pulumi-vault 6.2.0a1713339773__py3-none-any.whl → 6.2.0a1713905519__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (180) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +2 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  20. pulumi_vault/azure/auth_backend_config.py +6 -10
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +16 -24
  23. pulumi_vault/azure/backend_role.py +14 -18
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +75 -208
  26. pulumi_vault/consul/secret_backend.py +10 -18
  27. pulumi_vault/consul/secret_backend_role.py +2 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +2 -4
  31. pulumi_vault/database/secret_backend_role.py +4 -4
  32. pulumi_vault/database/secret_backend_static_role.py +10 -8
  33. pulumi_vault/database/secrets_mount.py +4 -4
  34. pulumi_vault/egp_policy.py +4 -8
  35. pulumi_vault/gcp/auth_backend.py +0 -36
  36. pulumi_vault/gcp/auth_backend_role.py +63 -264
  37. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  38. pulumi_vault/gcp/secret_backend.py +4 -6
  39. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  40. pulumi_vault/gcp/secret_roleset.py +4 -6
  41. pulumi_vault/gcp/secret_static_account.py +14 -16
  42. pulumi_vault/generic/endpoint.py +4 -8
  43. pulumi_vault/generic/get_secret.py +40 -4
  44. pulumi_vault/get_auth_backend.py +0 -4
  45. pulumi_vault/get_auth_backends.py +0 -8
  46. pulumi_vault/get_namespace.py +0 -12
  47. pulumi_vault/get_namespaces.py +4 -12
  48. pulumi_vault/get_nomad_access_token.py +0 -4
  49. pulumi_vault/get_policy_document.py +8 -8
  50. pulumi_vault/get_raft_autopilot_state.py +0 -4
  51. pulumi_vault/github/auth_backend.py +0 -4
  52. pulumi_vault/github/team.py +2 -6
  53. pulumi_vault/github/user.py +2 -6
  54. pulumi_vault/identity/entity.py +6 -8
  55. pulumi_vault/identity/entity_alias.py +6 -8
  56. pulumi_vault/identity/entity_policies.py +12 -12
  57. pulumi_vault/identity/get_entity.py +0 -4
  58. pulumi_vault/identity/get_group.py +0 -4
  59. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  60. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  61. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  62. pulumi_vault/identity/group.py +38 -42
  63. pulumi_vault/identity/group_alias.py +2 -4
  64. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  65. pulumi_vault/identity/group_member_group_ids.py +24 -20
  66. pulumi_vault/identity/group_policies.py +4 -8
  67. pulumi_vault/identity/mfa_duo.py +4 -8
  68. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  69. pulumi_vault/identity/mfa_okta.py +4 -8
  70. pulumi_vault/identity/mfa_pingid.py +0 -4
  71. pulumi_vault/identity/mfa_totp.py +0 -4
  72. pulumi_vault/identity/oidc.py +0 -4
  73. pulumi_vault/identity/oidc_assignment.py +10 -6
  74. pulumi_vault/identity/oidc_client.py +10 -10
  75. pulumi_vault/identity/oidc_key.py +16 -12
  76. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  77. pulumi_vault/identity/oidc_provider.py +22 -16
  78. pulumi_vault/identity/oidc_role.py +28 -20
  79. pulumi_vault/identity/oidc_scope.py +6 -8
  80. pulumi_vault/jwt/auth_backend.py +20 -32
  81. pulumi_vault/jwt/auth_backend_role.py +63 -190
  82. pulumi_vault/kmip/secret_backend.py +10 -14
  83. pulumi_vault/kmip/secret_role.py +0 -4
  84. pulumi_vault/kmip/secret_scope.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  86. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  87. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  88. pulumi_vault/kubernetes/secret_backend.py +6 -8
  89. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  90. pulumi_vault/kv/get_secret.py +0 -4
  91. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  92. pulumi_vault/kv/get_secret_v2.py +58 -0
  93. pulumi_vault/kv/get_secrets_list.py +4 -8
  94. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  95. pulumi_vault/kv/secret.py +0 -4
  96. pulumi_vault/kv/secret_backend_v2.py +0 -4
  97. pulumi_vault/kv/secret_v2.py +2 -4
  98. pulumi_vault/ldap/auth_backend.py +66 -161
  99. pulumi_vault/ldap/auth_backend_group.py +0 -4
  100. pulumi_vault/ldap/auth_backend_user.py +0 -4
  101. pulumi_vault/ldap/secret_backend.py +4 -8
  102. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  103. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  104. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  105. pulumi_vault/managed/_inputs.py +84 -132
  106. pulumi_vault/managed/keys.py +7 -28
  107. pulumi_vault/managed/outputs.py +84 -132
  108. pulumi_vault/mfa_duo.py +4 -6
  109. pulumi_vault/mfa_okta.py +4 -6
  110. pulumi_vault/mfa_pingid.py +4 -6
  111. pulumi_vault/mfa_totp.py +10 -12
  112. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  113. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  114. pulumi_vault/mount.py +26 -42
  115. pulumi_vault/nomad_secret_backend.py +4 -8
  116. pulumi_vault/nomad_secret_role.py +0 -4
  117. pulumi_vault/okta/_inputs.py +8 -8
  118. pulumi_vault/okta/auth_backend.py +6 -10
  119. pulumi_vault/okta/auth_backend_group.py +0 -4
  120. pulumi_vault/okta/auth_backend_user.py +0 -4
  121. pulumi_vault/okta/outputs.py +8 -8
  122. pulumi_vault/outputs.py +0 -20
  123. pulumi_vault/password_policy.py +6 -8
  124. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  126. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  128. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  130. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  131. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  134. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  135. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  136. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  138. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  139. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  140. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  141. pulumi_vault/quota_lease_count.py +6 -8
  142. pulumi_vault/quota_rate_limit.py +2 -4
  143. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  144. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  145. pulumi_vault/raft_autopilot.py +0 -4
  146. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  147. pulumi_vault/rgp_policy.py +2 -6
  148. pulumi_vault/saml/auth_backend.py +8 -12
  149. pulumi_vault/saml/auth_backend_role.py +64 -178
  150. pulumi_vault/secrets/sync_association.py +12 -10
  151. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  152. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  153. pulumi_vault/secrets/sync_config.py +2 -6
  154. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  155. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  156. pulumi_vault/secrets/sync_github_apps.py +8 -8
  157. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  158. pulumi_vault/ssh/_inputs.py +6 -32
  159. pulumi_vault/ssh/outputs.py +6 -32
  160. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  161. pulumi_vault/ssh/secret_backend_role.py +4 -4
  162. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  163. pulumi_vault/terraformcloud/secret_creds.py +2 -4
  164. pulumi_vault/terraformcloud/secret_role.py +2 -4
  165. pulumi_vault/token.py +14 -18
  166. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  167. pulumi_vault/transform/alphabet.py +4 -6
  168. pulumi_vault/transform/get_decode.py +4 -4
  169. pulumi_vault/transform/get_encode.py +4 -4
  170. pulumi_vault/transform/role.py +4 -6
  171. pulumi_vault/transform/template.py +4 -4
  172. pulumi_vault/transit/get_decrypt.py +4 -20
  173. pulumi_vault/transit/get_encrypt.py +0 -14
  174. pulumi_vault/transit/secret_backend_key.py +6 -6
  175. pulumi_vault/transit/secret_cache_config.py +0 -4
  176. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/METADATA +1 -1
  177. pulumi_vault-6.2.0a1713905519.dist-info/RECORD +252 -0
  178. pulumi_vault-6.2.0a1713339773.dist-info/RECORD +0 -252
  179. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/WHEEL +0 -0
  180. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/top_level.txt +0 -0
pulumi_vault/mfa_totp.py CHANGED
@@ -360,19 +360,18 @@ class MfaTotp(pulumi.CustomResource):
360
360
 
361
361
  ## Example Usage
362
362
 
363
- <!--Start PulumiCodeChooser -->
364
363
  ```python
365
364
  import pulumi
366
365
  import pulumi_vault as vault
367
366
 
368
- my_totp = vault.MfaTotp("myTotp",
367
+ my_totp = vault.MfaTotp("my_totp",
368
+ name="my_totp",
369
+ issuer="hashicorp",
370
+ period=60,
369
371
  algorithm="SHA256",
370
372
  digits=8,
371
- issuer="hashicorp",
372
- key_size=20,
373
- period=60)
373
+ key_size=20)
374
374
  ```
375
- <!--End PulumiCodeChooser -->
376
375
 
377
376
  ## Import
378
377
 
@@ -413,19 +412,18 @@ class MfaTotp(pulumi.CustomResource):
413
412
 
414
413
  ## Example Usage
415
414
 
416
- <!--Start PulumiCodeChooser -->
417
415
  ```python
418
416
  import pulumi
419
417
  import pulumi_vault as vault
420
418
 
421
- my_totp = vault.MfaTotp("myTotp",
419
+ my_totp = vault.MfaTotp("my_totp",
420
+ name="my_totp",
421
+ issuer="hashicorp",
422
+ period=60,
422
423
  algorithm="SHA256",
423
424
  digits=8,
424
- issuer="hashicorp",
425
- key_size=20,
426
- period=60)
425
+ key_size=20)
427
426
  ```
428
- <!--End PulumiCodeChooser -->
429
427
 
430
428
  ## Import
431
429
 
@@ -193,7 +193,6 @@ class SecretBackend(pulumi.CustomResource):
193
193
  """
194
194
  ## Example Usage
195
195
 
196
- <!--Start PulumiCodeChooser -->
197
196
  ```python
198
197
  import pulumi
199
198
  import pulumi_vault as vault
@@ -207,7 +206,6 @@ class SecretBackend(pulumi.CustomResource):
207
206
  private_key="privateKey",
208
207
  public_key="publicKey")
209
208
  ```
210
- <!--End PulumiCodeChooser -->
211
209
 
212
210
  ## Import
213
211
 
@@ -236,7 +234,6 @@ class SecretBackend(pulumi.CustomResource):
236
234
  """
237
235
  ## Example Usage
238
236
 
239
- <!--Start PulumiCodeChooser -->
240
237
  ```python
241
238
  import pulumi
242
239
  import pulumi_vault as vault
@@ -250,7 +247,6 @@ class SecretBackend(pulumi.CustomResource):
250
247
  private_key="privateKey",
251
248
  public_key="publicKey")
252
249
  ```
253
- <!--End PulumiCodeChooser -->
254
250
 
255
251
  ## Import
256
252
 
@@ -417,7 +417,6 @@ class SecretRole(pulumi.CustomResource):
417
417
  """
418
418
  ## Example Usage
419
419
 
420
- <!--Start PulumiCodeChooser -->
421
420
  ```python
422
421
  import pulumi
423
422
  import pulumi_vault as vault
@@ -432,6 +431,7 @@ class SecretRole(pulumi.CustomResource):
432
431
  public_key="publicKey")
433
432
  role = vault.mongodbatlas.SecretRole("role",
434
433
  mount=mongo.path,
434
+ name="tf-test-role",
435
435
  organization_id="7cf5a45a9ccf6400e60981b7",
436
436
  project_id="5cf5a45a9ccf6400e60981b6",
437
437
  roles=["ORG_READ_ONLY"],
@@ -441,7 +441,6 @@ class SecretRole(pulumi.CustomResource):
441
441
  ttl="60",
442
442
  max_ttl="120")
443
443
  ```
444
- <!--End PulumiCodeChooser -->
445
444
 
446
445
  ## Import
447
446
 
@@ -480,7 +479,6 @@ class SecretRole(pulumi.CustomResource):
480
479
  """
481
480
  ## Example Usage
482
481
 
483
- <!--Start PulumiCodeChooser -->
484
482
  ```python
485
483
  import pulumi
486
484
  import pulumi_vault as vault
@@ -495,6 +493,7 @@ class SecretRole(pulumi.CustomResource):
495
493
  public_key="publicKey")
496
494
  role = vault.mongodbatlas.SecretRole("role",
497
495
  mount=mongo.path,
496
+ name="tf-test-role",
498
497
  organization_id="7cf5a45a9ccf6400e60981b7",
499
498
  project_id="5cf5a45a9ccf6400e60981b6",
500
499
  roles=["ORG_READ_ONLY"],
@@ -504,7 +503,6 @@ class SecretRole(pulumi.CustomResource):
504
503
  ttl="60",
505
504
  max_ttl="120")
506
505
  ```
507
- <!--End PulumiCodeChooser -->
508
506
 
509
507
  ## Import
510
508
 
pulumi_vault/mount.py CHANGED
@@ -493,62 +493,54 @@ class Mount(pulumi.CustomResource):
493
493
 
494
494
  ## Example Usage
495
495
 
496
- <!--Start PulumiCodeChooser -->
497
496
  ```python
498
497
  import pulumi
499
498
  import pulumi_vault as vault
500
499
 
501
500
  example = vault.Mount("example",
502
- description="This is an example mount",
503
501
  path="dummy",
504
- type="generic")
502
+ type="generic",
503
+ description="This is an example mount")
505
504
  ```
506
- <!--End PulumiCodeChooser -->
507
505
 
508
- <!--Start PulumiCodeChooser -->
509
506
  ```python
510
507
  import pulumi
511
508
  import pulumi_vault as vault
512
509
 
513
510
  kvv2_example = vault.Mount("kvv2-example",
514
- description="This is an example KV Version 2 secret engine mount",
511
+ path="version2-example",
512
+ type="kv-v2",
515
513
  options={
516
- "type": "kv-v2",
517
514
  "version": "2",
515
+ "type": "kv-v2",
518
516
  },
519
- path="version2-example",
520
- type="kv-v2")
517
+ description="This is an example KV Version 2 secret engine mount")
521
518
  ```
522
- <!--End PulumiCodeChooser -->
523
519
 
524
- <!--Start PulumiCodeChooser -->
525
520
  ```python
526
521
  import pulumi
527
522
  import pulumi_vault as vault
528
523
 
529
524
  transit_example = vault.Mount("transit-example",
525
+ path="transit-example",
526
+ type="transit",
530
527
  description="This is an example transit secret engine mount",
531
528
  options={
532
529
  "convergent_encryption": False,
533
- },
534
- path="transit-example",
535
- type="transit")
530
+ })
536
531
  ```
537
- <!--End PulumiCodeChooser -->
538
532
 
539
- <!--Start PulumiCodeChooser -->
540
533
  ```python
541
534
  import pulumi
542
535
  import pulumi_vault as vault
543
536
 
544
537
  pki_example = vault.Mount("pki-example",
545
- default_lease_ttl_seconds=3600,
546
- description="This is an example PKI mount",
547
- max_lease_ttl_seconds=86400,
548
538
  path="pki-example",
549
- type="pki")
539
+ type="pki",
540
+ description="This is an example PKI mount",
541
+ default_lease_ttl_seconds=3600,
542
+ max_lease_ttl_seconds=86400)
550
543
  ```
551
- <!--End PulumiCodeChooser -->
552
544
 
553
545
  ## Import
554
546
 
@@ -588,62 +580,54 @@ class Mount(pulumi.CustomResource):
588
580
 
589
581
  ## Example Usage
590
582
 
591
- <!--Start PulumiCodeChooser -->
592
583
  ```python
593
584
  import pulumi
594
585
  import pulumi_vault as vault
595
586
 
596
587
  example = vault.Mount("example",
597
- description="This is an example mount",
598
588
  path="dummy",
599
- type="generic")
589
+ type="generic",
590
+ description="This is an example mount")
600
591
  ```
601
- <!--End PulumiCodeChooser -->
602
592
 
603
- <!--Start PulumiCodeChooser -->
604
593
  ```python
605
594
  import pulumi
606
595
  import pulumi_vault as vault
607
596
 
608
597
  kvv2_example = vault.Mount("kvv2-example",
609
- description="This is an example KV Version 2 secret engine mount",
598
+ path="version2-example",
599
+ type="kv-v2",
610
600
  options={
611
- "type": "kv-v2",
612
601
  "version": "2",
602
+ "type": "kv-v2",
613
603
  },
614
- path="version2-example",
615
- type="kv-v2")
604
+ description="This is an example KV Version 2 secret engine mount")
616
605
  ```
617
- <!--End PulumiCodeChooser -->
618
606
 
619
- <!--Start PulumiCodeChooser -->
620
607
  ```python
621
608
  import pulumi
622
609
  import pulumi_vault as vault
623
610
 
624
611
  transit_example = vault.Mount("transit-example",
612
+ path="transit-example",
613
+ type="transit",
625
614
  description="This is an example transit secret engine mount",
626
615
  options={
627
616
  "convergent_encryption": False,
628
- },
629
- path="transit-example",
630
- type="transit")
617
+ })
631
618
  ```
632
- <!--End PulumiCodeChooser -->
633
619
 
634
- <!--Start PulumiCodeChooser -->
635
620
  ```python
636
621
  import pulumi
637
622
  import pulumi_vault as vault
638
623
 
639
624
  pki_example = vault.Mount("pki-example",
640
- default_lease_ttl_seconds=3600,
641
- description="This is an example PKI mount",
642
- max_lease_ttl_seconds=86400,
643
625
  path="pki-example",
644
- type="pki")
626
+ type="pki",
627
+ description="This is an example PKI mount",
628
+ default_lease_ttl_seconds=3600,
629
+ max_lease_ttl_seconds=86400)
645
630
  ```
646
- <!--End PulumiCodeChooser -->
647
631
 
648
632
  ## Import
649
633
 
@@ -571,22 +571,20 @@ class NomadSecretBackend(pulumi.CustomResource):
571
571
  """
572
572
  ## Example Usage
573
573
 
574
- <!--Start PulumiCodeChooser -->
575
574
  ```python
576
575
  import pulumi
577
576
  import pulumi_vault as vault
578
577
 
579
578
  config = vault.NomadSecretBackend("config",
580
- address="https://127.0.0.1:4646",
581
579
  backend="nomad",
582
- default_lease_ttl_seconds=3600,
583
580
  description="test description",
581
+ default_lease_ttl_seconds=3600,
584
582
  max_lease_ttl_seconds=7200,
585
583
  max_ttl=240,
584
+ address="https://127.0.0.1:4646",
586
585
  token="ae20ceaa-...",
587
586
  ttl=120)
588
587
  ```
589
- <!--End PulumiCodeChooser -->
590
588
 
591
589
  ## Import
592
590
 
@@ -633,22 +631,20 @@ class NomadSecretBackend(pulumi.CustomResource):
633
631
  """
634
632
  ## Example Usage
635
633
 
636
- <!--Start PulumiCodeChooser -->
637
634
  ```python
638
635
  import pulumi
639
636
  import pulumi_vault as vault
640
637
 
641
638
  config = vault.NomadSecretBackend("config",
642
- address="https://127.0.0.1:4646",
643
639
  backend="nomad",
644
- default_lease_ttl_seconds=3600,
645
640
  description="test description",
641
+ default_lease_ttl_seconds=3600,
646
642
  max_lease_ttl_seconds=7200,
647
643
  max_ttl=240,
644
+ address="https://127.0.0.1:4646",
648
645
  token="ae20ceaa-...",
649
646
  ttl=120)
650
647
  ```
651
- <!--End PulumiCodeChooser -->
652
648
 
653
649
  ## Import
654
650
 
@@ -260,7 +260,6 @@ class NomadSecretRole(pulumi.CustomResource):
260
260
  """
261
261
  ## Example Usage
262
262
 
263
- <!--Start PulumiCodeChooser -->
264
263
  ```python
265
264
  import pulumi
266
265
  import pulumi_vault as vault
@@ -278,7 +277,6 @@ class NomadSecretRole(pulumi.CustomResource):
278
277
  type="client",
279
278
  policies=["readonly"])
280
279
  ```
281
- <!--End PulumiCodeChooser -->
282
280
 
283
281
  ## Import
284
282
 
@@ -313,7 +311,6 @@ class NomadSecretRole(pulumi.CustomResource):
313
311
  """
314
312
  ## Example Usage
315
313
 
316
- <!--Start PulumiCodeChooser -->
317
314
  ```python
318
315
  import pulumi
319
316
  import pulumi_vault as vault
@@ -331,7 +328,6 @@ class NomadSecretRole(pulumi.CustomResource):
331
328
  type="client",
332
329
  policies=["readonly"])
333
330
  ```
334
- <!--End PulumiCodeChooser -->
335
331
 
336
332
  ## Import
337
333
 
@@ -20,8 +20,8 @@ class AuthBackendGroupArgs:
20
20
  group_name: pulumi.Input[str],
21
21
  policies: pulumi.Input[Sequence[pulumi.Input[str]]]):
22
22
  """
23
- :param pulumi.Input[str] group_name: Name of the group within the Okta
24
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
23
+ :param pulumi.Input[str] group_name: Name of the Okta group
24
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this group
25
25
  """
26
26
  pulumi.set(__self__, "group_name", group_name)
27
27
  pulumi.set(__self__, "policies", policies)
@@ -30,7 +30,7 @@ class AuthBackendGroupArgs:
30
30
  @pulumi.getter(name="groupName")
31
31
  def group_name(self) -> pulumi.Input[str]:
32
32
  """
33
- Name of the group within the Okta
33
+ Name of the Okta group
34
34
  """
35
35
  return pulumi.get(self, "group_name")
36
36
 
@@ -42,7 +42,7 @@ class AuthBackendGroupArgs:
42
42
  @pulumi.getter
43
43
  def policies(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
44
44
  """
45
- Vault policies to associate with this group
45
+ Policies to associate with this group
46
46
  """
47
47
  return pulumi.get(self, "policies")
48
48
 
@@ -59,8 +59,8 @@ class AuthBackendUserArgs:
59
59
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
60
60
  """
61
61
  :param pulumi.Input[str] username: Name of the user within Okta
62
- :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
63
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
62
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Groups within the Okta auth backend to associate with this user
63
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this user
64
64
  """
65
65
  pulumi.set(__self__, "username", username)
66
66
  if groups is not None:
@@ -84,7 +84,7 @@ class AuthBackendUserArgs:
84
84
  @pulumi.getter
85
85
  def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
86
86
  """
87
- List of Okta groups to associate with this user
87
+ Groups within the Okta auth backend to associate with this user
88
88
  """
89
89
  return pulumi.get(self, "groups")
90
90
 
@@ -96,7 +96,7 @@ class AuthBackendUserArgs:
96
96
  @pulumi.getter
97
97
  def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
98
98
  """
99
- Vault policies to associate with this group
99
+ Policies to associate with this user
100
100
  """
101
101
  return pulumi.get(self, "policies")
102
102
 
@@ -488,13 +488,14 @@ class AuthBackend(pulumi.CustomResource):
488
488
 
489
489
  ## Example Usage
490
490
 
491
- <!--Start PulumiCodeChooser -->
492
491
  ```python
493
492
  import pulumi
494
493
  import pulumi_vault as vault
495
494
 
496
495
  example = vault.okta.AuthBackend("example",
497
496
  description="Demonstration of the Terraform Okta auth backend",
497
+ organization="example",
498
+ token="something that should be kept secret",
498
499
  groups=[vault.okta.AuthBackendGroupArgs(
499
500
  group_name="foo",
500
501
  policies=[
@@ -502,14 +503,11 @@ class AuthBackend(pulumi.CustomResource):
502
503
  "two",
503
504
  ],
504
505
  )],
505
- organization="example",
506
- token="something that should be kept secret",
507
506
  users=[vault.okta.AuthBackendUserArgs(
508
- groups=["foo"],
509
507
  username="bar",
508
+ groups=["foo"],
510
509
  )])
511
510
  ```
512
- <!--End PulumiCodeChooser -->
513
511
 
514
512
  ## Import
515
513
 
@@ -555,13 +553,14 @@ class AuthBackend(pulumi.CustomResource):
555
553
 
556
554
  ## Example Usage
557
555
 
558
- <!--Start PulumiCodeChooser -->
559
556
  ```python
560
557
  import pulumi
561
558
  import pulumi_vault as vault
562
559
 
563
560
  example = vault.okta.AuthBackend("example",
564
561
  description="Demonstration of the Terraform Okta auth backend",
562
+ organization="example",
563
+ token="something that should be kept secret",
565
564
  groups=[vault.okta.AuthBackendGroupArgs(
566
565
  group_name="foo",
567
566
  policies=[
@@ -569,14 +568,11 @@ class AuthBackend(pulumi.CustomResource):
569
568
  "two",
570
569
  ],
571
570
  )],
572
- organization="example",
573
- token="something that should be kept secret",
574
571
  users=[vault.okta.AuthBackendUserArgs(
575
- groups=["foo"],
576
572
  username="bar",
573
+ groups=["foo"],
577
574
  )])
578
575
  ```
579
- <!--End PulumiCodeChooser -->
580
576
 
581
577
  ## Import
582
578
 
@@ -181,7 +181,6 @@ class AuthBackendGroup(pulumi.CustomResource):
181
181
 
182
182
  ## Example Usage
183
183
 
184
- <!--Start PulumiCodeChooser -->
185
184
  ```python
186
185
  import pulumi
187
186
  import pulumi_vault as vault
@@ -197,7 +196,6 @@ class AuthBackendGroup(pulumi.CustomResource):
197
196
  "two",
198
197
  ])
199
198
  ```
200
- <!--End PulumiCodeChooser -->
201
199
 
202
200
  ## Import
203
201
 
@@ -229,7 +227,6 @@ class AuthBackendGroup(pulumi.CustomResource):
229
227
 
230
228
  ## Example Usage
231
229
 
232
- <!--Start PulumiCodeChooser -->
233
230
  ```python
234
231
  import pulumi
235
232
  import pulumi_vault as vault
@@ -245,7 +242,6 @@ class AuthBackendGroup(pulumi.CustomResource):
245
242
  "two",
246
243
  ])
247
244
  ```
248
- <!--End PulumiCodeChooser -->
249
245
 
250
246
  ## Import
251
247
 
@@ -214,7 +214,6 @@ class AuthBackendUser(pulumi.CustomResource):
214
214
 
215
215
  ## Example Usage
216
216
 
217
- <!--Start PulumiCodeChooser -->
218
217
  ```python
219
218
  import pulumi
220
219
  import pulumi_vault as vault
@@ -230,7 +229,6 @@ class AuthBackendUser(pulumi.CustomResource):
230
229
  "two",
231
230
  ])
232
231
  ```
233
- <!--End PulumiCodeChooser -->
234
232
 
235
233
  ## Import
236
234
 
@@ -263,7 +261,6 @@ class AuthBackendUser(pulumi.CustomResource):
263
261
 
264
262
  ## Example Usage
265
263
 
266
- <!--Start PulumiCodeChooser -->
267
264
  ```python
268
265
  import pulumi
269
266
  import pulumi_vault as vault
@@ -279,7 +276,6 @@ class AuthBackendUser(pulumi.CustomResource):
279
276
  "two",
280
277
  ])
281
278
  ```
282
- <!--End PulumiCodeChooser -->
283
279
 
284
280
  ## Import
285
281
 
@@ -37,8 +37,8 @@ class AuthBackendGroup(dict):
37
37
  group_name: str,
38
38
  policies: Sequence[str]):
39
39
  """
40
- :param str group_name: Name of the group within the Okta
41
- :param Sequence[str] policies: Vault policies to associate with this group
40
+ :param str group_name: Name of the Okta group
41
+ :param Sequence[str] policies: Policies to associate with this group
42
42
  """
43
43
  pulumi.set(__self__, "group_name", group_name)
44
44
  pulumi.set(__self__, "policies", policies)
@@ -47,7 +47,7 @@ class AuthBackendGroup(dict):
47
47
  @pulumi.getter(name="groupName")
48
48
  def group_name(self) -> str:
49
49
  """
50
- Name of the group within the Okta
50
+ Name of the Okta group
51
51
  """
52
52
  return pulumi.get(self, "group_name")
53
53
 
@@ -55,7 +55,7 @@ class AuthBackendGroup(dict):
55
55
  @pulumi.getter
56
56
  def policies(self) -> Sequence[str]:
57
57
  """
58
- Vault policies to associate with this group
58
+ Policies to associate with this group
59
59
  """
60
60
  return pulumi.get(self, "policies")
61
61
 
@@ -68,8 +68,8 @@ class AuthBackendUser(dict):
68
68
  policies: Optional[Sequence[str]] = None):
69
69
  """
70
70
  :param str username: Name of the user within Okta
71
- :param Sequence[str] groups: List of Okta groups to associate with this user
72
- :param Sequence[str] policies: Vault policies to associate with this group
71
+ :param Sequence[str] groups: Groups within the Okta auth backend to associate with this user
72
+ :param Sequence[str] policies: Policies to associate with this user
73
73
  """
74
74
  pulumi.set(__self__, "username", username)
75
75
  if groups is not None:
@@ -89,7 +89,7 @@ class AuthBackendUser(dict):
89
89
  @pulumi.getter
90
90
  def groups(self) -> Optional[Sequence[str]]:
91
91
  """
92
- List of Okta groups to associate with this user
92
+ Groups within the Okta auth backend to associate with this user
93
93
  """
94
94
  return pulumi.get(self, "groups")
95
95
 
@@ -97,7 +97,7 @@ class AuthBackendUser(dict):
97
97
  @pulumi.getter
98
98
  def policies(self) -> Optional[Sequence[str]]:
99
99
  """
100
- Vault policies to associate with this group
100
+ Policies to associate with this user
101
101
  """
102
102
  return pulumi.get(self, "policies")
103
103
 
pulumi_vault/outputs.py CHANGED
@@ -277,27 +277,17 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
277
277
  def __init__(__self__, *,
278
278
  key: str,
279
279
  values: Sequence[str]):
280
- """
281
- :param str key: name of permitted or denied parameter.
282
- :param Sequence[str] values: list of values what are permitted or denied by policy rule.
283
- """
284
280
  pulumi.set(__self__, "key", key)
285
281
  pulumi.set(__self__, "values", values)
286
282
 
287
283
  @property
288
284
  @pulumi.getter
289
285
  def key(self) -> str:
290
- """
291
- name of permitted or denied parameter.
292
- """
293
286
  return pulumi.get(self, "key")
294
287
 
295
288
  @property
296
289
  @pulumi.getter
297
290
  def values(self) -> Sequence[str]:
298
- """
299
- list of values what are permitted or denied by policy rule.
300
- """
301
291
  return pulumi.get(self, "values")
302
292
 
303
293
 
@@ -306,27 +296,17 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
306
296
  def __init__(__self__, *,
307
297
  key: str,
308
298
  values: Sequence[str]):
309
- """
310
- :param str key: name of permitted or denied parameter.
311
- :param Sequence[str] values: list of values what are permitted or denied by policy rule.
312
- """
313
299
  pulumi.set(__self__, "key", key)
314
300
  pulumi.set(__self__, "values", values)
315
301
 
316
302
  @property
317
303
  @pulumi.getter
318
304
  def key(self) -> str:
319
- """
320
- name of permitted or denied parameter.
321
- """
322
305
  return pulumi.get(self, "key")
323
306
 
324
307
  @property
325
308
  @pulumi.getter
326
309
  def values(self) -> Sequence[str]:
327
- """
328
- list of values what are permitted or denied by policy rule.
329
- """
330
310
  return pulumi.get(self, "values")
331
311
 
332
312