pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. pulumi_vault/_inputs.py +20 -0
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +4 -2
  4. pulumi_vault/ad/secret_role.py +4 -0
  5. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +186 -63
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +20 -12
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +10 -6
  13. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  15. pulumi_vault/aws/auth_backend_login.py +8 -0
  16. pulumi_vault/aws/auth_backend_role.py +186 -63
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  18. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  19. pulumi_vault/aws/secret_backend_role.py +4 -2
  20. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  21. pulumi_vault/azure/auth_backend_config.py +10 -6
  22. pulumi_vault/azure/auth_backend_role.py +186 -63
  23. pulumi_vault/azure/backend.py +24 -16
  24. pulumi_vault/azure/backend_role.py +18 -14
  25. pulumi_vault/azure/get_access_credentials.py +4 -0
  26. pulumi_vault/cert_auth_backend_role.py +208 -75
  27. pulumi_vault/consul/secret_backend.py +18 -10
  28. pulumi_vault/consul/secret_backend_role.py +4 -2
  29. pulumi_vault/database/_inputs.py +784 -522
  30. pulumi_vault/database/outputs.py +784 -522
  31. pulumi_vault/database/secret_backend_connection.py +4 -2
  32. pulumi_vault/database/secret_backend_role.py +4 -4
  33. pulumi_vault/database/secret_backend_static_role.py +8 -10
  34. pulumi_vault/database/secrets_mount.py +4 -4
  35. pulumi_vault/egp_policy.py +8 -4
  36. pulumi_vault/gcp/auth_backend.py +36 -0
  37. pulumi_vault/gcp/auth_backend_role.py +264 -63
  38. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  39. pulumi_vault/gcp/secret_backend.py +6 -4
  40. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  41. pulumi_vault/gcp/secret_roleset.py +6 -4
  42. pulumi_vault/gcp/secret_static_account.py +16 -14
  43. pulumi_vault/generic/endpoint.py +8 -4
  44. pulumi_vault/generic/get_secret.py +4 -40
  45. pulumi_vault/get_auth_backend.py +4 -0
  46. pulumi_vault/get_auth_backends.py +8 -0
  47. pulumi_vault/get_namespace.py +12 -0
  48. pulumi_vault/get_namespaces.py +12 -4
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +8 -8
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +4 -0
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +8 -6
  56. pulumi_vault/identity/entity_alias.py +8 -6
  57. pulumi_vault/identity/entity_policies.py +12 -12
  58. pulumi_vault/identity/get_entity.py +4 -0
  59. pulumi_vault/identity/get_group.py +4 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  61. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  62. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  63. pulumi_vault/identity/group.py +42 -38
  64. pulumi_vault/identity/group_alias.py +4 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  66. pulumi_vault/identity/group_member_group_ids.py +20 -24
  67. pulumi_vault/identity/group_policies.py +8 -4
  68. pulumi_vault/identity/mfa_duo.py +8 -4
  69. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  70. pulumi_vault/identity/mfa_okta.py +8 -4
  71. pulumi_vault/identity/mfa_pingid.py +4 -0
  72. pulumi_vault/identity/mfa_totp.py +4 -0
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -10
  75. pulumi_vault/identity/oidc_client.py +10 -10
  76. pulumi_vault/identity/oidc_key.py +12 -16
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  78. pulumi_vault/identity/oidc_provider.py +16 -22
  79. pulumi_vault/identity/oidc_role.py +20 -28
  80. pulumi_vault/identity/oidc_scope.py +8 -6
  81. pulumi_vault/jwt/auth_backend.py +32 -20
  82. pulumi_vault/jwt/auth_backend_role.py +190 -63
  83. pulumi_vault/kmip/secret_backend.py +14 -10
  84. pulumi_vault/kmip/secret_role.py +4 -0
  85. pulumi_vault/kmip/secret_scope.py +4 -0
  86. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  87. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  88. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  89. pulumi_vault/kubernetes/secret_backend.py +8 -6
  90. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  91. pulumi_vault/kv/get_secret.py +4 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  93. pulumi_vault/kv/get_secret_v2.py +0 -58
  94. pulumi_vault/kv/get_secrets_list.py +8 -4
  95. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  96. pulumi_vault/kv/secret.py +4 -0
  97. pulumi_vault/kv/secret_backend_v2.py +4 -0
  98. pulumi_vault/kv/secret_v2.py +4 -2
  99. pulumi_vault/ldap/auth_backend.py +161 -66
  100. pulumi_vault/ldap/auth_backend_group.py +4 -0
  101. pulumi_vault/ldap/auth_backend_user.py +4 -0
  102. pulumi_vault/ldap/secret_backend.py +8 -4
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  104. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  106. pulumi_vault/managed/_inputs.py +132 -84
  107. pulumi_vault/managed/keys.py +28 -7
  108. pulumi_vault/managed/outputs.py +132 -84
  109. pulumi_vault/mfa_duo.py +6 -4
  110. pulumi_vault/mfa_okta.py +6 -4
  111. pulumi_vault/mfa_pingid.py +6 -4
  112. pulumi_vault/mfa_totp.py +12 -10
  113. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  114. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  115. pulumi_vault/mount.py +42 -26
  116. pulumi_vault/nomad_secret_backend.py +8 -4
  117. pulumi_vault/nomad_secret_role.py +4 -0
  118. pulumi_vault/okta/_inputs.py +8 -8
  119. pulumi_vault/okta/auth_backend.py +10 -6
  120. pulumi_vault/okta/auth_backend_group.py +4 -0
  121. pulumi_vault/okta/auth_backend_user.py +4 -0
  122. pulumi_vault/okta/outputs.py +8 -8
  123. pulumi_vault/outputs.py +20 -0
  124. pulumi_vault/password_policy.py +8 -6
  125. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  126. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  127. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  128. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  129. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  131. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  132. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  133. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  134. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  136. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  137. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  139. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  140. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  141. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  142. pulumi_vault/provider.py +8 -0
  143. pulumi_vault/pulumi-plugin.json +1 -2
  144. pulumi_vault/quota_lease_count.py +8 -6
  145. pulumi_vault/quota_rate_limit.py +4 -2
  146. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  147. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  148. pulumi_vault/raft_autopilot.py +4 -0
  149. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  150. pulumi_vault/rgp_policy.py +6 -2
  151. pulumi_vault/saml/auth_backend.py +12 -8
  152. pulumi_vault/saml/auth_backend_role.py +178 -64
  153. pulumi_vault/secrets/sync_association.py +10 -12
  154. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  155. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  156. pulumi_vault/secrets/sync_config.py +6 -2
  157. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  158. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  159. pulumi_vault/secrets/sync_github_apps.py +8 -8
  160. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  161. pulumi_vault/ssh/_inputs.py +32 -6
  162. pulumi_vault/ssh/outputs.py +32 -6
  163. pulumi_vault/ssh/secret_backend_ca.py +4 -0
  164. pulumi_vault/ssh/secret_backend_role.py +4 -4
  165. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  166. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  167. pulumi_vault/terraformcloud/secret_role.py +69 -2
  168. pulumi_vault/token.py +18 -14
  169. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  170. pulumi_vault/transform/alphabet.py +6 -4
  171. pulumi_vault/transform/get_decode.py +4 -4
  172. pulumi_vault/transform/get_encode.py +4 -4
  173. pulumi_vault/transform/role.py +6 -4
  174. pulumi_vault/transform/template.py +4 -4
  175. pulumi_vault/transit/get_decrypt.py +20 -4
  176. pulumi_vault/transit/get_encrypt.py +14 -0
  177. pulumi_vault/transit/secret_backend_key.py +6 -6
  178. pulumi_vault/transit/secret_cache_config.py +4 -0
  179. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  180. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
  182. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
  183. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
pulumi_vault/mfa_totp.py CHANGED
@@ -360,18 +360,19 @@ class MfaTotp(pulumi.CustomResource):
360
360
 
361
361
  ## Example Usage
362
362
 
363
+ <!--Start PulumiCodeChooser -->
363
364
  ```python
364
365
  import pulumi
365
366
  import pulumi_vault as vault
366
367
 
367
- my_totp = vault.MfaTotp("my_totp",
368
- name="my_totp",
369
- issuer="hashicorp",
370
- period=60,
368
+ my_totp = vault.MfaTotp("myTotp",
371
369
  algorithm="SHA256",
372
370
  digits=8,
373
- key_size=20)
371
+ issuer="hashicorp",
372
+ key_size=20,
373
+ period=60)
374
374
  ```
375
+ <!--End PulumiCodeChooser -->
375
376
 
376
377
  ## Import
377
378
 
@@ -412,18 +413,19 @@ class MfaTotp(pulumi.CustomResource):
412
413
 
413
414
  ## Example Usage
414
415
 
416
+ <!--Start PulumiCodeChooser -->
415
417
  ```python
416
418
  import pulumi
417
419
  import pulumi_vault as vault
418
420
 
419
- my_totp = vault.MfaTotp("my_totp",
420
- name="my_totp",
421
- issuer="hashicorp",
422
- period=60,
421
+ my_totp = vault.MfaTotp("myTotp",
423
422
  algorithm="SHA256",
424
423
  digits=8,
425
- key_size=20)
424
+ issuer="hashicorp",
425
+ key_size=20,
426
+ period=60)
426
427
  ```
428
+ <!--End PulumiCodeChooser -->
427
429
 
428
430
  ## Import
429
431
 
@@ -193,6 +193,7 @@ class SecretBackend(pulumi.CustomResource):
193
193
  """
194
194
  ## Example Usage
195
195
 
196
+ <!--Start PulumiCodeChooser -->
196
197
  ```python
197
198
  import pulumi
198
199
  import pulumi_vault as vault
@@ -206,6 +207,7 @@ class SecretBackend(pulumi.CustomResource):
206
207
  private_key="privateKey",
207
208
  public_key="publicKey")
208
209
  ```
210
+ <!--End PulumiCodeChooser -->
209
211
 
210
212
  ## Import
211
213
 
@@ -234,6 +236,7 @@ class SecretBackend(pulumi.CustomResource):
234
236
  """
235
237
  ## Example Usage
236
238
 
239
+ <!--Start PulumiCodeChooser -->
237
240
  ```python
238
241
  import pulumi
239
242
  import pulumi_vault as vault
@@ -247,6 +250,7 @@ class SecretBackend(pulumi.CustomResource):
247
250
  private_key="privateKey",
248
251
  public_key="publicKey")
249
252
  ```
253
+ <!--End PulumiCodeChooser -->
250
254
 
251
255
  ## Import
252
256
 
@@ -417,6 +417,7 @@ class SecretRole(pulumi.CustomResource):
417
417
  """
418
418
  ## Example Usage
419
419
 
420
+ <!--Start PulumiCodeChooser -->
420
421
  ```python
421
422
  import pulumi
422
423
  import pulumi_vault as vault
@@ -431,7 +432,6 @@ class SecretRole(pulumi.CustomResource):
431
432
  public_key="publicKey")
432
433
  role = vault.mongodbatlas.SecretRole("role",
433
434
  mount=mongo.path,
434
- name="tf-test-role",
435
435
  organization_id="7cf5a45a9ccf6400e60981b7",
436
436
  project_id="5cf5a45a9ccf6400e60981b6",
437
437
  roles=["ORG_READ_ONLY"],
@@ -441,6 +441,7 @@ class SecretRole(pulumi.CustomResource):
441
441
  ttl="60",
442
442
  max_ttl="120")
443
443
  ```
444
+ <!--End PulumiCodeChooser -->
444
445
 
445
446
  ## Import
446
447
 
@@ -479,6 +480,7 @@ class SecretRole(pulumi.CustomResource):
479
480
  """
480
481
  ## Example Usage
481
482
 
483
+ <!--Start PulumiCodeChooser -->
482
484
  ```python
483
485
  import pulumi
484
486
  import pulumi_vault as vault
@@ -493,7 +495,6 @@ class SecretRole(pulumi.CustomResource):
493
495
  public_key="publicKey")
494
496
  role = vault.mongodbatlas.SecretRole("role",
495
497
  mount=mongo.path,
496
- name="tf-test-role",
497
498
  organization_id="7cf5a45a9ccf6400e60981b7",
498
499
  project_id="5cf5a45a9ccf6400e60981b6",
499
500
  roles=["ORG_READ_ONLY"],
@@ -503,6 +504,7 @@ class SecretRole(pulumi.CustomResource):
503
504
  ttl="60",
504
505
  max_ttl="120")
505
506
  ```
507
+ <!--End PulumiCodeChooser -->
506
508
 
507
509
  ## Import
508
510
 
pulumi_vault/mount.py CHANGED
@@ -493,54 +493,62 @@ class Mount(pulumi.CustomResource):
493
493
 
494
494
  ## Example Usage
495
495
 
496
+ <!--Start PulumiCodeChooser -->
496
497
  ```python
497
498
  import pulumi
498
499
  import pulumi_vault as vault
499
500
 
500
501
  example = vault.Mount("example",
502
+ description="This is an example mount",
501
503
  path="dummy",
502
- type="generic",
503
- description="This is an example mount")
504
+ type="generic")
504
505
  ```
506
+ <!--End PulumiCodeChooser -->
505
507
 
508
+ <!--Start PulumiCodeChooser -->
506
509
  ```python
507
510
  import pulumi
508
511
  import pulumi_vault as vault
509
512
 
510
513
  kvv2_example = vault.Mount("kvv2-example",
511
- path="version2-example",
512
- type="kv-v2",
514
+ description="This is an example KV Version 2 secret engine mount",
513
515
  options={
514
- "version": "2",
515
516
  "type": "kv-v2",
517
+ "version": "2",
516
518
  },
517
- description="This is an example KV Version 2 secret engine mount")
519
+ path="version2-example",
520
+ type="kv-v2")
518
521
  ```
522
+ <!--End PulumiCodeChooser -->
519
523
 
524
+ <!--Start PulumiCodeChooser -->
520
525
  ```python
521
526
  import pulumi
522
527
  import pulumi_vault as vault
523
528
 
524
529
  transit_example = vault.Mount("transit-example",
525
- path="transit-example",
526
- type="transit",
527
530
  description="This is an example transit secret engine mount",
528
531
  options={
529
532
  "convergent_encryption": False,
530
- })
533
+ },
534
+ path="transit-example",
535
+ type="transit")
531
536
  ```
537
+ <!--End PulumiCodeChooser -->
532
538
 
539
+ <!--Start PulumiCodeChooser -->
533
540
  ```python
534
541
  import pulumi
535
542
  import pulumi_vault as vault
536
543
 
537
544
  pki_example = vault.Mount("pki-example",
538
- path="pki-example",
539
- type="pki",
540
- description="This is an example PKI mount",
541
545
  default_lease_ttl_seconds=3600,
542
- max_lease_ttl_seconds=86400)
546
+ description="This is an example PKI mount",
547
+ max_lease_ttl_seconds=86400,
548
+ path="pki-example",
549
+ type="pki")
543
550
  ```
551
+ <!--End PulumiCodeChooser -->
544
552
 
545
553
  ## Import
546
554
 
@@ -580,54 +588,62 @@ class Mount(pulumi.CustomResource):
580
588
 
581
589
  ## Example Usage
582
590
 
591
+ <!--Start PulumiCodeChooser -->
583
592
  ```python
584
593
  import pulumi
585
594
  import pulumi_vault as vault
586
595
 
587
596
  example = vault.Mount("example",
597
+ description="This is an example mount",
588
598
  path="dummy",
589
- type="generic",
590
- description="This is an example mount")
599
+ type="generic")
591
600
  ```
601
+ <!--End PulumiCodeChooser -->
592
602
 
603
+ <!--Start PulumiCodeChooser -->
593
604
  ```python
594
605
  import pulumi
595
606
  import pulumi_vault as vault
596
607
 
597
608
  kvv2_example = vault.Mount("kvv2-example",
598
- path="version2-example",
599
- type="kv-v2",
609
+ description="This is an example KV Version 2 secret engine mount",
600
610
  options={
601
- "version": "2",
602
611
  "type": "kv-v2",
612
+ "version": "2",
603
613
  },
604
- description="This is an example KV Version 2 secret engine mount")
614
+ path="version2-example",
615
+ type="kv-v2")
605
616
  ```
617
+ <!--End PulumiCodeChooser -->
606
618
 
619
+ <!--Start PulumiCodeChooser -->
607
620
  ```python
608
621
  import pulumi
609
622
  import pulumi_vault as vault
610
623
 
611
624
  transit_example = vault.Mount("transit-example",
612
- path="transit-example",
613
- type="transit",
614
625
  description="This is an example transit secret engine mount",
615
626
  options={
616
627
  "convergent_encryption": False,
617
- })
628
+ },
629
+ path="transit-example",
630
+ type="transit")
618
631
  ```
632
+ <!--End PulumiCodeChooser -->
619
633
 
634
+ <!--Start PulumiCodeChooser -->
620
635
  ```python
621
636
  import pulumi
622
637
  import pulumi_vault as vault
623
638
 
624
639
  pki_example = vault.Mount("pki-example",
625
- path="pki-example",
626
- type="pki",
627
- description="This is an example PKI mount",
628
640
  default_lease_ttl_seconds=3600,
629
- max_lease_ttl_seconds=86400)
641
+ description="This is an example PKI mount",
642
+ max_lease_ttl_seconds=86400,
643
+ path="pki-example",
644
+ type="pki")
630
645
  ```
646
+ <!--End PulumiCodeChooser -->
631
647
 
632
648
  ## Import
633
649
 
@@ -571,20 +571,22 @@ class NomadSecretBackend(pulumi.CustomResource):
571
571
  """
572
572
  ## Example Usage
573
573
 
574
+ <!--Start PulumiCodeChooser -->
574
575
  ```python
575
576
  import pulumi
576
577
  import pulumi_vault as vault
577
578
 
578
579
  config = vault.NomadSecretBackend("config",
580
+ address="https://127.0.0.1:4646",
579
581
  backend="nomad",
580
- description="test description",
581
582
  default_lease_ttl_seconds=3600,
583
+ description="test description",
582
584
  max_lease_ttl_seconds=7200,
583
585
  max_ttl=240,
584
- address="https://127.0.0.1:4646",
585
586
  token="ae20ceaa-...",
586
587
  ttl=120)
587
588
  ```
589
+ <!--End PulumiCodeChooser -->
588
590
 
589
591
  ## Import
590
592
 
@@ -631,20 +633,22 @@ class NomadSecretBackend(pulumi.CustomResource):
631
633
  """
632
634
  ## Example Usage
633
635
 
636
+ <!--Start PulumiCodeChooser -->
634
637
  ```python
635
638
  import pulumi
636
639
  import pulumi_vault as vault
637
640
 
638
641
  config = vault.NomadSecretBackend("config",
642
+ address="https://127.0.0.1:4646",
639
643
  backend="nomad",
640
- description="test description",
641
644
  default_lease_ttl_seconds=3600,
645
+ description="test description",
642
646
  max_lease_ttl_seconds=7200,
643
647
  max_ttl=240,
644
- address="https://127.0.0.1:4646",
645
648
  token="ae20ceaa-...",
646
649
  ttl=120)
647
650
  ```
651
+ <!--End PulumiCodeChooser -->
648
652
 
649
653
  ## Import
650
654
 
@@ -260,6 +260,7 @@ class NomadSecretRole(pulumi.CustomResource):
260
260
  """
261
261
  ## Example Usage
262
262
 
263
+ <!--Start PulumiCodeChooser -->
263
264
  ```python
264
265
  import pulumi
265
266
  import pulumi_vault as vault
@@ -277,6 +278,7 @@ class NomadSecretRole(pulumi.CustomResource):
277
278
  type="client",
278
279
  policies=["readonly"])
279
280
  ```
281
+ <!--End PulumiCodeChooser -->
280
282
 
281
283
  ## Import
282
284
 
@@ -311,6 +313,7 @@ class NomadSecretRole(pulumi.CustomResource):
311
313
  """
312
314
  ## Example Usage
313
315
 
316
+ <!--Start PulumiCodeChooser -->
314
317
  ```python
315
318
  import pulumi
316
319
  import pulumi_vault as vault
@@ -328,6 +331,7 @@ class NomadSecretRole(pulumi.CustomResource):
328
331
  type="client",
329
332
  policies=["readonly"])
330
333
  ```
334
+ <!--End PulumiCodeChooser -->
331
335
 
332
336
  ## Import
333
337
 
@@ -20,8 +20,8 @@ class AuthBackendGroupArgs:
20
20
  group_name: pulumi.Input[str],
21
21
  policies: pulumi.Input[Sequence[pulumi.Input[str]]]):
22
22
  """
23
- :param pulumi.Input[str] group_name: Name of the Okta group
24
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this group
23
+ :param pulumi.Input[str] group_name: Name of the group within the Okta
24
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
25
25
  """
26
26
  pulumi.set(__self__, "group_name", group_name)
27
27
  pulumi.set(__self__, "policies", policies)
@@ -30,7 +30,7 @@ class AuthBackendGroupArgs:
30
30
  @pulumi.getter(name="groupName")
31
31
  def group_name(self) -> pulumi.Input[str]:
32
32
  """
33
- Name of the Okta group
33
+ Name of the group within the Okta
34
34
  """
35
35
  return pulumi.get(self, "group_name")
36
36
 
@@ -42,7 +42,7 @@ class AuthBackendGroupArgs:
42
42
  @pulumi.getter
43
43
  def policies(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
44
44
  """
45
- Policies to associate with this group
45
+ Vault policies to associate with this group
46
46
  """
47
47
  return pulumi.get(self, "policies")
48
48
 
@@ -59,8 +59,8 @@ class AuthBackendUserArgs:
59
59
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
60
60
  """
61
61
  :param pulumi.Input[str] username: Name of the user within Okta
62
- :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Groups within the Okta auth backend to associate with this user
63
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this user
62
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
63
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
64
64
  """
65
65
  pulumi.set(__self__, "username", username)
66
66
  if groups is not None:
@@ -84,7 +84,7 @@ class AuthBackendUserArgs:
84
84
  @pulumi.getter
85
85
  def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
86
86
  """
87
- Groups within the Okta auth backend to associate with this user
87
+ List of Okta groups to associate with this user
88
88
  """
89
89
  return pulumi.get(self, "groups")
90
90
 
@@ -96,7 +96,7 @@ class AuthBackendUserArgs:
96
96
  @pulumi.getter
97
97
  def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
98
98
  """
99
- Policies to associate with this user
99
+ Vault policies to associate with this group
100
100
  """
101
101
  return pulumi.get(self, "policies")
102
102
 
@@ -488,14 +488,13 @@ class AuthBackend(pulumi.CustomResource):
488
488
 
489
489
  ## Example Usage
490
490
 
491
+ <!--Start PulumiCodeChooser -->
491
492
  ```python
492
493
  import pulumi
493
494
  import pulumi_vault as vault
494
495
 
495
496
  example = vault.okta.AuthBackend("example",
496
497
  description="Demonstration of the Terraform Okta auth backend",
497
- organization="example",
498
- token="something that should be kept secret",
499
498
  groups=[vault.okta.AuthBackendGroupArgs(
500
499
  group_name="foo",
501
500
  policies=[
@@ -503,11 +502,14 @@ class AuthBackend(pulumi.CustomResource):
503
502
  "two",
504
503
  ],
505
504
  )],
505
+ organization="example",
506
+ token="something that should be kept secret",
506
507
  users=[vault.okta.AuthBackendUserArgs(
507
- username="bar",
508
508
  groups=["foo"],
509
+ username="bar",
509
510
  )])
510
511
  ```
512
+ <!--End PulumiCodeChooser -->
511
513
 
512
514
  ## Import
513
515
 
@@ -553,14 +555,13 @@ class AuthBackend(pulumi.CustomResource):
553
555
 
554
556
  ## Example Usage
555
557
 
558
+ <!--Start PulumiCodeChooser -->
556
559
  ```python
557
560
  import pulumi
558
561
  import pulumi_vault as vault
559
562
 
560
563
  example = vault.okta.AuthBackend("example",
561
564
  description="Demonstration of the Terraform Okta auth backend",
562
- organization="example",
563
- token="something that should be kept secret",
564
565
  groups=[vault.okta.AuthBackendGroupArgs(
565
566
  group_name="foo",
566
567
  policies=[
@@ -568,11 +569,14 @@ class AuthBackend(pulumi.CustomResource):
568
569
  "two",
569
570
  ],
570
571
  )],
572
+ organization="example",
573
+ token="something that should be kept secret",
571
574
  users=[vault.okta.AuthBackendUserArgs(
572
- username="bar",
573
575
  groups=["foo"],
576
+ username="bar",
574
577
  )])
575
578
  ```
579
+ <!--End PulumiCodeChooser -->
576
580
 
577
581
  ## Import
578
582
 
@@ -181,6 +181,7 @@ class AuthBackendGroup(pulumi.CustomResource):
181
181
 
182
182
  ## Example Usage
183
183
 
184
+ <!--Start PulumiCodeChooser -->
184
185
  ```python
185
186
  import pulumi
186
187
  import pulumi_vault as vault
@@ -196,6 +197,7 @@ class AuthBackendGroup(pulumi.CustomResource):
196
197
  "two",
197
198
  ])
198
199
  ```
200
+ <!--End PulumiCodeChooser -->
199
201
 
200
202
  ## Import
201
203
 
@@ -227,6 +229,7 @@ class AuthBackendGroup(pulumi.CustomResource):
227
229
 
228
230
  ## Example Usage
229
231
 
232
+ <!--Start PulumiCodeChooser -->
230
233
  ```python
231
234
  import pulumi
232
235
  import pulumi_vault as vault
@@ -242,6 +245,7 @@ class AuthBackendGroup(pulumi.CustomResource):
242
245
  "two",
243
246
  ])
244
247
  ```
248
+ <!--End PulumiCodeChooser -->
245
249
 
246
250
  ## Import
247
251
 
@@ -214,6 +214,7 @@ class AuthBackendUser(pulumi.CustomResource):
214
214
 
215
215
  ## Example Usage
216
216
 
217
+ <!--Start PulumiCodeChooser -->
217
218
  ```python
218
219
  import pulumi
219
220
  import pulumi_vault as vault
@@ -229,6 +230,7 @@ class AuthBackendUser(pulumi.CustomResource):
229
230
  "two",
230
231
  ])
231
232
  ```
233
+ <!--End PulumiCodeChooser -->
232
234
 
233
235
  ## Import
234
236
 
@@ -261,6 +263,7 @@ class AuthBackendUser(pulumi.CustomResource):
261
263
 
262
264
  ## Example Usage
263
265
 
266
+ <!--Start PulumiCodeChooser -->
264
267
  ```python
265
268
  import pulumi
266
269
  import pulumi_vault as vault
@@ -276,6 +279,7 @@ class AuthBackendUser(pulumi.CustomResource):
276
279
  "two",
277
280
  ])
278
281
  ```
282
+ <!--End PulumiCodeChooser -->
279
283
 
280
284
  ## Import
281
285
 
@@ -37,8 +37,8 @@ class AuthBackendGroup(dict):
37
37
  group_name: str,
38
38
  policies: Sequence[str]):
39
39
  """
40
- :param str group_name: Name of the Okta group
41
- :param Sequence[str] policies: Policies to associate with this group
40
+ :param str group_name: Name of the group within the Okta
41
+ :param Sequence[str] policies: Vault policies to associate with this group
42
42
  """
43
43
  pulumi.set(__self__, "group_name", group_name)
44
44
  pulumi.set(__self__, "policies", policies)
@@ -47,7 +47,7 @@ class AuthBackendGroup(dict):
47
47
  @pulumi.getter(name="groupName")
48
48
  def group_name(self) -> str:
49
49
  """
50
- Name of the Okta group
50
+ Name of the group within the Okta
51
51
  """
52
52
  return pulumi.get(self, "group_name")
53
53
 
@@ -55,7 +55,7 @@ class AuthBackendGroup(dict):
55
55
  @pulumi.getter
56
56
  def policies(self) -> Sequence[str]:
57
57
  """
58
- Policies to associate with this group
58
+ Vault policies to associate with this group
59
59
  """
60
60
  return pulumi.get(self, "policies")
61
61
 
@@ -68,8 +68,8 @@ class AuthBackendUser(dict):
68
68
  policies: Optional[Sequence[str]] = None):
69
69
  """
70
70
  :param str username: Name of the user within Okta
71
- :param Sequence[str] groups: Groups within the Okta auth backend to associate with this user
72
- :param Sequence[str] policies: Policies to associate with this user
71
+ :param Sequence[str] groups: List of Okta groups to associate with this user
72
+ :param Sequence[str] policies: Vault policies to associate with this group
73
73
  """
74
74
  pulumi.set(__self__, "username", username)
75
75
  if groups is not None:
@@ -89,7 +89,7 @@ class AuthBackendUser(dict):
89
89
  @pulumi.getter
90
90
  def groups(self) -> Optional[Sequence[str]]:
91
91
  """
92
- Groups within the Okta auth backend to associate with this user
92
+ List of Okta groups to associate with this user
93
93
  """
94
94
  return pulumi.get(self, "groups")
95
95
 
@@ -97,7 +97,7 @@ class AuthBackendUser(dict):
97
97
  @pulumi.getter
98
98
  def policies(self) -> Optional[Sequence[str]]:
99
99
  """
100
- Policies to associate with this user
100
+ Vault policies to associate with this group
101
101
  """
102
102
  return pulumi.get(self, "policies")
103
103
 
pulumi_vault/outputs.py CHANGED
@@ -277,17 +277,27 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
277
277
  def __init__(__self__, *,
278
278
  key: str,
279
279
  values: Sequence[str]):
280
+ """
281
+ :param str key: name of permitted or denied parameter.
282
+ :param Sequence[str] values: list of values what are permitted or denied by policy rule.
283
+ """
280
284
  pulumi.set(__self__, "key", key)
281
285
  pulumi.set(__self__, "values", values)
282
286
 
283
287
  @property
284
288
  @pulumi.getter
285
289
  def key(self) -> str:
290
+ """
291
+ name of permitted or denied parameter.
292
+ """
286
293
  return pulumi.get(self, "key")
287
294
 
288
295
  @property
289
296
  @pulumi.getter
290
297
  def values(self) -> Sequence[str]:
298
+ """
299
+ list of values what are permitted or denied by policy rule.
300
+ """
291
301
  return pulumi.get(self, "values")
292
302
 
293
303
 
@@ -296,17 +306,27 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
296
306
  def __init__(__self__, *,
297
307
  key: str,
298
308
  values: Sequence[str]):
309
+ """
310
+ :param str key: name of permitted or denied parameter.
311
+ :param Sequence[str] values: list of values what are permitted or denied by policy rule.
312
+ """
299
313
  pulumi.set(__self__, "key", key)
300
314
  pulumi.set(__self__, "values", values)
301
315
 
302
316
  @property
303
317
  @pulumi.getter
304
318
  def key(self) -> str:
319
+ """
320
+ name of permitted or denied parameter.
321
+ """
305
322
  return pulumi.get(self, "key")
306
323
 
307
324
  @property
308
325
  @pulumi.getter
309
326
  def values(self) -> Sequence[str]:
327
+ """
328
+ list of values what are permitted or denied by policy rule.
329
+ """
310
330
  return pulumi.get(self, "values")
311
331
 
312
332