pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -246,17 +246,18 @@ class Entity(pulumi.CustomResource):
246
246
  """
247
247
  ## Example Usage
248
248
 
249
+ <!--Start PulumiCodeChooser -->
249
250
  ```python
250
251
  import pulumi
251
252
  import pulumi_vault as vault
252
253
 
253
254
  test = vault.identity.Entity("test",
254
- name="tester1",
255
- policies=["test"],
256
255
  metadata={
257
256
  "foo": "bar",
258
- })
257
+ },
258
+ policies=["test"])
259
259
  ```
260
+ <!--End PulumiCodeChooser -->
260
261
 
261
262
  ## Import
262
263
 
@@ -287,17 +288,18 @@ class Entity(pulumi.CustomResource):
287
288
  """
288
289
  ## Example Usage
289
290
 
291
+ <!--Start PulumiCodeChooser -->
290
292
  ```python
291
293
  import pulumi
292
294
  import pulumi_vault as vault
293
295
 
294
296
  test = vault.identity.Entity("test",
295
- name="tester1",
296
- policies=["test"],
297
297
  metadata={
298
298
  "foo": "bar",
299
- })
299
+ },
300
+ policies=["test"])
300
301
  ```
302
+ <!--End PulumiCodeChooser -->
301
303
 
302
304
  ## Import
303
305
 
@@ -211,15 +211,16 @@ class EntityAlias(pulumi.CustomResource):
211
211
  """
212
212
  ## Example Usage
213
213
 
214
+ <!--Start PulumiCodeChooser -->
214
215
  ```python
215
216
  import pulumi
216
217
  import pulumi_vault as vault
217
218
 
218
219
  test = vault.identity.EntityAlias("test",
219
- name="user_1",
220
- mount_accessor="token_1f2bd5",
221
- canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
220
+ canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
221
+ mount_accessor="token_1f2bd5")
222
222
  ```
223
+ <!--End PulumiCodeChooser -->
223
224
 
224
225
  ## Import
225
226
 
@@ -249,15 +250,16 @@ class EntityAlias(pulumi.CustomResource):
249
250
  """
250
251
  ## Example Usage
251
252
 
253
+ <!--Start PulumiCodeChooser -->
252
254
  ```python
253
255
  import pulumi
254
256
  import pulumi_vault as vault
255
257
 
256
258
  test = vault.identity.EntityAlias("test",
257
- name="user_1",
258
- mount_accessor="token_1f2bd5",
259
- canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
259
+ canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
260
+ mount_accessor="token_1f2bd5")
260
261
  ```
262
+ <!--End PulumiCodeChooser -->
261
263
 
262
264
  ## Import
263
265
 
@@ -214,13 +214,12 @@ class EntityPolicies(pulumi.CustomResource):
214
214
 
215
215
  ### Exclusive Policies
216
216
 
217
+ <!--Start PulumiCodeChooser -->
217
218
  ```python
218
219
  import pulumi
219
220
  import pulumi_vault as vault
220
221
 
221
- entity = vault.identity.Entity("entity",
222
- name="entity",
223
- external_policies=True)
222
+ entity = vault.identity.Entity("entity", external_policies=True)
224
223
  policies = vault.identity.EntityPolicies("policies",
225
224
  policies=[
226
225
  "default",
@@ -229,16 +228,16 @@ class EntityPolicies(pulumi.CustomResource):
229
228
  exclusive=True,
230
229
  entity_id=entity.id)
231
230
  ```
231
+ <!--End PulumiCodeChooser -->
232
232
 
233
233
  ### Non-exclusive Policies
234
234
 
235
+ <!--Start PulumiCodeChooser -->
235
236
  ```python
236
237
  import pulumi
237
238
  import pulumi_vault as vault
238
239
 
239
- entity = vault.identity.Entity("entity",
240
- name="entity",
241
- external_policies=True)
240
+ entity = vault.identity.Entity("entity", external_policies=True)
242
241
  default = vault.identity.EntityPolicies("default",
243
242
  policies=[
244
243
  "default",
@@ -251,6 +250,7 @@ class EntityPolicies(pulumi.CustomResource):
251
250
  exclusive=False,
252
251
  entity_id=entity.id)
253
252
  ```
253
+ <!--End PulumiCodeChooser -->
254
254
 
255
255
  :param str resource_name: The name of the resource.
256
256
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -279,13 +279,12 @@ class EntityPolicies(pulumi.CustomResource):
279
279
 
280
280
  ### Exclusive Policies
281
281
 
282
+ <!--Start PulumiCodeChooser -->
282
283
  ```python
283
284
  import pulumi
284
285
  import pulumi_vault as vault
285
286
 
286
- entity = vault.identity.Entity("entity",
287
- name="entity",
288
- external_policies=True)
287
+ entity = vault.identity.Entity("entity", external_policies=True)
289
288
  policies = vault.identity.EntityPolicies("policies",
290
289
  policies=[
291
290
  "default",
@@ -294,16 +293,16 @@ class EntityPolicies(pulumi.CustomResource):
294
293
  exclusive=True,
295
294
  entity_id=entity.id)
296
295
  ```
296
+ <!--End PulumiCodeChooser -->
297
297
 
298
298
  ### Non-exclusive Policies
299
299
 
300
+ <!--Start PulumiCodeChooser -->
300
301
  ```python
301
302
  import pulumi
302
303
  import pulumi_vault as vault
303
304
 
304
- entity = vault.identity.Entity("entity",
305
- name="entity",
306
- external_policies=True)
305
+ entity = vault.identity.Entity("entity", external_policies=True)
307
306
  default = vault.identity.EntityPolicies("default",
308
307
  policies=[
309
308
  "default",
@@ -316,6 +315,7 @@ class EntityPolicies(pulumi.CustomResource):
316
315
  exclusive=False,
317
316
  entity_id=entity.id)
318
317
  ```
318
+ <!--End PulumiCodeChooser -->
319
319
 
320
320
  :param str resource_name: The name of the resource.
321
321
  :param EntityPoliciesArgs args: The arguments to use to populate this resource's properties.
@@ -254,12 +254,14 @@ def get_entity(alias_id: Optional[str] = None,
254
254
  """
255
255
  ## Example Usage
256
256
 
257
+ <!--Start PulumiCodeChooser -->
257
258
  ```python
258
259
  import pulumi
259
260
  import pulumi_vault as vault
260
261
 
261
262
  entity = vault.identity.get_entity(entity_name="entity_12345")
262
263
  ```
264
+ <!--End PulumiCodeChooser -->
263
265
 
264
266
  ## Required Vault Capabilities
265
267
 
@@ -324,12 +326,14 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
324
326
  """
325
327
  ## Example Usage
326
328
 
329
+ <!--Start PulumiCodeChooser -->
327
330
  ```python
328
331
  import pulumi
329
332
  import pulumi_vault as vault
330
333
 
331
334
  entity = vault.identity.get_entity(entity_name="entity_12345")
332
335
  ```
336
+ <!--End PulumiCodeChooser -->
333
337
 
334
338
  ## Required Vault Capabilities
335
339
 
@@ -325,12 +325,14 @@ def get_group(alias_id: Optional[str] = None,
325
325
  """
326
326
  ## Example Usage
327
327
 
328
+ <!--Start PulumiCodeChooser -->
328
329
  ```python
329
330
  import pulumi
330
331
  import pulumi_vault as vault
331
332
 
332
333
  group = vault.identity.get_group(group_name="user")
333
334
  ```
335
+ <!--End PulumiCodeChooser -->
334
336
 
335
337
  ## Required Vault Capabilities
336
338
 
@@ -401,12 +403,14 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
401
403
  """
402
404
  ## Example Usage
403
405
 
406
+ <!--Start PulumiCodeChooser -->
404
407
  ```python
405
408
  import pulumi
406
409
  import pulumi_vault as vault
407
410
 
408
411
  group = vault.identity.get_group(group_name="user")
409
412
  ```
413
+ <!--End PulumiCodeChooser -->
410
414
 
411
415
  ## Required Vault Capabilities
412
416
 
@@ -93,12 +93,12 @@ def get_oidc_client_creds(name: Optional[str] = None,
93
93
  """
94
94
  ## Example Usage
95
95
 
96
+ <!--Start PulumiCodeChooser -->
96
97
  ```python
97
98
  import pulumi
98
99
  import pulumi_vault as vault
99
100
 
100
101
  app = vault.identity.OidcClient("app",
101
- name="application",
102
102
  redirect_uris=[
103
103
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
104
104
  "http://127.0.0.1:8251/callback",
@@ -108,6 +108,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
108
108
  access_token_ttl=7200)
109
109
  creds = vault.identity.get_oidc_client_creds_output(name=app.name)
110
110
  ```
111
+ <!--End PulumiCodeChooser -->
111
112
 
112
113
 
113
114
  :param str name: The name of the OIDC Client in Vault.
@@ -137,12 +138,12 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
137
138
  """
138
139
  ## Example Usage
139
140
 
141
+ <!--Start PulumiCodeChooser -->
140
142
  ```python
141
143
  import pulumi
142
144
  import pulumi_vault as vault
143
145
 
144
146
  app = vault.identity.OidcClient("app",
145
- name="application",
146
147
  redirect_uris=[
147
148
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
148
149
  "http://127.0.0.1:8251/callback",
@@ -152,6 +153,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
152
153
  access_token_ttl=7200)
153
154
  creds = vault.identity.get_oidc_client_creds_output(name=app.name)
154
155
  ```
156
+ <!--End PulumiCodeChooser -->
155
157
 
156
158
 
157
159
  :param str name: The name of the OIDC Client in Vault.
@@ -214,17 +214,16 @@ def get_oidc_openid_config(name: Optional[str] = None,
214
214
  """
215
215
  ## Example Usage
216
216
 
217
+ <!--Start PulumiCodeChooser -->
217
218
  ```python
218
219
  import pulumi
219
220
  import pulumi_vault as vault
220
221
 
221
222
  key = vault.identity.OidcKey("key",
222
- name="key",
223
223
  allowed_client_ids=["*"],
224
224
  rotation_period=3600,
225
225
  verification_ttl=3600)
226
226
  app = vault.identity.OidcClient("app",
227
- name="application",
228
227
  key=key.name,
229
228
  redirect_uris=[
230
229
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -233,11 +232,10 @@ def get_oidc_openid_config(name: Optional[str] = None,
233
232
  ],
234
233
  id_token_ttl=2400,
235
234
  access_token_ttl=7200)
236
- provider = vault.identity.OidcProvider("provider",
237
- name="provider",
238
- allowed_client_ids=[test["clientId"]])
235
+ provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
239
236
  config = vault.identity.get_oidc_openid_config_output(name=provider.name)
240
237
  ```
238
+ <!--End PulumiCodeChooser -->
241
239
 
242
240
 
243
241
  :param str name: The name of the OIDC Provider in Vault.
@@ -277,17 +275,16 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
277
275
  """
278
276
  ## Example Usage
279
277
 
278
+ <!--Start PulumiCodeChooser -->
280
279
  ```python
281
280
  import pulumi
282
281
  import pulumi_vault as vault
283
282
 
284
283
  key = vault.identity.OidcKey("key",
285
- name="key",
286
284
  allowed_client_ids=["*"],
287
285
  rotation_period=3600,
288
286
  verification_ttl=3600)
289
287
  app = vault.identity.OidcClient("app",
290
- name="application",
291
288
  key=key.name,
292
289
  redirect_uris=[
293
290
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -296,11 +293,10 @@ def get_oidc_openid_config_output(name: Optional[pulumi.Input[str]] = None,
296
293
  ],
297
294
  id_token_ttl=2400,
298
295
  access_token_ttl=7200)
299
- provider = vault.identity.OidcProvider("provider",
300
- name="provider",
301
- allowed_client_ids=[test["clientId"]])
296
+ provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
302
297
  config = vault.identity.get_oidc_openid_config_output(name=provider.name)
303
298
  ```
299
+ <!--End PulumiCodeChooser -->
304
300
 
305
301
 
306
302
  :param str name: The name of the OIDC Provider in Vault.
@@ -81,17 +81,16 @@ def get_oidc_public_keys(name: Optional[str] = None,
81
81
  """
82
82
  ## Example Usage
83
83
 
84
+ <!--Start PulumiCodeChooser -->
84
85
  ```python
85
86
  import pulumi
86
87
  import pulumi_vault as vault
87
88
 
88
89
  key = vault.identity.OidcKey("key",
89
- name="key",
90
90
  allowed_client_ids=["*"],
91
91
  rotation_period=3600,
92
92
  verification_ttl=3600)
93
93
  app = vault.identity.OidcClient("app",
94
- name="application",
95
94
  key=key.name,
96
95
  redirect_uris=[
97
96
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -100,11 +99,10 @@ def get_oidc_public_keys(name: Optional[str] = None,
100
99
  ],
101
100
  id_token_ttl=2400,
102
101
  access_token_ttl=7200)
103
- provider = vault.identity.OidcProvider("provider",
104
- name="provider",
105
- allowed_client_ids=[test["clientId"]])
102
+ provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
106
103
  public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
107
104
  ```
105
+ <!--End PulumiCodeChooser -->
108
106
 
109
107
 
110
108
  :param str name: The name of the OIDC Provider in Vault.
@@ -133,17 +131,16 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
133
131
  """
134
132
  ## Example Usage
135
133
 
134
+ <!--Start PulumiCodeChooser -->
136
135
  ```python
137
136
  import pulumi
138
137
  import pulumi_vault as vault
139
138
 
140
139
  key = vault.identity.OidcKey("key",
141
- name="key",
142
140
  allowed_client_ids=["*"],
143
141
  rotation_period=3600,
144
142
  verification_ttl=3600)
145
143
  app = vault.identity.OidcClient("app",
146
- name="application",
147
144
  key=key.name,
148
145
  redirect_uris=[
149
146
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
@@ -152,11 +149,10 @@ def get_oidc_public_keys_output(name: Optional[pulumi.Input[str]] = None,
152
149
  ],
153
150
  id_token_ttl=2400,
154
151
  access_token_ttl=7200)
155
- provider = vault.identity.OidcProvider("provider",
156
- name="provider",
157
- allowed_client_ids=[test["clientId"]])
152
+ provider = vault.identity.OidcProvider("provider", allowed_client_ids=[vault_identity_oidc_client["test"]["client_id"]])
158
153
  public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
159
154
  ```
155
+ <!--End PulumiCodeChooser -->
160
156
 
161
157
 
162
158
  :param str name: The name of the OIDC Provider in Vault.
@@ -416,36 +416,38 @@ class Group(pulumi.CustomResource):
416
416
 
417
417
  ### Internal Group
418
418
 
419
+ <!--Start PulumiCodeChooser -->
419
420
  ```python
420
421
  import pulumi
421
422
  import pulumi_vault as vault
422
423
 
423
424
  internal = vault.identity.Group("internal",
424
- name="internal",
425
- type="internal",
425
+ metadata={
426
+ "version": "2",
427
+ },
426
428
  policies=[
427
429
  "dev",
428
430
  "test",
429
431
  ],
430
- metadata={
431
- "version": "2",
432
- })
432
+ type="internal")
433
433
  ```
434
+ <!--End PulumiCodeChooser -->
434
435
 
435
436
  ### External Group
436
437
 
438
+ <!--Start PulumiCodeChooser -->
437
439
  ```python
438
440
  import pulumi
439
441
  import pulumi_vault as vault
440
442
 
441
443
  group = vault.identity.Group("group",
442
- name="external",
443
- type="external",
444
- policies=["test"],
445
444
  metadata={
446
445
  "version": "1",
447
- })
446
+ },
447
+ policies=["test"],
448
+ type="external")
448
449
  ```
450
+ <!--End PulumiCodeChooser -->
449
451
 
450
452
  ## Caveats
451
453
 
@@ -453,31 +455,31 @@ class Group(pulumi.CustomResource):
453
455
  Applying this configuration would result in the provider failing to create one of the identity groups, since the resources share the same `name`.
454
456
 
455
457
  This sort of pattern should be avoided:
458
+ <!--Start PulumiCodeChooser -->
456
459
  ```python
457
460
  import pulumi
458
461
  import pulumi_vault as vault
459
462
 
460
- internal = vault.identity.Group("internal",
461
- name="internal",
462
- type="internal",
463
+ internal_identity_group_group = vault.identity.Group("internalIdentity/groupGroup",
464
+ metadata={
465
+ "version": "2",
466
+ },
463
467
  policies=[
464
468
  "dev",
465
469
  "test",
466
470
  ],
471
+ type="internal")
472
+ internal_group = vault.identity.Group("internalGroup",
467
473
  metadata={
468
474
  "version": "2",
469
- })
470
- internal_group = vault.identity.Group("Internal",
471
- name="Internal",
472
- type="internal",
475
+ },
473
476
  policies=[
474
477
  "dev",
475
478
  "test",
476
479
  ],
477
- metadata={
478
- "version": "2",
479
- })
480
+ type="internal")
480
481
  ```
482
+ <!--End PulumiCodeChooser -->
481
483
 
482
484
  ## Import
483
485
 
@@ -526,36 +528,38 @@ class Group(pulumi.CustomResource):
526
528
 
527
529
  ### Internal Group
528
530
 
531
+ <!--Start PulumiCodeChooser -->
529
532
  ```python
530
533
  import pulumi
531
534
  import pulumi_vault as vault
532
535
 
533
536
  internal = vault.identity.Group("internal",
534
- name="internal",
535
- type="internal",
537
+ metadata={
538
+ "version": "2",
539
+ },
536
540
  policies=[
537
541
  "dev",
538
542
  "test",
539
543
  ],
540
- metadata={
541
- "version": "2",
542
- })
544
+ type="internal")
543
545
  ```
546
+ <!--End PulumiCodeChooser -->
544
547
 
545
548
  ### External Group
546
549
 
550
+ <!--Start PulumiCodeChooser -->
547
551
  ```python
548
552
  import pulumi
549
553
  import pulumi_vault as vault
550
554
 
551
555
  group = vault.identity.Group("group",
552
- name="external",
553
- type="external",
554
- policies=["test"],
555
556
  metadata={
556
557
  "version": "1",
557
- })
558
+ },
559
+ policies=["test"],
560
+ type="external")
558
561
  ```
562
+ <!--End PulumiCodeChooser -->
559
563
 
560
564
  ## Caveats
561
565
 
@@ -563,31 +567,31 @@ class Group(pulumi.CustomResource):
563
567
  Applying this configuration would result in the provider failing to create one of the identity groups, since the resources share the same `name`.
564
568
 
565
569
  This sort of pattern should be avoided:
570
+ <!--Start PulumiCodeChooser -->
566
571
  ```python
567
572
  import pulumi
568
573
  import pulumi_vault as vault
569
574
 
570
- internal = vault.identity.Group("internal",
571
- name="internal",
572
- type="internal",
575
+ internal_identity_group_group = vault.identity.Group("internalIdentity/groupGroup",
576
+ metadata={
577
+ "version": "2",
578
+ },
573
579
  policies=[
574
580
  "dev",
575
581
  "test",
576
582
  ],
583
+ type="internal")
584
+ internal_group = vault.identity.Group("internalGroup",
577
585
  metadata={
578
586
  "version": "2",
579
- })
580
- internal_group = vault.identity.Group("Internal",
581
- name="Internal",
582
- type="internal",
587
+ },
583
588
  policies=[
584
589
  "dev",
585
590
  "test",
586
591
  ],
587
- metadata={
588
- "version": "2",
589
- })
592
+ type="internal")
590
593
  ```
594
+ <!--End PulumiCodeChooser -->
591
595
 
592
596
  ## Import
593
597
 
@@ -181,12 +181,12 @@ class GroupAlias(pulumi.CustomResource):
181
181
 
182
182
  ## Example Usage
183
183
 
184
+ <!--Start PulumiCodeChooser -->
184
185
  ```python
185
186
  import pulumi
186
187
  import pulumi_vault as vault
187
188
 
188
189
  group = vault.identity.Group("group",
189
- name="test",
190
190
  type="external",
191
191
  policies=["test"])
192
192
  github = vault.AuthBackend("github",
@@ -197,6 +197,7 @@ class GroupAlias(pulumi.CustomResource):
197
197
  mount_accessor=github.accessor,
198
198
  canonical_id=group.id)
199
199
  ```
200
+ <!--End PulumiCodeChooser -->
200
201
 
201
202
  ## Import
202
203
 
@@ -235,12 +236,12 @@ class GroupAlias(pulumi.CustomResource):
235
236
 
236
237
  ## Example Usage
237
238
 
239
+ <!--Start PulumiCodeChooser -->
238
240
  ```python
239
241
  import pulumi
240
242
  import pulumi_vault as vault
241
243
 
242
244
  group = vault.identity.Group("group",
243
- name="test",
244
245
  type="external",
245
246
  policies=["test"])
246
247
  github = vault.AuthBackend("github",
@@ -251,6 +252,7 @@ class GroupAlias(pulumi.CustomResource):
251
252
  mount_accessor=github.accessor,
252
253
  canonical_id=group.id)
253
254
  ```
255
+ <!--End PulumiCodeChooser -->
254
256
 
255
257
  ## Import
256
258