pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 5.21.0a1710888431__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (176) hide show
  1. pulumi_vault/ad/get_access_credentials.py +4 -2
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +6 -2
  4. pulumi_vault/ad/secret_role.py +6 -2
  5. pulumi_vault/alicloud/auth_backend_role.py +6 -2
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +6 -2
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +14 -2
  11. pulumi_vault/audit_request_header.py +4 -0
  12. pulumi_vault/auth_backend.py +2 -2
  13. pulumi_vault/aws/auth_backend_cert.py +6 -2
  14. pulumi_vault/aws/auth_backend_client.py +6 -2
  15. pulumi_vault/aws/auth_backend_config_identity.py +6 -2
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -2
  17. pulumi_vault/aws/auth_backend_role.py +6 -2
  18. pulumi_vault/aws/auth_backend_roletag_blacklist.py +4 -0
  19. pulumi_vault/aws/auth_backend_sts_role.py +6 -2
  20. pulumi_vault/aws/get_access_credentials.py +4 -2
  21. pulumi_vault/aws/secret_backend.py +2 -2
  22. pulumi_vault/aws/secret_backend_role.py +6 -2
  23. pulumi_vault/aws/secret_backend_static_role.py +10 -4
  24. pulumi_vault/azure/auth_backend_config.py +6 -2
  25. pulumi_vault/azure/auth_backend_role.py +6 -2
  26. pulumi_vault/azure/backend.py +12 -0
  27. pulumi_vault/azure/backend_role.py +4 -0
  28. pulumi_vault/azure/get_access_credentials.py +6 -0
  29. pulumi_vault/cert_auth_backend_role.py +4 -0
  30. pulumi_vault/consul/secret_backend.py +14 -2
  31. pulumi_vault/consul/secret_backend_role.py +8 -2
  32. pulumi_vault/database/secret_backend_connection.py +6 -2
  33. pulumi_vault/database/secret_backend_role.py +6 -2
  34. pulumi_vault/database/secret_backend_static_role.py +6 -2
  35. pulumi_vault/database/secrets_mount.py +6 -2
  36. pulumi_vault/egp_policy.py +4 -0
  37. pulumi_vault/gcp/auth_backend.py +6 -2
  38. pulumi_vault/gcp/auth_backend_role.py +6 -2
  39. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  40. pulumi_vault/gcp/secret_backend.py +4 -0
  41. pulumi_vault/gcp/secret_impersonated_account.py +6 -2
  42. pulumi_vault/gcp/secret_roleset.py +6 -2
  43. pulumi_vault/gcp/secret_static_account.py +6 -2
  44. pulumi_vault/generic/endpoint.py +6 -0
  45. pulumi_vault/generic/get_secret.py +6 -6
  46. pulumi_vault/generic/secret.py +2 -2
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +22 -2
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +4 -0
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +6 -2
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +6 -2
  56. pulumi_vault/identity/entity_alias.py +6 -2
  57. pulumi_vault/identity/entity_policies.py +12 -0
  58. pulumi_vault/identity/get_entity.py +6 -0
  59. pulumi_vault/identity/get_group.py +6 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -0
  61. pulumi_vault/identity/get_oidc_openid_config.py +4 -0
  62. pulumi_vault/identity/get_oidc_public_keys.py +4 -0
  63. pulumi_vault/identity/group.py +20 -2
  64. pulumi_vault/identity/group_alias.py +6 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +12 -0
  66. pulumi_vault/identity/group_member_group_ids.py +12 -0
  67. pulumi_vault/identity/group_policies.py +12 -0
  68. pulumi_vault/identity/mfa_duo.py +6 -2
  69. pulumi_vault/identity/mfa_login_enforcement.py +6 -2
  70. pulumi_vault/identity/mfa_okta.py +6 -2
  71. pulumi_vault/identity/mfa_pingid.py +6 -2
  72. pulumi_vault/identity/mfa_totp.py +6 -2
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -2
  75. pulumi_vault/identity/oidc_client.py +6 -2
  76. pulumi_vault/identity/oidc_key.py +6 -2
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +4 -0
  78. pulumi_vault/identity/oidc_provider.py +6 -2
  79. pulumi_vault/identity/oidc_role.py +10 -2
  80. pulumi_vault/identity/oidc_scope.py +6 -2
  81. pulumi_vault/jwt/auth_backend.py +18 -6
  82. pulumi_vault/jwt/auth_backend_role.py +10 -2
  83. pulumi_vault/kmip/secret_backend.py +6 -2
  84. pulumi_vault/kmip/secret_role.py +6 -2
  85. pulumi_vault/kmip/secret_scope.py +6 -2
  86. pulumi_vault/kubernetes/auth_backend_config.py +6 -2
  87. pulumi_vault/kubernetes/auth_backend_role.py +6 -2
  88. pulumi_vault/kubernetes/get_service_account_token.py +4 -0
  89. pulumi_vault/kubernetes/secret_backend.py +6 -2
  90. pulumi_vault/kubernetes/secret_backend_role.py +14 -2
  91. pulumi_vault/kv/get_secret.py +6 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -0
  93. pulumi_vault/kv/get_secret_v2.py +2 -6
  94. pulumi_vault/kv/get_secrets_list.py +6 -0
  95. pulumi_vault/kv/get_secrets_list_v2.py +6 -0
  96. pulumi_vault/kv/secret.py +8 -2
  97. pulumi_vault/kv/secret_backend_v2.py +12 -4
  98. pulumi_vault/kv/secret_v2.py +8 -2
  99. pulumi_vault/ldap/auth_backend.py +6 -2
  100. pulumi_vault/ldap/auth_backend_group.py +6 -2
  101. pulumi_vault/ldap/auth_backend_user.py +6 -2
  102. pulumi_vault/ldap/secret_backend.py +6 -2
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +10 -4
  104. pulumi_vault/ldap/secret_backend_library_set.py +6 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +10 -4
  106. pulumi_vault/managed/keys.py +2 -14
  107. pulumi_vault/mfa_duo.py +6 -2
  108. pulumi_vault/mfa_okta.py +6 -2
  109. pulumi_vault/mfa_pingid.py +6 -2
  110. pulumi_vault/mfa_totp.py +6 -2
  111. pulumi_vault/mongodbatlas/secret_backend.py +6 -2
  112. pulumi_vault/mongodbatlas/secret_role.py +10 -4
  113. pulumi_vault/mount.py +18 -2
  114. pulumi_vault/namespace.py +42 -62
  115. pulumi_vault/nomad_secret_backend.py +6 -2
  116. pulumi_vault/nomad_secret_role.py +6 -2
  117. pulumi_vault/okta/auth_backend.py +6 -2
  118. pulumi_vault/okta/auth_backend_group.py +6 -2
  119. pulumi_vault/okta/auth_backend_user.py +6 -2
  120. pulumi_vault/password_policy.py +6 -2
  121. pulumi_vault/pkisecret/get_backend_issuer.py +4 -2
  122. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  123. pulumi_vault/pkisecret/get_backend_key.py +4 -0
  124. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  125. pulumi_vault/pkisecret/secret_backend_cert.py +4 -0
  126. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -0
  127. pulumi_vault/pkisecret/secret_backend_config_issuers.py +6 -2
  128. pulumi_vault/pkisecret/secret_backend_config_urls.py +12 -4
  129. pulumi_vault/pkisecret/secret_backend_crl_config.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -0
  131. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +4 -0
  132. pulumi_vault/pkisecret/secret_backend_issuer.py +6 -2
  133. pulumi_vault/pkisecret/secret_backend_key.py +2 -2
  134. pulumi_vault/pkisecret/secret_backend_role.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -0
  136. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -0
  137. pulumi_vault/pkisecret/secret_backend_sign.py +6 -0
  138. pulumi_vault/policy.py +2 -2
  139. pulumi_vault/quota_lease_count.py +6 -2
  140. pulumi_vault/quota_rate_limit.py +6 -2
  141. pulumi_vault/rabbitmq/secret_backend.py +6 -2
  142. pulumi_vault/rabbitmq/secret_backend_role.py +6 -2
  143. pulumi_vault/raft_autopilot.py +6 -2
  144. pulumi_vault/raft_snapshot_agent_config.py +111 -16
  145. pulumi_vault/rgp_policy.py +4 -0
  146. pulumi_vault/saml/auth_backend.py +6 -2
  147. pulumi_vault/saml/auth_backend_role.py +6 -2
  148. pulumi_vault/secrets/sync_association.py +4 -0
  149. pulumi_vault/secrets/sync_aws_destination.py +6 -2
  150. pulumi_vault/secrets/sync_azure_destination.py +6 -2
  151. pulumi_vault/secrets/sync_config.py +6 -2
  152. pulumi_vault/secrets/sync_gcp_destination.py +6 -2
  153. pulumi_vault/secrets/sync_gh_destination.py +6 -2
  154. pulumi_vault/secrets/sync_vercel_destination.py +6 -2
  155. pulumi_vault/ssh/_inputs.py +4 -0
  156. pulumi_vault/ssh/outputs.py +4 -0
  157. pulumi_vault/ssh/secret_backend_ca.py +6 -2
  158. pulumi_vault/ssh/secret_backend_role.py +6 -2
  159. pulumi_vault/terraformcloud/secret_backend.py +6 -2
  160. pulumi_vault/terraformcloud/secret_creds.py +4 -0
  161. pulumi_vault/terraformcloud/secret_role.py +6 -2
  162. pulumi_vault/token.py +6 -2
  163. pulumi_vault/tokenauth/auth_backend_role.py +6 -2
  164. pulumi_vault/transform/alphabet.py +4 -0
  165. pulumi_vault/transform/get_decode.py +4 -0
  166. pulumi_vault/transform/get_encode.py +4 -0
  167. pulumi_vault/transform/role.py +4 -0
  168. pulumi_vault/transform/template.py +4 -0
  169. pulumi_vault/transit/get_decrypt.py +4 -0
  170. pulumi_vault/transit/secret_backend_key.py +8 -2
  171. pulumi_vault/transit/secret_cache_config.py +4 -0
  172. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/METADATA +1 -1
  173. pulumi_vault-5.21.0a1710888431.dist-info/RECORD +244 -0
  174. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/WHEEL +1 -1
  175. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  176. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/top_level.txt +0 -0
@@ -1063,6 +1063,7 @@ class SecretBackend(pulumi.CustomResource):
1063
1063
  """
1064
1064
  ## Example Usage
1065
1065
 
1066
+ <!--Start PulumiCodeChooser -->
1066
1067
  ```python
1067
1068
  import pulumi
1068
1069
  import pulumi_vault as vault
@@ -1075,13 +1076,14 @@ class SecretBackend(pulumi.CustomResource):
1075
1076
  url="ldaps://localhost",
1076
1077
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1077
1078
  ```
1079
+ <!--End PulumiCodeChooser -->
1078
1080
 
1079
1081
  ## Import
1080
1082
 
1081
1083
  LDAP secret backend can be imported using the `${mount}/config`, e.g.
1082
1084
 
1083
1085
  ```sh
1084
- $ pulumi import vault:ldap/secretBackend:SecretBackend config ldap/config
1086
+ $ pulumi import vault:ldap/secretBackend:SecretBackend config ldap/config
1085
1087
  ```
1086
1088
 
1087
1089
  :param str resource_name: The name of the resource.
@@ -1136,6 +1138,7 @@ class SecretBackend(pulumi.CustomResource):
1136
1138
  """
1137
1139
  ## Example Usage
1138
1140
 
1141
+ <!--Start PulumiCodeChooser -->
1139
1142
  ```python
1140
1143
  import pulumi
1141
1144
  import pulumi_vault as vault
@@ -1148,13 +1151,14 @@ class SecretBackend(pulumi.CustomResource):
1148
1151
  url="ldaps://localhost",
1149
1152
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1150
1153
  ```
1154
+ <!--End PulumiCodeChooser -->
1151
1155
 
1152
1156
  ## Import
1153
1157
 
1154
1158
  LDAP secret backend can be imported using the `${mount}/config`, e.g.
1155
1159
 
1156
1160
  ```sh
1157
- $ pulumi import vault:ldap/secretBackend:SecretBackend config ldap/config
1161
+ $ pulumi import vault:ldap/secretBackend:SecretBackend config ldap/config
1158
1162
  ```
1159
1163
 
1160
1164
  :param str resource_name: The name of the resource.
@@ -422,6 +422,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
422
422
  """
423
423
  ## Example Usage
424
424
 
425
+ <!--Start PulumiCodeChooser -->
425
426
  ```python
426
427
  import pulumi
427
428
  import pulumi_vault as vault
@@ -450,13 +451,15 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
450
451
  changetype: delete
451
452
  \"\"\")
452
453
  ```
454
+ <!--End PulumiCodeChooser -->
453
455
 
454
456
  ## Import
455
457
 
456
- LDAP secret backend dynamic role can be imported using the full path to the role of the form: `<mount_path>/dynamic-role/<role_name>` e.g.
458
+ LDAP secret backend dynamic role can be imported using the full path to the role
459
+ of the form: `<mount_path>/dynamic-role/<role_name>` e.g.
457
460
 
458
461
  ```sh
459
- $ pulumi import vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole role ldap/role/dynamic-role
462
+ $ pulumi import vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole role ldap/role/dynamic-role
460
463
  ```
461
464
 
462
465
  :param str resource_name: The name of the resource.
@@ -503,6 +506,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
503
506
  """
504
507
  ## Example Usage
505
508
 
509
+ <!--Start PulumiCodeChooser -->
506
510
  ```python
507
511
  import pulumi
508
512
  import pulumi_vault as vault
@@ -531,13 +535,15 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
531
535
  changetype: delete
532
536
  \"\"\")
533
537
  ```
538
+ <!--End PulumiCodeChooser -->
534
539
 
535
540
  ## Import
536
541
 
537
- LDAP secret backend dynamic role can be imported using the full path to the role of the form: `<mount_path>/dynamic-role/<role_name>` e.g.
542
+ LDAP secret backend dynamic role can be imported using the full path to the role
543
+ of the form: `<mount_path>/dynamic-role/<role_name>` e.g.
538
544
 
539
545
  ```sh
540
- $ pulumi import vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole role ldap/role/dynamic-role
546
+ $ pulumi import vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole role ldap/role/dynamic-role
541
547
  ```
542
548
 
543
549
  :param str resource_name: The name of the resource.
@@ -298,6 +298,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
298
298
  """
299
299
  ## Example Usage
300
300
 
301
+ <!--Start PulumiCodeChooser -->
301
302
  ```python
302
303
  import pulumi
303
304
  import pulumi_vault as vault
@@ -319,13 +320,14 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
319
320
  disable_check_in_enforcement=True,
320
321
  max_ttl=120)
321
322
  ```
323
+ <!--End PulumiCodeChooser -->
322
324
 
323
325
  ## Import
324
326
 
325
327
  LDAP secret backend libraries can be imported using the `path`, e.g.
326
328
 
327
329
  ```sh
328
- $ pulumi import vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet qa ldap/library/bob
330
+ $ pulumi import vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet qa ldap/library/bob
329
331
  ```
330
332
 
331
333
  :param str resource_name: The name of the resource.
@@ -355,6 +357,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
355
357
  """
356
358
  ## Example Usage
357
359
 
360
+ <!--Start PulumiCodeChooser -->
358
361
  ```python
359
362
  import pulumi
360
363
  import pulumi_vault as vault
@@ -376,13 +379,14 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
376
379
  disable_check_in_enforcement=True,
377
380
  max_ttl=120)
378
381
  ```
382
+ <!--End PulumiCodeChooser -->
379
383
 
380
384
  ## Import
381
385
 
382
386
  LDAP secret backend libraries can be imported using the `path`, e.g.
383
387
 
384
388
  ```sh
385
- $ pulumi import vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet qa ldap/library/bob
389
+ $ pulumi import vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet qa ldap/library/bob
386
390
  ```
387
391
 
388
392
  :param str resource_name: The name of the resource.
@@ -255,6 +255,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
255
255
  """
256
256
  ## Example Usage
257
257
 
258
+ <!--Start PulumiCodeChooser -->
258
259
  ```python
259
260
  import pulumi
260
261
  import pulumi_vault as vault
@@ -273,13 +274,15 @@ class SecretBackendStaticRole(pulumi.CustomResource):
273
274
  role_name="alice",
274
275
  rotation_period=60)
275
276
  ```
277
+ <!--End PulumiCodeChooser -->
276
278
 
277
279
  ## Import
278
280
 
279
- LDAP secret backend static role can be imported using the full path to the role of the form: `<mount_path>/static-role/<role_name>` e.g.
281
+ LDAP secret backend static role can be imported using the full path to the role
282
+ of the form: `<mount_path>/static-role/<role_name>` e.g.
280
283
 
281
284
  ```sh
282
- $ pulumi import vault:ldap/secretBackendStaticRole:SecretBackendStaticRole role ldap/static-role/example-role
285
+ $ pulumi import vault:ldap/secretBackendStaticRole:SecretBackendStaticRole role ldap/static-role/example-role
283
286
  ```
284
287
 
285
288
  :param str resource_name: The name of the resource.
@@ -306,6 +309,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
306
309
  """
307
310
  ## Example Usage
308
311
 
312
+ <!--Start PulumiCodeChooser -->
309
313
  ```python
310
314
  import pulumi
311
315
  import pulumi_vault as vault
@@ -324,13 +328,15 @@ class SecretBackendStaticRole(pulumi.CustomResource):
324
328
  role_name="alice",
325
329
  rotation_period=60)
326
330
  ```
331
+ <!--End PulumiCodeChooser -->
327
332
 
328
333
  ## Import
329
334
 
330
- LDAP secret backend static role can be imported using the full path to the role of the form: `<mount_path>/static-role/<role_name>` e.g.
335
+ LDAP secret backend static role can be imported using the full path to the role
336
+ of the form: `<mount_path>/static-role/<role_name>` e.g.
331
337
 
332
338
  ```sh
333
- $ pulumi import vault:ldap/secretBackendStaticRole:SecretBackendStaticRole role ldap/static-role/example-role
339
+ $ pulumi import vault:ldap/secretBackendStaticRole:SecretBackendStaticRole role ldap/static-role/example-role
334
340
  ```
335
341
 
336
342
  :param str resource_name: The name of the resource.
@@ -184,18 +184,12 @@ class Keys(pulumi.CustomResource):
184
184
 
185
185
  **Note** this feature is available only with Vault Enterprise.
186
186
 
187
- ## Caveats
188
-
189
- This single resource handles the lifecycle of _all_ the managed keys that must be created in Vault.
190
- There can only be one such resource in the TF state, and if there are already provisioned managed
191
- keys in Vault, we recommend using `pulumi import` instead.
192
-
193
187
  ## Import
194
188
 
195
189
  Mounts can be imported using the `id` of `default`, e.g.
196
190
 
197
191
  ```sh
198
- $ pulumi import vault:managed/keys:Keys keys default
192
+ $ pulumi import vault:managed/keys:Keys keys default
199
193
  ```
200
194
 
201
195
  :param str resource_name: The name of the resource.
@@ -219,18 +213,12 @@ class Keys(pulumi.CustomResource):
219
213
 
220
214
  **Note** this feature is available only with Vault Enterprise.
221
215
 
222
- ## Caveats
223
-
224
- This single resource handles the lifecycle of _all_ the managed keys that must be created in Vault.
225
- There can only be one such resource in the TF state, and if there are already provisioned managed
226
- keys in Vault, we recommend using `pulumi import` instead.
227
-
228
216
  ## Import
229
217
 
230
218
  Mounts can be imported using the `id` of `default`, e.g.
231
219
 
232
220
  ```sh
233
- $ pulumi import vault:managed/keys:Keys keys default
221
+ $ pulumi import vault:managed/keys:Keys keys default
234
222
  ```
235
223
 
236
224
  :param str resource_name: The name of the resource.
pulumi_vault/mfa_duo.py CHANGED
@@ -328,6 +328,7 @@ class MfaDuo(pulumi.CustomResource):
328
328
 
329
329
  ## Example Usage
330
330
 
331
+ <!--Start PulumiCodeChooser -->
331
332
  ```python
332
333
  import pulumi
333
334
  import pulumi_vault as vault
@@ -341,13 +342,14 @@ class MfaDuo(pulumi.CustomResource):
341
342
  integration_key="BIACEUEAXI20BNWTEYXT",
342
343
  api_hostname="api-2b5c39f5.duosecurity.com")
343
344
  ```
345
+ <!--End PulumiCodeChooser -->
344
346
 
345
347
  ## Import
346
348
 
347
349
  Mounts can be imported using the `path`, e.g.
348
350
 
349
351
  ```sh
350
- $ pulumi import vault:index/mfaDuo:MfaDuo my_duo my_duo
352
+ $ pulumi import vault:index/mfaDuo:MfaDuo my_duo my_duo
351
353
  ```
352
354
 
353
355
  :param str resource_name: The name of the resource.
@@ -381,6 +383,7 @@ class MfaDuo(pulumi.CustomResource):
381
383
 
382
384
  ## Example Usage
383
385
 
386
+ <!--Start PulumiCodeChooser -->
384
387
  ```python
385
388
  import pulumi
386
389
  import pulumi_vault as vault
@@ -394,13 +397,14 @@ class MfaDuo(pulumi.CustomResource):
394
397
  integration_key="BIACEUEAXI20BNWTEYXT",
395
398
  api_hostname="api-2b5c39f5.duosecurity.com")
396
399
  ```
400
+ <!--End PulumiCodeChooser -->
397
401
 
398
402
  ## Import
399
403
 
400
404
  Mounts can be imported using the `path`, e.g.
401
405
 
402
406
  ```sh
403
- $ pulumi import vault:index/mfaDuo:MfaDuo my_duo my_duo
407
+ $ pulumi import vault:index/mfaDuo:MfaDuo my_duo my_duo
404
408
  ```
405
409
 
406
410
  :param str resource_name: The name of the resource.
pulumi_vault/mfa_okta.py CHANGED
@@ -349,6 +349,7 @@ class MfaOkta(pulumi.CustomResource):
349
349
 
350
350
  ## Example Usage
351
351
 
352
+ <!--Start PulumiCodeChooser -->
352
353
  ```python
353
354
  import pulumi
354
355
  import pulumi_vault as vault
@@ -362,13 +363,14 @@ class MfaOkta(pulumi.CustomResource):
362
363
  org_name="hashicorp",
363
364
  api_token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9")
364
365
  ```
366
+ <!--End PulumiCodeChooser -->
365
367
 
366
368
  ## Import
367
369
 
368
370
  Mounts can be imported using the `path`, e.g.
369
371
 
370
372
  ```sh
371
- $ pulumi import vault:index/mfaOkta:MfaOkta my_okta my_okta
373
+ $ pulumi import vault:index/mfaOkta:MfaOkta my_okta my_okta
372
374
  ```
373
375
 
374
376
  :param str resource_name: The name of the resource.
@@ -407,6 +409,7 @@ class MfaOkta(pulumi.CustomResource):
407
409
 
408
410
  ## Example Usage
409
411
 
412
+ <!--Start PulumiCodeChooser -->
410
413
  ```python
411
414
  import pulumi
412
415
  import pulumi_vault as vault
@@ -420,13 +423,14 @@ class MfaOkta(pulumi.CustomResource):
420
423
  org_name="hashicorp",
421
424
  api_token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9")
422
425
  ```
426
+ <!--End PulumiCodeChooser -->
423
427
 
424
428
  ## Import
425
429
 
426
430
  Mounts can be imported using the `path`, e.g.
427
431
 
428
432
  ```sh
429
- $ pulumi import vault:index/mfaOkta:MfaOkta my_okta my_okta
433
+ $ pulumi import vault:index/mfaOkta:MfaOkta my_okta my_okta
430
434
  ```
431
435
 
432
436
  :param str resource_name: The name of the resource.
@@ -359,6 +359,7 @@ class MfaPingid(pulumi.CustomResource):
359
359
 
360
360
  ## Example Usage
361
361
 
362
+ <!--Start PulumiCodeChooser -->
362
363
  ```python
363
364
  import pulumi
364
365
  import pulumi_vault as vault
@@ -373,13 +374,14 @@ class MfaPingid(pulumi.CustomResource):
373
374
  username_format="user@example.com",
374
375
  settings_file_base64=settings_file)
375
376
  ```
377
+ <!--End PulumiCodeChooser -->
376
378
 
377
379
  ## Import
378
380
 
379
381
  Mounts can be imported using the `path`, e.g.
380
382
 
381
383
  ```sh
382
- $ pulumi import vault:index/mfaPingid:MfaPingid my_pingid my_pingid
384
+ $ pulumi import vault:index/mfaPingid:MfaPingid my_pingid my_pingid
383
385
  ```
384
386
 
385
387
  :param str resource_name: The name of the resource.
@@ -414,6 +416,7 @@ class MfaPingid(pulumi.CustomResource):
414
416
 
415
417
  ## Example Usage
416
418
 
419
+ <!--Start PulumiCodeChooser -->
417
420
  ```python
418
421
  import pulumi
419
422
  import pulumi_vault as vault
@@ -428,13 +431,14 @@ class MfaPingid(pulumi.CustomResource):
428
431
  username_format="user@example.com",
429
432
  settings_file_base64=settings_file)
430
433
  ```
434
+ <!--End PulumiCodeChooser -->
431
435
 
432
436
  ## Import
433
437
 
434
438
  Mounts can be imported using the `path`, e.g.
435
439
 
436
440
  ```sh
437
- $ pulumi import vault:index/mfaPingid:MfaPingid my_pingid my_pingid
441
+ $ pulumi import vault:index/mfaPingid:MfaPingid my_pingid my_pingid
438
442
  ```
439
443
 
440
444
  :param str resource_name: The name of the resource.
pulumi_vault/mfa_totp.py CHANGED
@@ -360,6 +360,7 @@ class MfaTotp(pulumi.CustomResource):
360
360
 
361
361
  ## Example Usage
362
362
 
363
+ <!--Start PulumiCodeChooser -->
363
364
  ```python
364
365
  import pulumi
365
366
  import pulumi_vault as vault
@@ -371,13 +372,14 @@ class MfaTotp(pulumi.CustomResource):
371
372
  key_size=20,
372
373
  period=60)
373
374
  ```
375
+ <!--End PulumiCodeChooser -->
374
376
 
375
377
  ## Import
376
378
 
377
379
  Mounts can be imported using the `path`, e.g.
378
380
 
379
381
  ```sh
380
- $ pulumi import vault:index/mfaTotp:MfaTotp my_totp my_totp
382
+ $ pulumi import vault:index/mfaTotp:MfaTotp my_totp my_totp
381
383
  ```
382
384
 
383
385
  :param str resource_name: The name of the resource.
@@ -411,6 +413,7 @@ class MfaTotp(pulumi.CustomResource):
411
413
 
412
414
  ## Example Usage
413
415
 
416
+ <!--Start PulumiCodeChooser -->
414
417
  ```python
415
418
  import pulumi
416
419
  import pulumi_vault as vault
@@ -422,13 +425,14 @@ class MfaTotp(pulumi.CustomResource):
422
425
  key_size=20,
423
426
  period=60)
424
427
  ```
428
+ <!--End PulumiCodeChooser -->
425
429
 
426
430
  ## Import
427
431
 
428
432
  Mounts can be imported using the `path`, e.g.
429
433
 
430
434
  ```sh
431
- $ pulumi import vault:index/mfaTotp:MfaTotp my_totp my_totp
435
+ $ pulumi import vault:index/mfaTotp:MfaTotp my_totp my_totp
432
436
  ```
433
437
 
434
438
  :param str resource_name: The name of the resource.
@@ -193,6 +193,7 @@ class SecretBackend(pulumi.CustomResource):
193
193
  """
194
194
  ## Example Usage
195
195
 
196
+ <!--Start PulumiCodeChooser -->
196
197
  ```python
197
198
  import pulumi
198
199
  import pulumi_vault as vault
@@ -206,13 +207,14 @@ class SecretBackend(pulumi.CustomResource):
206
207
  private_key="privateKey",
207
208
  public_key="publicKey")
208
209
  ```
210
+ <!--End PulumiCodeChooser -->
209
211
 
210
212
  ## Import
211
213
 
212
214
  MongoDB Atlas secret backends can be imported using the `${mount}/config`, e.g.
213
215
 
214
216
  ```sh
215
- $ pulumi import vault:mongodbatlas/secretBackend:SecretBackend config mongodbatlas/config
217
+ $ pulumi import vault:mongodbatlas/secretBackend:SecretBackend config mongodbatlas/config
216
218
  ```
217
219
 
218
220
  :param str resource_name: The name of the resource.
@@ -234,6 +236,7 @@ class SecretBackend(pulumi.CustomResource):
234
236
  """
235
237
  ## Example Usage
236
238
 
239
+ <!--Start PulumiCodeChooser -->
237
240
  ```python
238
241
  import pulumi
239
242
  import pulumi_vault as vault
@@ -247,13 +250,14 @@ class SecretBackend(pulumi.CustomResource):
247
250
  private_key="privateKey",
248
251
  public_key="publicKey")
249
252
  ```
253
+ <!--End PulumiCodeChooser -->
250
254
 
251
255
  ## Import
252
256
 
253
257
  MongoDB Atlas secret backends can be imported using the `${mount}/config`, e.g.
254
258
 
255
259
  ```sh
256
- $ pulumi import vault:mongodbatlas/secretBackend:SecretBackend config mongodbatlas/config
260
+ $ pulumi import vault:mongodbatlas/secretBackend:SecretBackend config mongodbatlas/config
257
261
  ```
258
262
 
259
263
  :param str resource_name: The name of the resource.
@@ -417,6 +417,7 @@ class SecretRole(pulumi.CustomResource):
417
417
  """
418
418
  ## Example Usage
419
419
 
420
+ <!--Start PulumiCodeChooser -->
420
421
  ```python
421
422
  import pulumi
422
423
  import pulumi_vault as vault
@@ -440,13 +441,15 @@ class SecretRole(pulumi.CustomResource):
440
441
  ttl="60",
441
442
  max_ttl="120")
442
443
  ```
444
+ <!--End PulumiCodeChooser -->
443
445
 
444
446
  ## Import
445
447
 
446
- The MongoDB Atlas secret role can be imported using the full path to the role of the form: `<mount_path>/roles/<role_name>` e.g.
448
+ The MongoDB Atlas secret role can be imported using the full path to the role
449
+ of the form: `<mount_path>/roles/<role_name>` e.g.
447
450
 
448
451
  ```sh
449
- $ pulumi import vault:mongodbatlas/secretRole:SecretRole example mongodbatlas/roles/example-role
452
+ $ pulumi import vault:mongodbatlas/secretRole:SecretRole example mongodbatlas/roles/example-role
450
453
  ```
451
454
 
452
455
  :param str resource_name: The name of the resource.
@@ -477,6 +480,7 @@ class SecretRole(pulumi.CustomResource):
477
480
  """
478
481
  ## Example Usage
479
482
 
483
+ <!--Start PulumiCodeChooser -->
480
484
  ```python
481
485
  import pulumi
482
486
  import pulumi_vault as vault
@@ -500,13 +504,15 @@ class SecretRole(pulumi.CustomResource):
500
504
  ttl="60",
501
505
  max_ttl="120")
502
506
  ```
507
+ <!--End PulumiCodeChooser -->
503
508
 
504
509
  ## Import
505
510
 
506
- The MongoDB Atlas secret role can be imported using the full path to the role of the form: `<mount_path>/roles/<role_name>` e.g.
511
+ The MongoDB Atlas secret role can be imported using the full path to the role
512
+ of the form: `<mount_path>/roles/<role_name>` e.g.
507
513
 
508
514
  ```sh
509
- $ pulumi import vault:mongodbatlas/secretRole:SecretRole example mongodbatlas/roles/example-role
515
+ $ pulumi import vault:mongodbatlas/secretRole:SecretRole example mongodbatlas/roles/example-role
510
516
  ```
511
517
 
512
518
  :param str resource_name: The name of the resource.
pulumi_vault/mount.py CHANGED
@@ -491,6 +491,7 @@ class Mount(pulumi.CustomResource):
491
491
  """
492
492
  ## Example Usage
493
493
 
494
+ <!--Start PulumiCodeChooser -->
494
495
  ```python
495
496
  import pulumi
496
497
  import pulumi_vault as vault
@@ -500,7 +501,9 @@ class Mount(pulumi.CustomResource):
500
501
  path="dummy",
501
502
  type="generic")
502
503
  ```
504
+ <!--End PulumiCodeChooser -->
503
505
 
506
+ <!--Start PulumiCodeChooser -->
504
507
  ```python
505
508
  import pulumi
506
509
  import pulumi_vault as vault
@@ -514,7 +517,9 @@ class Mount(pulumi.CustomResource):
514
517
  path="version2-example",
515
518
  type="kv-v2")
516
519
  ```
520
+ <!--End PulumiCodeChooser -->
517
521
 
522
+ <!--Start PulumiCodeChooser -->
518
523
  ```python
519
524
  import pulumi
520
525
  import pulumi_vault as vault
@@ -527,7 +532,9 @@ class Mount(pulumi.CustomResource):
527
532
  path="transit-example",
528
533
  type="transit")
529
534
  ```
535
+ <!--End PulumiCodeChooser -->
530
536
 
537
+ <!--Start PulumiCodeChooser -->
531
538
  ```python
532
539
  import pulumi
533
540
  import pulumi_vault as vault
@@ -539,13 +546,14 @@ class Mount(pulumi.CustomResource):
539
546
  path="pki-example",
540
547
  type="pki")
541
548
  ```
549
+ <!--End PulumiCodeChooser -->
542
550
 
543
551
  ## Import
544
552
 
545
553
  Mounts can be imported using the `path`, e.g.
546
554
 
547
555
  ```sh
548
- $ pulumi import vault:index/mount:Mount example dummy
556
+ $ pulumi import vault:index/mount:Mount example dummy
549
557
  ```
550
558
 
551
559
  :param str resource_name: The name of the resource.
@@ -576,6 +584,7 @@ class Mount(pulumi.CustomResource):
576
584
  """
577
585
  ## Example Usage
578
586
 
587
+ <!--Start PulumiCodeChooser -->
579
588
  ```python
580
589
  import pulumi
581
590
  import pulumi_vault as vault
@@ -585,7 +594,9 @@ class Mount(pulumi.CustomResource):
585
594
  path="dummy",
586
595
  type="generic")
587
596
  ```
597
+ <!--End PulumiCodeChooser -->
588
598
 
599
+ <!--Start PulumiCodeChooser -->
589
600
  ```python
590
601
  import pulumi
591
602
  import pulumi_vault as vault
@@ -599,7 +610,9 @@ class Mount(pulumi.CustomResource):
599
610
  path="version2-example",
600
611
  type="kv-v2")
601
612
  ```
613
+ <!--End PulumiCodeChooser -->
602
614
 
615
+ <!--Start PulumiCodeChooser -->
603
616
  ```python
604
617
  import pulumi
605
618
  import pulumi_vault as vault
@@ -612,7 +625,9 @@ class Mount(pulumi.CustomResource):
612
625
  path="transit-example",
613
626
  type="transit")
614
627
  ```
628
+ <!--End PulumiCodeChooser -->
615
629
 
630
+ <!--Start PulumiCodeChooser -->
616
631
  ```python
617
632
  import pulumi
618
633
  import pulumi_vault as vault
@@ -624,13 +639,14 @@ class Mount(pulumi.CustomResource):
624
639
  path="pki-example",
625
640
  type="pki")
626
641
  ```
642
+ <!--End PulumiCodeChooser -->
627
643
 
628
644
  ## Import
629
645
 
630
646
  Mounts can be imported using the `path`, e.g.
631
647
 
632
648
  ```sh
633
- $ pulumi import vault:index/mount:Mount example dummy
649
+ $ pulumi import vault:index/mount:Mount example dummy
634
650
  ```
635
651
 
636
652
  :param str resource_name: The name of the resource.