pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
@@ -24,7 +29,7 @@ class AuthBackendGroupInitArgs:
24
29
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
25
30
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
26
31
  The value should not contain leading or trailing forward slashes.
27
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
32
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
28
33
  *Available only for Vault Enterprise*.
29
34
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
30
35
  """
@@ -65,7 +70,7 @@ class AuthBackendGroupInitArgs:
65
70
  """
66
71
  The namespace to provision the resource in.
67
72
  The value should not contain leading or trailing forward slashes.
68
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
73
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
69
74
  *Available only for Vault Enterprise*.
70
75
  """
71
76
  return pulumi.get(self, "namespace")
@@ -99,7 +104,7 @@ class _AuthBackendGroupState:
99
104
  :param pulumi.Input[str] group_name: Name of the group within the Okta
100
105
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
101
106
  The value should not contain leading or trailing forward slashes.
102
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
107
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
103
108
  *Available only for Vault Enterprise*.
104
109
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
105
110
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
@@ -131,7 +136,7 @@ class _AuthBackendGroupState:
131
136
  """
132
137
  The namespace to provision the resource in.
133
138
  The value should not contain leading or trailing forward slashes.
134
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
139
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
135
140
  *Available only for Vault Enterprise*.
136
141
  """
137
142
  return pulumi.get(self, "namespace")
@@ -181,7 +186,6 @@ class AuthBackendGroup(pulumi.CustomResource):
181
186
 
182
187
  ## Example Usage
183
188
 
184
- <!--Start PulumiCodeChooser -->
185
189
  ```python
186
190
  import pulumi
187
191
  import pulumi_vault as vault
@@ -197,7 +201,6 @@ class AuthBackendGroup(pulumi.CustomResource):
197
201
  "two",
198
202
  ])
199
203
  ```
200
- <!--End PulumiCodeChooser -->
201
204
 
202
205
  ## Import
203
206
 
@@ -212,7 +215,7 @@ class AuthBackendGroup(pulumi.CustomResource):
212
215
  :param pulumi.Input[str] group_name: Name of the group within the Okta
213
216
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
214
217
  The value should not contain leading or trailing forward slashes.
215
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
218
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
216
219
  *Available only for Vault Enterprise*.
217
220
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
218
221
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
@@ -229,7 +232,6 @@ class AuthBackendGroup(pulumi.CustomResource):
229
232
 
230
233
  ## Example Usage
231
234
 
232
- <!--Start PulumiCodeChooser -->
233
235
  ```python
234
236
  import pulumi
235
237
  import pulumi_vault as vault
@@ -245,7 +247,6 @@ class AuthBackendGroup(pulumi.CustomResource):
245
247
  "two",
246
248
  ])
247
249
  ```
248
- <!--End PulumiCodeChooser -->
249
250
 
250
251
  ## Import
251
252
 
@@ -315,7 +316,7 @@ class AuthBackendGroup(pulumi.CustomResource):
315
316
  :param pulumi.Input[str] group_name: Name of the group within the Okta
316
317
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
317
318
  The value should not contain leading or trailing forward slashes.
318
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
319
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
319
320
  *Available only for Vault Enterprise*.
320
321
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
321
322
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
@@ -344,7 +345,7 @@ class AuthBackendGroup(pulumi.CustomResource):
344
345
  """
345
346
  The namespace to provision the resource in.
346
347
  The value should not contain leading or trailing forward slashes.
347
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
348
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
348
349
  *Available only for Vault Enterprise*.
349
350
  """
350
351
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
@@ -26,7 +31,7 @@ class AuthBackendUserInitArgs:
26
31
  :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
27
32
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
28
33
  The value should not contain leading or trailing forward slashes.
29
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
34
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
30
35
  *Available only for Vault Enterprise*.
31
36
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
32
37
  """
@@ -81,7 +86,7 @@ class AuthBackendUserInitArgs:
81
86
  """
82
87
  The namespace to provision the resource in.
83
88
  The value should not contain leading or trailing forward slashes.
84
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
89
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
85
90
  *Available only for Vault Enterprise*.
86
91
  """
87
92
  return pulumi.get(self, "namespace")
@@ -116,7 +121,7 @@ class _AuthBackendUserState:
116
121
  :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
117
122
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
118
123
  The value should not contain leading or trailing forward slashes.
119
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
124
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
120
125
  *Available only for Vault Enterprise*.
121
126
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
122
127
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
@@ -151,7 +156,7 @@ class _AuthBackendUserState:
151
156
  """
152
157
  The namespace to provision the resource in.
153
158
  The value should not contain leading or trailing forward slashes.
154
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
159
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
155
160
  *Available only for Vault Enterprise*.
156
161
  """
157
162
  return pulumi.get(self, "namespace")
@@ -214,7 +219,6 @@ class AuthBackendUser(pulumi.CustomResource):
214
219
 
215
220
  ## Example Usage
216
221
 
217
- <!--Start PulumiCodeChooser -->
218
222
  ```python
219
223
  import pulumi
220
224
  import pulumi_vault as vault
@@ -230,7 +234,6 @@ class AuthBackendUser(pulumi.CustomResource):
230
234
  "two",
231
235
  ])
232
236
  ```
233
- <!--End PulumiCodeChooser -->
234
237
 
235
238
  ## Import
236
239
 
@@ -245,7 +248,7 @@ class AuthBackendUser(pulumi.CustomResource):
245
248
  :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
246
249
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
247
250
  The value should not contain leading or trailing forward slashes.
248
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
251
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
249
252
  *Available only for Vault Enterprise*.
250
253
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
251
254
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
@@ -263,7 +266,6 @@ class AuthBackendUser(pulumi.CustomResource):
263
266
 
264
267
  ## Example Usage
265
268
 
266
- <!--Start PulumiCodeChooser -->
267
269
  ```python
268
270
  import pulumi
269
271
  import pulumi_vault as vault
@@ -279,7 +281,6 @@ class AuthBackendUser(pulumi.CustomResource):
279
281
  "two",
280
282
  ])
281
283
  ```
282
- <!--End PulumiCodeChooser -->
283
284
 
284
285
  ## Import
285
286
 
@@ -352,7 +353,7 @@ class AuthBackendUser(pulumi.CustomResource):
352
353
  :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
353
354
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
354
355
  The value should not contain leading or trailing forward slashes.
355
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
356
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
356
357
  *Available only for Vault Enterprise*.
357
358
  :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
358
359
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
@@ -383,7 +384,7 @@ class AuthBackendUser(pulumi.CustomResource):
383
384
  """
384
385
  The namespace to provision the resource in.
385
386
  The value should not contain leading or trailing forward slashes.
386
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
387
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
387
388
  *Available only for Vault Enterprise*.
388
389
  """
389
390
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -37,8 +42,8 @@ class AuthBackendGroup(dict):
37
42
  group_name: str,
38
43
  policies: Sequence[str]):
39
44
  """
40
- :param str group_name: Name of the group within the Okta
41
- :param Sequence[str] policies: Vault policies to associate with this group
45
+ :param str group_name: Name of the Okta group
46
+ :param Sequence[str] policies: Policies to associate with this group
42
47
  """
43
48
  pulumi.set(__self__, "group_name", group_name)
44
49
  pulumi.set(__self__, "policies", policies)
@@ -47,7 +52,7 @@ class AuthBackendGroup(dict):
47
52
  @pulumi.getter(name="groupName")
48
53
  def group_name(self) -> str:
49
54
  """
50
- Name of the group within the Okta
55
+ Name of the Okta group
51
56
  """
52
57
  return pulumi.get(self, "group_name")
53
58
 
@@ -55,7 +60,7 @@ class AuthBackendGroup(dict):
55
60
  @pulumi.getter
56
61
  def policies(self) -> Sequence[str]:
57
62
  """
58
- Vault policies to associate with this group
63
+ Policies to associate with this group
59
64
  """
60
65
  return pulumi.get(self, "policies")
61
66
 
@@ -68,8 +73,8 @@ class AuthBackendUser(dict):
68
73
  policies: Optional[Sequence[str]] = None):
69
74
  """
70
75
  :param str username: Name of the user within Okta
71
- :param Sequence[str] groups: List of Okta groups to associate with this user
72
- :param Sequence[str] policies: Vault policies to associate with this group
76
+ :param Sequence[str] groups: Groups within the Okta auth backend to associate with this user
77
+ :param Sequence[str] policies: Policies to associate with this user
73
78
  """
74
79
  pulumi.set(__self__, "username", username)
75
80
  if groups is not None:
@@ -89,7 +94,7 @@ class AuthBackendUser(dict):
89
94
  @pulumi.getter
90
95
  def groups(self) -> Optional[Sequence[str]]:
91
96
  """
92
- List of Okta groups to associate with this user
97
+ Groups within the Okta auth backend to associate with this user
93
98
  """
94
99
  return pulumi.get(self, "groups")
95
100
 
@@ -97,7 +102,7 @@ class AuthBackendUser(dict):
97
102
  @pulumi.getter
98
103
  def policies(self) -> Optional[Sequence[str]]:
99
104
  """
100
- Vault policies to associate with this group
105
+ Policies to associate with this user
101
106
  """
102
107
  return pulumi.get(self, "policies")
103
108
 
pulumi_vault/outputs.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
  from . import outputs
12
17
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
@@ -23,7 +28,7 @@ class PasswordPolicyArgs:
23
28
  :param pulumi.Input[str] name: The name of the password policy.
24
29
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
30
  The value should not contain leading or trailing forward slashes.
26
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
31
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
27
32
  *Available only for Vault Enterprise*.
28
33
  """
29
34
  pulumi.set(__self__, "policy", policy)
@@ -62,7 +67,7 @@ class PasswordPolicyArgs:
62
67
  """
63
68
  The namespace to provision the resource in.
64
69
  The value should not contain leading or trailing forward slashes.
65
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
70
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
66
71
  *Available only for Vault Enterprise*.
67
72
  """
68
73
  return pulumi.get(self, "namespace")
@@ -83,7 +88,7 @@ class _PasswordPolicyState:
83
88
  :param pulumi.Input[str] name: The name of the password policy.
84
89
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
85
90
  The value should not contain leading or trailing forward slashes.
86
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
91
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
87
92
  *Available only for Vault Enterprise*.
88
93
  :param pulumi.Input[str] policy: String containing a password policy.
89
94
  """
@@ -112,7 +117,7 @@ class _PasswordPolicyState:
112
117
  """
113
118
  The namespace to provision the resource in.
114
119
  The value should not contain leading or trailing forward slashes.
115
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
120
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
116
121
  *Available only for Vault Enterprise*.
117
122
  """
118
123
  return pulumi.get(self, "namespace")
@@ -150,19 +155,18 @@ class PasswordPolicy(pulumi.CustomResource):
150
155
 
151
156
  ## Example Usage
152
157
 
153
- <!--Start PulumiCodeChooser -->
154
158
  ```python
155
159
  import pulumi
156
160
  import pulumi_vault as vault
157
161
 
158
- alphanumeric = vault.PasswordPolicy("alphanumeric", policy=\"\"\" length = 20
162
+ alphanumeric = vault.PasswordPolicy("alphanumeric",
163
+ name="alphanumeric",
164
+ policy=\"\"\" length = 20
159
165
  rule "charset" {
160
166
  charset = "abcdefghijklmnopqrstuvwxyz0123456789"
161
167
  }
162
-
163
168
  \"\"\")
164
169
  ```
165
- <!--End PulumiCodeChooser -->
166
170
 
167
171
  ## Import
168
172
 
@@ -177,7 +181,7 @@ class PasswordPolicy(pulumi.CustomResource):
177
181
  :param pulumi.Input[str] name: The name of the password policy.
178
182
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
179
183
  The value should not contain leading or trailing forward slashes.
180
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
184
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
181
185
  *Available only for Vault Enterprise*.
182
186
  :param pulumi.Input[str] policy: String containing a password policy.
183
187
  """
@@ -194,19 +198,18 @@ class PasswordPolicy(pulumi.CustomResource):
194
198
 
195
199
  ## Example Usage
196
200
 
197
- <!--Start PulumiCodeChooser -->
198
201
  ```python
199
202
  import pulumi
200
203
  import pulumi_vault as vault
201
204
 
202
- alphanumeric = vault.PasswordPolicy("alphanumeric", policy=\"\"\" length = 20
205
+ alphanumeric = vault.PasswordPolicy("alphanumeric",
206
+ name="alphanumeric",
207
+ policy=\"\"\" length = 20
203
208
  rule "charset" {
204
209
  charset = "abcdefghijklmnopqrstuvwxyz0123456789"
205
210
  }
206
-
207
211
  \"\"\")
208
212
  ```
209
- <!--End PulumiCodeChooser -->
210
213
 
211
214
  ## Import
212
215
 
@@ -271,7 +274,7 @@ class PasswordPolicy(pulumi.CustomResource):
271
274
  :param pulumi.Input[str] name: The name of the password policy.
272
275
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
273
276
  The value should not contain leading or trailing forward slashes.
274
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
277
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
275
278
  *Available only for Vault Enterprise*.
276
279
  :param pulumi.Input[str] policy: String containing a password policy.
277
280
  """
@@ -298,7 +301,7 @@ class PasswordPolicy(pulumi.CustomResource):
298
301
  """
299
302
  The namespace to provision the resource in.
300
303
  The value should not contain leading or trailing forward slashes.
301
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
304
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
302
305
  *Available only for Vault Enterprise*.
303
306
  """
304
307
  return pulumi.get(self, "namespace")
@@ -5,6 +5,9 @@
5
5
  from .. import _utilities
6
6
  import typing
7
7
  # Export this package's modules as members:
8
+ from .backend_config_cluster import *
9
+ from .backend_config_est import *
10
+ from .get_backend_config_est import *
8
11
  from .get_backend_issuer import *
9
12
  from .get_backend_issuers import *
10
13
  from .get_backend_key import *
@@ -4,15 +4,96 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
18
+ 'BackendConfigEstAuthenticatorsArgs',
19
+ 'BackendConfigEstAuthenticatorsArgsDict',
13
20
  'SecretBackendRolePolicyIdentifierArgs',
21
+ 'SecretBackendRolePolicyIdentifierArgsDict',
14
22
  ]
15
23
 
24
+ MYPY = False
25
+
26
+ if not MYPY:
27
+ class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
28
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
29
+ """
30
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
31
+ """
32
+ userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
33
+ """
34
+ "The accessor (required) property for user pass auth backends".
35
+ """
36
+ elif False:
37
+ BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
38
+
39
+ @pulumi.input_type
40
+ class BackendConfigEstAuthenticatorsArgs:
41
+ def __init__(__self__, *,
42
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
43
+ userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
44
+ """
45
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
46
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] userpass: "The accessor (required) property for user pass auth backends".
47
+ """
48
+ if cert is not None:
49
+ pulumi.set(__self__, "cert", cert)
50
+ if userpass is not None:
51
+ pulumi.set(__self__, "userpass", userpass)
52
+
53
+ @property
54
+ @pulumi.getter
55
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
56
+ """
57
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
58
+ """
59
+ return pulumi.get(self, "cert")
60
+
61
+ @cert.setter
62
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
63
+ pulumi.set(self, "cert", value)
64
+
65
+ @property
66
+ @pulumi.getter
67
+ def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
68
+ """
69
+ "The accessor (required) property for user pass auth backends".
70
+ """
71
+ return pulumi.get(self, "userpass")
72
+
73
+ @userpass.setter
74
+ def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
75
+ pulumi.set(self, "userpass", value)
76
+
77
+
78
+ if not MYPY:
79
+ class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
80
+ oid: pulumi.Input[str]
81
+ """
82
+ The OID for the policy identifier
83
+ """
84
+ cps: NotRequired[pulumi.Input[str]]
85
+ """
86
+ The URL of the CPS for the policy identifier
87
+
88
+ Example usage:
89
+ """
90
+ notice: NotRequired[pulumi.Input[str]]
91
+ """
92
+ A notice for the policy identifier
93
+ """
94
+ elif False:
95
+ SecretBackendRolePolicyIdentifierArgsDict: TypeAlias = Mapping[str, Any]
96
+
16
97
  @pulumi.input_type
17
98
  class SecretBackendRolePolicyIdentifierArgs:
18
99
  def __init__(__self__, *,