pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 5.21.0a1710888431__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (176) hide show
  1. pulumi_vault/ad/get_access_credentials.py +4 -2
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +6 -2
  4. pulumi_vault/ad/secret_role.py +6 -2
  5. pulumi_vault/alicloud/auth_backend_role.py +6 -2
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +6 -2
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +14 -2
  11. pulumi_vault/audit_request_header.py +4 -0
  12. pulumi_vault/auth_backend.py +2 -2
  13. pulumi_vault/aws/auth_backend_cert.py +6 -2
  14. pulumi_vault/aws/auth_backend_client.py +6 -2
  15. pulumi_vault/aws/auth_backend_config_identity.py +6 -2
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -2
  17. pulumi_vault/aws/auth_backend_role.py +6 -2
  18. pulumi_vault/aws/auth_backend_roletag_blacklist.py +4 -0
  19. pulumi_vault/aws/auth_backend_sts_role.py +6 -2
  20. pulumi_vault/aws/get_access_credentials.py +4 -2
  21. pulumi_vault/aws/secret_backend.py +2 -2
  22. pulumi_vault/aws/secret_backend_role.py +6 -2
  23. pulumi_vault/aws/secret_backend_static_role.py +10 -4
  24. pulumi_vault/azure/auth_backend_config.py +6 -2
  25. pulumi_vault/azure/auth_backend_role.py +6 -2
  26. pulumi_vault/azure/backend.py +12 -0
  27. pulumi_vault/azure/backend_role.py +4 -0
  28. pulumi_vault/azure/get_access_credentials.py +6 -0
  29. pulumi_vault/cert_auth_backend_role.py +4 -0
  30. pulumi_vault/consul/secret_backend.py +14 -2
  31. pulumi_vault/consul/secret_backend_role.py +8 -2
  32. pulumi_vault/database/secret_backend_connection.py +6 -2
  33. pulumi_vault/database/secret_backend_role.py +6 -2
  34. pulumi_vault/database/secret_backend_static_role.py +6 -2
  35. pulumi_vault/database/secrets_mount.py +6 -2
  36. pulumi_vault/egp_policy.py +4 -0
  37. pulumi_vault/gcp/auth_backend.py +6 -2
  38. pulumi_vault/gcp/auth_backend_role.py +6 -2
  39. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  40. pulumi_vault/gcp/secret_backend.py +4 -0
  41. pulumi_vault/gcp/secret_impersonated_account.py +6 -2
  42. pulumi_vault/gcp/secret_roleset.py +6 -2
  43. pulumi_vault/gcp/secret_static_account.py +6 -2
  44. pulumi_vault/generic/endpoint.py +6 -0
  45. pulumi_vault/generic/get_secret.py +6 -6
  46. pulumi_vault/generic/secret.py +2 -2
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +22 -2
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +4 -0
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +6 -2
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +6 -2
  56. pulumi_vault/identity/entity_alias.py +6 -2
  57. pulumi_vault/identity/entity_policies.py +12 -0
  58. pulumi_vault/identity/get_entity.py +6 -0
  59. pulumi_vault/identity/get_group.py +6 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -0
  61. pulumi_vault/identity/get_oidc_openid_config.py +4 -0
  62. pulumi_vault/identity/get_oidc_public_keys.py +4 -0
  63. pulumi_vault/identity/group.py +20 -2
  64. pulumi_vault/identity/group_alias.py +6 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +12 -0
  66. pulumi_vault/identity/group_member_group_ids.py +12 -0
  67. pulumi_vault/identity/group_policies.py +12 -0
  68. pulumi_vault/identity/mfa_duo.py +6 -2
  69. pulumi_vault/identity/mfa_login_enforcement.py +6 -2
  70. pulumi_vault/identity/mfa_okta.py +6 -2
  71. pulumi_vault/identity/mfa_pingid.py +6 -2
  72. pulumi_vault/identity/mfa_totp.py +6 -2
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -2
  75. pulumi_vault/identity/oidc_client.py +6 -2
  76. pulumi_vault/identity/oidc_key.py +6 -2
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +4 -0
  78. pulumi_vault/identity/oidc_provider.py +6 -2
  79. pulumi_vault/identity/oidc_role.py +10 -2
  80. pulumi_vault/identity/oidc_scope.py +6 -2
  81. pulumi_vault/jwt/auth_backend.py +18 -6
  82. pulumi_vault/jwt/auth_backend_role.py +10 -2
  83. pulumi_vault/kmip/secret_backend.py +6 -2
  84. pulumi_vault/kmip/secret_role.py +6 -2
  85. pulumi_vault/kmip/secret_scope.py +6 -2
  86. pulumi_vault/kubernetes/auth_backend_config.py +6 -2
  87. pulumi_vault/kubernetes/auth_backend_role.py +6 -2
  88. pulumi_vault/kubernetes/get_service_account_token.py +4 -0
  89. pulumi_vault/kubernetes/secret_backend.py +6 -2
  90. pulumi_vault/kubernetes/secret_backend_role.py +14 -2
  91. pulumi_vault/kv/get_secret.py +6 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -0
  93. pulumi_vault/kv/get_secret_v2.py +2 -6
  94. pulumi_vault/kv/get_secrets_list.py +6 -0
  95. pulumi_vault/kv/get_secrets_list_v2.py +6 -0
  96. pulumi_vault/kv/secret.py +8 -2
  97. pulumi_vault/kv/secret_backend_v2.py +12 -4
  98. pulumi_vault/kv/secret_v2.py +8 -2
  99. pulumi_vault/ldap/auth_backend.py +6 -2
  100. pulumi_vault/ldap/auth_backend_group.py +6 -2
  101. pulumi_vault/ldap/auth_backend_user.py +6 -2
  102. pulumi_vault/ldap/secret_backend.py +6 -2
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +10 -4
  104. pulumi_vault/ldap/secret_backend_library_set.py +6 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +10 -4
  106. pulumi_vault/managed/keys.py +2 -14
  107. pulumi_vault/mfa_duo.py +6 -2
  108. pulumi_vault/mfa_okta.py +6 -2
  109. pulumi_vault/mfa_pingid.py +6 -2
  110. pulumi_vault/mfa_totp.py +6 -2
  111. pulumi_vault/mongodbatlas/secret_backend.py +6 -2
  112. pulumi_vault/mongodbatlas/secret_role.py +10 -4
  113. pulumi_vault/mount.py +18 -2
  114. pulumi_vault/namespace.py +42 -62
  115. pulumi_vault/nomad_secret_backend.py +6 -2
  116. pulumi_vault/nomad_secret_role.py +6 -2
  117. pulumi_vault/okta/auth_backend.py +6 -2
  118. pulumi_vault/okta/auth_backend_group.py +6 -2
  119. pulumi_vault/okta/auth_backend_user.py +6 -2
  120. pulumi_vault/password_policy.py +6 -2
  121. pulumi_vault/pkisecret/get_backend_issuer.py +4 -2
  122. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  123. pulumi_vault/pkisecret/get_backend_key.py +4 -0
  124. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  125. pulumi_vault/pkisecret/secret_backend_cert.py +4 -0
  126. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -0
  127. pulumi_vault/pkisecret/secret_backend_config_issuers.py +6 -2
  128. pulumi_vault/pkisecret/secret_backend_config_urls.py +12 -4
  129. pulumi_vault/pkisecret/secret_backend_crl_config.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -0
  131. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +4 -0
  132. pulumi_vault/pkisecret/secret_backend_issuer.py +6 -2
  133. pulumi_vault/pkisecret/secret_backend_key.py +2 -2
  134. pulumi_vault/pkisecret/secret_backend_role.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -0
  136. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -0
  137. pulumi_vault/pkisecret/secret_backend_sign.py +6 -0
  138. pulumi_vault/policy.py +2 -2
  139. pulumi_vault/quota_lease_count.py +6 -2
  140. pulumi_vault/quota_rate_limit.py +6 -2
  141. pulumi_vault/rabbitmq/secret_backend.py +6 -2
  142. pulumi_vault/rabbitmq/secret_backend_role.py +6 -2
  143. pulumi_vault/raft_autopilot.py +6 -2
  144. pulumi_vault/raft_snapshot_agent_config.py +111 -16
  145. pulumi_vault/rgp_policy.py +4 -0
  146. pulumi_vault/saml/auth_backend.py +6 -2
  147. pulumi_vault/saml/auth_backend_role.py +6 -2
  148. pulumi_vault/secrets/sync_association.py +4 -0
  149. pulumi_vault/secrets/sync_aws_destination.py +6 -2
  150. pulumi_vault/secrets/sync_azure_destination.py +6 -2
  151. pulumi_vault/secrets/sync_config.py +6 -2
  152. pulumi_vault/secrets/sync_gcp_destination.py +6 -2
  153. pulumi_vault/secrets/sync_gh_destination.py +6 -2
  154. pulumi_vault/secrets/sync_vercel_destination.py +6 -2
  155. pulumi_vault/ssh/_inputs.py +4 -0
  156. pulumi_vault/ssh/outputs.py +4 -0
  157. pulumi_vault/ssh/secret_backend_ca.py +6 -2
  158. pulumi_vault/ssh/secret_backend_role.py +6 -2
  159. pulumi_vault/terraformcloud/secret_backend.py +6 -2
  160. pulumi_vault/terraformcloud/secret_creds.py +4 -0
  161. pulumi_vault/terraformcloud/secret_role.py +6 -2
  162. pulumi_vault/token.py +6 -2
  163. pulumi_vault/tokenauth/auth_backend_role.py +6 -2
  164. pulumi_vault/transform/alphabet.py +4 -0
  165. pulumi_vault/transform/get_decode.py +4 -0
  166. pulumi_vault/transform/get_encode.py +4 -0
  167. pulumi_vault/transform/role.py +4 -0
  168. pulumi_vault/transform/template.py +4 -0
  169. pulumi_vault/transit/get_decrypt.py +4 -0
  170. pulumi_vault/transit/secret_backend_key.py +8 -2
  171. pulumi_vault/transit/secret_cache_config.py +4 -0
  172. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/METADATA +1 -1
  173. pulumi_vault-5.21.0a1710888431.dist-info/RECORD +244 -0
  174. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/WHEEL +1 -1
  175. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  176. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/top_level.txt +0 -0
@@ -371,6 +371,7 @@ class OidcClient(pulumi.CustomResource):
371
371
 
372
372
  ## Example Usage
373
373
 
374
+ <!--Start PulumiCodeChooser -->
374
375
  ```python
375
376
  import pulumi
376
377
  import pulumi_vault as vault
@@ -388,13 +389,14 @@ class OidcClient(pulumi.CustomResource):
388
389
  id_token_ttl=2400,
389
390
  access_token_ttl=7200)
390
391
  ```
392
+ <!--End PulumiCodeChooser -->
391
393
 
392
394
  ## Import
393
395
 
394
396
  OIDC Clients can be imported using the `name`, e.g.
395
397
 
396
398
  ```sh
397
- $ pulumi import vault:identity/oidcClient:OidcClient test my-app
399
+ $ pulumi import vault:identity/oidcClient:OidcClient test my-app
398
400
  ```
399
401
 
400
402
  :param str resource_name: The name of the resource.
@@ -429,6 +431,7 @@ class OidcClient(pulumi.CustomResource):
429
431
 
430
432
  ## Example Usage
431
433
 
434
+ <!--Start PulumiCodeChooser -->
432
435
  ```python
433
436
  import pulumi
434
437
  import pulumi_vault as vault
@@ -446,13 +449,14 @@ class OidcClient(pulumi.CustomResource):
446
449
  id_token_ttl=2400,
447
450
  access_token_ttl=7200)
448
451
  ```
452
+ <!--End PulumiCodeChooser -->
449
453
 
450
454
  ## Import
451
455
 
452
456
  OIDC Clients can be imported using the `name`, e.g.
453
457
 
454
458
  ```sh
455
- $ pulumi import vault:identity/oidcClient:OidcClient test my-app
459
+ $ pulumi import vault:identity/oidcClient:OidcClient test my-app
456
460
  ```
457
461
 
458
462
  :param str resource_name: The name of the resource.
@@ -258,6 +258,7 @@ class OidcKey(pulumi.CustomResource):
258
258
  """
259
259
  ## Example Usage
260
260
 
261
+ <!--Start PulumiCodeChooser -->
261
262
  ```python
262
263
  import pulumi
263
264
  import pulumi_vault as vault
@@ -268,13 +269,14 @@ class OidcKey(pulumi.CustomResource):
268
269
  key_name=key.name,
269
270
  allowed_client_id=role_oidc_role.client_id)
270
271
  ```
272
+ <!--End PulumiCodeChooser -->
271
273
 
272
274
  ## Import
273
275
 
274
276
  The key can be imported with the key name, for example:
275
277
 
276
278
  ```sh
277
- $ pulumi import vault:identity/oidcKey:OidcKey key key
279
+ $ pulumi import vault:identity/oidcKey:OidcKey key key
278
280
  ```
279
281
 
280
282
  :param str resource_name: The name of the resource.
@@ -301,6 +303,7 @@ class OidcKey(pulumi.CustomResource):
301
303
  """
302
304
  ## Example Usage
303
305
 
306
+ <!--Start PulumiCodeChooser -->
304
307
  ```python
305
308
  import pulumi
306
309
  import pulumi_vault as vault
@@ -311,13 +314,14 @@ class OidcKey(pulumi.CustomResource):
311
314
  key_name=key.name,
312
315
  allowed_client_id=role_oidc_role.client_id)
313
316
  ```
317
+ <!--End PulumiCodeChooser -->
314
318
 
315
319
  ## Import
316
320
 
317
321
  The key can be imported with the key name, for example:
318
322
 
319
323
  ```sh
320
- $ pulumi import vault:identity/oidcKey:OidcKey key key
324
+ $ pulumi import vault:identity/oidcKey:OidcKey key key
321
325
  ```
322
326
 
323
327
  :param str resource_name: The name of the resource.
@@ -145,6 +145,7 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
145
145
  """
146
146
  ## Example Usage
147
147
 
148
+ <!--Start PulumiCodeChooser -->
148
149
  ```python
149
150
  import pulumi
150
151
  import pulumi_vault as vault
@@ -155,6 +156,7 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
155
156
  key_name=key.name,
156
157
  allowed_client_id=role_oidc_role.client_id)
157
158
  ```
159
+ <!--End PulumiCodeChooser -->
158
160
 
159
161
  :param str resource_name: The name of the resource.
160
162
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -174,6 +176,7 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
174
176
  """
175
177
  ## Example Usage
176
178
 
179
+ <!--Start PulumiCodeChooser -->
177
180
  ```python
178
181
  import pulumi
179
182
  import pulumi_vault as vault
@@ -184,6 +187,7 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
184
187
  key_name=key.name,
185
188
  allowed_client_id=role_oidc_role.client_id)
186
189
  ```
190
+ <!--End PulumiCodeChooser -->
187
191
 
188
192
  :param str resource_name: The name of the resource.
189
193
  :param OidcKeyAllowedClientIDArgs args: The arguments to use to populate this resource's properties.
@@ -273,6 +273,7 @@ class OidcProvider(pulumi.CustomResource):
273
273
 
274
274
  ## Example Usage
275
275
 
276
+ <!--Start PulumiCodeChooser -->
276
277
  ```python
277
278
  import pulumi
278
279
  import json
@@ -306,13 +307,14 @@ class OidcProvider(pulumi.CustomResource):
306
307
  allowed_client_ids=[test_oidc_client.client_id],
307
308
  scopes_supporteds=[test_oidc_scope.name])
308
309
  ```
310
+ <!--End PulumiCodeChooser -->
309
311
 
310
312
  ## Import
311
313
 
312
314
  OIDC Providers can be imported using the `name`, e.g.
313
315
 
314
316
  ```sh
315
- $ pulumi import vault:identity/oidcProvider:OidcProvider test my-provider
317
+ $ pulumi import vault:identity/oidcProvider:OidcProvider test my-provider
316
318
  ```
317
319
 
318
320
  :param str resource_name: The name of the resource.
@@ -340,6 +342,7 @@ class OidcProvider(pulumi.CustomResource):
340
342
 
341
343
  ## Example Usage
342
344
 
345
+ <!--Start PulumiCodeChooser -->
343
346
  ```python
344
347
  import pulumi
345
348
  import json
@@ -373,13 +376,14 @@ class OidcProvider(pulumi.CustomResource):
373
376
  allowed_client_ids=[test_oidc_client.client_id],
374
377
  scopes_supporteds=[test_oidc_scope.name])
375
378
  ```
379
+ <!--End PulumiCodeChooser -->
376
380
 
377
381
  ## Import
378
382
 
379
383
  OIDC Providers can be imported using the `name`, e.g.
380
384
 
381
385
  ```sh
382
- $ pulumi import vault:identity/oidcProvider:OidcProvider test my-provider
386
+ $ pulumi import vault:identity/oidcProvider:OidcProvider test my-provider
383
387
  ```
384
388
 
385
389
  :param str resource_name: The name of the resource.
@@ -270,6 +270,7 @@ class OidcRole(pulumi.CustomResource):
270
270
  exist before the role can be used to issue tokens. You must also configure the key with the
271
271
  role's Client ID to allow the role to use the key.
272
272
 
273
+ <!--Start PulumiCodeChooser -->
273
274
  ```python
274
275
  import pulumi
275
276
  import pulumi_vault as vault
@@ -283,11 +284,13 @@ class OidcRole(pulumi.CustomResource):
283
284
  algorithm="RS256",
284
285
  allowed_client_ids=[role.client_id])
285
286
  ```
287
+ <!--End PulumiCodeChooser -->
286
288
 
287
289
  If you want to create the key first before creating the role, you can use a separate
288
290
  resource to configure the allowed Client ID on
289
291
  the key.
290
292
 
293
+ <!--Start PulumiCodeChooser -->
291
294
  ```python
292
295
  import pulumi
293
296
  import pulumi_vault as vault
@@ -298,13 +301,14 @@ class OidcRole(pulumi.CustomResource):
298
301
  key_name=key.name,
299
302
  allowed_client_id=role_oidc_role.client_id)
300
303
  ```
304
+ <!--End PulumiCodeChooser -->
301
305
 
302
306
  ## Import
303
307
 
304
308
  The key can be imported with the role name, for example:
305
309
 
306
310
  ```sh
307
- $ pulumi import vault:identity/oidcRole:OidcRole role role
311
+ $ pulumi import vault:identity/oidcRole:OidcRole role role
308
312
  ```
309
313
 
310
314
  :param str resource_name: The name of the resource.
@@ -338,6 +342,7 @@ class OidcRole(pulumi.CustomResource):
338
342
  exist before the role can be used to issue tokens. You must also configure the key with the
339
343
  role's Client ID to allow the role to use the key.
340
344
 
345
+ <!--Start PulumiCodeChooser -->
341
346
  ```python
342
347
  import pulumi
343
348
  import pulumi_vault as vault
@@ -351,11 +356,13 @@ class OidcRole(pulumi.CustomResource):
351
356
  algorithm="RS256",
352
357
  allowed_client_ids=[role.client_id])
353
358
  ```
359
+ <!--End PulumiCodeChooser -->
354
360
 
355
361
  If you want to create the key first before creating the role, you can use a separate
356
362
  resource to configure the allowed Client ID on
357
363
  the key.
358
364
 
365
+ <!--Start PulumiCodeChooser -->
359
366
  ```python
360
367
  import pulumi
361
368
  import pulumi_vault as vault
@@ -366,13 +373,14 @@ class OidcRole(pulumi.CustomResource):
366
373
  key_name=key.name,
367
374
  allowed_client_id=role_oidc_role.client_id)
368
375
  ```
376
+ <!--End PulumiCodeChooser -->
369
377
 
370
378
  ## Import
371
379
 
372
380
  The key can be imported with the role name, for example:
373
381
 
374
382
  ```sh
375
- $ pulumi import vault:identity/oidcRole:OidcRole role role
383
+ $ pulumi import vault:identity/oidcRole:OidcRole role role
376
384
  ```
377
385
 
378
386
  :param str resource_name: The name of the resource.
@@ -183,6 +183,7 @@ class OidcScope(pulumi.CustomResource):
183
183
 
184
184
  ## Example Usage
185
185
 
186
+ <!--Start PulumiCodeChooser -->
186
187
  ```python
187
188
  import pulumi
188
189
  import pulumi_vault as vault
@@ -191,13 +192,14 @@ class OidcScope(pulumi.CustomResource):
191
192
  description="Vault OIDC Groups Scope",
192
193
  template="{\\"groups\\":{{identity.entity.groups.names}}}")
193
194
  ```
195
+ <!--End PulumiCodeChooser -->
194
196
 
195
197
  ## Import
196
198
 
197
199
  OIDC Scopes can be imported using the `name`, e.g.
198
200
 
199
201
  ```sh
200
- $ pulumi import vault:identity/oidcScope:OidcScope groups groups
202
+ $ pulumi import vault:identity/oidcScope:OidcScope groups groups
201
203
  ```
202
204
 
203
205
  :param str resource_name: The name of the resource.
@@ -222,6 +224,7 @@ class OidcScope(pulumi.CustomResource):
222
224
 
223
225
  ## Example Usage
224
226
 
227
+ <!--Start PulumiCodeChooser -->
225
228
  ```python
226
229
  import pulumi
227
230
  import pulumi_vault as vault
@@ -230,13 +233,14 @@ class OidcScope(pulumi.CustomResource):
230
233
  description="Vault OIDC Groups Scope",
231
234
  template="{\\"groups\\":{{identity.entity.groups.names}}}")
232
235
  ```
236
+ <!--End PulumiCodeChooser -->
233
237
 
234
238
  ## Import
235
239
 
236
240
  OIDC Scopes can be imported using the `name`, e.g.
237
241
 
238
242
  ```sh
239
- $ pulumi import vault:identity/oidcScope:OidcScope groups groups
243
+ $ pulumi import vault:identity/oidcScope:OidcScope groups groups
240
244
  ```
241
245
 
242
246
  :param str resource_name: The name of the resource.
@@ -776,6 +776,7 @@ class AuthBackend(pulumi.CustomResource):
776
776
 
777
777
  Manage JWT auth backend:
778
778
 
779
+ <!--Start PulumiCodeChooser -->
779
780
  ```python
780
781
  import pulumi
781
782
  import pulumi_vault as vault
@@ -786,9 +787,11 @@ class AuthBackend(pulumi.CustomResource):
786
787
  oidc_discovery_url="https://myco.auth0.com/",
787
788
  path="jwt")
788
789
  ```
790
+ <!--End PulumiCodeChooser -->
789
791
 
790
792
  Manage OIDC auth backend:
791
793
 
794
+ <!--Start PulumiCodeChooser -->
792
795
  ```python
793
796
  import pulumi
794
797
  import pulumi_vault as vault
@@ -805,9 +808,11 @@ class AuthBackend(pulumi.CustomResource):
805
808
  ),
806
809
  type="oidc")
807
810
  ```
811
+ <!--End PulumiCodeChooser -->
808
812
 
809
813
  Configuring the auth backend with a `provider_config:
810
814
 
815
+ <!--Start PulumiCodeChooser -->
811
816
  ```python
812
817
  import pulumi
813
818
  import pulumi_vault as vault
@@ -824,18 +829,19 @@ class AuthBackend(pulumi.CustomResource):
824
829
  },
825
830
  type="oidc")
826
831
  ```
832
+ <!--End PulumiCodeChooser -->
827
833
 
828
834
  ## Import
829
835
 
830
836
  JWT auth backend can be imported using the `path`, e.g.
831
837
 
832
838
  ```sh
833
- $ pulumi import vault:jwt/authBackend:AuthBackend oidc oidc
839
+ $ pulumi import vault:jwt/authBackend:AuthBackend oidc oidc
834
840
  ```
835
- or
841
+ or
836
842
 
837
843
  ```sh
838
- $ pulumi import vault:jwt/authBackend:AuthBackend jwt jwt
844
+ $ pulumi import vault:jwt/authBackend:AuthBackend jwt jwt
839
845
  ```
840
846
 
841
847
  :param str resource_name: The name of the resource.
@@ -883,6 +889,7 @@ class AuthBackend(pulumi.CustomResource):
883
889
 
884
890
  Manage JWT auth backend:
885
891
 
892
+ <!--Start PulumiCodeChooser -->
886
893
  ```python
887
894
  import pulumi
888
895
  import pulumi_vault as vault
@@ -893,9 +900,11 @@ class AuthBackend(pulumi.CustomResource):
893
900
  oidc_discovery_url="https://myco.auth0.com/",
894
901
  path="jwt")
895
902
  ```
903
+ <!--End PulumiCodeChooser -->
896
904
 
897
905
  Manage OIDC auth backend:
898
906
 
907
+ <!--Start PulumiCodeChooser -->
899
908
  ```python
900
909
  import pulumi
901
910
  import pulumi_vault as vault
@@ -912,9 +921,11 @@ class AuthBackend(pulumi.CustomResource):
912
921
  ),
913
922
  type="oidc")
914
923
  ```
924
+ <!--End PulumiCodeChooser -->
915
925
 
916
926
  Configuring the auth backend with a `provider_config:
917
927
 
928
+ <!--Start PulumiCodeChooser -->
918
929
  ```python
919
930
  import pulumi
920
931
  import pulumi_vault as vault
@@ -931,18 +942,19 @@ class AuthBackend(pulumi.CustomResource):
931
942
  },
932
943
  type="oidc")
933
944
  ```
945
+ <!--End PulumiCodeChooser -->
934
946
 
935
947
  ## Import
936
948
 
937
949
  JWT auth backend can be imported using the `path`, e.g.
938
950
 
939
951
  ```sh
940
- $ pulumi import vault:jwt/authBackend:AuthBackend oidc oidc
952
+ $ pulumi import vault:jwt/authBackend:AuthBackend oidc oidc
941
953
  ```
942
- or
954
+ or
943
955
 
944
956
  ```sh
945
- $ pulumi import vault:jwt/authBackend:AuthBackend jwt jwt
957
+ $ pulumi import vault:jwt/authBackend:AuthBackend jwt jwt
946
958
  ```
947
959
 
948
960
  :param str resource_name: The name of the resource.
@@ -1189,6 +1189,7 @@ class AuthBackendRole(pulumi.CustomResource):
1189
1189
 
1190
1190
  Role for JWT backend:
1191
1191
 
1192
+ <!--Start PulumiCodeChooser -->
1192
1193
  ```python
1193
1194
  import pulumi
1194
1195
  import pulumi_vault as vault
@@ -1209,9 +1210,11 @@ class AuthBackendRole(pulumi.CustomResource):
1209
1210
  user_claim="https://vault/user",
1210
1211
  role_type="jwt")
1211
1212
  ```
1213
+ <!--End PulumiCodeChooser -->
1212
1214
 
1213
1215
  Role for OIDC backend:
1214
1216
 
1217
+ <!--Start PulumiCodeChooser -->
1215
1218
  ```python
1216
1219
  import pulumi
1217
1220
  import pulumi_vault as vault
@@ -1231,13 +1234,14 @@ class AuthBackendRole(pulumi.CustomResource):
1231
1234
  role_type="oidc",
1232
1235
  allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
1233
1236
  ```
1237
+ <!--End PulumiCodeChooser -->
1234
1238
 
1235
1239
  ## Import
1236
1240
 
1237
1241
  JWT authentication backend roles can be imported using the `path`, e.g.
1238
1242
 
1239
1243
  ```sh
1240
- $ pulumi import vault:jwt/authBackendRole:AuthBackendRole example auth/jwt/role/test-role
1244
+ $ pulumi import vault:jwt/authBackendRole:AuthBackendRole example auth/jwt/role/test-role
1241
1245
  ```
1242
1246
 
1243
1247
  :param str resource_name: The name of the resource.
@@ -1335,6 +1339,7 @@ class AuthBackendRole(pulumi.CustomResource):
1335
1339
 
1336
1340
  Role for JWT backend:
1337
1341
 
1342
+ <!--Start PulumiCodeChooser -->
1338
1343
  ```python
1339
1344
  import pulumi
1340
1345
  import pulumi_vault as vault
@@ -1355,9 +1360,11 @@ class AuthBackendRole(pulumi.CustomResource):
1355
1360
  user_claim="https://vault/user",
1356
1361
  role_type="jwt")
1357
1362
  ```
1363
+ <!--End PulumiCodeChooser -->
1358
1364
 
1359
1365
  Role for OIDC backend:
1360
1366
 
1367
+ <!--Start PulumiCodeChooser -->
1361
1368
  ```python
1362
1369
  import pulumi
1363
1370
  import pulumi_vault as vault
@@ -1377,13 +1384,14 @@ class AuthBackendRole(pulumi.CustomResource):
1377
1384
  role_type="oidc",
1378
1385
  allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
1379
1386
  ```
1387
+ <!--End PulumiCodeChooser -->
1380
1388
 
1381
1389
  ## Import
1382
1390
 
1383
1391
  JWT authentication backend roles can be imported using the `path`, e.g.
1384
1392
 
1385
1393
  ```sh
1386
- $ pulumi import vault:jwt/authBackendRole:AuthBackendRole example auth/jwt/role/test-role
1394
+ $ pulumi import vault:jwt/authBackendRole:AuthBackendRole example auth/jwt/role/test-role
1387
1395
  ```
1388
1396
 
1389
1397
  :param str resource_name: The name of the resource.
@@ -488,6 +488,7 @@ class SecretBackend(pulumi.CustomResource):
488
488
 
489
489
  ## Example Usage
490
490
 
491
+ <!--Start PulumiCodeChooser -->
491
492
  ```python
492
493
  import pulumi
493
494
  import pulumi_vault as vault
@@ -505,13 +506,14 @@ class SecretBackend(pulumi.CustomResource):
505
506
  tls_ca_key_bits=4096,
506
507
  tls_ca_key_type="rsa")
507
508
  ```
509
+ <!--End PulumiCodeChooser -->
508
510
 
509
511
  ## Import
510
512
 
511
513
  KMIP Secret backend can be imported using the `path`, e.g.
512
514
 
513
515
  ```sh
514
- $ pulumi import vault:kmip/secretBackend:SecretBackend default kmip
516
+ $ pulumi import vault:kmip/secretBackend:SecretBackend default kmip
515
517
  ```
516
518
 
517
519
  :param str resource_name: The name of the resource.
@@ -548,6 +550,7 @@ class SecretBackend(pulumi.CustomResource):
548
550
 
549
551
  ## Example Usage
550
552
 
553
+ <!--Start PulumiCodeChooser -->
551
554
  ```python
552
555
  import pulumi
553
556
  import pulumi_vault as vault
@@ -565,13 +568,14 @@ class SecretBackend(pulumi.CustomResource):
565
568
  tls_ca_key_bits=4096,
566
569
  tls_ca_key_type="rsa")
567
570
  ```
571
+ <!--End PulumiCodeChooser -->
568
572
 
569
573
  ## Import
570
574
 
571
575
  KMIP Secret backend can be imported using the `path`, e.g.
572
576
 
573
577
  ```sh
574
- $ pulumi import vault:kmip/secretBackend:SecretBackend default kmip
578
+ $ pulumi import vault:kmip/secretBackend:SecretBackend default kmip
575
579
  ```
576
580
 
577
581
  :param str resource_name: The name of the resource.
@@ -746,6 +746,7 @@ class SecretRole(pulumi.CustomResource):
746
746
 
747
747
  ## Example Usage
748
748
 
749
+ <!--Start PulumiCodeChooser -->
749
750
  ```python
750
751
  import pulumi
751
752
  import pulumi_vault as vault
@@ -769,13 +770,14 @@ class SecretRole(pulumi.CustomResource):
769
770
  operation_create=True,
770
771
  operation_destroy=True)
771
772
  ```
773
+ <!--End PulumiCodeChooser -->
772
774
 
773
775
  ## Import
774
776
 
775
777
  KMIP Secret role can be imported using the `path`, e.g.
776
778
 
777
779
  ```sh
778
- $ pulumi import vault:kmip/secretRole:SecretRole admin kmip
780
+ $ pulumi import vault:kmip/secretRole:SecretRole admin kmip
779
781
  ```
780
782
 
781
783
  :param str resource_name: The name of the resource.
@@ -819,6 +821,7 @@ class SecretRole(pulumi.CustomResource):
819
821
 
820
822
  ## Example Usage
821
823
 
824
+ <!--Start PulumiCodeChooser -->
822
825
  ```python
823
826
  import pulumi
824
827
  import pulumi_vault as vault
@@ -842,13 +845,14 @@ class SecretRole(pulumi.CustomResource):
842
845
  operation_create=True,
843
846
  operation_destroy=True)
844
847
  ```
848
+ <!--End PulumiCodeChooser -->
845
849
 
846
850
  ## Import
847
851
 
848
852
  KMIP Secret role can be imported using the `path`, e.g.
849
853
 
850
854
  ```sh
851
- $ pulumi import vault:kmip/secretRole:SecretRole admin kmip
855
+ $ pulumi import vault:kmip/secretRole:SecretRole admin kmip
852
856
  ```
853
857
 
854
858
  :param str resource_name: The name of the resource.
@@ -186,6 +186,7 @@ class SecretScope(pulumi.CustomResource):
186
186
 
187
187
  ## Example Usage
188
188
 
189
+ <!--Start PulumiCodeChooser -->
189
190
  ```python
190
191
  import pulumi
191
192
  import pulumi_vault as vault
@@ -198,13 +199,14 @@ class SecretScope(pulumi.CustomResource):
198
199
  scope="dev",
199
200
  force=True)
200
201
  ```
202
+ <!--End PulumiCodeChooser -->
201
203
 
202
204
  ## Import
203
205
 
204
206
  KMIP Secret scope can be imported using the `path`, e.g.
205
207
 
206
208
  ```sh
207
- $ pulumi import vault:kmip/secretScope:SecretScope dev kmip
209
+ $ pulumi import vault:kmip/secretScope:SecretScope dev kmip
208
210
  ```
209
211
 
210
212
  :param str resource_name: The name of the resource.
@@ -231,6 +233,7 @@ class SecretScope(pulumi.CustomResource):
231
233
 
232
234
  ## Example Usage
233
235
 
236
+ <!--Start PulumiCodeChooser -->
234
237
  ```python
235
238
  import pulumi
236
239
  import pulumi_vault as vault
@@ -243,13 +246,14 @@ class SecretScope(pulumi.CustomResource):
243
246
  scope="dev",
244
247
  force=True)
245
248
  ```
249
+ <!--End PulumiCodeChooser -->
246
250
 
247
251
  ## Import
248
252
 
249
253
  KMIP Secret scope can be imported using the `path`, e.g.
250
254
 
251
255
  ```sh
252
- $ pulumi import vault:kmip/secretScope:SecretScope dev kmip
256
+ $ pulumi import vault:kmip/secretScope:SecretScope dev kmip
253
257
  ```
254
258
 
255
259
  :param str resource_name: The name of the resource.
@@ -348,6 +348,7 @@ class AuthBackendConfig(pulumi.CustomResource):
348
348
 
349
349
  ## Example Usage
350
350
 
351
+ <!--Start PulumiCodeChooser -->
351
352
  ```python
352
353
  import pulumi
353
354
  import pulumi_vault as vault
@@ -363,13 +364,14 @@ class AuthBackendConfig(pulumi.CustomResource):
363
364
  issuer="api",
364
365
  disable_iss_validation=True)
365
366
  ```
367
+ <!--End PulumiCodeChooser -->
366
368
 
367
369
  ## Import
368
370
 
369
371
  Kubernetes authentication backend can be imported using the `path`, e.g.
370
372
 
371
373
  ```sh
372
- $ pulumi import vault:kubernetes/authBackendConfig:AuthBackendConfig config auth/kubernetes/config
374
+ $ pulumi import vault:kubernetes/authBackendConfig:AuthBackendConfig config auth/kubernetes/config
373
375
  ```
374
376
 
375
377
  :param str resource_name: The name of the resource.
@@ -400,6 +402,7 @@ class AuthBackendConfig(pulumi.CustomResource):
400
402
 
401
403
  ## Example Usage
402
404
 
405
+ <!--Start PulumiCodeChooser -->
403
406
  ```python
404
407
  import pulumi
405
408
  import pulumi_vault as vault
@@ -415,13 +418,14 @@ class AuthBackendConfig(pulumi.CustomResource):
415
418
  issuer="api",
416
419
  disable_iss_validation=True)
417
420
  ```
421
+ <!--End PulumiCodeChooser -->
418
422
 
419
423
  ## Import
420
424
 
421
425
  Kubernetes authentication backend can be imported using the `path`, e.g.
422
426
 
423
427
  ```sh
424
- $ pulumi import vault:kubernetes/authBackendConfig:AuthBackendConfig config auth/kubernetes/config
428
+ $ pulumi import vault:kubernetes/authBackendConfig:AuthBackendConfig config auth/kubernetes/config
425
429
  ```
426
430
 
427
431
  :param str resource_name: The name of the resource.