pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -199,40 +199,41 @@ class GroupMemberEntityIds(pulumi.CustomResource):
199
199
 
200
200
  ### Exclusive Member Entities
201
201
 
202
+ <!--Start PulumiCodeChooser -->
202
203
  ```python
203
204
  import pulumi
204
205
  import pulumi_vault as vault
205
206
 
206
207
  internal = vault.identity.Group("internal",
207
- name="internal",
208
208
  type="internal",
209
209
  external_member_entity_ids=True,
210
210
  metadata={
211
211
  "version": "2",
212
212
  })
213
- user = vault.identity.Entity("user", name="user")
213
+ user = vault.identity.Entity("user")
214
214
  members = vault.identity.GroupMemberEntityIds("members",
215
215
  exclusive=True,
216
216
  member_entity_ids=[user.id],
217
217
  group_id=internal.id)
218
218
  ```
219
+ <!--End PulumiCodeChooser -->
219
220
 
220
221
  ### Non-exclusive Member Entities
221
222
 
223
+ <!--Start PulumiCodeChooser -->
222
224
  ```python
223
225
  import pulumi
224
226
  import pulumi_vault as vault
225
227
 
226
228
  internal = vault.identity.Group("internal",
227
- name="internal",
228
229
  type="internal",
229
230
  external_member_entity_ids=True,
230
231
  metadata={
231
232
  "version": "2",
232
233
  })
233
- test_user = vault.identity.Entity("test_user", name="test")
234
- second_test_user = vault.identity.Entity("second_test_user", name="second_test")
235
- dev_user = vault.identity.Entity("dev_user", name="dev")
234
+ test_user = vault.identity.Entity("testUser")
235
+ second_test_user = vault.identity.Entity("secondTestUser")
236
+ dev_user = vault.identity.Entity("devUser")
236
237
  test = vault.identity.GroupMemberEntityIds("test",
237
238
  member_entity_ids=[
238
239
  test_user.id,
@@ -245,6 +246,7 @@ class GroupMemberEntityIds(pulumi.CustomResource):
245
246
  exclusive=False,
246
247
  group_id=internal.id)
247
248
  ```
249
+ <!--End PulumiCodeChooser -->
248
250
 
249
251
  :param str resource_name: The name of the resource.
250
252
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -273,40 +275,41 @@ class GroupMemberEntityIds(pulumi.CustomResource):
273
275
 
274
276
  ### Exclusive Member Entities
275
277
 
278
+ <!--Start PulumiCodeChooser -->
276
279
  ```python
277
280
  import pulumi
278
281
  import pulumi_vault as vault
279
282
 
280
283
  internal = vault.identity.Group("internal",
281
- name="internal",
282
284
  type="internal",
283
285
  external_member_entity_ids=True,
284
286
  metadata={
285
287
  "version": "2",
286
288
  })
287
- user = vault.identity.Entity("user", name="user")
289
+ user = vault.identity.Entity("user")
288
290
  members = vault.identity.GroupMemberEntityIds("members",
289
291
  exclusive=True,
290
292
  member_entity_ids=[user.id],
291
293
  group_id=internal.id)
292
294
  ```
295
+ <!--End PulumiCodeChooser -->
293
296
 
294
297
  ### Non-exclusive Member Entities
295
298
 
299
+ <!--Start PulumiCodeChooser -->
296
300
  ```python
297
301
  import pulumi
298
302
  import pulumi_vault as vault
299
303
 
300
304
  internal = vault.identity.Group("internal",
301
- name="internal",
302
305
  type="internal",
303
306
  external_member_entity_ids=True,
304
307
  metadata={
305
308
  "version": "2",
306
309
  })
307
- test_user = vault.identity.Entity("test_user", name="test")
308
- second_test_user = vault.identity.Entity("second_test_user", name="second_test")
309
- dev_user = vault.identity.Entity("dev_user", name="dev")
310
+ test_user = vault.identity.Entity("testUser")
311
+ second_test_user = vault.identity.Entity("secondTestUser")
312
+ dev_user = vault.identity.Entity("devUser")
310
313
  test = vault.identity.GroupMemberEntityIds("test",
311
314
  member_entity_ids=[
312
315
  test_user.id,
@@ -319,6 +322,7 @@ class GroupMemberEntityIds(pulumi.CustomResource):
319
322
  exclusive=False,
320
323
  group_id=internal.id)
321
324
  ```
325
+ <!--End PulumiCodeChooser -->
322
326
 
323
327
  :param str resource_name: The name of the resource.
324
328
  :param GroupMemberEntityIdsArgs args: The arguments to use to populate this resource's properties.
@@ -213,51 +213,49 @@ class GroupMemberGroupIds(pulumi.CustomResource):
213
213
 
214
214
  ### Exclusive Member Groups
215
215
 
216
+ <!--Start PulumiCodeChooser -->
216
217
  ```python
217
218
  import pulumi
218
219
  import pulumi_vault as vault
219
220
 
220
221
  internal = vault.identity.Group("internal",
221
- name="internal",
222
222
  type="internal",
223
223
  external_member_group_ids=True,
224
224
  metadata={
225
225
  "version": "2",
226
226
  })
227
- users = vault.identity.Group("users",
228
- name="users",
229
- metadata={
230
- "version": "2",
231
- })
227
+ users = vault.identity.Group("users", metadata={
228
+ "version": "2",
229
+ })
232
230
  members = vault.identity.GroupMemberGroupIds("members",
233
231
  exclusive=True,
234
232
  member_group_ids=[users.id],
235
233
  group_id=internal.id)
236
234
  ```
235
+ <!--End PulumiCodeChooser -->
237
236
 
238
237
  ### Non-Exclusive Member Groups
239
238
 
239
+ <!--Start PulumiCodeChooser -->
240
240
  ```python
241
241
  import pulumi
242
242
  import pulumi_vault as vault
243
243
 
244
244
  internal = vault.identity.Group("internal",
245
- name="internal",
246
245
  type="internal",
247
246
  external_member_group_ids=True,
248
247
  metadata={
249
248
  "version": "2",
250
249
  })
251
- users = vault.identity.Group("users",
252
- name="users",
253
- metadata={
254
- "version": "2",
255
- })
250
+ users = vault.identity.Group("users", metadata={
251
+ "version": "2",
252
+ })
256
253
  members = vault.identity.GroupMemberGroupIds("members",
257
254
  exclusive=False,
258
255
  member_group_ids=[users.id],
259
256
  group_id=internal.id)
260
257
  ```
258
+ <!--End PulumiCodeChooser -->
261
259
 
262
260
  :param str resource_name: The name of the resource.
263
261
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -291,51 +289,49 @@ class GroupMemberGroupIds(pulumi.CustomResource):
291
289
 
292
290
  ### Exclusive Member Groups
293
291
 
292
+ <!--Start PulumiCodeChooser -->
294
293
  ```python
295
294
  import pulumi
296
295
  import pulumi_vault as vault
297
296
 
298
297
  internal = vault.identity.Group("internal",
299
- name="internal",
300
298
  type="internal",
301
299
  external_member_group_ids=True,
302
300
  metadata={
303
301
  "version": "2",
304
302
  })
305
- users = vault.identity.Group("users",
306
- name="users",
307
- metadata={
308
- "version": "2",
309
- })
303
+ users = vault.identity.Group("users", metadata={
304
+ "version": "2",
305
+ })
310
306
  members = vault.identity.GroupMemberGroupIds("members",
311
307
  exclusive=True,
312
308
  member_group_ids=[users.id],
313
309
  group_id=internal.id)
314
310
  ```
311
+ <!--End PulumiCodeChooser -->
315
312
 
316
313
  ### Non-Exclusive Member Groups
317
314
 
315
+ <!--Start PulumiCodeChooser -->
318
316
  ```python
319
317
  import pulumi
320
318
  import pulumi_vault as vault
321
319
 
322
320
  internal = vault.identity.Group("internal",
323
- name="internal",
324
321
  type="internal",
325
322
  external_member_group_ids=True,
326
323
  metadata={
327
324
  "version": "2",
328
325
  })
329
- users = vault.identity.Group("users",
330
- name="users",
331
- metadata={
332
- "version": "2",
333
- })
326
+ users = vault.identity.Group("users", metadata={
327
+ "version": "2",
328
+ })
334
329
  members = vault.identity.GroupMemberGroupIds("members",
335
330
  exclusive=False,
336
331
  member_group_ids=[users.id],
337
332
  group_id=internal.id)
338
333
  ```
334
+ <!--End PulumiCodeChooser -->
339
335
 
340
336
  :param str resource_name: The name of the resource.
341
337
  :param GroupMemberGroupIdsArgs args: The arguments to use to populate this resource's properties.
@@ -214,12 +214,12 @@ class GroupPolicies(pulumi.CustomResource):
214
214
 
215
215
  ### Exclusive Policies
216
216
 
217
+ <!--Start PulumiCodeChooser -->
217
218
  ```python
218
219
  import pulumi
219
220
  import pulumi_vault as vault
220
221
 
221
222
  internal = vault.identity.Group("internal",
222
- name="internal",
223
223
  type="internal",
224
224
  external_policies=True,
225
225
  metadata={
@@ -233,15 +233,16 @@ class GroupPolicies(pulumi.CustomResource):
233
233
  exclusive=True,
234
234
  group_id=internal.id)
235
235
  ```
236
+ <!--End PulumiCodeChooser -->
236
237
 
237
238
  ### Non-exclusive Policies
238
239
 
240
+ <!--Start PulumiCodeChooser -->
239
241
  ```python
240
242
  import pulumi
241
243
  import pulumi_vault as vault
242
244
 
243
245
  internal = vault.identity.Group("internal",
244
- name="internal",
245
246
  type="internal",
246
247
  external_policies=True,
247
248
  metadata={
@@ -259,6 +260,7 @@ class GroupPolicies(pulumi.CustomResource):
259
260
  exclusive=False,
260
261
  group_id=internal.id)
261
262
  ```
263
+ <!--End PulumiCodeChooser -->
262
264
 
263
265
  :param str resource_name: The name of the resource.
264
266
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -287,12 +289,12 @@ class GroupPolicies(pulumi.CustomResource):
287
289
 
288
290
  ### Exclusive Policies
289
291
 
292
+ <!--Start PulumiCodeChooser -->
290
293
  ```python
291
294
  import pulumi
292
295
  import pulumi_vault as vault
293
296
 
294
297
  internal = vault.identity.Group("internal",
295
- name="internal",
296
298
  type="internal",
297
299
  external_policies=True,
298
300
  metadata={
@@ -306,15 +308,16 @@ class GroupPolicies(pulumi.CustomResource):
306
308
  exclusive=True,
307
309
  group_id=internal.id)
308
310
  ```
311
+ <!--End PulumiCodeChooser -->
309
312
 
310
313
  ### Non-exclusive Policies
311
314
 
315
+ <!--Start PulumiCodeChooser -->
312
316
  ```python
313
317
  import pulumi
314
318
  import pulumi_vault as vault
315
319
 
316
320
  internal = vault.identity.Group("internal",
317
- name="internal",
318
321
  type="internal",
319
322
  external_policies=True,
320
323
  metadata={
@@ -332,6 +335,7 @@ class GroupPolicies(pulumi.CustomResource):
332
335
  exclusive=False,
333
336
  group_id=internal.id)
334
337
  ```
338
+ <!--End PulumiCodeChooser -->
335
339
 
336
340
  :param str resource_name: The name of the resource.
337
341
  :param GroupPoliciesArgs args: The arguments to use to populate this resource's properties.
@@ -378,15 +378,17 @@ class MfaDuo(pulumi.CustomResource):
378
378
 
379
379
  ## Example Usage
380
380
 
381
+ <!--Start PulumiCodeChooser -->
381
382
  ```python
382
383
  import pulumi
383
384
  import pulumi_vault as vault
384
385
 
385
386
  example = vault.identity.MfaDuo("example",
386
387
  api_hostname="api-xxxxxxxx.duosecurity.com",
387
- secret_key="secret-key",
388
- integration_key="secret-int-key")
388
+ integration_key="secret-int-key",
389
+ secret_key="secret-key")
389
390
  ```
391
+ <!--End PulumiCodeChooser -->
390
392
 
391
393
  ## Import
392
394
 
@@ -417,15 +419,17 @@ class MfaDuo(pulumi.CustomResource):
417
419
 
418
420
  ## Example Usage
419
421
 
422
+ <!--Start PulumiCodeChooser -->
420
423
  ```python
421
424
  import pulumi
422
425
  import pulumi_vault as vault
423
426
 
424
427
  example = vault.identity.MfaDuo("example",
425
428
  api_hostname="api-xxxxxxxx.duosecurity.com",
426
- secret_key="secret-key",
427
- integration_key="secret-int-key")
429
+ integration_key="secret-int-key",
430
+ secret_key="secret-key")
428
431
  ```
432
+ <!--End PulumiCodeChooser -->
429
433
 
430
434
  ## Import
431
435
 
@@ -316,19 +316,19 @@ class MfaLoginEnforcement(pulumi.CustomResource):
316
316
 
317
317
  ## Example Usage
318
318
 
319
+ <!--Start PulumiCodeChooser -->
319
320
  ```python
320
321
  import pulumi
321
322
  import pulumi_vault as vault
322
323
 
323
- example = vault.identity.MfaDuo("example",
324
+ example_mfa_duo = vault.identity.MfaDuo("exampleMfaDuo",
324
325
  secret_key="secret-key",
325
326
  integration_key="int-key",
326
327
  api_hostname="foo.baz",
327
328
  push_info="push-info")
328
- example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
329
- name="default",
330
- mfa_method_ids=[example.method_id])
329
+ example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("exampleMfaLoginEnforcement", mfa_method_ids=[example_mfa_duo.method_id])
331
330
  ```
331
+ <!--End PulumiCodeChooser -->
332
332
 
333
333
  ## Import
334
334
 
@@ -359,19 +359,19 @@ class MfaLoginEnforcement(pulumi.CustomResource):
359
359
 
360
360
  ## Example Usage
361
361
 
362
+ <!--Start PulumiCodeChooser -->
362
363
  ```python
363
364
  import pulumi
364
365
  import pulumi_vault as vault
365
366
 
366
- example = vault.identity.MfaDuo("example",
367
+ example_mfa_duo = vault.identity.MfaDuo("exampleMfaDuo",
367
368
  secret_key="secret-key",
368
369
  integration_key="int-key",
369
370
  api_hostname="foo.baz",
370
371
  push_info="push-info")
371
- example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
372
- name="default",
373
- mfa_method_ids=[example.method_id])
372
+ example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("exampleMfaLoginEnforcement", mfa_method_ids=[example_mfa_duo.method_id])
374
373
  ```
374
+ <!--End PulumiCodeChooser -->
375
375
 
376
376
  ## Import
377
377
 
@@ -346,15 +346,17 @@ class MfaOkta(pulumi.CustomResource):
346
346
 
347
347
  ## Example Usage
348
348
 
349
+ <!--Start PulumiCodeChooser -->
349
350
  ```python
350
351
  import pulumi
351
352
  import pulumi_vault as vault
352
353
 
353
354
  example = vault.identity.MfaOkta("example",
354
- org_name="org1",
355
355
  api_token="token1",
356
- base_url="qux.baz.com")
356
+ base_url="qux.baz.com",
357
+ org_name="org1")
357
358
  ```
359
+ <!--End PulumiCodeChooser -->
358
360
 
359
361
  ## Import
360
362
 
@@ -384,15 +386,17 @@ class MfaOkta(pulumi.CustomResource):
384
386
 
385
387
  ## Example Usage
386
388
 
389
+ <!--Start PulumiCodeChooser -->
387
390
  ```python
388
391
  import pulumi
389
392
  import pulumi_vault as vault
390
393
 
391
394
  example = vault.identity.MfaOkta("example",
392
- org_name="org1",
393
395
  api_token="token1",
394
- base_url="qux.baz.com")
396
+ base_url="qux.baz.com",
397
+ org_name="org1")
395
398
  ```
399
+ <!--End PulumiCodeChooser -->
396
400
 
397
401
  ## Import
398
402
 
@@ -328,12 +328,14 @@ class MfaPingid(pulumi.CustomResource):
328
328
 
329
329
  ## Example Usage
330
330
 
331
+ <!--Start PulumiCodeChooser -->
331
332
  ```python
332
333
  import pulumi
333
334
  import pulumi_vault as vault
334
335
 
335
336
  example = vault.identity.MfaPingid("example", settings_file_base64="CnVzZV9iYXNlNjR[...]HBtCg==")
336
337
  ```
338
+ <!--End PulumiCodeChooser -->
337
339
 
338
340
  ## Import
339
341
 
@@ -360,12 +362,14 @@ class MfaPingid(pulumi.CustomResource):
360
362
 
361
363
  ## Example Usage
362
364
 
365
+ <!--Start PulumiCodeChooser -->
363
366
  ```python
364
367
  import pulumi
365
368
  import pulumi_vault as vault
366
369
 
367
370
  example = vault.identity.MfaPingid("example", settings_file_base64="CnVzZV9iYXNlNjR[...]HBtCg==")
368
371
  ```
372
+ <!--End PulumiCodeChooser -->
369
373
 
370
374
  ## Import
371
375
 
@@ -446,12 +446,14 @@ class MfaTotp(pulumi.CustomResource):
446
446
 
447
447
  ## Example Usage
448
448
 
449
+ <!--Start PulumiCodeChooser -->
449
450
  ```python
450
451
  import pulumi
451
452
  import pulumi_vault as vault
452
453
 
453
454
  example = vault.identity.MfaTotp("example", issuer="issuer1")
454
455
  ```
456
+ <!--End PulumiCodeChooser -->
455
457
 
456
458
  ## Import
457
459
 
@@ -484,12 +486,14 @@ class MfaTotp(pulumi.CustomResource):
484
486
 
485
487
  ## Example Usage
486
488
 
489
+ <!--Start PulumiCodeChooser -->
487
490
  ```python
488
491
  import pulumi
489
492
  import pulumi_vault as vault
490
493
 
491
494
  example = vault.identity.MfaTotp("example", issuer="issuer1")
492
495
  ```
496
+ <!--End PulumiCodeChooser -->
493
497
 
494
498
  ## Import
495
499
 
@@ -133,12 +133,14 @@ class Oidc(pulumi.CustomResource):
133
133
 
134
134
  ## Example Usage
135
135
 
136
+ <!--Start PulumiCodeChooser -->
136
137
  ```python
137
138
  import pulumi
138
139
  import pulumi_vault as vault
139
140
 
140
141
  server = vault.identity.Oidc("server", issuer="https://www.acme.com")
141
142
  ```
143
+ <!--End PulumiCodeChooser -->
142
144
 
143
145
  :param str resource_name: The name of the resource.
144
146
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -167,12 +169,14 @@ class Oidc(pulumi.CustomResource):
167
169
 
168
170
  ## Example Usage
169
171
 
172
+ <!--Start PulumiCodeChooser -->
170
173
  ```python
171
174
  import pulumi
172
175
  import pulumi_vault as vault
173
176
 
174
177
  server = vault.identity.Oidc("server", issuer="https://www.acme.com")
175
178
  ```
179
+ <!--End PulumiCodeChooser -->
176
180
 
177
181
  :param str resource_name: The name of the resource.
178
182
  :param OidcArgs args: The arguments to use to populate this resource's properties.
@@ -183,25 +183,23 @@ class OidcAssignment(pulumi.CustomResource):
183
183
 
184
184
  ## Example Usage
185
185
 
186
+ <!--Start PulumiCodeChooser -->
186
187
  ```python
187
188
  import pulumi
188
189
  import pulumi_vault as vault
189
190
 
190
191
  internal = vault.identity.Group("internal",
191
- name="internal",
192
192
  type="internal",
193
193
  policies=[
194
194
  "dev",
195
195
  "test",
196
196
  ])
197
- test = vault.identity.Entity("test",
198
- name="test",
199
- policies=["test"])
197
+ test = vault.identity.Entity("test", policies=["test"])
200
198
  default = vault.identity.OidcAssignment("default",
201
- name="assignment",
202
199
  entity_ids=[test.id],
203
200
  group_ids=[internal.id])
204
201
  ```
202
+ <!--End PulumiCodeChooser -->
205
203
 
206
204
  ## Import
207
205
 
@@ -233,25 +231,23 @@ class OidcAssignment(pulumi.CustomResource):
233
231
 
234
232
  ## Example Usage
235
233
 
234
+ <!--Start PulumiCodeChooser -->
236
235
  ```python
237
236
  import pulumi
238
237
  import pulumi_vault as vault
239
238
 
240
239
  internal = vault.identity.Group("internal",
241
- name="internal",
242
240
  type="internal",
243
241
  policies=[
244
242
  "dev",
245
243
  "test",
246
244
  ])
247
- test = vault.identity.Entity("test",
248
- name="test",
249
- policies=["test"])
245
+ test = vault.identity.Entity("test", policies=["test"])
250
246
  default = vault.identity.OidcAssignment("default",
251
- name="assignment",
252
247
  entity_ids=[test.id],
253
248
  group_ids=[internal.id])
254
249
  ```
250
+ <!--End PulumiCodeChooser -->
255
251
 
256
252
  ## Import
257
253
 
@@ -373,25 +373,25 @@ class OidcClient(pulumi.CustomResource):
373
373
 
374
374
  ## Example Usage
375
375
 
376
+ <!--Start PulumiCodeChooser -->
376
377
  ```python
377
378
  import pulumi
378
379
  import pulumi_vault as vault
379
380
 
380
- test = vault.identity.OidcAssignment("test",
381
- name="my-assignment",
381
+ test_oidc_assignment = vault.identity.OidcAssignment("testOidcAssignment",
382
382
  entity_ids=["ascbascas-2231a-sdfaa"],
383
383
  group_ids=["sajkdsad-32414-sfsada"])
384
- test_oidc_client = vault.identity.OidcClient("test",
385
- name="my-app",
384
+ test_oidc_client = vault.identity.OidcClient("testOidcClient",
386
385
  redirect_uris=[
387
386
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
388
387
  "http://127.0.0.1:8251/callback",
389
388
  "http://127.0.0.1:8080/callback",
390
389
  ],
391
- assignments=[test.name],
390
+ assignments=[test_oidc_assignment.name],
392
391
  id_token_ttl=2400,
393
392
  access_token_ttl=7200)
394
393
  ```
394
+ <!--End PulumiCodeChooser -->
395
395
 
396
396
  ## Import
397
397
 
@@ -433,25 +433,25 @@ class OidcClient(pulumi.CustomResource):
433
433
 
434
434
  ## Example Usage
435
435
 
436
+ <!--Start PulumiCodeChooser -->
436
437
  ```python
437
438
  import pulumi
438
439
  import pulumi_vault as vault
439
440
 
440
- test = vault.identity.OidcAssignment("test",
441
- name="my-assignment",
441
+ test_oidc_assignment = vault.identity.OidcAssignment("testOidcAssignment",
442
442
  entity_ids=["ascbascas-2231a-sdfaa"],
443
443
  group_ids=["sajkdsad-32414-sfsada"])
444
- test_oidc_client = vault.identity.OidcClient("test",
445
- name="my-app",
444
+ test_oidc_client = vault.identity.OidcClient("testOidcClient",
446
445
  redirect_uris=[
447
446
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
448
447
  "http://127.0.0.1:8251/callback",
449
448
  "http://127.0.0.1:8080/callback",
450
449
  ],
451
- assignments=[test.name],
450
+ assignments=[test_oidc_assignment.name],
452
451
  id_token_ttl=2400,
453
452
  access_token_ttl=7200)
454
453
  ```
454
+ <!--End PulumiCodeChooser -->
455
455
 
456
456
  ## Import
457
457