pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. pulumi_vault/_inputs.py +20 -0
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +4 -2
  4. pulumi_vault/ad/secret_role.py +4 -0
  5. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +186 -63
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +20 -12
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +10 -6
  13. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  15. pulumi_vault/aws/auth_backend_login.py +8 -0
  16. pulumi_vault/aws/auth_backend_role.py +186 -63
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  18. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  19. pulumi_vault/aws/secret_backend_role.py +4 -2
  20. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  21. pulumi_vault/azure/auth_backend_config.py +10 -6
  22. pulumi_vault/azure/auth_backend_role.py +186 -63
  23. pulumi_vault/azure/backend.py +24 -16
  24. pulumi_vault/azure/backend_role.py +18 -14
  25. pulumi_vault/azure/get_access_credentials.py +4 -0
  26. pulumi_vault/cert_auth_backend_role.py +208 -75
  27. pulumi_vault/consul/secret_backend.py +18 -10
  28. pulumi_vault/consul/secret_backend_role.py +4 -2
  29. pulumi_vault/database/_inputs.py +784 -522
  30. pulumi_vault/database/outputs.py +784 -522
  31. pulumi_vault/database/secret_backend_connection.py +4 -2
  32. pulumi_vault/database/secret_backend_role.py +4 -4
  33. pulumi_vault/database/secret_backend_static_role.py +8 -10
  34. pulumi_vault/database/secrets_mount.py +4 -4
  35. pulumi_vault/egp_policy.py +8 -4
  36. pulumi_vault/gcp/auth_backend.py +36 -0
  37. pulumi_vault/gcp/auth_backend_role.py +264 -63
  38. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  39. pulumi_vault/gcp/secret_backend.py +6 -4
  40. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  41. pulumi_vault/gcp/secret_roleset.py +6 -4
  42. pulumi_vault/gcp/secret_static_account.py +16 -14
  43. pulumi_vault/generic/endpoint.py +8 -4
  44. pulumi_vault/generic/get_secret.py +4 -40
  45. pulumi_vault/get_auth_backend.py +4 -0
  46. pulumi_vault/get_auth_backends.py +8 -0
  47. pulumi_vault/get_namespace.py +12 -0
  48. pulumi_vault/get_namespaces.py +12 -4
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +8 -8
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +4 -0
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +8 -6
  56. pulumi_vault/identity/entity_alias.py +8 -6
  57. pulumi_vault/identity/entity_policies.py +12 -12
  58. pulumi_vault/identity/get_entity.py +4 -0
  59. pulumi_vault/identity/get_group.py +4 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  61. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  62. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  63. pulumi_vault/identity/group.py +42 -38
  64. pulumi_vault/identity/group_alias.py +4 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  66. pulumi_vault/identity/group_member_group_ids.py +20 -24
  67. pulumi_vault/identity/group_policies.py +8 -4
  68. pulumi_vault/identity/mfa_duo.py +8 -4
  69. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  70. pulumi_vault/identity/mfa_okta.py +8 -4
  71. pulumi_vault/identity/mfa_pingid.py +4 -0
  72. pulumi_vault/identity/mfa_totp.py +4 -0
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -10
  75. pulumi_vault/identity/oidc_client.py +10 -10
  76. pulumi_vault/identity/oidc_key.py +12 -16
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  78. pulumi_vault/identity/oidc_provider.py +16 -22
  79. pulumi_vault/identity/oidc_role.py +20 -28
  80. pulumi_vault/identity/oidc_scope.py +8 -6
  81. pulumi_vault/jwt/auth_backend.py +32 -20
  82. pulumi_vault/jwt/auth_backend_role.py +190 -63
  83. pulumi_vault/kmip/secret_backend.py +14 -10
  84. pulumi_vault/kmip/secret_role.py +4 -0
  85. pulumi_vault/kmip/secret_scope.py +4 -0
  86. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  87. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  88. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  89. pulumi_vault/kubernetes/secret_backend.py +8 -6
  90. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  91. pulumi_vault/kv/get_secret.py +4 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  93. pulumi_vault/kv/get_secret_v2.py +0 -58
  94. pulumi_vault/kv/get_secrets_list.py +8 -4
  95. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  96. pulumi_vault/kv/secret.py +4 -0
  97. pulumi_vault/kv/secret_backend_v2.py +4 -0
  98. pulumi_vault/kv/secret_v2.py +4 -2
  99. pulumi_vault/ldap/auth_backend.py +161 -66
  100. pulumi_vault/ldap/auth_backend_group.py +4 -0
  101. pulumi_vault/ldap/auth_backend_user.py +4 -0
  102. pulumi_vault/ldap/secret_backend.py +8 -4
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  104. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  106. pulumi_vault/managed/_inputs.py +132 -84
  107. pulumi_vault/managed/keys.py +28 -7
  108. pulumi_vault/managed/outputs.py +132 -84
  109. pulumi_vault/mfa_duo.py +6 -4
  110. pulumi_vault/mfa_okta.py +6 -4
  111. pulumi_vault/mfa_pingid.py +6 -4
  112. pulumi_vault/mfa_totp.py +12 -10
  113. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  114. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  115. pulumi_vault/mount.py +42 -26
  116. pulumi_vault/nomad_secret_backend.py +8 -4
  117. pulumi_vault/nomad_secret_role.py +4 -0
  118. pulumi_vault/okta/_inputs.py +8 -8
  119. pulumi_vault/okta/auth_backend.py +10 -6
  120. pulumi_vault/okta/auth_backend_group.py +4 -0
  121. pulumi_vault/okta/auth_backend_user.py +4 -0
  122. pulumi_vault/okta/outputs.py +8 -8
  123. pulumi_vault/outputs.py +20 -0
  124. pulumi_vault/password_policy.py +8 -6
  125. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  126. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  127. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  128. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  129. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  131. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  132. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  133. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  134. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  136. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  137. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  139. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  140. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  141. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  142. pulumi_vault/provider.py +8 -0
  143. pulumi_vault/pulumi-plugin.json +1 -2
  144. pulumi_vault/quota_lease_count.py +8 -6
  145. pulumi_vault/quota_rate_limit.py +4 -2
  146. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  147. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  148. pulumi_vault/raft_autopilot.py +4 -0
  149. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  150. pulumi_vault/rgp_policy.py +6 -2
  151. pulumi_vault/saml/auth_backend.py +12 -8
  152. pulumi_vault/saml/auth_backend_role.py +178 -64
  153. pulumi_vault/secrets/sync_association.py +10 -12
  154. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  155. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  156. pulumi_vault/secrets/sync_config.py +6 -2
  157. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  158. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  159. pulumi_vault/secrets/sync_github_apps.py +8 -8
  160. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  161. pulumi_vault/ssh/_inputs.py +32 -6
  162. pulumi_vault/ssh/outputs.py +32 -6
  163. pulumi_vault/ssh/secret_backend_ca.py +4 -0
  164. pulumi_vault/ssh/secret_backend_role.py +4 -4
  165. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  166. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  167. pulumi_vault/terraformcloud/secret_role.py +69 -2
  168. pulumi_vault/token.py +18 -14
  169. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  170. pulumi_vault/transform/alphabet.py +6 -4
  171. pulumi_vault/transform/get_decode.py +4 -4
  172. pulumi_vault/transform/get_encode.py +4 -4
  173. pulumi_vault/transform/role.py +6 -4
  174. pulumi_vault/transform/template.py +4 -4
  175. pulumi_vault/transit/get_decrypt.py +20 -4
  176. pulumi_vault/transit/get_encrypt.py +14 -0
  177. pulumi_vault/transit/secret_backend_key.py +6 -6
  178. pulumi_vault/transit/secret_cache_config.py +4 -0
  179. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  180. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
  182. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
  183. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -84,11 +84,12 @@ def get_policy_document(namespace: Optional[str] = None,
84
84
 
85
85
  ## Example Usage
86
86
 
87
+ <!--Start PulumiCodeChooser -->
87
88
  ```python
88
89
  import pulumi
89
90
  import pulumi_vault as vault
90
91
 
91
- example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
92
+ example_policy_document = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
92
93
  path="secret/*",
93
94
  capabilities=[
94
95
  "create",
@@ -99,10 +100,9 @@ def get_policy_document(namespace: Optional[str] = None,
99
100
  ],
100
101
  description="allow all on secrets",
101
102
  )])
102
- example_policy = vault.Policy("example",
103
- name="example_policy",
104
- policy=example.hcl)
103
+ example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
105
104
  ```
105
+ <!--End PulumiCodeChooser -->
106
106
  """
107
107
  __args__ = dict()
108
108
  __args__['namespace'] = namespace
@@ -126,11 +126,12 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
126
126
 
127
127
  ## Example Usage
128
128
 
129
+ <!--Start PulumiCodeChooser -->
129
130
  ```python
130
131
  import pulumi
131
132
  import pulumi_vault as vault
132
133
 
133
- example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
134
+ example_policy_document = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
134
135
  path="secret/*",
135
136
  capabilities=[
136
137
  "create",
@@ -141,9 +142,8 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
141
142
  ],
142
143
  description="allow all on secrets",
143
144
  )])
144
- example_policy = vault.Policy("example",
145
- name="example_policy",
146
- policy=example.hcl)
145
+ example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
147
146
  ```
147
+ <!--End PulumiCodeChooser -->
148
148
  """
149
149
  ...
@@ -190,6 +190,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
190
190
  """
191
191
  ## Example Usage
192
192
 
193
+ <!--Start PulumiCodeChooser -->
193
194
  ```python
194
195
  import pulumi
195
196
  import pulumi_vault as vault
@@ -197,6 +198,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
197
198
  main = vault.get_raft_autopilot_state()
198
199
  pulumi.export("failure-tolerance", main.failure_tolerance)
199
200
  ```
201
+ <!--End PulumiCodeChooser -->
200
202
 
201
203
 
202
204
  :param str namespace: The namespace of the target resource.
@@ -231,6 +233,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
231
233
  """
232
234
  ## Example Usage
233
235
 
236
+ <!--Start PulumiCodeChooser -->
234
237
  ```python
235
238
  import pulumi
236
239
  import pulumi_vault as vault
@@ -238,6 +241,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
238
241
  main = vault.get_raft_autopilot_state()
239
242
  pulumi.export("failure-tolerance", main.failure_tolerance)
240
243
  ```
244
+ <!--End PulumiCodeChooser -->
241
245
 
242
246
 
243
247
  :param str namespace: The namespace of the target resource.
@@ -714,12 +714,14 @@ class AuthBackend(pulumi.CustomResource):
714
714
 
715
715
  ## Example Usage
716
716
 
717
+ <!--Start PulumiCodeChooser -->
717
718
  ```python
718
719
  import pulumi
719
720
  import pulumi_vault as vault
720
721
 
721
722
  example = vault.github.AuthBackend("example", organization="myorg")
722
723
  ```
724
+ <!--End PulumiCodeChooser -->
723
725
 
724
726
  ## Import
725
727
 
@@ -786,12 +788,14 @@ class AuthBackend(pulumi.CustomResource):
786
788
 
787
789
  ## Example Usage
788
790
 
791
+ <!--Start PulumiCodeChooser -->
789
792
  ```python
790
793
  import pulumi
791
794
  import pulumi_vault as vault
792
795
 
793
796
  example = vault.github.AuthBackend("example", organization="myorg")
794
797
  ```
798
+ <!--End PulumiCodeChooser -->
795
799
 
796
800
  ## Import
797
801
 
@@ -191,12 +191,13 @@ class Team(pulumi.CustomResource):
191
191
 
192
192
  ## Example Usage
193
193
 
194
+ <!--Start PulumiCodeChooser -->
194
195
  ```python
195
196
  import pulumi
196
197
  import pulumi_vault as vault
197
198
 
198
199
  example = vault.github.AuthBackend("example", organization="myorg")
199
- tf_devs = vault.github.Team("tf_devs",
200
+ tf_devs = vault.github.Team("tfDevs",
200
201
  backend=example.id,
201
202
  team="terraform-developers",
202
203
  policies=[
@@ -204,6 +205,7 @@ class Team(pulumi.CustomResource):
204
205
  "read-only",
205
206
  ])
206
207
  ```
208
+ <!--End PulumiCodeChooser -->
207
209
 
208
210
  ## Import
209
211
 
@@ -238,12 +240,13 @@ class Team(pulumi.CustomResource):
238
240
 
239
241
  ## Example Usage
240
242
 
243
+ <!--Start PulumiCodeChooser -->
241
244
  ```python
242
245
  import pulumi
243
246
  import pulumi_vault as vault
244
247
 
245
248
  example = vault.github.AuthBackend("example", organization="myorg")
246
- tf_devs = vault.github.Team("tf_devs",
249
+ tf_devs = vault.github.Team("tfDevs",
247
250
  backend=example.id,
248
251
  team="terraform-developers",
249
252
  policies=[
@@ -251,6 +254,7 @@ class Team(pulumi.CustomResource):
251
254
  "read-only",
252
255
  ])
253
256
  ```
257
+ <!--End PulumiCodeChooser -->
254
258
 
255
259
  ## Import
256
260
 
@@ -191,12 +191,13 @@ class User(pulumi.CustomResource):
191
191
 
192
192
  ## Example Usage
193
193
 
194
+ <!--Start PulumiCodeChooser -->
194
195
  ```python
195
196
  import pulumi
196
197
  import pulumi_vault as vault
197
198
 
198
199
  example = vault.github.AuthBackend("example", organization="myorg")
199
- tf_user = vault.github.User("tf_user",
200
+ tf_user = vault.github.User("tfUser",
200
201
  backend=example.id,
201
202
  user="john.doe",
202
203
  policies=[
@@ -204,6 +205,7 @@ class User(pulumi.CustomResource):
204
205
  "read-only",
205
206
  ])
206
207
  ```
208
+ <!--End PulumiCodeChooser -->
207
209
 
208
210
  ## Import
209
211
 
@@ -238,12 +240,13 @@ class User(pulumi.CustomResource):
238
240
 
239
241
  ## Example Usage
240
242
 
243
+ <!--Start PulumiCodeChooser -->
241
244
  ```python
242
245
  import pulumi
243
246
  import pulumi_vault as vault
244
247
 
245
248
  example = vault.github.AuthBackend("example", organization="myorg")
246
- tf_user = vault.github.User("tf_user",
249
+ tf_user = vault.github.User("tfUser",
247
250
  backend=example.id,
248
251
  user="john.doe",
249
252
  policies=[
@@ -251,6 +254,7 @@ class User(pulumi.CustomResource):
251
254
  "read-only",
252
255
  ])
253
256
  ```
257
+ <!--End PulumiCodeChooser -->
254
258
 
255
259
  ## Import
256
260
 
@@ -246,17 +246,18 @@ class Entity(pulumi.CustomResource):
246
246
  """
247
247
  ## Example Usage
248
248
 
249
+ <!--Start PulumiCodeChooser -->
249
250
  ```python
250
251
  import pulumi
251
252
  import pulumi_vault as vault
252
253
 
253
254
  test = vault.identity.Entity("test",
254
- name="tester1",
255
- policies=["test"],
256
255
  metadata={
257
256
  "foo": "bar",
258
- })
257
+ },
258
+ policies=["test"])
259
259
  ```
260
+ <!--End PulumiCodeChooser -->
260
261
 
261
262
  ## Import
262
263
 
@@ -287,17 +288,18 @@ class Entity(pulumi.CustomResource):
287
288
  """
288
289
  ## Example Usage
289
290
 
291
+ <!--Start PulumiCodeChooser -->
290
292
  ```python
291
293
  import pulumi
292
294
  import pulumi_vault as vault
293
295
 
294
296
  test = vault.identity.Entity("test",
295
- name="tester1",
296
- policies=["test"],
297
297
  metadata={
298
298
  "foo": "bar",
299
- })
299
+ },
300
+ policies=["test"])
300
301
  ```
302
+ <!--End PulumiCodeChooser -->
301
303
 
302
304
  ## Import
303
305
 
@@ -211,15 +211,16 @@ class EntityAlias(pulumi.CustomResource):
211
211
  """
212
212
  ## Example Usage
213
213
 
214
+ <!--Start PulumiCodeChooser -->
214
215
  ```python
215
216
  import pulumi
216
217
  import pulumi_vault as vault
217
218
 
218
219
  test = vault.identity.EntityAlias("test",
219
- name="user_1",
220
- mount_accessor="token_1f2bd5",
221
- canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
220
+ canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
221
+ mount_accessor="token_1f2bd5")
222
222
  ```
223
+ <!--End PulumiCodeChooser -->
223
224
 
224
225
  ## Import
225
226
 
@@ -249,15 +250,16 @@ class EntityAlias(pulumi.CustomResource):
249
250
  """
250
251
  ## Example Usage
251
252
 
253
+ <!--Start PulumiCodeChooser -->
252
254
  ```python
253
255
  import pulumi
254
256
  import pulumi_vault as vault
255
257
 
256
258
  test = vault.identity.EntityAlias("test",
257
- name="user_1",
258
- mount_accessor="token_1f2bd5",
259
- canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
259
+ canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
260
+ mount_accessor="token_1f2bd5")
260
261
  ```
262
+ <!--End PulumiCodeChooser -->
261
263
 
262
264
  ## Import
263
265
 
@@ -214,13 +214,12 @@ class EntityPolicies(pulumi.CustomResource):
214
214
 
215
215
  ### Exclusive Policies
216
216
 
217
+ <!--Start PulumiCodeChooser -->
217
218
  ```python
218
219
  import pulumi
219
220
  import pulumi_vault as vault
220
221
 
221
- entity = vault.identity.Entity("entity",
222
- name="entity",
223
- external_policies=True)
222
+ entity = vault.identity.Entity("entity", external_policies=True)
224
223
  policies = vault.identity.EntityPolicies("policies",
225
224
  policies=[
226
225
  "default",
@@ -229,16 +228,16 @@ class EntityPolicies(pulumi.CustomResource):
229
228
  exclusive=True,
230
229
  entity_id=entity.id)
231
230
  ```
231
+ <!--End PulumiCodeChooser -->
232
232
 
233
233
  ### Non-exclusive Policies
234
234
 
235
+ <!--Start PulumiCodeChooser -->
235
236
  ```python
236
237
  import pulumi
237
238
  import pulumi_vault as vault
238
239
 
239
- entity = vault.identity.Entity("entity",
240
- name="entity",
241
- external_policies=True)
240
+ entity = vault.identity.Entity("entity", external_policies=True)
242
241
  default = vault.identity.EntityPolicies("default",
243
242
  policies=[
244
243
  "default",
@@ -251,6 +250,7 @@ class EntityPolicies(pulumi.CustomResource):
251
250
  exclusive=False,
252
251
  entity_id=entity.id)
253
252
  ```
253
+ <!--End PulumiCodeChooser -->
254
254
 
255
255
  :param str resource_name: The name of the resource.
256
256
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -279,13 +279,12 @@ class EntityPolicies(pulumi.CustomResource):
279
279
 
280
280
  ### Exclusive Policies
281
281
 
282
+ <!--Start PulumiCodeChooser -->
282
283
  ```python
283
284
  import pulumi
284
285
  import pulumi_vault as vault
285
286
 
286
- entity = vault.identity.Entity("entity",
287
- name="entity",
288
- external_policies=True)
287
+ entity = vault.identity.Entity("entity", external_policies=True)
289
288
  policies = vault.identity.EntityPolicies("policies",
290
289
  policies=[
291
290
  "default",
@@ -294,16 +293,16 @@ class EntityPolicies(pulumi.CustomResource):
294
293
  exclusive=True,
295
294
  entity_id=entity.id)
296
295
  ```
296
+ <!--End PulumiCodeChooser -->
297
297
 
298
298
  ### Non-exclusive Policies
299
299
 
300
+ <!--Start PulumiCodeChooser -->
300
301
  ```python
301
302
  import pulumi
302
303
  import pulumi_vault as vault
303
304
 
304
- entity = vault.identity.Entity("entity",
305
- name="entity",
306
- external_policies=True)
305
+ entity = vault.identity.Entity("entity", external_policies=True)
307
306
  default = vault.identity.EntityPolicies("default",
308
307
  policies=[
309
308
  "default",
@@ -316,6 +315,7 @@ class EntityPolicies(pulumi.CustomResource):
316
315
  exclusive=False,
317
316
  entity_id=entity.id)
318
317
  ```
318
+ <!--End PulumiCodeChooser -->
319
319
 
320
320
  :param str resource_name: The name of the resource.
321
321
  :param EntityPoliciesArgs args: The arguments to use to populate this resource's properties.
@@ -254,12 +254,14 @@ def get_entity(alias_id: Optional[str] = None,
254
254
  """
255
255
  ## Example Usage
256
256
 
257
+ <!--Start PulumiCodeChooser -->
257
258
  ```python
258
259
  import pulumi
259
260
  import pulumi_vault as vault
260
261
 
261
262
  entity = vault.identity.get_entity(entity_name="entity_12345")
262
263
  ```
264
+ <!--End PulumiCodeChooser -->
263
265
 
264
266
  ## Required Vault Capabilities
265
267
 
@@ -324,12 +326,14 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
324
326
  """
325
327
  ## Example Usage
326
328
 
329
+ <!--Start PulumiCodeChooser -->
327
330
  ```python
328
331
  import pulumi
329
332
  import pulumi_vault as vault
330
333
 
331
334
  entity = vault.identity.get_entity(entity_name="entity_12345")
332
335
  ```
336
+ <!--End PulumiCodeChooser -->
333
337
 
334
338
  ## Required Vault Capabilities
335
339
 
@@ -325,12 +325,14 @@ def get_group(alias_id: Optional[str] = None,
325
325
  """
326
326
  ## Example Usage
327
327
 
328
+ <!--Start PulumiCodeChooser -->
328
329
  ```python
329
330
  import pulumi
330
331
  import pulumi_vault as vault
331
332
 
332
333
  group = vault.identity.get_group(group_name="user")
333
334
  ```
335
+ <!--End PulumiCodeChooser -->
334
336
 
335
337
  ## Required Vault Capabilities
336
338
 
@@ -401,12 +403,14 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
401
403
  """
402
404
  ## Example Usage
403
405
 
406
+ <!--Start PulumiCodeChooser -->
404
407
  ```python
405
408
  import pulumi
406
409
  import pulumi_vault as vault
407
410
 
408
411
  group = vault.identity.get_group(group_name="user")
409
412
  ```
413
+ <!--End PulumiCodeChooser -->
410
414
 
411
415
  ## Required Vault Capabilities
412
416
 
@@ -93,12 +93,12 @@ def get_oidc_client_creds(name: Optional[str] = None,
93
93
  """
94
94
  ## Example Usage
95
95
 
96
+ <!--Start PulumiCodeChooser -->
96
97
  ```python
97
98
  import pulumi
98
99
  import pulumi_vault as vault
99
100
 
100
101
  app = vault.identity.OidcClient("app",
101
- name="application",
102
102
  redirect_uris=[
103
103
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
104
104
  "http://127.0.0.1:8251/callback",
@@ -108,6 +108,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
108
108
  access_token_ttl=7200)
109
109
  creds = vault.identity.get_oidc_client_creds_output(name=app.name)
110
110
  ```
111
+ <!--End PulumiCodeChooser -->
111
112
 
112
113
 
113
114
  :param str name: The name of the OIDC Client in Vault.
@@ -137,12 +138,12 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
137
138
  """
138
139
  ## Example Usage
139
140
 
141
+ <!--Start PulumiCodeChooser -->
140
142
  ```python
141
143
  import pulumi
142
144
  import pulumi_vault as vault
143
145
 
144
146
  app = vault.identity.OidcClient("app",
145
- name="application",
146
147
  redirect_uris=[
147
148
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
148
149
  "http://127.0.0.1:8251/callback",
@@ -152,6 +153,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
152
153
  access_token_ttl=7200)
153
154
  creds = vault.identity.get_oidc_client_creds_output(name=app.name)
154
155
  ```
156
+ <!--End PulumiCodeChooser -->
155
157
 
156
158
 
157
159
  :param str name: The name of the OIDC Client in Vault.
@@ -214,17 +214,16 @@ def get_oidc_openid_config(name: Optional[str] = None,
214
214
  """
215
215
  ## Example Usage
216
216
 
217
+ <!--Start PulumiCodeChooser -->
217
218
  ```python
218
219
  import pulumi
219
220
  import pulumi_vault as vault
220
221
 
221
222
  key = vault.identity.OidcKey("key",
222
- name="key",
223
223
  allowed_client_ids=["*"],
224
224
  rotation_period=3600,
225
225
  verification_ttl=3600)
226
226
  app = vault.identity.OidcClient("app",
227
- name="application",
228
227
  key=key.name,
229
228
  redirect_uris=[
230
229
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -233,11 +232,10 @@ def get_oidc_openid_config(name: Optional[str] = None,
233
232
  ],
234
233
  id_token_ttl=2400,
235
234
  access_token_ttl=7200)
236
- provider = vault.identity.OidcProvider("provider",
237
- name="provider",
238
- allowed_client_ids=[test["clientId"]])
235
+ provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
239
236
  config = vault.identity.get_oidc_openid_config_output(name=provider.name)
240
237
  ```
238
+ <!--End PulumiCodeChooser -->
241
239
 
242
240
 
243
241
  :param str name: The name of the OIDC Provider in Vault.
@@ -277,17 +275,16 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
277
275
  """
278
276
  ## Example Usage
279
277
 
278
+ <!--Start PulumiCodeChooser -->
280
279
  ```python
281
280
  import pulumi
282
281
  import pulumi_vault as vault
283
282
 
284
283
  key = vault.identity.OidcKey("key",
285
- name="key",
286
284
  allowed_client_ids=["*"],
287
285
  rotation_period=3600,
288
286
  verification_ttl=3600)
289
287
  app = vault.identity.OidcClient("app",
290
- name="application",
291
288
  key=key.name,
292
289
  redirect_uris=[
293
290
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -296,11 +293,10 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
296
293
  ],
297
294
  id_token_ttl=2400,
298
295
  access_token_ttl=7200)
299
- provider = vault.identity.OidcProvider("provider",
300
- name="provider",
301
- allowed_client_ids=[test["clientId"]])
296
+ provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
302
297
  config = vault.identity.get_oidc_openid_config_output(name=provider.name)
303
298
  ```
299
+ <!--End PulumiCodeChooser -->
304
300
 
305
301
 
306
302
  :param str name: The name of the OIDC Provider in Vault.
@@ -81,17 +81,16 @@ def get_oidc_public_keys(name: Optional[str] = None,
81
81
  """
82
82
  ## Example Usage
83
83
 
84
+ <!--Start PulumiCodeChooser -->
84
85
  ```python
85
86
  import pulumi
86
87
  import pulumi_vault as vault
87
88
 
88
89
  key = vault.identity.OidcKey("key",
89
- name="key",
90
90
  allowed_client_ids=["*"],
91
91
  rotation_period=3600,
92
92
  verification_ttl=3600)
93
93
  app = vault.identity.OidcClient("app",
94
- name="application",
95
94
  key=key.name,
96
95
  redirect_uris=[
97
96
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -100,11 +99,10 @@ def get_oidc_public_keys(name: Optional[str] = None,
100
99
  ],
101
100
  id_token_ttl=2400,
102
101
  access_token_ttl=7200)
103
- provider = vault.identity.OidcProvider("provider",
104
- name="provider",
105
- allowed_client_ids=[test["clientId"]])
102
+ provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
106
103
  public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
107
104
  ```
105
+ <!--End PulumiCodeChooser -->
108
106
 
109
107
 
110
108
  :param str name: The name of the OIDC Provider in Vault.
@@ -133,17 +131,16 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
133
131
  """
134
132
  ## Example Usage
135
133
 
134
+ <!--Start PulumiCodeChooser -->
136
135
  ```python
137
136
  import pulumi
138
137
  import pulumi_vault as vault
139
138
 
140
139
  key = vault.identity.OidcKey("key",
141
- name="key",
142
140
  allowed_client_ids=["*"],
143
141
  rotation_period=3600,
144
142
  verification_ttl=3600)
145
143
  app = vault.identity.OidcClient("app",
146
- name="application",
147
144
  key=key.name,
148
145
  redirect_uris=[
149
146
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -152,11 +149,10 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
152
149
  ],
153
150
  id_token_ttl=2400,
154
151
  access_token_ttl=7200)
155
- provider = vault.identity.OidcProvider("provider",
156
- name="provider",
157
- allowed_client_ids=[test["clientId"]])
152
+ provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
158
153
  public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
159
154
  ```
155
+ <!--End PulumiCodeChooser -->
160
156
 
161
157
 
162
158
  :param str name: The name of the OIDC Provider in Vault.