pulumi-vault 6.2.0a1713339773__py3-none-any.whl → 6.2.0a1713905519__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (180) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +2 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  20. pulumi_vault/azure/auth_backend_config.py +6 -10
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +16 -24
  23. pulumi_vault/azure/backend_role.py +14 -18
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +75 -208
  26. pulumi_vault/consul/secret_backend.py +10 -18
  27. pulumi_vault/consul/secret_backend_role.py +2 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +2 -4
  31. pulumi_vault/database/secret_backend_role.py +4 -4
  32. pulumi_vault/database/secret_backend_static_role.py +10 -8
  33. pulumi_vault/database/secrets_mount.py +4 -4
  34. pulumi_vault/egp_policy.py +4 -8
  35. pulumi_vault/gcp/auth_backend.py +0 -36
  36. pulumi_vault/gcp/auth_backend_role.py +63 -264
  37. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  38. pulumi_vault/gcp/secret_backend.py +4 -6
  39. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  40. pulumi_vault/gcp/secret_roleset.py +4 -6
  41. pulumi_vault/gcp/secret_static_account.py +14 -16
  42. pulumi_vault/generic/endpoint.py +4 -8
  43. pulumi_vault/generic/get_secret.py +40 -4
  44. pulumi_vault/get_auth_backend.py +0 -4
  45. pulumi_vault/get_auth_backends.py +0 -8
  46. pulumi_vault/get_namespace.py +0 -12
  47. pulumi_vault/get_namespaces.py +4 -12
  48. pulumi_vault/get_nomad_access_token.py +0 -4
  49. pulumi_vault/get_policy_document.py +8 -8
  50. pulumi_vault/get_raft_autopilot_state.py +0 -4
  51. pulumi_vault/github/auth_backend.py +0 -4
  52. pulumi_vault/github/team.py +2 -6
  53. pulumi_vault/github/user.py +2 -6
  54. pulumi_vault/identity/entity.py +6 -8
  55. pulumi_vault/identity/entity_alias.py +6 -8
  56. pulumi_vault/identity/entity_policies.py +12 -12
  57. pulumi_vault/identity/get_entity.py +0 -4
  58. pulumi_vault/identity/get_group.py +0 -4
  59. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  60. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  61. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  62. pulumi_vault/identity/group.py +38 -42
  63. pulumi_vault/identity/group_alias.py +2 -4
  64. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  65. pulumi_vault/identity/group_member_group_ids.py +24 -20
  66. pulumi_vault/identity/group_policies.py +4 -8
  67. pulumi_vault/identity/mfa_duo.py +4 -8
  68. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  69. pulumi_vault/identity/mfa_okta.py +4 -8
  70. pulumi_vault/identity/mfa_pingid.py +0 -4
  71. pulumi_vault/identity/mfa_totp.py +0 -4
  72. pulumi_vault/identity/oidc.py +0 -4
  73. pulumi_vault/identity/oidc_assignment.py +10 -6
  74. pulumi_vault/identity/oidc_client.py +10 -10
  75. pulumi_vault/identity/oidc_key.py +16 -12
  76. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  77. pulumi_vault/identity/oidc_provider.py +22 -16
  78. pulumi_vault/identity/oidc_role.py +28 -20
  79. pulumi_vault/identity/oidc_scope.py +6 -8
  80. pulumi_vault/jwt/auth_backend.py +20 -32
  81. pulumi_vault/jwt/auth_backend_role.py +63 -190
  82. pulumi_vault/kmip/secret_backend.py +10 -14
  83. pulumi_vault/kmip/secret_role.py +0 -4
  84. pulumi_vault/kmip/secret_scope.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  86. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  87. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  88. pulumi_vault/kubernetes/secret_backend.py +6 -8
  89. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  90. pulumi_vault/kv/get_secret.py +0 -4
  91. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  92. pulumi_vault/kv/get_secret_v2.py +58 -0
  93. pulumi_vault/kv/get_secrets_list.py +4 -8
  94. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  95. pulumi_vault/kv/secret.py +0 -4
  96. pulumi_vault/kv/secret_backend_v2.py +0 -4
  97. pulumi_vault/kv/secret_v2.py +2 -4
  98. pulumi_vault/ldap/auth_backend.py +66 -161
  99. pulumi_vault/ldap/auth_backend_group.py +0 -4
  100. pulumi_vault/ldap/auth_backend_user.py +0 -4
  101. pulumi_vault/ldap/secret_backend.py +4 -8
  102. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  103. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  104. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  105. pulumi_vault/managed/_inputs.py +84 -132
  106. pulumi_vault/managed/keys.py +7 -28
  107. pulumi_vault/managed/outputs.py +84 -132
  108. pulumi_vault/mfa_duo.py +4 -6
  109. pulumi_vault/mfa_okta.py +4 -6
  110. pulumi_vault/mfa_pingid.py +4 -6
  111. pulumi_vault/mfa_totp.py +10 -12
  112. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  113. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  114. pulumi_vault/mount.py +26 -42
  115. pulumi_vault/nomad_secret_backend.py +4 -8
  116. pulumi_vault/nomad_secret_role.py +0 -4
  117. pulumi_vault/okta/_inputs.py +8 -8
  118. pulumi_vault/okta/auth_backend.py +6 -10
  119. pulumi_vault/okta/auth_backend_group.py +0 -4
  120. pulumi_vault/okta/auth_backend_user.py +0 -4
  121. pulumi_vault/okta/outputs.py +8 -8
  122. pulumi_vault/outputs.py +0 -20
  123. pulumi_vault/password_policy.py +6 -8
  124. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  126. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  128. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  130. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  131. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  134. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  135. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  136. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  138. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  139. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  140. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  141. pulumi_vault/quota_lease_count.py +6 -8
  142. pulumi_vault/quota_rate_limit.py +2 -4
  143. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  144. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  145. pulumi_vault/raft_autopilot.py +0 -4
  146. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  147. pulumi_vault/rgp_policy.py +2 -6
  148. pulumi_vault/saml/auth_backend.py +8 -12
  149. pulumi_vault/saml/auth_backend_role.py +64 -178
  150. pulumi_vault/secrets/sync_association.py +12 -10
  151. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  152. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  153. pulumi_vault/secrets/sync_config.py +2 -6
  154. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  155. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  156. pulumi_vault/secrets/sync_github_apps.py +8 -8
  157. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  158. pulumi_vault/ssh/_inputs.py +6 -32
  159. pulumi_vault/ssh/outputs.py +6 -32
  160. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  161. pulumi_vault/ssh/secret_backend_role.py +4 -4
  162. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  163. pulumi_vault/terraformcloud/secret_creds.py +2 -4
  164. pulumi_vault/terraformcloud/secret_role.py +2 -4
  165. pulumi_vault/token.py +14 -18
  166. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  167. pulumi_vault/transform/alphabet.py +4 -6
  168. pulumi_vault/transform/get_decode.py +4 -4
  169. pulumi_vault/transform/get_encode.py +4 -4
  170. pulumi_vault/transform/role.py +4 -6
  171. pulumi_vault/transform/template.py +4 -4
  172. pulumi_vault/transit/get_decrypt.py +4 -20
  173. pulumi_vault/transit/get_encrypt.py +0 -14
  174. pulumi_vault/transit/secret_backend_key.py +6 -6
  175. pulumi_vault/transit/secret_cache_config.py +0 -4
  176. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/METADATA +1 -1
  177. pulumi_vault-6.2.0a1713905519.dist-info/RECORD +252 -0
  178. pulumi_vault-6.2.0a1713339773.dist-info/RECORD +0 -252
  179. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/WHEEL +0 -0
  180. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/top_level.txt +0 -0
@@ -923,7 +923,6 @@ class SecretBackendConnection(pulumi.CustomResource):
923
923
  """
924
924
  ## Example Usage
925
925
 
926
- <!--Start PulumiCodeChooser -->
927
926
  ```python
928
927
  import pulumi
929
928
  import pulumi_vault as vault
@@ -933,6 +932,7 @@ class SecretBackendConnection(pulumi.CustomResource):
933
932
  type="database")
934
933
  postgres = vault.database.SecretBackendConnection("postgres",
935
934
  backend=db.path,
935
+ name="postgres",
936
936
  allowed_roles=[
937
937
  "dev",
938
938
  "prod",
@@ -941,7 +941,6 @@ class SecretBackendConnection(pulumi.CustomResource):
941
941
  connection_url="postgres://username:password@host:port/database",
942
942
  ))
943
943
  ```
944
- <!--End PulumiCodeChooser -->
945
944
 
946
945
  ## Import
947
946
 
@@ -996,7 +995,6 @@ class SecretBackendConnection(pulumi.CustomResource):
996
995
  """
997
996
  ## Example Usage
998
997
 
999
- <!--Start PulumiCodeChooser -->
1000
998
  ```python
1001
999
  import pulumi
1002
1000
  import pulumi_vault as vault
@@ -1006,6 +1004,7 @@ class SecretBackendConnection(pulumi.CustomResource):
1006
1004
  type="database")
1007
1005
  postgres = vault.database.SecretBackendConnection("postgres",
1008
1006
  backend=db.path,
1007
+ name="postgres",
1009
1008
  allowed_roles=[
1010
1009
  "dev",
1011
1010
  "prod",
@@ -1014,7 +1013,6 @@ class SecretBackendConnection(pulumi.CustomResource):
1014
1013
  connection_url="postgres://username:password@host:port/database",
1015
1014
  ))
1016
1015
  ```
1017
- <!--End PulumiCodeChooser -->
1018
1016
 
1019
1017
  ## Import
1020
1018
 
@@ -489,7 +489,6 @@ class SecretBackendRole(pulumi.CustomResource):
489
489
  """
490
490
  ## Example Usage
491
491
 
492
- <!--Start PulumiCodeChooser -->
493
492
  ```python
494
493
  import pulumi
495
494
  import pulumi_vault as vault
@@ -499,6 +498,7 @@ class SecretBackendRole(pulumi.CustomResource):
499
498
  type="database")
500
499
  postgres = vault.database.SecretBackendConnection("postgres",
501
500
  backend=db.path,
501
+ name="postgres",
502
502
  allowed_roles=[
503
503
  "dev",
504
504
  "prod",
@@ -508,10 +508,10 @@ class SecretBackendRole(pulumi.CustomResource):
508
508
  ))
509
509
  role = vault.database.SecretBackendRole("role",
510
510
  backend=db.path,
511
+ name="dev",
511
512
  db_name=postgres.name,
512
513
  creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
513
514
  ```
514
- <!--End PulumiCodeChooser -->
515
515
 
516
516
  ## Import
517
517
 
@@ -560,7 +560,6 @@ class SecretBackendRole(pulumi.CustomResource):
560
560
  """
561
561
  ## Example Usage
562
562
 
563
- <!--Start PulumiCodeChooser -->
564
563
  ```python
565
564
  import pulumi
566
565
  import pulumi_vault as vault
@@ -570,6 +569,7 @@ class SecretBackendRole(pulumi.CustomResource):
570
569
  type="database")
571
570
  postgres = vault.database.SecretBackendConnection("postgres",
572
571
  backend=db.path,
572
+ name="postgres",
573
573
  allowed_roles=[
574
574
  "dev",
575
575
  "prod",
@@ -579,10 +579,10 @@ class SecretBackendRole(pulumi.CustomResource):
579
579
  ))
580
580
  role = vault.database.SecretBackendRole("role",
581
581
  backend=db.path,
582
+ name="dev",
582
583
  db_name=postgres.name,
583
584
  creation_statements=["CREATE ROLE \\"{{name}}\\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"])
584
585
  ```
585
- <!--End PulumiCodeChooser -->
586
586
 
587
587
  ## Import
588
588
 
@@ -370,7 +370,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
370
370
 
371
371
  ## Example Usage
372
372
 
373
- <!--Start PulumiCodeChooser -->
374
373
  ```python
375
374
  import pulumi
376
375
  import pulumi_vault as vault
@@ -380,27 +379,29 @@ class SecretBackendStaticRole(pulumi.CustomResource):
380
379
  type="database")
381
380
  postgres = vault.database.SecretBackendConnection("postgres",
382
381
  backend=db.path,
382
+ name="postgres",
383
383
  allowed_roles=["*"],
384
384
  postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
385
385
  connection_url="postgres://username:password@host:port/database",
386
386
  ))
387
387
  # configure a static role with period-based rotations
388
- period_role = vault.database.SecretBackendStaticRole("periodRole",
388
+ period_role = vault.database.SecretBackendStaticRole("period_role",
389
389
  backend=db.path,
390
+ name="my-period-role",
390
391
  db_name=postgres.name,
391
392
  username="example",
392
393
  rotation_period=3600,
393
394
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
394
395
  # configure a static role with schedule-based rotations
395
- schedule_role = vault.database.SecretBackendStaticRole("scheduleRole",
396
+ schedule_role = vault.database.SecretBackendStaticRole("schedule_role",
396
397
  backend=db.path,
398
+ name="my-schedule-role",
397
399
  db_name=postgres.name,
398
400
  username="example",
399
401
  rotation_schedule="0 0 * * SAT",
400
402
  rotation_window=172800,
401
403
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
402
404
  ```
403
- <!--End PulumiCodeChooser -->
404
405
 
405
406
  ## Import
406
407
 
@@ -444,7 +445,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
444
445
 
445
446
  ## Example Usage
446
447
 
447
- <!--Start PulumiCodeChooser -->
448
448
  ```python
449
449
  import pulumi
450
450
  import pulumi_vault as vault
@@ -454,27 +454,29 @@ class SecretBackendStaticRole(pulumi.CustomResource):
454
454
  type="database")
455
455
  postgres = vault.database.SecretBackendConnection("postgres",
456
456
  backend=db.path,
457
+ name="postgres",
457
458
  allowed_roles=["*"],
458
459
  postgresql=vault.database.SecretBackendConnectionPostgresqlArgs(
459
460
  connection_url="postgres://username:password@host:port/database",
460
461
  ))
461
462
  # configure a static role with period-based rotations
462
- period_role = vault.database.SecretBackendStaticRole("periodRole",
463
+ period_role = vault.database.SecretBackendStaticRole("period_role",
463
464
  backend=db.path,
465
+ name="my-period-role",
464
466
  db_name=postgres.name,
465
467
  username="example",
466
468
  rotation_period=3600,
467
469
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
468
470
  # configure a static role with schedule-based rotations
469
- schedule_role = vault.database.SecretBackendStaticRole("scheduleRole",
471
+ schedule_role = vault.database.SecretBackendStaticRole("schedule_role",
470
472
  backend=db.path,
473
+ name="my-schedule-role",
471
474
  db_name=postgres.name,
472
475
  username="example",
473
476
  rotation_schedule="0 0 * * SAT",
474
477
  rotation_window=172800,
475
478
  rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
476
479
  ```
477
- <!--End PulumiCodeChooser -->
478
480
 
479
481
  ## Import
480
482
 
@@ -1139,7 +1139,6 @@ class SecretsMount(pulumi.CustomResource):
1139
1139
  """
1140
1140
  ## Example Usage
1141
1141
 
1142
- <!--Start PulumiCodeChooser -->
1143
1142
  ```python
1144
1143
  import pulumi
1145
1144
  import pulumi_vault as vault
@@ -1162,6 +1161,7 @@ class SecretsMount(pulumi.CustomResource):
1162
1161
  allowed_roles=["dev2"],
1163
1162
  )])
1164
1163
  dev1 = vault.database.SecretBackendRole("dev1",
1164
+ name="dev1",
1165
1165
  backend=db.path,
1166
1166
  db_name=db.mssqls[0].name,
1167
1167
  creation_statements=[
@@ -1170,6 +1170,7 @@ class SecretsMount(pulumi.CustomResource):
1170
1170
  "GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
1171
1171
  ])
1172
1172
  dev2 = vault.database.SecretBackendRole("dev2",
1173
+ name="dev2",
1173
1174
  backend=db.path,
1174
1175
  db_name=db.postgresqls[0].name,
1175
1176
  creation_statements=[
@@ -1177,7 +1178,6 @@ class SecretsMount(pulumi.CustomResource):
1177
1178
  "GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
1178
1179
  ])
1179
1180
  ```
1180
- <!--End PulumiCodeChooser -->
1181
1181
 
1182
1182
  ## Import
1183
1183
 
@@ -1249,7 +1249,6 @@ class SecretsMount(pulumi.CustomResource):
1249
1249
  """
1250
1250
  ## Example Usage
1251
1251
 
1252
- <!--Start PulumiCodeChooser -->
1253
1252
  ```python
1254
1253
  import pulumi
1255
1254
  import pulumi_vault as vault
@@ -1272,6 +1271,7 @@ class SecretsMount(pulumi.CustomResource):
1272
1271
  allowed_roles=["dev2"],
1273
1272
  )])
1274
1273
  dev1 = vault.database.SecretBackendRole("dev1",
1274
+ name="dev1",
1275
1275
  backend=db.path,
1276
1276
  db_name=db.mssqls[0].name,
1277
1277
  creation_statements=[
@@ -1280,6 +1280,7 @@ class SecretsMount(pulumi.CustomResource):
1280
1280
  "GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
1281
1281
  ])
1282
1282
  dev2 = vault.database.SecretBackendRole("dev2",
1283
+ name="dev2",
1283
1284
  backend=db.path,
1284
1285
  db_name=db.postgresqls[0].name,
1285
1286
  creation_statements=[
@@ -1287,7 +1288,6 @@ class SecretsMount(pulumi.CustomResource):
1287
1288
  "GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
1288
1289
  ])
1289
1290
  ```
1290
- <!--End PulumiCodeChooser -->
1291
1291
 
1292
1292
  ## Import
1293
1293
 
@@ -214,21 +214,19 @@ class EgpPolicy(pulumi.CustomResource):
214
214
 
215
215
  ## Example Usage
216
216
 
217
- <!--Start PulumiCodeChooser -->
218
217
  ```python
219
218
  import pulumi
220
219
  import pulumi_vault as vault
221
220
 
222
221
  allow_all = vault.EgpPolicy("allow-all",
223
- enforcement_level="soft-mandatory",
222
+ name="allow-all",
224
223
  paths=["*"],
224
+ enforcement_level="soft-mandatory",
225
225
  policy=\"\"\"main = rule {
226
226
  true
227
227
  }
228
-
229
228
  \"\"\")
230
229
  ```
231
- <!--End PulumiCodeChooser -->
232
230
 
233
231
  :param str resource_name: The name of the resource.
234
232
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -254,21 +252,19 @@ class EgpPolicy(pulumi.CustomResource):
254
252
 
255
253
  ## Example Usage
256
254
 
257
- <!--Start PulumiCodeChooser -->
258
255
  ```python
259
256
  import pulumi
260
257
  import pulumi_vault as vault
261
258
 
262
259
  allow_all = vault.EgpPolicy("allow-all",
263
- enforcement_level="soft-mandatory",
260
+ name="allow-all",
264
261
  paths=["*"],
262
+ enforcement_level="soft-mandatory",
265
263
  policy=\"\"\"main = rule {
266
264
  true
267
265
  }
268
-
269
266
  \"\"\")
270
267
  ```
271
- <!--End PulumiCodeChooser -->
272
268
 
273
269
  :param str resource_name: The name of the resource.
274
270
  :param EgpPolicyArgs args: The arguments to use to populate this resource's properties.
@@ -498,24 +498,6 @@ class AuthBackend(pulumi.CustomResource):
498
498
  """
499
499
  Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
500
500
 
501
- ## Example Usage
502
-
503
- <!--Start PulumiCodeChooser -->
504
- ```python
505
- import pulumi
506
- import pulumi_vault as vault
507
-
508
- gcp = vault.gcp.AuthBackend("gcp",
509
- credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
510
- custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
511
- api="www.googleapis.com",
512
- iam="iam.googleapis.com",
513
- crm="cloudresourcemanager.googleapis.com",
514
- compute="compute.googleapis.com",
515
- ))
516
- ```
517
- <!--End PulumiCodeChooser -->
518
-
519
501
  ## Import
520
502
 
521
503
  GCP authentication backends can be imported using the backend name, e.g.
@@ -560,24 +542,6 @@ class AuthBackend(pulumi.CustomResource):
560
542
  """
561
543
  Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
562
544
 
563
- ## Example Usage
564
-
565
- <!--Start PulumiCodeChooser -->
566
- ```python
567
- import pulumi
568
- import pulumi_vault as vault
569
-
570
- gcp = vault.gcp.AuthBackend("gcp",
571
- credentials=(lambda path: open(path).read())("vault-gcp-credentials.json"),
572
- custom_endpoint=vault.gcp.AuthBackendCustomEndpointArgs(
573
- api="www.googleapis.com",
574
- iam="iam.googleapis.com",
575
- crm="cloudresourcemanager.googleapis.com",
576
- compute="compute.googleapis.com",
577
- ))
578
- ```
579
- <!--End PulumiCodeChooser -->
580
-
581
545
  ## Import
582
546
 
583
547
  GCP authentication backends can be imported using the backend name, e.g.