pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 5.21.0a1710888431__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (176) hide show
  1. pulumi_vault/ad/get_access_credentials.py +4 -2
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +6 -2
  4. pulumi_vault/ad/secret_role.py +6 -2
  5. pulumi_vault/alicloud/auth_backend_role.py +6 -2
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +6 -2
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +14 -2
  11. pulumi_vault/audit_request_header.py +4 -0
  12. pulumi_vault/auth_backend.py +2 -2
  13. pulumi_vault/aws/auth_backend_cert.py +6 -2
  14. pulumi_vault/aws/auth_backend_client.py +6 -2
  15. pulumi_vault/aws/auth_backend_config_identity.py +6 -2
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -2
  17. pulumi_vault/aws/auth_backend_role.py +6 -2
  18. pulumi_vault/aws/auth_backend_roletag_blacklist.py +4 -0
  19. pulumi_vault/aws/auth_backend_sts_role.py +6 -2
  20. pulumi_vault/aws/get_access_credentials.py +4 -2
  21. pulumi_vault/aws/secret_backend.py +2 -2
  22. pulumi_vault/aws/secret_backend_role.py +6 -2
  23. pulumi_vault/aws/secret_backend_static_role.py +10 -4
  24. pulumi_vault/azure/auth_backend_config.py +6 -2
  25. pulumi_vault/azure/auth_backend_role.py +6 -2
  26. pulumi_vault/azure/backend.py +12 -0
  27. pulumi_vault/azure/backend_role.py +4 -0
  28. pulumi_vault/azure/get_access_credentials.py +6 -0
  29. pulumi_vault/cert_auth_backend_role.py +4 -0
  30. pulumi_vault/consul/secret_backend.py +14 -2
  31. pulumi_vault/consul/secret_backend_role.py +8 -2
  32. pulumi_vault/database/secret_backend_connection.py +6 -2
  33. pulumi_vault/database/secret_backend_role.py +6 -2
  34. pulumi_vault/database/secret_backend_static_role.py +6 -2
  35. pulumi_vault/database/secrets_mount.py +6 -2
  36. pulumi_vault/egp_policy.py +4 -0
  37. pulumi_vault/gcp/auth_backend.py +6 -2
  38. pulumi_vault/gcp/auth_backend_role.py +6 -2
  39. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  40. pulumi_vault/gcp/secret_backend.py +4 -0
  41. pulumi_vault/gcp/secret_impersonated_account.py +6 -2
  42. pulumi_vault/gcp/secret_roleset.py +6 -2
  43. pulumi_vault/gcp/secret_static_account.py +6 -2
  44. pulumi_vault/generic/endpoint.py +6 -0
  45. pulumi_vault/generic/get_secret.py +6 -6
  46. pulumi_vault/generic/secret.py +2 -2
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +22 -2
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +4 -0
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +6 -2
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +6 -2
  56. pulumi_vault/identity/entity_alias.py +6 -2
  57. pulumi_vault/identity/entity_policies.py +12 -0
  58. pulumi_vault/identity/get_entity.py +6 -0
  59. pulumi_vault/identity/get_group.py +6 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -0
  61. pulumi_vault/identity/get_oidc_openid_config.py +4 -0
  62. pulumi_vault/identity/get_oidc_public_keys.py +4 -0
  63. pulumi_vault/identity/group.py +20 -2
  64. pulumi_vault/identity/group_alias.py +6 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +12 -0
  66. pulumi_vault/identity/group_member_group_ids.py +12 -0
  67. pulumi_vault/identity/group_policies.py +12 -0
  68. pulumi_vault/identity/mfa_duo.py +6 -2
  69. pulumi_vault/identity/mfa_login_enforcement.py +6 -2
  70. pulumi_vault/identity/mfa_okta.py +6 -2
  71. pulumi_vault/identity/mfa_pingid.py +6 -2
  72. pulumi_vault/identity/mfa_totp.py +6 -2
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -2
  75. pulumi_vault/identity/oidc_client.py +6 -2
  76. pulumi_vault/identity/oidc_key.py +6 -2
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +4 -0
  78. pulumi_vault/identity/oidc_provider.py +6 -2
  79. pulumi_vault/identity/oidc_role.py +10 -2
  80. pulumi_vault/identity/oidc_scope.py +6 -2
  81. pulumi_vault/jwt/auth_backend.py +18 -6
  82. pulumi_vault/jwt/auth_backend_role.py +10 -2
  83. pulumi_vault/kmip/secret_backend.py +6 -2
  84. pulumi_vault/kmip/secret_role.py +6 -2
  85. pulumi_vault/kmip/secret_scope.py +6 -2
  86. pulumi_vault/kubernetes/auth_backend_config.py +6 -2
  87. pulumi_vault/kubernetes/auth_backend_role.py +6 -2
  88. pulumi_vault/kubernetes/get_service_account_token.py +4 -0
  89. pulumi_vault/kubernetes/secret_backend.py +6 -2
  90. pulumi_vault/kubernetes/secret_backend_role.py +14 -2
  91. pulumi_vault/kv/get_secret.py +6 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -0
  93. pulumi_vault/kv/get_secret_v2.py +2 -6
  94. pulumi_vault/kv/get_secrets_list.py +6 -0
  95. pulumi_vault/kv/get_secrets_list_v2.py +6 -0
  96. pulumi_vault/kv/secret.py +8 -2
  97. pulumi_vault/kv/secret_backend_v2.py +12 -4
  98. pulumi_vault/kv/secret_v2.py +8 -2
  99. pulumi_vault/ldap/auth_backend.py +6 -2
  100. pulumi_vault/ldap/auth_backend_group.py +6 -2
  101. pulumi_vault/ldap/auth_backend_user.py +6 -2
  102. pulumi_vault/ldap/secret_backend.py +6 -2
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +10 -4
  104. pulumi_vault/ldap/secret_backend_library_set.py +6 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +10 -4
  106. pulumi_vault/managed/keys.py +2 -14
  107. pulumi_vault/mfa_duo.py +6 -2
  108. pulumi_vault/mfa_okta.py +6 -2
  109. pulumi_vault/mfa_pingid.py +6 -2
  110. pulumi_vault/mfa_totp.py +6 -2
  111. pulumi_vault/mongodbatlas/secret_backend.py +6 -2
  112. pulumi_vault/mongodbatlas/secret_role.py +10 -4
  113. pulumi_vault/mount.py +18 -2
  114. pulumi_vault/namespace.py +42 -62
  115. pulumi_vault/nomad_secret_backend.py +6 -2
  116. pulumi_vault/nomad_secret_role.py +6 -2
  117. pulumi_vault/okta/auth_backend.py +6 -2
  118. pulumi_vault/okta/auth_backend_group.py +6 -2
  119. pulumi_vault/okta/auth_backend_user.py +6 -2
  120. pulumi_vault/password_policy.py +6 -2
  121. pulumi_vault/pkisecret/get_backend_issuer.py +4 -2
  122. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  123. pulumi_vault/pkisecret/get_backend_key.py +4 -0
  124. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  125. pulumi_vault/pkisecret/secret_backend_cert.py +4 -0
  126. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -0
  127. pulumi_vault/pkisecret/secret_backend_config_issuers.py +6 -2
  128. pulumi_vault/pkisecret/secret_backend_config_urls.py +12 -4
  129. pulumi_vault/pkisecret/secret_backend_crl_config.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -0
  131. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +4 -0
  132. pulumi_vault/pkisecret/secret_backend_issuer.py +6 -2
  133. pulumi_vault/pkisecret/secret_backend_key.py +2 -2
  134. pulumi_vault/pkisecret/secret_backend_role.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -0
  136. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -0
  137. pulumi_vault/pkisecret/secret_backend_sign.py +6 -0
  138. pulumi_vault/policy.py +2 -2
  139. pulumi_vault/quota_lease_count.py +6 -2
  140. pulumi_vault/quota_rate_limit.py +6 -2
  141. pulumi_vault/rabbitmq/secret_backend.py +6 -2
  142. pulumi_vault/rabbitmq/secret_backend_role.py +6 -2
  143. pulumi_vault/raft_autopilot.py +6 -2
  144. pulumi_vault/raft_snapshot_agent_config.py +111 -16
  145. pulumi_vault/rgp_policy.py +4 -0
  146. pulumi_vault/saml/auth_backend.py +6 -2
  147. pulumi_vault/saml/auth_backend_role.py +6 -2
  148. pulumi_vault/secrets/sync_association.py +4 -0
  149. pulumi_vault/secrets/sync_aws_destination.py +6 -2
  150. pulumi_vault/secrets/sync_azure_destination.py +6 -2
  151. pulumi_vault/secrets/sync_config.py +6 -2
  152. pulumi_vault/secrets/sync_gcp_destination.py +6 -2
  153. pulumi_vault/secrets/sync_gh_destination.py +6 -2
  154. pulumi_vault/secrets/sync_vercel_destination.py +6 -2
  155. pulumi_vault/ssh/_inputs.py +4 -0
  156. pulumi_vault/ssh/outputs.py +4 -0
  157. pulumi_vault/ssh/secret_backend_ca.py +6 -2
  158. pulumi_vault/ssh/secret_backend_role.py +6 -2
  159. pulumi_vault/terraformcloud/secret_backend.py +6 -2
  160. pulumi_vault/terraformcloud/secret_creds.py +4 -0
  161. pulumi_vault/terraformcloud/secret_role.py +6 -2
  162. pulumi_vault/token.py +6 -2
  163. pulumi_vault/tokenauth/auth_backend_role.py +6 -2
  164. pulumi_vault/transform/alphabet.py +4 -0
  165. pulumi_vault/transform/get_decode.py +4 -0
  166. pulumi_vault/transform/get_encode.py +4 -0
  167. pulumi_vault/transform/role.py +4 -0
  168. pulumi_vault/transform/template.py +4 -0
  169. pulumi_vault/transit/get_decrypt.py +4 -0
  170. pulumi_vault/transit/secret_backend_key.py +8 -2
  171. pulumi_vault/transit/secret_cache_config.py +4 -0
  172. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/METADATA +1 -1
  173. pulumi_vault-5.21.0a1710888431.dist-info/RECORD +244 -0
  174. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/WHEEL +1 -1
  175. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  176. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/top_level.txt +0 -0
@@ -90,7 +90,17 @@ def get_auth_backends(namespace: Optional[str] = None,
90
90
  type: Optional[str] = None,
91
91
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendsResult:
92
92
  """
93
- Use this data source to access information about an existing resource.
93
+ ## Example Usage
94
+
95
+ <!--Start PulumiCodeChooser -->
96
+ ```python
97
+ import pulumi
98
+ import pulumi_vault as vault
99
+
100
+ example = vault.get_auth_backends()
101
+ ```
102
+ <!--End PulumiCodeChooser -->
103
+
94
104
 
95
105
  :param str namespace: The namespace of the target resource.
96
106
  The value should not contain leading or trailing forward slashes.
@@ -117,7 +127,17 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
117
127
  type: Optional[pulumi.Input[Optional[str]]] = None,
118
128
  opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendsResult]:
119
129
  """
120
- Use this data source to access information about an existing resource.
130
+ ## Example Usage
131
+
132
+ <!--Start PulumiCodeChooser -->
133
+ ```python
134
+ import pulumi
135
+ import pulumi_vault as vault
136
+
137
+ example = vault.get_auth_backends()
138
+ ```
139
+ <!--End PulumiCodeChooser -->
140
+
121
141
 
122
142
  :param str namespace: The namespace of the target resource.
123
143
  The value should not contain leading or trailing forward slashes.
@@ -103,6 +103,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
103
103
  """
104
104
  ## Example Usage
105
105
 
106
+ <!--Start PulumiCodeChooser -->
106
107
  ```python
107
108
  import pulumi
108
109
  import pulumi_vault as vault
@@ -122,6 +123,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
122
123
  token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
123
124
  role=role))
124
125
  ```
126
+ <!--End PulumiCodeChooser -->
125
127
 
126
128
 
127
129
  :param str backend: The path to the Nomad secret backend to
@@ -157,6 +159,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
157
159
  """
158
160
  ## Example Usage
159
161
 
162
+ <!--Start PulumiCodeChooser -->
160
163
  ```python
161
164
  import pulumi
162
165
  import pulumi_vault as vault
@@ -176,6 +179,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
176
179
  token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
177
180
  role=role))
178
181
  ```
182
+ <!--End PulumiCodeChooser -->
179
183
 
180
184
 
181
185
  :param str backend: The path to the Nomad secret backend to
@@ -84,6 +84,7 @@ def get_policy_document(namespace: Optional[str] = None,
84
84
 
85
85
  ## Example Usage
86
86
 
87
+ <!--Start PulumiCodeChooser -->
87
88
  ```python
88
89
  import pulumi
89
90
  import pulumi_vault as vault
@@ -101,6 +102,7 @@ def get_policy_document(namespace: Optional[str] = None,
101
102
  )])
102
103
  example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
103
104
  ```
105
+ <!--End PulumiCodeChooser -->
104
106
  """
105
107
  __args__ = dict()
106
108
  __args__['namespace'] = namespace
@@ -124,6 +126,7 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
124
126
 
125
127
  ## Example Usage
126
128
 
129
+ <!--Start PulumiCodeChooser -->
127
130
  ```python
128
131
  import pulumi
129
132
  import pulumi_vault as vault
@@ -141,5 +144,6 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
141
144
  )])
142
145
  example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
143
146
  ```
147
+ <!--End PulumiCodeChooser -->
144
148
  """
145
149
  ...
@@ -190,6 +190,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
190
190
  """
191
191
  ## Example Usage
192
192
 
193
+ <!--Start PulumiCodeChooser -->
193
194
  ```python
194
195
  import pulumi
195
196
  import pulumi_vault as vault
@@ -197,6 +198,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
197
198
  main = vault.get_raft_autopilot_state()
198
199
  pulumi.export("failure-tolerance", main.failure_tolerance)
199
200
  ```
201
+ <!--End PulumiCodeChooser -->
200
202
 
201
203
 
202
204
  :param str namespace: The namespace of the target resource.
@@ -231,6 +233,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
231
233
  """
232
234
  ## Example Usage
233
235
 
236
+ <!--Start PulumiCodeChooser -->
234
237
  ```python
235
238
  import pulumi
236
239
  import pulumi_vault as vault
@@ -238,6 +241,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
238
241
  main = vault.get_raft_autopilot_state()
239
242
  pulumi.export("failure-tolerance", main.failure_tolerance)
240
243
  ```
244
+ <!--End PulumiCodeChooser -->
241
245
 
242
246
 
243
247
  :param str namespace: The namespace of the target resource.
@@ -714,19 +714,21 @@ class AuthBackend(pulumi.CustomResource):
714
714
 
715
715
  ## Example Usage
716
716
 
717
+ <!--Start PulumiCodeChooser -->
717
718
  ```python
718
719
  import pulumi
719
720
  import pulumi_vault as vault
720
721
 
721
722
  example = vault.github.AuthBackend("example", organization="myorg")
722
723
  ```
724
+ <!--End PulumiCodeChooser -->
723
725
 
724
726
  ## Import
725
727
 
726
728
  GitHub authentication mounts can be imported using the `path`, e.g.
727
729
 
728
730
  ```sh
729
- $ pulumi import vault:github/authBackend:AuthBackend example github
731
+ $ pulumi import vault:github/authBackend:AuthBackend example github
730
732
  ```
731
733
 
732
734
  :param str resource_name: The name of the resource.
@@ -786,19 +788,21 @@ class AuthBackend(pulumi.CustomResource):
786
788
 
787
789
  ## Example Usage
788
790
 
791
+ <!--Start PulumiCodeChooser -->
789
792
  ```python
790
793
  import pulumi
791
794
  import pulumi_vault as vault
792
795
 
793
796
  example = vault.github.AuthBackend("example", organization="myorg")
794
797
  ```
798
+ <!--End PulumiCodeChooser -->
795
799
 
796
800
  ## Import
797
801
 
798
802
  GitHub authentication mounts can be imported using the `path`, e.g.
799
803
 
800
804
  ```sh
801
- $ pulumi import vault:github/authBackend:AuthBackend example github
805
+ $ pulumi import vault:github/authBackend:AuthBackend example github
802
806
  ```
803
807
 
804
808
  :param str resource_name: The name of the resource.
@@ -191,6 +191,7 @@ class Team(pulumi.CustomResource):
191
191
 
192
192
  ## Example Usage
193
193
 
194
+ <!--Start PulumiCodeChooser -->
194
195
  ```python
195
196
  import pulumi
196
197
  import pulumi_vault as vault
@@ -204,13 +205,14 @@ class Team(pulumi.CustomResource):
204
205
  "read-only",
205
206
  ])
206
207
  ```
208
+ <!--End PulumiCodeChooser -->
207
209
 
208
210
  ## Import
209
211
 
210
212
  Github team mappings can be imported using the `path`, e.g.
211
213
 
212
214
  ```sh
213
- $ pulumi import vault:github/team:Team tf_devs auth/github/map/teams/terraform-developers
215
+ $ pulumi import vault:github/team:Team tf_devs auth/github/map/teams/terraform-developers
214
216
  ```
215
217
 
216
218
  :param str resource_name: The name of the resource.
@@ -238,6 +240,7 @@ class Team(pulumi.CustomResource):
238
240
 
239
241
  ## Example Usage
240
242
 
243
+ <!--Start PulumiCodeChooser -->
241
244
  ```python
242
245
  import pulumi
243
246
  import pulumi_vault as vault
@@ -251,13 +254,14 @@ class Team(pulumi.CustomResource):
251
254
  "read-only",
252
255
  ])
253
256
  ```
257
+ <!--End PulumiCodeChooser -->
254
258
 
255
259
  ## Import
256
260
 
257
261
  Github team mappings can be imported using the `path`, e.g.
258
262
 
259
263
  ```sh
260
- $ pulumi import vault:github/team:Team tf_devs auth/github/map/teams/terraform-developers
264
+ $ pulumi import vault:github/team:Team tf_devs auth/github/map/teams/terraform-developers
261
265
  ```
262
266
 
263
267
  :param str resource_name: The name of the resource.
@@ -191,6 +191,7 @@ class User(pulumi.CustomResource):
191
191
 
192
192
  ## Example Usage
193
193
 
194
+ <!--Start PulumiCodeChooser -->
194
195
  ```python
195
196
  import pulumi
196
197
  import pulumi_vault as vault
@@ -204,13 +205,14 @@ class User(pulumi.CustomResource):
204
205
  "read-only",
205
206
  ])
206
207
  ```
208
+ <!--End PulumiCodeChooser -->
207
209
 
208
210
  ## Import
209
211
 
210
212
  Github user mappings can be imported using the `path`, e.g.
211
213
 
212
214
  ```sh
213
- $ pulumi import vault:github/user:User tf_user auth/github/map/users/john.doe
215
+ $ pulumi import vault:github/user:User tf_user auth/github/map/users/john.doe
214
216
  ```
215
217
 
216
218
  :param str resource_name: The name of the resource.
@@ -238,6 +240,7 @@ class User(pulumi.CustomResource):
238
240
 
239
241
  ## Example Usage
240
242
 
243
+ <!--Start PulumiCodeChooser -->
241
244
  ```python
242
245
  import pulumi
243
246
  import pulumi_vault as vault
@@ -251,13 +254,14 @@ class User(pulumi.CustomResource):
251
254
  "read-only",
252
255
  ])
253
256
  ```
257
+ <!--End PulumiCodeChooser -->
254
258
 
255
259
  ## Import
256
260
 
257
261
  Github user mappings can be imported using the `path`, e.g.
258
262
 
259
263
  ```sh
260
- $ pulumi import vault:github/user:User tf_user auth/github/map/users/john.doe
264
+ $ pulumi import vault:github/user:User tf_user auth/github/map/users/john.doe
261
265
  ```
262
266
 
263
267
  :param str resource_name: The name of the resource.
@@ -246,6 +246,7 @@ class Entity(pulumi.CustomResource):
246
246
  """
247
247
  ## Example Usage
248
248
 
249
+ <!--Start PulumiCodeChooser -->
249
250
  ```python
250
251
  import pulumi
251
252
  import pulumi_vault as vault
@@ -256,13 +257,14 @@ class Entity(pulumi.CustomResource):
256
257
  },
257
258
  policies=["test"])
258
259
  ```
260
+ <!--End PulumiCodeChooser -->
259
261
 
260
262
  ## Import
261
263
 
262
264
  Identity entity can be imported using the `id`, e.g.
263
265
 
264
266
  ```sh
265
- $ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
267
+ $ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
266
268
  ```
267
269
 
268
270
  :param str resource_name: The name of the resource.
@@ -286,6 +288,7 @@ class Entity(pulumi.CustomResource):
286
288
  """
287
289
  ## Example Usage
288
290
 
291
+ <!--Start PulumiCodeChooser -->
289
292
  ```python
290
293
  import pulumi
291
294
  import pulumi_vault as vault
@@ -296,13 +299,14 @@ class Entity(pulumi.CustomResource):
296
299
  },
297
300
  policies=["test"])
298
301
  ```
302
+ <!--End PulumiCodeChooser -->
299
303
 
300
304
  ## Import
301
305
 
302
306
  Identity entity can be imported using the `id`, e.g.
303
307
 
304
308
  ```sh
305
- $ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
309
+ $ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
306
310
  ```
307
311
 
308
312
  :param str resource_name: The name of the resource.
@@ -211,6 +211,7 @@ class EntityAlias(pulumi.CustomResource):
211
211
  """
212
212
  ## Example Usage
213
213
 
214
+ <!--Start PulumiCodeChooser -->
214
215
  ```python
215
216
  import pulumi
216
217
  import pulumi_vault as vault
@@ -219,13 +220,14 @@ class EntityAlias(pulumi.CustomResource):
219
220
  canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
220
221
  mount_accessor="token_1f2bd5")
221
222
  ```
223
+ <!--End PulumiCodeChooser -->
222
224
 
223
225
  ## Import
224
226
 
225
227
  Identity entity alias can be imported using the `id`, e.g.
226
228
 
227
229
  ```sh
228
- $ pulumi import vault:identity/entityAlias:EntityAlias test "3856fb4d-3c91-dcaf-2401-68f446796bfb"
230
+ $ pulumi import vault:identity/entityAlias:EntityAlias test "3856fb4d-3c91-dcaf-2401-68f446796bfb"
229
231
  ```
230
232
 
231
233
  :param str resource_name: The name of the resource.
@@ -248,6 +250,7 @@ class EntityAlias(pulumi.CustomResource):
248
250
  """
249
251
  ## Example Usage
250
252
 
253
+ <!--Start PulumiCodeChooser -->
251
254
  ```python
252
255
  import pulumi
253
256
  import pulumi_vault as vault
@@ -256,13 +259,14 @@ class EntityAlias(pulumi.CustomResource):
256
259
  canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
257
260
  mount_accessor="token_1f2bd5")
258
261
  ```
262
+ <!--End PulumiCodeChooser -->
259
263
 
260
264
  ## Import
261
265
 
262
266
  Identity entity alias can be imported using the `id`, e.g.
263
267
 
264
268
  ```sh
265
- $ pulumi import vault:identity/entityAlias:EntityAlias test "3856fb4d-3c91-dcaf-2401-68f446796bfb"
269
+ $ pulumi import vault:identity/entityAlias:EntityAlias test "3856fb4d-3c91-dcaf-2401-68f446796bfb"
266
270
  ```
267
271
 
268
272
  :param str resource_name: The name of the resource.
@@ -211,8 +211,10 @@ class EntityPolicies(pulumi.CustomResource):
211
211
  Manages policies for an Identity Entity for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
212
212
 
213
213
  ## Example Usage
214
+
214
215
  ### Exclusive Policies
215
216
 
217
+ <!--Start PulumiCodeChooser -->
216
218
  ```python
217
219
  import pulumi
218
220
  import pulumi_vault as vault
@@ -226,8 +228,11 @@ class EntityPolicies(pulumi.CustomResource):
226
228
  exclusive=True,
227
229
  entity_id=entity.id)
228
230
  ```
231
+ <!--End PulumiCodeChooser -->
232
+
229
233
  ### Non-exclusive Policies
230
234
 
235
+ <!--Start PulumiCodeChooser -->
231
236
  ```python
232
237
  import pulumi
233
238
  import pulumi_vault as vault
@@ -245,6 +250,7 @@ class EntityPolicies(pulumi.CustomResource):
245
250
  exclusive=False,
246
251
  entity_id=entity.id)
247
252
  ```
253
+ <!--End PulumiCodeChooser -->
248
254
 
249
255
  :param str resource_name: The name of the resource.
250
256
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -270,8 +276,10 @@ class EntityPolicies(pulumi.CustomResource):
270
276
  Manages policies for an Identity Entity for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
271
277
 
272
278
  ## Example Usage
279
+
273
280
  ### Exclusive Policies
274
281
 
282
+ <!--Start PulumiCodeChooser -->
275
283
  ```python
276
284
  import pulumi
277
285
  import pulumi_vault as vault
@@ -285,8 +293,11 @@ class EntityPolicies(pulumi.CustomResource):
285
293
  exclusive=True,
286
294
  entity_id=entity.id)
287
295
  ```
296
+ <!--End PulumiCodeChooser -->
297
+
288
298
  ### Non-exclusive Policies
289
299
 
300
+ <!--Start PulumiCodeChooser -->
290
301
  ```python
291
302
  import pulumi
292
303
  import pulumi_vault as vault
@@ -304,6 +315,7 @@ class EntityPolicies(pulumi.CustomResource):
304
315
  exclusive=False,
305
316
  entity_id=entity.id)
306
317
  ```
318
+ <!--End PulumiCodeChooser -->
307
319
 
308
320
  :param str resource_name: The name of the resource.
309
321
  :param EntityPoliciesArgs args: The arguments to use to populate this resource's properties.
@@ -254,12 +254,15 @@ def get_entity(alias_id: Optional[str] = None,
254
254
  """
255
255
  ## Example Usage
256
256
 
257
+ <!--Start PulumiCodeChooser -->
257
258
  ```python
258
259
  import pulumi
259
260
  import pulumi_vault as vault
260
261
 
261
262
  entity = vault.identity.get_entity(entity_name="entity_12345")
262
263
  ```
264
+ <!--End PulumiCodeChooser -->
265
+
263
266
  ## Required Vault Capabilities
264
267
 
265
268
  Use of this resource requires the `create` capability on `/identity/lookup/entity`.
@@ -323,12 +326,15 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
323
326
  """
324
327
  ## Example Usage
325
328
 
329
+ <!--Start PulumiCodeChooser -->
326
330
  ```python
327
331
  import pulumi
328
332
  import pulumi_vault as vault
329
333
 
330
334
  entity = vault.identity.get_entity(entity_name="entity_12345")
331
335
  ```
336
+ <!--End PulumiCodeChooser -->
337
+
332
338
  ## Required Vault Capabilities
333
339
 
334
340
  Use of this resource requires the `create` capability on `/identity/lookup/entity`.
@@ -325,12 +325,15 @@ def get_group(alias_id: Optional[str] = None,
325
325
  """
326
326
  ## Example Usage
327
327
 
328
+ <!--Start PulumiCodeChooser -->
328
329
  ```python
329
330
  import pulumi
330
331
  import pulumi_vault as vault
331
332
 
332
333
  group = vault.identity.get_group(group_name="user")
333
334
  ```
335
+ <!--End PulumiCodeChooser -->
336
+
334
337
  ## Required Vault Capabilities
335
338
 
336
339
  Use of this resource requires the `create` capability on `/identity/lookup/group`.
@@ -400,12 +403,15 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
400
403
  """
401
404
  ## Example Usage
402
405
 
406
+ <!--Start PulumiCodeChooser -->
403
407
  ```python
404
408
  import pulumi
405
409
  import pulumi_vault as vault
406
410
 
407
411
  group = vault.identity.get_group(group_name="user")
408
412
  ```
413
+ <!--End PulumiCodeChooser -->
414
+
409
415
  ## Required Vault Capabilities
410
416
 
411
417
  Use of this resource requires the `create` capability on `/identity/lookup/group`.
@@ -93,6 +93,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
93
93
  """
94
94
  ## Example Usage
95
95
 
96
+ <!--Start PulumiCodeChooser -->
96
97
  ```python
97
98
  import pulumi
98
99
  import pulumi_vault as vault
@@ -107,6 +108,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
107
108
  access_token_ttl=7200)
108
109
  creds = vault.identity.get_oidc_client_creds_output(name=app.name)
109
110
  ```
111
+ <!--End PulumiCodeChooser -->
110
112
 
111
113
 
112
114
  :param str name: The name of the OIDC Client in Vault.
@@ -136,6 +138,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
136
138
  """
137
139
  ## Example Usage
138
140
 
141
+ <!--Start PulumiCodeChooser -->
139
142
  ```python
140
143
  import pulumi
141
144
  import pulumi_vault as vault
@@ -150,6 +153,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
150
153
  access_token_ttl=7200)
151
154
  creds = vault.identity.get_oidc_client_creds_output(name=app.name)
152
155
  ```
156
+ <!--End PulumiCodeChooser -->
153
157
 
154
158
 
155
159
  :param str name: The name of the OIDC Client in Vault.
@@ -214,6 +214,7 @@ def get_oidc_openid_config(name: Optional[str] = None,
214
214
  """
215
215
  ## Example Usage
216
216
 
217
+ <!--Start PulumiCodeChooser -->
217
218
  ```python
218
219
  import pulumi
219
220
  import pulumi_vault as vault
@@ -234,6 +235,7 @@ def get_oidc_openid_config(name: Optional[str] = None,
234
235
  provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
235
236
  config = vault.identity.get_oidc_openid_config_output(name=provider.name)
236
237
  ```
238
+ <!--End PulumiCodeChooser -->
237
239
 
238
240
 
239
241
  :param str name: The name of the OIDC Provider in Vault.
@@ -273,6 +275,7 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
273
275
  """
274
276
  ## Example Usage
275
277
 
278
+ <!--Start PulumiCodeChooser -->
276
279
  ```python
277
280
  import pulumi
278
281
  import pulumi_vault as vault
@@ -293,6 +296,7 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
293
296
  provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
294
297
  config = vault.identity.get_oidc_openid_config_output(name=provider.name)
295
298
  ```
299
+ <!--End PulumiCodeChooser -->
296
300
 
297
301
 
298
302
  :param str name: The name of the OIDC Provider in Vault.
@@ -81,6 +81,7 @@ def get_oidc_public_keys(name: Optional[str] = None,
81
81
  """
82
82
  ## Example Usage
83
83
 
84
+ <!--Start PulumiCodeChooser -->
84
85
  ```python
85
86
  import pulumi
86
87
  import pulumi_vault as vault
@@ -101,6 +102,7 @@ def get_oidc_public_keys(name: Optional[str] = None,
101
102
  provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
102
103
  public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
103
104
  ```
105
+ <!--End PulumiCodeChooser -->
104
106
 
105
107
 
106
108
  :param str name: The name of the OIDC Provider in Vault.
@@ -129,6 +131,7 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
129
131
  """
130
132
  ## Example Usage
131
133
 
134
+ <!--Start PulumiCodeChooser -->
132
135
  ```python
133
136
  import pulumi
134
137
  import pulumi_vault as vault
@@ -149,6 +152,7 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
149
152
  provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
150
153
  public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
151
154
  ```
155
+ <!--End PulumiCodeChooser -->
152
156
 
153
157
 
154
158
  :param str name: The name of the OIDC Provider in Vault.