pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 5.21.0a1710888431__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (176) hide show
  1. pulumi_vault/ad/get_access_credentials.py +4 -2
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +6 -2
  4. pulumi_vault/ad/secret_role.py +6 -2
  5. pulumi_vault/alicloud/auth_backend_role.py +6 -2
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +6 -2
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +14 -2
  11. pulumi_vault/audit_request_header.py +4 -0
  12. pulumi_vault/auth_backend.py +2 -2
  13. pulumi_vault/aws/auth_backend_cert.py +6 -2
  14. pulumi_vault/aws/auth_backend_client.py +6 -2
  15. pulumi_vault/aws/auth_backend_config_identity.py +6 -2
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -2
  17. pulumi_vault/aws/auth_backend_role.py +6 -2
  18. pulumi_vault/aws/auth_backend_roletag_blacklist.py +4 -0
  19. pulumi_vault/aws/auth_backend_sts_role.py +6 -2
  20. pulumi_vault/aws/get_access_credentials.py +4 -2
  21. pulumi_vault/aws/secret_backend.py +2 -2
  22. pulumi_vault/aws/secret_backend_role.py +6 -2
  23. pulumi_vault/aws/secret_backend_static_role.py +10 -4
  24. pulumi_vault/azure/auth_backend_config.py +6 -2
  25. pulumi_vault/azure/auth_backend_role.py +6 -2
  26. pulumi_vault/azure/backend.py +12 -0
  27. pulumi_vault/azure/backend_role.py +4 -0
  28. pulumi_vault/azure/get_access_credentials.py +6 -0
  29. pulumi_vault/cert_auth_backend_role.py +4 -0
  30. pulumi_vault/consul/secret_backend.py +14 -2
  31. pulumi_vault/consul/secret_backend_role.py +8 -2
  32. pulumi_vault/database/secret_backend_connection.py +6 -2
  33. pulumi_vault/database/secret_backend_role.py +6 -2
  34. pulumi_vault/database/secret_backend_static_role.py +6 -2
  35. pulumi_vault/database/secrets_mount.py +6 -2
  36. pulumi_vault/egp_policy.py +4 -0
  37. pulumi_vault/gcp/auth_backend.py +6 -2
  38. pulumi_vault/gcp/auth_backend_role.py +6 -2
  39. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  40. pulumi_vault/gcp/secret_backend.py +4 -0
  41. pulumi_vault/gcp/secret_impersonated_account.py +6 -2
  42. pulumi_vault/gcp/secret_roleset.py +6 -2
  43. pulumi_vault/gcp/secret_static_account.py +6 -2
  44. pulumi_vault/generic/endpoint.py +6 -0
  45. pulumi_vault/generic/get_secret.py +6 -6
  46. pulumi_vault/generic/secret.py +2 -2
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +22 -2
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +4 -0
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +6 -2
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +6 -2
  56. pulumi_vault/identity/entity_alias.py +6 -2
  57. pulumi_vault/identity/entity_policies.py +12 -0
  58. pulumi_vault/identity/get_entity.py +6 -0
  59. pulumi_vault/identity/get_group.py +6 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -0
  61. pulumi_vault/identity/get_oidc_openid_config.py +4 -0
  62. pulumi_vault/identity/get_oidc_public_keys.py +4 -0
  63. pulumi_vault/identity/group.py +20 -2
  64. pulumi_vault/identity/group_alias.py +6 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +12 -0
  66. pulumi_vault/identity/group_member_group_ids.py +12 -0
  67. pulumi_vault/identity/group_policies.py +12 -0
  68. pulumi_vault/identity/mfa_duo.py +6 -2
  69. pulumi_vault/identity/mfa_login_enforcement.py +6 -2
  70. pulumi_vault/identity/mfa_okta.py +6 -2
  71. pulumi_vault/identity/mfa_pingid.py +6 -2
  72. pulumi_vault/identity/mfa_totp.py +6 -2
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -2
  75. pulumi_vault/identity/oidc_client.py +6 -2
  76. pulumi_vault/identity/oidc_key.py +6 -2
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +4 -0
  78. pulumi_vault/identity/oidc_provider.py +6 -2
  79. pulumi_vault/identity/oidc_role.py +10 -2
  80. pulumi_vault/identity/oidc_scope.py +6 -2
  81. pulumi_vault/jwt/auth_backend.py +18 -6
  82. pulumi_vault/jwt/auth_backend_role.py +10 -2
  83. pulumi_vault/kmip/secret_backend.py +6 -2
  84. pulumi_vault/kmip/secret_role.py +6 -2
  85. pulumi_vault/kmip/secret_scope.py +6 -2
  86. pulumi_vault/kubernetes/auth_backend_config.py +6 -2
  87. pulumi_vault/kubernetes/auth_backend_role.py +6 -2
  88. pulumi_vault/kubernetes/get_service_account_token.py +4 -0
  89. pulumi_vault/kubernetes/secret_backend.py +6 -2
  90. pulumi_vault/kubernetes/secret_backend_role.py +14 -2
  91. pulumi_vault/kv/get_secret.py +6 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -0
  93. pulumi_vault/kv/get_secret_v2.py +2 -6
  94. pulumi_vault/kv/get_secrets_list.py +6 -0
  95. pulumi_vault/kv/get_secrets_list_v2.py +6 -0
  96. pulumi_vault/kv/secret.py +8 -2
  97. pulumi_vault/kv/secret_backend_v2.py +12 -4
  98. pulumi_vault/kv/secret_v2.py +8 -2
  99. pulumi_vault/ldap/auth_backend.py +6 -2
  100. pulumi_vault/ldap/auth_backend_group.py +6 -2
  101. pulumi_vault/ldap/auth_backend_user.py +6 -2
  102. pulumi_vault/ldap/secret_backend.py +6 -2
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +10 -4
  104. pulumi_vault/ldap/secret_backend_library_set.py +6 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +10 -4
  106. pulumi_vault/managed/keys.py +2 -14
  107. pulumi_vault/mfa_duo.py +6 -2
  108. pulumi_vault/mfa_okta.py +6 -2
  109. pulumi_vault/mfa_pingid.py +6 -2
  110. pulumi_vault/mfa_totp.py +6 -2
  111. pulumi_vault/mongodbatlas/secret_backend.py +6 -2
  112. pulumi_vault/mongodbatlas/secret_role.py +10 -4
  113. pulumi_vault/mount.py +18 -2
  114. pulumi_vault/namespace.py +42 -62
  115. pulumi_vault/nomad_secret_backend.py +6 -2
  116. pulumi_vault/nomad_secret_role.py +6 -2
  117. pulumi_vault/okta/auth_backend.py +6 -2
  118. pulumi_vault/okta/auth_backend_group.py +6 -2
  119. pulumi_vault/okta/auth_backend_user.py +6 -2
  120. pulumi_vault/password_policy.py +6 -2
  121. pulumi_vault/pkisecret/get_backend_issuer.py +4 -2
  122. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  123. pulumi_vault/pkisecret/get_backend_key.py +4 -0
  124. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  125. pulumi_vault/pkisecret/secret_backend_cert.py +4 -0
  126. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -0
  127. pulumi_vault/pkisecret/secret_backend_config_issuers.py +6 -2
  128. pulumi_vault/pkisecret/secret_backend_config_urls.py +12 -4
  129. pulumi_vault/pkisecret/secret_backend_crl_config.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -0
  131. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +4 -0
  132. pulumi_vault/pkisecret/secret_backend_issuer.py +6 -2
  133. pulumi_vault/pkisecret/secret_backend_key.py +2 -2
  134. pulumi_vault/pkisecret/secret_backend_role.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -0
  136. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -0
  137. pulumi_vault/pkisecret/secret_backend_sign.py +6 -0
  138. pulumi_vault/policy.py +2 -2
  139. pulumi_vault/quota_lease_count.py +6 -2
  140. pulumi_vault/quota_rate_limit.py +6 -2
  141. pulumi_vault/rabbitmq/secret_backend.py +6 -2
  142. pulumi_vault/rabbitmq/secret_backend_role.py +6 -2
  143. pulumi_vault/raft_autopilot.py +6 -2
  144. pulumi_vault/raft_snapshot_agent_config.py +111 -16
  145. pulumi_vault/rgp_policy.py +4 -0
  146. pulumi_vault/saml/auth_backend.py +6 -2
  147. pulumi_vault/saml/auth_backend_role.py +6 -2
  148. pulumi_vault/secrets/sync_association.py +4 -0
  149. pulumi_vault/secrets/sync_aws_destination.py +6 -2
  150. pulumi_vault/secrets/sync_azure_destination.py +6 -2
  151. pulumi_vault/secrets/sync_config.py +6 -2
  152. pulumi_vault/secrets/sync_gcp_destination.py +6 -2
  153. pulumi_vault/secrets/sync_gh_destination.py +6 -2
  154. pulumi_vault/secrets/sync_vercel_destination.py +6 -2
  155. pulumi_vault/ssh/_inputs.py +4 -0
  156. pulumi_vault/ssh/outputs.py +4 -0
  157. pulumi_vault/ssh/secret_backend_ca.py +6 -2
  158. pulumi_vault/ssh/secret_backend_role.py +6 -2
  159. pulumi_vault/terraformcloud/secret_backend.py +6 -2
  160. pulumi_vault/terraformcloud/secret_creds.py +4 -0
  161. pulumi_vault/terraformcloud/secret_role.py +6 -2
  162. pulumi_vault/token.py +6 -2
  163. pulumi_vault/tokenauth/auth_backend_role.py +6 -2
  164. pulumi_vault/transform/alphabet.py +4 -0
  165. pulumi_vault/transform/get_decode.py +4 -0
  166. pulumi_vault/transform/get_encode.py +4 -0
  167. pulumi_vault/transform/role.py +4 -0
  168. pulumi_vault/transform/template.py +4 -0
  169. pulumi_vault/transit/get_decrypt.py +4 -0
  170. pulumi_vault/transit/secret_backend_key.py +8 -2
  171. pulumi_vault/transit/secret_cache_config.py +4 -0
  172. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/METADATA +1 -1
  173. pulumi_vault-5.21.0a1710888431.dist-info/RECORD +244 -0
  174. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/WHEEL +1 -1
  175. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  176. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/top_level.txt +0 -0
@@ -923,6 +923,7 @@ class SecretBackendConnection(pulumi.CustomResource):
923
923
  """
924
924
  ## Example Usage
925
925
 
926
+ <!--Start PulumiCodeChooser -->
926
927
  ```python
927
928
  import pulumi
928
929
  import pulumi_vault as vault
@@ -940,13 +941,14 @@ class SecretBackendConnection(pulumi.CustomResource):
940
941
  connection_url="postgres://username:password@host:port/database",
941
942
  ))
942
943
  ```
944
+ <!--End PulumiCodeChooser -->
943
945
 
944
946
  ## Import
945
947
 
946
948
  Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
947
949
 
948
950
  ```sh
949
- $ pulumi import vault:database/secretBackendConnection:SecretBackendConnection example postgres/config/postgres
951
+ $ pulumi import vault:database/secretBackendConnection:SecretBackendConnection example postgres/config/postgres
950
952
  ```
951
953
 
952
954
  :param str resource_name: The name of the resource.
@@ -994,6 +996,7 @@ class SecretBackendConnection(pulumi.CustomResource):
994
996
  """
995
997
  ## Example Usage
996
998
 
999
+ <!--Start PulumiCodeChooser -->
997
1000
  ```python
998
1001
  import pulumi
999
1002
  import pulumi_vault as vault
@@ -1011,13 +1014,14 @@ class SecretBackendConnection(pulumi.CustomResource):
1011
1014
  connection_url="postgres://username:password@host:port/database",
1012
1015
  ))
1013
1016
  ```
1017
+ <!--End PulumiCodeChooser -->
1014
1018
 
1015
1019
  ## Import
1016
1020
 
1017
1021
  Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
1018
1022
 
1019
1023
  ```sh
1020
- $ pulumi import vault:database/secretBackendConnection:SecretBackendConnection example postgres/config/postgres
1024
+ $ pulumi import vault:database/secretBackendConnection:SecretBackendConnection example postgres/config/postgres
1021
1025
  ```
1022
1026
 
1023
1027
  :param str resource_name: The name of the resource.
@@ -489,6 +489,7 @@ class SecretBackendRole(pulumi.CustomResource):
489
489
  """
490
490
  ## Example Usage
491
491
 
492
+ <!--Start PulumiCodeChooser -->
492
493
  ```python
493
494
  import pulumi
494
495
  import pulumi_vault as vault
@@ -510,13 +511,14 @@ class SecretBackendRole(pulumi.CustomResource):
510
511
  db_name=postgres.name,
511
512
  creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
512
513
  ```
514
+ <!--End PulumiCodeChooser -->
513
515
 
514
516
  ## Import
515
517
 
516
518
  Database secret backend roles can be imported using the `backend`, `/roles/`, and the `name` e.g.
517
519
 
518
520
  ```sh
519
- $ pulumi import vault:database/secretBackendRole:SecretBackendRole example postgres/roles/my-role
521
+ $ pulumi import vault:database/secretBackendRole:SecretBackendRole example postgres/roles/my-role
520
522
  ```
521
523
 
522
524
  :param str resource_name: The name of the resource.
@@ -558,6 +560,7 @@ class SecretBackendRole(pulumi.CustomResource):
558
560
  """
559
561
  ## Example Usage
560
562
 
563
+ <!--Start PulumiCodeChooser -->
561
564
  ```python
562
565
  import pulumi
563
566
  import pulumi_vault as vault
@@ -579,13 +582,14 @@ class SecretBackendRole(pulumi.CustomResource):
579
582
  db_name=postgres.name,
580
583
  creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
581
584
  ```
585
+ <!--End PulumiCodeChooser -->
582
586
 
583
587
  ## Import
584
588
 
585
589
  Database secret backend roles can be imported using the `backend`, `/roles/`, and the `name` e.g.
586
590
 
587
591
  ```sh
588
- $ pulumi import vault:database/secretBackendRole:SecretBackendRole example postgres/roles/my-role
592
+ $ pulumi import vault:database/secretBackendRole:SecretBackendRole example postgres/roles/my-role
589
593
  ```
590
594
 
591
595
  :param str resource_name: The name of the resource.
@@ -370,6 +370,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
370
370
 
371
371
  ## Example Usage
372
372
 
373
+ <!--Start PulumiCodeChooser -->
373
374
  ```python
374
375
  import pulumi
375
376
  import pulumi_vault as vault
@@ -399,13 +400,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
399
400
  rotation_window=172800,
400
401
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
401
402
  ```
403
+ <!--End PulumiCodeChooser -->
402
404
 
403
405
  ## Import
404
406
 
405
407
  Database secret backend static roles can be imported using the `backend`, `/static-roles/`, and the `name` e.g.
406
408
 
407
409
  ```sh
408
- $ pulumi import vault:database/secretBackendStaticRole:SecretBackendStaticRole example postgres/static-roles/my-role
410
+ $ pulumi import vault:database/secretBackendStaticRole:SecretBackendStaticRole example postgres/static-roles/my-role
409
411
  ```
410
412
 
411
413
  :param str resource_name: The name of the resource.
@@ -442,6 +444,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
442
444
 
443
445
  ## Example Usage
444
446
 
447
+ <!--Start PulumiCodeChooser -->
445
448
  ```python
446
449
  import pulumi
447
450
  import pulumi_vault as vault
@@ -471,13 +474,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
471
474
  rotation_window=172800,
472
475
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
473
476
  ```
477
+ <!--End PulumiCodeChooser -->
474
478
 
475
479
  ## Import
476
480
 
477
481
  Database secret backend static roles can be imported using the `backend`, `/static-roles/`, and the `name` e.g.
478
482
 
479
483
  ```sh
480
- $ pulumi import vault:database/secretBackendStaticRole:SecretBackendStaticRole example postgres/static-roles/my-role
484
+ $ pulumi import vault:database/secretBackendStaticRole:SecretBackendStaticRole example postgres/static-roles/my-role
481
485
  ```
482
486
 
483
487
  :param str resource_name: The name of the resource.
@@ -1139,6 +1139,7 @@ class SecretsMount(pulumi.CustomResource):
1139
1139
  """
1140
1140
  ## Example Usage
1141
1141
 
1142
+ <!--Start PulumiCodeChooser -->
1142
1143
  ```python
1143
1144
  import pulumi
1144
1145
  import pulumi_vault as vault
@@ -1176,13 +1177,14 @@ class SecretsMount(pulumi.CustomResource):
1176
1177
  "GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
1177
1178
  ])
1178
1179
  ```
1180
+ <!--End PulumiCodeChooser -->
1179
1181
 
1180
1182
  ## Import
1181
1183
 
1182
1184
  Database secret backend connections can be imported using the `path` e.g.
1183
1185
 
1184
1186
  ```sh
1185
- $ pulumi import vault:database/secretsMount:SecretsMount db db
1187
+ $ pulumi import vault:database/secretsMount:SecretsMount db db
1186
1188
  ```
1187
1189
 
1188
1190
  :param str resource_name: The name of the resource.
@@ -1247,6 +1249,7 @@ class SecretsMount(pulumi.CustomResource):
1247
1249
  """
1248
1250
  ## Example Usage
1249
1251
 
1252
+ <!--Start PulumiCodeChooser -->
1250
1253
  ```python
1251
1254
  import pulumi
1252
1255
  import pulumi_vault as vault
@@ -1284,13 +1287,14 @@ class SecretsMount(pulumi.CustomResource):
1284
1287
  "GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
1285
1288
  ])
1286
1289
  ```
1290
+ <!--End PulumiCodeChooser -->
1287
1291
 
1288
1292
  ## Import
1289
1293
 
1290
1294
  Database secret backend connections can be imported using the `path` e.g.
1291
1295
 
1292
1296
  ```sh
1293
- $ pulumi import vault:database/secretsMount:SecretsMount db db
1297
+ $ pulumi import vault:database/secretsMount:SecretsMount db db
1294
1298
  ```
1295
1299
 
1296
1300
  :param str resource_name: The name of the resource.
@@ -214,6 +214,7 @@ class EgpPolicy(pulumi.CustomResource):
214
214
 
215
215
  ## Example Usage
216
216
 
217
+ <!--Start PulumiCodeChooser -->
217
218
  ```python
218
219
  import pulumi
219
220
  import pulumi_vault as vault
@@ -227,6 +228,7 @@ class EgpPolicy(pulumi.CustomResource):
227
228
 
228
229
  \"\"\")
229
230
  ```
231
+ <!--End PulumiCodeChooser -->
230
232
 
231
233
  :param str resource_name: The name of the resource.
232
234
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -252,6 +254,7 @@ class EgpPolicy(pulumi.CustomResource):
252
254
 
253
255
  ## Example Usage
254
256
 
257
+ <!--Start PulumiCodeChooser -->
255
258
  ```python
256
259
  import pulumi
257
260
  import pulumi_vault as vault
@@ -265,6 +268,7 @@ class EgpPolicy(pulumi.CustomResource):
265
268
 
266
269
  \"\"\")
267
270
  ```
271
+ <!--End PulumiCodeChooser -->
268
272
 
269
273
  :param str resource_name: The name of the resource.
270
274
  :param EgpPolicyArgs args: The arguments to use to populate this resource's properties.
@@ -500,6 +500,7 @@ class AuthBackend(pulumi.CustomResource):
500
500
 
501
501
  ## Example Usage
502
502
 
503
+ <!--Start PulumiCodeChooser -->
503
504
  ```python
504
505
  import pulumi
505
506
  import pulumi_vault as vault
@@ -513,13 +514,14 @@ class AuthBackend(pulumi.CustomResource):
513
514
  compute="compute.googleapis.com",
514
515
  ))
515
516
  ```
517
+ <!--End PulumiCodeChooser -->
516
518
 
517
519
  ## Import
518
520
 
519
521
  GCP authentication backends can be imported using the backend name, e.g.
520
522
 
521
523
  ```sh
522
- $ pulumi import vault:gcp/authBackend:AuthBackend gcp gcp
524
+ $ pulumi import vault:gcp/authBackend:AuthBackend gcp gcp
523
525
  ```
524
526
 
525
527
  :param str resource_name: The name of the resource.
@@ -560,6 +562,7 @@ class AuthBackend(pulumi.CustomResource):
560
562
 
561
563
  ## Example Usage
562
564
 
565
+ <!--Start PulumiCodeChooser -->
563
566
  ```python
564
567
  import pulumi
565
568
  import pulumi_vault as vault
@@ -573,13 +576,14 @@ class AuthBackend(pulumi.CustomResource):
573
576
  compute="compute.googleapis.com",
574
577
  ))
575
578
  ```
579
+ <!--End PulumiCodeChooser -->
576
580
 
577
581
  ## Import
578
582
 
579
583
  GCP authentication backends can be imported using the backend name, e.g.
580
584
 
581
585
  ```sh
582
- $ pulumi import vault:gcp/authBackend:AuthBackend gcp gcp
586
+ $ pulumi import vault:gcp/authBackend:AuthBackend gcp gcp
583
587
  ```
584
588
 
585
589
  :param str resource_name: The name of the resource.
@@ -834,6 +834,7 @@ class AuthBackendRole(pulumi.CustomResource):
834
834
 
835
835
  ## Example Usage
836
836
 
837
+ <!--Start PulumiCodeChooser -->
837
838
  ```python
838
839
  import pulumi
839
840
  import pulumi_vault as vault
@@ -855,13 +856,14 @@ class AuthBackendRole(pulumi.CustomResource):
855
856
  ],
856
857
  add_group_aliases=True)
857
858
  ```
859
+ <!--End PulumiCodeChooser -->
858
860
 
859
861
  ## Import
860
862
 
861
863
  GCP authentication roles can be imported using the `path`, e.g.
862
864
 
863
865
  ```sh
864
- $ pulumi import vault:gcp/authBackendRole:AuthBackendRole my_role auth/gcp/role/my_role
866
+ $ pulumi import vault:gcp/authBackendRole:AuthBackendRole my_role auth/gcp/role/my_role
865
867
  ```
866
868
 
867
869
  :param str resource_name: The name of the resource.
@@ -919,6 +921,7 @@ class AuthBackendRole(pulumi.CustomResource):
919
921
 
920
922
  ## Example Usage
921
923
 
924
+ <!--Start PulumiCodeChooser -->
922
925
  ```python
923
926
  import pulumi
924
927
  import pulumi_vault as vault
@@ -940,13 +943,14 @@ class AuthBackendRole(pulumi.CustomResource):
940
943
  ],
941
944
  add_group_aliases=True)
942
945
  ```
946
+ <!--End PulumiCodeChooser -->
943
947
 
944
948
  ## Import
945
949
 
946
950
  GCP authentication roles can be imported using the `path`, e.g.
947
951
 
948
952
  ```sh
949
- $ pulumi import vault:gcp/authBackendRole:AuthBackendRole my_role auth/gcp/role/my_role
953
+ $ pulumi import vault:gcp/authBackendRole:AuthBackendRole my_role auth/gcp/role/my_role
950
954
  ```
951
955
 
952
956
  :param str resource_name: The name of the resource.
@@ -311,6 +311,7 @@ def get_auth_backend_role(backend: Optional[str] = None,
311
311
 
312
312
  ## Example Usage
313
313
 
314
+ <!--Start PulumiCodeChooser -->
314
315
  ```python
315
316
  import pulumi
316
317
  import pulumi_vault as vault
@@ -319,6 +320,7 @@ def get_auth_backend_role(backend: Optional[str] = None,
319
320
  role_name="my-role")
320
321
  pulumi.export("role-id", role.role_id)
321
322
  ```
323
+ <!--End PulumiCodeChooser -->
322
324
 
323
325
 
324
326
  :param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
@@ -414,6 +416,7 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
414
416
 
415
417
  ## Example Usage
416
418
 
419
+ <!--Start PulumiCodeChooser -->
417
420
  ```python
418
421
  import pulumi
419
422
  import pulumi_vault as vault
@@ -422,6 +425,7 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
422
425
  role_name="my-role")
423
426
  pulumi.export("role-id", role.role_id)
424
427
  ```
428
+ <!--End PulumiCodeChooser -->
425
429
 
426
430
 
427
431
  :param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
@@ -328,12 +328,14 @@ class SecretBackend(pulumi.CustomResource):
328
328
  """
329
329
  ## Example Usage
330
330
 
331
+ <!--Start PulumiCodeChooser -->
331
332
  ```python
332
333
  import pulumi
333
334
  import pulumi_vault as vault
334
335
 
335
336
  gcp = vault.gcp.SecretBackend("gcp", credentials=(lambda path: open(path).read())("credentials.json"))
336
337
  ```
338
+ <!--End PulumiCodeChooser -->
337
339
 
338
340
  :param str resource_name: The name of the resource.
339
341
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -362,12 +364,14 @@ class SecretBackend(pulumi.CustomResource):
362
364
  """
363
365
  ## Example Usage
364
366
 
367
+ <!--Start PulumiCodeChooser -->
365
368
  ```python
366
369
  import pulumi
367
370
  import pulumi_vault as vault
368
371
 
369
372
  gcp = vault.gcp.SecretBackend("gcp", credentials=(lambda path: open(path).read())("credentials.json"))
370
373
  ```
374
+ <!--End PulumiCodeChooser -->
371
375
 
372
376
  :param str resource_name: The name of the resource.
373
377
  :param SecretBackendArgs args: The arguments to use to populate this resource's properties.
@@ -219,6 +219,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
219
219
 
220
220
  ## Example Usage
221
221
 
222
+ <!--Start PulumiCodeChooser -->
222
223
  ```python
223
224
  import pulumi
224
225
  import pulumi_gcp as gcp
@@ -234,13 +235,14 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
234
235
  service_account_email=this.email,
235
236
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
236
237
  ```
238
+ <!--End PulumiCodeChooser -->
237
239
 
238
240
  ## Import
239
241
 
240
242
  A impersonated account can be imported using its Vault Path. For example, referencing the example above,
241
243
 
242
244
  ```sh
243
- $ pulumi import vault:gcp/secretImpersonatedAccount:SecretImpersonatedAccount impersonated_account gcp/impersonated-account/project_viewer
245
+ $ pulumi import vault:gcp/secretImpersonatedAccount:SecretImpersonatedAccount impersonated_account gcp/impersonated-account/project_viewer
244
246
  ```
245
247
 
246
248
  :param str resource_name: The name of the resource.
@@ -265,6 +267,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
265
267
 
266
268
  ## Example Usage
267
269
 
270
+ <!--Start PulumiCodeChooser -->
268
271
  ```python
269
272
  import pulumi
270
273
  import pulumi_gcp as gcp
@@ -280,13 +283,14 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
280
283
  service_account_email=this.email,
281
284
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"])
282
285
  ```
286
+ <!--End PulumiCodeChooser -->
283
287
 
284
288
  ## Import
285
289
 
286
290
  A impersonated account can be imported using its Vault Path. For example, referencing the example above,
287
291
 
288
292
  ```sh
289
- $ pulumi import vault:gcp/secretImpersonatedAccount:SecretImpersonatedAccount impersonated_account gcp/impersonated-account/project_viewer
293
+ $ pulumi import vault:gcp/secretImpersonatedAccount:SecretImpersonatedAccount impersonated_account gcp/impersonated-account/project_viewer
290
294
  ```
291
295
 
292
296
  :param str resource_name: The name of the resource.
@@ -297,6 +297,7 @@ class SecretRoleset(pulumi.CustomResource):
297
297
 
298
298
  ## Example Usage
299
299
 
300
+ <!--Start PulumiCodeChooser -->
300
301
  ```python
301
302
  import pulumi
302
303
  import pulumi_vault as vault
@@ -316,13 +317,14 @@ class SecretRoleset(pulumi.CustomResource):
316
317
  roles=["roles/viewer"],
317
318
  )])
318
319
  ```
320
+ <!--End PulumiCodeChooser -->
319
321
 
320
322
  ## Import
321
323
 
322
324
  A roleset can be imported using its Vault Path. For example, referencing the example above,
323
325
 
324
326
  ```sh
325
- $ pulumi import vault:gcp/secretRoleset:SecretRoleset roleset gcp/roleset/project_viewer
327
+ $ pulumi import vault:gcp/secretRoleset:SecretRoleset roleset gcp/roleset/project_viewer
326
328
  ```
327
329
 
328
330
  :param str resource_name: The name of the resource.
@@ -351,6 +353,7 @@ class SecretRoleset(pulumi.CustomResource):
351
353
 
352
354
  ## Example Usage
353
355
 
356
+ <!--Start PulumiCodeChooser -->
354
357
  ```python
355
358
  import pulumi
356
359
  import pulumi_vault as vault
@@ -370,13 +373,14 @@ class SecretRoleset(pulumi.CustomResource):
370
373
  roles=["roles/viewer"],
371
374
  )])
372
375
  ```
376
+ <!--End PulumiCodeChooser -->
373
377
 
374
378
  ## Import
375
379
 
376
380
  A roleset can be imported using its Vault Path. For example, referencing the example above,
377
381
 
378
382
  ```sh
379
- $ pulumi import vault:gcp/secretRoleset:SecretRoleset roleset gcp/roleset/project_viewer
383
+ $ pulumi import vault:gcp/secretRoleset:SecretRoleset roleset gcp/roleset/project_viewer
380
384
  ```
381
385
 
382
386
  :param str resource_name: The name of the resource.
@@ -299,6 +299,7 @@ class SecretStaticAccount(pulumi.CustomResource):
299
299
 
300
300
  ## Example Usage
301
301
 
302
+ <!--Start PulumiCodeChooser -->
302
303
  ```python
303
304
  import pulumi
304
305
  import pulumi_gcp as gcp
@@ -319,13 +320,14 @@ class SecretStaticAccount(pulumi.CustomResource):
319
320
  roles=["roles/viewer"],
320
321
  )])
321
322
  ```
323
+ <!--End PulumiCodeChooser -->
322
324
 
323
325
  ## Import
324
326
 
325
327
  A static account can be imported using its Vault Path. For example, referencing the example above,
326
328
 
327
329
  ```sh
328
- $ pulumi import vault:gcp/secretStaticAccount:SecretStaticAccount static_account gcp/static-account/project_viewer
330
+ $ pulumi import vault:gcp/secretStaticAccount:SecretStaticAccount static_account gcp/static-account/project_viewer
329
331
  ```
330
332
 
331
333
  :param str resource_name: The name of the resource.
@@ -355,6 +357,7 @@ class SecretStaticAccount(pulumi.CustomResource):
355
357
 
356
358
  ## Example Usage
357
359
 
360
+ <!--Start PulumiCodeChooser -->
358
361
  ```python
359
362
  import pulumi
360
363
  import pulumi_gcp as gcp
@@ -375,13 +378,14 @@ class SecretStaticAccount(pulumi.CustomResource):
375
378
  roles=["roles/viewer"],
376
379
  )])
377
380
  ```
381
+ <!--End PulumiCodeChooser -->
378
382
 
379
383
  ## Import
380
384
 
381
385
  A static account can be imported using its Vault Path. For example, referencing the example above,
382
386
 
383
387
  ```sh
384
- $ pulumi import vault:gcp/secretStaticAccount:SecretStaticAccount static_account gcp/static-account/project_viewer
388
+ $ pulumi import vault:gcp/secretStaticAccount:SecretStaticAccount static_account gcp/static-account/project_viewer
385
389
  ```
386
390
 
387
391
  :param str resource_name: The name of the resource.
@@ -407,6 +407,7 @@ class Endpoint(pulumi.CustomResource):
407
407
  """
408
408
  ## Example Usage
409
409
 
410
+ <!--Start PulumiCodeChooser -->
410
411
  ```python
411
412
  import pulumi
412
413
  import pulumi_vault as vault
@@ -444,6 +445,8 @@ class Endpoint(pulumi.CustomResource):
444
445
  opts=pulumi.ResourceOptions(depends_on=[u1_token]))
445
446
  pulumi.export("u1Id", u1_entity.write_data["id"])
446
447
  ```
448
+ <!--End PulumiCodeChooser -->
449
+
447
450
  ## Required Vault Capabilities
448
451
 
449
452
  Use of this resource requires the `create` or `update` capability
@@ -499,6 +502,7 @@ class Endpoint(pulumi.CustomResource):
499
502
  """
500
503
  ## Example Usage
501
504
 
505
+ <!--Start PulumiCodeChooser -->
502
506
  ```python
503
507
  import pulumi
504
508
  import pulumi_vault as vault
@@ -536,6 +540,8 @@ class Endpoint(pulumi.CustomResource):
536
540
  opts=pulumi.ResourceOptions(depends_on=[u1_token]))
537
541
  pulumi.export("u1Id", u1_entity.write_data["id"])
538
542
  ```
543
+ <!--End PulumiCodeChooser -->
544
+
539
545
  ## Required Vault Capabilities
540
546
 
541
547
  Use of this resource requires the `create` or `update` capability
@@ -159,17 +159,17 @@ def get_secret(namespace: Optional[str] = None,
159
159
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
160
160
  """
161
161
  ## Example Usage
162
+
162
163
  ### Generic secret
163
164
 
165
+ <!--Start PulumiCodeChooser -->
164
166
  ```python
165
167
  import pulumi
166
168
  import pulumi_vault as vault
167
169
 
168
170
  rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
169
171
  ```
170
- ## Required Vault Capabilities
171
-
172
- Use of this resource requires the `read` capability on the given path.
172
+ <!--End PulumiCodeChooser -->
173
173
 
174
174
 
175
175
  :param str namespace: The namespace of the target resource.
@@ -218,17 +218,17 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
218
218
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
219
219
  """
220
220
  ## Example Usage
221
+
221
222
  ### Generic secret
222
223
 
224
+ <!--Start PulumiCodeChooser -->
223
225
  ```python
224
226
  import pulumi
225
227
  import pulumi_vault as vault
226
228
 
227
229
  rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
228
230
  ```
229
- ## Required Vault Capabilities
230
-
231
- Use of this resource requires the `read` capability on the given path.
231
+ <!--End PulumiCodeChooser -->
232
232
 
233
233
 
234
234
  :param str namespace: The namespace of the target resource.
@@ -276,7 +276,7 @@ class Secret(pulumi.CustomResource):
276
276
  Generic secrets can be imported using the `path`, e.g.
277
277
 
278
278
  ```sh
279
- $ pulumi import vault:generic/secret:Secret example secret/foo
279
+ $ pulumi import vault:generic/secret:Secret example secret/foo
280
280
  ```
281
281
 
282
282
  :param str resource_name: The name of the resource.
@@ -312,7 +312,7 @@ class Secret(pulumi.CustomResource):
312
312
  Generic secrets can be imported using the `path`, e.g.
313
313
 
314
314
  ```sh
315
- $ pulumi import vault:generic/secret:Secret example secret/foo
315
+ $ pulumi import vault:generic/secret:Secret example secret/foo
316
316
  ```
317
317
 
318
318
  :param str resource_name: The name of the resource.
@@ -152,12 +152,14 @@ def get_auth_backend(namespace: Optional[str] = None,
152
152
  """
153
153
  ## Example Usage
154
154
 
155
+ <!--Start PulumiCodeChooser -->
155
156
  ```python
156
157
  import pulumi
157
158
  import pulumi_vault as vault
158
159
 
159
160
  example = vault.get_auth_backend(path="userpass")
160
161
  ```
162
+ <!--End PulumiCodeChooser -->
161
163
 
162
164
 
163
165
  :param str namespace: The namespace of the target resource.
@@ -192,12 +194,14 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
192
194
  """
193
195
  ## Example Usage
194
196
 
197
+ <!--Start PulumiCodeChooser -->
195
198
  ```python
196
199
  import pulumi
197
200
  import pulumi_vault as vault
198
201
 
199
202
  example = vault.get_auth_backend(path="userpass")
200
203
  ```
204
+ <!--End PulumiCodeChooser -->
201
205
 
202
206
 
203
207
  :param str namespace: The namespace of the target resource.