pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. pulumi_vault/_inputs.py +20 -0
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +4 -2
  4. pulumi_vault/ad/secret_role.py +4 -0
  5. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +186 -63
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +20 -12
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +10 -6
  13. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  15. pulumi_vault/aws/auth_backend_login.py +8 -0
  16. pulumi_vault/aws/auth_backend_role.py +186 -63
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  18. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  19. pulumi_vault/aws/secret_backend_role.py +4 -2
  20. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  21. pulumi_vault/azure/auth_backend_config.py +10 -6
  22. pulumi_vault/azure/auth_backend_role.py +186 -63
  23. pulumi_vault/azure/backend.py +24 -16
  24. pulumi_vault/azure/backend_role.py +18 -14
  25. pulumi_vault/azure/get_access_credentials.py +4 -0
  26. pulumi_vault/cert_auth_backend_role.py +208 -75
  27. pulumi_vault/consul/secret_backend.py +18 -10
  28. pulumi_vault/consul/secret_backend_role.py +4 -2
  29. pulumi_vault/database/_inputs.py +784 -522
  30. pulumi_vault/database/outputs.py +784 -522
  31. pulumi_vault/database/secret_backend_connection.py +4 -2
  32. pulumi_vault/database/secret_backend_role.py +4 -4
  33. pulumi_vault/database/secret_backend_static_role.py +8 -10
  34. pulumi_vault/database/secrets_mount.py +4 -4
  35. pulumi_vault/egp_policy.py +8 -4
  36. pulumi_vault/gcp/auth_backend.py +36 -0
  37. pulumi_vault/gcp/auth_backend_role.py +264 -63
  38. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  39. pulumi_vault/gcp/secret_backend.py +6 -4
  40. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  41. pulumi_vault/gcp/secret_roleset.py +6 -4
  42. pulumi_vault/gcp/secret_static_account.py +16 -14
  43. pulumi_vault/generic/endpoint.py +8 -4
  44. pulumi_vault/generic/get_secret.py +4 -40
  45. pulumi_vault/get_auth_backend.py +4 -0
  46. pulumi_vault/get_auth_backends.py +8 -0
  47. pulumi_vault/get_namespace.py +12 -0
  48. pulumi_vault/get_namespaces.py +12 -4
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +8 -8
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +4 -0
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +8 -6
  56. pulumi_vault/identity/entity_alias.py +8 -6
  57. pulumi_vault/identity/entity_policies.py +12 -12
  58. pulumi_vault/identity/get_entity.py +4 -0
  59. pulumi_vault/identity/get_group.py +4 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  61. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  62. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  63. pulumi_vault/identity/group.py +42 -38
  64. pulumi_vault/identity/group_alias.py +4 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  66. pulumi_vault/identity/group_member_group_ids.py +20 -24
  67. pulumi_vault/identity/group_policies.py +8 -4
  68. pulumi_vault/identity/mfa_duo.py +8 -4
  69. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  70. pulumi_vault/identity/mfa_okta.py +8 -4
  71. pulumi_vault/identity/mfa_pingid.py +4 -0
  72. pulumi_vault/identity/mfa_totp.py +4 -0
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -10
  75. pulumi_vault/identity/oidc_client.py +10 -10
  76. pulumi_vault/identity/oidc_key.py +12 -16
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  78. pulumi_vault/identity/oidc_provider.py +16 -22
  79. pulumi_vault/identity/oidc_role.py +20 -28
  80. pulumi_vault/identity/oidc_scope.py +8 -6
  81. pulumi_vault/jwt/auth_backend.py +32 -20
  82. pulumi_vault/jwt/auth_backend_role.py +190 -63
  83. pulumi_vault/kmip/secret_backend.py +14 -10
  84. pulumi_vault/kmip/secret_role.py +4 -0
  85. pulumi_vault/kmip/secret_scope.py +4 -0
  86. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  87. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  88. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  89. pulumi_vault/kubernetes/secret_backend.py +8 -6
  90. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  91. pulumi_vault/kv/get_secret.py +4 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  93. pulumi_vault/kv/get_secret_v2.py +0 -58
  94. pulumi_vault/kv/get_secrets_list.py +8 -4
  95. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  96. pulumi_vault/kv/secret.py +4 -0
  97. pulumi_vault/kv/secret_backend_v2.py +4 -0
  98. pulumi_vault/kv/secret_v2.py +4 -2
  99. pulumi_vault/ldap/auth_backend.py +161 -66
  100. pulumi_vault/ldap/auth_backend_group.py +4 -0
  101. pulumi_vault/ldap/auth_backend_user.py +4 -0
  102. pulumi_vault/ldap/secret_backend.py +8 -4
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  104. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  106. pulumi_vault/managed/_inputs.py +132 -84
  107. pulumi_vault/managed/keys.py +28 -7
  108. pulumi_vault/managed/outputs.py +132 -84
  109. pulumi_vault/mfa_duo.py +6 -4
  110. pulumi_vault/mfa_okta.py +6 -4
  111. pulumi_vault/mfa_pingid.py +6 -4
  112. pulumi_vault/mfa_totp.py +12 -10
  113. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  114. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  115. pulumi_vault/mount.py +42 -26
  116. pulumi_vault/nomad_secret_backend.py +8 -4
  117. pulumi_vault/nomad_secret_role.py +4 -0
  118. pulumi_vault/okta/_inputs.py +8 -8
  119. pulumi_vault/okta/auth_backend.py +10 -6
  120. pulumi_vault/okta/auth_backend_group.py +4 -0
  121. pulumi_vault/okta/auth_backend_user.py +4 -0
  122. pulumi_vault/okta/outputs.py +8 -8
  123. pulumi_vault/outputs.py +20 -0
  124. pulumi_vault/password_policy.py +8 -6
  125. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  126. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  127. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  128. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  129. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  131. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  132. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  133. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  134. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  136. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  137. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  139. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  140. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  141. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  142. pulumi_vault/provider.py +8 -0
  143. pulumi_vault/pulumi-plugin.json +1 -2
  144. pulumi_vault/quota_lease_count.py +8 -6
  145. pulumi_vault/quota_rate_limit.py +4 -2
  146. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  147. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  148. pulumi_vault/raft_autopilot.py +4 -0
  149. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  150. pulumi_vault/rgp_policy.py +6 -2
  151. pulumi_vault/saml/auth_backend.py +12 -8
  152. pulumi_vault/saml/auth_backend_role.py +178 -64
  153. pulumi_vault/secrets/sync_association.py +10 -12
  154. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  155. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  156. pulumi_vault/secrets/sync_config.py +6 -2
  157. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  158. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  159. pulumi_vault/secrets/sync_github_apps.py +8 -8
  160. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  161. pulumi_vault/ssh/_inputs.py +32 -6
  162. pulumi_vault/ssh/outputs.py +32 -6
  163. pulumi_vault/ssh/secret_backend_ca.py +4 -0
  164. pulumi_vault/ssh/secret_backend_role.py +4 -4
  165. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  166. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  167. pulumi_vault/terraformcloud/secret_role.py +69 -2
  168. pulumi_vault/token.py +18 -14
  169. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  170. pulumi_vault/transform/alphabet.py +6 -4
  171. pulumi_vault/transform/get_decode.py +4 -4
  172. pulumi_vault/transform/get_encode.py +4 -4
  173. pulumi_vault/transform/role.py +6 -4
  174. pulumi_vault/transform/template.py +4 -4
  175. pulumi_vault/transit/get_decrypt.py +20 -4
  176. pulumi_vault/transit/get_encrypt.py +14 -0
  177. pulumi_vault/transit/secret_backend_key.py +6 -6
  178. pulumi_vault/transit/secret_cache_config.py +4 -0
  179. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  180. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
  182. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
  183. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -416,36 +416,38 @@ class Group(pulumi.CustomResource):
416
416
 
417
417
  ### Internal Group
418
418
 
419
+ <!--Start PulumiCodeChooser -->
419
420
  ```python
420
421
  import pulumi
421
422
  import pulumi_vault as vault
422
423
 
423
424
  internal = vault.identity.Group("internal",
424
- name="internal",
425
- type="internal",
425
+ metadata={
426
+ "version": "2",
427
+ },
426
428
  policies=[
427
429
  "dev",
428
430
  "test",
429
431
  ],
430
- metadata={
431
- "version": "2",
432
- })
432
+ type="internal")
433
433
  ```
434
+ <!--End PulumiCodeChooser -->
434
435
 
435
436
  ### External Group
436
437
 
438
+ <!--Start PulumiCodeChooser -->
437
439
  ```python
438
440
  import pulumi
439
441
  import pulumi_vault as vault
440
442
 
441
443
  group = vault.identity.Group("group",
442
- name="external",
443
- type="external",
444
- policies=["test"],
445
444
  metadata={
446
445
  "version": "1",
447
- })
446
+ },
447
+ policies=["test"],
448
+ type="external")
448
449
  ```
450
+ <!--End PulumiCodeChooser -->
449
451
 
450
452
  ## Caveats
451
453
 
@@ -453,31 +455,31 @@ class Group(pulumi.CustomResource):
453
455
  Applying this configuration would result in the provider failing to create one of the identity groups, since the resources share the same `name`.
454
456
 
455
457
  This sort of pattern should be avoided:
458
+ <!--Start PulumiCodeChooser -->
456
459
  ```python
457
460
  import pulumi
458
461
  import pulumi_vault as vault
459
462
 
460
- internal = vault.identity.Group("internal",
461
- name="internal",
462
- type="internal",
463
+ internal_identity_group_group = vault.identity.Group("internalIdentity/groupGroup",
464
+ metadata={
465
+ "version": "2",
466
+ },
463
467
  policies=[
464
468
  "dev",
465
469
  "test",
466
470
  ],
471
+ type="internal")
472
+ internal_group = vault.identity.Group("internalGroup",
467
473
  metadata={
468
474
  "version": "2",
469
- })
470
- internal_group = vault.identity.Group("Internal",
471
- name="Internal",
472
- type="internal",
475
+ },
473
476
  policies=[
474
477
  "dev",
475
478
  "test",
476
479
  ],
477
- metadata={
478
- "version": "2",
479
- })
480
+ type="internal")
480
481
  ```
482
+ <!--End PulumiCodeChooser -->
481
483
 
482
484
  ## Import
483
485
 
@@ -526,36 +528,38 @@ class Group(pulumi.CustomResource):
526
528
 
527
529
  ### Internal Group
528
530
 
531
+ <!--Start PulumiCodeChooser -->
529
532
  ```python
530
533
  import pulumi
531
534
  import pulumi_vault as vault
532
535
 
533
536
  internal = vault.identity.Group("internal",
534
- name="internal",
535
- type="internal",
537
+ metadata={
538
+ "version": "2",
539
+ },
536
540
  policies=[
537
541
  "dev",
538
542
  "test",
539
543
  ],
540
- metadata={
541
- "version": "2",
542
- })
544
+ type="internal")
543
545
  ```
546
+ <!--End PulumiCodeChooser -->
544
547
 
545
548
  ### External Group
546
549
 
550
+ <!--Start PulumiCodeChooser -->
547
551
  ```python
548
552
  import pulumi
549
553
  import pulumi_vault as vault
550
554
 
551
555
  group = vault.identity.Group("group",
552
- name="external",
553
- type="external",
554
- policies=["test"],
555
556
  metadata={
556
557
  "version": "1",
557
- })
558
+ },
559
+ policies=["test"],
560
+ type="external")
558
561
  ```
562
+ <!--End PulumiCodeChooser -->
559
563
 
560
564
  ## Caveats
561
565
 
@@ -563,31 +567,31 @@ class Group(pulumi.CustomResource):
563
567
  Applying this configuration would result in the provider failing to create one of the identity groups, since the resources share the same `name`.
564
568
 
565
569
  This sort of pattern should be avoided:
570
+ <!--Start PulumiCodeChooser -->
566
571
  ```python
567
572
  import pulumi
568
573
  import pulumi_vault as vault
569
574
 
570
- internal = vault.identity.Group("internal",
571
- name="internal",
572
- type="internal",
575
+ internal_identity_group_group = vault.identity.Group("internalIdentity/groupGroup",
576
+ metadata={
577
+ "version": "2",
578
+ },
573
579
  policies=[
574
580
  "dev",
575
581
  "test",
576
582
  ],
583
+ type="internal")
584
+ internal_group = vault.identity.Group("internalGroup",
577
585
  metadata={
578
586
  "version": "2",
579
- })
580
- internal_group = vault.identity.Group("Internal",
581
- name="Internal",
582
- type="internal",
587
+ },
583
588
  policies=[
584
589
  "dev",
585
590
  "test",
586
591
  ],
587
- metadata={
588
- "version": "2",
589
- })
592
+ type="internal")
590
593
  ```
594
+ <!--End PulumiCodeChooser -->
591
595
 
592
596
  ## Import
593
597
 
@@ -181,12 +181,12 @@ class GroupAlias(pulumi.CustomResource):
181
181
 
182
182
  ## Example Usage
183
183
 
184
+ <!--Start PulumiCodeChooser -->
184
185
  ```python
185
186
  import pulumi
186
187
  import pulumi_vault as vault
187
188
 
188
189
  group = vault.identity.Group("group",
189
- name="test",
190
190
  type="external",
191
191
  policies=["test"])
192
192
  github = vault.AuthBackend("github",
@@ -197,6 +197,7 @@ class GroupAlias(pulumi.CustomResource):
197
197
  mount_accessor=github.accessor,
198
198
  canonical_id=group.id)
199
199
  ```
200
+ <!--End PulumiCodeChooser -->
200
201
 
201
202
  ## Import
202
203
 
@@ -235,12 +236,12 @@ class GroupAlias(pulumi.CustomResource):
235
236
 
236
237
  ## Example Usage
237
238
 
239
+ <!--Start PulumiCodeChooser -->
238
240
  ```python
239
241
  import pulumi
240
242
  import pulumi_vault as vault
241
243
 
242
244
  group = vault.identity.Group("group",
243
- name="test",
244
245
  type="external",
245
246
  policies=["test"])
246
247
  github = vault.AuthBackend("github",
@@ -251,6 +252,7 @@ class GroupAlias(pulumi.CustomResource):
251
252
  mount_accessor=github.accessor,
252
253
  canonical_id=group.id)
253
254
  ```
255
+ <!--End PulumiCodeChooser -->
254
256
 
255
257
  ## Import
256
258
 
@@ -199,40 +199,41 @@ class GroupMemberEntityIds(pulumi.CustomResource):
199
199
 
200
200
  ### Exclusive Member Entities
201
201
 
202
+ <!--Start PulumiCodeChooser -->
202
203
  ```python
203
204
  import pulumi
204
205
  import pulumi_vault as vault
205
206
 
206
207
  internal = vault.identity.Group("internal",
207
- name="internal",
208
208
  type="internal",
209
209
  external_member_entity_ids=True,
210
210
  metadata={
211
211
  "version": "2",
212
212
  })
213
- user = vault.identity.Entity("user", name="user")
213
+ user = vault.identity.Entity("user")
214
214
  members = vault.identity.GroupMemberEntityIds("members",
215
215
  exclusive=True,
216
216
  member_entity_ids=[user.id],
217
217
  group_id=internal.id)
218
218
  ```
219
+ <!--End PulumiCodeChooser -->
219
220
 
220
221
  ### Non-exclusive Member Entities
221
222
 
223
+ <!--Start PulumiCodeChooser -->
222
224
  ```python
223
225
  import pulumi
224
226
  import pulumi_vault as vault
225
227
 
226
228
  internal = vault.identity.Group("internal",
227
- name="internal",
228
229
  type="internal",
229
230
  external_member_entity_ids=True,
230
231
  metadata={
231
232
  "version": "2",
232
233
  })
233
- test_user = vault.identity.Entity("test_user", name="test")
234
- second_test_user = vault.identity.Entity("second_test_user", name="second_test")
235
- dev_user = vault.identity.Entity("dev_user", name="dev")
234
+ test_user = vault.identity.Entity("testUser")
235
+ second_test_user = vault.identity.Entity("secondTestUser")
236
+ dev_user = vault.identity.Entity("devUser")
236
237
  test = vault.identity.GroupMemberEntityIds("test",
237
238
  member_entity_ids=[
238
239
  test_user.id,
@@ -245,6 +246,7 @@ class GroupMemberEntityIds(pulumi.CustomResource):
245
246
  exclusive=False,
246
247
  group_id=internal.id)
247
248
  ```
249
+ <!--End PulumiCodeChooser -->
248
250
 
249
251
  :param str resource_name: The name of the resource.
250
252
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -273,40 +275,41 @@ class GroupMemberEntityIds(pulumi.CustomResource):
273
275
 
274
276
  ### Exclusive Member Entities
275
277
 
278
+ <!--Start PulumiCodeChooser -->
276
279
  ```python
277
280
  import pulumi
278
281
  import pulumi_vault as vault
279
282
 
280
283
  internal = vault.identity.Group("internal",
281
- name="internal",
282
284
  type="internal",
283
285
  external_member_entity_ids=True,
284
286
  metadata={
285
287
  "version": "2",
286
288
  })
287
- user = vault.identity.Entity("user", name="user")
289
+ user = vault.identity.Entity("user")
288
290
  members = vault.identity.GroupMemberEntityIds("members",
289
291
  exclusive=True,
290
292
  member_entity_ids=[user.id],
291
293
  group_id=internal.id)
292
294
  ```
295
+ <!--End PulumiCodeChooser -->
293
296
 
294
297
  ### Non-exclusive Member Entities
295
298
 
299
+ <!--Start PulumiCodeChooser -->
296
300
  ```python
297
301
  import pulumi
298
302
  import pulumi_vault as vault
299
303
 
300
304
  internal = vault.identity.Group("internal",
301
- name="internal",
302
305
  type="internal",
303
306
  external_member_entity_ids=True,
304
307
  metadata={
305
308
  "version": "2",
306
309
  })
307
- test_user = vault.identity.Entity("test_user", name="test")
308
- second_test_user = vault.identity.Entity("second_test_user", name="second_test")
309
- dev_user = vault.identity.Entity("dev_user", name="dev")
310
+ test_user = vault.identity.Entity("testUser")
311
+ second_test_user = vault.identity.Entity("secondTestUser")
312
+ dev_user = vault.identity.Entity("devUser")
310
313
  test = vault.identity.GroupMemberEntityIds("test",
311
314
  member_entity_ids=[
312
315
  test_user.id,
@@ -319,6 +322,7 @@ class GroupMemberEntityIds(pulumi.CustomResource):
319
322
  exclusive=False,
320
323
  group_id=internal.id)
321
324
  ```
325
+ <!--End PulumiCodeChooser -->
322
326
 
323
327
  :param str resource_name: The name of the resource.
324
328
  :param GroupMemberEntityIdsArgs args: The arguments to use to populate this resource's properties.
@@ -213,51 +213,49 @@ class GroupMemberGroupIds(pulumi.CustomResource):
213
213
 
214
214
  ### Exclusive Member Groups
215
215
 
216
+ <!--Start PulumiCodeChooser -->
216
217
  ```python
217
218
  import pulumi
218
219
  import pulumi_vault as vault
219
220
 
220
221
  internal = vault.identity.Group("internal",
221
- name="internal",
222
222
  type="internal",
223
223
  external_member_group_ids=True,
224
224
  metadata={
225
225
  "version": "2",
226
226
  })
227
- users = vault.identity.Group("users",
228
- name="users",
229
- metadata={
230
- "version": "2",
231
- })
227
+ users = vault.identity.Group("users", metadata={
228
+ "version": "2",
229
+ })
232
230
  members = vault.identity.GroupMemberGroupIds("members",
233
231
  exclusive=True,
234
232
  member_group_ids=[users.id],
235
233
  group_id=internal.id)
236
234
  ```
235
+ <!--End PulumiCodeChooser -->
237
236
 
238
237
  ### Non-Exclusive Member Groups
239
238
 
239
+ <!--Start PulumiCodeChooser -->
240
240
  ```python
241
241
  import pulumi
242
242
  import pulumi_vault as vault
243
243
 
244
244
  internal = vault.identity.Group("internal",
245
- name="internal",
246
245
  type="internal",
247
246
  external_member_group_ids=True,
248
247
  metadata={
249
248
  "version": "2",
250
249
  })
251
- users = vault.identity.Group("users",
252
- name="users",
253
- metadata={
254
- "version": "2",
255
- })
250
+ users = vault.identity.Group("users", metadata={
251
+ "version": "2",
252
+ })
256
253
  members = vault.identity.GroupMemberGroupIds("members",
257
254
  exclusive=False,
258
255
  member_group_ids=[users.id],
259
256
  group_id=internal.id)
260
257
  ```
258
+ <!--End PulumiCodeChooser -->
261
259
 
262
260
  :param str resource_name: The name of the resource.
263
261
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -291,51 +289,49 @@ class GroupMemberGroupIds(pulumi.CustomResource):
291
289
 
292
290
  ### Exclusive Member Groups
293
291
 
292
+ <!--Start PulumiCodeChooser -->
294
293
  ```python
295
294
  import pulumi
296
295
  import pulumi_vault as vault
297
296
 
298
297
  internal = vault.identity.Group("internal",
299
- name="internal",
300
298
  type="internal",
301
299
  external_member_group_ids=True,
302
300
  metadata={
303
301
  "version": "2",
304
302
  })
305
- users = vault.identity.Group("users",
306
- name="users",
307
- metadata={
308
- "version": "2",
309
- })
303
+ users = vault.identity.Group("users", metadata={
304
+ "version": "2",
305
+ })
310
306
  members = vault.identity.GroupMemberGroupIds("members",
311
307
  exclusive=True,
312
308
  member_group_ids=[users.id],
313
309
  group_id=internal.id)
314
310
  ```
311
+ <!--End PulumiCodeChooser -->
315
312
 
316
313
  ### Non-Exclusive Member Groups
317
314
 
315
+ <!--Start PulumiCodeChooser -->
318
316
  ```python
319
317
  import pulumi
320
318
  import pulumi_vault as vault
321
319
 
322
320
  internal = vault.identity.Group("internal",
323
- name="internal",
324
321
  type="internal",
325
322
  external_member_group_ids=True,
326
323
  metadata={
327
324
  "version": "2",
328
325
  })
329
- users = vault.identity.Group("users",
330
- name="users",
331
- metadata={
332
- "version": "2",
333
- })
326
+ users = vault.identity.Group("users", metadata={
327
+ "version": "2",
328
+ })
334
329
  members = vault.identity.GroupMemberGroupIds("members",
335
330
  exclusive=False,
336
331
  member_group_ids=[users.id],
337
332
  group_id=internal.id)
338
333
  ```
334
+ <!--End PulumiCodeChooser -->
339
335
 
340
336
  :param str resource_name: The name of the resource.
341
337
  :param GroupMemberGroupIdsArgs args: The arguments to use to populate this resource's properties.
@@ -214,12 +214,12 @@ class GroupPolicies(pulumi.CustomResource):
214
214
 
215
215
  ### Exclusive Policies
216
216
 
217
+ <!--Start PulumiCodeChooser -->
217
218
  ```python
218
219
  import pulumi
219
220
  import pulumi_vault as vault
220
221
 
221
222
  internal = vault.identity.Group("internal",
222
- name="internal",
223
223
  type="internal",
224
224
  external_policies=True,
225
225
  metadata={
@@ -233,15 +233,16 @@ class GroupPolicies(pulumi.CustomResource):
233
233
  exclusive=True,
234
234
  group_id=internal.id)
235
235
  ```
236
+ <!--End PulumiCodeChooser -->
236
237
 
237
238
  ### Non-exclusive Policies
238
239
 
240
+ <!--Start PulumiCodeChooser -->
239
241
  ```python
240
242
  import pulumi
241
243
  import pulumi_vault as vault
242
244
 
243
245
  internal = vault.identity.Group("internal",
244
- name="internal",
245
246
  type="internal",
246
247
  external_policies=True,
247
248
  metadata={
@@ -259,6 +260,7 @@ class GroupPolicies(pulumi.CustomResource):
259
260
  exclusive=False,
260
261
  group_id=internal.id)
261
262
  ```
263
+ <!--End PulumiCodeChooser -->
262
264
 
263
265
  :param str resource_name: The name of the resource.
264
266
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -287,12 +289,12 @@ class GroupPolicies(pulumi.CustomResource):
287
289
 
288
290
  ### Exclusive Policies
289
291
 
292
+ <!--Start PulumiCodeChooser -->
290
293
  ```python
291
294
  import pulumi
292
295
  import pulumi_vault as vault
293
296
 
294
297
  internal = vault.identity.Group("internal",
295
- name="internal",
296
298
  type="internal",
297
299
  external_policies=True,
298
300
  metadata={
@@ -306,15 +308,16 @@ class GroupPolicies(pulumi.CustomResource):
306
308
  exclusive=True,
307
309
  group_id=internal.id)
308
310
  ```
311
+ <!--End PulumiCodeChooser -->
309
312
 
310
313
  ### Non-exclusive Policies
311
314
 
315
+ <!--Start PulumiCodeChooser -->
312
316
  ```python
313
317
  import pulumi
314
318
  import pulumi_vault as vault
315
319
 
316
320
  internal = vault.identity.Group("internal",
317
- name="internal",
318
321
  type="internal",
319
322
  external_policies=True,
320
323
  metadata={
@@ -332,6 +335,7 @@ class GroupPolicies(pulumi.CustomResource):
332
335
  exclusive=False,
333
336
  group_id=internal.id)
334
337
  ```
338
+ <!--End PulumiCodeChooser -->
335
339
 
336
340
  :param str resource_name: The name of the resource.
337
341
  :param GroupPoliciesArgs args: The arguments to use to populate this resource's properties.
@@ -378,15 +378,17 @@ class MfaDuo(pulumi.CustomResource):
378
378
 
379
379
  ## Example Usage
380
380
 
381
+ <!--Start PulumiCodeChooser -->
381
382
  ```python
382
383
  import pulumi
383
384
  import pulumi_vault as vault
384
385
 
385
386
  example = vault.identity.MfaDuo("example",
386
387
  api_hostname="api-xxxxxxxx.duosecurity.com",
387
- secret_key="secret-key",
388
- integration_key="secret-int-key")
388
+ integration_key="secret-int-key",
389
+ secret_key="secret-key")
389
390
  ```
391
+ <!--End PulumiCodeChooser -->
390
392
 
391
393
  ## Import
392
394
 
@@ -417,15 +419,17 @@ class MfaDuo(pulumi.CustomResource):
417
419
 
418
420
  ## Example Usage
419
421
 
422
+ <!--Start PulumiCodeChooser -->
420
423
  ```python
421
424
  import pulumi
422
425
  import pulumi_vault as vault
423
426
 
424
427
  example = vault.identity.MfaDuo("example",
425
428
  api_hostname="api-xxxxxxxx.duosecurity.com",
426
- secret_key="secret-key",
427
- integration_key="secret-int-key")
429
+ integration_key="secret-int-key",
430
+ secret_key="secret-key")
428
431
  ```
432
+ <!--End PulumiCodeChooser -->
429
433
 
430
434
  ## Import
431
435
 
@@ -316,19 +316,19 @@ class MfaLoginEnforcement(pulumi.CustomResource):
316
316
 
317
317
  ## Example Usage
318
318
 
319
+ <!--Start PulumiCodeChooser -->
319
320
  ```python
320
321
  import pulumi
321
322
  import pulumi_vault as vault
322
323
 
323
- example = vault.identity.MfaDuo("example",
324
+ example_mfa_duo = vault.identity.MfaDuo("exampleMfaDuo",
324
325
  secret_key="secret-key",
325
326
  integration_key="int-key",
326
327
  api_hostname="foo.baz",
327
328
  push_info="push-info")
328
- example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
329
- name="default",
330
- mfa_method_ids=[example.method_id])
329
+ example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("exampleMfaLoginEnforcement", mfa_method_ids=[example_mfa_duo.method_id])
331
330
  ```
331
+ <!--End PulumiCodeChooser -->
332
332
 
333
333
  ## Import
334
334
 
@@ -359,19 +359,19 @@ class MfaLoginEnforcement(pulumi.CustomResource):
359
359
 
360
360
  ## Example Usage
361
361
 
362
+ <!--Start PulumiCodeChooser -->
362
363
  ```python
363
364
  import pulumi
364
365
  import pulumi_vault as vault
365
366
 
366
- example = vault.identity.MfaDuo("example",
367
+ example_mfa_duo = vault.identity.MfaDuo("exampleMfaDuo",
367
368
  secret_key="secret-key",
368
369
  integration_key="int-key",
369
370
  api_hostname="foo.baz",
370
371
  push_info="push-info")
371
- example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
372
- name="default",
373
- mfa_method_ids=[example.method_id])
372
+ example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("exampleMfaLoginEnforcement", mfa_method_ids=[example_mfa_duo.method_id])
374
373
  ```
374
+ <!--End PulumiCodeChooser -->
375
375
 
376
376
  ## Import
377
377
 
@@ -346,15 +346,17 @@ class MfaOkta(pulumi.CustomResource):
346
346
 
347
347
  ## Example Usage
348
348
 
349
+ <!--Start PulumiCodeChooser -->
349
350
  ```python
350
351
  import pulumi
351
352
  import pulumi_vault as vault
352
353
 
353
354
  example = vault.identity.MfaOkta("example",
354
- org_name="org1",
355
355
  api_token="token1",
356
- base_url="qux.baz.com")
356
+ base_url="qux.baz.com",
357
+ org_name="org1")
357
358
  ```
359
+ <!--End PulumiCodeChooser -->
358
360
 
359
361
  ## Import
360
362
 
@@ -384,15 +386,17 @@ class MfaOkta(pulumi.CustomResource):
384
386
 
385
387
  ## Example Usage
386
388
 
389
+ <!--Start PulumiCodeChooser -->
387
390
  ```python
388
391
  import pulumi
389
392
  import pulumi_vault as vault
390
393
 
391
394
  example = vault.identity.MfaOkta("example",
392
- org_name="org1",
393
395
  api_token="token1",
394
- base_url="qux.baz.com")
396
+ base_url="qux.baz.com",
397
+ org_name="org1")
395
398
  ```
399
+ <!--End PulumiCodeChooser -->
396
400
 
397
401
  ## Import
398
402