pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/mfa_okta.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaOktaArgs', 'MfaOkta']
@@ -33,7 +38,7 @@ class MfaOktaArgs:
33
38
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
34
39
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
35
40
  The value should not contain leading or trailing forward slashes.
36
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
41
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
37
42
  *Available only for Vault Enterprise*.
38
43
  :param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
39
44
  primary email for the account.
@@ -127,7 +132,7 @@ class MfaOktaArgs:
127
132
  """
128
133
  The namespace to provision the resource in.
129
134
  The value should not contain leading or trailing forward slashes.
130
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
135
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
131
136
  *Available only for Vault Enterprise*.
132
137
  """
133
138
  return pulumi.get(self, "namespace")
@@ -189,7 +194,7 @@ class _MfaOktaState:
189
194
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
190
195
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
191
196
  The value should not contain leading or trailing forward slashes.
192
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
197
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
193
198
  *Available only for Vault Enterprise*.
194
199
  :param pulumi.Input[str] org_name: `(string: <required>)` - Name of the organization to be used in the Okta API.
195
200
  :param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
@@ -275,7 +280,7 @@ class _MfaOktaState:
275
280
  """
276
281
  The namespace to provision the resource in.
277
282
  The value should not contain leading or trailing forward slashes.
278
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
283
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
279
284
  *Available only for Vault Enterprise*.
280
285
  """
281
286
  return pulumi.get(self, "namespace")
@@ -356,7 +361,8 @@ class MfaOkta(pulumi.CustomResource):
356
361
  userpass = vault.AuthBackend("userpass",
357
362
  type="userpass",
358
363
  path="userpass")
359
- my_okta = vault.MfaOkta("myOkta",
364
+ my_okta = vault.MfaOkta("my_okta",
365
+ name="my_okta",
360
366
  mount_accessor=userpass.accessor,
361
367
  username_format="user@example.com",
362
368
  org_name="hashicorp",
@@ -368,7 +374,7 @@ class MfaOkta(pulumi.CustomResource):
368
374
  Mounts can be imported using the `path`, e.g.
369
375
 
370
376
  ```sh
371
- $ pulumi import vault:index/mfaOkta:MfaOkta my_okta my_okta
377
+ $ pulumi import vault:index/mfaOkta:MfaOkta my_okta my_okta
372
378
  ```
373
379
 
374
380
  :param str resource_name: The name of the resource.
@@ -381,7 +387,7 @@ class MfaOkta(pulumi.CustomResource):
381
387
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
382
388
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
383
389
  The value should not contain leading or trailing forward slashes.
384
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
390
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
385
391
  *Available only for Vault Enterprise*.
386
392
  :param pulumi.Input[str] org_name: `(string: <required>)` - Name of the organization to be used in the Okta API.
387
393
  :param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
@@ -414,7 +420,8 @@ class MfaOkta(pulumi.CustomResource):
414
420
  userpass = vault.AuthBackend("userpass",
415
421
  type="userpass",
416
422
  path="userpass")
417
- my_okta = vault.MfaOkta("myOkta",
423
+ my_okta = vault.MfaOkta("my_okta",
424
+ name="my_okta",
418
425
  mount_accessor=userpass.accessor,
419
426
  username_format="user@example.com",
420
427
  org_name="hashicorp",
@@ -426,7 +433,7 @@ class MfaOkta(pulumi.CustomResource):
426
433
  Mounts can be imported using the `path`, e.g.
427
434
 
428
435
  ```sh
429
- $ pulumi import vault:index/mfaOkta:MfaOkta my_okta my_okta
436
+ $ pulumi import vault:index/mfaOkta:MfaOkta my_okta my_okta
430
437
  ```
431
438
 
432
439
  :param str resource_name: The name of the resource.
@@ -510,7 +517,7 @@ class MfaOkta(pulumi.CustomResource):
510
517
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
511
518
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
512
519
  The value should not contain leading or trailing forward slashes.
513
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
520
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
514
521
  *Available only for Vault Enterprise*.
515
522
  :param pulumi.Input[str] org_name: `(string: <required>)` - Name of the organization to be used in the Okta API.
516
523
  :param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
@@ -577,7 +584,7 @@ class MfaOkta(pulumi.CustomResource):
577
584
  """
578
585
  The namespace to provision the resource in.
579
586
  The value should not contain leading or trailing forward slashes.
580
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
587
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
581
588
  *Available only for Vault Enterprise*.
582
589
  """
583
590
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaPingidArgs', 'MfaPingid']
@@ -28,7 +33,7 @@ class MfaPingidArgs:
28
33
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
29
34
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
30
35
  The value should not contain leading or trailing forward slashes.
31
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
36
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
32
37
  *Available only for Vault Enterprise*.
33
38
  :param pulumi.Input[str] username_format: `(string)` - A format string for mapping Identity names to MFA method names.
34
39
  Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
@@ -91,7 +96,7 @@ class MfaPingidArgs:
91
96
  """
92
97
  The namespace to provision the resource in.
93
98
  The value should not contain leading or trailing forward slashes.
94
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
99
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
95
100
  *Available only for Vault Enterprise*.
96
101
  """
97
102
  return pulumi.get(self, "namespace")
@@ -144,7 +149,7 @@ class _MfaPingidState:
144
149
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
145
150
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
146
151
  The value should not contain leading or trailing forward slashes.
147
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
152
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
148
153
  *Available only for Vault Enterprise*.
149
154
  :param pulumi.Input[str] namespace_id: `(string)` – Namespace ID computed by Vault
150
155
  :param pulumi.Input[str] org_alias: `(string)` – Org Alias computed by Vault
@@ -252,7 +257,7 @@ class _MfaPingidState:
252
257
  """
253
258
  The namespace to provision the resource in.
254
259
  The value should not contain leading or trailing forward slashes.
255
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
260
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
256
261
  *Available only for Vault Enterprise*.
257
262
  """
258
263
  return pulumi.get(self, "namespace")
@@ -368,7 +373,8 @@ class MfaPingid(pulumi.CustomResource):
368
373
  userpass = vault.AuthBackend("userpass",
369
374
  type="userpass",
370
375
  path="userpass")
371
- my_pingid = vault.MfaPingid("myPingid",
376
+ my_pingid = vault.MfaPingid("my_pingid",
377
+ name="my_pingid",
372
378
  mount_accessor=userpass.accessor,
373
379
  username_format="user@example.com",
374
380
  settings_file_base64=settings_file)
@@ -379,7 +385,7 @@ class MfaPingid(pulumi.CustomResource):
379
385
  Mounts can be imported using the `path`, e.g.
380
386
 
381
387
  ```sh
382
- $ pulumi import vault:index/mfaPingid:MfaPingid my_pingid my_pingid
388
+ $ pulumi import vault:index/mfaPingid:MfaPingid my_pingid my_pingid
383
389
  ```
384
390
 
385
391
  :param str resource_name: The name of the resource.
@@ -389,7 +395,7 @@ class MfaPingid(pulumi.CustomResource):
389
395
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
390
396
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
391
397
  The value should not contain leading or trailing forward slashes.
392
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
398
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
393
399
  *Available only for Vault Enterprise*.
394
400
  :param pulumi.Input[str] settings_file_base64: `(string: <required>)` - A base64-encoded third-party settings file retrieved
395
401
  from PingID's configuration page.
@@ -423,7 +429,8 @@ class MfaPingid(pulumi.CustomResource):
423
429
  userpass = vault.AuthBackend("userpass",
424
430
  type="userpass",
425
431
  path="userpass")
426
- my_pingid = vault.MfaPingid("myPingid",
432
+ my_pingid = vault.MfaPingid("my_pingid",
433
+ name="my_pingid",
427
434
  mount_accessor=userpass.accessor,
428
435
  username_format="user@example.com",
429
436
  settings_file_base64=settings_file)
@@ -434,7 +441,7 @@ class MfaPingid(pulumi.CustomResource):
434
441
  Mounts can be imported using the `path`, e.g.
435
442
 
436
443
  ```sh
437
- $ pulumi import vault:index/mfaPingid:MfaPingid my_pingid my_pingid
444
+ $ pulumi import vault:index/mfaPingid:MfaPingid my_pingid my_pingid
438
445
  ```
439
446
 
440
447
  :param str resource_name: The name of the resource.
@@ -519,7 +526,7 @@ class MfaPingid(pulumi.CustomResource):
519
526
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
520
527
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
521
528
  The value should not contain leading or trailing forward slashes.
522
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
529
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
523
530
  *Available only for Vault Enterprise*.
524
531
  :param pulumi.Input[str] namespace_id: `(string)` – Namespace ID computed by Vault
525
532
  :param pulumi.Input[str] org_alias: `(string)` – Org Alias computed by Vault
@@ -600,7 +607,7 @@ class MfaPingid(pulumi.CustomResource):
600
607
  """
601
608
  The namespace to provision the resource in.
602
609
  The value should not contain leading or trailing forward slashes.
603
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
610
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
604
611
  *Available only for Vault Enterprise*.
605
612
  """
606
613
  return pulumi.get(self, "namespace")
pulumi_vault/mfa_totp.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaTotpArgs', 'MfaTotp']
@@ -34,7 +39,7 @@ class MfaTotpArgs:
34
39
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
35
40
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
36
41
  The value should not contain leading or trailing forward slashes.
37
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
42
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
43
  *Available only for Vault Enterprise*.
39
44
  :param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
40
45
  :param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
@@ -127,7 +132,7 @@ class MfaTotpArgs:
127
132
  """
128
133
  The namespace to provision the resource in.
129
134
  The value should not contain leading or trailing forward slashes.
130
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
135
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
131
136
  *Available only for Vault Enterprise*.
132
137
  """
133
138
  return pulumi.get(self, "namespace")
@@ -197,7 +202,7 @@ class _MfaTotpState:
197
202
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
198
203
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
199
204
  The value should not contain leading or trailing forward slashes.
200
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
205
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
201
206
  *Available only for Vault Enterprise*.
202
207
  :param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
203
208
  :param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
@@ -291,7 +296,7 @@ class _MfaTotpState:
291
296
  """
292
297
  The namespace to provision the resource in.
293
298
  The value should not contain leading or trailing forward slashes.
294
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
299
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
295
300
  *Available only for Vault Enterprise*.
296
301
  """
297
302
  return pulumi.get(self, "namespace")
@@ -364,12 +369,13 @@ class MfaTotp(pulumi.CustomResource):
364
369
  import pulumi
365
370
  import pulumi_vault as vault
366
371
 
367
- my_totp = vault.MfaTotp("myTotp",
372
+ my_totp = vault.MfaTotp("my_totp",
373
+ name="my_totp",
374
+ issuer="hashicorp",
375
+ period=60,
368
376
  algorithm="SHA256",
369
377
  digits=8,
370
- issuer="hashicorp",
371
- key_size=20,
372
- period=60)
378
+ key_size=20)
373
379
  ```
374
380
 
375
381
  ## Import
@@ -377,7 +383,7 @@ class MfaTotp(pulumi.CustomResource):
377
383
  Mounts can be imported using the `path`, e.g.
378
384
 
379
385
  ```sh
380
- $ pulumi import vault:index/mfaTotp:MfaTotp my_totp my_totp
386
+ $ pulumi import vault:index/mfaTotp:MfaTotp my_totp my_totp
381
387
  ```
382
388
 
383
389
  :param str resource_name: The name of the resource.
@@ -391,7 +397,7 @@ class MfaTotp(pulumi.CustomResource):
391
397
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
392
398
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
393
399
  The value should not contain leading or trailing forward slashes.
394
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
400
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
395
401
  *Available only for Vault Enterprise*.
396
402
  :param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
397
403
  :param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
@@ -415,12 +421,13 @@ class MfaTotp(pulumi.CustomResource):
415
421
  import pulumi
416
422
  import pulumi_vault as vault
417
423
 
418
- my_totp = vault.MfaTotp("myTotp",
424
+ my_totp = vault.MfaTotp("my_totp",
425
+ name="my_totp",
426
+ issuer="hashicorp",
427
+ period=60,
419
428
  algorithm="SHA256",
420
429
  digits=8,
421
- issuer="hashicorp",
422
- key_size=20,
423
- period=60)
430
+ key_size=20)
424
431
  ```
425
432
 
426
433
  ## Import
@@ -428,7 +435,7 @@ class MfaTotp(pulumi.CustomResource):
428
435
  Mounts can be imported using the `path`, e.g.
429
436
 
430
437
  ```sh
431
- $ pulumi import vault:index/mfaTotp:MfaTotp my_totp my_totp
438
+ $ pulumi import vault:index/mfaTotp:MfaTotp my_totp my_totp
432
439
  ```
433
440
 
434
441
  :param str resource_name: The name of the resource.
@@ -510,7 +517,7 @@ class MfaTotp(pulumi.CustomResource):
510
517
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
511
518
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
512
519
  The value should not contain leading or trailing forward slashes.
513
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
520
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
514
521
  *Available only for Vault Enterprise*.
515
522
  :param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
516
523
  :param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
@@ -580,7 +587,7 @@ class MfaTotp(pulumi.CustomResource):
580
587
  """
581
588
  The namespace to provision the resource in.
582
589
  The value should not contain leading or trailing forward slashes.
583
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
590
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
584
591
  *Available only for Vault Enterprise*.
585
592
  """
586
593
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -25,7 +30,7 @@ class SecretBackendArgs:
25
30
  :param pulumi.Input[str] public_key: Specifies the Public API Key used to authenticate with the MongoDB Atlas API.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  """
31
36
  pulumi.set(__self__, "mount", mount)
@@ -76,7 +81,7 @@ class SecretBackendArgs:
76
81
  """
77
82
  The namespace to provision the resource in.
78
83
  The value should not contain leading or trailing forward slashes.
79
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
84
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
80
85
  *Available only for Vault Enterprise*.
81
86
  """
82
87
  return pulumi.get(self, "namespace")
@@ -99,7 +104,7 @@ class _SecretBackendState:
99
104
  :param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
100
105
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
101
106
  The value should not contain leading or trailing forward slashes.
102
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
107
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
103
108
  *Available only for Vault Enterprise*.
104
109
  :param pulumi.Input[str] path: Path where MongoDB Atlas configuration is located
105
110
  :param pulumi.Input[str] private_key: Specifies the Private API Key used to authenticate with the MongoDB Atlas API.
@@ -134,7 +139,7 @@ class _SecretBackendState:
134
139
  """
135
140
  The namespace to provision the resource in.
136
141
  The value should not contain leading or trailing forward slashes.
137
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
142
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
138
143
  *Available only for Vault Enterprise*.
139
144
  """
140
145
  return pulumi.get(self, "namespace")
@@ -198,11 +203,11 @@ class SecretBackend(pulumi.CustomResource):
198
203
  import pulumi_vault as vault
199
204
 
200
205
  mongo = vault.Mount("mongo",
201
- description="MongoDB Atlas secret engine mount",
202
206
  path="mongodbatlas",
203
- type="mongodbatlas")
207
+ type="mongodbatlas",
208
+ description="MongoDB Atlas secret engine mount")
204
209
  config = vault.mongodbatlas.SecretBackend("config",
205
- mount="vault_mount.mongo.path",
210
+ mount=mongo.path,
206
211
  private_key="privateKey",
207
212
  public_key="publicKey")
208
213
  ```
@@ -212,7 +217,7 @@ class SecretBackend(pulumi.CustomResource):
212
217
  MongoDB Atlas secret backends can be imported using the `${mount}/config`, e.g.
213
218
 
214
219
  ```sh
215
- $ pulumi import vault:mongodbatlas/secretBackend:SecretBackend config mongodbatlas/config
220
+ $ pulumi import vault:mongodbatlas/secretBackend:SecretBackend config mongodbatlas/config
216
221
  ```
217
222
 
218
223
  :param str resource_name: The name of the resource.
@@ -220,7 +225,7 @@ class SecretBackend(pulumi.CustomResource):
220
225
  :param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
221
226
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
222
227
  The value should not contain leading or trailing forward slashes.
223
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
228
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
224
229
  *Available only for Vault Enterprise*.
225
230
  :param pulumi.Input[str] private_key: Specifies the Private API Key used to authenticate with the MongoDB Atlas API.
226
231
  :param pulumi.Input[str] public_key: Specifies the Public API Key used to authenticate with the MongoDB Atlas API.
@@ -239,11 +244,11 @@ class SecretBackend(pulumi.CustomResource):
239
244
  import pulumi_vault as vault
240
245
 
241
246
  mongo = vault.Mount("mongo",
242
- description="MongoDB Atlas secret engine mount",
243
247
  path="mongodbatlas",
244
- type="mongodbatlas")
248
+ type="mongodbatlas",
249
+ description="MongoDB Atlas secret engine mount")
245
250
  config = vault.mongodbatlas.SecretBackend("config",
246
- mount="vault_mount.mongo.path",
251
+ mount=mongo.path,
247
252
  private_key="privateKey",
248
253
  public_key="publicKey")
249
254
  ```
@@ -253,7 +258,7 @@ class SecretBackend(pulumi.CustomResource):
253
258
  MongoDB Atlas secret backends can be imported using the `${mount}/config`, e.g.
254
259
 
255
260
  ```sh
256
- $ pulumi import vault:mongodbatlas/secretBackend:SecretBackend config mongodbatlas/config
261
+ $ pulumi import vault:mongodbatlas/secretBackend:SecretBackend config mongodbatlas/config
257
262
  ```
258
263
 
259
264
  :param str resource_name: The name of the resource.
@@ -320,7 +325,7 @@ class SecretBackend(pulumi.CustomResource):
320
325
  :param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
321
326
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
322
327
  The value should not contain leading or trailing forward slashes.
323
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
328
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
324
329
  *Available only for Vault Enterprise*.
325
330
  :param pulumi.Input[str] path: Path where MongoDB Atlas configuration is located
326
331
  :param pulumi.Input[str] private_key: Specifies the Private API Key used to authenticate with the MongoDB Atlas API.
@@ -351,7 +356,7 @@ class SecretBackend(pulumi.CustomResource):
351
356
  """
352
357
  The namespace to provision the resource in.
353
358
  The value should not contain leading or trailing forward slashes.
354
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
359
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
355
360
  *Available only for Vault Enterprise*.
356
361
  """
357
362
  return pulumi.get(self, "namespace")