pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +10 -6
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -2
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -6
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +24 -16
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +36 -0
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +6 -4
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +190 -63
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -6
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -26
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -6
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -6
- pulumi_vault/quota_rate_limit.py +4 -2
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -0
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
pulumi_vault/mfa_totp.py
CHANGED
@@ -360,18 +360,19 @@ class MfaTotp(pulumi.CustomResource):
|
|
360
360
|
|
361
361
|
## Example Usage
|
362
362
|
|
363
|
+
<!--Start PulumiCodeChooser -->
|
363
364
|
```python
|
364
365
|
import pulumi
|
365
366
|
import pulumi_vault as vault
|
366
367
|
|
367
|
-
my_totp = vault.MfaTotp("
|
368
|
-
name="my_totp",
|
369
|
-
issuer="hashicorp",
|
370
|
-
period=60,
|
368
|
+
my_totp = vault.MfaTotp("myTotp",
|
371
369
|
algorithm="SHA256",
|
372
370
|
digits=8,
|
373
|
-
|
371
|
+
issuer="hashicorp",
|
372
|
+
key_size=20,
|
373
|
+
period=60)
|
374
374
|
```
|
375
|
+
<!--End PulumiCodeChooser -->
|
375
376
|
|
376
377
|
## Import
|
377
378
|
|
@@ -412,18 +413,19 @@ class MfaTotp(pulumi.CustomResource):
|
|
412
413
|
|
413
414
|
## Example Usage
|
414
415
|
|
416
|
+
<!--Start PulumiCodeChooser -->
|
415
417
|
```python
|
416
418
|
import pulumi
|
417
419
|
import pulumi_vault as vault
|
418
420
|
|
419
|
-
my_totp = vault.MfaTotp("
|
420
|
-
name="my_totp",
|
421
|
-
issuer="hashicorp",
|
422
|
-
period=60,
|
421
|
+
my_totp = vault.MfaTotp("myTotp",
|
423
422
|
algorithm="SHA256",
|
424
423
|
digits=8,
|
425
|
-
|
424
|
+
issuer="hashicorp",
|
425
|
+
key_size=20,
|
426
|
+
period=60)
|
426
427
|
```
|
428
|
+
<!--End PulumiCodeChooser -->
|
427
429
|
|
428
430
|
## Import
|
429
431
|
|
@@ -193,6 +193,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
193
193
|
"""
|
194
194
|
## Example Usage
|
195
195
|
|
196
|
+
<!--Start PulumiCodeChooser -->
|
196
197
|
```python
|
197
198
|
import pulumi
|
198
199
|
import pulumi_vault as vault
|
@@ -206,6 +207,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
206
207
|
private_key="privateKey",
|
207
208
|
public_key="publicKey")
|
208
209
|
```
|
210
|
+
<!--End PulumiCodeChooser -->
|
209
211
|
|
210
212
|
## Import
|
211
213
|
|
@@ -234,6 +236,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
234
236
|
"""
|
235
237
|
## Example Usage
|
236
238
|
|
239
|
+
<!--Start PulumiCodeChooser -->
|
237
240
|
```python
|
238
241
|
import pulumi
|
239
242
|
import pulumi_vault as vault
|
@@ -247,6 +250,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
247
250
|
private_key="privateKey",
|
248
251
|
public_key="publicKey")
|
249
252
|
```
|
253
|
+
<!--End PulumiCodeChooser -->
|
250
254
|
|
251
255
|
## Import
|
252
256
|
|
@@ -417,6 +417,7 @@ class SecretRole(pulumi.CustomResource):
|
|
417
417
|
"""
|
418
418
|
## Example Usage
|
419
419
|
|
420
|
+
<!--Start PulumiCodeChooser -->
|
420
421
|
```python
|
421
422
|
import pulumi
|
422
423
|
import pulumi_vault as vault
|
@@ -431,7 +432,6 @@ class SecretRole(pulumi.CustomResource):
|
|
431
432
|
public_key="publicKey")
|
432
433
|
role = vault.mongodbatlas.SecretRole("role",
|
433
434
|
mount=mongo.path,
|
434
|
-
name="tf-test-role",
|
435
435
|
organization_id="7cf5a45a9ccf6400e60981b7",
|
436
436
|
project_id="5cf5a45a9ccf6400e60981b6",
|
437
437
|
roles=["ORG_READ_ONLY"],
|
@@ -441,6 +441,7 @@ class SecretRole(pulumi.CustomResource):
|
|
441
441
|
ttl="60",
|
442
442
|
max_ttl="120")
|
443
443
|
```
|
444
|
+
<!--End PulumiCodeChooser -->
|
444
445
|
|
445
446
|
## Import
|
446
447
|
|
@@ -479,6 +480,7 @@ class SecretRole(pulumi.CustomResource):
|
|
479
480
|
"""
|
480
481
|
## Example Usage
|
481
482
|
|
483
|
+
<!--Start PulumiCodeChooser -->
|
482
484
|
```python
|
483
485
|
import pulumi
|
484
486
|
import pulumi_vault as vault
|
@@ -493,7 +495,6 @@ class SecretRole(pulumi.CustomResource):
|
|
493
495
|
public_key="publicKey")
|
494
496
|
role = vault.mongodbatlas.SecretRole("role",
|
495
497
|
mount=mongo.path,
|
496
|
-
name="tf-test-role",
|
497
498
|
organization_id="7cf5a45a9ccf6400e60981b7",
|
498
499
|
project_id="5cf5a45a9ccf6400e60981b6",
|
499
500
|
roles=["ORG_READ_ONLY"],
|
@@ -503,6 +504,7 @@ class SecretRole(pulumi.CustomResource):
|
|
503
504
|
ttl="60",
|
504
505
|
max_ttl="120")
|
505
506
|
```
|
507
|
+
<!--End PulumiCodeChooser -->
|
506
508
|
|
507
509
|
## Import
|
508
510
|
|
pulumi_vault/mount.py
CHANGED
@@ -493,54 +493,62 @@ class Mount(pulumi.CustomResource):
|
|
493
493
|
|
494
494
|
## Example Usage
|
495
495
|
|
496
|
+
<!--Start PulumiCodeChooser -->
|
496
497
|
```python
|
497
498
|
import pulumi
|
498
499
|
import pulumi_vault as vault
|
499
500
|
|
500
501
|
example = vault.Mount("example",
|
502
|
+
description="This is an example mount",
|
501
503
|
path="dummy",
|
502
|
-
type="generic"
|
503
|
-
description="This is an example mount")
|
504
|
+
type="generic")
|
504
505
|
```
|
506
|
+
<!--End PulumiCodeChooser -->
|
505
507
|
|
508
|
+
<!--Start PulumiCodeChooser -->
|
506
509
|
```python
|
507
510
|
import pulumi
|
508
511
|
import pulumi_vault as vault
|
509
512
|
|
510
513
|
kvv2_example = vault.Mount("kvv2-example",
|
511
|
-
|
512
|
-
type="kv-v2",
|
514
|
+
description="This is an example KV Version 2 secret engine mount",
|
513
515
|
options={
|
514
|
-
"version": "2",
|
515
516
|
"type": "kv-v2",
|
517
|
+
"version": "2",
|
516
518
|
},
|
517
|
-
|
519
|
+
path="version2-example",
|
520
|
+
type="kv-v2")
|
518
521
|
```
|
522
|
+
<!--End PulumiCodeChooser -->
|
519
523
|
|
524
|
+
<!--Start PulumiCodeChooser -->
|
520
525
|
```python
|
521
526
|
import pulumi
|
522
527
|
import pulumi_vault as vault
|
523
528
|
|
524
529
|
transit_example = vault.Mount("transit-example",
|
525
|
-
path="transit-example",
|
526
|
-
type="transit",
|
527
530
|
description="This is an example transit secret engine mount",
|
528
531
|
options={
|
529
532
|
"convergent_encryption": False,
|
530
|
-
}
|
533
|
+
},
|
534
|
+
path="transit-example",
|
535
|
+
type="transit")
|
531
536
|
```
|
537
|
+
<!--End PulumiCodeChooser -->
|
532
538
|
|
539
|
+
<!--Start PulumiCodeChooser -->
|
533
540
|
```python
|
534
541
|
import pulumi
|
535
542
|
import pulumi_vault as vault
|
536
543
|
|
537
544
|
pki_example = vault.Mount("pki-example",
|
538
|
-
path="pki-example",
|
539
|
-
type="pki",
|
540
|
-
description="This is an example PKI mount",
|
541
545
|
default_lease_ttl_seconds=3600,
|
542
|
-
|
546
|
+
description="This is an example PKI mount",
|
547
|
+
max_lease_ttl_seconds=86400,
|
548
|
+
path="pki-example",
|
549
|
+
type="pki")
|
543
550
|
```
|
551
|
+
<!--End PulumiCodeChooser -->
|
544
552
|
|
545
553
|
## Import
|
546
554
|
|
@@ -580,54 +588,62 @@ class Mount(pulumi.CustomResource):
|
|
580
588
|
|
581
589
|
## Example Usage
|
582
590
|
|
591
|
+
<!--Start PulumiCodeChooser -->
|
583
592
|
```python
|
584
593
|
import pulumi
|
585
594
|
import pulumi_vault as vault
|
586
595
|
|
587
596
|
example = vault.Mount("example",
|
597
|
+
description="This is an example mount",
|
588
598
|
path="dummy",
|
589
|
-
type="generic"
|
590
|
-
description="This is an example mount")
|
599
|
+
type="generic")
|
591
600
|
```
|
601
|
+
<!--End PulumiCodeChooser -->
|
592
602
|
|
603
|
+
<!--Start PulumiCodeChooser -->
|
593
604
|
```python
|
594
605
|
import pulumi
|
595
606
|
import pulumi_vault as vault
|
596
607
|
|
597
608
|
kvv2_example = vault.Mount("kvv2-example",
|
598
|
-
|
599
|
-
type="kv-v2",
|
609
|
+
description="This is an example KV Version 2 secret engine mount",
|
600
610
|
options={
|
601
|
-
"version": "2",
|
602
611
|
"type": "kv-v2",
|
612
|
+
"version": "2",
|
603
613
|
},
|
604
|
-
|
614
|
+
path="version2-example",
|
615
|
+
type="kv-v2")
|
605
616
|
```
|
617
|
+
<!--End PulumiCodeChooser -->
|
606
618
|
|
619
|
+
<!--Start PulumiCodeChooser -->
|
607
620
|
```python
|
608
621
|
import pulumi
|
609
622
|
import pulumi_vault as vault
|
610
623
|
|
611
624
|
transit_example = vault.Mount("transit-example",
|
612
|
-
path="transit-example",
|
613
|
-
type="transit",
|
614
625
|
description="This is an example transit secret engine mount",
|
615
626
|
options={
|
616
627
|
"convergent_encryption": False,
|
617
|
-
}
|
628
|
+
},
|
629
|
+
path="transit-example",
|
630
|
+
type="transit")
|
618
631
|
```
|
632
|
+
<!--End PulumiCodeChooser -->
|
619
633
|
|
634
|
+
<!--Start PulumiCodeChooser -->
|
620
635
|
```python
|
621
636
|
import pulumi
|
622
637
|
import pulumi_vault as vault
|
623
638
|
|
624
639
|
pki_example = vault.Mount("pki-example",
|
625
|
-
path="pki-example",
|
626
|
-
type="pki",
|
627
|
-
description="This is an example PKI mount",
|
628
640
|
default_lease_ttl_seconds=3600,
|
629
|
-
|
641
|
+
description="This is an example PKI mount",
|
642
|
+
max_lease_ttl_seconds=86400,
|
643
|
+
path="pki-example",
|
644
|
+
type="pki")
|
630
645
|
```
|
646
|
+
<!--End PulumiCodeChooser -->
|
631
647
|
|
632
648
|
## Import
|
633
649
|
|
@@ -571,20 +571,22 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
571
571
|
"""
|
572
572
|
## Example Usage
|
573
573
|
|
574
|
+
<!--Start PulumiCodeChooser -->
|
574
575
|
```python
|
575
576
|
import pulumi
|
576
577
|
import pulumi_vault as vault
|
577
578
|
|
578
579
|
config = vault.NomadSecretBackend("config",
|
580
|
+
address="https://127.0.0.1:4646",
|
579
581
|
backend="nomad",
|
580
|
-
description="test description",
|
581
582
|
default_lease_ttl_seconds=3600,
|
583
|
+
description="test description",
|
582
584
|
max_lease_ttl_seconds=7200,
|
583
585
|
max_ttl=240,
|
584
|
-
address="https://127.0.0.1:4646",
|
585
586
|
token="ae20ceaa-...",
|
586
587
|
ttl=120)
|
587
588
|
```
|
589
|
+
<!--End PulumiCodeChooser -->
|
588
590
|
|
589
591
|
## Import
|
590
592
|
|
@@ -631,20 +633,22 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
631
633
|
"""
|
632
634
|
## Example Usage
|
633
635
|
|
636
|
+
<!--Start PulumiCodeChooser -->
|
634
637
|
```python
|
635
638
|
import pulumi
|
636
639
|
import pulumi_vault as vault
|
637
640
|
|
638
641
|
config = vault.NomadSecretBackend("config",
|
642
|
+
address="https://127.0.0.1:4646",
|
639
643
|
backend="nomad",
|
640
|
-
description="test description",
|
641
644
|
default_lease_ttl_seconds=3600,
|
645
|
+
description="test description",
|
642
646
|
max_lease_ttl_seconds=7200,
|
643
647
|
max_ttl=240,
|
644
|
-
address="https://127.0.0.1:4646",
|
645
648
|
token="ae20ceaa-...",
|
646
649
|
ttl=120)
|
647
650
|
```
|
651
|
+
<!--End PulumiCodeChooser -->
|
648
652
|
|
649
653
|
## Import
|
650
654
|
|
@@ -260,6 +260,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
260
260
|
"""
|
261
261
|
## Example Usage
|
262
262
|
|
263
|
+
<!--Start PulumiCodeChooser -->
|
263
264
|
```python
|
264
265
|
import pulumi
|
265
266
|
import pulumi_vault as vault
|
@@ -277,6 +278,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
277
278
|
type="client",
|
278
279
|
policies=["readonly"])
|
279
280
|
```
|
281
|
+
<!--End PulumiCodeChooser -->
|
280
282
|
|
281
283
|
## Import
|
282
284
|
|
@@ -311,6 +313,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
311
313
|
"""
|
312
314
|
## Example Usage
|
313
315
|
|
316
|
+
<!--Start PulumiCodeChooser -->
|
314
317
|
```python
|
315
318
|
import pulumi
|
316
319
|
import pulumi_vault as vault
|
@@ -328,6 +331,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
328
331
|
type="client",
|
329
332
|
policies=["readonly"])
|
330
333
|
```
|
334
|
+
<!--End PulumiCodeChooser -->
|
331
335
|
|
332
336
|
## Import
|
333
337
|
|
pulumi_vault/okta/_inputs.py
CHANGED
@@ -20,8 +20,8 @@ class AuthBackendGroupArgs:
|
|
20
20
|
group_name: pulumi.Input[str],
|
21
21
|
policies: pulumi.Input[Sequence[pulumi.Input[str]]]):
|
22
22
|
"""
|
23
|
-
:param pulumi.Input[str] group_name: Name of the Okta
|
24
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies:
|
23
|
+
:param pulumi.Input[str] group_name: Name of the group within the Okta
|
24
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
25
25
|
"""
|
26
26
|
pulumi.set(__self__, "group_name", group_name)
|
27
27
|
pulumi.set(__self__, "policies", policies)
|
@@ -30,7 +30,7 @@ class AuthBackendGroupArgs:
|
|
30
30
|
@pulumi.getter(name="groupName")
|
31
31
|
def group_name(self) -> pulumi.Input[str]:
|
32
32
|
"""
|
33
|
-
Name of the Okta
|
33
|
+
Name of the group within the Okta
|
34
34
|
"""
|
35
35
|
return pulumi.get(self, "group_name")
|
36
36
|
|
@@ -42,7 +42,7 @@ class AuthBackendGroupArgs:
|
|
42
42
|
@pulumi.getter
|
43
43
|
def policies(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
44
44
|
"""
|
45
|
-
|
45
|
+
Vault policies to associate with this group
|
46
46
|
"""
|
47
47
|
return pulumi.get(self, "policies")
|
48
48
|
|
@@ -59,8 +59,8 @@ class AuthBackendUserArgs:
|
|
59
59
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
60
60
|
"""
|
61
61
|
:param pulumi.Input[str] username: Name of the user within Okta
|
62
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups:
|
63
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies:
|
62
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
63
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
64
64
|
"""
|
65
65
|
pulumi.set(__self__, "username", username)
|
66
66
|
if groups is not None:
|
@@ -84,7 +84,7 @@ class AuthBackendUserArgs:
|
|
84
84
|
@pulumi.getter
|
85
85
|
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
86
86
|
"""
|
87
|
-
|
87
|
+
List of Okta groups to associate with this user
|
88
88
|
"""
|
89
89
|
return pulumi.get(self, "groups")
|
90
90
|
|
@@ -96,7 +96,7 @@ class AuthBackendUserArgs:
|
|
96
96
|
@pulumi.getter
|
97
97
|
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
98
98
|
"""
|
99
|
-
|
99
|
+
Vault policies to associate with this group
|
100
100
|
"""
|
101
101
|
return pulumi.get(self, "policies")
|
102
102
|
|
@@ -488,14 +488,13 @@ class AuthBackend(pulumi.CustomResource):
|
|
488
488
|
|
489
489
|
## Example Usage
|
490
490
|
|
491
|
+
<!--Start PulumiCodeChooser -->
|
491
492
|
```python
|
492
493
|
import pulumi
|
493
494
|
import pulumi_vault as vault
|
494
495
|
|
495
496
|
example = vault.okta.AuthBackend("example",
|
496
497
|
description="Demonstration of the Terraform Okta auth backend",
|
497
|
-
organization="example",
|
498
|
-
token="something that should be kept secret",
|
499
498
|
groups=[vault.okta.AuthBackendGroupArgs(
|
500
499
|
group_name="foo",
|
501
500
|
policies=[
|
@@ -503,11 +502,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
503
502
|
"two",
|
504
503
|
],
|
505
504
|
)],
|
505
|
+
organization="example",
|
506
|
+
token="something that should be kept secret",
|
506
507
|
users=[vault.okta.AuthBackendUserArgs(
|
507
|
-
username="bar",
|
508
508
|
groups=["foo"],
|
509
|
+
username="bar",
|
509
510
|
)])
|
510
511
|
```
|
512
|
+
<!--End PulumiCodeChooser -->
|
511
513
|
|
512
514
|
## Import
|
513
515
|
|
@@ -553,14 +555,13 @@ class AuthBackend(pulumi.CustomResource):
|
|
553
555
|
|
554
556
|
## Example Usage
|
555
557
|
|
558
|
+
<!--Start PulumiCodeChooser -->
|
556
559
|
```python
|
557
560
|
import pulumi
|
558
561
|
import pulumi_vault as vault
|
559
562
|
|
560
563
|
example = vault.okta.AuthBackend("example",
|
561
564
|
description="Demonstration of the Terraform Okta auth backend",
|
562
|
-
organization="example",
|
563
|
-
token="something that should be kept secret",
|
564
565
|
groups=[vault.okta.AuthBackendGroupArgs(
|
565
566
|
group_name="foo",
|
566
567
|
policies=[
|
@@ -568,11 +569,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
568
569
|
"two",
|
569
570
|
],
|
570
571
|
)],
|
572
|
+
organization="example",
|
573
|
+
token="something that should be kept secret",
|
571
574
|
users=[vault.okta.AuthBackendUserArgs(
|
572
|
-
username="bar",
|
573
575
|
groups=["foo"],
|
576
|
+
username="bar",
|
574
577
|
)])
|
575
578
|
```
|
579
|
+
<!--End PulumiCodeChooser -->
|
576
580
|
|
577
581
|
## Import
|
578
582
|
|
@@ -181,6 +181,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
181
181
|
|
182
182
|
## Example Usage
|
183
183
|
|
184
|
+
<!--Start PulumiCodeChooser -->
|
184
185
|
```python
|
185
186
|
import pulumi
|
186
187
|
import pulumi_vault as vault
|
@@ -196,6 +197,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
196
197
|
"two",
|
197
198
|
])
|
198
199
|
```
|
200
|
+
<!--End PulumiCodeChooser -->
|
199
201
|
|
200
202
|
## Import
|
201
203
|
|
@@ -227,6 +229,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
227
229
|
|
228
230
|
## Example Usage
|
229
231
|
|
232
|
+
<!--Start PulumiCodeChooser -->
|
230
233
|
```python
|
231
234
|
import pulumi
|
232
235
|
import pulumi_vault as vault
|
@@ -242,6 +245,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
242
245
|
"two",
|
243
246
|
])
|
244
247
|
```
|
248
|
+
<!--End PulumiCodeChooser -->
|
245
249
|
|
246
250
|
## Import
|
247
251
|
|
@@ -214,6 +214,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
214
214
|
|
215
215
|
## Example Usage
|
216
216
|
|
217
|
+
<!--Start PulumiCodeChooser -->
|
217
218
|
```python
|
218
219
|
import pulumi
|
219
220
|
import pulumi_vault as vault
|
@@ -229,6 +230,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
229
230
|
"two",
|
230
231
|
])
|
231
232
|
```
|
233
|
+
<!--End PulumiCodeChooser -->
|
232
234
|
|
233
235
|
## Import
|
234
236
|
|
@@ -261,6 +263,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
261
263
|
|
262
264
|
## Example Usage
|
263
265
|
|
266
|
+
<!--Start PulumiCodeChooser -->
|
264
267
|
```python
|
265
268
|
import pulumi
|
266
269
|
import pulumi_vault as vault
|
@@ -276,6 +279,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
276
279
|
"two",
|
277
280
|
])
|
278
281
|
```
|
282
|
+
<!--End PulumiCodeChooser -->
|
279
283
|
|
280
284
|
## Import
|
281
285
|
|
pulumi_vault/okta/outputs.py
CHANGED
@@ -37,8 +37,8 @@ class AuthBackendGroup(dict):
|
|
37
37
|
group_name: str,
|
38
38
|
policies: Sequence[str]):
|
39
39
|
"""
|
40
|
-
:param str group_name: Name of the Okta
|
41
|
-
:param Sequence[str] policies:
|
40
|
+
:param str group_name: Name of the group within the Okta
|
41
|
+
:param Sequence[str] policies: Vault policies to associate with this group
|
42
42
|
"""
|
43
43
|
pulumi.set(__self__, "group_name", group_name)
|
44
44
|
pulumi.set(__self__, "policies", policies)
|
@@ -47,7 +47,7 @@ class AuthBackendGroup(dict):
|
|
47
47
|
@pulumi.getter(name="groupName")
|
48
48
|
def group_name(self) -> str:
|
49
49
|
"""
|
50
|
-
Name of the Okta
|
50
|
+
Name of the group within the Okta
|
51
51
|
"""
|
52
52
|
return pulumi.get(self, "group_name")
|
53
53
|
|
@@ -55,7 +55,7 @@ class AuthBackendGroup(dict):
|
|
55
55
|
@pulumi.getter
|
56
56
|
def policies(self) -> Sequence[str]:
|
57
57
|
"""
|
58
|
-
|
58
|
+
Vault policies to associate with this group
|
59
59
|
"""
|
60
60
|
return pulumi.get(self, "policies")
|
61
61
|
|
@@ -68,8 +68,8 @@ class AuthBackendUser(dict):
|
|
68
68
|
policies: Optional[Sequence[str]] = None):
|
69
69
|
"""
|
70
70
|
:param str username: Name of the user within Okta
|
71
|
-
:param Sequence[str] groups:
|
72
|
-
:param Sequence[str] policies:
|
71
|
+
:param Sequence[str] groups: List of Okta groups to associate with this user
|
72
|
+
:param Sequence[str] policies: Vault policies to associate with this group
|
73
73
|
"""
|
74
74
|
pulumi.set(__self__, "username", username)
|
75
75
|
if groups is not None:
|
@@ -89,7 +89,7 @@ class AuthBackendUser(dict):
|
|
89
89
|
@pulumi.getter
|
90
90
|
def groups(self) -> Optional[Sequence[str]]:
|
91
91
|
"""
|
92
|
-
|
92
|
+
List of Okta groups to associate with this user
|
93
93
|
"""
|
94
94
|
return pulumi.get(self, "groups")
|
95
95
|
|
@@ -97,7 +97,7 @@ class AuthBackendUser(dict):
|
|
97
97
|
@pulumi.getter
|
98
98
|
def policies(self) -> Optional[Sequence[str]]:
|
99
99
|
"""
|
100
|
-
|
100
|
+
Vault policies to associate with this group
|
101
101
|
"""
|
102
102
|
return pulumi.get(self, "policies")
|
103
103
|
|
pulumi_vault/outputs.py
CHANGED
@@ -277,17 +277,27 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
277
277
|
def __init__(__self__, *,
|
278
278
|
key: str,
|
279
279
|
values: Sequence[str]):
|
280
|
+
"""
|
281
|
+
:param str key: name of permitted or denied parameter.
|
282
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
283
|
+
"""
|
280
284
|
pulumi.set(__self__, "key", key)
|
281
285
|
pulumi.set(__self__, "values", values)
|
282
286
|
|
283
287
|
@property
|
284
288
|
@pulumi.getter
|
285
289
|
def key(self) -> str:
|
290
|
+
"""
|
291
|
+
name of permitted or denied parameter.
|
292
|
+
"""
|
286
293
|
return pulumi.get(self, "key")
|
287
294
|
|
288
295
|
@property
|
289
296
|
@pulumi.getter
|
290
297
|
def values(self) -> Sequence[str]:
|
298
|
+
"""
|
299
|
+
list of values what are permitted or denied by policy rule.
|
300
|
+
"""
|
291
301
|
return pulumi.get(self, "values")
|
292
302
|
|
293
303
|
|
@@ -296,17 +306,27 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
296
306
|
def __init__(__self__, *,
|
297
307
|
key: str,
|
298
308
|
values: Sequence[str]):
|
309
|
+
"""
|
310
|
+
:param str key: name of permitted or denied parameter.
|
311
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
312
|
+
"""
|
299
313
|
pulumi.set(__self__, "key", key)
|
300
314
|
pulumi.set(__self__, "values", values)
|
301
315
|
|
302
316
|
@property
|
303
317
|
@pulumi.getter
|
304
318
|
def key(self) -> str:
|
319
|
+
"""
|
320
|
+
name of permitted or denied parameter.
|
321
|
+
"""
|
305
322
|
return pulumi.get(self, "key")
|
306
323
|
|
307
324
|
@property
|
308
325
|
@pulumi.getter
|
309
326
|
def values(self) -> Sequence[str]:
|
327
|
+
"""
|
328
|
+
list of values what are permitted or denied by policy rule.
|
329
|
+
"""
|
310
330
|
return pulumi.get(self, "values")
|
311
331
|
|
312
332
|
|