pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
|
@@ -24,7 +29,7 @@ class AuthBackendGroupInitArgs:
|
|
24
29
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
25
30
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
26
31
|
The value should not contain leading or trailing forward slashes.
|
27
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
32
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
28
33
|
*Available only for Vault Enterprise*.
|
29
34
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
30
35
|
"""
|
@@ -65,7 +70,7 @@ class AuthBackendGroupInitArgs:
|
|
65
70
|
"""
|
66
71
|
The namespace to provision the resource in.
|
67
72
|
The value should not contain leading or trailing forward slashes.
|
68
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
73
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
69
74
|
*Available only for Vault Enterprise*.
|
70
75
|
"""
|
71
76
|
return pulumi.get(self, "namespace")
|
@@ -99,7 +104,7 @@ class _AuthBackendGroupState:
|
|
99
104
|
:param pulumi.Input[str] group_name: Name of the group within the Okta
|
100
105
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
101
106
|
The value should not contain leading or trailing forward slashes.
|
102
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
107
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
103
108
|
*Available only for Vault Enterprise*.
|
104
109
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
105
110
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
@@ -131,7 +136,7 @@ class _AuthBackendGroupState:
|
|
131
136
|
"""
|
132
137
|
The namespace to provision the resource in.
|
133
138
|
The value should not contain leading or trailing forward slashes.
|
134
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
139
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
135
140
|
*Available only for Vault Enterprise*.
|
136
141
|
"""
|
137
142
|
return pulumi.get(self, "namespace")
|
@@ -202,7 +207,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
202
207
|
Okta authentication backend groups can be imported using the format `backend/groupName` e.g.
|
203
208
|
|
204
209
|
```sh
|
205
|
-
|
210
|
+
$ pulumi import vault:okta/authBackendGroup:AuthBackendGroup foo okta/foo
|
206
211
|
```
|
207
212
|
|
208
213
|
:param str resource_name: The name of the resource.
|
@@ -210,7 +215,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
210
215
|
:param pulumi.Input[str] group_name: Name of the group within the Okta
|
211
216
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
212
217
|
The value should not contain leading or trailing forward slashes.
|
213
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
218
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
214
219
|
*Available only for Vault Enterprise*.
|
215
220
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
216
221
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
@@ -248,7 +253,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
248
253
|
Okta authentication backend groups can be imported using the format `backend/groupName` e.g.
|
249
254
|
|
250
255
|
```sh
|
251
|
-
|
256
|
+
$ pulumi import vault:okta/authBackendGroup:AuthBackendGroup foo okta/foo
|
252
257
|
```
|
253
258
|
|
254
259
|
:param str resource_name: The name of the resource.
|
@@ -311,7 +316,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
311
316
|
:param pulumi.Input[str] group_name: Name of the group within the Okta
|
312
317
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
313
318
|
The value should not contain leading or trailing forward slashes.
|
314
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
319
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
315
320
|
*Available only for Vault Enterprise*.
|
316
321
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
317
322
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
@@ -340,7 +345,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
340
345
|
"""
|
341
346
|
The namespace to provision the resource in.
|
342
347
|
The value should not contain leading or trailing forward slashes.
|
343
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
348
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
344
349
|
*Available only for Vault Enterprise*.
|
345
350
|
"""
|
346
351
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
|
@@ -26,7 +31,7 @@ class AuthBackendUserInitArgs:
|
|
26
31
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
27
32
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
28
33
|
The value should not contain leading or trailing forward slashes.
|
29
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
34
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
30
35
|
*Available only for Vault Enterprise*.
|
31
36
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
|
32
37
|
"""
|
@@ -81,7 +86,7 @@ class AuthBackendUserInitArgs:
|
|
81
86
|
"""
|
82
87
|
The namespace to provision the resource in.
|
83
88
|
The value should not contain leading or trailing forward slashes.
|
84
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
89
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
85
90
|
*Available only for Vault Enterprise*.
|
86
91
|
"""
|
87
92
|
return pulumi.get(self, "namespace")
|
@@ -116,7 +121,7 @@ class _AuthBackendUserState:
|
|
116
121
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
117
122
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
118
123
|
The value should not contain leading or trailing forward slashes.
|
119
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
124
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
120
125
|
*Available only for Vault Enterprise*.
|
121
126
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
122
127
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
|
@@ -151,7 +156,7 @@ class _AuthBackendUserState:
|
|
151
156
|
"""
|
152
157
|
The namespace to provision the resource in.
|
153
158
|
The value should not contain leading or trailing forward slashes.
|
154
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
159
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
155
160
|
*Available only for Vault Enterprise*.
|
156
161
|
"""
|
157
162
|
return pulumi.get(self, "namespace")
|
@@ -235,7 +240,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
235
240
|
Okta authentication backend users can be imported using its `path/user` ID format, e.g.
|
236
241
|
|
237
242
|
```sh
|
238
|
-
|
243
|
+
$ pulumi import vault:okta/authBackendUser:AuthBackendUser example okta/foo
|
239
244
|
```
|
240
245
|
|
241
246
|
:param str resource_name: The name of the resource.
|
@@ -243,7 +248,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
243
248
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
244
249
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
245
250
|
The value should not contain leading or trailing forward slashes.
|
246
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
251
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
247
252
|
*Available only for Vault Enterprise*.
|
248
253
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
249
254
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
|
@@ -282,7 +287,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
282
287
|
Okta authentication backend users can be imported using its `path/user` ID format, e.g.
|
283
288
|
|
284
289
|
```sh
|
285
|
-
|
290
|
+
$ pulumi import vault:okta/authBackendUser:AuthBackendUser example okta/foo
|
286
291
|
```
|
287
292
|
|
288
293
|
:param str resource_name: The name of the resource.
|
@@ -348,7 +353,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
348
353
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
349
354
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
350
355
|
The value should not contain leading or trailing forward slashes.
|
351
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
356
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
352
357
|
*Available only for Vault Enterprise*.
|
353
358
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
354
359
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
|
@@ -379,7 +384,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
379
384
|
"""
|
380
385
|
The namespace to provision the resource in.
|
381
386
|
The value should not contain leading or trailing forward slashes.
|
382
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
387
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
383
388
|
*Available only for Vault Enterprise*.
|
384
389
|
"""
|
385
390
|
return pulumi.get(self, "namespace")
|
pulumi_vault/okta/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -37,8 +42,8 @@ class AuthBackendGroup(dict):
|
|
37
42
|
group_name: str,
|
38
43
|
policies: Sequence[str]):
|
39
44
|
"""
|
40
|
-
:param str group_name: Name of the group
|
41
|
-
:param Sequence[str] policies:
|
45
|
+
:param str group_name: Name of the Okta group
|
46
|
+
:param Sequence[str] policies: Policies to associate with this group
|
42
47
|
"""
|
43
48
|
pulumi.set(__self__, "group_name", group_name)
|
44
49
|
pulumi.set(__self__, "policies", policies)
|
@@ -47,7 +52,7 @@ class AuthBackendGroup(dict):
|
|
47
52
|
@pulumi.getter(name="groupName")
|
48
53
|
def group_name(self) -> str:
|
49
54
|
"""
|
50
|
-
Name of the group
|
55
|
+
Name of the Okta group
|
51
56
|
"""
|
52
57
|
return pulumi.get(self, "group_name")
|
53
58
|
|
@@ -55,7 +60,7 @@ class AuthBackendGroup(dict):
|
|
55
60
|
@pulumi.getter
|
56
61
|
def policies(self) -> Sequence[str]:
|
57
62
|
"""
|
58
|
-
|
63
|
+
Policies to associate with this group
|
59
64
|
"""
|
60
65
|
return pulumi.get(self, "policies")
|
61
66
|
|
@@ -68,8 +73,8 @@ class AuthBackendUser(dict):
|
|
68
73
|
policies: Optional[Sequence[str]] = None):
|
69
74
|
"""
|
70
75
|
:param str username: Name of the user within Okta
|
71
|
-
:param Sequence[str] groups:
|
72
|
-
:param Sequence[str] policies:
|
76
|
+
:param Sequence[str] groups: Groups within the Okta auth backend to associate with this user
|
77
|
+
:param Sequence[str] policies: Policies to associate with this user
|
73
78
|
"""
|
74
79
|
pulumi.set(__self__, "username", username)
|
75
80
|
if groups is not None:
|
@@ -89,7 +94,7 @@ class AuthBackendUser(dict):
|
|
89
94
|
@pulumi.getter
|
90
95
|
def groups(self) -> Optional[Sequence[str]]:
|
91
96
|
"""
|
92
|
-
|
97
|
+
Groups within the Okta auth backend to associate with this user
|
93
98
|
"""
|
94
99
|
return pulumi.get(self, "groups")
|
95
100
|
|
@@ -97,7 +102,7 @@ class AuthBackendUser(dict):
|
|
97
102
|
@pulumi.getter
|
98
103
|
def policies(self) -> Optional[Sequence[str]]:
|
99
104
|
"""
|
100
|
-
|
105
|
+
Policies to associate with this user
|
101
106
|
"""
|
102
107
|
return pulumi.get(self, "policies")
|
103
108
|
|
pulumi_vault/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
from . import outputs
|
12
17
|
|
pulumi_vault/password_policy.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
|
@@ -23,7 +28,7 @@ class PasswordPolicyArgs:
|
|
23
28
|
:param pulumi.Input[str] name: The name of the password policy.
|
24
29
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
25
30
|
The value should not contain leading or trailing forward slashes.
|
26
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
31
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
27
32
|
*Available only for Vault Enterprise*.
|
28
33
|
"""
|
29
34
|
pulumi.set(__self__, "policy", policy)
|
@@ -62,7 +67,7 @@ class PasswordPolicyArgs:
|
|
62
67
|
"""
|
63
68
|
The namespace to provision the resource in.
|
64
69
|
The value should not contain leading or trailing forward slashes.
|
65
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
70
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
66
71
|
*Available only for Vault Enterprise*.
|
67
72
|
"""
|
68
73
|
return pulumi.get(self, "namespace")
|
@@ -83,7 +88,7 @@ class _PasswordPolicyState:
|
|
83
88
|
:param pulumi.Input[str] name: The name of the password policy.
|
84
89
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
85
90
|
The value should not contain leading or trailing forward slashes.
|
86
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
91
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
87
92
|
*Available only for Vault Enterprise*.
|
88
93
|
:param pulumi.Input[str] policy: String containing a password policy.
|
89
94
|
"""
|
@@ -112,7 +117,7 @@ class _PasswordPolicyState:
|
|
112
117
|
"""
|
113
118
|
The namespace to provision the resource in.
|
114
119
|
The value should not contain leading or trailing forward slashes.
|
115
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
120
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
116
121
|
*Available only for Vault Enterprise*.
|
117
122
|
"""
|
118
123
|
return pulumi.get(self, "namespace")
|
@@ -154,11 +159,12 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
154
159
|
import pulumi
|
155
160
|
import pulumi_vault as vault
|
156
161
|
|
157
|
-
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
162
|
+
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
163
|
+
name="alphanumeric",
|
164
|
+
policy=\"\"\" length = 20
|
158
165
|
rule "charset" {
|
159
166
|
charset = "abcdefghijklmnopqrstuvwxyz0123456789"
|
160
167
|
}
|
161
|
-
|
162
168
|
\"\"\")
|
163
169
|
```
|
164
170
|
|
@@ -167,7 +173,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
167
173
|
Password policies can be imported using the `name`, e.g.
|
168
174
|
|
169
175
|
```sh
|
170
|
-
|
176
|
+
$ pulumi import vault:index/passwordPolicy:PasswordPolicy alphanumeric alphanumeric
|
171
177
|
```
|
172
178
|
|
173
179
|
:param str resource_name: The name of the resource.
|
@@ -175,7 +181,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
175
181
|
:param pulumi.Input[str] name: The name of the password policy.
|
176
182
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
177
183
|
The value should not contain leading or trailing forward slashes.
|
178
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
184
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
179
185
|
*Available only for Vault Enterprise*.
|
180
186
|
:param pulumi.Input[str] policy: String containing a password policy.
|
181
187
|
"""
|
@@ -196,11 +202,12 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
196
202
|
import pulumi
|
197
203
|
import pulumi_vault as vault
|
198
204
|
|
199
|
-
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
205
|
+
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
206
|
+
name="alphanumeric",
|
207
|
+
policy=\"\"\" length = 20
|
200
208
|
rule "charset" {
|
201
209
|
charset = "abcdefghijklmnopqrstuvwxyz0123456789"
|
202
210
|
}
|
203
|
-
|
204
211
|
\"\"\")
|
205
212
|
```
|
206
213
|
|
@@ -209,7 +216,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
209
216
|
Password policies can be imported using the `name`, e.g.
|
210
217
|
|
211
218
|
```sh
|
212
|
-
|
219
|
+
$ pulumi import vault:index/passwordPolicy:PasswordPolicy alphanumeric alphanumeric
|
213
220
|
```
|
214
221
|
|
215
222
|
:param str resource_name: The name of the resource.
|
@@ -267,7 +274,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
267
274
|
:param pulumi.Input[str] name: The name of the password policy.
|
268
275
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
269
276
|
The value should not contain leading or trailing forward slashes.
|
270
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
277
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
271
278
|
*Available only for Vault Enterprise*.
|
272
279
|
:param pulumi.Input[str] policy: String containing a password policy.
|
273
280
|
"""
|
@@ -294,7 +301,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
294
301
|
"""
|
295
302
|
The namespace to provision the resource in.
|
296
303
|
The value should not contain leading or trailing forward slashes.
|
297
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
304
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
298
305
|
*Available only for Vault Enterprise*.
|
299
306
|
"""
|
300
307
|
return pulumi.get(self, "namespace")
|
@@ -5,6 +5,9 @@
|
|
5
5
|
from .. import _utilities
|
6
6
|
import typing
|
7
7
|
# Export this package's modules as members:
|
8
|
+
from .backend_config_cluster import *
|
9
|
+
from .backend_config_est import *
|
10
|
+
from .get_backend_config_est import *
|
8
11
|
from .get_backend_issuer import *
|
9
12
|
from .get_backend_issuers import *
|
10
13
|
from .get_backend_key import *
|
@@ -4,15 +4,96 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
18
|
+
'BackendConfigEstAuthenticatorsArgs',
|
19
|
+
'BackendConfigEstAuthenticatorsArgsDict',
|
13
20
|
'SecretBackendRolePolicyIdentifierArgs',
|
21
|
+
'SecretBackendRolePolicyIdentifierArgsDict',
|
14
22
|
]
|
15
23
|
|
24
|
+
MYPY = False
|
25
|
+
|
26
|
+
if not MYPY:
|
27
|
+
class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
|
28
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
29
|
+
"""
|
30
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
31
|
+
"""
|
32
|
+
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
33
|
+
"""
|
34
|
+
"The accessor (required) property for user pass auth backends".
|
35
|
+
"""
|
36
|
+
elif False:
|
37
|
+
BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
|
38
|
+
|
39
|
+
@pulumi.input_type
|
40
|
+
class BackendConfigEstAuthenticatorsArgs:
|
41
|
+
def __init__(__self__, *,
|
42
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
43
|
+
userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
|
44
|
+
"""
|
45
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
46
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] userpass: "The accessor (required) property for user pass auth backends".
|
47
|
+
"""
|
48
|
+
if cert is not None:
|
49
|
+
pulumi.set(__self__, "cert", cert)
|
50
|
+
if userpass is not None:
|
51
|
+
pulumi.set(__self__, "userpass", userpass)
|
52
|
+
|
53
|
+
@property
|
54
|
+
@pulumi.getter
|
55
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
56
|
+
"""
|
57
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
58
|
+
"""
|
59
|
+
return pulumi.get(self, "cert")
|
60
|
+
|
61
|
+
@cert.setter
|
62
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
63
|
+
pulumi.set(self, "cert", value)
|
64
|
+
|
65
|
+
@property
|
66
|
+
@pulumi.getter
|
67
|
+
def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
68
|
+
"""
|
69
|
+
"The accessor (required) property for user pass auth backends".
|
70
|
+
"""
|
71
|
+
return pulumi.get(self, "userpass")
|
72
|
+
|
73
|
+
@userpass.setter
|
74
|
+
def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
75
|
+
pulumi.set(self, "userpass", value)
|
76
|
+
|
77
|
+
|
78
|
+
if not MYPY:
|
79
|
+
class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
|
80
|
+
oid: pulumi.Input[str]
|
81
|
+
"""
|
82
|
+
The OID for the policy identifier
|
83
|
+
"""
|
84
|
+
cps: NotRequired[pulumi.Input[str]]
|
85
|
+
"""
|
86
|
+
The URL of the CPS for the policy identifier
|
87
|
+
|
88
|
+
Example usage:
|
89
|
+
"""
|
90
|
+
notice: NotRequired[pulumi.Input[str]]
|
91
|
+
"""
|
92
|
+
A notice for the policy identifier
|
93
|
+
"""
|
94
|
+
elif False:
|
95
|
+
SecretBackendRolePolicyIdentifierArgsDict: TypeAlias = Mapping[str, Any]
|
96
|
+
|
16
97
|
@pulumi.input_type
|
17
98
|
class SecretBackendRolePolicyIdentifierArgs:
|
18
99
|
def __init__(__self__, *,
|