pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['GroupPoliciesArgs', 'GroupPolicies']
@@ -29,7 +34,7 @@ class GroupPoliciesArgs:
29
34
  If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the group. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
30
35
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
36
  The value should not contain leading or trailing forward slashes.
32
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
38
  *Available only for Vault Enterprise*.
34
39
  """
35
40
  pulumi.set(__self__, "group_id", group_id)
@@ -85,7 +90,7 @@ class GroupPoliciesArgs:
85
90
  """
86
91
  The namespace to provision the resource in.
87
92
  The value should not contain leading or trailing forward slashes.
88
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
93
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
89
94
  *Available only for Vault Enterprise*.
90
95
  """
91
96
  return pulumi.get(self, "namespace")
@@ -114,7 +119,7 @@ class _GroupPoliciesState:
114
119
  :param pulumi.Input[str] group_name: The name of the group that are assigned the policies.
115
120
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
116
121
  The value should not contain leading or trailing forward slashes.
117
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
122
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
118
123
  *Available only for Vault Enterprise*.
119
124
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the group
120
125
  """
@@ -175,7 +180,7 @@ class _GroupPoliciesState:
175
180
  """
176
181
  The namespace to provision the resource in.
177
182
  The value should not contain leading or trailing forward slashes.
178
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
183
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
179
184
  *Available only for Vault Enterprise*.
180
185
  """
181
186
  return pulumi.get(self, "namespace")
@@ -214,12 +219,12 @@ class GroupPolicies(pulumi.CustomResource):
214
219
 
215
220
  ### Exclusive Policies
216
221
 
217
- <!--Start PulumiCodeChooser -->
218
222
  ```python
219
223
  import pulumi
220
224
  import pulumi_vault as vault
221
225
 
222
226
  internal = vault.identity.Group("internal",
227
+ name="internal",
223
228
  type="internal",
224
229
  external_policies=True,
225
230
  metadata={
@@ -233,16 +238,15 @@ class GroupPolicies(pulumi.CustomResource):
233
238
  exclusive=True,
234
239
  group_id=internal.id)
235
240
  ```
236
- <!--End PulumiCodeChooser -->
237
241
 
238
242
  ### Non-exclusive Policies
239
243
 
240
- <!--Start PulumiCodeChooser -->
241
244
  ```python
242
245
  import pulumi
243
246
  import pulumi_vault as vault
244
247
 
245
248
  internal = vault.identity.Group("internal",
249
+ name="internal",
246
250
  type="internal",
247
251
  external_policies=True,
248
252
  metadata={
@@ -260,7 +264,6 @@ class GroupPolicies(pulumi.CustomResource):
260
264
  exclusive=False,
261
265
  group_id=internal.id)
262
266
  ```
263
- <!--End PulumiCodeChooser -->
264
267
 
265
268
  :param str resource_name: The name of the resource.
266
269
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -272,7 +275,7 @@ class GroupPolicies(pulumi.CustomResource):
272
275
  :param pulumi.Input[str] group_id: Group ID to assign policies to.
273
276
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
274
277
  The value should not contain leading or trailing forward slashes.
275
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
278
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
276
279
  *Available only for Vault Enterprise*.
277
280
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the group
278
281
  """
@@ -289,12 +292,12 @@ class GroupPolicies(pulumi.CustomResource):
289
292
 
290
293
  ### Exclusive Policies
291
294
 
292
- <!--Start PulumiCodeChooser -->
293
295
  ```python
294
296
  import pulumi
295
297
  import pulumi_vault as vault
296
298
 
297
299
  internal = vault.identity.Group("internal",
300
+ name="internal",
298
301
  type="internal",
299
302
  external_policies=True,
300
303
  metadata={
@@ -308,16 +311,15 @@ class GroupPolicies(pulumi.CustomResource):
308
311
  exclusive=True,
309
312
  group_id=internal.id)
310
313
  ```
311
- <!--End PulumiCodeChooser -->
312
314
 
313
315
  ### Non-exclusive Policies
314
316
 
315
- <!--Start PulumiCodeChooser -->
316
317
  ```python
317
318
  import pulumi
318
319
  import pulumi_vault as vault
319
320
 
320
321
  internal = vault.identity.Group("internal",
322
+ name="internal",
321
323
  type="internal",
322
324
  external_policies=True,
323
325
  metadata={
@@ -335,7 +337,6 @@ class GroupPolicies(pulumi.CustomResource):
335
337
  exclusive=False,
336
338
  group_id=internal.id)
337
339
  ```
338
- <!--End PulumiCodeChooser -->
339
340
 
340
341
  :param str resource_name: The name of the resource.
341
342
  :param GroupPoliciesArgs args: The arguments to use to populate this resource's properties.
@@ -405,7 +406,7 @@ class GroupPolicies(pulumi.CustomResource):
405
406
  :param pulumi.Input[str] group_name: The name of the group that are assigned the policies.
406
407
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
407
408
  The value should not contain leading or trailing forward slashes.
408
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
409
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
409
410
  *Available only for Vault Enterprise*.
410
411
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the group
411
412
  """
@@ -454,7 +455,7 @@ class GroupPolicies(pulumi.CustomResource):
454
455
  """
455
456
  The namespace to provision the resource in.
456
457
  The value should not contain leading or trailing forward slashes.
457
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
458
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
458
459
  *Available only for Vault Enterprise*.
459
460
  """
460
461
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaDuoArgs', 'MfaDuo']
@@ -378,17 +383,15 @@ class MfaDuo(pulumi.CustomResource):
378
383
 
379
384
  ## Example Usage
380
385
 
381
- <!--Start PulumiCodeChooser -->
382
386
  ```python
383
387
  import pulumi
384
388
  import pulumi_vault as vault
385
389
 
386
390
  example = vault.identity.MfaDuo("example",
387
391
  api_hostname="api-xxxxxxxx.duosecurity.com",
388
- integration_key="secret-int-key",
389
- secret_key="secret-key")
392
+ secret_key="secret-key",
393
+ integration_key="secret-int-key")
390
394
  ```
391
- <!--End PulumiCodeChooser -->
392
395
 
393
396
  ## Import
394
397
 
@@ -419,17 +422,15 @@ class MfaDuo(pulumi.CustomResource):
419
422
 
420
423
  ## Example Usage
421
424
 
422
- <!--Start PulumiCodeChooser -->
423
425
  ```python
424
426
  import pulumi
425
427
  import pulumi_vault as vault
426
428
 
427
429
  example = vault.identity.MfaDuo("example",
428
430
  api_hostname="api-xxxxxxxx.duosecurity.com",
429
- integration_key="secret-int-key",
430
- secret_key="secret-key")
431
+ secret_key="secret-key",
432
+ integration_key="secret-int-key")
431
433
  ```
432
- <!--End PulumiCodeChooser -->
433
434
 
434
435
  ## Import
435
436
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaLoginEnforcementArgs', 'MfaLoginEnforcement']
@@ -316,19 +321,19 @@ class MfaLoginEnforcement(pulumi.CustomResource):
316
321
 
317
322
  ## Example Usage
318
323
 
319
- <!--Start PulumiCodeChooser -->
320
324
  ```python
321
325
  import pulumi
322
326
  import pulumi_vault as vault
323
327
 
324
- example_mfa_duo = vault.identity.MfaDuo("exampleMfaDuo",
328
+ example = vault.identity.MfaDuo("example",
325
329
  secret_key="secret-key",
326
330
  integration_key="int-key",
327
331
  api_hostname="foo.baz",
328
332
  push_info="push-info")
329
- example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("exampleMfaLoginEnforcement", mfa_method_ids=[example_mfa_duo.method_id])
333
+ example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
334
+ name="default",
335
+ mfa_method_ids=[example.method_id])
330
336
  ```
331
- <!--End PulumiCodeChooser -->
332
337
 
333
338
  ## Import
334
339
 
@@ -359,19 +364,19 @@ class MfaLoginEnforcement(pulumi.CustomResource):
359
364
 
360
365
  ## Example Usage
361
366
 
362
- <!--Start PulumiCodeChooser -->
363
367
  ```python
364
368
  import pulumi
365
369
  import pulumi_vault as vault
366
370
 
367
- example_mfa_duo = vault.identity.MfaDuo("exampleMfaDuo",
371
+ example = vault.identity.MfaDuo("example",
368
372
  secret_key="secret-key",
369
373
  integration_key="int-key",
370
374
  api_hostname="foo.baz",
371
375
  push_info="push-info")
372
- example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("exampleMfaLoginEnforcement", mfa_method_ids=[example_mfa_duo.method_id])
376
+ example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
377
+ name="default",
378
+ mfa_method_ids=[example.method_id])
373
379
  ```
374
- <!--End PulumiCodeChooser -->
375
380
 
376
381
  ## Import
377
382
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaOktaArgs', 'MfaOkta']
@@ -346,17 +351,15 @@ class MfaOkta(pulumi.CustomResource):
346
351
 
347
352
  ## Example Usage
348
353
 
349
- <!--Start PulumiCodeChooser -->
350
354
  ```python
351
355
  import pulumi
352
356
  import pulumi_vault as vault
353
357
 
354
358
  example = vault.identity.MfaOkta("example",
359
+ org_name="org1",
355
360
  api_token="token1",
356
- base_url="qux.baz.com",
357
- org_name="org1")
361
+ base_url="qux.baz.com")
358
362
  ```
359
- <!--End PulumiCodeChooser -->
360
363
 
361
364
  ## Import
362
365
 
@@ -386,17 +389,15 @@ class MfaOkta(pulumi.CustomResource):
386
389
 
387
390
  ## Example Usage
388
391
 
389
- <!--Start PulumiCodeChooser -->
390
392
  ```python
391
393
  import pulumi
392
394
  import pulumi_vault as vault
393
395
 
394
396
  example = vault.identity.MfaOkta("example",
397
+ org_name="org1",
395
398
  api_token="token1",
396
- base_url="qux.baz.com",
397
- org_name="org1")
399
+ base_url="qux.baz.com")
398
400
  ```
399
- <!--End PulumiCodeChooser -->
400
401
 
401
402
  ## Import
402
403
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaPingidArgs', 'MfaPingid']
@@ -328,14 +333,12 @@ class MfaPingid(pulumi.CustomResource):
328
333
 
329
334
  ## Example Usage
330
335
 
331
- <!--Start PulumiCodeChooser -->
332
336
  ```python
333
337
  import pulumi
334
338
  import pulumi_vault as vault
335
339
 
336
340
  example = vault.identity.MfaPingid("example", settings_file_base64="CnVzZV9iYXNlNjR[...]HBtCg==")
337
341
  ```
338
- <!--End PulumiCodeChooser -->
339
342
 
340
343
  ## Import
341
344
 
@@ -362,14 +365,12 @@ class MfaPingid(pulumi.CustomResource):
362
365
 
363
366
  ## Example Usage
364
367
 
365
- <!--Start PulumiCodeChooser -->
366
368
  ```python
367
369
  import pulumi
368
370
  import pulumi_vault as vault
369
371
 
370
372
  example = vault.identity.MfaPingid("example", settings_file_base64="CnVzZV9iYXNlNjR[...]HBtCg==")
371
373
  ```
372
- <!--End PulumiCodeChooser -->
373
374
 
374
375
  ## Import
375
376
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaTotpArgs', 'MfaTotp']
@@ -446,14 +451,12 @@ class MfaTotp(pulumi.CustomResource):
446
451
 
447
452
  ## Example Usage
448
453
 
449
- <!--Start PulumiCodeChooser -->
450
454
  ```python
451
455
  import pulumi
452
456
  import pulumi_vault as vault
453
457
 
454
458
  example = vault.identity.MfaTotp("example", issuer="issuer1")
455
459
  ```
456
- <!--End PulumiCodeChooser -->
457
460
 
458
461
  ## Import
459
462
 
@@ -486,14 +489,12 @@ class MfaTotp(pulumi.CustomResource):
486
489
 
487
490
  ## Example Usage
488
491
 
489
- <!--Start PulumiCodeChooser -->
490
492
  ```python
491
493
  import pulumi
492
494
  import pulumi_vault as vault
493
495
 
494
496
  example = vault.identity.MfaTotp("example", issuer="issuer1")
495
497
  ```
496
- <!--End PulumiCodeChooser -->
497
498
 
498
499
  ## Import
499
500
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcArgs', 'Oidc']
@@ -24,7 +29,7 @@ class OidcArgs:
24
29
  components.
25
30
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
26
31
  The value should not contain leading or trailing forward slashes.
27
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
32
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
28
33
  *Available only for Vault Enterprise*.
29
34
  """
30
35
  if issuer is not None:
@@ -53,7 +58,7 @@ class OidcArgs:
53
58
  """
54
59
  The namespace to provision the resource in.
55
60
  The value should not contain leading or trailing forward slashes.
56
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
61
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
57
62
  *Available only for Vault Enterprise*.
58
63
  """
59
64
  return pulumi.get(self, "namespace")
@@ -76,7 +81,7 @@ class _OidcState:
76
81
  components.
77
82
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
78
83
  The value should not contain leading or trailing forward slashes.
79
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
84
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
80
85
  *Available only for Vault Enterprise*.
81
86
  """
82
87
  if issuer is not None:
@@ -105,7 +110,7 @@ class _OidcState:
105
110
  """
106
111
  The namespace to provision the resource in.
107
112
  The value should not contain leading or trailing forward slashes.
108
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
113
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
109
114
  *Available only for Vault Enterprise*.
110
115
  """
111
116
  return pulumi.get(self, "namespace")
@@ -133,14 +138,12 @@ class Oidc(pulumi.CustomResource):
133
138
 
134
139
  ## Example Usage
135
140
 
136
- <!--Start PulumiCodeChooser -->
137
141
  ```python
138
142
  import pulumi
139
143
  import pulumi_vault as vault
140
144
 
141
145
  server = vault.identity.Oidc("server", issuer="https://www.acme.com")
142
146
  ```
143
- <!--End PulumiCodeChooser -->
144
147
 
145
148
  :param str resource_name: The name of the resource.
146
149
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -150,7 +153,7 @@ class Oidc(pulumi.CustomResource):
150
153
  components.
151
154
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
152
155
  The value should not contain leading or trailing forward slashes.
153
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
156
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
154
157
  *Available only for Vault Enterprise*.
155
158
  """
156
159
  ...
@@ -169,14 +172,12 @@ class Oidc(pulumi.CustomResource):
169
172
 
170
173
  ## Example Usage
171
174
 
172
- <!--Start PulumiCodeChooser -->
173
175
  ```python
174
176
  import pulumi
175
177
  import pulumi_vault as vault
176
178
 
177
179
  server = vault.identity.Oidc("server", issuer="https://www.acme.com")
178
180
  ```
179
- <!--End PulumiCodeChooser -->
180
181
 
181
182
  :param str resource_name: The name of the resource.
182
183
  :param OidcArgs args: The arguments to use to populate this resource's properties.
@@ -231,7 +232,7 @@ class Oidc(pulumi.CustomResource):
231
232
  components.
232
233
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
233
234
  The value should not contain leading or trailing forward slashes.
234
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
235
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
235
236
  *Available only for Vault Enterprise*.
236
237
  """
237
238
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -259,7 +260,7 @@ class Oidc(pulumi.CustomResource):
259
260
  """
260
261
  The namespace to provision the resource in.
261
262
  The value should not contain leading or trailing forward slashes.
262
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
263
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
263
264
  *Available only for Vault Enterprise*.
264
265
  """
265
266
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcAssignmentArgs', 'OidcAssignment']
@@ -25,7 +30,7 @@ class OidcAssignmentArgs:
25
30
  :param pulumi.Input[str] name: The name of the assignment.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  """
31
36
  if entity_ids is not None:
@@ -79,7 +84,7 @@ class OidcAssignmentArgs:
79
84
  """
80
85
  The namespace to provision the resource in.
81
86
  The value should not contain leading or trailing forward slashes.
82
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
87
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
83
88
  *Available only for Vault Enterprise*.
84
89
  """
85
90
  return pulumi.get(self, "namespace")
@@ -103,7 +108,7 @@ class _OidcAssignmentState:
103
108
  :param pulumi.Input[str] name: The name of the assignment.
104
109
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
105
110
  The value should not contain leading or trailing forward slashes.
106
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
111
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
107
112
  *Available only for Vault Enterprise*.
108
113
  """
109
114
  if entity_ids is not None:
@@ -157,7 +162,7 @@ class _OidcAssignmentState:
157
162
  """
158
163
  The namespace to provision the resource in.
159
164
  The value should not contain leading or trailing forward slashes.
160
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
165
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
161
166
  *Available only for Vault Enterprise*.
162
167
  """
163
168
  return pulumi.get(self, "namespace")
@@ -183,23 +188,25 @@ class OidcAssignment(pulumi.CustomResource):
183
188
 
184
189
  ## Example Usage
185
190
 
186
- <!--Start PulumiCodeChooser -->
187
191
  ```python
188
192
  import pulumi
189
193
  import pulumi_vault as vault
190
194
 
191
195
  internal = vault.identity.Group("internal",
196
+ name="internal",
192
197
  type="internal",
193
198
  policies=[
194
199
  "dev",
195
200
  "test",
196
201
  ])
197
- test = vault.identity.Entity("test", policies=["test"])
202
+ test = vault.identity.Entity("test",
203
+ name="test",
204
+ policies=["test"])
198
205
  default = vault.identity.OidcAssignment("default",
206
+ name="assignment",
199
207
  entity_ids=[test.id],
200
208
  group_ids=[internal.id])
201
209
  ```
202
- <!--End PulumiCodeChooser -->
203
210
 
204
211
  ## Import
205
212
 
@@ -216,7 +223,7 @@ class OidcAssignment(pulumi.CustomResource):
216
223
  :param pulumi.Input[str] name: The name of the assignment.
217
224
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
218
225
  The value should not contain leading or trailing forward slashes.
219
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
226
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
220
227
  *Available only for Vault Enterprise*.
221
228
  """
222
229
  ...
@@ -231,23 +238,25 @@ class OidcAssignment(pulumi.CustomResource):
231
238
 
232
239
  ## Example Usage
233
240
 
234
- <!--Start PulumiCodeChooser -->
235
241
  ```python
236
242
  import pulumi
237
243
  import pulumi_vault as vault
238
244
 
239
245
  internal = vault.identity.Group("internal",
246
+ name="internal",
240
247
  type="internal",
241
248
  policies=[
242
249
  "dev",
243
250
  "test",
244
251
  ])
245
- test = vault.identity.Entity("test", policies=["test"])
252
+ test = vault.identity.Entity("test",
253
+ name="test",
254
+ policies=["test"])
246
255
  default = vault.identity.OidcAssignment("default",
256
+ name="assignment",
247
257
  entity_ids=[test.id],
248
258
  group_ids=[internal.id])
249
259
  ```
250
- <!--End PulumiCodeChooser -->
251
260
 
252
261
  ## Import
253
262
 
@@ -315,7 +324,7 @@ class OidcAssignment(pulumi.CustomResource):
315
324
  :param pulumi.Input[str] name: The name of the assignment.
316
325
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
317
326
  The value should not contain leading or trailing forward slashes.
318
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
327
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
319
328
  *Available only for Vault Enterprise*.
320
329
  """
321
330
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -358,7 +367,7 @@ class OidcAssignment(pulumi.CustomResource):
358
367
  """
359
368
  The namespace to provision the resource in.
360
369
  The value should not contain leading or trailing forward slashes.
361
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
370
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
362
371
  *Available only for Vault Enterprise*.
363
372
  """
364
373
  return pulumi.get(self, "namespace")