pulumi.get(__response__, 'backend'), diff --git a/sdk/python/pulumi_vault/kubernetes/get_auth_backend_role.py b/sdk/python/pulumi_vault/kubernetes/get_auth_backend_role.py index ce400728..3af31e04 100644 --- a/sdk/python/pulumi_vault/kubernetes/get_auth_backend_role.py +++ b/sdk/python/pulumi_vault/kubernetes/get_auth_backend_role.py @@ -354,7 +354,7 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] token_policies: Optional[pulumi.Input[Optional[Sequence[str]]]] = None, token_ttl: Optional[pulumi.Input[Optional[int]]] = None, token_type: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendRoleResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleResult]: """ Reads the Role of an Kubernetes from a Vault server. See the [Vault documentation](https://www.vaultproject.io/api-docs/auth/kubernetes#read-role) for more @@ -411,7 +411,7 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] __args__['tokenPolicies'] = token_policies __args__['tokenTtl'] = token_ttl __args__['tokenType'] = token_type - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult) return __ret__.apply(lambda __response__: GetAuthBackendRoleResult( alias_name_source=pulumi.get(__response__, 'alias_name_source'), diff --git a/sdk/python/pulumi_vault/kubernetes/get_service_account_token.py b/sdk/python/pulumi_vault/kubernetes/get_service_account_token.py index 304cd300..ffa7a9c9 100644 --- a/sdk/python/pulumi_vault/kubernetes/get_service_account_token.py +++ b/sdk/python/pulumi_vault/kubernetes/get_service_account_token.py @@ -265,7 +265,7 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None namespace: Optional[pulumi.Input[Optional[str]]] = None, role: Optional[pulumi.Input[str]] = None, ttl: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetServiceAccountTokenResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetServiceAccountTokenResult]: """ ## Example Usage @@ -326,7 +326,7 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None __args__['namespace'] = namespace __args__['role'] = role __args__['ttl'] = ttl - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult) return __ret__.apply(lambda __response__: GetServiceAccountTokenResult( backend=pulumi.get(__response__, 'backend'), diff --git a/sdk/python/pulumi_vault/kv/get_secret.py b/sdk/python/pulumi_vault/kv/get_secret.py index c87f6d0b..6a14d121 100644 --- a/sdk/python/pulumi_vault/kv/get_secret.py +++ b/sdk/python/pulumi_vault/kv/get_secret.py @@ -188,7 +188,7 @@ def get_secret(namespace: Optional[str] = None, path=pulumi.get(__ret__, 'path')) def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, path: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]: """ ## Example Usage @@ -227,7 +227,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, __args__ = dict() __args__['namespace'] = namespace __args__['path'] = path - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult) return __ret__.apply(lambda __response__: GetSecretResult( data=pulumi.get(__response__, 'data'), diff --git a/sdk/python/pulumi_vault/kv/get_secret_subkeys_v2.py b/sdk/python/pulumi_vault/kv/get_secret_subkeys_v2.py index 6f9a4e16..4f22bbd3 100644 --- a/sdk/python/pulumi_vault/kv/get_secret_subkeys_v2.py +++ b/sdk/python/pulumi_vault/kv/get_secret_subkeys_v2.py @@ -207,7 +207,7 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = name: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, version: Optional[pulumi.Input[Optional[int]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretSubkeysV2Result]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretSubkeysV2Result]: """ ## Example Usage @@ -261,7 +261,7 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = __args__['name'] = name __args__['namespace'] = namespace __args__['version'] = version - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretSubkeysV2:getSecretSubkeysV2', __args__, opts=opts, typ=GetSecretSubkeysV2Result) return __ret__.apply(lambda __response__: GetSecretSubkeysV2Result( data=pulumi.get(__response__, 'data'), diff --git a/sdk/python/pulumi_vault/kv/get_secret_v2.py b/sdk/python/pulumi_vault/kv/get_secret_v2.py index dee8b813..a12a82d4 100644 --- a/sdk/python/pulumi_vault/kv/get_secret_v2.py +++ b/sdk/python/pulumi_vault/kv/get_secret_v2.py @@ -249,7 +249,7 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, version: Optional[pulumi.Input[Optional[int]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretV2Result]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretV2Result]: """ ## Example Usage @@ -298,7 +298,7 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None, __args__['name'] = name __args__['namespace'] = namespace __args__['version'] = version - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretV2:getSecretV2', __args__, opts=opts, typ=GetSecretV2Result) return __ret__.apply(lambda __response__: GetSecretV2Result( created_time=pulumi.get(__response__, 'created_time'), diff --git a/sdk/python/pulumi_vault/kv/get_secrets_list.py b/sdk/python/pulumi_vault/kv/get_secrets_list.py index 10c2f6ce..6ab30305 100644 --- a/sdk/python/pulumi_vault/kv/get_secrets_list.py +++ b/sdk/python/pulumi_vault/kv/get_secrets_list.py @@ -134,7 +134,7 @@ def get_secrets_list(namespace: Optional[str] = None, path=pulumi.get(__ret__, 'path')) def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None, path: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretsListResult]: """ ## Example Usage @@ -177,7 +177,7 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N __args__ = dict() __args__['namespace'] = namespace __args__['path'] = path - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsList:getSecretsList', __args__, opts=opts, typ=GetSecretsListResult) return __ret__.apply(lambda __response__: GetSecretsListResult( id=pulumi.get(__response__, 'id'), diff --git a/sdk/python/pulumi_vault/kv/get_secrets_list_v2.py b/sdk/python/pulumi_vault/kv/get_secrets_list_v2.py index f66a7d83..796fca78 100644 --- a/sdk/python/pulumi_vault/kv/get_secrets_list_v2.py +++ b/sdk/python/pulumi_vault/kv/get_secrets_list_v2.py @@ -174,7 +174,7 @@ def get_secrets_list_v2(mount: Optional[str] = None, def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None, name: Optional[pulumi.Input[Optional[str]]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListV2Result]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretsListV2Result]: """ ## Example Usage @@ -232,7 +232,7 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None, __args__['mount'] = mount __args__['name'] = name __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsListV2:getSecretsListV2', __args__, opts=opts, typ=GetSecretsListV2Result) return __ret__.apply(lambda __response__: GetSecretsListV2Result( id=pulumi.get(__response__, 'id'), diff --git a/sdk/python/pulumi_vault/ldap/get_dynamic_credentials.py b/sdk/python/pulumi_vault/ldap/get_dynamic_credentials.py index 1f61d844..a80e7c86 100644 --- a/sdk/python/pulumi_vault/ldap/get_dynamic_credentials.py +++ b/sdk/python/pulumi_vault/ldap/get_dynamic_credentials.py @@ -158,7 +158,7 @@ def get_dynamic_credentials(mount: Optional[str] = None, def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, role_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDynamicCredentialsResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDynamicCredentialsResult]: """ Use this data source to access information about an existing resource. """ @@ -166,7 +166,7 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None, __args__['mount'] = mount __args__['namespace'] = namespace __args__['roleName'] = role_name - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult) return __ret__.apply(lambda __response__: GetDynamicCredentialsResult( distinguished_names=pulumi.get(__response__, 'distinguished_names'), diff --git a/sdk/python/pulumi_vault/ldap/get_static_credentials.py b/sdk/python/pulumi_vault/ldap/get_static_credentials.py index ff3e2184..0f51fc74 100644 --- a/sdk/python/pulumi_vault/ldap/get_static_credentials.py +++ b/sdk/python/pulumi_vault/ldap/get_static_credentials.py @@ -168,7 +168,7 @@ def get_static_credentials(mount: Optional[str] = None, def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, role_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetStaticCredentialsResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticCredentialsResult]: """ Use this data source to access information about an existing resource. """ @@ -176,7 +176,7 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None, __args__['mount'] = mount __args__['namespace'] = namespace __args__['roleName'] = role_name - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult) return __ret__.apply(lambda __response__: GetStaticCredentialsResult( dn=pulumi.get(__response__, 'dn'), diff --git a/sdk/python/pulumi_vault/pkisecret/get_backend_config_est.py b/sdk/python/pulumi_vault/pkisecret/get_backend_config_est.py index 7273d31f..797e4d03 100644 --- a/sdk/python/pulumi_vault/pkisecret/get_backend_config_est.py +++ b/sdk/python/pulumi_vault/pkisecret/get_backend_config_est.py @@ -209,7 +209,7 @@ def get_backend_config_est(backend: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace')) def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendConfigEstResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]: """ ## Example Usage @@ -235,7 +235,7 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None, __args__ = dict() __args__['backend'] = backend __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult) return __ret__.apply(lambda __response__: GetBackendConfigEstResult( audit_fields=pulumi.get(__response__, 'audit_fields'), diff --git a/sdk/python/pulumi_vault/pkisecret/get_backend_issuer.py b/sdk/python/pulumi_vault/pkisecret/get_backend_issuer.py index eec75aac..bd4472cf 100644 --- a/sdk/python/pulumi_vault/pkisecret/get_backend_issuer.py +++ b/sdk/python/pulumi_vault/pkisecret/get_backend_issuer.py @@ -230,7 +230,7 @@ def get_backend_issuer(backend: Optional[str] = None, def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None, issuer_ref: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuerResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]: """ ## Example Usage @@ -265,7 +265,7 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None, __args__['backend'] = backend __args__['issuerRef'] = issuer_ref __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult) return __ret__.apply(lambda __response__: GetBackendIssuerResult( backend=pulumi.get(__response__, 'backend'), diff --git a/sdk/python/pulumi_vault/pkisecret/get_backend_issuers.py b/sdk/python/pulumi_vault/pkisecret/get_backend_issuers.py index 1b9553f2..308f412f 100644 --- a/sdk/python/pulumi_vault/pkisecret/get_backend_issuers.py +++ b/sdk/python/pulumi_vault/pkisecret/get_backend_issuers.py @@ -149,7 +149,7 @@ def get_backend_issuers(backend: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace')) def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]: """ ## Example Usage @@ -181,7 +181,7 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None, __args__ = dict() __args__['backend'] = backend __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult) return __ret__.apply(lambda __response__: GetBackendIssuersResult( backend=pulumi.get(__response__, 'backend'), diff --git a/sdk/python/pulumi_vault/pkisecret/get_backend_key.py b/sdk/python/pulumi_vault/pkisecret/get_backend_key.py index 2002e6cd..d4c064ef 100644 --- a/sdk/python/pulumi_vault/pkisecret/get_backend_key.py +++ b/sdk/python/pulumi_vault/pkisecret/get_backend_key.py @@ -164,7 +164,7 @@ def get_backend_key(backend: Optional[str] = None, def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None, key_ref: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeyResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]: """ ## Example Usage @@ -199,7 +199,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None, __args__['backend'] = backend __args__['keyRef'] = key_ref __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult) return __ret__.apply(lambda __response__: GetBackendKeyResult( backend=pulumi.get(__response__, 'backend'), diff --git a/sdk/python/pulumi_vault/pkisecret/get_backend_keys.py b/sdk/python/pulumi_vault/pkisecret/get_backend_keys.py index 083f67c7..eb379b3e 100644 --- a/sdk/python/pulumi_vault/pkisecret/get_backend_keys.py +++ b/sdk/python/pulumi_vault/pkisecret/get_backend_keys.py @@ -149,7 +149,7 @@ def get_backend_keys(backend: Optional[str] = None, namespace=pulumi.get(__ret__, 'namespace')) def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]: """ ## Example Usage @@ -181,7 +181,7 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None, __args__ = dict() __args__['backend'] = backend __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult) return __ret__.apply(lambda __response__: GetBackendKeysResult( backend=pulumi.get(__response__, 'backend'), diff --git a/sdk/python/pulumi_vault/transform/get_decode.py b/sdk/python/pulumi_vault/transform/get_decode.py index dcc96958..a87c58d2 100644 --- a/sdk/python/pulumi_vault/transform/get_decode.py +++ b/sdk/python/pulumi_vault/transform/get_decode.py @@ -217,7 +217,7 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp transformation: Optional[pulumi.Input[Optional[str]]] = None, tweak: Optional[pulumi.Input[Optional[str]]] = None, value: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDecodeResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDecodeResult]: """ This data source supports the "/transform/decode/{role_name}" Vault endpoint. @@ -272,7 +272,7 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp __args__['transformation'] = transformation __args__['tweak'] = tweak __args__['value'] = value - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:transform/getDecode:getDecode', __args__, opts=opts, typ=GetDecodeResult) return __ret__.apply(lambda __response__: GetDecodeResult( batch_inputs=pulumi.get(__response__, 'batch_inputs'), diff --git a/sdk/python/pulumi_vault/transform/get_encode.py b/sdk/python/pulumi_vault/transform/get_encode.py index 88fc264c..cf31104d 100644 --- a/sdk/python/pulumi_vault/transform/get_encode.py +++ b/sdk/python/pulumi_vault/transform/get_encode.py @@ -219,7 +219,7 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp transformation: Optional[pulumi.Input[Optional[str]]] = None, tweak: Optional[pulumi.Input[Optional[str]]] = None, value: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEncodeResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetEncodeResult]: """ This data source supports the "/transform/encode/{role_name}" Vault endpoint. @@ -276,7 +276,7 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp __args__['transformation'] = transformation __args__['tweak'] = tweak __args__['value'] = value - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:transform/getEncode:getEncode', __args__, opts=opts, typ=GetEncodeResult) return __ret__.apply(lambda __response__: GetEncodeResult( batch_inputs=pulumi.get(__response__, 'batch_inputs'), diff --git a/sdk/python/pulumi_vault/transit/get_decrypt.py b/sdk/python/pulumi_vault/transit/get_decrypt.py index 39e1ea11..c9925bc0 100644 --- a/sdk/python/pulumi_vault/transit/get_decrypt.py +++ b/sdk/python/pulumi_vault/transit/get_decrypt.py @@ -148,7 +148,7 @@ def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None, context: Optional[pulumi.Input[Optional[str]]] = None, key: Optional[pulumi.Input[str]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDecryptResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDecryptResult]: """ This is a data source which can be used to decrypt ciphertext using a Vault Transit key. @@ -169,7 +169,7 @@ def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None, __args__['context'] = context __args__['key'] = key __args__['namespace'] = namespace - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:transit/getDecrypt:getDecrypt', __args__, opts=opts, typ=GetDecryptResult) return __ret__.apply(lambda __response__: GetDecryptResult( backend=pulumi.get(__response__, 'backend'), diff --git a/sdk/python/pulumi_vault/transit/get_encrypt.py b/sdk/python/pulumi_vault/transit/get_encrypt.py index 6dbc8163..f83cd46e 100644 --- a/sdk/python/pulumi_vault/transit/get_encrypt.py +++ b/sdk/python/pulumi_vault/transit/get_encrypt.py @@ -150,7 +150,7 @@ def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None, key_version: Optional[pulumi.Input[Optional[int]]] = None, namespace: Optional[pulumi.Input[Optional[str]]] = None, plaintext: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEncryptResult]: + opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetEncryptResult]: """ This is a data source which can be used to encrypt plaintext using a Vault Transit key. """ @@ -161,7 +161,7 @@ def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None, __args__['keyVersion'] = key_version __args__['namespace'] = namespace __args__['plaintext'] = plaintext - opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts) + opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts) __ret__ = pulumi.runtime.invoke_output('vault:transit/getEncrypt:getEncrypt', __args__, opts=opts, typ=GetEncryptResult) return __ret__.apply(lambda __response__: GetEncryptResult( backend=pulumi.get(__response__, 'backend'),