pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
@@ -24,7 +29,7 @@ class AuthBackendGroupInitArgs:
24
29
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
25
30
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
26
31
  The value should not contain leading or trailing forward slashes.
27
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
32
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
28
33
  *Available only for Vault Enterprise*.
29
34
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
30
35
  """
@@ -65,7 +70,7 @@ class AuthBackendGroupInitArgs:
65
70
  """
66
71
  The namespace to provision the resource in.
67
72
  The value should not contain leading or trailing forward slashes.
68
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
73
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
69
74
  *Available only for Vault Enterprise*.
70
75
  """
71
76
  return pulumi.get(self, "namespace")
@@ -99,7 +104,7 @@ class _AuthBackendGroupState:
99
104
  :param pulumi.Input[str] group_name: Name of the group within the Okta
100
105
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
101
106
  The value should not contain leading or trailing forward slashes.
102
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
107
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
103
108
  *Available only for Vault Enterprise*.
104
109
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
105
110
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
@@ -131,7 +136,7 @@ class _AuthBackendGroupState:
131
136
  """
132
137
  The namespace to provision the resource in.
133
138
  The value should not contain leading or trailing forward slashes.
134
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
139
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
135
140
  *Available only for Vault Enterprise*.
136
141
  """
137
142
  return pulumi.get(self, "namespace")
@@ -202,7 +207,7 @@ class AuthBackendGroup(pulumi.CustomResource):
202
207
  Okta authentication backend groups can be imported using the format `backend/groupName` e.g.
203
208
 
204
209
  ```sh
205
- $ pulumi import vault:okta/authBackendGroup:AuthBackendGroup foo okta/foo
210
+ $ pulumi import vault:okta/authBackendGroup:AuthBackendGroup foo okta/foo
206
211
  ```
207
212
 
208
213
  :param str resource_name: The name of the resource.
@@ -210,7 +215,7 @@ class AuthBackendGroup(pulumi.CustomResource):
210
215
  :param pulumi.Input[str] group_name: Name of the group within the Okta
211
216
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
212
217
  The value should not contain leading or trailing forward slashes.
213
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
218
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
214
219
  *Available only for Vault Enterprise*.
215
220
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
216
221
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
@@ -248,7 +253,7 @@ class AuthBackendGroup(pulumi.CustomResource):
248
253
  Okta authentication backend groups can be imported using the format `backend/groupName` e.g.
249
254
 
250
255
  ```sh
251
- $ pulumi import vault:okta/authBackendGroup:AuthBackendGroup foo okta/foo
256
+ $ pulumi import vault:okta/authBackendGroup:AuthBackendGroup foo okta/foo
252
257
  ```
253
258
 
254
259
  :param str resource_name: The name of the resource.
@@ -311,7 +316,7 @@ class AuthBackendGroup(pulumi.CustomResource):
311
316
  :param pulumi.Input[str] group_name: Name of the group within the Okta
312
317
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
313
318
  The value should not contain leading or trailing forward slashes.
314
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
319
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
315
320
  *Available only for Vault Enterprise*.
316
321
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
317
322
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
@@ -340,7 +345,7 @@ class AuthBackendGroup(pulumi.CustomResource):
340
345
  """
341
346
  The namespace to provision the resource in.
342
347
  The value should not contain leading or trailing forward slashes.
343
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
348
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
344
349
  *Available only for Vault Enterprise*.
345
350
  """
346
351
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
@@ -26,7 +31,7 @@ class AuthBackendUserInitArgs:
26
31
  :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
27
32
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
28
33
  The value should not contain leading or trailing forward slashes.
29
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
34
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
30
35
  *Available only for Vault Enterprise*.
31
36
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
32
37
  """
@@ -81,7 +86,7 @@ class AuthBackendUserInitArgs:
81
86
  """
82
87
  The namespace to provision the resource in.
83
88
  The value should not contain leading or trailing forward slashes.
84
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
89
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
85
90
  *Available only for Vault Enterprise*.
86
91
  """
87
92
  return pulumi.get(self, "namespace")
@@ -116,7 +121,7 @@ class _AuthBackendUserState:
116
121
  :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
117
122
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
118
123
  The value should not contain leading or trailing forward slashes.
119
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
124
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
120
125
  *Available only for Vault Enterprise*.
121
126
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
122
127
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
@@ -151,7 +156,7 @@ class _AuthBackendUserState:
151
156
  """
152
157
  The namespace to provision the resource in.
153
158
  The value should not contain leading or trailing forward slashes.
154
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
159
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
155
160
  *Available only for Vault Enterprise*.
156
161
  """
157
162
  return pulumi.get(self, "namespace")
@@ -235,7 +240,7 @@ class AuthBackendUser(pulumi.CustomResource):
235
240
  Okta authentication backend users can be imported using its `path/user` ID format, e.g.
236
241
 
237
242
  ```sh
238
- $ pulumi import vault:okta/authBackendUser:AuthBackendUser example okta/foo
243
+ $ pulumi import vault:okta/authBackendUser:AuthBackendUser example okta/foo
239
244
  ```
240
245
 
241
246
  :param str resource_name: The name of the resource.
@@ -243,7 +248,7 @@ class AuthBackendUser(pulumi.CustomResource):
243
248
  :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
244
249
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
245
250
  The value should not contain leading or trailing forward slashes.
246
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
251
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
247
252
  *Available only for Vault Enterprise*.
248
253
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
249
254
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
@@ -282,7 +287,7 @@ class AuthBackendUser(pulumi.CustomResource):
282
287
  Okta authentication backend users can be imported using its `path/user` ID format, e.g.
283
288
 
284
289
  ```sh
285
- $ pulumi import vault:okta/authBackendUser:AuthBackendUser example okta/foo
290
+ $ pulumi import vault:okta/authBackendUser:AuthBackendUser example okta/foo
286
291
  ```
287
292
 
288
293
  :param str resource_name: The name of the resource.
@@ -348,7 +353,7 @@ class AuthBackendUser(pulumi.CustomResource):
348
353
  :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
349
354
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
350
355
  The value should not contain leading or trailing forward slashes.
351
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
356
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
352
357
  *Available only for Vault Enterprise*.
353
358
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
354
359
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
@@ -379,7 +384,7 @@ class AuthBackendUser(pulumi.CustomResource):
379
384
  """
380
385
  The namespace to provision the resource in.
381
386
  The value should not contain leading or trailing forward slashes.
382
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
387
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
383
388
  *Available only for Vault Enterprise*.
384
389
  """
385
390
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -37,8 +42,8 @@ class AuthBackendGroup(dict):
37
42
  group_name: str,
38
43
  policies: Sequence[str]):
39
44
  """
40
- :param str group_name: Name of the group within the Okta
41
- :param Sequence[str] policies: Vault policies to associate with this group
45
+ :param str group_name: Name of the Okta group
46
+ :param Sequence[str] policies: Policies to associate with this group
42
47
  """
43
48
  pulumi.set(__self__, "group_name", group_name)
44
49
  pulumi.set(__self__, "policies", policies)
@@ -47,7 +52,7 @@ class AuthBackendGroup(dict):
47
52
  @pulumi.getter(name="groupName")
48
53
  def group_name(self) -> str:
49
54
  """
50
- Name of the group within the Okta
55
+ Name of the Okta group
51
56
  """
52
57
  return pulumi.get(self, "group_name")
53
58
 
@@ -55,7 +60,7 @@ class AuthBackendGroup(dict):
55
60
  @pulumi.getter
56
61
  def policies(self) -> Sequence[str]:
57
62
  """
58
- Vault policies to associate with this group
63
+ Policies to associate with this group
59
64
  """
60
65
  return pulumi.get(self, "policies")
61
66
 
@@ -68,8 +73,8 @@ class AuthBackendUser(dict):
68
73
  policies: Optional[Sequence[str]] = None):
69
74
  """
70
75
  :param str username: Name of the user within Okta
71
- :param Sequence[str] groups: List of Okta groups to associate with this user
72
- :param Sequence[str] policies: Vault policies to associate with this group
76
+ :param Sequence[str] groups: Groups within the Okta auth backend to associate with this user
77
+ :param Sequence[str] policies: Policies to associate with this user
73
78
  """
74
79
  pulumi.set(__self__, "username", username)
75
80
  if groups is not None:
@@ -89,7 +94,7 @@ class AuthBackendUser(dict):
89
94
  @pulumi.getter
90
95
  def groups(self) -> Optional[Sequence[str]]:
91
96
  """
92
- List of Okta groups to associate with this user
97
+ Groups within the Okta auth backend to associate with this user
93
98
  """
94
99
  return pulumi.get(self, "groups")
95
100
 
@@ -97,7 +102,7 @@ class AuthBackendUser(dict):
97
102
  @pulumi.getter
98
103
  def policies(self) -> Optional[Sequence[str]]:
99
104
  """
100
- Vault policies to associate with this group
105
+ Policies to associate with this user
101
106
  """
102
107
  return pulumi.get(self, "policies")
103
108
 
pulumi_vault/outputs.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
  from . import outputs
12
17
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
@@ -23,7 +28,7 @@ class PasswordPolicyArgs:
23
28
  :param pulumi.Input[str] name: The name of the password policy.
24
29
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
30
  The value should not contain leading or trailing forward slashes.
26
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
31
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
27
32
  *Available only for Vault Enterprise*.
28
33
  """
29
34
  pulumi.set(__self__, "policy", policy)
@@ -62,7 +67,7 @@ class PasswordPolicyArgs:
62
67
  """
63
68
  The namespace to provision the resource in.
64
69
  The value should not contain leading or trailing forward slashes.
65
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
70
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
66
71
  *Available only for Vault Enterprise*.
67
72
  """
68
73
  return pulumi.get(self, "namespace")
@@ -83,7 +88,7 @@ class _PasswordPolicyState:
83
88
  :param pulumi.Input[str] name: The name of the password policy.
84
89
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
85
90
  The value should not contain leading or trailing forward slashes.
86
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
91
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
87
92
  *Available only for Vault Enterprise*.
88
93
  :param pulumi.Input[str] policy: String containing a password policy.
89
94
  """
@@ -112,7 +117,7 @@ class _PasswordPolicyState:
112
117
  """
113
118
  The namespace to provision the resource in.
114
119
  The value should not contain leading or trailing forward slashes.
115
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
120
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
116
121
  *Available only for Vault Enterprise*.
117
122
  """
118
123
  return pulumi.get(self, "namespace")
@@ -154,11 +159,12 @@ class PasswordPolicy(pulumi.CustomResource):
154
159
  import pulumi
155
160
  import pulumi_vault as vault
156
161
 
157
- alphanumeric = vault.PasswordPolicy("alphanumeric", policy=\"\"\" length = 20
162
+ alphanumeric = vault.PasswordPolicy("alphanumeric",
163
+ name="alphanumeric",
164
+ policy=\"\"\" length = 20
158
165
  rule "charset" {
159
166
  charset = "abcdefghijklmnopqrstuvwxyz0123456789"
160
167
  }
161
-
162
168
  \"\"\")
163
169
  ```
164
170
 
@@ -167,7 +173,7 @@ class PasswordPolicy(pulumi.CustomResource):
167
173
  Password policies can be imported using the `name`, e.g.
168
174
 
169
175
  ```sh
170
- $ pulumi import vault:index/passwordPolicy:PasswordPolicy alphanumeric alphanumeric
176
+ $ pulumi import vault:index/passwordPolicy:PasswordPolicy alphanumeric alphanumeric
171
177
  ```
172
178
 
173
179
  :param str resource_name: The name of the resource.
@@ -175,7 +181,7 @@ class PasswordPolicy(pulumi.CustomResource):
175
181
  :param pulumi.Input[str] name: The name of the password policy.
176
182
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
177
183
  The value should not contain leading or trailing forward slashes.
178
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
184
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
179
185
  *Available only for Vault Enterprise*.
180
186
  :param pulumi.Input[str] policy: String containing a password policy.
181
187
  """
@@ -196,11 +202,12 @@ class PasswordPolicy(pulumi.CustomResource):
196
202
  import pulumi
197
203
  import pulumi_vault as vault
198
204
 
199
- alphanumeric = vault.PasswordPolicy("alphanumeric", policy=\"\"\" length = 20
205
+ alphanumeric = vault.PasswordPolicy("alphanumeric",
206
+ name="alphanumeric",
207
+ policy=\"\"\" length = 20
200
208
  rule "charset" {
201
209
  charset = "abcdefghijklmnopqrstuvwxyz0123456789"
202
210
  }
203
-
204
211
  \"\"\")
205
212
  ```
206
213
 
@@ -209,7 +216,7 @@ class PasswordPolicy(pulumi.CustomResource):
209
216
  Password policies can be imported using the `name`, e.g.
210
217
 
211
218
  ```sh
212
- $ pulumi import vault:index/passwordPolicy:PasswordPolicy alphanumeric alphanumeric
219
+ $ pulumi import vault:index/passwordPolicy:PasswordPolicy alphanumeric alphanumeric
213
220
  ```
214
221
 
215
222
  :param str resource_name: The name of the resource.
@@ -267,7 +274,7 @@ class PasswordPolicy(pulumi.CustomResource):
267
274
  :param pulumi.Input[str] name: The name of the password policy.
268
275
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
269
276
  The value should not contain leading or trailing forward slashes.
270
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
277
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
271
278
  *Available only for Vault Enterprise*.
272
279
  :param pulumi.Input[str] policy: String containing a password policy.
273
280
  """
@@ -294,7 +301,7 @@ class PasswordPolicy(pulumi.CustomResource):
294
301
  """
295
302
  The namespace to provision the resource in.
296
303
  The value should not contain leading or trailing forward slashes.
297
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
304
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
298
305
  *Available only for Vault Enterprise*.
299
306
  """
300
307
  return pulumi.get(self, "namespace")
@@ -5,6 +5,9 @@
5
5
  from .. import _utilities
6
6
  import typing
7
7
  # Export this package's modules as members:
8
+ from .backend_config_cluster import *
9
+ from .backend_config_est import *
10
+ from .get_backend_config_est import *
8
11
  from .get_backend_issuer import *
9
12
  from .get_backend_issuers import *
10
13
  from .get_backend_key import *
@@ -4,15 +4,96 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
18
+ 'BackendConfigEstAuthenticatorsArgs',
19
+ 'BackendConfigEstAuthenticatorsArgsDict',
13
20
  'SecretBackendRolePolicyIdentifierArgs',
21
+ 'SecretBackendRolePolicyIdentifierArgsDict',
14
22
  ]
15
23
 
24
+ MYPY = False
25
+
26
+ if not MYPY:
27
+ class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
28
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
29
+ """
30
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
31
+ """
32
+ userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
33
+ """
34
+ "The accessor (required) property for user pass auth backends".
35
+ """
36
+ elif False:
37
+ BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
38
+
39
+ @pulumi.input_type
40
+ class BackendConfigEstAuthenticatorsArgs:
41
+ def __init__(__self__, *,
42
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
43
+ userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
44
+ """
45
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
46
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] userpass: "The accessor (required) property for user pass auth backends".
47
+ """
48
+ if cert is not None:
49
+ pulumi.set(__self__, "cert", cert)
50
+ if userpass is not None:
51
+ pulumi.set(__self__, "userpass", userpass)
52
+
53
+ @property
54
+ @pulumi.getter
55
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
56
+ """
57
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
58
+ """
59
+ return pulumi.get(self, "cert")
60
+
61
+ @cert.setter
62
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
63
+ pulumi.set(self, "cert", value)
64
+
65
+ @property
66
+ @pulumi.getter
67
+ def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
68
+ """
69
+ "The accessor (required) property for user pass auth backends".
70
+ """
71
+ return pulumi.get(self, "userpass")
72
+
73
+ @userpass.setter
74
+ def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
75
+ pulumi.set(self, "userpass", value)
76
+
77
+
78
+ if not MYPY:
79
+ class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
80
+ oid: pulumi.Input[str]
81
+ """
82
+ The OID for the policy identifier
83
+ """
84
+ cps: NotRequired[pulumi.Input[str]]
85
+ """
86
+ The URL of the CPS for the policy identifier
87
+
88
+ Example usage:
89
+ """
90
+ notice: NotRequired[pulumi.Input[str]]
91
+ """
92
+ A notice for the policy identifier
93
+ """
94
+ elif False:
95
+ SecretBackendRolePolicyIdentifierArgsDict: TypeAlias = Mapping[str, Any]
96
+
16
97
  @pulumi.input_type
17
98
  class SecretBackendRolePolicyIdentifierArgs:
18
99
  def __init__(__self__, *,