pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (179) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +0 -4
  3. pulumi_vault/ad/secret_library.py +0 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +63 -186
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +0 -8
  11. pulumi_vault/audit_request_header.py +0 -4
  12. pulumi_vault/aws/auth_backend_client.py +0 -4
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +0 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +0 -4
  20. pulumi_vault/azure/auth_backend_config.py +0 -4
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +0 -8
  23. pulumi_vault/azure/backend_role.py +0 -4
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +63 -200
  26. pulumi_vault/consul/secret_backend.py +0 -8
  27. pulumi_vault/consul/secret_backend_role.py +0 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +0 -4
  31. pulumi_vault/database/secret_backend_role.py +0 -4
  32. pulumi_vault/database/secret_backend_static_role.py +0 -4
  33. pulumi_vault/database/secrets_mount.py +0 -4
  34. pulumi_vault/egp_policy.py +0 -4
  35. pulumi_vault/gcp/auth_backend_role.py +63 -264
  36. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  37. pulumi_vault/gcp/secret_backend.py +0 -4
  38. pulumi_vault/gcp/secret_impersonated_account.py +0 -4
  39. pulumi_vault/gcp/secret_roleset.py +0 -4
  40. pulumi_vault/gcp/secret_static_account.py +0 -4
  41. pulumi_vault/generic/endpoint.py +0 -4
  42. pulumi_vault/generic/get_secret.py +0 -8
  43. pulumi_vault/get_auth_backend.py +0 -4
  44. pulumi_vault/get_auth_backends.py +0 -8
  45. pulumi_vault/get_namespace.py +0 -12
  46. pulumi_vault/get_namespaces.py +0 -8
  47. pulumi_vault/get_nomad_access_token.py +0 -4
  48. pulumi_vault/get_policy_document.py +0 -4
  49. pulumi_vault/get_raft_autopilot_state.py +0 -4
  50. pulumi_vault/github/auth_backend.py +0 -4
  51. pulumi_vault/github/team.py +0 -4
  52. pulumi_vault/github/user.py +0 -4
  53. pulumi_vault/identity/entity.py +0 -4
  54. pulumi_vault/identity/entity_alias.py +0 -4
  55. pulumi_vault/identity/entity_policies.py +0 -8
  56. pulumi_vault/identity/get_entity.py +0 -4
  57. pulumi_vault/identity/get_group.py +0 -4
  58. pulumi_vault/identity/get_oidc_client_creds.py +0 -4
  59. pulumi_vault/identity/get_oidc_openid_config.py +0 -4
  60. pulumi_vault/identity/get_oidc_public_keys.py +0 -4
  61. pulumi_vault/identity/group.py +0 -12
  62. pulumi_vault/identity/group_alias.py +0 -4
  63. pulumi_vault/identity/group_member_entity_ids.py +0 -8
  64. pulumi_vault/identity/group_member_group_ids.py +0 -8
  65. pulumi_vault/identity/group_policies.py +0 -8
  66. pulumi_vault/identity/mfa_duo.py +0 -4
  67. pulumi_vault/identity/mfa_login_enforcement.py +0 -4
  68. pulumi_vault/identity/mfa_okta.py +0 -4
  69. pulumi_vault/identity/mfa_pingid.py +0 -4
  70. pulumi_vault/identity/mfa_totp.py +0 -4
  71. pulumi_vault/identity/oidc.py +0 -4
  72. pulumi_vault/identity/oidc_assignment.py +0 -4
  73. pulumi_vault/identity/oidc_client.py +0 -4
  74. pulumi_vault/identity/oidc_key.py +0 -4
  75. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
  76. pulumi_vault/identity/oidc_provider.py +0 -4
  77. pulumi_vault/identity/oidc_role.py +0 -8
  78. pulumi_vault/identity/oidc_scope.py +0 -4
  79. pulumi_vault/jwt/auth_backend.py +0 -12
  80. pulumi_vault/jwt/auth_backend_role.py +63 -190
  81. pulumi_vault/kmip/secret_backend.py +0 -4
  82. pulumi_vault/kmip/secret_role.py +0 -4
  83. pulumi_vault/kmip/secret_scope.py +0 -4
  84. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  86. pulumi_vault/kubernetes/get_service_account_token.py +0 -4
  87. pulumi_vault/kubernetes/secret_backend.py +0 -4
  88. pulumi_vault/kubernetes/secret_backend_role.py +0 -12
  89. pulumi_vault/kv/get_secret.py +0 -4
  90. pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
  91. pulumi_vault/kv/get_secret_v2.py +0 -4
  92. pulumi_vault/kv/get_secrets_list.py +0 -4
  93. pulumi_vault/kv/get_secrets_list_v2.py +0 -4
  94. pulumi_vault/kv/secret.py +0 -4
  95. pulumi_vault/kv/secret_backend_v2.py +0 -4
  96. pulumi_vault/kv/secret_v2.py +0 -4
  97. pulumi_vault/ldap/auth_backend.py +56 -151
  98. pulumi_vault/ldap/auth_backend_group.py +0 -4
  99. pulumi_vault/ldap/auth_backend_user.py +0 -4
  100. pulumi_vault/ldap/secret_backend.py +0 -4
  101. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  102. pulumi_vault/ldap/secret_backend_library_set.py +0 -4
  103. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  104. pulumi_vault/managed/_inputs.py +84 -132
  105. pulumi_vault/managed/keys.py +7 -28
  106. pulumi_vault/managed/outputs.py +84 -132
  107. pulumi_vault/mfa_duo.py +0 -4
  108. pulumi_vault/mfa_okta.py +0 -4
  109. pulumi_vault/mfa_pingid.py +0 -4
  110. pulumi_vault/mfa_totp.py +0 -4
  111. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  112. pulumi_vault/mongodbatlas/secret_role.py +0 -4
  113. pulumi_vault/mount.py +0 -16
  114. pulumi_vault/nomad_secret_backend.py +0 -4
  115. pulumi_vault/nomad_secret_role.py +0 -4
  116. pulumi_vault/okta/_inputs.py +8 -8
  117. pulumi_vault/okta/auth_backend.py +0 -4
  118. pulumi_vault/okta/auth_backend_group.py +0 -4
  119. pulumi_vault/okta/auth_backend_user.py +0 -4
  120. pulumi_vault/okta/outputs.py +8 -8
  121. pulumi_vault/outputs.py +0 -20
  122. pulumi_vault/password_policy.py +0 -4
  123. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  124. pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  126. pulumi_vault/pkisecret/get_backend_key.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  128. pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
  130. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  136. pulumi_vault/pkisecret/secret_backend_role.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
  138. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
  140. pulumi_vault/quota_lease_count.py +0 -4
  141. pulumi_vault/quota_rate_limit.py +0 -4
  142. pulumi_vault/rabbitmq/secret_backend.py +0 -4
  143. pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
  144. pulumi_vault/raft_autopilot.py +0 -4
  145. pulumi_vault/raft_snapshot_agent_config.py +91 -292
  146. pulumi_vault/rgp_policy.py +0 -4
  147. pulumi_vault/saml/auth_backend.py +0 -4
  148. pulumi_vault/saml/auth_backend_role.py +56 -172
  149. pulumi_vault/secrets/sync_association.py +0 -4
  150. pulumi_vault/secrets/sync_aws_destination.py +0 -4
  151. pulumi_vault/secrets/sync_azure_destination.py +0 -4
  152. pulumi_vault/secrets/sync_config.py +0 -4
  153. pulumi_vault/secrets/sync_gcp_destination.py +0 -4
  154. pulumi_vault/secrets/sync_gh_destination.py +0 -4
  155. pulumi_vault/secrets/sync_github_apps.py +0 -4
  156. pulumi_vault/secrets/sync_vercel_destination.py +0 -4
  157. pulumi_vault/ssh/_inputs.py +6 -20
  158. pulumi_vault/ssh/outputs.py +6 -20
  159. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  160. pulumi_vault/ssh/secret_backend_role.py +0 -4
  161. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  162. pulumi_vault/terraformcloud/secret_creds.py +0 -4
  163. pulumi_vault/terraformcloud/secret_role.py +0 -4
  164. pulumi_vault/token.py +0 -4
  165. pulumi_vault/tokenauth/auth_backend_role.py +56 -172
  166. pulumi_vault/transform/alphabet.py +0 -4
  167. pulumi_vault/transform/get_decode.py +0 -4
  168. pulumi_vault/transform/get_encode.py +0 -4
  169. pulumi_vault/transform/role.py +0 -4
  170. pulumi_vault/transform/template.py +0 -4
  171. pulumi_vault/transit/get_decrypt.py +0 -16
  172. pulumi_vault/transit/get_encrypt.py +0 -14
  173. pulumi_vault/transit/secret_backend_key.py +0 -4
  174. pulumi_vault/transit/secret_cache_config.py +0 -4
  175. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
  176. pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
  177. pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
  178. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
  179. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -133,14 +133,12 @@ class Oidc(pulumi.CustomResource):
133
133
 
134
134
  ## Example Usage
135
135
 
136
- <!--Start PulumiCodeChooser -->
137
136
  ```python
138
137
  import pulumi
139
138
  import pulumi_vault as vault
140
139
 
141
140
  server = vault.identity.Oidc("server", issuer="https://www.acme.com")
142
141
  ```
143
- <!--End PulumiCodeChooser -->
144
142
 
145
143
  :param str resource_name: The name of the resource.
146
144
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -169,14 +167,12 @@ class Oidc(pulumi.CustomResource):
169
167
 
170
168
  ## Example Usage
171
169
 
172
- <!--Start PulumiCodeChooser -->
173
170
  ```python
174
171
  import pulumi
175
172
  import pulumi_vault as vault
176
173
 
177
174
  server = vault.identity.Oidc("server", issuer="https://www.acme.com")
178
175
  ```
179
- <!--End PulumiCodeChooser -->
180
176
 
181
177
  :param str resource_name: The name of the resource.
182
178
  :param OidcArgs args: The arguments to use to populate this resource's properties.
@@ -183,7 +183,6 @@ class OidcAssignment(pulumi.CustomResource):
183
183
 
184
184
  ## Example Usage
185
185
 
186
- <!--Start PulumiCodeChooser -->
187
186
  ```python
188
187
  import pulumi
189
188
  import pulumi_vault as vault
@@ -203,7 +202,6 @@ class OidcAssignment(pulumi.CustomResource):
203
202
  entity_ids=[test.id],
204
203
  group_ids=[internal.id])
205
204
  ```
206
- <!--End PulumiCodeChooser -->
207
205
 
208
206
  ## Import
209
207
 
@@ -235,7 +233,6 @@ class OidcAssignment(pulumi.CustomResource):
235
233
 
236
234
  ## Example Usage
237
235
 
238
- <!--Start PulumiCodeChooser -->
239
236
  ```python
240
237
  import pulumi
241
238
  import pulumi_vault as vault
@@ -255,7 +252,6 @@ class OidcAssignment(pulumi.CustomResource):
255
252
  entity_ids=[test.id],
256
253
  group_ids=[internal.id])
257
254
  ```
258
- <!--End PulumiCodeChooser -->
259
255
 
260
256
  ## Import
261
257
 
@@ -373,7 +373,6 @@ class OidcClient(pulumi.CustomResource):
373
373
 
374
374
  ## Example Usage
375
375
 
376
- <!--Start PulumiCodeChooser -->
377
376
  ```python
378
377
  import pulumi
379
378
  import pulumi_vault as vault
@@ -393,7 +392,6 @@ class OidcClient(pulumi.CustomResource):
393
392
  id_token_ttl=2400,
394
393
  access_token_ttl=7200)
395
394
  ```
396
- <!--End PulumiCodeChooser -->
397
395
 
398
396
  ## Import
399
397
 
@@ -435,7 +433,6 @@ class OidcClient(pulumi.CustomResource):
435
433
 
436
434
  ## Example Usage
437
435
 
438
- <!--Start PulumiCodeChooser -->
439
436
  ```python
440
437
  import pulumi
441
438
  import pulumi_vault as vault
@@ -455,7 +452,6 @@ class OidcClient(pulumi.CustomResource):
455
452
  id_token_ttl=2400,
456
453
  access_token_ttl=7200)
457
454
  ```
458
- <!--End PulumiCodeChooser -->
459
455
 
460
456
  ## Import
461
457
 
@@ -258,7 +258,6 @@ class OidcKey(pulumi.CustomResource):
258
258
  """
259
259
  ## Example Usage
260
260
 
261
- <!--Start PulumiCodeChooser -->
262
261
  ```python
263
262
  import pulumi
264
263
  import pulumi_vault as vault
@@ -273,7 +272,6 @@ class OidcKey(pulumi.CustomResource):
273
272
  key_name=key.name,
274
273
  allowed_client_id=role.client_id)
275
274
  ```
276
- <!--End PulumiCodeChooser -->
277
275
 
278
276
  ## Import
279
277
 
@@ -307,7 +305,6 @@ class OidcKey(pulumi.CustomResource):
307
305
  """
308
306
  ## Example Usage
309
307
 
310
- <!--Start PulumiCodeChooser -->
311
308
  ```python
312
309
  import pulumi
313
310
  import pulumi_vault as vault
@@ -322,7 +319,6 @@ class OidcKey(pulumi.CustomResource):
322
319
  key_name=key.name,
323
320
  allowed_client_id=role.client_id)
324
321
  ```
325
- <!--End PulumiCodeChooser -->
326
322
 
327
323
  ## Import
328
324
 
@@ -145,7 +145,6 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
145
145
  """
146
146
  ## Example Usage
147
147
 
148
- <!--Start PulumiCodeChooser -->
149
148
  ```python
150
149
  import pulumi
151
150
  import pulumi_vault as vault
@@ -160,7 +159,6 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
160
159
  key_name=key.name,
161
160
  allowed_client_id=role.client_id)
162
161
  ```
163
- <!--End PulumiCodeChooser -->
164
162
 
165
163
  :param str resource_name: The name of the resource.
166
164
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -180,7 +178,6 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
180
178
  """
181
179
  ## Example Usage
182
180
 
183
- <!--Start PulumiCodeChooser -->
184
181
  ```python
185
182
  import pulumi
186
183
  import pulumi_vault as vault
@@ -195,7 +192,6 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
195
192
  key_name=key.name,
196
193
  allowed_client_id=role.client_id)
197
194
  ```
198
- <!--End PulumiCodeChooser -->
199
195
 
200
196
  :param str resource_name: The name of the resource.
201
197
  :param OidcKeyAllowedClientIDArgs args: The arguments to use to populate this resource's properties.
@@ -273,7 +273,6 @@ class OidcProvider(pulumi.CustomResource):
273
273
 
274
274
  ## Example Usage
275
275
 
276
- <!--Start PulumiCodeChooser -->
277
276
  ```python
278
277
  import pulumi
279
278
  import json
@@ -312,7 +311,6 @@ class OidcProvider(pulumi.CustomResource):
312
311
  allowed_client_ids=[test_oidc_client.client_id],
313
312
  scopes_supporteds=[test_oidc_scope.name])
314
313
  ```
315
- <!--End PulumiCodeChooser -->
316
314
 
317
315
  ## Import
318
316
 
@@ -347,7 +345,6 @@ class OidcProvider(pulumi.CustomResource):
347
345
 
348
346
  ## Example Usage
349
347
 
350
- <!--Start PulumiCodeChooser -->
351
348
  ```python
352
349
  import pulumi
353
350
  import json
@@ -386,7 +383,6 @@ class OidcProvider(pulumi.CustomResource):
386
383
  allowed_client_ids=[test_oidc_client.client_id],
387
384
  scopes_supporteds=[test_oidc_scope.name])
388
385
  ```
389
- <!--End PulumiCodeChooser -->
390
386
 
391
387
  ## Import
392
388
 
@@ -270,7 +270,6 @@ class OidcRole(pulumi.CustomResource):
270
270
  exist before the role can be used to issue tokens. You must also configure the key with the
271
271
  role's Client ID to allow the role to use the key.
272
272
 
273
- <!--Start PulumiCodeChooser -->
274
273
  ```python
275
274
  import pulumi
276
275
  import pulumi_vault as vault
@@ -288,13 +287,11 @@ class OidcRole(pulumi.CustomResource):
288
287
  algorithm="RS256",
289
288
  allowed_client_ids=[role.client_id])
290
289
  ```
291
- <!--End PulumiCodeChooser -->
292
290
 
293
291
  If you want to create the key first before creating the role, you can use a separate
294
292
  resource to configure the allowed Client ID on
295
293
  the key.
296
294
 
297
- <!--Start PulumiCodeChooser -->
298
295
  ```python
299
296
  import pulumi
300
297
  import pulumi_vault as vault
@@ -309,7 +306,6 @@ class OidcRole(pulumi.CustomResource):
309
306
  key_name=key.name,
310
307
  allowed_client_id=role.client_id)
311
308
  ```
312
- <!--End PulumiCodeChooser -->
313
309
 
314
310
  ## Import
315
311
 
@@ -350,7 +346,6 @@ class OidcRole(pulumi.CustomResource):
350
346
  exist before the role can be used to issue tokens. You must also configure the key with the
351
347
  role's Client ID to allow the role to use the key.
352
348
 
353
- <!--Start PulumiCodeChooser -->
354
349
  ```python
355
350
  import pulumi
356
351
  import pulumi_vault as vault
@@ -368,13 +363,11 @@ class OidcRole(pulumi.CustomResource):
368
363
  algorithm="RS256",
369
364
  allowed_client_ids=[role.client_id])
370
365
  ```
371
- <!--End PulumiCodeChooser -->
372
366
 
373
367
  If you want to create the key first before creating the role, you can use a separate
374
368
  resource to configure the allowed Client ID on
375
369
  the key.
376
370
 
377
- <!--Start PulumiCodeChooser -->
378
371
  ```python
379
372
  import pulumi
380
373
  import pulumi_vault as vault
@@ -389,7 +382,6 @@ class OidcRole(pulumi.CustomResource):
389
382
  key_name=key.name,
390
383
  allowed_client_id=role.client_id)
391
384
  ```
392
- <!--End PulumiCodeChooser -->
393
385
 
394
386
  ## Import
395
387
 
@@ -183,7 +183,6 @@ class OidcScope(pulumi.CustomResource):
183
183
 
184
184
  ## Example Usage
185
185
 
186
- <!--Start PulumiCodeChooser -->
187
186
  ```python
188
187
  import pulumi
189
188
  import pulumi_vault as vault
@@ -193,7 +192,6 @@ class OidcScope(pulumi.CustomResource):
193
192
  template="{\\"groups\\":{{identity.entity.groups.names}}}",
194
193
  description="Vault OIDC Groups Scope")
195
194
  ```
196
- <!--End PulumiCodeChooser -->
197
195
 
198
196
  ## Import
199
197
 
@@ -225,7 +223,6 @@ class OidcScope(pulumi.CustomResource):
225
223
 
226
224
  ## Example Usage
227
225
 
228
- <!--Start PulumiCodeChooser -->
229
226
  ```python
230
227
  import pulumi
231
228
  import pulumi_vault as vault
@@ -235,7 +232,6 @@ class OidcScope(pulumi.CustomResource):
235
232
  template="{\\"groups\\":{{identity.entity.groups.names}}}",
236
233
  description="Vault OIDC Groups Scope")
237
234
  ```
238
- <!--End PulumiCodeChooser -->
239
235
 
240
236
  ## Import
241
237
 
@@ -776,7 +776,6 @@ class AuthBackend(pulumi.CustomResource):
776
776
 
777
777
  Manage JWT auth backend:
778
778
 
779
- <!--Start PulumiCodeChooser -->
780
779
  ```python
781
780
  import pulumi
782
781
  import pulumi_vault as vault
@@ -787,11 +786,9 @@ class AuthBackend(pulumi.CustomResource):
787
786
  oidc_discovery_url="https://myco.auth0.com/",
788
787
  bound_issuer="https://myco.auth0.com/")
789
788
  ```
790
- <!--End PulumiCodeChooser -->
791
789
 
792
790
  Manage OIDC auth backend:
793
791
 
794
- <!--Start PulumiCodeChooser -->
795
792
  ```python
796
793
  import pulumi
797
794
  import pulumi_vault as vault
@@ -808,11 +805,9 @@ class AuthBackend(pulumi.CustomResource):
808
805
  listing_visibility="unauth",
809
806
  ))
810
807
  ```
811
- <!--End PulumiCodeChooser -->
812
808
 
813
809
  Configuring the auth backend with a `provider_config:
814
810
 
815
- <!--Start PulumiCodeChooser -->
816
811
  ```python
817
812
  import pulumi
818
813
  import pulumi_vault as vault
@@ -829,7 +824,6 @@ class AuthBackend(pulumi.CustomResource):
829
824
  "groups_recurse_max_depth": "1",
830
825
  })
831
826
  ```
832
- <!--End PulumiCodeChooser -->
833
827
 
834
828
  ## Import
835
829
 
@@ -889,7 +883,6 @@ class AuthBackend(pulumi.CustomResource):
889
883
 
890
884
  Manage JWT auth backend:
891
885
 
892
- <!--Start PulumiCodeChooser -->
893
886
  ```python
894
887
  import pulumi
895
888
  import pulumi_vault as vault
@@ -900,11 +893,9 @@ class AuthBackend(pulumi.CustomResource):
900
893
  oidc_discovery_url="https://myco.auth0.com/",
901
894
  bound_issuer="https://myco.auth0.com/")
902
895
  ```
903
- <!--End PulumiCodeChooser -->
904
896
 
905
897
  Manage OIDC auth backend:
906
898
 
907
- <!--Start PulumiCodeChooser -->
908
899
  ```python
909
900
  import pulumi
910
901
  import pulumi_vault as vault
@@ -921,11 +912,9 @@ class AuthBackend(pulumi.CustomResource):
921
912
  listing_visibility="unauth",
922
913
  ))
923
914
  ```
924
- <!--End PulumiCodeChooser -->
925
915
 
926
916
  Configuring the auth backend with a `provider_config:
927
917
 
928
- <!--Start PulumiCodeChooser -->
929
918
  ```python
930
919
  import pulumi
931
920
  import pulumi_vault as vault
@@ -942,7 +931,6 @@ class AuthBackend(pulumi.CustomResource):
942
931
  "groups_recurse_max_depth": "1",
943
932
  })
944
933
  ```
945
- <!--End PulumiCodeChooser -->
946
934
 
947
935
  ## Import
948
936