pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['GroupMemberEntityIdsArgs', 'GroupMemberEntityIds']
@@ -29,7 +34,7 @@ class GroupMemberEntityIdsArgs:
29
34
  :param pulumi.Input[Sequence[pulumi.Input[str]]] member_entity_ids: List of member entities that belong to the group
30
35
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
36
  The value should not contain leading or trailing forward slashes.
32
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
38
  *Available only for Vault Enterprise*.
34
39
  """
35
40
  pulumi.set(__self__, "group_id", group_id)
@@ -86,7 +91,7 @@ class GroupMemberEntityIdsArgs:
86
91
  """
87
92
  The namespace to provision the resource in.
88
93
  The value should not contain leading or trailing forward slashes.
89
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
94
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
90
95
  *Available only for Vault Enterprise*.
91
96
  """
92
97
  return pulumi.get(self, "namespace")
@@ -101,7 +106,6 @@ class _GroupMemberEntityIdsState:
101
106
  def __init__(__self__, *,
102
107
  exclusive: Optional[pulumi.Input[bool]] = None,
103
108
  group_id: Optional[pulumi.Input[str]] = None,
104
- group_name: Optional[pulumi.Input[str]] = None,
105
109
  member_entity_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
106
110
  namespace: Optional[pulumi.Input[str]] = None):
107
111
  """
@@ -112,26 +116,16 @@ class _GroupMemberEntityIdsState:
112
116
 
113
117
  If set to `false`, this resource will simply ensure that the member entities specified in the resource are present in the group. When destroying the resource, the resource will ensure that the member entities specified in the resource are removed.
114
118
  :param pulumi.Input[str] group_id: Group ID to assign member entities to.
115
- :param pulumi.Input[str] group_name: The name of the group that are assigned the member entities.
116
- *Deprecated: The value for group_name may not always be accurate*
117
- *use* `data.vault_identity_group.*.group_name`, *or* `vault_identity_group.*.group_name` *instead.*
118
119
  :param pulumi.Input[Sequence[pulumi.Input[str]]] member_entity_ids: List of member entities that belong to the group
119
120
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
120
121
  The value should not contain leading or trailing forward slashes.
121
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
122
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
122
123
  *Available only for Vault Enterprise*.
123
124
  """
124
125
  if exclusive is not None:
125
126
  pulumi.set(__self__, "exclusive", exclusive)
126
127
  if group_id is not None:
127
128
  pulumi.set(__self__, "group_id", group_id)
128
- if group_name is not None:
129
- warnings.warn("""The value for group_name may not always be accurate,
130
- use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_name\" instead""", DeprecationWarning)
131
- pulumi.log.warn("""group_name is deprecated: The value for group_name may not always be accurate,
132
- use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_name\" instead""")
133
- if group_name is not None:
134
- pulumi.set(__self__, "group_name", group_name)
135
129
  if member_entity_ids is not None:
136
130
  pulumi.set(__self__, "member_entity_ids", member_entity_ids)
137
131
  if namespace is not None:
@@ -165,25 +159,6 @@ use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_n
165
159
  def group_id(self, value: Optional[pulumi.Input[str]]):
166
160
  pulumi.set(self, "group_id", value)
167
161
 
168
- @property
169
- @pulumi.getter(name="groupName")
170
- def group_name(self) -> Optional[pulumi.Input[str]]:
171
- """
172
- The name of the group that are assigned the member entities.
173
- *Deprecated: The value for group_name may not always be accurate*
174
- *use* `data.vault_identity_group.*.group_name`, *or* `vault_identity_group.*.group_name` *instead.*
175
- """
176
- warnings.warn("""The value for group_name may not always be accurate,
177
- use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_name\" instead""", DeprecationWarning)
178
- pulumi.log.warn("""group_name is deprecated: The value for group_name may not always be accurate,
179
- use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_name\" instead""")
180
-
181
- return pulumi.get(self, "group_name")
182
-
183
- @group_name.setter
184
- def group_name(self, value: Optional[pulumi.Input[str]]):
185
- pulumi.set(self, "group_name", value)
186
-
187
162
  @property
188
163
  @pulumi.getter(name="memberEntityIds")
189
164
  def member_entity_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -202,7 +177,7 @@ use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_n
202
177
  """
203
178
  The namespace to provision the resource in.
204
179
  The value should not contain leading or trailing forward slashes.
205
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
180
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
206
181
  *Available only for Vault Enterprise*.
207
182
  """
208
183
  return pulumi.get(self, "namespace")
@@ -226,6 +201,7 @@ class GroupMemberEntityIds(pulumi.CustomResource):
226
201
  Manages member entities for an Identity Group for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
227
202
 
228
203
  ## Example Usage
204
+
229
205
  ### Exclusive Member Entities
230
206
 
231
207
  ```python
@@ -233,17 +209,19 @@ class GroupMemberEntityIds(pulumi.CustomResource):
233
209
  import pulumi_vault as vault
234
210
 
235
211
  internal = vault.identity.Group("internal",
212
+ name="internal",
236
213
  type="internal",
237
214
  external_member_entity_ids=True,
238
215
  metadata={
239
216
  "version": "2",
240
217
  })
241
- user = vault.identity.Entity("user")
218
+ user = vault.identity.Entity("user", name="user")
242
219
  members = vault.identity.GroupMemberEntityIds("members",
243
220
  exclusive=True,
244
221
  member_entity_ids=[user.id],
245
222
  group_id=internal.id)
246
223
  ```
224
+
247
225
  ### Non-exclusive Member Entities
248
226
 
249
227
  ```python
@@ -251,14 +229,15 @@ class GroupMemberEntityIds(pulumi.CustomResource):
251
229
  import pulumi_vault as vault
252
230
 
253
231
  internal = vault.identity.Group("internal",
232
+ name="internal",
254
233
  type="internal",
255
234
  external_member_entity_ids=True,
256
235
  metadata={
257
236
  "version": "2",
258
237
  })
259
- test_user = vault.identity.Entity("testUser")
260
- second_test_user = vault.identity.Entity("secondTestUser")
261
- dev_user = vault.identity.Entity("devUser")
238
+ test_user = vault.identity.Entity("test_user", name="test")
239
+ second_test_user = vault.identity.Entity("second_test_user", name="second_test")
240
+ dev_user = vault.identity.Entity("dev_user", name="dev")
262
241
  test = vault.identity.GroupMemberEntityIds("test",
263
242
  member_entity_ids=[
264
243
  test_user.id,
@@ -283,7 +262,7 @@ class GroupMemberEntityIds(pulumi.CustomResource):
283
262
  :param pulumi.Input[Sequence[pulumi.Input[str]]] member_entity_ids: List of member entities that belong to the group
284
263
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
285
264
  The value should not contain leading or trailing forward slashes.
286
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
265
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
287
266
  *Available only for Vault Enterprise*.
288
267
  """
289
268
  ...
@@ -296,6 +275,7 @@ class GroupMemberEntityIds(pulumi.CustomResource):
296
275
  Manages member entities for an Identity Group for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
297
276
 
298
277
  ## Example Usage
278
+
299
279
  ### Exclusive Member Entities
300
280
 
301
281
  ```python
@@ -303,17 +283,19 @@ class GroupMemberEntityIds(pulumi.CustomResource):
303
283
  import pulumi_vault as vault
304
284
 
305
285
  internal = vault.identity.Group("internal",
286
+ name="internal",
306
287
  type="internal",
307
288
  external_member_entity_ids=True,
308
289
  metadata={
309
290
  "version": "2",
310
291
  })
311
- user = vault.identity.Entity("user")
292
+ user = vault.identity.Entity("user", name="user")
312
293
  members = vault.identity.GroupMemberEntityIds("members",
313
294
  exclusive=True,
314
295
  member_entity_ids=[user.id],
315
296
  group_id=internal.id)
316
297
  ```
298
+
317
299
  ### Non-exclusive Member Entities
318
300
 
319
301
  ```python
@@ -321,14 +303,15 @@ class GroupMemberEntityIds(pulumi.CustomResource):
321
303
  import pulumi_vault as vault
322
304
 
323
305
  internal = vault.identity.Group("internal",
306
+ name="internal",
324
307
  type="internal",
325
308
  external_member_entity_ids=True,
326
309
  metadata={
327
310
  "version": "2",
328
311
  })
329
- test_user = vault.identity.Entity("testUser")
330
- second_test_user = vault.identity.Entity("secondTestUser")
331
- dev_user = vault.identity.Entity("devUser")
312
+ test_user = vault.identity.Entity("test_user", name="test")
313
+ second_test_user = vault.identity.Entity("second_test_user", name="second_test")
314
+ dev_user = vault.identity.Entity("dev_user", name="dev")
332
315
  test = vault.identity.GroupMemberEntityIds("test",
333
316
  member_entity_ids=[
334
317
  test_user.id,
@@ -376,7 +359,6 @@ class GroupMemberEntityIds(pulumi.CustomResource):
376
359
  __props__.__dict__["group_id"] = group_id
377
360
  __props__.__dict__["member_entity_ids"] = member_entity_ids
378
361
  __props__.__dict__["namespace"] = namespace
379
- __props__.__dict__["group_name"] = None
380
362
  super(GroupMemberEntityIds, __self__).__init__(
381
363
  'vault:identity/groupMemberEntityIds:GroupMemberEntityIds',
382
364
  resource_name,
@@ -389,7 +371,6 @@ class GroupMemberEntityIds(pulumi.CustomResource):
389
371
  opts: Optional[pulumi.ResourceOptions] = None,
390
372
  exclusive: Optional[pulumi.Input[bool]] = None,
391
373
  group_id: Optional[pulumi.Input[str]] = None,
392
- group_name: Optional[pulumi.Input[str]] = None,
393
374
  member_entity_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
394
375
  namespace: Optional[pulumi.Input[str]] = None) -> 'GroupMemberEntityIds':
395
376
  """
@@ -405,13 +386,10 @@ class GroupMemberEntityIds(pulumi.CustomResource):
405
386
 
406
387
  If set to `false`, this resource will simply ensure that the member entities specified in the resource are present in the group. When destroying the resource, the resource will ensure that the member entities specified in the resource are removed.
407
388
  :param pulumi.Input[str] group_id: Group ID to assign member entities to.
408
- :param pulumi.Input[str] group_name: The name of the group that are assigned the member entities.
409
- *Deprecated: The value for group_name may not always be accurate*
410
- *use* `data.vault_identity_group.*.group_name`, *or* `vault_identity_group.*.group_name` *instead.*
411
389
  :param pulumi.Input[Sequence[pulumi.Input[str]]] member_entity_ids: List of member entities that belong to the group
412
390
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
413
391
  The value should not contain leading or trailing forward slashes.
414
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
392
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
415
393
  *Available only for Vault Enterprise*.
416
394
  """
417
395
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -420,7 +398,6 @@ class GroupMemberEntityIds(pulumi.CustomResource):
420
398
 
421
399
  __props__.__dict__["exclusive"] = exclusive
422
400
  __props__.__dict__["group_id"] = group_id
423
- __props__.__dict__["group_name"] = group_name
424
401
  __props__.__dict__["member_entity_ids"] = member_entity_ids
425
402
  __props__.__dict__["namespace"] = namespace
426
403
  return GroupMemberEntityIds(resource_name, opts=opts, __props__=__props__)
@@ -445,21 +422,6 @@ class GroupMemberEntityIds(pulumi.CustomResource):
445
422
  """
446
423
  return pulumi.get(self, "group_id")
447
424
 
448
- @property
449
- @pulumi.getter(name="groupName")
450
- def group_name(self) -> pulumi.Output[str]:
451
- """
452
- The name of the group that are assigned the member entities.
453
- *Deprecated: The value for group_name may not always be accurate*
454
- *use* `data.vault_identity_group.*.group_name`, *or* `vault_identity_group.*.group_name` *instead.*
455
- """
456
- warnings.warn("""The value for group_name may not always be accurate,
457
- use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_name\" instead""", DeprecationWarning)
458
- pulumi.log.warn("""group_name is deprecated: The value for group_name may not always be accurate,
459
- use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_name\" instead""")
460
-
461
- return pulumi.get(self, "group_name")
462
-
463
425
  @property
464
426
  @pulumi.getter(name="memberEntityIds")
465
427
  def member_entity_ids(self) -> pulumi.Output[Optional[Sequence[str]]]:
@@ -474,7 +436,7 @@ use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_n
474
436
  """
475
437
  The namespace to provision the resource in.
476
438
  The value should not contain leading or trailing forward slashes.
477
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
439
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
478
440
  *Available only for Vault Enterprise*.
479
441
  """
480
442
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['GroupMemberGroupIdsArgs', 'GroupMemberGroupIds']
@@ -32,7 +37,7 @@ class GroupMemberGroupIdsArgs:
32
37
  :param pulumi.Input[Sequence[pulumi.Input[str]]] member_group_ids: List of member groups that belong to the group
33
38
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
34
39
  The value should not contain leading or trailing forward slashes.
35
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
40
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
36
41
  *Available only for Vault Enterprise*.
37
42
  """
38
43
  pulumi.set(__self__, "group_id", group_id)
@@ -92,7 +97,7 @@ class GroupMemberGroupIdsArgs:
92
97
  """
93
98
  The namespace to provision the resource in.
94
99
  The value should not contain leading or trailing forward slashes.
95
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
100
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
96
101
  *Available only for Vault Enterprise*.
97
102
  """
98
103
  return pulumi.get(self, "namespace")
@@ -123,7 +128,7 @@ class _GroupMemberGroupIdsState:
123
128
  :param pulumi.Input[Sequence[pulumi.Input[str]]] member_group_ids: List of member groups that belong to the group
124
129
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
125
130
  The value should not contain leading or trailing forward slashes.
126
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
131
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
127
132
  *Available only for Vault Enterprise*.
128
133
  """
129
134
  if exclusive is not None:
@@ -184,7 +189,7 @@ class _GroupMemberGroupIdsState:
184
189
  """
185
190
  The namespace to provision the resource in.
186
191
  The value should not contain leading or trailing forward slashes.
187
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
192
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
188
193
  *Available only for Vault Enterprise*.
189
194
  """
190
195
  return pulumi.get(self, "namespace")
@@ -210,6 +215,7 @@ class GroupMemberGroupIds(pulumi.CustomResource):
210
215
  is the identity management solution for Vault.
211
216
 
212
217
  ## Example Usage
218
+
213
219
  ### Exclusive Member Groups
214
220
 
215
221
  ```python
@@ -217,19 +223,23 @@ class GroupMemberGroupIds(pulumi.CustomResource):
217
223
  import pulumi_vault as vault
218
224
 
219
225
  internal = vault.identity.Group("internal",
226
+ name="internal",
220
227
  type="internal",
221
228
  external_member_group_ids=True,
222
229
  metadata={
223
230
  "version": "2",
224
231
  })
225
- users = vault.identity.Group("users", metadata={
226
- "version": "2",
227
- })
232
+ users = vault.identity.Group("users",
233
+ name="users",
234
+ metadata={
235
+ "version": "2",
236
+ })
228
237
  members = vault.identity.GroupMemberGroupIds("members",
229
238
  exclusive=True,
230
239
  member_group_ids=[users.id],
231
240
  group_id=internal.id)
232
241
  ```
242
+
233
243
  ### Non-Exclusive Member Groups
234
244
 
235
245
  ```python
@@ -237,14 +247,17 @@ class GroupMemberGroupIds(pulumi.CustomResource):
237
247
  import pulumi_vault as vault
238
248
 
239
249
  internal = vault.identity.Group("internal",
250
+ name="internal",
240
251
  type="internal",
241
252
  external_member_group_ids=True,
242
253
  metadata={
243
254
  "version": "2",
244
255
  })
245
- users = vault.identity.Group("users", metadata={
246
- "version": "2",
247
- })
256
+ users = vault.identity.Group("users",
257
+ name="users",
258
+ metadata={
259
+ "version": "2",
260
+ })
248
261
  members = vault.identity.GroupMemberGroupIds("members",
249
262
  exclusive=False,
250
263
  member_group_ids=[users.id],
@@ -265,7 +278,7 @@ class GroupMemberGroupIds(pulumi.CustomResource):
265
278
  :param pulumi.Input[Sequence[pulumi.Input[str]]] member_group_ids: List of member groups that belong to the group
266
279
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
267
280
  The value should not contain leading or trailing forward slashes.
268
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
281
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
269
282
  *Available only for Vault Enterprise*.
270
283
  """
271
284
  ...
@@ -280,6 +293,7 @@ class GroupMemberGroupIds(pulumi.CustomResource):
280
293
  is the identity management solution for Vault.
281
294
 
282
295
  ## Example Usage
296
+
283
297
  ### Exclusive Member Groups
284
298
 
285
299
  ```python
@@ -287,19 +301,23 @@ class GroupMemberGroupIds(pulumi.CustomResource):
287
301
  import pulumi_vault as vault
288
302
 
289
303
  internal = vault.identity.Group("internal",
304
+ name="internal",
290
305
  type="internal",
291
306
  external_member_group_ids=True,
292
307
  metadata={
293
308
  "version": "2",
294
309
  })
295
- users = vault.identity.Group("users", metadata={
296
- "version": "2",
297
- })
310
+ users = vault.identity.Group("users",
311
+ name="users",
312
+ metadata={
313
+ "version": "2",
314
+ })
298
315
  members = vault.identity.GroupMemberGroupIds("members",
299
316
  exclusive=True,
300
317
  member_group_ids=[users.id],
301
318
  group_id=internal.id)
302
319
  ```
320
+
303
321
  ### Non-Exclusive Member Groups
304
322
 
305
323
  ```python
@@ -307,14 +325,17 @@ class GroupMemberGroupIds(pulumi.CustomResource):
307
325
  import pulumi_vault as vault
308
326
 
309
327
  internal = vault.identity.Group("internal",
328
+ name="internal",
310
329
  type="internal",
311
330
  external_member_group_ids=True,
312
331
  metadata={
313
332
  "version": "2",
314
333
  })
315
- users = vault.identity.Group("users", metadata={
316
- "version": "2",
317
- })
334
+ users = vault.identity.Group("users",
335
+ name="users",
336
+ metadata={
337
+ "version": "2",
338
+ })
318
339
  members = vault.identity.GroupMemberGroupIds("members",
319
340
  exclusive=False,
320
341
  member_group_ids=[users.id],
@@ -388,7 +409,7 @@ class GroupMemberGroupIds(pulumi.CustomResource):
388
409
  :param pulumi.Input[Sequence[pulumi.Input[str]]] member_group_ids: List of member groups that belong to the group
389
410
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
390
411
  The value should not contain leading or trailing forward slashes.
391
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
412
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
392
413
  *Available only for Vault Enterprise*.
393
414
  """
394
415
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -438,7 +459,7 @@ class GroupMemberGroupIds(pulumi.CustomResource):
438
459
  """
439
460
  The namespace to provision the resource in.
440
461
  The value should not contain leading or trailing forward slashes.
441
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
462
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
442
463
  *Available only for Vault Enterprise*.
443
464
  """
444
465
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['GroupPoliciesArgs', 'GroupPolicies']
@@ -29,7 +34,7 @@ class GroupPoliciesArgs:
29
34
  If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the group. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
30
35
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
36
  The value should not contain leading or trailing forward slashes.
32
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
38
  *Available only for Vault Enterprise*.
34
39
  """
35
40
  pulumi.set(__self__, "group_id", group_id)
@@ -85,7 +90,7 @@ class GroupPoliciesArgs:
85
90
  """
86
91
  The namespace to provision the resource in.
87
92
  The value should not contain leading or trailing forward slashes.
88
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
93
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
89
94
  *Available only for Vault Enterprise*.
90
95
  """
91
96
  return pulumi.get(self, "namespace")
@@ -114,7 +119,7 @@ class _GroupPoliciesState:
114
119
  :param pulumi.Input[str] group_name: The name of the group that are assigned the policies.
115
120
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
116
121
  The value should not contain leading or trailing forward slashes.
117
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
122
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
118
123
  *Available only for Vault Enterprise*.
119
124
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the group
120
125
  """
@@ -175,7 +180,7 @@ class _GroupPoliciesState:
175
180
  """
176
181
  The namespace to provision the resource in.
177
182
  The value should not contain leading or trailing forward slashes.
178
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
183
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
179
184
  *Available only for Vault Enterprise*.
180
185
  """
181
186
  return pulumi.get(self, "namespace")
@@ -211,6 +216,7 @@ class GroupPolicies(pulumi.CustomResource):
211
216
  Manages policies for an Identity Group for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
212
217
 
213
218
  ## Example Usage
219
+
214
220
  ### Exclusive Policies
215
221
 
216
222
  ```python
@@ -218,6 +224,7 @@ class GroupPolicies(pulumi.CustomResource):
218
224
  import pulumi_vault as vault
219
225
 
220
226
  internal = vault.identity.Group("internal",
227
+ name="internal",
221
228
  type="internal",
222
229
  external_policies=True,
223
230
  metadata={
@@ -231,6 +238,7 @@ class GroupPolicies(pulumi.CustomResource):
231
238
  exclusive=True,
232
239
  group_id=internal.id)
233
240
  ```
241
+
234
242
  ### Non-exclusive Policies
235
243
 
236
244
  ```python
@@ -238,6 +246,7 @@ class GroupPolicies(pulumi.CustomResource):
238
246
  import pulumi_vault as vault
239
247
 
240
248
  internal = vault.identity.Group("internal",
249
+ name="internal",
241
250
  type="internal",
242
251
  external_policies=True,
243
252
  metadata={
@@ -266,7 +275,7 @@ class GroupPolicies(pulumi.CustomResource):
266
275
  :param pulumi.Input[str] group_id: Group ID to assign policies to.
267
276
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
268
277
  The value should not contain leading or trailing forward slashes.
269
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
278
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
270
279
  *Available only for Vault Enterprise*.
271
280
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the group
272
281
  """
@@ -280,6 +289,7 @@ class GroupPolicies(pulumi.CustomResource):
280
289
  Manages policies for an Identity Group for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
281
290
 
282
291
  ## Example Usage
292
+
283
293
  ### Exclusive Policies
284
294
 
285
295
  ```python
@@ -287,6 +297,7 @@ class GroupPolicies(pulumi.CustomResource):
287
297
  import pulumi_vault as vault
288
298
 
289
299
  internal = vault.identity.Group("internal",
300
+ name="internal",
290
301
  type="internal",
291
302
  external_policies=True,
292
303
  metadata={
@@ -300,6 +311,7 @@ class GroupPolicies(pulumi.CustomResource):
300
311
  exclusive=True,
301
312
  group_id=internal.id)
302
313
  ```
314
+
303
315
  ### Non-exclusive Policies
304
316
 
305
317
  ```python
@@ -307,6 +319,7 @@ class GroupPolicies(pulumi.CustomResource):
307
319
  import pulumi_vault as vault
308
320
 
309
321
  internal = vault.identity.Group("internal",
322
+ name="internal",
310
323
  type="internal",
311
324
  external_policies=True,
312
325
  metadata={
@@ -393,7 +406,7 @@ class GroupPolicies(pulumi.CustomResource):
393
406
  :param pulumi.Input[str] group_name: The name of the group that are assigned the policies.
394
407
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
395
408
  The value should not contain leading or trailing forward slashes.
396
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
409
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
397
410
  *Available only for Vault Enterprise*.
398
411
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the group
399
412
  """
@@ -442,7 +455,7 @@ class GroupPolicies(pulumi.CustomResource):
442
455
  """
443
456
  The namespace to provision the resource in.
444
457
  The value should not contain leading or trailing forward slashes.
445
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
458
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
446
459
  *Available only for Vault Enterprise*.
447
460
  """
448
461
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaDuoArgs', 'MfaDuo']
@@ -384,8 +389,8 @@ class MfaDuo(pulumi.CustomResource):
384
389
 
385
390
  example = vault.identity.MfaDuo("example",
386
391
  api_hostname="api-xxxxxxxx.duosecurity.com",
387
- integration_key="secret-int-key",
388
- secret_key="secret-key")
392
+ secret_key="secret-key",
393
+ integration_key="secret-int-key")
389
394
  ```
390
395
 
391
396
  ## Import
@@ -393,7 +398,7 @@ class MfaDuo(pulumi.CustomResource):
393
398
  Resource can be imported using its `uuid` field, e.g.
394
399
 
395
400
  ```sh
396
- $ pulumi import vault:identity/mfaDuo:MfaDuo example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
401
+ $ pulumi import vault:identity/mfaDuo:MfaDuo example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
397
402
  ```
398
403
 
399
404
  :param str resource_name: The name of the resource.
@@ -423,8 +428,8 @@ class MfaDuo(pulumi.CustomResource):
423
428
 
424
429
  example = vault.identity.MfaDuo("example",
425
430
  api_hostname="api-xxxxxxxx.duosecurity.com",
426
- integration_key="secret-int-key",
427
- secret_key="secret-key")
431
+ secret_key="secret-key",
432
+ integration_key="secret-int-key")
428
433
  ```
429
434
 
430
435
  ## Import
@@ -432,7 +437,7 @@ class MfaDuo(pulumi.CustomResource):
432
437
  Resource can be imported using its `uuid` field, e.g.
433
438
 
434
439
  ```sh
435
- $ pulumi import vault:identity/mfaDuo:MfaDuo example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
440
+ $ pulumi import vault:identity/mfaDuo:MfaDuo example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
436
441
  ```
437
442
 
438
443
  :param str resource_name: The name of the resource.