pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
pulumi_vault/namespace.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['NamespaceArgs', 'Namespace']
@@ -15,17 +20,17 @@ __all__ = ['NamespaceArgs', 'Namespace']
15
20
  class NamespaceArgs:
16
21
  def __init__(__self__, *,
17
22
  path: pulumi.Input[str],
18
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
23
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
19
24
  namespace: Optional[pulumi.Input[str]] = None,
20
25
  path_fq: Optional[pulumi.Input[str]] = None):
21
26
  """
22
27
  The set of arguments for constructing a Namespace resource.
23
28
  :param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
24
- :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
29
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
25
30
  is `map[string]string`. Requires Vault version 1.12+.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  :param pulumi.Input[str] path_fq: The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
31
36
  The path is relative to the provider's `namespace` argument.
@@ -52,7 +57,7 @@ class NamespaceArgs:
52
57
 
53
58
  @property
54
59
  @pulumi.getter(name="customMetadata")
55
- def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
60
+ def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
56
61
  """
57
62
  Custom metadata describing this namespace. Value type
58
63
  is `map[string]string`. Requires Vault version 1.12+.
@@ -60,7 +65,7 @@ class NamespaceArgs:
60
65
  return pulumi.get(self, "custom_metadata")
61
66
 
62
67
  @custom_metadata.setter
63
- def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
68
+ def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
64
69
  pulumi.set(self, "custom_metadata", value)
65
70
 
66
71
  @property
@@ -69,7 +74,7 @@ class NamespaceArgs:
69
74
  """
70
75
  The namespace to provision the resource in.
71
76
  The value should not contain leading or trailing forward slashes.
72
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
77
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
73
78
  *Available only for Vault Enterprise*.
74
79
  """
75
80
  return pulumi.get(self, "namespace")
@@ -95,18 +100,18 @@ class NamespaceArgs:
95
100
  @pulumi.input_type
96
101
  class _NamespaceState:
97
102
  def __init__(__self__, *,
98
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
103
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
99
104
  namespace: Optional[pulumi.Input[str]] = None,
100
105
  namespace_id: Optional[pulumi.Input[str]] = None,
101
106
  path: Optional[pulumi.Input[str]] = None,
102
107
  path_fq: Optional[pulumi.Input[str]] = None):
103
108
  """
104
109
  Input properties used for looking up and filtering Namespace resources.
105
- :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
110
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
106
111
  is `map[string]string`. Requires Vault version 1.12+.
107
112
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
108
113
  The value should not contain leading or trailing forward slashes.
109
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
114
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
110
115
  *Available only for Vault Enterprise*.
111
116
  :param pulumi.Input[str] namespace_id: Vault server's internal ID of the namespace.
112
117
  :param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
@@ -126,7 +131,7 @@ class _NamespaceState:
126
131
 
127
132
  @property
128
133
  @pulumi.getter(name="customMetadata")
129
- def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
134
+ def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
130
135
  """
131
136
  Custom metadata describing this namespace. Value type
132
137
  is `map[string]string`. Requires Vault version 1.12+.
@@ -134,7 +139,7 @@ class _NamespaceState:
134
139
  return pulumi.get(self, "custom_metadata")
135
140
 
136
141
  @custom_metadata.setter
137
- def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
142
+ def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
138
143
  pulumi.set(self, "custom_metadata", value)
139
144
 
140
145
  @property
@@ -143,7 +148,7 @@ class _NamespaceState:
143
148
  """
144
149
  The namespace to provision the resource in.
145
150
  The value should not contain leading or trailing forward slashes.
146
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
151
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
147
152
  *Available only for Vault Enterprise*.
148
153
  """
149
154
  return pulumi.get(self, "namespace")
@@ -195,7 +200,7 @@ class Namespace(pulumi.CustomResource):
195
200
  def __init__(__self__,
196
201
  resource_name: str,
197
202
  opts: Optional[pulumi.ResourceOptions] = None,
198
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
203
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
199
204
  namespace: Optional[pulumi.Input[str]] = None,
200
205
  path: Optional[pulumi.Input[str]] = None,
201
206
  path_fq: Optional[pulumi.Input[str]] = None,
@@ -253,11 +258,11 @@ class Namespace(pulumi.CustomResource):
253
258
 
254
259
  :param str resource_name: The name of the resource.
255
260
  :param pulumi.ResourceOptions opts: Options for the resource.
256
- :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
261
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
257
262
  is `map[string]string`. Requires Vault version 1.12+.
258
263
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
259
264
  The value should not contain leading or trailing forward slashes.
260
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
265
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
261
266
  *Available only for Vault Enterprise*.
262
267
  :param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
263
268
  :param pulumi.Input[str] path_fq: The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
@@ -335,7 +340,7 @@ class Namespace(pulumi.CustomResource):
335
340
  def _internal_init(__self__,
336
341
  resource_name: str,
337
342
  opts: Optional[pulumi.ResourceOptions] = None,
338
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
343
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
339
344
  namespace: Optional[pulumi.Input[str]] = None,
340
345
  path: Optional[pulumi.Input[str]] = None,
341
346
  path_fq: Optional[pulumi.Input[str]] = None,
@@ -365,7 +370,7 @@ class Namespace(pulumi.CustomResource):
365
370
  def get(resource_name: str,
366
371
  id: pulumi.Input[str],
367
372
  opts: Optional[pulumi.ResourceOptions] = None,
368
- custom_metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
373
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
369
374
  namespace: Optional[pulumi.Input[str]] = None,
370
375
  namespace_id: Optional[pulumi.Input[str]] = None,
371
376
  path: Optional[pulumi.Input[str]] = None,
@@ -377,11 +382,11 @@ class Namespace(pulumi.CustomResource):
377
382
  :param str resource_name: The unique name of the resulting resource.
378
383
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
379
384
  :param pulumi.ResourceOptions opts: Options for the resource.
380
- :param pulumi.Input[Mapping[str, Any]] custom_metadata: Custom metadata describing this namespace. Value type
385
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
381
386
  is `map[string]string`. Requires Vault version 1.12+.
382
387
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
383
388
  The value should not contain leading or trailing forward slashes.
384
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
389
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
385
390
  *Available only for Vault Enterprise*.
386
391
  :param pulumi.Input[str] namespace_id: Vault server's internal ID of the namespace.
387
392
  :param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
@@ -401,7 +406,7 @@ class Namespace(pulumi.CustomResource):
401
406
 
402
407
  @property
403
408
  @pulumi.getter(name="customMetadata")
404
- def custom_metadata(self) -> pulumi.Output[Mapping[str, Any]]:
409
+ def custom_metadata(self) -> pulumi.Output[Mapping[str, str]]:
405
410
  """
406
411
  Custom metadata describing this namespace. Value type
407
412
  is `map[string]string`. Requires Vault version 1.12+.
@@ -414,7 +419,7 @@ class Namespace(pulumi.CustomResource):
414
419
  """
415
420
  The namespace to provision the resource in.
416
421
  The value should not contain leading or trailing forward slashes.
417
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
422
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
418
423
  *Available only for Vault Enterprise*.
419
424
  """
420
425
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
@@ -52,7 +57,7 @@ class NomadSecretBackendArgs:
52
57
  :param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
53
58
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
54
59
  The value should not contain leading or trailing forward slashes.
55
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
60
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
56
61
  *Available only for Vault Enterprise*.
57
62
  :param pulumi.Input[str] token: Specifies the Nomad Management token to use.
58
63
  :param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
@@ -245,7 +250,7 @@ class NomadSecretBackendArgs:
245
250
  """
246
251
  The namespace to provision the resource in.
247
252
  The value should not contain leading or trailing forward slashes.
248
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
253
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
249
254
  *Available only for Vault Enterprise*.
250
255
  """
251
256
  return pulumi.get(self, "namespace")
@@ -320,7 +325,7 @@ class _NomadSecretBackendState:
320
325
  :param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
321
326
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
322
327
  The value should not contain leading or trailing forward slashes.
323
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
328
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
324
329
  *Available only for Vault Enterprise*.
325
330
  :param pulumi.Input[str] token: Specifies the Nomad Management token to use.
326
331
  :param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
@@ -513,7 +518,7 @@ class _NomadSecretBackendState:
513
518
  """
514
519
  The namespace to provision the resource in.
515
520
  The value should not contain leading or trailing forward slashes.
516
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
521
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
517
522
  *Available only for Vault Enterprise*.
518
523
  """
519
524
  return pulumi.get(self, "namespace")
@@ -571,22 +576,20 @@ class NomadSecretBackend(pulumi.CustomResource):
571
576
  """
572
577
  ## Example Usage
573
578
 
574
- <!--Start PulumiCodeChooser -->
575
579
  ```python
576
580
  import pulumi
577
581
  import pulumi_vault as vault
578
582
 
579
583
  config = vault.NomadSecretBackend("config",
580
- address="https://127.0.0.1:4646",
581
584
  backend="nomad",
582
- default_lease_ttl_seconds=3600,
583
585
  description="test description",
586
+ default_lease_ttl_seconds=3600,
584
587
  max_lease_ttl_seconds=7200,
585
588
  max_ttl=240,
589
+ address="https://127.0.0.1:4646",
586
590
  token="ae20ceaa-...",
587
591
  ttl=120)
588
592
  ```
589
- <!--End PulumiCodeChooser -->
590
593
 
591
594
  ## Import
592
595
 
@@ -619,7 +622,7 @@ class NomadSecretBackend(pulumi.CustomResource):
619
622
  :param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
620
623
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
621
624
  The value should not contain leading or trailing forward slashes.
622
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
625
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
623
626
  *Available only for Vault Enterprise*.
624
627
  :param pulumi.Input[str] token: Specifies the Nomad Management token to use.
625
628
  :param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
@@ -633,22 +636,20 @@ class NomadSecretBackend(pulumi.CustomResource):
633
636
  """
634
637
  ## Example Usage
635
638
 
636
- <!--Start PulumiCodeChooser -->
637
639
  ```python
638
640
  import pulumi
639
641
  import pulumi_vault as vault
640
642
 
641
643
  config = vault.NomadSecretBackend("config",
642
- address="https://127.0.0.1:4646",
643
644
  backend="nomad",
644
- default_lease_ttl_seconds=3600,
645
645
  description="test description",
646
+ default_lease_ttl_seconds=3600,
646
647
  max_lease_ttl_seconds=7200,
647
648
  max_ttl=240,
649
+ address="https://127.0.0.1:4646",
648
650
  token="ae20ceaa-...",
649
651
  ttl=120)
650
652
  ```
651
- <!--End PulumiCodeChooser -->
652
653
 
653
654
  ## Import
654
655
 
@@ -767,7 +768,7 @@ class NomadSecretBackend(pulumi.CustomResource):
767
768
  :param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
768
769
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
769
770
  The value should not contain leading or trailing forward slashes.
770
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
771
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
771
772
  *Available only for Vault Enterprise*.
772
773
  :param pulumi.Input[str] token: Specifies the Nomad Management token to use.
773
774
  :param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
@@ -902,7 +903,7 @@ class NomadSecretBackend(pulumi.CustomResource):
902
903
  """
903
904
  The namespace to provision the resource in.
904
905
  The value should not contain leading or trailing forward slashes.
905
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
906
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
906
907
  *Available only for Vault Enterprise*.
907
908
  """
908
909
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
@@ -29,7 +34,7 @@ class NomadSecretRoleArgs:
29
34
  false.
30
35
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
36
  The value should not contain leading or trailing forward slashes.
32
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
38
  *Available only for Vault Enterprise*.
34
39
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
35
40
  when `type` is 'client'.
@@ -91,7 +96,7 @@ class NomadSecretRoleArgs:
91
96
  """
92
97
  The namespace to provision the resource in.
93
98
  The value should not contain leading or trailing forward slashes.
94
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
99
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
95
100
  *Available only for Vault Enterprise*.
96
101
  """
97
102
  return pulumi.get(self, "namespace")
@@ -143,7 +148,7 @@ class _NomadSecretRoleState:
143
148
  false.
144
149
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
145
150
  The value should not contain leading or trailing forward slashes.
146
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
151
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
147
152
  *Available only for Vault Enterprise*.
148
153
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
149
154
  when `type` is 'client'.
@@ -196,7 +201,7 @@ class _NomadSecretRoleState:
196
201
  """
197
202
  The namespace to provision the resource in.
198
203
  The value should not contain leading or trailing forward slashes.
199
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
204
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
200
205
  *Available only for Vault Enterprise*.
201
206
  """
202
207
  return pulumi.get(self, "namespace")
@@ -260,7 +265,6 @@ class NomadSecretRole(pulumi.CustomResource):
260
265
  """
261
266
  ## Example Usage
262
267
 
263
- <!--Start PulumiCodeChooser -->
264
268
  ```python
265
269
  import pulumi
266
270
  import pulumi_vault as vault
@@ -278,7 +282,6 @@ class NomadSecretRole(pulumi.CustomResource):
278
282
  type="client",
279
283
  policies=["readonly"])
280
284
  ```
281
- <!--End PulumiCodeChooser -->
282
285
 
283
286
  ## Import
284
287
 
@@ -295,7 +298,7 @@ class NomadSecretRole(pulumi.CustomResource):
295
298
  false.
296
299
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
297
300
  The value should not contain leading or trailing forward slashes.
298
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
301
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
299
302
  *Available only for Vault Enterprise*.
300
303
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
301
304
  when `type` is 'client'.
@@ -313,7 +316,6 @@ class NomadSecretRole(pulumi.CustomResource):
313
316
  """
314
317
  ## Example Usage
315
318
 
316
- <!--Start PulumiCodeChooser -->
317
319
  ```python
318
320
  import pulumi
319
321
  import pulumi_vault as vault
@@ -331,7 +333,6 @@ class NomadSecretRole(pulumi.CustomResource):
331
333
  type="client",
332
334
  policies=["readonly"])
333
335
  ```
334
- <!--End PulumiCodeChooser -->
335
336
 
336
337
  ## Import
337
338
 
@@ -409,7 +410,7 @@ class NomadSecretRole(pulumi.CustomResource):
409
410
  false.
410
411
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
411
412
  The value should not contain leading or trailing forward slashes.
412
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
413
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
413
414
  *Available only for Vault Enterprise*.
414
415
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
415
416
  when `type` is 'client'.
@@ -453,7 +454,7 @@ class NomadSecretRole(pulumi.CustomResource):
453
454
  """
454
455
  The namespace to provision the resource in.
455
456
  The value should not contain leading or trailing forward slashes.
456
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
457
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
457
458
  *Available only for Vault Enterprise*.
458
459
  """
459
460
  return pulumi.get(self, "namespace")
@@ -4,24 +4,46 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'AuthBackendGroupArgs',
19
+ 'AuthBackendGroupArgsDict',
14
20
  'AuthBackendUserArgs',
21
+ 'AuthBackendUserArgsDict',
15
22
  ]
16
23
 
24
+ MYPY = False
25
+
26
+ if not MYPY:
27
+ class AuthBackendGroupArgsDict(TypedDict):
28
+ group_name: pulumi.Input[str]
29
+ """
30
+ Name of the Okta group
31
+ """
32
+ policies: pulumi.Input[Sequence[pulumi.Input[str]]]
33
+ """
34
+ Policies to associate with this group
35
+ """
36
+ elif False:
37
+ AuthBackendGroupArgsDict: TypeAlias = Mapping[str, Any]
38
+
17
39
  @pulumi.input_type
18
40
  class AuthBackendGroupArgs:
19
41
  def __init__(__self__, *,
20
42
  group_name: pulumi.Input[str],
21
43
  policies: pulumi.Input[Sequence[pulumi.Input[str]]]):
22
44
  """
23
- :param pulumi.Input[str] group_name: Name of the group within the Okta
24
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
45
+ :param pulumi.Input[str] group_name: Name of the Okta group
46
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this group
25
47
  """
26
48
  pulumi.set(__self__, "group_name", group_name)
27
49
  pulumi.set(__self__, "policies", policies)
@@ -30,7 +52,7 @@ class AuthBackendGroupArgs:
30
52
  @pulumi.getter(name="groupName")
31
53
  def group_name(self) -> pulumi.Input[str]:
32
54
  """
33
- Name of the group within the Okta
55
+ Name of the Okta group
34
56
  """
35
57
  return pulumi.get(self, "group_name")
36
58
 
@@ -42,7 +64,7 @@ class AuthBackendGroupArgs:
42
64
  @pulumi.getter
43
65
  def policies(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
44
66
  """
45
- Vault policies to associate with this group
67
+ Policies to associate with this group
46
68
  """
47
69
  return pulumi.get(self, "policies")
48
70
 
@@ -51,6 +73,23 @@ class AuthBackendGroupArgs:
51
73
  pulumi.set(self, "policies", value)
52
74
 
53
75
 
76
+ if not MYPY:
77
+ class AuthBackendUserArgsDict(TypedDict):
78
+ username: pulumi.Input[str]
79
+ """
80
+ Name of the user within Okta
81
+ """
82
+ groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
83
+ """
84
+ Groups within the Okta auth backend to associate with this user
85
+ """
86
+ policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
87
+ """
88
+ Policies to associate with this user
89
+ """
90
+ elif False:
91
+ AuthBackendUserArgsDict: TypeAlias = Mapping[str, Any]
92
+
54
93
  @pulumi.input_type
55
94
  class AuthBackendUserArgs:
56
95
  def __init__(__self__, *,
@@ -59,8 +98,8 @@ class AuthBackendUserArgs:
59
98
  policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
60
99
  """
61
100
  :param pulumi.Input[str] username: Name of the user within Okta
62
- :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
63
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
101
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Groups within the Okta auth backend to associate with this user
102
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this user
64
103
  """
65
104
  pulumi.set(__self__, "username", username)
66
105
  if groups is not None:
@@ -84,7 +123,7 @@ class AuthBackendUserArgs:
84
123
  @pulumi.getter
85
124
  def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
86
125
  """
87
- List of Okta groups to associate with this user
126
+ Groups within the Okta auth backend to associate with this user
88
127
  """
89
128
  return pulumi.get(self, "groups")
90
129
 
@@ -96,7 +135,7 @@ class AuthBackendUserArgs:
96
135
  @pulumi.getter
97
136
  def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
98
137
  """
99
- Vault policies to associate with this group
138
+ Policies to associate with this user
100
139
  """
101
140
  return pulumi.get(self, "policies")
102
141