pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
pulumi_vault/mfa_okta.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaOktaArgs', 'MfaOkta']
|
@@ -33,7 +38,7 @@ class MfaOktaArgs:
|
|
33
38
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
34
39
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
35
40
|
The value should not contain leading or trailing forward slashes.
|
36
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
41
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
37
42
|
*Available only for Vault Enterprise*.
|
38
43
|
:param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
|
39
44
|
primary email for the account.
|
@@ -127,7 +132,7 @@ class MfaOktaArgs:
|
|
127
132
|
"""
|
128
133
|
The namespace to provision the resource in.
|
129
134
|
The value should not contain leading or trailing forward slashes.
|
130
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
135
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
131
136
|
*Available only for Vault Enterprise*.
|
132
137
|
"""
|
133
138
|
return pulumi.get(self, "namespace")
|
@@ -189,7 +194,7 @@ class _MfaOktaState:
|
|
189
194
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
190
195
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
191
196
|
The value should not contain leading or trailing forward slashes.
|
192
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
197
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
193
198
|
*Available only for Vault Enterprise*.
|
194
199
|
:param pulumi.Input[str] org_name: `(string: <required>)` - Name of the organization to be used in the Okta API.
|
195
200
|
:param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
|
@@ -275,7 +280,7 @@ class _MfaOktaState:
|
|
275
280
|
"""
|
276
281
|
The namespace to provision the resource in.
|
277
282
|
The value should not contain leading or trailing forward slashes.
|
278
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
283
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
279
284
|
*Available only for Vault Enterprise*.
|
280
285
|
"""
|
281
286
|
return pulumi.get(self, "namespace")
|
@@ -349,7 +354,6 @@ class MfaOkta(pulumi.CustomResource):
|
|
349
354
|
|
350
355
|
## Example Usage
|
351
356
|
|
352
|
-
<!--Start PulumiCodeChooser -->
|
353
357
|
```python
|
354
358
|
import pulumi
|
355
359
|
import pulumi_vault as vault
|
@@ -357,13 +361,13 @@ class MfaOkta(pulumi.CustomResource):
|
|
357
361
|
userpass = vault.AuthBackend("userpass",
|
358
362
|
type="userpass",
|
359
363
|
path="userpass")
|
360
|
-
my_okta = vault.MfaOkta("
|
364
|
+
my_okta = vault.MfaOkta("my_okta",
|
365
|
+
name="my_okta",
|
361
366
|
mount_accessor=userpass.accessor,
|
362
367
|
username_format="user@example.com",
|
363
368
|
org_name="hashicorp",
|
364
369
|
api_token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9")
|
365
370
|
```
|
366
|
-
<!--End PulumiCodeChooser -->
|
367
371
|
|
368
372
|
## Import
|
369
373
|
|
@@ -383,7 +387,7 @@ class MfaOkta(pulumi.CustomResource):
|
|
383
387
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
384
388
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
385
389
|
The value should not contain leading or trailing forward slashes.
|
386
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
390
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
387
391
|
*Available only for Vault Enterprise*.
|
388
392
|
:param pulumi.Input[str] org_name: `(string: <required>)` - Name of the organization to be used in the Okta API.
|
389
393
|
:param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
|
@@ -409,7 +413,6 @@ class MfaOkta(pulumi.CustomResource):
|
|
409
413
|
|
410
414
|
## Example Usage
|
411
415
|
|
412
|
-
<!--Start PulumiCodeChooser -->
|
413
416
|
```python
|
414
417
|
import pulumi
|
415
418
|
import pulumi_vault as vault
|
@@ -417,13 +420,13 @@ class MfaOkta(pulumi.CustomResource):
|
|
417
420
|
userpass = vault.AuthBackend("userpass",
|
418
421
|
type="userpass",
|
419
422
|
path="userpass")
|
420
|
-
my_okta = vault.MfaOkta("
|
423
|
+
my_okta = vault.MfaOkta("my_okta",
|
424
|
+
name="my_okta",
|
421
425
|
mount_accessor=userpass.accessor,
|
422
426
|
username_format="user@example.com",
|
423
427
|
org_name="hashicorp",
|
424
428
|
api_token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9")
|
425
429
|
```
|
426
|
-
<!--End PulumiCodeChooser -->
|
427
430
|
|
428
431
|
## Import
|
429
432
|
|
@@ -514,7 +517,7 @@ class MfaOkta(pulumi.CustomResource):
|
|
514
517
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
515
518
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
516
519
|
The value should not contain leading or trailing forward slashes.
|
517
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
520
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
518
521
|
*Available only for Vault Enterprise*.
|
519
522
|
:param pulumi.Input[str] org_name: `(string: <required>)` - Name of the organization to be used in the Okta API.
|
520
523
|
:param pulumi.Input[bool] primary_email: `(string: <required>)` - If set to true, the username will only match the
|
@@ -581,7 +584,7 @@ class MfaOkta(pulumi.CustomResource):
|
|
581
584
|
"""
|
582
585
|
The namespace to provision the resource in.
|
583
586
|
The value should not contain leading or trailing forward slashes.
|
584
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
587
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
585
588
|
*Available only for Vault Enterprise*.
|
586
589
|
"""
|
587
590
|
return pulumi.get(self, "namespace")
|
pulumi_vault/mfa_pingid.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaPingidArgs', 'MfaPingid']
|
@@ -28,7 +33,7 @@ class MfaPingidArgs:
|
|
28
33
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
29
34
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
30
35
|
The value should not contain leading or trailing forward slashes.
|
31
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
36
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
32
37
|
*Available only for Vault Enterprise*.
|
33
38
|
:param pulumi.Input[str] username_format: `(string)` - A format string for mapping Identity names to MFA method names.
|
34
39
|
Values to substitute should be placed in `{{}}`. For example, `"{{alias.name}}@example.com"`.
|
@@ -91,7 +96,7 @@ class MfaPingidArgs:
|
|
91
96
|
"""
|
92
97
|
The namespace to provision the resource in.
|
93
98
|
The value should not contain leading or trailing forward slashes.
|
94
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
99
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
95
100
|
*Available only for Vault Enterprise*.
|
96
101
|
"""
|
97
102
|
return pulumi.get(self, "namespace")
|
@@ -144,7 +149,7 @@ class _MfaPingidState:
|
|
144
149
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
145
150
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
146
151
|
The value should not contain leading or trailing forward slashes.
|
147
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
152
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
148
153
|
*Available only for Vault Enterprise*.
|
149
154
|
:param pulumi.Input[str] namespace_id: `(string)` – Namespace ID computed by Vault
|
150
155
|
:param pulumi.Input[str] org_alias: `(string)` – Org Alias computed by Vault
|
@@ -252,7 +257,7 @@ class _MfaPingidState:
|
|
252
257
|
"""
|
253
258
|
The namespace to provision the resource in.
|
254
259
|
The value should not contain leading or trailing forward slashes.
|
255
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
260
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
256
261
|
*Available only for Vault Enterprise*.
|
257
262
|
"""
|
258
263
|
return pulumi.get(self, "namespace")
|
@@ -359,7 +364,6 @@ class MfaPingid(pulumi.CustomResource):
|
|
359
364
|
|
360
365
|
## Example Usage
|
361
366
|
|
362
|
-
<!--Start PulumiCodeChooser -->
|
363
367
|
```python
|
364
368
|
import pulumi
|
365
369
|
import pulumi_vault as vault
|
@@ -369,12 +373,12 @@ class MfaPingid(pulumi.CustomResource):
|
|
369
373
|
userpass = vault.AuthBackend("userpass",
|
370
374
|
type="userpass",
|
371
375
|
path="userpass")
|
372
|
-
my_pingid = vault.MfaPingid("
|
376
|
+
my_pingid = vault.MfaPingid("my_pingid",
|
377
|
+
name="my_pingid",
|
373
378
|
mount_accessor=userpass.accessor,
|
374
379
|
username_format="user@example.com",
|
375
380
|
settings_file_base64=settings_file)
|
376
381
|
```
|
377
|
-
<!--End PulumiCodeChooser -->
|
378
382
|
|
379
383
|
## Import
|
380
384
|
|
@@ -391,7 +395,7 @@ class MfaPingid(pulumi.CustomResource):
|
|
391
395
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
392
396
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
393
397
|
The value should not contain leading or trailing forward slashes.
|
394
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
398
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
395
399
|
*Available only for Vault Enterprise*.
|
396
400
|
:param pulumi.Input[str] settings_file_base64: `(string: <required>)` - A base64-encoded third-party settings file retrieved
|
397
401
|
from PingID's configuration page.
|
@@ -416,7 +420,6 @@ class MfaPingid(pulumi.CustomResource):
|
|
416
420
|
|
417
421
|
## Example Usage
|
418
422
|
|
419
|
-
<!--Start PulumiCodeChooser -->
|
420
423
|
```python
|
421
424
|
import pulumi
|
422
425
|
import pulumi_vault as vault
|
@@ -426,12 +429,12 @@ class MfaPingid(pulumi.CustomResource):
|
|
426
429
|
userpass = vault.AuthBackend("userpass",
|
427
430
|
type="userpass",
|
428
431
|
path="userpass")
|
429
|
-
my_pingid = vault.MfaPingid("
|
432
|
+
my_pingid = vault.MfaPingid("my_pingid",
|
433
|
+
name="my_pingid",
|
430
434
|
mount_accessor=userpass.accessor,
|
431
435
|
username_format="user@example.com",
|
432
436
|
settings_file_base64=settings_file)
|
433
437
|
```
|
434
|
-
<!--End PulumiCodeChooser -->
|
435
438
|
|
436
439
|
## Import
|
437
440
|
|
@@ -523,7 +526,7 @@ class MfaPingid(pulumi.CustomResource):
|
|
523
526
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
524
527
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
525
528
|
The value should not contain leading or trailing forward slashes.
|
526
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
529
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
527
530
|
*Available only for Vault Enterprise*.
|
528
531
|
:param pulumi.Input[str] namespace_id: `(string)` – Namespace ID computed by Vault
|
529
532
|
:param pulumi.Input[str] org_alias: `(string)` – Org Alias computed by Vault
|
@@ -604,7 +607,7 @@ class MfaPingid(pulumi.CustomResource):
|
|
604
607
|
"""
|
605
608
|
The namespace to provision the resource in.
|
606
609
|
The value should not contain leading or trailing forward slashes.
|
607
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
610
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
608
611
|
*Available only for Vault Enterprise*.
|
609
612
|
"""
|
610
613
|
return pulumi.get(self, "namespace")
|
pulumi_vault/mfa_totp.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaTotpArgs', 'MfaTotp']
|
@@ -34,7 +39,7 @@ class MfaTotpArgs:
|
|
34
39
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
35
40
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
36
41
|
The value should not contain leading or trailing forward slashes.
|
37
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
42
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
43
|
*Available only for Vault Enterprise*.
|
39
44
|
:param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
|
40
45
|
:param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
|
@@ -127,7 +132,7 @@ class MfaTotpArgs:
|
|
127
132
|
"""
|
128
133
|
The namespace to provision the resource in.
|
129
134
|
The value should not contain leading or trailing forward slashes.
|
130
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
135
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
131
136
|
*Available only for Vault Enterprise*.
|
132
137
|
"""
|
133
138
|
return pulumi.get(self, "namespace")
|
@@ -197,7 +202,7 @@ class _MfaTotpState:
|
|
197
202
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
198
203
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
199
204
|
The value should not contain leading or trailing forward slashes.
|
200
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
205
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
201
206
|
*Available only for Vault Enterprise*.
|
202
207
|
:param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
|
203
208
|
:param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
|
@@ -291,7 +296,7 @@ class _MfaTotpState:
|
|
291
296
|
"""
|
292
297
|
The namespace to provision the resource in.
|
293
298
|
The value should not contain leading or trailing forward slashes.
|
294
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
299
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
295
300
|
*Available only for Vault Enterprise*.
|
296
301
|
"""
|
297
302
|
return pulumi.get(self, "namespace")
|
@@ -360,19 +365,18 @@ class MfaTotp(pulumi.CustomResource):
|
|
360
365
|
|
361
366
|
## Example Usage
|
362
367
|
|
363
|
-
<!--Start PulumiCodeChooser -->
|
364
368
|
```python
|
365
369
|
import pulumi
|
366
370
|
import pulumi_vault as vault
|
367
371
|
|
368
|
-
my_totp = vault.MfaTotp("
|
372
|
+
my_totp = vault.MfaTotp("my_totp",
|
373
|
+
name="my_totp",
|
374
|
+
issuer="hashicorp",
|
375
|
+
period=60,
|
369
376
|
algorithm="SHA256",
|
370
377
|
digits=8,
|
371
|
-
|
372
|
-
key_size=20,
|
373
|
-
period=60)
|
378
|
+
key_size=20)
|
374
379
|
```
|
375
|
-
<!--End PulumiCodeChooser -->
|
376
380
|
|
377
381
|
## Import
|
378
382
|
|
@@ -393,7 +397,7 @@ class MfaTotp(pulumi.CustomResource):
|
|
393
397
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
394
398
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
395
399
|
The value should not contain leading or trailing forward slashes.
|
396
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
400
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
397
401
|
*Available only for Vault Enterprise*.
|
398
402
|
:param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
|
399
403
|
:param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
|
@@ -413,19 +417,18 @@ class MfaTotp(pulumi.CustomResource):
|
|
413
417
|
|
414
418
|
## Example Usage
|
415
419
|
|
416
|
-
<!--Start PulumiCodeChooser -->
|
417
420
|
```python
|
418
421
|
import pulumi
|
419
422
|
import pulumi_vault as vault
|
420
423
|
|
421
|
-
my_totp = vault.MfaTotp("
|
424
|
+
my_totp = vault.MfaTotp("my_totp",
|
425
|
+
name="my_totp",
|
426
|
+
issuer="hashicorp",
|
427
|
+
period=60,
|
422
428
|
algorithm="SHA256",
|
423
429
|
digits=8,
|
424
|
-
|
425
|
-
key_size=20,
|
426
|
-
period=60)
|
430
|
+
key_size=20)
|
427
431
|
```
|
428
|
-
<!--End PulumiCodeChooser -->
|
429
432
|
|
430
433
|
## Import
|
431
434
|
|
@@ -514,7 +517,7 @@ class MfaTotp(pulumi.CustomResource):
|
|
514
517
|
:param pulumi.Input[str] name: `(string: <required>)` – Name of the MFA method.
|
515
518
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
516
519
|
The value should not contain leading or trailing forward slashes.
|
517
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
520
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
518
521
|
*Available only for Vault Enterprise*.
|
519
522
|
:param pulumi.Input[int] period: `(int)` - The length of time used to generate a counter for the TOTP token calculation.
|
520
523
|
:param pulumi.Input[int] qr_size: `(int)` - The pixel size of the generated square QR code.
|
@@ -584,7 +587,7 @@ class MfaTotp(pulumi.CustomResource):
|
|
584
587
|
"""
|
585
588
|
The namespace to provision the resource in.
|
586
589
|
The value should not contain leading or trailing forward slashes.
|
587
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
590
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
588
591
|
*Available only for Vault Enterprise*.
|
589
592
|
"""
|
590
593
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -25,7 +30,7 @@ class SecretBackendArgs:
|
|
25
30
|
:param pulumi.Input[str] public_key: Specifies the Public API Key used to authenticate with the MongoDB Atlas API.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
"""
|
31
36
|
pulumi.set(__self__, "mount", mount)
|
@@ -76,7 +81,7 @@ class SecretBackendArgs:
|
|
76
81
|
"""
|
77
82
|
The namespace to provision the resource in.
|
78
83
|
The value should not contain leading or trailing forward slashes.
|
79
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
84
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
80
85
|
*Available only for Vault Enterprise*.
|
81
86
|
"""
|
82
87
|
return pulumi.get(self, "namespace")
|
@@ -99,7 +104,7 @@ class _SecretBackendState:
|
|
99
104
|
:param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
100
105
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
101
106
|
The value should not contain leading or trailing forward slashes.
|
102
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
107
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
103
108
|
*Available only for Vault Enterprise*.
|
104
109
|
:param pulumi.Input[str] path: Path where MongoDB Atlas configuration is located
|
105
110
|
:param pulumi.Input[str] private_key: Specifies the Private API Key used to authenticate with the MongoDB Atlas API.
|
@@ -134,7 +139,7 @@ class _SecretBackendState:
|
|
134
139
|
"""
|
135
140
|
The namespace to provision the resource in.
|
136
141
|
The value should not contain leading or trailing forward slashes.
|
137
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
142
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
138
143
|
*Available only for Vault Enterprise*.
|
139
144
|
"""
|
140
145
|
return pulumi.get(self, "namespace")
|
@@ -193,21 +198,19 @@ class SecretBackend(pulumi.CustomResource):
|
|
193
198
|
"""
|
194
199
|
## Example Usage
|
195
200
|
|
196
|
-
<!--Start PulumiCodeChooser -->
|
197
201
|
```python
|
198
202
|
import pulumi
|
199
203
|
import pulumi_vault as vault
|
200
204
|
|
201
205
|
mongo = vault.Mount("mongo",
|
202
|
-
description="MongoDB Atlas secret engine mount",
|
203
206
|
path="mongodbatlas",
|
204
|
-
type="mongodbatlas"
|
207
|
+
type="mongodbatlas",
|
208
|
+
description="MongoDB Atlas secret engine mount")
|
205
209
|
config = vault.mongodbatlas.SecretBackend("config",
|
206
|
-
mount=
|
210
|
+
mount=mongo.path,
|
207
211
|
private_key="privateKey",
|
208
212
|
public_key="publicKey")
|
209
213
|
```
|
210
|
-
<!--End PulumiCodeChooser -->
|
211
214
|
|
212
215
|
## Import
|
213
216
|
|
@@ -222,7 +225,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
222
225
|
:param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
223
226
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
224
227
|
The value should not contain leading or trailing forward slashes.
|
225
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
228
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
226
229
|
*Available only for Vault Enterprise*.
|
227
230
|
:param pulumi.Input[str] private_key: Specifies the Private API Key used to authenticate with the MongoDB Atlas API.
|
228
231
|
:param pulumi.Input[str] public_key: Specifies the Public API Key used to authenticate with the MongoDB Atlas API.
|
@@ -236,21 +239,19 @@ class SecretBackend(pulumi.CustomResource):
|
|
236
239
|
"""
|
237
240
|
## Example Usage
|
238
241
|
|
239
|
-
<!--Start PulumiCodeChooser -->
|
240
242
|
```python
|
241
243
|
import pulumi
|
242
244
|
import pulumi_vault as vault
|
243
245
|
|
244
246
|
mongo = vault.Mount("mongo",
|
245
|
-
description="MongoDB Atlas secret engine mount",
|
246
247
|
path="mongodbatlas",
|
247
|
-
type="mongodbatlas"
|
248
|
+
type="mongodbatlas",
|
249
|
+
description="MongoDB Atlas secret engine mount")
|
248
250
|
config = vault.mongodbatlas.SecretBackend("config",
|
249
|
-
mount=
|
251
|
+
mount=mongo.path,
|
250
252
|
private_key="privateKey",
|
251
253
|
public_key="publicKey")
|
252
254
|
```
|
253
|
-
<!--End PulumiCodeChooser -->
|
254
255
|
|
255
256
|
## Import
|
256
257
|
|
@@ -324,7 +325,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
324
325
|
:param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
325
326
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
326
327
|
The value should not contain leading or trailing forward slashes.
|
327
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
328
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
328
329
|
*Available only for Vault Enterprise*.
|
329
330
|
:param pulumi.Input[str] path: Path where MongoDB Atlas configuration is located
|
330
331
|
:param pulumi.Input[str] private_key: Specifies the Private API Key used to authenticate with the MongoDB Atlas API.
|
@@ -355,7 +356,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
355
356
|
"""
|
356
357
|
The namespace to provision the resource in.
|
357
358
|
The value should not contain leading or trailing forward slashes.
|
358
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
359
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
359
360
|
*Available only for Vault Enterprise*.
|
360
361
|
"""
|
361
362
|
return pulumi.get(self, "namespace")
|