pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1a1717550614__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/top_level.txt +0 -0
@@ -84,12 +84,11 @@ def get_policy_document(namespace: Optional[str] = None,
84
84
 
85
85
  ## Example Usage
86
86
 
87
- <!--Start PulumiCodeChooser -->
88
87
  ```python
89
88
  import pulumi
90
89
  import pulumi_vault as vault
91
90
 
92
- example_policy_document = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
91
+ example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
93
92
  path="secret/*",
94
93
  capabilities=[
95
94
  "create",
@@ -100,9 +99,10 @@ def get_policy_document(namespace: Optional[str] = None,
100
99
  ],
101
100
  description="allow all on secrets",
102
101
  )])
103
- example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
102
+ example_policy = vault.Policy("example",
103
+ name="example_policy",
104
+ policy=example.hcl)
104
105
  ```
105
- <!--End PulumiCodeChooser -->
106
106
  """
107
107
  __args__ = dict()
108
108
  __args__['namespace'] = namespace
@@ -126,12 +126,11 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
126
126
 
127
127
  ## Example Usage
128
128
 
129
- <!--Start PulumiCodeChooser -->
130
129
  ```python
131
130
  import pulumi
132
131
  import pulumi_vault as vault
133
132
 
134
- example_policy_document = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
133
+ example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
135
134
  path="secret/*",
136
135
  capabilities=[
137
136
  "create",
@@ -142,8 +141,9 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
142
141
  ],
143
142
  description="allow all on secrets",
144
143
  )])
145
- example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
144
+ example_policy = vault.Policy("example",
145
+ name="example_policy",
146
+ policy=example.hcl)
146
147
  ```
147
- <!--End PulumiCodeChooser -->
148
148
  """
149
149
  ...
@@ -190,7 +190,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
190
190
  """
191
191
  ## Example Usage
192
192
 
193
- <!--Start PulumiCodeChooser -->
194
193
  ```python
195
194
  import pulumi
196
195
  import pulumi_vault as vault
@@ -198,7 +197,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
198
197
  main = vault.get_raft_autopilot_state()
199
198
  pulumi.export("failure-tolerance", main.failure_tolerance)
200
199
  ```
201
- <!--End PulumiCodeChooser -->
202
200
 
203
201
 
204
202
  :param str namespace: The namespace of the target resource.
@@ -233,7 +231,6 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
233
231
  """
234
232
  ## Example Usage
235
233
 
236
- <!--Start PulumiCodeChooser -->
237
234
  ```python
238
235
  import pulumi
239
236
  import pulumi_vault as vault
@@ -241,7 +238,6 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
241
238
  main = vault.get_raft_autopilot_state()
242
239
  pulumi.export("failure-tolerance", main.failure_tolerance)
243
240
  ```
244
- <!--End PulumiCodeChooser -->
245
241
 
246
242
 
247
243
  :param str namespace: The namespace of the target resource.
@@ -714,14 +714,12 @@ class AuthBackend(pulumi.CustomResource):
714
714
 
715
715
  ## Example Usage
716
716
 
717
- <!--Start PulumiCodeChooser -->
718
717
  ```python
719
718
  import pulumi
720
719
  import pulumi_vault as vault
721
720
 
722
721
  example = vault.github.AuthBackend("example", organization="myorg")
723
722
  ```
724
- <!--End PulumiCodeChooser -->
725
723
 
726
724
  ## Import
727
725
 
@@ -788,14 +786,12 @@ class AuthBackend(pulumi.CustomResource):
788
786
 
789
787
  ## Example Usage
790
788
 
791
- <!--Start PulumiCodeChooser -->
792
789
  ```python
793
790
  import pulumi
794
791
  import pulumi_vault as vault
795
792
 
796
793
  example = vault.github.AuthBackend("example", organization="myorg")
797
794
  ```
798
- <!--End PulumiCodeChooser -->
799
795
 
800
796
  ## Import
801
797
 
@@ -191,13 +191,12 @@ class Team(pulumi.CustomResource):
191
191
 
192
192
  ## Example Usage
193
193
 
194
- <!--Start PulumiCodeChooser -->
195
194
  ```python
196
195
  import pulumi
197
196
  import pulumi_vault as vault
198
197
 
199
198
  example = vault.github.AuthBackend("example", organization="myorg")
200
- tf_devs = vault.github.Team("tfDevs",
199
+ tf_devs = vault.github.Team("tf_devs",
201
200
  backend=example.id,
202
201
  team="terraform-developers",
203
202
  policies=[
@@ -205,7 +204,6 @@ class Team(pulumi.CustomResource):
205
204
  "read-only",
206
205
  ])
207
206
  ```
208
- <!--End PulumiCodeChooser -->
209
207
 
210
208
  ## Import
211
209
 
@@ -240,13 +238,12 @@ class Team(pulumi.CustomResource):
240
238
 
241
239
  ## Example Usage
242
240
 
243
- <!--Start PulumiCodeChooser -->
244
241
  ```python
245
242
  import pulumi
246
243
  import pulumi_vault as vault
247
244
 
248
245
  example = vault.github.AuthBackend("example", organization="myorg")
249
- tf_devs = vault.github.Team("tfDevs",
246
+ tf_devs = vault.github.Team("tf_devs",
250
247
  backend=example.id,
251
248
  team="terraform-developers",
252
249
  policies=[
@@ -254,7 +251,6 @@ class Team(pulumi.CustomResource):
254
251
  "read-only",
255
252
  ])
256
253
  ```
257
- <!--End PulumiCodeChooser -->
258
254
 
259
255
  ## Import
260
256
 
@@ -191,13 +191,12 @@ class User(pulumi.CustomResource):
191
191
 
192
192
  ## Example Usage
193
193
 
194
- <!--Start PulumiCodeChooser -->
195
194
  ```python
196
195
  import pulumi
197
196
  import pulumi_vault as vault
198
197
 
199
198
  example = vault.github.AuthBackend("example", organization="myorg")
200
- tf_user = vault.github.User("tfUser",
199
+ tf_user = vault.github.User("tf_user",
201
200
  backend=example.id,
202
201
  user="john.doe",
203
202
  policies=[
@@ -205,7 +204,6 @@ class User(pulumi.CustomResource):
205
204
  "read-only",
206
205
  ])
207
206
  ```
208
- <!--End PulumiCodeChooser -->
209
207
 
210
208
  ## Import
211
209
 
@@ -240,13 +238,12 @@ class User(pulumi.CustomResource):
240
238
 
241
239
  ## Example Usage
242
240
 
243
- <!--Start PulumiCodeChooser -->
244
241
  ```python
245
242
  import pulumi
246
243
  import pulumi_vault as vault
247
244
 
248
245
  example = vault.github.AuthBackend("example", organization="myorg")
249
- tf_user = vault.github.User("tfUser",
246
+ tf_user = vault.github.User("tf_user",
250
247
  backend=example.id,
251
248
  user="john.doe",
252
249
  policies=[
@@ -254,7 +251,6 @@ class User(pulumi.CustomResource):
254
251
  "read-only",
255
252
  ])
256
253
  ```
257
- <!--End PulumiCodeChooser -->
258
254
 
259
255
  ## Import
260
256
 
@@ -246,18 +246,17 @@ class Entity(pulumi.CustomResource):
246
246
  """
247
247
  ## Example Usage
248
248
 
249
- <!--Start PulumiCodeChooser -->
250
249
  ```python
251
250
  import pulumi
252
251
  import pulumi_vault as vault
253
252
 
254
253
  test = vault.identity.Entity("test",
254
+ name="tester1",
255
+ policies=["test"],
255
256
  metadata={
256
257
  "foo": "bar",
257
- },
258
- policies=["test"])
258
+ })
259
259
  ```
260
- <!--End PulumiCodeChooser -->
261
260
 
262
261
  ## Import
263
262
 
@@ -288,18 +287,17 @@ class Entity(pulumi.CustomResource):
288
287
  """
289
288
  ## Example Usage
290
289
 
291
- <!--Start PulumiCodeChooser -->
292
290
  ```python
293
291
  import pulumi
294
292
  import pulumi_vault as vault
295
293
 
296
294
  test = vault.identity.Entity("test",
295
+ name="tester1",
296
+ policies=["test"],
297
297
  metadata={
298
298
  "foo": "bar",
299
- },
300
- policies=["test"])
299
+ })
301
300
  ```
302
- <!--End PulumiCodeChooser -->
303
301
 
304
302
  ## Import
305
303
 
@@ -211,16 +211,15 @@ class EntityAlias(pulumi.CustomResource):
211
211
  """
212
212
  ## Example Usage
213
213
 
214
- <!--Start PulumiCodeChooser -->
215
214
  ```python
216
215
  import pulumi
217
216
  import pulumi_vault as vault
218
217
 
219
218
  test = vault.identity.EntityAlias("test",
220
- canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
221
- mount_accessor="token_1f2bd5")
219
+ name="user_1",
220
+ mount_accessor="token_1f2bd5",
221
+ canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
222
222
  ```
223
- <!--End PulumiCodeChooser -->
224
223
 
225
224
  ## Import
226
225
 
@@ -250,16 +249,15 @@ class EntityAlias(pulumi.CustomResource):
250
249
  """
251
250
  ## Example Usage
252
251
 
253
- <!--Start PulumiCodeChooser -->
254
252
  ```python
255
253
  import pulumi
256
254
  import pulumi_vault as vault
257
255
 
258
256
  test = vault.identity.EntityAlias("test",
259
- canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
260
- mount_accessor="token_1f2bd5")
257
+ name="user_1",
258
+ mount_accessor="token_1f2bd5",
259
+ canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
261
260
  ```
262
- <!--End PulumiCodeChooser -->
263
261
 
264
262
  ## Import
265
263
 
@@ -214,12 +214,13 @@ class EntityPolicies(pulumi.CustomResource):
214
214
 
215
215
  ### Exclusive Policies
216
216
 
217
- <!--Start PulumiCodeChooser -->
218
217
  ```python
219
218
  import pulumi
220
219
  import pulumi_vault as vault
221
220
 
222
- entity = vault.identity.Entity("entity", external_policies=True)
221
+ entity = vault.identity.Entity("entity",
222
+ name="entity",
223
+ external_policies=True)
223
224
  policies = vault.identity.EntityPolicies("policies",
224
225
  policies=[
225
226
  "default",
@@ -228,16 +229,16 @@ class EntityPolicies(pulumi.CustomResource):
228
229
  exclusive=True,
229
230
  entity_id=entity.id)
230
231
  ```
231
- <!--End PulumiCodeChooser -->
232
232
 
233
233
  ### Non-exclusive Policies
234
234
 
235
- <!--Start PulumiCodeChooser -->
236
235
  ```python
237
236
  import pulumi
238
237
  import pulumi_vault as vault
239
238
 
240
- entity = vault.identity.Entity("entity", external_policies=True)
239
+ entity = vault.identity.Entity("entity",
240
+ name="entity",
241
+ external_policies=True)
241
242
  default = vault.identity.EntityPolicies("default",
242
243
  policies=[
243
244
  "default",
@@ -250,7 +251,6 @@ class EntityPolicies(pulumi.CustomResource):
250
251
  exclusive=False,
251
252
  entity_id=entity.id)
252
253
  ```
253
- <!--End PulumiCodeChooser -->
254
254
 
255
255
  :param str resource_name: The name of the resource.
256
256
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -279,12 +279,13 @@ class EntityPolicies(pulumi.CustomResource):
279
279
 
280
280
  ### Exclusive Policies
281
281
 
282
- <!--Start PulumiCodeChooser -->
283
282
  ```python
284
283
  import pulumi
285
284
  import pulumi_vault as vault
286
285
 
287
- entity = vault.identity.Entity("entity", external_policies=True)
286
+ entity = vault.identity.Entity("entity",
287
+ name="entity",
288
+ external_policies=True)
288
289
  policies = vault.identity.EntityPolicies("policies",
289
290
  policies=[
290
291
  "default",
@@ -293,16 +294,16 @@ class EntityPolicies(pulumi.CustomResource):
293
294
  exclusive=True,
294
295
  entity_id=entity.id)
295
296
  ```
296
- <!--End PulumiCodeChooser -->
297
297
 
298
298
  ### Non-exclusive Policies
299
299
 
300
- <!--Start PulumiCodeChooser -->
301
300
  ```python
302
301
  import pulumi
303
302
  import pulumi_vault as vault
304
303
 
305
- entity = vault.identity.Entity("entity", external_policies=True)
304
+ entity = vault.identity.Entity("entity",
305
+ name="entity",
306
+ external_policies=True)
306
307
  default = vault.identity.EntityPolicies("default",
307
308
  policies=[
308
309
  "default",
@@ -315,7 +316,6 @@ class EntityPolicies(pulumi.CustomResource):
315
316
  exclusive=False,
316
317
  entity_id=entity.id)
317
318
  ```
318
- <!--End PulumiCodeChooser -->
319
319
 
320
320
  :param str resource_name: The name of the resource.
321
321
  :param EntityPoliciesArgs args: The arguments to use to populate this resource's properties.
@@ -254,14 +254,12 @@ def get_entity(alias_id: Optional[str] = None,
254
254
  """
255
255
  ## Example Usage
256
256
 
257
- <!--Start PulumiCodeChooser -->
258
257
  ```python
259
258
  import pulumi
260
259
  import pulumi_vault as vault
261
260
 
262
261
  entity = vault.identity.get_entity(entity_name="entity_12345")
263
262
  ```
264
- <!--End PulumiCodeChooser -->
265
263
 
266
264
  ## Required Vault Capabilities
267
265
 
@@ -326,14 +324,12 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
326
324
  """
327
325
  ## Example Usage
328
326
 
329
- <!--Start PulumiCodeChooser -->
330
327
  ```python
331
328
  import pulumi
332
329
  import pulumi_vault as vault
333
330
 
334
331
  entity = vault.identity.get_entity(entity_name="entity_12345")
335
332
  ```
336
- <!--End PulumiCodeChooser -->
337
333
 
338
334
  ## Required Vault Capabilities
339
335
 
@@ -325,14 +325,12 @@ def get_group(alias_id: Optional[str] = None,
325
325
  """
326
326
  ## Example Usage
327
327
 
328
- <!--Start PulumiCodeChooser -->
329
328
  ```python
330
329
  import pulumi
331
330
  import pulumi_vault as vault
332
331
 
333
332
  group = vault.identity.get_group(group_name="user")
334
333
  ```
335
- <!--End PulumiCodeChooser -->
336
334
 
337
335
  ## Required Vault Capabilities
338
336
 
@@ -403,14 +401,12 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
403
401
  """
404
402
  ## Example Usage
405
403
 
406
- <!--Start PulumiCodeChooser -->
407
404
  ```python
408
405
  import pulumi
409
406
  import pulumi_vault as vault
410
407
 
411
408
  group = vault.identity.get_group(group_name="user")
412
409
  ```
413
- <!--End PulumiCodeChooser -->
414
410
 
415
411
  ## Required Vault Capabilities
416
412
 
@@ -93,12 +93,12 @@ def get_oidc_client_creds(name: Optional[str] = None,
93
93
  """
94
94
  ## Example Usage
95
95
 
96
- <!--Start PulumiCodeChooser -->
97
96
  ```python
98
97
  import pulumi
99
98
  import pulumi_vault as vault
100
99
 
101
100
  app = vault.identity.OidcClient("app",
101
+ name="application",
102
102
  redirect_uris=[
103
103
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
104
104
  "http://127.0.0.1:8251/callback",
@@ -108,7 +108,6 @@ def get_oidc_client_creds(name: Optional[str] = None,
108
108
  access_token_ttl=7200)
109
109
  creds = vault.identity.get_oidc_client_creds_output(name=app.name)
110
110
  ```
111
- <!--End PulumiCodeChooser -->
112
111
 
113
112
 
114
113
  :param str name: The name of the OIDC Client in Vault.
@@ -138,12 +137,12 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
138
137
  """
139
138
  ## Example Usage
140
139
 
141
- <!--Start PulumiCodeChooser -->
142
140
  ```python
143
141
  import pulumi
144
142
  import pulumi_vault as vault
145
143
 
146
144
  app = vault.identity.OidcClient("app",
145
+ name="application",
147
146
  redirect_uris=[
148
147
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
149
148
  "http://127.0.0.1:8251/callback",
@@ -153,7 +152,6 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
153
152
  access_token_ttl=7200)
154
153
  creds = vault.identity.get_oidc_client_creds_output(name=app.name)
155
154
  ```
156
- <!--End PulumiCodeChooser -->
157
155
 
158
156
 
159
157
  :param str name: The name of the OIDC Client in Vault.
@@ -214,16 +214,17 @@ def get_oidc_openid_config(name: Optional[str] = None,
214
214
  """
215
215
  ## Example Usage
216
216
 
217
- <!--Start PulumiCodeChooser -->
218
217
  ```python
219
218
  import pulumi
220
219
  import pulumi_vault as vault
221
220
 
222
221
  key = vault.identity.OidcKey("key",
222
+ name="key",
223
223
  allowed_client_ids=["*"],
224
224
  rotation_period=3600,
225
225
  verification_ttl=3600)
226
226
  app = vault.identity.OidcClient("app",
227
+ name="application",
227
228
  key=key.name,
228
229
  redirect_uris=[
229
230
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -232,10 +233,11 @@ def get_oidc_openid_config(name: Optional[str] = None,
232
233
  ],
233
234
  id_token_ttl=2400,
234
235
  access_token_ttl=7200)
235
- provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
236
+ provider = vault.identity.OidcProvider("provider",
237
+ name="provider",
238
+ allowed_client_ids=[test["clientId"]])
236
239
  config = vault.identity.get_oidc_openid_config_output(name=provider.name)
237
240
  ```
238
- <!--End PulumiCodeChooser -->
239
241
 
240
242
 
241
243
  :param str name: The name of the OIDC Provider in Vault.
@@ -275,16 +277,17 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
275
277
  """
276
278
  ## Example Usage
277
279
 
278
- <!--Start PulumiCodeChooser -->
279
280
  ```python
280
281
  import pulumi
281
282
  import pulumi_vault as vault
282
283
 
283
284
  key = vault.identity.OidcKey("key",
285
+ name="key",
284
286
  allowed_client_ids=["*"],
285
287
  rotation_period=3600,
286
288
  verification_ttl=3600)
287
289
  app = vault.identity.OidcClient("app",
290
+ name="application",
288
291
  key=key.name,
289
292
  redirect_uris=[
290
293
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -293,10 +296,11 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
293
296
  ],
294
297
  id_token_ttl=2400,
295
298
  access_token_ttl=7200)
296
- provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
299
+ provider = vault.identity.OidcProvider("provider",
300
+ name="provider",
301
+ allowed_client_ids=[test["clientId"]])
297
302
  config = vault.identity.get_oidc_openid_config_output(name=provider.name)
298
303
  ```
299
- <!--End PulumiCodeChooser -->
300
304
 
301
305
 
302
306
  :param str name: The name of the OIDC Provider in Vault.
@@ -81,16 +81,17 @@ def get_oidc_public_keys(name: Optional[str] = None,
81
81
  """
82
82
  ## Example Usage
83
83
 
84
- <!--Start PulumiCodeChooser -->
85
84
  ```python
86
85
  import pulumi
87
86
  import pulumi_vault as vault
88
87
 
89
88
  key = vault.identity.OidcKey("key",
89
+ name="key",
90
90
  allowed_client_ids=["*"],
91
91
  rotation_period=3600,
92
92
  verification_ttl=3600)
93
93
  app = vault.identity.OidcClient("app",
94
+ name="application",
94
95
  key=key.name,
95
96
  redirect_uris=[
96
97
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -99,10 +100,11 @@ def get_oidc_public_keys(name: Optional[str] = None,
99
100
  ],
100
101
  id_token_ttl=2400,
101
102
  access_token_ttl=7200)
102
- provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
103
+ provider = vault.identity.OidcProvider("provider",
104
+ name="provider",
105
+ allowed_client_ids=[test["clientId"]])
103
106
  public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
104
107
  ```
105
- <!--End PulumiCodeChooser -->
106
108
 
107
109
 
108
110
  :param str name: The name of the OIDC Provider in Vault.
@@ -131,16 +133,17 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
131
133
  """
132
134
  ## Example Usage
133
135
 
134
- <!--Start PulumiCodeChooser -->
135
136
  ```python
136
137
  import pulumi
137
138
  import pulumi_vault as vault
138
139
 
139
140
  key = vault.identity.OidcKey("key",
141
+ name="key",
140
142
  allowed_client_ids=["*"],
141
143
  rotation_period=3600,
142
144
  verification_ttl=3600)
143
145
  app = vault.identity.OidcClient("app",
146
+ name="application",
144
147
  key=key.name,
145
148
  redirect_uris=[
146
149
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -149,10 +152,11 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
149
152
  ],
150
153
  id_token_ttl=2400,
151
154
  access_token_ttl=7200)
152
- provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
155
+ provider = vault.identity.OidcProvider("provider",
156
+ name="provider",
157
+ allowed_client_ids=[test["clientId"]])
153
158
  public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
154
159
  ```
155
- <!--End PulumiCodeChooser -->
156
160
 
157
161
 
158
162
  :param str name: The name of the OIDC Provider in Vault.