pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/mfa_okta.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaOktaArgs', 'MfaOkta']
|
@@ -33,7 +38,7 @@ class MfaOktaArgs:
|
|
33
38
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
34
39
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
35
40
|
The value should not contain leading or trailing forward slashes.
|
36
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
41
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
37
42
|
*Available only for Vault Enterprise*.
|
38
43
|
:param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
|
39
44
|
primary email for the account.
|
@@ -127,7 +132,7 @@ class MfaOktaArgs:
|
|
127
132
|
"""
|
128
133
|
The namespace to provision the resource in.
|
129
134
|
The value should not contain leading or trailing forward slashes.
|
130
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
135
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
131
136
|
*Available only for Vault Enterprise*.
|
132
137
|
"""
|
133
138
|
return pulumi.get(self, "namespace")
|
@@ -189,7 +194,7 @@ class _MfaOktaState:
|
|
189
194
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
190
195
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
191
196
|
The value should not contain leading or trailing forward slashes.
|
192
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
197
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
193
198
|
*Available only for Vault Enterprise*.
|
194
199
|
:param pulumi.Input[str] org_name: `(string: <required>)` - Name of the organization to be used in the Okta API.
|
195
200
|
:param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
|
@@ -275,7 +280,7 @@ class _MfaOktaState:
|
|
275
280
|
"""
|
276
281
|
The namespace to provision the resource in.
|
277
282
|
The value should not contain leading or trailing forward slashes.
|
278
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
283
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
279
284
|
*Available only for Vault Enterprise*.
|
280
285
|
"""
|
281
286
|
return pulumi.get(self, "namespace")
|
@@ -356,7 +361,8 @@ class MfaOkta(pulumi.CustomResource):
|
|
356
361
|
userpass = vault.AuthBackend("userpass",
|
357
362
|
type="userpass",
|
358
363
|
path="userpass")
|
359
|
-
my_okta = vault.MfaOkta("
|
364
|
+
my_okta = vault.MfaOkta("my_okta",
|
365
|
+
name="my_okta",
|
360
366
|
mount_accessor=userpass.accessor,
|
361
367
|
username_format="user@example.com",
|
362
368
|
org_name="hashicorp",
|
@@ -368,7 +374,7 @@ class MfaOkta(pulumi.CustomResource):
|
|
368
374
|
Mounts can be imported using the `path`, e.g.
|
369
375
|
|
370
376
|
```sh
|
371
|
-
|
377
|
+
$ pulumi import vault:index/mfaOkta:MfaOkta my_okta my_okta
|
372
378
|
```
|
373
379
|
|
374
380
|
:param str resource_name: The name of the resource.
|
@@ -381,7 +387,7 @@ class MfaOkta(pulumi.CustomResource):
|
|
381
387
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
382
388
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
383
389
|
The value should not contain leading or trailing forward slashes.
|
384
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
390
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
385
391
|
*Available only for Vault Enterprise*.
|
386
392
|
:param pulumi.Input[str] org_name: `(string: <required>)` - Name of the organization to be used in the Okta API.
|
387
393
|
:param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
|
@@ -414,7 +420,8 @@ class MfaOkta(pulumi.CustomResource):
|
|
414
420
|
userpass = vault.AuthBackend("userpass",
|
415
421
|
type="userpass",
|
416
422
|
path="userpass")
|
417
|
-
my_okta = vault.MfaOkta("
|
423
|
+
my_okta = vault.MfaOkta("my_okta",
|
424
|
+
name="my_okta",
|
418
425
|
mount_accessor=userpass.accessor,
|
419
426
|
username_format="user@example.com",
|
420
427
|
org_name="hashicorp",
|
@@ -426,7 +433,7 @@ class MfaOkta(pulumi.CustomResource):
|
|
426
433
|
Mounts can be imported using the `path`, e.g.
|
427
434
|
|
428
435
|
```sh
|
429
|
-
|
436
|
+
$ pulumi import vault:index/mfaOkta:MfaOkta my_okta my_okta
|
430
437
|
```
|
431
438
|
|
432
439
|
:param str resource_name: The name of the resource.
|
@@ -510,7 +517,7 @@ class MfaOkta(pulumi.CustomResource):
|
|
510
517
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
511
518
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
512
519
|
The value should not contain leading or trailing forward slashes.
|
513
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
520
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
514
521
|
*Available only for Vault Enterprise*.
|
515
522
|
:param pulumi.Input[str] org_name: `(string: <required>)` - Name of the organization to be used in the Okta API.
|
516
523
|
:param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
|
@@ -577,7 +584,7 @@ class MfaOkta(pulumi.CustomResource):
|
|
577
584
|
"""
|
578
585
|
The namespace to provision the resource in.
|
579
586
|
The value should not contain leading or trailing forward slashes.
|
580
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
587
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
581
588
|
*Available only for Vault Enterprise*.
|
582
589
|
"""
|
583
590
|
return pulumi.get(self, "namespace")
|
pulumi_vault/mfa_pingid.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaPingidArgs', 'MfaPingid']
|
@@ -28,7 +33,7 @@ class MfaPingidArgs:
|
|
28
33
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
29
34
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
30
35
|
The value should not contain leading or trailing forward slashes.
|
31
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
36
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
32
37
|
*Available only for Vault Enterprise*.
|
33
38
|
:param pulumi.Input[str] username_format: `(string)` - A format string for mapping Identity names to MFA method names.
|
34
39
|
Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
|
@@ -91,7 +96,7 @@ class MfaPingidArgs:
|
|
91
96
|
"""
|
92
97
|
The namespace to provision the resource in.
|
93
98
|
The value should not contain leading or trailing forward slashes.
|
94
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
99
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
95
100
|
*Available only for Vault Enterprise*.
|
96
101
|
"""
|
97
102
|
return pulumi.get(self, "namespace")
|
@@ -144,7 +149,7 @@ class _MfaPingidState:
|
|
144
149
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
145
150
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
146
151
|
The value should not contain leading or trailing forward slashes.
|
147
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
152
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
148
153
|
*Available only for Vault Enterprise*.
|
149
154
|
:param pulumi.Input[str] namespace_id: `(string)` – Namespace ID computed by Vault
|
150
155
|
:param pulumi.Input[str] org_alias: `(string)` – Org Alias computed by Vault
|
@@ -252,7 +257,7 @@ class _MfaPingidState:
|
|
252
257
|
"""
|
253
258
|
The namespace to provision the resource in.
|
254
259
|
The value should not contain leading or trailing forward slashes.
|
255
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
260
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
256
261
|
*Available only for Vault Enterprise*.
|
257
262
|
"""
|
258
263
|
return pulumi.get(self, "namespace")
|
@@ -368,7 +373,8 @@ class MfaPingid(pulumi.CustomResource):
|
|
368
373
|
userpass = vault.AuthBackend("userpass",
|
369
374
|
type="userpass",
|
370
375
|
path="userpass")
|
371
|
-
my_pingid = vault.MfaPingid("
|
376
|
+
my_pingid = vault.MfaPingid("my_pingid",
|
377
|
+
name="my_pingid",
|
372
378
|
mount_accessor=userpass.accessor,
|
373
379
|
username_format="user@example.com",
|
374
380
|
settings_file_base64=settings_file)
|
@@ -379,7 +385,7 @@ class MfaPingid(pulumi.CustomResource):
|
|
379
385
|
Mounts can be imported using the `path`, e.g.
|
380
386
|
|
381
387
|
```sh
|
382
|
-
|
388
|
+
$ pulumi import vault:index/mfaPingid:MfaPingid my_pingid my_pingid
|
383
389
|
```
|
384
390
|
|
385
391
|
:param str resource_name: The name of the resource.
|
@@ -389,7 +395,7 @@ class MfaPingid(pulumi.CustomResource):
|
|
389
395
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
390
396
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
391
397
|
The value should not contain leading or trailing forward slashes.
|
392
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
398
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
393
399
|
*Available only for Vault Enterprise*.
|
394
400
|
:param pulumi.Input[str] settings_file_base64: `(string: <required>)` - A base64-encoded third-party settings file retrieved
|
395
401
|
from PingID's configuration page.
|
@@ -423,7 +429,8 @@ class MfaPingid(pulumi.CustomResource):
|
|
423
429
|
userpass = vault.AuthBackend("userpass",
|
424
430
|
type="userpass",
|
425
431
|
path="userpass")
|
426
|
-
my_pingid = vault.MfaPingid("
|
432
|
+
my_pingid = vault.MfaPingid("my_pingid",
|
433
|
+
name="my_pingid",
|
427
434
|
mount_accessor=userpass.accessor,
|
428
435
|
username_format="user@example.com",
|
429
436
|
settings_file_base64=settings_file)
|
@@ -434,7 +441,7 @@ class MfaPingid(pulumi.CustomResource):
|
|
434
441
|
Mounts can be imported using the `path`, e.g.
|
435
442
|
|
436
443
|
```sh
|
437
|
-
|
444
|
+
$ pulumi import vault:index/mfaPingid:MfaPingid my_pingid my_pingid
|
438
445
|
```
|
439
446
|
|
440
447
|
:param str resource_name: The name of the resource.
|
@@ -519,7 +526,7 @@ class MfaPingid(pulumi.CustomResource):
|
|
519
526
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
520
527
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
521
528
|
The value should not contain leading or trailing forward slashes.
|
522
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
529
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
523
530
|
*Available only for Vault Enterprise*.
|
524
531
|
:param pulumi.Input[str] namespace_id: `(string)` – Namespace ID computed by Vault
|
525
532
|
:param pulumi.Input[str] org_alias: `(string)` – Org Alias computed by Vault
|
@@ -600,7 +607,7 @@ class MfaPingid(pulumi.CustomResource):
|
|
600
607
|
"""
|
601
608
|
The namespace to provision the resource in.
|
602
609
|
The value should not contain leading or trailing forward slashes.
|
603
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
610
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
604
611
|
*Available only for Vault Enterprise*.
|
605
612
|
"""
|
606
613
|
return pulumi.get(self, "namespace")
|
pulumi_vault/mfa_totp.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaTotpArgs', 'MfaTotp']
|
@@ -34,7 +39,7 @@ class MfaTotpArgs:
|
|
34
39
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
35
40
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
36
41
|
The value should not contain leading or trailing forward slashes.
|
37
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
42
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
43
|
*Available only for Vault Enterprise*.
|
39
44
|
:param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
|
40
45
|
:param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
|
@@ -127,7 +132,7 @@ class MfaTotpArgs:
|
|
127
132
|
"""
|
128
133
|
The namespace to provision the resource in.
|
129
134
|
The value should not contain leading or trailing forward slashes.
|
130
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
135
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
131
136
|
*Available only for Vault Enterprise*.
|
132
137
|
"""
|
133
138
|
return pulumi.get(self, "namespace")
|
@@ -197,7 +202,7 @@ class _MfaTotpState:
|
|
197
202
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
198
203
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
199
204
|
The value should not contain leading or trailing forward slashes.
|
200
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
205
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
201
206
|
*Available only for Vault Enterprise*.
|
202
207
|
:param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
|
203
208
|
:param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
|
@@ -291,7 +296,7 @@ class _MfaTotpState:
|
|
291
296
|
"""
|
292
297
|
The namespace to provision the resource in.
|
293
298
|
The value should not contain leading or trailing forward slashes.
|
294
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
299
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
295
300
|
*Available only for Vault Enterprise*.
|
296
301
|
"""
|
297
302
|
return pulumi.get(self, "namespace")
|
@@ -364,12 +369,13 @@ class MfaTotp(pulumi.CustomResource):
|
|
364
369
|
import pulumi
|
365
370
|
import pulumi_vault as vault
|
366
371
|
|
367
|
-
my_totp = vault.MfaTotp("
|
372
|
+
my_totp = vault.MfaTotp("my_totp",
|
373
|
+
name="my_totp",
|
374
|
+
issuer="hashicorp",
|
375
|
+
period=60,
|
368
376
|
algorithm="SHA256",
|
369
377
|
digits=8,
|
370
|
-
|
371
|
-
key_size=20,
|
372
|
-
period=60)
|
378
|
+
key_size=20)
|
373
379
|
```
|
374
380
|
|
375
381
|
## Import
|
@@ -377,7 +383,7 @@ class MfaTotp(pulumi.CustomResource):
|
|
377
383
|
Mounts can be imported using the `path`, e.g.
|
378
384
|
|
379
385
|
```sh
|
380
|
-
|
386
|
+
$ pulumi import vault:index/mfaTotp:MfaTotp my_totp my_totp
|
381
387
|
```
|
382
388
|
|
383
389
|
:param str resource_name: The name of the resource.
|
@@ -391,7 +397,7 @@ class MfaTotp(pulumi.CustomResource):
|
|
391
397
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
392
398
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
393
399
|
The value should not contain leading or trailing forward slashes.
|
394
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
400
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
395
401
|
*Available only for Vault Enterprise*.
|
396
402
|
:param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
|
397
403
|
:param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
|
@@ -415,12 +421,13 @@ class MfaTotp(pulumi.CustomResource):
|
|
415
421
|
import pulumi
|
416
422
|
import pulumi_vault as vault
|
417
423
|
|
418
|
-
my_totp = vault.MfaTotp("
|
424
|
+
my_totp = vault.MfaTotp("my_totp",
|
425
|
+
name="my_totp",
|
426
|
+
issuer="hashicorp",
|
427
|
+
period=60,
|
419
428
|
algorithm="SHA256",
|
420
429
|
digits=8,
|
421
|
-
|
422
|
-
key_size=20,
|
423
|
-
period=60)
|
430
|
+
key_size=20)
|
424
431
|
```
|
425
432
|
|
426
433
|
## Import
|
@@ -428,7 +435,7 @@ class MfaTotp(pulumi.CustomResource):
|
|
428
435
|
Mounts can be imported using the `path`, e.g.
|
429
436
|
|
430
437
|
```sh
|
431
|
-
|
438
|
+
$ pulumi import vault:index/mfaTotp:MfaTotp my_totp my_totp
|
432
439
|
```
|
433
440
|
|
434
441
|
:param str resource_name: The name of the resource.
|
@@ -510,7 +517,7 @@ class MfaTotp(pulumi.CustomResource):
|
|
510
517
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
511
518
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
512
519
|
The value should not contain leading or trailing forward slashes.
|
513
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
520
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
514
521
|
*Available only for Vault Enterprise*.
|
515
522
|
:param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
|
516
523
|
:param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
|
@@ -580,7 +587,7 @@ class MfaTotp(pulumi.CustomResource):
|
|
580
587
|
"""
|
581
588
|
The namespace to provision the resource in.
|
582
589
|
The value should not contain leading or trailing forward slashes.
|
583
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
590
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
584
591
|
*Available only for Vault Enterprise*.
|
585
592
|
"""
|
586
593
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -25,7 +30,7 @@ class SecretBackendArgs:
|
|
25
30
|
:param pulumi.Input[str] public_key: Specifies the Public API Key used to authenticate with the MongoDB Atlas API.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
"""
|
31
36
|
pulumi.set(__self__, "mount", mount)
|
@@ -76,7 +81,7 @@ class SecretBackendArgs:
|
|
76
81
|
"""
|
77
82
|
The namespace to provision the resource in.
|
78
83
|
The value should not contain leading or trailing forward slashes.
|
79
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
84
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
80
85
|
*Available only for Vault Enterprise*.
|
81
86
|
"""
|
82
87
|
return pulumi.get(self, "namespace")
|
@@ -99,7 +104,7 @@ class _SecretBackendState:
|
|
99
104
|
:param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
100
105
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
101
106
|
The value should not contain leading or trailing forward slashes.
|
102
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
107
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
103
108
|
*Available only for Vault Enterprise*.
|
104
109
|
:param pulumi.Input[str] path: Path where MongoDB Atlas configuration is located
|
105
110
|
:param pulumi.Input[str] private_key: Specifies the Private API Key used to authenticate with the MongoDB Atlas API.
|
@@ -134,7 +139,7 @@ class _SecretBackendState:
|
|
134
139
|
"""
|
135
140
|
The namespace to provision the resource in.
|
136
141
|
The value should not contain leading or trailing forward slashes.
|
137
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
142
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
138
143
|
*Available only for Vault Enterprise*.
|
139
144
|
"""
|
140
145
|
return pulumi.get(self, "namespace")
|
@@ -198,11 +203,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
198
203
|
import pulumi_vault as vault
|
199
204
|
|
200
205
|
mongo = vault.Mount("mongo",
|
201
|
-
description="MongoDB Atlas secret engine mount",
|
202
206
|
path="mongodbatlas",
|
203
|
-
type="mongodbatlas"
|
207
|
+
type="mongodbatlas",
|
208
|
+
description="MongoDB Atlas secret engine mount")
|
204
209
|
config = vault.mongodbatlas.SecretBackend("config",
|
205
|
-
mount=
|
210
|
+
mount=mongo.path,
|
206
211
|
private_key="privateKey",
|
207
212
|
public_key="publicKey")
|
208
213
|
```
|
@@ -212,7 +217,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
212
217
|
MongoDB Atlas secret backends can be imported using the `${mount}/config`, e.g.
|
213
218
|
|
214
219
|
```sh
|
215
|
-
|
220
|
+
$ pulumi import vault:mongodbatlas/secretBackend:SecretBackend config mongodbatlas/config
|
216
221
|
```
|
217
222
|
|
218
223
|
:param str resource_name: The name of the resource.
|
@@ -220,7 +225,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
220
225
|
:param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
221
226
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
222
227
|
The value should not contain leading or trailing forward slashes.
|
223
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
228
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
224
229
|
*Available only for Vault Enterprise*.
|
225
230
|
:param pulumi.Input[str] private_key: Specifies the Private API Key used to authenticate with the MongoDB Atlas API.
|
226
231
|
:param pulumi.Input[str] public_key: Specifies the Public API Key used to authenticate with the MongoDB Atlas API.
|
@@ -239,11 +244,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
239
244
|
import pulumi_vault as vault
|
240
245
|
|
241
246
|
mongo = vault.Mount("mongo",
|
242
|
-
description="MongoDB Atlas secret engine mount",
|
243
247
|
path="mongodbatlas",
|
244
|
-
type="mongodbatlas"
|
248
|
+
type="mongodbatlas",
|
249
|
+
description="MongoDB Atlas secret engine mount")
|
245
250
|
config = vault.mongodbatlas.SecretBackend("config",
|
246
|
-
mount=
|
251
|
+
mount=mongo.path,
|
247
252
|
private_key="privateKey",
|
248
253
|
public_key="publicKey")
|
249
254
|
```
|
@@ -253,7 +258,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
253
258
|
MongoDB Atlas secret backends can be imported using the `${mount}/config`, e.g.
|
254
259
|
|
255
260
|
```sh
|
256
|
-
|
261
|
+
$ pulumi import vault:mongodbatlas/secretBackend:SecretBackend config mongodbatlas/config
|
257
262
|
```
|
258
263
|
|
259
264
|
:param str resource_name: The name of the resource.
|
@@ -320,7 +325,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
320
325
|
:param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
321
326
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
322
327
|
The value should not contain leading or trailing forward slashes.
|
323
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
328
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
324
329
|
*Available only for Vault Enterprise*.
|
325
330
|
:param pulumi.Input[str] path: Path where MongoDB Atlas configuration is located
|
326
331
|
:param pulumi.Input[str] private_key: Specifies the Private API Key used to authenticate with the MongoDB Atlas API.
|
@@ -351,7 +356,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
351
356
|
"""
|
352
357
|
The namespace to provision the resource in.
|
353
358
|
The value should not contain leading or trailing forward slashes.
|
354
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
359
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
355
360
|
*Available only for Vault Enterprise*.
|
356
361
|
"""
|
357
362
|
return pulumi.get(self, "namespace")
|