pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. pulumi_vault/_inputs.py +20 -0
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +4 -2
  4. pulumi_vault/ad/secret_role.py +4 -0
  5. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +186 -63
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +20 -12
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +10 -6
  13. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  15. pulumi_vault/aws/auth_backend_login.py +8 -0
  16. pulumi_vault/aws/auth_backend_role.py +186 -63
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  18. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  19. pulumi_vault/aws/secret_backend_role.py +4 -2
  20. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  21. pulumi_vault/azure/auth_backend_config.py +10 -6
  22. pulumi_vault/azure/auth_backend_role.py +186 -63
  23. pulumi_vault/azure/backend.py +24 -16
  24. pulumi_vault/azure/backend_role.py +18 -14
  25. pulumi_vault/azure/get_access_credentials.py +4 -0
  26. pulumi_vault/cert_auth_backend_role.py +208 -75
  27. pulumi_vault/consul/secret_backend.py +18 -10
  28. pulumi_vault/consul/secret_backend_role.py +4 -2
  29. pulumi_vault/database/_inputs.py +784 -522
  30. pulumi_vault/database/outputs.py +784 -522
  31. pulumi_vault/database/secret_backend_connection.py +4 -2
  32. pulumi_vault/database/secret_backend_role.py +4 -4
  33. pulumi_vault/database/secret_backend_static_role.py +8 -10
  34. pulumi_vault/database/secrets_mount.py +4 -4
  35. pulumi_vault/egp_policy.py +8 -4
  36. pulumi_vault/gcp/auth_backend.py +36 -0
  37. pulumi_vault/gcp/auth_backend_role.py +264 -63
  38. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  39. pulumi_vault/gcp/secret_backend.py +6 -4
  40. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  41. pulumi_vault/gcp/secret_roleset.py +6 -4
  42. pulumi_vault/gcp/secret_static_account.py +16 -14
  43. pulumi_vault/generic/endpoint.py +8 -4
  44. pulumi_vault/generic/get_secret.py +4 -40
  45. pulumi_vault/get_auth_backend.py +4 -0
  46. pulumi_vault/get_auth_backends.py +8 -0
  47. pulumi_vault/get_namespace.py +12 -0
  48. pulumi_vault/get_namespaces.py +12 -4
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +8 -8
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +4 -0
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +8 -6
  56. pulumi_vault/identity/entity_alias.py +8 -6
  57. pulumi_vault/identity/entity_policies.py +12 -12
  58. pulumi_vault/identity/get_entity.py +4 -0
  59. pulumi_vault/identity/get_group.py +4 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  61. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  62. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  63. pulumi_vault/identity/group.py +42 -38
  64. pulumi_vault/identity/group_alias.py +4 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  66. pulumi_vault/identity/group_member_group_ids.py +20 -24
  67. pulumi_vault/identity/group_policies.py +8 -4
  68. pulumi_vault/identity/mfa_duo.py +8 -4
  69. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  70. pulumi_vault/identity/mfa_okta.py +8 -4
  71. pulumi_vault/identity/mfa_pingid.py +4 -0
  72. pulumi_vault/identity/mfa_totp.py +4 -0
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -10
  75. pulumi_vault/identity/oidc_client.py +10 -10
  76. pulumi_vault/identity/oidc_key.py +12 -16
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  78. pulumi_vault/identity/oidc_provider.py +16 -22
  79. pulumi_vault/identity/oidc_role.py +20 -28
  80. pulumi_vault/identity/oidc_scope.py +8 -6
  81. pulumi_vault/jwt/auth_backend.py +32 -20
  82. pulumi_vault/jwt/auth_backend_role.py +190 -63
  83. pulumi_vault/kmip/secret_backend.py +14 -10
  84. pulumi_vault/kmip/secret_role.py +4 -0
  85. pulumi_vault/kmip/secret_scope.py +4 -0
  86. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  87. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  88. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  89. pulumi_vault/kubernetes/secret_backend.py +8 -6
  90. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  91. pulumi_vault/kv/get_secret.py +4 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  93. pulumi_vault/kv/get_secret_v2.py +0 -58
  94. pulumi_vault/kv/get_secrets_list.py +8 -4
  95. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  96. pulumi_vault/kv/secret.py +4 -0
  97. pulumi_vault/kv/secret_backend_v2.py +4 -0
  98. pulumi_vault/kv/secret_v2.py +4 -2
  99. pulumi_vault/ldap/auth_backend.py +161 -66
  100. pulumi_vault/ldap/auth_backend_group.py +4 -0
  101. pulumi_vault/ldap/auth_backend_user.py +4 -0
  102. pulumi_vault/ldap/secret_backend.py +8 -4
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  104. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  106. pulumi_vault/managed/_inputs.py +132 -84
  107. pulumi_vault/managed/keys.py +28 -7
  108. pulumi_vault/managed/outputs.py +132 -84
  109. pulumi_vault/mfa_duo.py +6 -4
  110. pulumi_vault/mfa_okta.py +6 -4
  111. pulumi_vault/mfa_pingid.py +6 -4
  112. pulumi_vault/mfa_totp.py +12 -10
  113. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  114. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  115. pulumi_vault/mount.py +42 -26
  116. pulumi_vault/nomad_secret_backend.py +8 -4
  117. pulumi_vault/nomad_secret_role.py +4 -0
  118. pulumi_vault/okta/_inputs.py +8 -8
  119. pulumi_vault/okta/auth_backend.py +10 -6
  120. pulumi_vault/okta/auth_backend_group.py +4 -0
  121. pulumi_vault/okta/auth_backend_user.py +4 -0
  122. pulumi_vault/okta/outputs.py +8 -8
  123. pulumi_vault/outputs.py +20 -0
  124. pulumi_vault/password_policy.py +8 -6
  125. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  126. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  127. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  128. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  129. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  131. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  132. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  133. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  134. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  136. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  137. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  139. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  140. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  141. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  142. pulumi_vault/provider.py +8 -0
  143. pulumi_vault/pulumi-plugin.json +1 -2
  144. pulumi_vault/quota_lease_count.py +8 -6
  145. pulumi_vault/quota_rate_limit.py +4 -2
  146. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  147. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  148. pulumi_vault/raft_autopilot.py +4 -0
  149. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  150. pulumi_vault/rgp_policy.py +6 -2
  151. pulumi_vault/saml/auth_backend.py +12 -8
  152. pulumi_vault/saml/auth_backend_role.py +178 -64
  153. pulumi_vault/secrets/sync_association.py +10 -12
  154. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  155. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  156. pulumi_vault/secrets/sync_config.py +6 -2
  157. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  158. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  159. pulumi_vault/secrets/sync_github_apps.py +8 -8
  160. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  161. pulumi_vault/ssh/_inputs.py +32 -6
  162. pulumi_vault/ssh/outputs.py +32 -6
  163. pulumi_vault/ssh/secret_backend_ca.py +4 -0
  164. pulumi_vault/ssh/secret_backend_role.py +4 -4
  165. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  166. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  167. pulumi_vault/terraformcloud/secret_role.py +69 -2
  168. pulumi_vault/token.py +18 -14
  169. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  170. pulumi_vault/transform/alphabet.py +6 -4
  171. pulumi_vault/transform/get_decode.py +4 -4
  172. pulumi_vault/transform/get_encode.py +4 -4
  173. pulumi_vault/transform/role.py +6 -4
  174. pulumi_vault/transform/template.py +4 -4
  175. pulumi_vault/transit/get_decrypt.py +20 -4
  176. pulumi_vault/transit/get_encrypt.py +14 -0
  177. pulumi_vault/transit/secret_backend_key.py +6 -6
  178. pulumi_vault/transit/secret_cache_config.py +4 -0
  179. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  180. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
  182. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
  183. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -923,6 +923,7 @@ class SecretBackendConnection(pulumi.CustomResource):
923
923
  """
924
924
  ## Example Usage
925
925
 
926
+ <!--Start PulumiCodeChooser -->
926
927
  ```python
927
928
  import pulumi
928
929
  import pulumi_vault as vault
@@ -932,7 +933,6 @@ class SecretBackendConnection(pulumi.CustomResource):
932
933
  type="database")
933
934
  postgres = vault.database.SecretBackendConnection("postgres",
934
935
  backend=db.path,
935
- name="postgres",
936
936
  allowed_roles=[
937
937
  "dev",
938
938
  "prod",
@@ -941,6 +941,7 @@ class SecretBackendConnection(pulumi.CustomResource):
941
941
  connection_url="postgres://username:password@host:port/database",
942
942
  ))
943
943
  ```
944
+ <!--End PulumiCodeChooser -->
944
945
 
945
946
  ## Import
946
947
 
@@ -995,6 +996,7 @@ class SecretBackendConnection(pulumi.CustomResource):
995
996
  """
996
997
  ## Example Usage
997
998
 
999
+ <!--Start PulumiCodeChooser -->
998
1000
  ```python
999
1001
  import pulumi
1000
1002
  import pulumi_vault as vault
@@ -1004,7 +1006,6 @@ class SecretBackendConnection(pulumi.CustomResource):
1004
1006
  type="database")
1005
1007
  postgres = vault.database.SecretBackendConnection("postgres",
1006
1008
  backend=db.path,
1007
- name="postgres",
1008
1009
  allowed_roles=[
1009
1010
  "dev",
1010
1011
  "prod",
@@ -1013,6 +1014,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1013
1014
  connection_url="postgres://username:password@host:port/database",
1014
1015
  ))
1015
1016
  ```
1017
+ <!--End PulumiCodeChooser -->
1016
1018
 
1017
1019
  ## Import
1018
1020
 
@@ -489,6 +489,7 @@ class SecretBackendRole(pulumi.CustomResource):
489
489
  """
490
490
  ## Example Usage
491
491
 
492
+ <!--Start PulumiCodeChooser -->
492
493
  ```python
493
494
  import pulumi
494
495
  import pulumi_vault as vault
@@ -498,7 +499,6 @@ class SecretBackendRole(pulumi.CustomResource):
498
499
  type="database")
499
500
  postgres = vault.database.SecretBackendConnection("postgres",
500
501
  backend=db.path,
501
- name="postgres",
502
502
  allowed_roles=[
503
503
  "dev",
504
504
  "prod",
@@ -508,10 +508,10 @@ class SecretBackendRole(pulumi.CustomResource):
508
508
  ))
509
509
  role = vault.database.SecretBackendRole("role",
510
510
  backend=db.path,
511
- name="dev",
512
511
  db_name=postgres.name,
513
512
  creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
514
513
  ```
514
+ <!--End PulumiCodeChooser -->
515
515
 
516
516
  ## Import
517
517
 
@@ -560,6 +560,7 @@ class SecretBackendRole(pulumi.CustomResource):
560
560
  """
561
561
  ## Example Usage
562
562
 
563
+ <!--Start PulumiCodeChooser -->
563
564
  ```python
564
565
  import pulumi
565
566
  import pulumi_vault as vault
@@ -569,7 +570,6 @@ class SecretBackendRole(pulumi.CustomResource):
569
570
  type="database")
570
571
  postgres = vault.database.SecretBackendConnection("postgres",
571
572
  backend=db.path,
572
- name="postgres",
573
573
  allowed_roles=[
574
574
  "dev",
575
575
  "prod",
@@ -579,10 +579,10 @@ class SecretBackendRole(pulumi.CustomResource):
579
579
  ))
580
580
  role = vault.database.SecretBackendRole("role",
581
581
  backend=db.path,
582
- name="dev",
583
582
  db_name=postgres.name,
584
583
  creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
585
584
  ```
585
+ <!--End PulumiCodeChooser -->
586
586
 
587
587
  ## Import
588
588
 
@@ -370,6 +370,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
370
370
 
371
371
  ## Example Usage
372
372
 
373
+ <!--Start PulumiCodeChooser -->
373
374
  ```python
374
375
  import pulumi
375
376
  import pulumi_vault as vault
@@ -379,29 +380,27 @@ class SecretBackendStaticRole(pulumi.CustomResource):
379
380
  type="database")
380
381
  postgres = vault.database.SecretBackendConnection("postgres",
381
382
  backend=db.path,
382
- name="postgres",
383
383
  allowed_roles=["*"],
384
384
  postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
385
385
  connection_url="postgres://username:password@host:port/database",
386
386
  ))
387
387
  # configure a static role with period-based rotations
388
- period_role = vault.database.SecretBackendStaticRole("period_role",
388
+ period_role = vault.database.SecretBackendStaticRole("periodRole",
389
389
  backend=db.path,
390
- name="my-period-role",
391
390
  db_name=postgres.name,
392
391
  username="example",
393
392
  rotation_period=3600,
394
393
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
395
394
  # configure a static role with schedule-based rotations
396
- schedule_role = vault.database.SecretBackendStaticRole("schedule_role",
395
+ schedule_role = vault.database.SecretBackendStaticRole("scheduleRole",
397
396
  backend=db.path,
398
- name="my-schedule-role",
399
397
  db_name=postgres.name,
400
398
  username="example",
401
399
  rotation_schedule="0 0 * * SAT",
402
400
  rotation_window=172800,
403
401
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
404
402
  ```
403
+ <!--End PulumiCodeChooser -->
405
404
 
406
405
  ## Import
407
406
 
@@ -445,6 +444,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
445
444
 
446
445
  ## Example Usage
447
446
 
447
+ <!--Start PulumiCodeChooser -->
448
448
  ```python
449
449
  import pulumi
450
450
  import pulumi_vault as vault
@@ -454,29 +454,27 @@ class SecretBackendStaticRole(pulumi.CustomResource):
454
454
  type="database")
455
455
  postgres = vault.database.SecretBackendConnection("postgres",
456
456
  backend=db.path,
457
- name="postgres",
458
457
  allowed_roles=["*"],
459
458
  postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
460
459
  connection_url="postgres://username:password@host:port/database",
461
460
  ))
462
461
  # configure a static role with period-based rotations
463
- period_role = vault.database.SecretBackendStaticRole("period_role",
462
+ period_role = vault.database.SecretBackendStaticRole("periodRole",
464
463
  backend=db.path,
465
- name="my-period-role",
466
464
  db_name=postgres.name,
467
465
  username="example",
468
466
  rotation_period=3600,
469
467
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
470
468
  # configure a static role with schedule-based rotations
471
- schedule_role = vault.database.SecretBackendStaticRole("schedule_role",
469
+ schedule_role = vault.database.SecretBackendStaticRole("scheduleRole",
472
470
  backend=db.path,
473
- name="my-schedule-role",
474
471
  db_name=postgres.name,
475
472
  username="example",
476
473
  rotation_schedule="0 0 * * SAT",
477
474
  rotation_window=172800,
478
475
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
479
476
  ```
477
+ <!--End PulumiCodeChooser -->
480
478
 
481
479
  ## Import
482
480
 
@@ -1139,6 +1139,7 @@ class SecretsMount(pulumi.CustomResource):
1139
1139
  """
1140
1140
  ## Example Usage
1141
1141
 
1142
+ <!--Start PulumiCodeChooser -->
1142
1143
  ```python
1143
1144
  import pulumi
1144
1145
  import pulumi_vault as vault
@@ -1161,7 +1162,6 @@ class SecretsMount(pulumi.CustomResource):
1161
1162
  allowed_roles=["dev2"],
1162
1163
  )])
1163
1164
  dev1 = vault.database.SecretBackendRole("dev1",
1164
- name="dev1",
1165
1165
  backend=db.path,
1166
1166
  db_name=db.mssqls[0].name,
1167
1167
  creation_statements=[
@@ -1170,7 +1170,6 @@ class SecretsMount(pulumi.CustomResource):
1170
1170
  "GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
1171
1171
  ])
1172
1172
  dev2 = vault.database.SecretBackendRole("dev2",
1173
- name="dev2",
1174
1173
  backend=db.path,
1175
1174
  db_name=db.postgresqls[0].name,
1176
1175
  creation_statements=[
@@ -1178,6 +1177,7 @@ class SecretsMount(pulumi.CustomResource):
1178
1177
  "GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
1179
1178
  ])
1180
1179
  ```
1180
+ <!--End PulumiCodeChooser -->
1181
1181
 
1182
1182
  ## Import
1183
1183
 
@@ -1249,6 +1249,7 @@ class SecretsMount(pulumi.CustomResource):
1249
1249
  """
1250
1250
  ## Example Usage
1251
1251
 
1252
+ <!--Start PulumiCodeChooser -->
1252
1253
  ```python
1253
1254
  import pulumi
1254
1255
  import pulumi_vault as vault
@@ -1271,7 +1272,6 @@ class SecretsMount(pulumi.CustomResource):
1271
1272
  allowed_roles=["dev2"],
1272
1273
  )])
1273
1274
  dev1 = vault.database.SecretBackendRole("dev1",
1274
- name="dev1",
1275
1275
  backend=db.path,
1276
1276
  db_name=db.mssqls[0].name,
1277
1277
  creation_statements=[
@@ -1280,7 +1280,6 @@ class SecretsMount(pulumi.CustomResource):
1280
1280
  "GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
1281
1281
  ])
1282
1282
  dev2 = vault.database.SecretBackendRole("dev2",
1283
- name="dev2",
1284
1283
  backend=db.path,
1285
1284
  db_name=db.postgresqls[0].name,
1286
1285
  creation_statements=[
@@ -1288,6 +1287,7 @@ class SecretsMount(pulumi.CustomResource):
1288
1287
  "GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
1289
1288
  ])
1290
1289
  ```
1290
+ <!--End PulumiCodeChooser -->
1291
1291
 
1292
1292
  ## Import
1293
1293
 
@@ -214,19 +214,21 @@ class EgpPolicy(pulumi.CustomResource):
214
214
 
215
215
  ## Example Usage
216
216
 
217
+ <!--Start PulumiCodeChooser -->
217
218
  ```python
218
219
  import pulumi
219
220
  import pulumi_vault as vault
220
221
 
221
222
  allow_all = vault.EgpPolicy("allow-all",
222
- name="allow-all",
223
- paths=["*"],
224
223
  enforcement_level="soft-mandatory",
224
+ paths=["*"],
225
225
  policy=\"\"\"main = rule {
226
226
  true
227
227
  }
228
+
228
229
  \"\"\")
229
230
  ```
231
+ <!--End PulumiCodeChooser -->
230
232
 
231
233
  :param str resource_name: The name of the resource.
232
234
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -252,19 +254,21 @@ class EgpPolicy(pulumi.CustomResource):
252
254
 
253
255
  ## Example Usage
254
256
 
257
+ <!--Start PulumiCodeChooser -->
255
258
  ```python
256
259
  import pulumi
257
260
  import pulumi_vault as vault
258
261
 
259
262
  allow_all = vault.EgpPolicy("allow-all",
260
- name="allow-all",
261
- paths=["*"],
262
263
  enforcement_level="soft-mandatory",
264
+ paths=["*"],
263
265
  policy=\"\"\"main = rule {
264
266
  true
265
267
  }
268
+
266
269
  \"\"\")
267
270
  ```
271
+ <!--End PulumiCodeChooser -->
268
272
 
269
273
  :param str resource_name: The name of the resource.
270
274
  :param EgpPolicyArgs args: The arguments to use to populate this resource's properties.
@@ -498,6 +498,24 @@ class AuthBackend(pulumi.CustomResource):
498
498
  """
499
499
  Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
500
500
 
501
+ ## Example Usage
502
+
503
+ <!--Start PulumiCodeChooser -->
504
+ ```python
505
+ import pulumi
506
+ import pulumi_vault as vault
507
+
508
+ gcp = vault.gcp.AuthBackend("gcp",
509
+ credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
510
+ custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
511
+ api="www.googleapis.com",
512
+ iam="iam.googleapis.com",
513
+ crm="cloudresourcemanager.googleapis.com",
514
+ compute="compute.googleapis.com",
515
+ ))
516
+ ```
517
+ <!--End PulumiCodeChooser -->
518
+
501
519
  ## Import
502
520
 
503
521
  GCP authentication backends can be imported using the backend name, e.g.
@@ -542,6 +560,24 @@ class AuthBackend(pulumi.CustomResource):
542
560
  """
543
561
  Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
544
562
 
563
+ ## Example Usage
564
+
565
+ <!--Start PulumiCodeChooser -->
566
+ ```python
567
+ import pulumi
568
+ import pulumi_vault as vault
569
+
570
+ gcp = vault.gcp.AuthBackend("gcp",
571
+ credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
572
+ custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
573
+ api="www.googleapis.com",
574
+ iam="iam.googleapis.com",
575
+ crm="cloudresourcemanager.googleapis.com",
576
+ compute="compute.googleapis.com",
577
+ ))
578
+ ```
579
+ <!--End PulumiCodeChooser -->
580
+
545
581
  ## Import
546
582
 
547
583
  GCP authentication backends can be imported using the backend name, e.g.