pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
|
@@ -24,7 +29,7 @@ class AuthBackendGroupInitArgs:
|
|
24
29
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
25
30
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
26
31
|
The value should not contain leading or trailing forward slashes.
|
27
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
32
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
28
33
|
*Available only for Vault Enterprise*.
|
29
34
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
30
35
|
"""
|
@@ -65,7 +70,7 @@ class AuthBackendGroupInitArgs:
|
|
65
70
|
"""
|
66
71
|
The namespace to provision the resource in.
|
67
72
|
The value should not contain leading or trailing forward slashes.
|
68
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
73
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
69
74
|
*Available only for Vault Enterprise*.
|
70
75
|
"""
|
71
76
|
return pulumi.get(self, "namespace")
|
@@ -99,7 +104,7 @@ class _AuthBackendGroupState:
|
|
99
104
|
:param pulumi.Input[str] group_name: Name of the group within the Okta
|
100
105
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
101
106
|
The value should not contain leading or trailing forward slashes.
|
102
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
107
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
103
108
|
*Available only for Vault Enterprise*.
|
104
109
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
105
110
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
@@ -131,7 +136,7 @@ class _AuthBackendGroupState:
|
|
131
136
|
"""
|
132
137
|
The namespace to provision the resource in.
|
133
138
|
The value should not contain leading or trailing forward slashes.
|
134
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
139
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
135
140
|
*Available only for Vault Enterprise*.
|
136
141
|
"""
|
137
142
|
return pulumi.get(self, "namespace")
|
@@ -181,7 +186,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
181
186
|
|
182
187
|
## Example Usage
|
183
188
|
|
184
|
-
<!--Start PulumiCodeChooser -->
|
185
189
|
```python
|
186
190
|
import pulumi
|
187
191
|
import pulumi_vault as vault
|
@@ -197,7 +201,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
197
201
|
"two",
|
198
202
|
])
|
199
203
|
```
|
200
|
-
<!--End PulumiCodeChooser -->
|
201
204
|
|
202
205
|
## Import
|
203
206
|
|
@@ -212,7 +215,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
212
215
|
:param pulumi.Input[str] group_name: Name of the group within the Okta
|
213
216
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
214
217
|
The value should not contain leading or trailing forward slashes.
|
215
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
218
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
216
219
|
*Available only for Vault Enterprise*.
|
217
220
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
218
221
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
@@ -229,7 +232,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
229
232
|
|
230
233
|
## Example Usage
|
231
234
|
|
232
|
-
<!--Start PulumiCodeChooser -->
|
233
235
|
```python
|
234
236
|
import pulumi
|
235
237
|
import pulumi_vault as vault
|
@@ -245,7 +247,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
245
247
|
"two",
|
246
248
|
])
|
247
249
|
```
|
248
|
-
<!--End PulumiCodeChooser -->
|
249
250
|
|
250
251
|
## Import
|
251
252
|
|
@@ -315,7 +316,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
315
316
|
:param pulumi.Input[str] group_name: Name of the group within the Okta
|
316
317
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
317
318
|
The value should not contain leading or trailing forward slashes.
|
318
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
319
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
319
320
|
*Available only for Vault Enterprise*.
|
320
321
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
321
322
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
@@ -344,7 +345,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
344
345
|
"""
|
345
346
|
The namespace to provision the resource in.
|
346
347
|
The value should not contain leading or trailing forward slashes.
|
347
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
348
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
348
349
|
*Available only for Vault Enterprise*.
|
349
350
|
"""
|
350
351
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
|
@@ -26,7 +31,7 @@ class AuthBackendUserInitArgs:
|
|
26
31
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
27
32
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
28
33
|
The value should not contain leading or trailing forward slashes.
|
29
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
34
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
30
35
|
*Available only for Vault Enterprise*.
|
31
36
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
|
32
37
|
"""
|
@@ -81,7 +86,7 @@ class AuthBackendUserInitArgs:
|
|
81
86
|
"""
|
82
87
|
The namespace to provision the resource in.
|
83
88
|
The value should not contain leading or trailing forward slashes.
|
84
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
89
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
85
90
|
*Available only for Vault Enterprise*.
|
86
91
|
"""
|
87
92
|
return pulumi.get(self, "namespace")
|
@@ -116,7 +121,7 @@ class _AuthBackendUserState:
|
|
116
121
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
117
122
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
118
123
|
The value should not contain leading or trailing forward slashes.
|
119
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
124
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
120
125
|
*Available only for Vault Enterprise*.
|
121
126
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
122
127
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
|
@@ -151,7 +156,7 @@ class _AuthBackendUserState:
|
|
151
156
|
"""
|
152
157
|
The namespace to provision the resource in.
|
153
158
|
The value should not contain leading or trailing forward slashes.
|
154
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
159
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
155
160
|
*Available only for Vault Enterprise*.
|
156
161
|
"""
|
157
162
|
return pulumi.get(self, "namespace")
|
@@ -214,7 +219,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
214
219
|
|
215
220
|
## Example Usage
|
216
221
|
|
217
|
-
<!--Start PulumiCodeChooser -->
|
218
222
|
```python
|
219
223
|
import pulumi
|
220
224
|
import pulumi_vault as vault
|
@@ -230,7 +234,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
230
234
|
"two",
|
231
235
|
])
|
232
236
|
```
|
233
|
-
<!--End PulumiCodeChooser -->
|
234
237
|
|
235
238
|
## Import
|
236
239
|
|
@@ -245,7 +248,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
245
248
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
246
249
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
247
250
|
The value should not contain leading or trailing forward slashes.
|
248
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
251
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
249
252
|
*Available only for Vault Enterprise*.
|
250
253
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
251
254
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
|
@@ -263,7 +266,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
263
266
|
|
264
267
|
## Example Usage
|
265
268
|
|
266
|
-
<!--Start PulumiCodeChooser -->
|
267
269
|
```python
|
268
270
|
import pulumi
|
269
271
|
import pulumi_vault as vault
|
@@ -279,7 +281,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
279
281
|
"two",
|
280
282
|
])
|
281
283
|
```
|
282
|
-
<!--End PulumiCodeChooser -->
|
283
284
|
|
284
285
|
## Import
|
285
286
|
|
@@ -352,7 +353,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
352
353
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
353
354
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
354
355
|
The value should not contain leading or trailing forward slashes.
|
355
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
356
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
356
357
|
*Available only for Vault Enterprise*.
|
357
358
|
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
358
359
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
|
@@ -383,7 +384,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
383
384
|
"""
|
384
385
|
The namespace to provision the resource in.
|
385
386
|
The value should not contain leading or trailing forward slashes.
|
386
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
387
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
387
388
|
*Available only for Vault Enterprise*.
|
388
389
|
"""
|
389
390
|
return pulumi.get(self, "namespace")
|
pulumi_vault/okta/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -37,8 +42,8 @@ class AuthBackendGroup(dict):
|
|
37
42
|
group_name: str,
|
38
43
|
policies: Sequence[str]):
|
39
44
|
"""
|
40
|
-
:param str group_name: Name of the group
|
41
|
-
:param Sequence[str] policies:
|
45
|
+
:param str group_name: Name of the Okta group
|
46
|
+
:param Sequence[str] policies: Policies to associate with this group
|
42
47
|
"""
|
43
48
|
pulumi.set(__self__, "group_name", group_name)
|
44
49
|
pulumi.set(__self__, "policies", policies)
|
@@ -47,7 +52,7 @@ class AuthBackendGroup(dict):
|
|
47
52
|
@pulumi.getter(name="groupName")
|
48
53
|
def group_name(self) -> str:
|
49
54
|
"""
|
50
|
-
Name of the group
|
55
|
+
Name of the Okta group
|
51
56
|
"""
|
52
57
|
return pulumi.get(self, "group_name")
|
53
58
|
|
@@ -55,7 +60,7 @@ class AuthBackendGroup(dict):
|
|
55
60
|
@pulumi.getter
|
56
61
|
def policies(self) -> Sequence[str]:
|
57
62
|
"""
|
58
|
-
|
63
|
+
Policies to associate with this group
|
59
64
|
"""
|
60
65
|
return pulumi.get(self, "policies")
|
61
66
|
|
@@ -68,8 +73,8 @@ class AuthBackendUser(dict):
|
|
68
73
|
policies: Optional[Sequence[str]] = None):
|
69
74
|
"""
|
70
75
|
:param str username: Name of the user within Okta
|
71
|
-
:param Sequence[str] groups:
|
72
|
-
:param Sequence[str] policies:
|
76
|
+
:param Sequence[str] groups: Groups within the Okta auth backend to associate with this user
|
77
|
+
:param Sequence[str] policies: Policies to associate with this user
|
73
78
|
"""
|
74
79
|
pulumi.set(__self__, "username", username)
|
75
80
|
if groups is not None:
|
@@ -89,7 +94,7 @@ class AuthBackendUser(dict):
|
|
89
94
|
@pulumi.getter
|
90
95
|
def groups(self) -> Optional[Sequence[str]]:
|
91
96
|
"""
|
92
|
-
|
97
|
+
Groups within the Okta auth backend to associate with this user
|
93
98
|
"""
|
94
99
|
return pulumi.get(self, "groups")
|
95
100
|
|
@@ -97,7 +102,7 @@ class AuthBackendUser(dict):
|
|
97
102
|
@pulumi.getter
|
98
103
|
def policies(self) -> Optional[Sequence[str]]:
|
99
104
|
"""
|
100
|
-
|
105
|
+
Policies to associate with this user
|
101
106
|
"""
|
102
107
|
return pulumi.get(self, "policies")
|
103
108
|
|
pulumi_vault/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
from . import outputs
|
12
17
|
|
pulumi_vault/password_policy.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
|
@@ -23,7 +28,7 @@ class PasswordPolicyArgs:
|
|
23
28
|
:param pulumi.Input[str] name: The name of the password policy.
|
24
29
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
25
30
|
The value should not contain leading or trailing forward slashes.
|
26
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
31
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
27
32
|
*Available only for Vault Enterprise*.
|
28
33
|
"""
|
29
34
|
pulumi.set(__self__, "policy", policy)
|
@@ -62,7 +67,7 @@ class PasswordPolicyArgs:
|
|
62
67
|
"""
|
63
68
|
The namespace to provision the resource in.
|
64
69
|
The value should not contain leading or trailing forward slashes.
|
65
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
70
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
66
71
|
*Available only for Vault Enterprise*.
|
67
72
|
"""
|
68
73
|
return pulumi.get(self, "namespace")
|
@@ -83,7 +88,7 @@ class _PasswordPolicyState:
|
|
83
88
|
:param pulumi.Input[str] name: The name of the password policy.
|
84
89
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
85
90
|
The value should not contain leading or trailing forward slashes.
|
86
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
91
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
87
92
|
*Available only for Vault Enterprise*.
|
88
93
|
:param pulumi.Input[str] policy: String containing a password policy.
|
89
94
|
"""
|
@@ -112,7 +117,7 @@ class _PasswordPolicyState:
|
|
112
117
|
"""
|
113
118
|
The namespace to provision the resource in.
|
114
119
|
The value should not contain leading or trailing forward slashes.
|
115
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
120
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
116
121
|
*Available only for Vault Enterprise*.
|
117
122
|
"""
|
118
123
|
return pulumi.get(self, "namespace")
|
@@ -150,19 +155,18 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
150
155
|
|
151
156
|
## Example Usage
|
152
157
|
|
153
|
-
<!--Start PulumiCodeChooser -->
|
154
158
|
```python
|
155
159
|
import pulumi
|
156
160
|
import pulumi_vault as vault
|
157
161
|
|
158
|
-
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
162
|
+
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
163
|
+
name="alphanumeric",
|
164
|
+
policy=\"\"\" length = 20
|
159
165
|
rule "charset" {
|
160
166
|
charset = "abcdefghijklmnopqrstuvwxyz0123456789"
|
161
167
|
}
|
162
|
-
|
163
168
|
\"\"\")
|
164
169
|
```
|
165
|
-
<!--End PulumiCodeChooser -->
|
166
170
|
|
167
171
|
## Import
|
168
172
|
|
@@ -177,7 +181,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
177
181
|
:param pulumi.Input[str] name: The name of the password policy.
|
178
182
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
179
183
|
The value should not contain leading or trailing forward slashes.
|
180
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
184
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
181
185
|
*Available only for Vault Enterprise*.
|
182
186
|
:param pulumi.Input[str] policy: String containing a password policy.
|
183
187
|
"""
|
@@ -194,19 +198,18 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
194
198
|
|
195
199
|
## Example Usage
|
196
200
|
|
197
|
-
<!--Start PulumiCodeChooser -->
|
198
201
|
```python
|
199
202
|
import pulumi
|
200
203
|
import pulumi_vault as vault
|
201
204
|
|
202
|
-
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
205
|
+
alphanumeric = vault.PasswordPolicy("alphanumeric",
|
206
|
+
name="alphanumeric",
|
207
|
+
policy=\"\"\" length = 20
|
203
208
|
rule "charset" {
|
204
209
|
charset = "abcdefghijklmnopqrstuvwxyz0123456789"
|
205
210
|
}
|
206
|
-
|
207
211
|
\"\"\")
|
208
212
|
```
|
209
|
-
<!--End PulumiCodeChooser -->
|
210
213
|
|
211
214
|
## Import
|
212
215
|
|
@@ -271,7 +274,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
271
274
|
:param pulumi.Input[str] name: The name of the password policy.
|
272
275
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
273
276
|
The value should not contain leading or trailing forward slashes.
|
274
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
277
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
275
278
|
*Available only for Vault Enterprise*.
|
276
279
|
:param pulumi.Input[str] policy: String containing a password policy.
|
277
280
|
"""
|
@@ -298,7 +301,7 @@ class PasswordPolicy(pulumi.CustomResource):
|
|
298
301
|
"""
|
299
302
|
The namespace to provision the resource in.
|
300
303
|
The value should not contain leading or trailing forward slashes.
|
301
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
304
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
302
305
|
*Available only for Vault Enterprise*.
|
303
306
|
"""
|
304
307
|
return pulumi.get(self, "namespace")
|
@@ -5,6 +5,9 @@
|
|
5
5
|
from .. import _utilities
|
6
6
|
import typing
|
7
7
|
# Export this package's modules as members:
|
8
|
+
from .backend_config_cluster import *
|
9
|
+
from .backend_config_est import *
|
10
|
+
from .get_backend_config_est import *
|
8
11
|
from .get_backend_issuer import *
|
9
12
|
from .get_backend_issuers import *
|
10
13
|
from .get_backend_key import *
|
@@ -4,15 +4,96 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
18
|
+
'BackendConfigEstAuthenticatorsArgs',
|
19
|
+
'BackendConfigEstAuthenticatorsArgsDict',
|
13
20
|
'SecretBackendRolePolicyIdentifierArgs',
|
21
|
+
'SecretBackendRolePolicyIdentifierArgsDict',
|
14
22
|
]
|
15
23
|
|
24
|
+
MYPY = False
|
25
|
+
|
26
|
+
if not MYPY:
|
27
|
+
class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
|
28
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
29
|
+
"""
|
30
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
31
|
+
"""
|
32
|
+
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
33
|
+
"""
|
34
|
+
"The accessor (required) property for user pass auth backends".
|
35
|
+
"""
|
36
|
+
elif False:
|
37
|
+
BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
|
38
|
+
|
39
|
+
@pulumi.input_type
|
40
|
+
class BackendConfigEstAuthenticatorsArgs:
|
41
|
+
def __init__(__self__, *,
|
42
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
43
|
+
userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
|
44
|
+
"""
|
45
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
46
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] userpass: "The accessor (required) property for user pass auth backends".
|
47
|
+
"""
|
48
|
+
if cert is not None:
|
49
|
+
pulumi.set(__self__, "cert", cert)
|
50
|
+
if userpass is not None:
|
51
|
+
pulumi.set(__self__, "userpass", userpass)
|
52
|
+
|
53
|
+
@property
|
54
|
+
@pulumi.getter
|
55
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
56
|
+
"""
|
57
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
58
|
+
"""
|
59
|
+
return pulumi.get(self, "cert")
|
60
|
+
|
61
|
+
@cert.setter
|
62
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
63
|
+
pulumi.set(self, "cert", value)
|
64
|
+
|
65
|
+
@property
|
66
|
+
@pulumi.getter
|
67
|
+
def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
68
|
+
"""
|
69
|
+
"The accessor (required) property for user pass auth backends".
|
70
|
+
"""
|
71
|
+
return pulumi.get(self, "userpass")
|
72
|
+
|
73
|
+
@userpass.setter
|
74
|
+
def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
75
|
+
pulumi.set(self, "userpass", value)
|
76
|
+
|
77
|
+
|
78
|
+
if not MYPY:
|
79
|
+
class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
|
80
|
+
oid: pulumi.Input[str]
|
81
|
+
"""
|
82
|
+
The OID for the policy identifier
|
83
|
+
"""
|
84
|
+
cps: NotRequired[pulumi.Input[str]]
|
85
|
+
"""
|
86
|
+
The URL of the CPS for the policy identifier
|
87
|
+
|
88
|
+
Example usage:
|
89
|
+
"""
|
90
|
+
notice: NotRequired[pulumi.Input[str]]
|
91
|
+
"""
|
92
|
+
A notice for the policy identifier
|
93
|
+
"""
|
94
|
+
elif False:
|
95
|
+
SecretBackendRolePolicyIdentifierArgsDict: TypeAlias = Mapping[str, Any]
|
96
|
+
|
16
97
|
@pulumi.input_type
|
17
98
|
class SecretBackendRolePolicyIdentifierArgs:
|
18
99
|
def __init__(__self__, *,
|