pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
@@ -299,27 +299,28 @@ class SecretStaticAccount(pulumi.CustomResource):
299
299
 
300
300
  ## Example Usage
301
301
 
302
+ <!--Start PulumiCodeChooser -->
302
303
  ```python
303
304
  import pulumi
304
- import pulumi_google as google
305
- import pulumi_std as std
305
+ import pulumi_gcp as gcp
306
306
  import pulumi_vault as vault
307
307
 
308
- this = google.index.ServiceAccount("this", account_id=my-awesome-account)
308
+ this = gcp.service_account.Account("this", account_id="my-awesome-account")
309
309
  gcp = vault.gcp.SecretBackend("gcp",
310
310
  path="gcp",
311
- credentials=std.file(input="credentials.json").result)
312
- static_account = vault.gcp.SecretStaticAccount("static_account",
311
+ credentials=(lambda path: open(path).read())("credentials.json"))
312
+ static_account = vault.gcp.SecretStaticAccount("staticAccount",
313
313
  backend=gcp.path,
314
314
  static_account="project_viewer",
315
315
  secret_type="access_token",
316
316
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
317
- service_account_email=this["email"],
317
+ service_account_email=this.email,
318
318
  bindings=[vault.gcp.SecretStaticAccountBindingArgs(
319
- resource=f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
319
+ resource=this.project.apply(lambda project: f"//cloudresourcemanager.googleapis.com/projects/{project}"),
320
320
  roles=["roles/viewer"],
321
321
  )])
322
322
  ```
323
+ <!--End PulumiCodeChooser -->
323
324
 
324
325
  ## Import
325
326
 
@@ -356,27 +357,28 @@ class SecretStaticAccount(pulumi.CustomResource):
356
357
 
357
358
  ## Example Usage
358
359
 
360
+ <!--Start PulumiCodeChooser -->
359
361
  ```python
360
362
  import pulumi
361
- import pulumi_google as google
362
- import pulumi_std as std
363
+ import pulumi_gcp as gcp
363
364
  import pulumi_vault as vault
364
365
 
365
- this = google.index.ServiceAccount("this", account_id=my-awesome-account)
366
+ this = gcp.service_account.Account("this", account_id="my-awesome-account")
366
367
  gcp = vault.gcp.SecretBackend("gcp",
367
368
  path="gcp",
368
- credentials=std.file(input="credentials.json").result)
369
- static_account = vault.gcp.SecretStaticAccount("static_account",
369
+ credentials=(lambda path: open(path).read())("credentials.json"))
370
+ static_account = vault.gcp.SecretStaticAccount("staticAccount",
370
371
  backend=gcp.path,
371
372
  static_account="project_viewer",
372
373
  secret_type="access_token",
373
374
  token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
374
- service_account_email=this["email"],
375
+ service_account_email=this.email,
375
376
  bindings=[vault.gcp.SecretStaticAccountBindingArgs(
376
- resource=f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
377
+ resource=this.project.apply(lambda project: f"//cloudresourcemanager.googleapis.com/projects/{project}"),
377
378
  roles=["roles/viewer"],
378
379
  )])
379
380
  ```
381
+ <!--End PulumiCodeChooser -->
380
382
 
381
383
  ## Import
382
384
 
@@ -407,6 +407,7 @@ class Endpoint(pulumi.CustomResource):
407
407
  """
408
408
  ## Example Usage
409
409
 
410
+ <!--Start PulumiCodeChooser -->
410
411
  ```python
411
412
  import pulumi
412
413
  import pulumi_vault as vault
@@ -421,7 +422,7 @@ class Endpoint(pulumi.CustomResource):
421
422
  }
422
423
  \"\"\",
423
424
  opts=pulumi.ResourceOptions(depends_on=[userpass]))
424
- u1_token = vault.generic.Endpoint("u1_token",
425
+ u1_token = vault.generic.Endpoint("u1Token",
425
426
  path="auth/userpass/login/u1",
426
427
  disable_read=True,
427
428
  disable_delete=True,
@@ -430,7 +431,7 @@ class Endpoint(pulumi.CustomResource):
430
431
  }
431
432
  \"\"\",
432
433
  opts=pulumi.ResourceOptions(depends_on=[u1]))
433
- u1_entity = vault.generic.Endpoint("u1_entity",
434
+ u1_entity = vault.generic.Endpoint("u1Entity",
434
435
  disable_read=True,
435
436
  disable_delete=True,
436
437
  path="identity/lookup/entity",
@@ -444,6 +445,7 @@ class Endpoint(pulumi.CustomResource):
444
445
  opts=pulumi.ResourceOptions(depends_on=[u1_token]))
445
446
  pulumi.export("u1Id", u1_entity.write_data["id"])
446
447
  ```
448
+ <!--End PulumiCodeChooser -->
447
449
 
448
450
  ## Required Vault Capabilities
449
451
 
@@ -500,6 +502,7 @@ class Endpoint(pulumi.CustomResource):
500
502
  """
501
503
  ## Example Usage
502
504
 
505
+ <!--Start PulumiCodeChooser -->
503
506
  ```python
504
507
  import pulumi
505
508
  import pulumi_vault as vault
@@ -514,7 +517,7 @@ class Endpoint(pulumi.CustomResource):
514
517
  }
515
518
  \"\"\",
516
519
  opts=pulumi.ResourceOptions(depends_on=[userpass]))
517
- u1_token = vault.generic.Endpoint("u1_token",
520
+ u1_token = vault.generic.Endpoint("u1Token",
518
521
  path="auth/userpass/login/u1",
519
522
  disable_read=True,
520
523
  disable_delete=True,
@@ -523,7 +526,7 @@ class Endpoint(pulumi.CustomResource):
523
526
  }
524
527
  \"\"\",
525
528
  opts=pulumi.ResourceOptions(depends_on=[u1]))
526
- u1_entity = vault.generic.Endpoint("u1_entity",
529
+ u1_entity = vault.generic.Endpoint("u1Entity",
527
530
  disable_read=True,
528
531
  disable_delete=True,
529
532
  path="identity/lookup/entity",
@@ -537,6 +540,7 @@ class Endpoint(pulumi.CustomResource):
537
540
  opts=pulumi.ResourceOptions(depends_on=[u1_token]))
538
541
  pulumi.export("u1Id", u1_entity.write_data["id"])
539
542
  ```
543
+ <!--End PulumiCodeChooser -->
540
544
 
541
545
  ## Required Vault Capabilities
542
546
 
@@ -162,32 +162,14 @@ def get_secret(namespace: Optional[str] = None,
162
162
 
163
163
  ### Generic secret
164
164
 
165
+ <!--Start PulumiCodeChooser -->
165
166
  ```python
166
167
  import pulumi
167
168
  import pulumi_vault as vault
168
169
 
169
170
  rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
170
171
  ```
171
-
172
- ### KV
173
-
174
- For this example, consider `example` as a path for a KV engine.
175
-
176
- ```python
177
- import pulumi
178
- import pulumi_vault as vault
179
-
180
-
181
- def not_implemented(msg):
182
- raise NotImplementedError(msg)
183
-
184
- example_creds = vault.generic.get_secret(path="example/creds")
185
- example_template = not_implemented("The template_file data resource is not yet supported.")
186
- ```
187
-
188
- ## Required Vault Capabilities
189
-
190
- Use of this resource requires the `read` capability on the given path.
172
+ <!--End PulumiCodeChooser -->
191
173
 
192
174
 
193
175
  :param str namespace: The namespace of the target resource.
@@ -239,32 +221,14 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
239
221
 
240
222
  ### Generic secret
241
223
 
224
+ <!--Start PulumiCodeChooser -->
242
225
  ```python
243
226
  import pulumi
244
227
  import pulumi_vault as vault
245
228
 
246
229
  rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
247
230
  ```
248
-
249
- ### KV
250
-
251
- For this example, consider `example` as a path for a KV engine.
252
-
253
- ```python
254
- import pulumi
255
- import pulumi_vault as vault
256
-
257
-
258
- def not_implemented(msg):
259
- raise NotImplementedError(msg)
260
-
261
- example_creds = vault.generic.get_secret(path="example/creds")
262
- example_template = not_implemented("The template_file data resource is not yet supported.")
263
- ```
264
-
265
- ## Required Vault Capabilities
266
-
267
- Use of this resource requires the `read` capability on the given path.
231
+ <!--End PulumiCodeChooser -->
268
232
 
269
233
 
270
234
  :param str namespace: The namespace of the target resource.
@@ -152,12 +152,14 @@ def get_auth_backend(namespace: Optional[str] = None,
152
152
  """
153
153
  ## Example Usage
154
154
 
155
+ <!--Start PulumiCodeChooser -->
155
156
  ```python
156
157
  import pulumi
157
158
  import pulumi_vault as vault
158
159
 
159
160
  example = vault.get_auth_backend(path="userpass")
160
161
  ```
162
+ <!--End PulumiCodeChooser -->
161
163
 
162
164
 
163
165
  :param str namespace: The namespace of the target resource.
@@ -192,12 +194,14 @@ def get_auth_backend_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
192
194
  """
193
195
  ## Example Usage
194
196
 
197
+ <!--Start PulumiCodeChooser -->
195
198
  ```python
196
199
  import pulumi
197
200
  import pulumi_vault as vault
198
201
 
199
202
  example = vault.get_auth_backend(path="userpass")
200
203
  ```
204
+ <!--End PulumiCodeChooser -->
201
205
 
202
206
 
203
207
  :param str namespace: The namespace of the target resource.
@@ -92,19 +92,23 @@ def get_auth_backends(namespace: Optional[str] = None,
92
92
  """
93
93
  ## Example Usage
94
94
 
95
+ <!--Start PulumiCodeChooser -->
95
96
  ```python
96
97
  import pulumi
97
98
  import pulumi_vault as vault
98
99
 
99
100
  example = vault.get_auth_backends()
100
101
  ```
102
+ <!--End PulumiCodeChooser -->
101
103
 
104
+ <!--Start PulumiCodeChooser -->
102
105
  ```python
103
106
  import pulumi
104
107
  import pulumi_vault as vault
105
108
 
106
109
  example_filter = vault.get_auth_backends(type="kubernetes")
107
110
  ```
111
+ <!--End PulumiCodeChooser -->
108
112
 
109
113
 
110
114
  :param str namespace: The namespace of the target resource.
@@ -134,19 +138,23 @@ def get_auth_backends_output(namespace: Optional[pulumi.Input[Optional[str]]] =
134
138
  """
135
139
  ## Example Usage
136
140
 
141
+ <!--Start PulumiCodeChooser -->
137
142
  ```python
138
143
  import pulumi
139
144
  import pulumi_vault as vault
140
145
 
141
146
  example = vault.get_auth_backends()
142
147
  ```
148
+ <!--End PulumiCodeChooser -->
143
149
 
150
+ <!--Start PulumiCodeChooser -->
144
151
  ```python
145
152
  import pulumi
146
153
  import pulumi_vault as vault
147
154
 
148
155
  example_filter = vault.get_auth_backends(type="kubernetes")
149
156
  ```
157
+ <!--End PulumiCodeChooser -->
150
158
 
151
159
 
152
160
  :param str namespace: The namespace of the target resource.
@@ -110,24 +110,29 @@ def get_namespace(namespace: Optional[str] = None,
110
110
 
111
111
  ### Current namespace
112
112
 
113
+ <!--Start PulumiCodeChooser -->
113
114
  ```python
114
115
  import pulumi
115
116
  import pulumi_vault as vault
116
117
 
117
118
  current = vault.get_namespace()
118
119
  ```
120
+ <!--End PulumiCodeChooser -->
119
121
 
120
122
  ### Single namespace
121
123
 
124
+ <!--Start PulumiCodeChooser -->
122
125
  ```python
123
126
  import pulumi
124
127
  import pulumi_vault as vault
125
128
 
126
129
  ns1 = vault.get_namespace(path="ns1")
127
130
  ```
131
+ <!--End PulumiCodeChooser -->
128
132
 
129
133
  ### Nested namespace
130
134
 
135
+ <!--Start PulumiCodeChooser -->
131
136
  ```python
132
137
  import pulumi
133
138
  import pulumi_vault as vault
@@ -138,6 +143,7 @@ def get_namespace(namespace: Optional[str] = None,
138
143
  # -> foo/parent/child/
139
144
  path_fq = child.path_fq
140
145
  ```
146
+ <!--End PulumiCodeChooser -->
141
147
 
142
148
 
143
149
  :param str namespace: The namespace to provision the resource in.
@@ -172,24 +178,29 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
172
178
 
173
179
  ### Current namespace
174
180
 
181
+ <!--Start PulumiCodeChooser -->
175
182
  ```python
176
183
  import pulumi
177
184
  import pulumi_vault as vault
178
185
 
179
186
  current = vault.get_namespace()
180
187
  ```
188
+ <!--End PulumiCodeChooser -->
181
189
 
182
190
  ### Single namespace
183
191
 
192
+ <!--Start PulumiCodeChooser -->
184
193
  ```python
185
194
  import pulumi
186
195
  import pulumi_vault as vault
187
196
 
188
197
  ns1 = vault.get_namespace(path="ns1")
189
198
  ```
199
+ <!--End PulumiCodeChooser -->
190
200
 
191
201
  ### Nested namespace
192
202
 
203
+ <!--Start PulumiCodeChooser -->
193
204
  ```python
194
205
  import pulumi
195
206
  import pulumi_vault as vault
@@ -200,6 +211,7 @@ def get_namespace_output(namespace: Optional[pulumi.Input[Optional[str]]] = None
200
211
  # -> foo/parent/child/
201
212
  path_fq = child.path_fq
202
213
  ```
214
+ <!--End PulumiCodeChooser -->
203
215
 
204
216
 
205
217
  :param str namespace: The namespace to provision the resource in.
@@ -72,25 +72,29 @@ def get_namespaces(namespace: Optional[str] = None,
72
72
 
73
73
  ### Child namespaces
74
74
 
75
+ <!--Start PulumiCodeChooser -->
75
76
  ```python
76
77
  import pulumi
77
78
  import pulumi_vault as vault
78
79
 
79
80
  children = vault.get_namespaces()
80
81
  ```
82
+ <!--End PulumiCodeChooser -->
81
83
 
82
84
  ### Nested namespace
83
85
 
84
86
  To fetch the details of nested namespaces:
85
87
 
88
+ <!--Start PulumiCodeChooser -->
86
89
  ```python
87
90
  import pulumi
88
91
  import pulumi_vault as vault
89
92
 
90
93
  children = vault.get_namespaces(namespace="parent")
91
- child = {__key: vault.get_namespace(namespace=children.namespace,
92
- path=__key) for __key, __value in children.paths}
94
+ child = [vault.get_namespace(namespace=children.namespace,
95
+ path=__key) for __key, __value in children.paths]
93
96
  ```
97
+ <!--End PulumiCodeChooser -->
94
98
 
95
99
 
96
100
  :param str namespace: The namespace to provision the resource in.
@@ -116,25 +120,29 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[str]]] = Non
116
120
 
117
121
  ### Child namespaces
118
122
 
123
+ <!--Start PulumiCodeChooser -->
119
124
  ```python
120
125
  import pulumi
121
126
  import pulumi_vault as vault
122
127
 
123
128
  children = vault.get_namespaces()
124
129
  ```
130
+ <!--End PulumiCodeChooser -->
125
131
 
126
132
  ### Nested namespace
127
133
 
128
134
  To fetch the details of nested namespaces:
129
135
 
136
+ <!--Start PulumiCodeChooser -->
130
137
  ```python
131
138
  import pulumi
132
139
  import pulumi_vault as vault
133
140
 
134
141
  children = vault.get_namespaces(namespace="parent")
135
- child = {__key: vault.get_namespace(namespace=children.namespace,
136
- path=__key) for __key, __value in children.paths}
142
+ child = [vault.get_namespace(namespace=children.namespace,
143
+ path=__key) for __key, __value in children.paths]
137
144
  ```
145
+ <!--End PulumiCodeChooser -->
138
146
 
139
147
 
140
148
  :param str namespace: The namespace to provision the resource in.
@@ -103,6 +103,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
103
103
  """
104
104
  ## Example Usage
105
105
 
106
+ <!--Start PulumiCodeChooser -->
106
107
  ```python
107
108
  import pulumi
108
109
  import pulumi_vault as vault
@@ -122,6 +123,7 @@ def get_nomad_access_token(backend: Optional[str] = None,
122
123
  token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
123
124
  role=role))
124
125
  ```
126
+ <!--End PulumiCodeChooser -->
125
127
 
126
128
 
127
129
  :param str backend: The path to the Nomad secret backend to
@@ -157,6 +159,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
157
159
  """
158
160
  ## Example Usage
159
161
 
162
+ <!--Start PulumiCodeChooser -->
160
163
  ```python
161
164
  import pulumi
162
165
  import pulumi_vault as vault
@@ -176,6 +179,7 @@ def get_nomad_access_token_output(backend: Optional[pulumi.Input[str]] = None,
176
179
  token = pulumi.Output.all(config.backend, test.role).apply(lambda backend, role: vault.get_nomad_access_token_output(backend=backend,
177
180
  role=role))
178
181
  ```
182
+ <!--End PulumiCodeChooser -->
179
183
 
180
184
 
181
185
  :param str backend: The path to the Nomad secret backend to
@@ -84,11 +84,12 @@ def get_policy_document(namespace: Optional[str] = None,
84
84
 
85
85
  ## Example Usage
86
86
 
87
+ <!--Start PulumiCodeChooser -->
87
88
  ```python
88
89
  import pulumi
89
90
  import pulumi_vault as vault
90
91
 
91
- example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
92
+ example_policy_document = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
92
93
  path="secret/*",
93
94
  capabilities=[
94
95
  "create",
@@ -99,10 +100,9 @@ def get_policy_document(namespace: Optional[str] = None,
99
100
  ],
100
101
  description="allow all on secrets",
101
102
  )])
102
- example_policy = vault.Policy("example",
103
- name="example_policy",
104
- policy=example.hcl)
103
+ example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
105
104
  ```
105
+ <!--End PulumiCodeChooser -->
106
106
  """
107
107
  __args__ = dict()
108
108
  __args__['namespace'] = namespace
@@ -126,11 +126,12 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
126
126
 
127
127
  ## Example Usage
128
128
 
129
+ <!--Start PulumiCodeChooser -->
129
130
  ```python
130
131
  import pulumi
131
132
  import pulumi_vault as vault
132
133
 
133
- example = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
134
+ example_policy_document = vault.get_policy_document(rules=[vault.GetPolicyDocumentRuleArgs(
134
135
  path="secret/*",
135
136
  capabilities=[
136
137
  "create",
@@ -141,9 +142,8 @@ def get_policy_document_output(namespace: Optional[pulumi.Input[Optional[str]]]
141
142
  ],
142
143
  description="allow all on secrets",
143
144
  )])
144
- example_policy = vault.Policy("example",
145
- name="example_policy",
146
- policy=example.hcl)
145
+ example_policy = vault.Policy("examplePolicy", policy=example_policy_document.hcl)
147
146
  ```
147
+ <!--End PulumiCodeChooser -->
148
148
  """
149
149
  ...
@@ -190,6 +190,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
190
190
  """
191
191
  ## Example Usage
192
192
 
193
+ <!--Start PulumiCodeChooser -->
193
194
  ```python
194
195
  import pulumi
195
196
  import pulumi_vault as vault
@@ -197,6 +198,7 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
197
198
  main = vault.get_raft_autopilot_state()
198
199
  pulumi.export("failure-tolerance", main.failure_tolerance)
199
200
  ```
201
+ <!--End PulumiCodeChooser -->
200
202
 
201
203
 
202
204
  :param str namespace: The namespace of the target resource.
@@ -231,6 +233,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
231
233
  """
232
234
  ## Example Usage
233
235
 
236
+ <!--Start PulumiCodeChooser -->
234
237
  ```python
235
238
  import pulumi
236
239
  import pulumi_vault as vault
@@ -238,6 +241,7 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
238
241
  main = vault.get_raft_autopilot_state()
239
242
  pulumi.export("failure-tolerance", main.failure_tolerance)
240
243
  ```
244
+ <!--End PulumiCodeChooser -->
241
245
 
242
246
 
243
247
  :param str namespace: The namespace of the target resource.
@@ -714,12 +714,14 @@ class AuthBackend(pulumi.CustomResource):
714
714
 
715
715
  ## Example Usage
716
716
 
717
+ <!--Start PulumiCodeChooser -->
717
718
  ```python
718
719
  import pulumi
719
720
  import pulumi_vault as vault
720
721
 
721
722
  example = vault.github.AuthBackend("example", organization="myorg")
722
723
  ```
724
+ <!--End PulumiCodeChooser -->
723
725
 
724
726
  ## Import
725
727
 
@@ -786,12 +788,14 @@ class AuthBackend(pulumi.CustomResource):
786
788
 
787
789
  ## Example Usage
788
790
 
791
+ <!--Start PulumiCodeChooser -->
789
792
  ```python
790
793
  import pulumi
791
794
  import pulumi_vault as vault
792
795
 
793
796
  example = vault.github.AuthBackend("example", organization="myorg")
794
797
  ```
798
+ <!--End PulumiCodeChooser -->
795
799
 
796
800
  ## Import
797
801
 
@@ -191,12 +191,13 @@ class Team(pulumi.CustomResource):
191
191
 
192
192
  ## Example Usage
193
193
 
194
+ <!--Start PulumiCodeChooser -->
194
195
  ```python
195
196
  import pulumi
196
197
  import pulumi_vault as vault
197
198
 
198
199
  example = vault.github.AuthBackend("example", organization="myorg")
199
- tf_devs = vault.github.Team("tf_devs",
200
+ tf_devs = vault.github.Team("tfDevs",
200
201
  backend=example.id,
201
202
  team="terraform-developers",
202
203
  policies=[
@@ -204,6 +205,7 @@ class Team(pulumi.CustomResource):
204
205
  "read-only",
205
206
  ])
206
207
  ```
208
+ <!--End PulumiCodeChooser -->
207
209
 
208
210
  ## Import
209
211
 
@@ -238,12 +240,13 @@ class Team(pulumi.CustomResource):
238
240
 
239
241
  ## Example Usage
240
242
 
243
+ <!--Start PulumiCodeChooser -->
241
244
  ```python
242
245
  import pulumi
243
246
  import pulumi_vault as vault
244
247
 
245
248
  example = vault.github.AuthBackend("example", organization="myorg")
246
- tf_devs = vault.github.Team("tf_devs",
249
+ tf_devs = vault.github.Team("tfDevs",
247
250
  backend=example.id,
248
251
  team="terraform-developers",
249
252
  policies=[
@@ -251,6 +254,7 @@ class Team(pulumi.CustomResource):
251
254
  "read-only",
252
255
  ])
253
256
  ```
257
+ <!--End PulumiCodeChooser -->
254
258
 
255
259
  ## Import
256
260
 
@@ -191,12 +191,13 @@ class User(pulumi.CustomResource):
191
191
 
192
192
  ## Example Usage
193
193
 
194
+ <!--Start PulumiCodeChooser -->
194
195
  ```python
195
196
  import pulumi
196
197
  import pulumi_vault as vault
197
198
 
198
199
  example = vault.github.AuthBackend("example", organization="myorg")
199
- tf_user = vault.github.User("tf_user",
200
+ tf_user = vault.github.User("tfUser",
200
201
  backend=example.id,
201
202
  user="john.doe",
202
203
  policies=[
@@ -204,6 +205,7 @@ class User(pulumi.CustomResource):
204
205
  "read-only",
205
206
  ])
206
207
  ```
208
+ <!--End PulumiCodeChooser -->
207
209
 
208
210
  ## Import
209
211
 
@@ -238,12 +240,13 @@ class User(pulumi.CustomResource):
238
240
 
239
241
  ## Example Usage
240
242
 
243
+ <!--Start PulumiCodeChooser -->
241
244
  ```python
242
245
  import pulumi
243
246
  import pulumi_vault as vault
244
247
 
245
248
  example = vault.github.AuthBackend("example", organization="myorg")
246
- tf_user = vault.github.User("tf_user",
249
+ tf_user = vault.github.User("tfUser",
247
250
  backend=example.id,
248
251
  user="john.doe",
249
252
  policies=[
@@ -251,6 +254,7 @@ class User(pulumi.CustomResource):
251
254
  "read-only",
252
255
  ])
253
256
  ```
257
+ <!--End PulumiCodeChooser -->
254
258
 
255
259
  ## Import
256
260