pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -416,38 +416,36 @@ class Group(pulumi.CustomResource):
416
416
 
417
417
  ### Internal Group
418
418
 
419
- <!--Start PulumiCodeChooser -->
420
419
  ```python
421
420
  import pulumi
422
421
  import pulumi_vault as vault
423
422
 
424
423
  internal = vault.identity.Group("internal",
425
- metadata={
426
- "version": "2",
427
- },
424
+ name="internal",
425
+ type="internal",
428
426
  policies=[
429
427
  "dev",
430
428
  "test",
431
429
  ],
432
- type="internal")
430
+ metadata={
431
+ "version": "2",
432
+ })
433
433
  ```
434
- <!--End PulumiCodeChooser -->
435
434
 
436
435
  ### External Group
437
436
 
438
- <!--Start PulumiCodeChooser -->
439
437
  ```python
440
438
  import pulumi
441
439
  import pulumi_vault as vault
442
440
 
443
441
  group = vault.identity.Group("group",
442
+ name="external",
443
+ type="external",
444
+ policies=["test"],
444
445
  metadata={
445
446
  "version": "1",
446
- },
447
- policies=["test"],
448
- type="external")
447
+ })
449
448
  ```
450
- <!--End PulumiCodeChooser -->
451
449
 
452
450
  ## Caveats
453
451
 
@@ -455,31 +453,31 @@ class Group(pulumi.CustomResource):
455
453
  Applying this configuration would result in the provider failing to create one of the identity groups, since the resources share the same `name`.
456
454
 
457
455
  This sort of pattern should be avoided:
458
- <!--Start PulumiCodeChooser -->
459
456
  ```python
460
457
  import pulumi
461
458
  import pulumi_vault as vault
462
459
 
463
- internal_identity_group_group = vault.identity.Group("internalIdentity/groupGroup",
464
- metadata={
465
- "version": "2",
466
- },
460
+ internal = vault.identity.Group("internal",
461
+ name="internal",
462
+ type="internal",
467
463
  policies=[
468
464
  "dev",
469
465
  "test",
470
466
  ],
471
- type="internal")
472
- internal_group = vault.identity.Group("internalGroup",
473
467
  metadata={
474
468
  "version": "2",
475
- },
469
+ })
470
+ internal_group = vault.identity.Group("Internal",
471
+ name="Internal",
472
+ type="internal",
476
473
  policies=[
477
474
  "dev",
478
475
  "test",
479
476
  ],
480
- type="internal")
477
+ metadata={
478
+ "version": "2",
479
+ })
481
480
  ```
482
- <!--End PulumiCodeChooser -->
483
481
 
484
482
  ## Import
485
483
 
@@ -528,38 +526,36 @@ class Group(pulumi.CustomResource):
528
526
 
529
527
  ### Internal Group
530
528
 
531
- <!--Start PulumiCodeChooser -->
532
529
  ```python
533
530
  import pulumi
534
531
  import pulumi_vault as vault
535
532
 
536
533
  internal = vault.identity.Group("internal",
537
- metadata={
538
- "version": "2",
539
- },
534
+ name="internal",
535
+ type="internal",
540
536
  policies=[
541
537
  "dev",
542
538
  "test",
543
539
  ],
544
- type="internal")
540
+ metadata={
541
+ "version": "2",
542
+ })
545
543
  ```
546
- <!--End PulumiCodeChooser -->
547
544
 
548
545
  ### External Group
549
546
 
550
- <!--Start PulumiCodeChooser -->
551
547
  ```python
552
548
  import pulumi
553
549
  import pulumi_vault as vault
554
550
 
555
551
  group = vault.identity.Group("group",
552
+ name="external",
553
+ type="external",
554
+ policies=["test"],
556
555
  metadata={
557
556
  "version": "1",
558
- },
559
- policies=["test"],
560
- type="external")
557
+ })
561
558
  ```
562
- <!--End PulumiCodeChooser -->
563
559
 
564
560
  ## Caveats
565
561
 
@@ -567,31 +563,31 @@ class Group(pulumi.CustomResource):
567
563
  Applying this configuration would result in the provider failing to create one of the identity groups, since the resources share the same `name`.
568
564
 
569
565
  This sort of pattern should be avoided:
570
- <!--Start PulumiCodeChooser -->
571
566
  ```python
572
567
  import pulumi
573
568
  import pulumi_vault as vault
574
569
 
575
- internal_identity_group_group = vault.identity.Group("internalIdentity/groupGroup",
576
- metadata={
577
- "version": "2",
578
- },
570
+ internal = vault.identity.Group("internal",
571
+ name="internal",
572
+ type="internal",
579
573
  policies=[
580
574
  "dev",
581
575
  "test",
582
576
  ],
583
- type="internal")
584
- internal_group = vault.identity.Group("internalGroup",
585
577
  metadata={
586
578
  "version": "2",
587
- },
579
+ })
580
+ internal_group = vault.identity.Group("Internal",
581
+ name="Internal",
582
+ type="internal",
588
583
  policies=[
589
584
  "dev",
590
585
  "test",
591
586
  ],
592
- type="internal")
587
+ metadata={
588
+ "version": "2",
589
+ })
593
590
  ```
594
- <!--End PulumiCodeChooser -->
595
591
 
596
592
  ## Import
597
593
 
@@ -181,12 +181,12 @@ class GroupAlias(pulumi.CustomResource):
181
181
 
182
182
  ## Example Usage
183
183
 
184
- <!--Start PulumiCodeChooser -->
185
184
  ```python
186
185
  import pulumi
187
186
  import pulumi_vault as vault
188
187
 
189
188
  group = vault.identity.Group("group",
189
+ name="test",
190
190
  type="external",
191
191
  policies=["test"])
192
192
  github = vault.AuthBackend("github",
@@ -197,7 +197,6 @@ class GroupAlias(pulumi.CustomResource):
197
197
  mount_accessor=github.accessor,
198
198
  canonical_id=group.id)
199
199
  ```
200
- <!--End PulumiCodeChooser -->
201
200
 
202
201
  ## Import
203
202
 
@@ -236,12 +235,12 @@ class GroupAlias(pulumi.CustomResource):
236
235
 
237
236
  ## Example Usage
238
237
 
239
- <!--Start PulumiCodeChooser -->
240
238
  ```python
241
239
  import pulumi
242
240
  import pulumi_vault as vault
243
241
 
244
242
  group = vault.identity.Group("group",
243
+ name="test",
245
244
  type="external",
246
245
  policies=["test"])
247
246
  github = vault.AuthBackend("github",
@@ -252,7 +251,6 @@ class GroupAlias(pulumi.CustomResource):
252
251
  mount_accessor=github.accessor,
253
252
  canonical_id=group.id)
254
253
  ```
255
- <!--End PulumiCodeChooser -->
256
254
 
257
255
  ## Import
258
256
 
@@ -199,41 +199,40 @@ class GroupMemberEntityIds(pulumi.CustomResource):
199
199
 
200
200
  ### Exclusive Member Entities
201
201
 
202
- <!--Start PulumiCodeChooser -->
203
202
  ```python
204
203
  import pulumi
205
204
  import pulumi_vault as vault
206
205
 
207
206
  internal = vault.identity.Group("internal",
207
+ name="internal",
208
208
  type="internal",
209
209
  external_member_entity_ids=True,
210
210
  metadata={
211
211
  "version": "2",
212
212
  })
213
- user = vault.identity.Entity("user")
213
+ user = vault.identity.Entity("user", name="user")
214
214
  members = vault.identity.GroupMemberEntityIds("members",
215
215
  exclusive=True,
216
216
  member_entity_ids=[user.id],
217
217
  group_id=internal.id)
218
218
  ```
219
- <!--End PulumiCodeChooser -->
220
219
 
221
220
  ### Non-exclusive Member Entities
222
221
 
223
- <!--Start PulumiCodeChooser -->
224
222
  ```python
225
223
  import pulumi
226
224
  import pulumi_vault as vault
227
225
 
228
226
  internal = vault.identity.Group("internal",
227
+ name="internal",
229
228
  type="internal",
230
229
  external_member_entity_ids=True,
231
230
  metadata={
232
231
  "version": "2",
233
232
  })
234
- test_user = vault.identity.Entity("testUser")
235
- second_test_user = vault.identity.Entity("secondTestUser")
236
- dev_user = vault.identity.Entity("devUser")
233
+ test_user = vault.identity.Entity("test_user", name="test")
234
+ second_test_user = vault.identity.Entity("second_test_user", name="second_test")
235
+ dev_user = vault.identity.Entity("dev_user", name="dev")
237
236
  test = vault.identity.GroupMemberEntityIds("test",
238
237
  member_entity_ids=[
239
238
  test_user.id,
@@ -246,7 +245,6 @@ class GroupMemberEntityIds(pulumi.CustomResource):
246
245
  exclusive=False,
247
246
  group_id=internal.id)
248
247
  ```
249
- <!--End PulumiCodeChooser -->
250
248
 
251
249
  :param str resource_name: The name of the resource.
252
250
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -275,41 +273,40 @@ class GroupMemberEntityIds(pulumi.CustomResource):
275
273
 
276
274
  ### Exclusive Member Entities
277
275
 
278
- <!--Start PulumiCodeChooser -->
279
276
  ```python
280
277
  import pulumi
281
278
  import pulumi_vault as vault
282
279
 
283
280
  internal = vault.identity.Group("internal",
281
+ name="internal",
284
282
  type="internal",
285
283
  external_member_entity_ids=True,
286
284
  metadata={
287
285
  "version": "2",
288
286
  })
289
- user = vault.identity.Entity("user")
287
+ user = vault.identity.Entity("user", name="user")
290
288
  members = vault.identity.GroupMemberEntityIds("members",
291
289
  exclusive=True,
292
290
  member_entity_ids=[user.id],
293
291
  group_id=internal.id)
294
292
  ```
295
- <!--End PulumiCodeChooser -->
296
293
 
297
294
  ### Non-exclusive Member Entities
298
295
 
299
- <!--Start PulumiCodeChooser -->
300
296
  ```python
301
297
  import pulumi
302
298
  import pulumi_vault as vault
303
299
 
304
300
  internal = vault.identity.Group("internal",
301
+ name="internal",
305
302
  type="internal",
306
303
  external_member_entity_ids=True,
307
304
  metadata={
308
305
  "version": "2",
309
306
  })
310
- test_user = vault.identity.Entity("testUser")
311
- second_test_user = vault.identity.Entity("secondTestUser")
312
- dev_user = vault.identity.Entity("devUser")
307
+ test_user = vault.identity.Entity("test_user", name="test")
308
+ second_test_user = vault.identity.Entity("second_test_user", name="second_test")
309
+ dev_user = vault.identity.Entity("dev_user", name="dev")
313
310
  test = vault.identity.GroupMemberEntityIds("test",
314
311
  member_entity_ids=[
315
312
  test_user.id,
@@ -322,7 +319,6 @@ class GroupMemberEntityIds(pulumi.CustomResource):
322
319
  exclusive=False,
323
320
  group_id=internal.id)
324
321
  ```
325
- <!--End PulumiCodeChooser -->
326
322
 
327
323
  :param str resource_name: The name of the resource.
328
324
  :param GroupMemberEntityIdsArgs args: The arguments to use to populate this resource's properties.
@@ -213,49 +213,51 @@ class GroupMemberGroupIds(pulumi.CustomResource):
213
213
 
214
214
  ### Exclusive Member Groups
215
215
 
216
- <!--Start PulumiCodeChooser -->
217
216
  ```python
218
217
  import pulumi
219
218
  import pulumi_vault as vault
220
219
 
221
220
  internal = vault.identity.Group("internal",
221
+ name="internal",
222
222
  type="internal",
223
223
  external_member_group_ids=True,
224
224
  metadata={
225
225
  "version": "2",
226
226
  })
227
- users = vault.identity.Group("users", metadata={
228
- "version": "2",
229
- })
227
+ users = vault.identity.Group("users",
228
+ name="users",
229
+ metadata={
230
+ "version": "2",
231
+ })
230
232
  members = vault.identity.GroupMemberGroupIds("members",
231
233
  exclusive=True,
232
234
  member_group_ids=[users.id],
233
235
  group_id=internal.id)
234
236
  ```
235
- <!--End PulumiCodeChooser -->
236
237
 
237
238
  ### Non-Exclusive Member Groups
238
239
 
239
- <!--Start PulumiCodeChooser -->
240
240
  ```python
241
241
  import pulumi
242
242
  import pulumi_vault as vault
243
243
 
244
244
  internal = vault.identity.Group("internal",
245
+ name="internal",
245
246
  type="internal",
246
247
  external_member_group_ids=True,
247
248
  metadata={
248
249
  "version": "2",
249
250
  })
250
- users = vault.identity.Group("users", metadata={
251
- "version": "2",
252
- })
251
+ users = vault.identity.Group("users",
252
+ name="users",
253
+ metadata={
254
+ "version": "2",
255
+ })
253
256
  members = vault.identity.GroupMemberGroupIds("members",
254
257
  exclusive=False,
255
258
  member_group_ids=[users.id],
256
259
  group_id=internal.id)
257
260
  ```
258
- <!--End PulumiCodeChooser -->
259
261
 
260
262
  :param str resource_name: The name of the resource.
261
263
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -289,49 +291,51 @@ class GroupMemberGroupIds(pulumi.CustomResource):
289
291
 
290
292
  ### Exclusive Member Groups
291
293
 
292
- <!--Start PulumiCodeChooser -->
293
294
  ```python
294
295
  import pulumi
295
296
  import pulumi_vault as vault
296
297
 
297
298
  internal = vault.identity.Group("internal",
299
+ name="internal",
298
300
  type="internal",
299
301
  external_member_group_ids=True,
300
302
  metadata={
301
303
  "version": "2",
302
304
  })
303
- users = vault.identity.Group("users", metadata={
304
- "version": "2",
305
- })
305
+ users = vault.identity.Group("users",
306
+ name="users",
307
+ metadata={
308
+ "version": "2",
309
+ })
306
310
  members = vault.identity.GroupMemberGroupIds("members",
307
311
  exclusive=True,
308
312
  member_group_ids=[users.id],
309
313
  group_id=internal.id)
310
314
  ```
311
- <!--End PulumiCodeChooser -->
312
315
 
313
316
  ### Non-Exclusive Member Groups
314
317
 
315
- <!--Start PulumiCodeChooser -->
316
318
  ```python
317
319
  import pulumi
318
320
  import pulumi_vault as vault
319
321
 
320
322
  internal = vault.identity.Group("internal",
323
+ name="internal",
321
324
  type="internal",
322
325
  external_member_group_ids=True,
323
326
  metadata={
324
327
  "version": "2",
325
328
  })
326
- users = vault.identity.Group("users", metadata={
327
- "version": "2",
328
- })
329
+ users = vault.identity.Group("users",
330
+ name="users",
331
+ metadata={
332
+ "version": "2",
333
+ })
329
334
  members = vault.identity.GroupMemberGroupIds("members",
330
335
  exclusive=False,
331
336
  member_group_ids=[users.id],
332
337
  group_id=internal.id)
333
338
  ```
334
- <!--End PulumiCodeChooser -->
335
339
 
336
340
  :param str resource_name: The name of the resource.
337
341
  :param GroupMemberGroupIdsArgs args: The arguments to use to populate this resource's properties.
@@ -214,12 +214,12 @@ class GroupPolicies(pulumi.CustomResource):
214
214
 
215
215
  ### Exclusive Policies
216
216
 
217
- <!--Start PulumiCodeChooser -->
218
217
  ```python
219
218
  import pulumi
220
219
  import pulumi_vault as vault
221
220
 
222
221
  internal = vault.identity.Group("internal",
222
+ name="internal",
223
223
  type="internal",
224
224
  external_policies=True,
225
225
  metadata={
@@ -233,16 +233,15 @@ class GroupPolicies(pulumi.CustomResource):
233
233
  exclusive=True,
234
234
  group_id=internal.id)
235
235
  ```
236
- <!--End PulumiCodeChooser -->
237
236
 
238
237
  ### Non-exclusive Policies
239
238
 
240
- <!--Start PulumiCodeChooser -->
241
239
  ```python
242
240
  import pulumi
243
241
  import pulumi_vault as vault
244
242
 
245
243
  internal = vault.identity.Group("internal",
244
+ name="internal",
246
245
  type="internal",
247
246
  external_policies=True,
248
247
  metadata={
@@ -260,7 +259,6 @@ class GroupPolicies(pulumi.CustomResource):
260
259
  exclusive=False,
261
260
  group_id=internal.id)
262
261
  ```
263
- <!--End PulumiCodeChooser -->
264
262
 
265
263
  :param str resource_name: The name of the resource.
266
264
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -289,12 +287,12 @@ class GroupPolicies(pulumi.CustomResource):
289
287
 
290
288
  ### Exclusive Policies
291
289
 
292
- <!--Start PulumiCodeChooser -->
293
290
  ```python
294
291
  import pulumi
295
292
  import pulumi_vault as vault
296
293
 
297
294
  internal = vault.identity.Group("internal",
295
+ name="internal",
298
296
  type="internal",
299
297
  external_policies=True,
300
298
  metadata={
@@ -308,16 +306,15 @@ class GroupPolicies(pulumi.CustomResource):
308
306
  exclusive=True,
309
307
  group_id=internal.id)
310
308
  ```
311
- <!--End PulumiCodeChooser -->
312
309
 
313
310
  ### Non-exclusive Policies
314
311
 
315
- <!--Start PulumiCodeChooser -->
316
312
  ```python
317
313
  import pulumi
318
314
  import pulumi_vault as vault
319
315
 
320
316
  internal = vault.identity.Group("internal",
317
+ name="internal",
321
318
  type="internal",
322
319
  external_policies=True,
323
320
  metadata={
@@ -335,7 +332,6 @@ class GroupPolicies(pulumi.CustomResource):
335
332
  exclusive=False,
336
333
  group_id=internal.id)
337
334
  ```
338
- <!--End PulumiCodeChooser -->
339
335
 
340
336
  :param str resource_name: The name of the resource.
341
337
  :param GroupPoliciesArgs args: The arguments to use to populate this resource's properties.
@@ -378,17 +378,15 @@ class MfaDuo(pulumi.CustomResource):
378
378
 
379
379
  ## Example Usage
380
380
 
381
- <!--Start PulumiCodeChooser -->
382
381
  ```python
383
382
  import pulumi
384
383
  import pulumi_vault as vault
385
384
 
386
385
  example = vault.identity.MfaDuo("example",
387
386
  api_hostname="api-xxxxxxxx.duosecurity.com",
388
- integration_key="secret-int-key",
389
- secret_key="secret-key")
387
+ secret_key="secret-key",
388
+ integration_key="secret-int-key")
390
389
  ```
391
- <!--End PulumiCodeChooser -->
392
390
 
393
391
  ## Import
394
392
 
@@ -419,17 +417,15 @@ class MfaDuo(pulumi.CustomResource):
419
417
 
420
418
  ## Example Usage
421
419
 
422
- <!--Start PulumiCodeChooser -->
423
420
  ```python
424
421
  import pulumi
425
422
  import pulumi_vault as vault
426
423
 
427
424
  example = vault.identity.MfaDuo("example",
428
425
  api_hostname="api-xxxxxxxx.duosecurity.com",
429
- integration_key="secret-int-key",
430
- secret_key="secret-key")
426
+ secret_key="secret-key",
427
+ integration_key="secret-int-key")
431
428
  ```
432
- <!--End PulumiCodeChooser -->
433
429
 
434
430
  ## Import
435
431
 
@@ -316,19 +316,19 @@ class MfaLoginEnforcement(pulumi.CustomResource):
316
316
 
317
317
  ## Example Usage
318
318
 
319
- <!--Start PulumiCodeChooser -->
320
319
  ```python
321
320
  import pulumi
322
321
  import pulumi_vault as vault
323
322
 
324
- example_mfa_duo = vault.identity.MfaDuo("exampleMfaDuo",
323
+ example = vault.identity.MfaDuo("example",
325
324
  secret_key="secret-key",
326
325
  integration_key="int-key",
327
326
  api_hostname="foo.baz",
328
327
  push_info="push-info")
329
- example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("exampleMfaLoginEnforcement", mfa_method_ids=[example_mfa_duo.method_id])
328
+ example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
329
+ name="default",
330
+ mfa_method_ids=[example.method_id])
330
331
  ```
331
- <!--End PulumiCodeChooser -->
332
332
 
333
333
  ## Import
334
334
 
@@ -359,19 +359,19 @@ class MfaLoginEnforcement(pulumi.CustomResource):
359
359
 
360
360
  ## Example Usage
361
361
 
362
- <!--Start PulumiCodeChooser -->
363
362
  ```python
364
363
  import pulumi
365
364
  import pulumi_vault as vault
366
365
 
367
- example_mfa_duo = vault.identity.MfaDuo("exampleMfaDuo",
366
+ example = vault.identity.MfaDuo("example",
368
367
  secret_key="secret-key",
369
368
  integration_key="int-key",
370
369
  api_hostname="foo.baz",
371
370
  push_info="push-info")
372
- example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("exampleMfaLoginEnforcement", mfa_method_ids=[example_mfa_duo.method_id])
371
+ example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
372
+ name="default",
373
+ mfa_method_ids=[example.method_id])
373
374
  ```
374
- <!--End PulumiCodeChooser -->
375
375
 
376
376
  ## Import
377
377
 
@@ -346,17 +346,15 @@ class MfaOkta(pulumi.CustomResource):
346
346
 
347
347
  ## Example Usage
348
348
 
349
- <!--Start PulumiCodeChooser -->
350
349
  ```python
351
350
  import pulumi
352
351
  import pulumi_vault as vault
353
352
 
354
353
  example = vault.identity.MfaOkta("example",
354
+ org_name="org1",
355
355
  api_token="token1",
356
- base_url="qux.baz.com",
357
- org_name="org1")
356
+ base_url="qux.baz.com")
358
357
  ```
359
- <!--End PulumiCodeChooser -->
360
358
 
361
359
  ## Import
362
360
 
@@ -386,17 +384,15 @@ class MfaOkta(pulumi.CustomResource):
386
384
 
387
385
  ## Example Usage
388
386
 
389
- <!--Start PulumiCodeChooser -->
390
387
  ```python
391
388
  import pulumi
392
389
  import pulumi_vault as vault
393
390
 
394
391
  example = vault.identity.MfaOkta("example",
392
+ org_name="org1",
395
393
  api_token="token1",
396
- base_url="qux.baz.com",
397
- org_name="org1")
394
+ base_url="qux.baz.com")
398
395
  ```
399
- <!--End PulumiCodeChooser -->
400
396
 
401
397
  ## Import
402
398