pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/mfa_okta.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaOktaArgs', 'MfaOkta']
@@ -33,7 +38,7 @@ class MfaOktaArgs:
33
38
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
34
39
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
35
40
  The value should not contain leading or trailing forward slashes.
36
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
41
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
37
42
  *Available only for Vault Enterprise*.
38
43
  :param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
39
44
  primary email for the account.
@@ -127,7 +132,7 @@ class MfaOktaArgs:
127
132
  """
128
133
  The namespace to provision the resource in.
129
134
  The value should not contain leading or trailing forward slashes.
130
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
135
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
131
136
  *Available only for Vault Enterprise*.
132
137
  """
133
138
  return pulumi.get(self, "namespace")
@@ -189,7 +194,7 @@ class _MfaOktaState:
189
194
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
190
195
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
191
196
  The value should not contain leading or trailing forward slashes.
192
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
197
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
193
198
  *Available only for Vault Enterprise*.
194
199
  :param pulumi.Input[str] org_name: `(string: <required>)` - Name of the organization to be used in the Okta API.
195
200
  :param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
@@ -275,7 +280,7 @@ class _MfaOktaState:
275
280
  """
276
281
  The namespace to provision the resource in.
277
282
  The value should not contain leading or trailing forward slashes.
278
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
283
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
279
284
  *Available only for Vault Enterprise*.
280
285
  """
281
286
  return pulumi.get(self, "namespace")
@@ -349,7 +354,6 @@ class MfaOkta(pulumi.CustomResource):
349
354
 
350
355
  ## Example Usage
351
356
 
352
- <!--Start PulumiCodeChooser -->
353
357
  ```python
354
358
  import pulumi
355
359
  import pulumi_vault as vault
@@ -357,13 +361,13 @@ class MfaOkta(pulumi.CustomResource):
357
361
  userpass = vault.AuthBackend("userpass",
358
362
  type="userpass",
359
363
  path="userpass")
360
- my_okta = vault.MfaOkta("myOkta",
364
+ my_okta = vault.MfaOkta("my_okta",
365
+ name="my_okta",
361
366
  mount_accessor=userpass.accessor,
362
367
  username_format="user@example.com",
363
368
  org_name="hashicorp",
364
369
  api_token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9")
365
370
  ```
366
- <!--End PulumiCodeChooser -->
367
371
 
368
372
  ## Import
369
373
 
@@ -383,7 +387,7 @@ class MfaOkta(pulumi.CustomResource):
383
387
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
384
388
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
385
389
  The value should not contain leading or trailing forward slashes.
386
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
390
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
387
391
  *Available only for Vault Enterprise*.
388
392
  :param pulumi.Input[str] org_name: `(string: <required>)` - Name of the organization to be used in the Okta API.
389
393
  :param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
@@ -409,7 +413,6 @@ class MfaOkta(pulumi.CustomResource):
409
413
 
410
414
  ## Example Usage
411
415
 
412
- <!--Start PulumiCodeChooser -->
413
416
  ```python
414
417
  import pulumi
415
418
  import pulumi_vault as vault
@@ -417,13 +420,13 @@ class MfaOkta(pulumi.CustomResource):
417
420
  userpass = vault.AuthBackend("userpass",
418
421
  type="userpass",
419
422
  path="userpass")
420
- my_okta = vault.MfaOkta("myOkta",
423
+ my_okta = vault.MfaOkta("my_okta",
424
+ name="my_okta",
421
425
  mount_accessor=userpass.accessor,
422
426
  username_format="user@example.com",
423
427
  org_name="hashicorp",
424
428
  api_token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9")
425
429
  ```
426
- <!--End PulumiCodeChooser -->
427
430
 
428
431
  ## Import
429
432
 
@@ -514,7 +517,7 @@ class MfaOkta(pulumi.CustomResource):
514
517
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
515
518
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
516
519
  The value should not contain leading or trailing forward slashes.
517
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
520
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
518
521
  *Available only for Vault Enterprise*.
519
522
  :param pulumi.Input[str] org_name: `(string: <required>)` - Name of the organization to be used in the Okta API.
520
523
  :param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
@@ -581,7 +584,7 @@ class MfaOkta(pulumi.CustomResource):
581
584
  """
582
585
  The namespace to provision the resource in.
583
586
  The value should not contain leading or trailing forward slashes.
584
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
587
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
585
588
  *Available only for Vault Enterprise*.
586
589
  """
587
590
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaPingidArgs', 'MfaPingid']
@@ -28,7 +33,7 @@ class MfaPingidArgs:
28
33
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
29
34
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
30
35
  The value should not contain leading or trailing forward slashes.
31
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
36
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
32
37
  *Available only for Vault Enterprise*.
33
38
  :param pulumi.Input[str] username_format: `(string)` - A format string for mapping Identity names to MFA method names.
34
39
  Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
@@ -91,7 +96,7 @@ class MfaPingidArgs:
91
96
  """
92
97
  The namespace to provision the resource in.
93
98
  The value should not contain leading or trailing forward slashes.
94
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
99
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
95
100
  *Available only for Vault Enterprise*.
96
101
  """
97
102
  return pulumi.get(self, "namespace")
@@ -144,7 +149,7 @@ class _MfaPingidState:
144
149
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
145
150
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
146
151
  The value should not contain leading or trailing forward slashes.
147
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
152
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
148
153
  *Available only for Vault Enterprise*.
149
154
  :param pulumi.Input[str] namespace_id: `(string)` – Namespace ID computed by Vault
150
155
  :param pulumi.Input[str] org_alias: `(string)` – Org Alias computed by Vault
@@ -252,7 +257,7 @@ class _MfaPingidState:
252
257
  """
253
258
  The namespace to provision the resource in.
254
259
  The value should not contain leading or trailing forward slashes.
255
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
260
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
256
261
  *Available only for Vault Enterprise*.
257
262
  """
258
263
  return pulumi.get(self, "namespace")
@@ -359,7 +364,6 @@ class MfaPingid(pulumi.CustomResource):
359
364
 
360
365
  ## Example Usage
361
366
 
362
- <!--Start PulumiCodeChooser -->
363
367
  ```python
364
368
  import pulumi
365
369
  import pulumi_vault as vault
@@ -369,12 +373,12 @@ class MfaPingid(pulumi.CustomResource):
369
373
  userpass = vault.AuthBackend("userpass",
370
374
  type="userpass",
371
375
  path="userpass")
372
- my_pingid = vault.MfaPingid("myPingid",
376
+ my_pingid = vault.MfaPingid("my_pingid",
377
+ name="my_pingid",
373
378
  mount_accessor=userpass.accessor,
374
379
  username_format="user@example.com",
375
380
  settings_file_base64=settings_file)
376
381
  ```
377
- <!--End PulumiCodeChooser -->
378
382
 
379
383
  ## Import
380
384
 
@@ -391,7 +395,7 @@ class MfaPingid(pulumi.CustomResource):
391
395
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
392
396
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
393
397
  The value should not contain leading or trailing forward slashes.
394
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
398
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
395
399
  *Available only for Vault Enterprise*.
396
400
  :param pulumi.Input[str] settings_file_base64: `(string: <required>)` - A base64-encoded third-party settings file retrieved
397
401
  from PingID's configuration page.
@@ -416,7 +420,6 @@ class MfaPingid(pulumi.CustomResource):
416
420
 
417
421
  ## Example Usage
418
422
 
419
- <!--Start PulumiCodeChooser -->
420
423
  ```python
421
424
  import pulumi
422
425
  import pulumi_vault as vault
@@ -426,12 +429,12 @@ class MfaPingid(pulumi.CustomResource):
426
429
  userpass = vault.AuthBackend("userpass",
427
430
  type="userpass",
428
431
  path="userpass")
429
- my_pingid = vault.MfaPingid("myPingid",
432
+ my_pingid = vault.MfaPingid("my_pingid",
433
+ name="my_pingid",
430
434
  mount_accessor=userpass.accessor,
431
435
  username_format="user@example.com",
432
436
  settings_file_base64=settings_file)
433
437
  ```
434
- <!--End PulumiCodeChooser -->
435
438
 
436
439
  ## Import
437
440
 
@@ -523,7 +526,7 @@ class MfaPingid(pulumi.CustomResource):
523
526
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
524
527
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
525
528
  The value should not contain leading or trailing forward slashes.
526
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
529
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
527
530
  *Available only for Vault Enterprise*.
528
531
  :param pulumi.Input[str] namespace_id: `(string)` – Namespace ID computed by Vault
529
532
  :param pulumi.Input[str] org_alias: `(string)` – Org Alias computed by Vault
@@ -604,7 +607,7 @@ class MfaPingid(pulumi.CustomResource):
604
607
  """
605
608
  The namespace to provision the resource in.
606
609
  The value should not contain leading or trailing forward slashes.
607
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
610
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
608
611
  *Available only for Vault Enterprise*.
609
612
  """
610
613
  return pulumi.get(self, "namespace")
pulumi_vault/mfa_totp.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['MfaTotpArgs', 'MfaTotp']
@@ -34,7 +39,7 @@ class MfaTotpArgs:
34
39
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
35
40
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
36
41
  The value should not contain leading or trailing forward slashes.
37
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
42
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
43
  *Available only for Vault Enterprise*.
39
44
  :param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
40
45
  :param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
@@ -127,7 +132,7 @@ class MfaTotpArgs:
127
132
  """
128
133
  The namespace to provision the resource in.
129
134
  The value should not contain leading or trailing forward slashes.
130
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
135
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
131
136
  *Available only for Vault Enterprise*.
132
137
  """
133
138
  return pulumi.get(self, "namespace")
@@ -197,7 +202,7 @@ class _MfaTotpState:
197
202
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
198
203
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
199
204
  The value should not contain leading or trailing forward slashes.
200
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
205
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
201
206
  *Available only for Vault Enterprise*.
202
207
  :param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
203
208
  :param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
@@ -291,7 +296,7 @@ class _MfaTotpState:
291
296
  """
292
297
  The namespace to provision the resource in.
293
298
  The value should not contain leading or trailing forward slashes.
294
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
299
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
295
300
  *Available only for Vault Enterprise*.
296
301
  """
297
302
  return pulumi.get(self, "namespace")
@@ -360,19 +365,18 @@ class MfaTotp(pulumi.CustomResource):
360
365
 
361
366
  ## Example Usage
362
367
 
363
- <!--Start PulumiCodeChooser -->
364
368
  ```python
365
369
  import pulumi
366
370
  import pulumi_vault as vault
367
371
 
368
- my_totp = vault.MfaTotp("myTotp",
372
+ my_totp = vault.MfaTotp("my_totp",
373
+ name="my_totp",
374
+ issuer="hashicorp",
375
+ period=60,
369
376
  algorithm="SHA256",
370
377
  digits=8,
371
- issuer="hashicorp",
372
- key_size=20,
373
- period=60)
378
+ key_size=20)
374
379
  ```
375
- <!--End PulumiCodeChooser -->
376
380
 
377
381
  ## Import
378
382
 
@@ -393,7 +397,7 @@ class MfaTotp(pulumi.CustomResource):
393
397
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
394
398
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
395
399
  The value should not contain leading or trailing forward slashes.
396
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
400
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
397
401
  *Available only for Vault Enterprise*.
398
402
  :param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
399
403
  :param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
@@ -413,19 +417,18 @@ class MfaTotp(pulumi.CustomResource):
413
417
 
414
418
  ## Example Usage
415
419
 
416
- <!--Start PulumiCodeChooser -->
417
420
  ```python
418
421
  import pulumi
419
422
  import pulumi_vault as vault
420
423
 
421
- my_totp = vault.MfaTotp("myTotp",
424
+ my_totp = vault.MfaTotp("my_totp",
425
+ name="my_totp",
426
+ issuer="hashicorp",
427
+ period=60,
422
428
  algorithm="SHA256",
423
429
  digits=8,
424
- issuer="hashicorp",
425
- key_size=20,
426
- period=60)
430
+ key_size=20)
427
431
  ```
428
- <!--End PulumiCodeChooser -->
429
432
 
430
433
  ## Import
431
434
 
@@ -514,7 +517,7 @@ class MfaTotp(pulumi.CustomResource):
514
517
  :param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
515
518
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
516
519
  The value should not contain leading or trailing forward slashes.
517
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
520
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
518
521
  *Available only for Vault Enterprise*.
519
522
  :param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
520
523
  :param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
@@ -584,7 +587,7 @@ class MfaTotp(pulumi.CustomResource):
584
587
  """
585
588
  The namespace to provision the resource in.
586
589
  The value should not contain leading or trailing forward slashes.
587
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
590
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
588
591
  *Available only for Vault Enterprise*.
589
592
  """
590
593
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendArgs', 'SecretBackend']
@@ -25,7 +30,7 @@ class SecretBackendArgs:
25
30
  :param pulumi.Input[str] public_key: Specifies the Public API Key used to authenticate with the MongoDB Atlas API.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  """
31
36
  pulumi.set(__self__, "mount", mount)
@@ -76,7 +81,7 @@ class SecretBackendArgs:
76
81
  """
77
82
  The namespace to provision the resource in.
78
83
  The value should not contain leading or trailing forward slashes.
79
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
84
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
80
85
  *Available only for Vault Enterprise*.
81
86
  """
82
87
  return pulumi.get(self, "namespace")
@@ -99,7 +104,7 @@ class _SecretBackendState:
99
104
  :param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
100
105
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
101
106
  The value should not contain leading or trailing forward slashes.
102
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
107
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
103
108
  *Available only for Vault Enterprise*.
104
109
  :param pulumi.Input[str] path: Path where MongoDB Atlas configuration is located
105
110
  :param pulumi.Input[str] private_key: Specifies the Private API Key used to authenticate with the MongoDB Atlas API.
@@ -134,7 +139,7 @@ class _SecretBackendState:
134
139
  """
135
140
  The namespace to provision the resource in.
136
141
  The value should not contain leading or trailing forward slashes.
137
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
142
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
138
143
  *Available only for Vault Enterprise*.
139
144
  """
140
145
  return pulumi.get(self, "namespace")
@@ -193,21 +198,19 @@ class SecretBackend(pulumi.CustomResource):
193
198
  """
194
199
  ## Example Usage
195
200
 
196
- <!--Start PulumiCodeChooser -->
197
201
  ```python
198
202
  import pulumi
199
203
  import pulumi_vault as vault
200
204
 
201
205
  mongo = vault.Mount("mongo",
202
- description="MongoDB Atlas secret engine mount",
203
206
  path="mongodbatlas",
204
- type="mongodbatlas")
207
+ type="mongodbatlas",
208
+ description="MongoDB Atlas secret engine mount")
205
209
  config = vault.mongodbatlas.SecretBackend("config",
206
- mount="vault_mount.mongo.path",
210
+ mount=mongo.path,
207
211
  private_key="privateKey",
208
212
  public_key="publicKey")
209
213
  ```
210
- <!--End PulumiCodeChooser -->
211
214
 
212
215
  ## Import
213
216
 
@@ -222,7 +225,7 @@ class SecretBackend(pulumi.CustomResource):
222
225
  :param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
223
226
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
224
227
  The value should not contain leading or trailing forward slashes.
225
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
228
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
226
229
  *Available only for Vault Enterprise*.
227
230
  :param pulumi.Input[str] private_key: Specifies the Private API Key used to authenticate with the MongoDB Atlas API.
228
231
  :param pulumi.Input[str] public_key: Specifies the Public API Key used to authenticate with the MongoDB Atlas API.
@@ -236,21 +239,19 @@ class SecretBackend(pulumi.CustomResource):
236
239
  """
237
240
  ## Example Usage
238
241
 
239
- <!--Start PulumiCodeChooser -->
240
242
  ```python
241
243
  import pulumi
242
244
  import pulumi_vault as vault
243
245
 
244
246
  mongo = vault.Mount("mongo",
245
- description="MongoDB Atlas secret engine mount",
246
247
  path="mongodbatlas",
247
- type="mongodbatlas")
248
+ type="mongodbatlas",
249
+ description="MongoDB Atlas secret engine mount")
248
250
  config = vault.mongodbatlas.SecretBackend("config",
249
- mount="vault_mount.mongo.path",
251
+ mount=mongo.path,
250
252
  private_key="privateKey",
251
253
  public_key="publicKey")
252
254
  ```
253
- <!--End PulumiCodeChooser -->
254
255
 
255
256
  ## Import
256
257
 
@@ -324,7 +325,7 @@ class SecretBackend(pulumi.CustomResource):
324
325
  :param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
325
326
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
326
327
  The value should not contain leading or trailing forward slashes.
327
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
328
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
328
329
  *Available only for Vault Enterprise*.
329
330
  :param pulumi.Input[str] path: Path where MongoDB Atlas configuration is located
330
331
  :param pulumi.Input[str] private_key: Specifies the Private API Key used to authenticate with the MongoDB Atlas API.
@@ -355,7 +356,7 @@ class SecretBackend(pulumi.CustomResource):
355
356
  """
356
357
  The namespace to provision the resource in.
357
358
  The value should not contain leading or trailing forward slashes.
358
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
359
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
359
360
  *Available only for Vault Enterprise*.
360
361
  """
361
362
  return pulumi.get(self, "namespace")