pulumi-vault 6.2.0a1713339773__py3-none-any.whl → 6.2.0a1713905519__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +2 -4
- pulumi_vault/terraformcloud/secret_role.py +2 -4
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1713905519.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713339773.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/top_level.txt +0 -0
pulumi_vault/mfa_totp.py
CHANGED
@@ -360,19 +360,18 @@ class MfaTotp(pulumi.CustomResource):
|
|
360
360
|
|
361
361
|
## Example Usage
|
362
362
|
|
363
|
-
<!--Start PulumiCodeChooser -->
|
364
363
|
```python
|
365
364
|
import pulumi
|
366
365
|
import pulumi_vault as vault
|
367
366
|
|
368
|
-
my_totp = vault.MfaTotp("
|
367
|
+
my_totp = vault.MfaTotp("my_totp",
|
368
|
+
name="my_totp",
|
369
|
+
issuer="hashicorp",
|
370
|
+
period=60,
|
369
371
|
algorithm="SHA256",
|
370
372
|
digits=8,
|
371
|
-
|
372
|
-
key_size=20,
|
373
|
-
period=60)
|
373
|
+
key_size=20)
|
374
374
|
```
|
375
|
-
<!--End PulumiCodeChooser -->
|
376
375
|
|
377
376
|
## Import
|
378
377
|
|
@@ -413,19 +412,18 @@ class MfaTotp(pulumi.CustomResource):
|
|
413
412
|
|
414
413
|
## Example Usage
|
415
414
|
|
416
|
-
<!--Start PulumiCodeChooser -->
|
417
415
|
```python
|
418
416
|
import pulumi
|
419
417
|
import pulumi_vault as vault
|
420
418
|
|
421
|
-
my_totp = vault.MfaTotp("
|
419
|
+
my_totp = vault.MfaTotp("my_totp",
|
420
|
+
name="my_totp",
|
421
|
+
issuer="hashicorp",
|
422
|
+
period=60,
|
422
423
|
algorithm="SHA256",
|
423
424
|
digits=8,
|
424
|
-
|
425
|
-
key_size=20,
|
426
|
-
period=60)
|
425
|
+
key_size=20)
|
427
426
|
```
|
428
|
-
<!--End PulumiCodeChooser -->
|
429
427
|
|
430
428
|
## Import
|
431
429
|
|
@@ -193,7 +193,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
193
193
|
"""
|
194
194
|
## Example Usage
|
195
195
|
|
196
|
-
<!--Start PulumiCodeChooser -->
|
197
196
|
```python
|
198
197
|
import pulumi
|
199
198
|
import pulumi_vault as vault
|
@@ -207,7 +206,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
207
206
|
private_key="privateKey",
|
208
207
|
public_key="publicKey")
|
209
208
|
```
|
210
|
-
<!--End PulumiCodeChooser -->
|
211
209
|
|
212
210
|
## Import
|
213
211
|
|
@@ -236,7 +234,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
236
234
|
"""
|
237
235
|
## Example Usage
|
238
236
|
|
239
|
-
<!--Start PulumiCodeChooser -->
|
240
237
|
```python
|
241
238
|
import pulumi
|
242
239
|
import pulumi_vault as vault
|
@@ -250,7 +247,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
250
247
|
private_key="privateKey",
|
251
248
|
public_key="publicKey")
|
252
249
|
```
|
253
|
-
<!--End PulumiCodeChooser -->
|
254
250
|
|
255
251
|
## Import
|
256
252
|
|
@@ -417,7 +417,6 @@ class SecretRole(pulumi.CustomResource):
|
|
417
417
|
"""
|
418
418
|
## Example Usage
|
419
419
|
|
420
|
-
<!--Start PulumiCodeChooser -->
|
421
420
|
```python
|
422
421
|
import pulumi
|
423
422
|
import pulumi_vault as vault
|
@@ -432,6 +431,7 @@ class SecretRole(pulumi.CustomResource):
|
|
432
431
|
public_key="publicKey")
|
433
432
|
role = vault.mongodbatlas.SecretRole("role",
|
434
433
|
mount=mongo.path,
|
434
|
+
name="tf-test-role",
|
435
435
|
organization_id="7cf5a45a9ccf6400e60981b7",
|
436
436
|
project_id="5cf5a45a9ccf6400e60981b6",
|
437
437
|
roles=["ORG_READ_ONLY"],
|
@@ -441,7 +441,6 @@ class SecretRole(pulumi.CustomResource):
|
|
441
441
|
ttl="60",
|
442
442
|
max_ttl="120")
|
443
443
|
```
|
444
|
-
<!--End PulumiCodeChooser -->
|
445
444
|
|
446
445
|
## Import
|
447
446
|
|
@@ -480,7 +479,6 @@ class SecretRole(pulumi.CustomResource):
|
|
480
479
|
"""
|
481
480
|
## Example Usage
|
482
481
|
|
483
|
-
<!--Start PulumiCodeChooser -->
|
484
482
|
```python
|
485
483
|
import pulumi
|
486
484
|
import pulumi_vault as vault
|
@@ -495,6 +493,7 @@ class SecretRole(pulumi.CustomResource):
|
|
495
493
|
public_key="publicKey")
|
496
494
|
role = vault.mongodbatlas.SecretRole("role",
|
497
495
|
mount=mongo.path,
|
496
|
+
name="tf-test-role",
|
498
497
|
organization_id="7cf5a45a9ccf6400e60981b7",
|
499
498
|
project_id="5cf5a45a9ccf6400e60981b6",
|
500
499
|
roles=["ORG_READ_ONLY"],
|
@@ -504,7 +503,6 @@ class SecretRole(pulumi.CustomResource):
|
|
504
503
|
ttl="60",
|
505
504
|
max_ttl="120")
|
506
505
|
```
|
507
|
-
<!--End PulumiCodeChooser -->
|
508
506
|
|
509
507
|
## Import
|
510
508
|
|
pulumi_vault/mount.py
CHANGED
@@ -493,62 +493,54 @@ class Mount(pulumi.CustomResource):
|
|
493
493
|
|
494
494
|
## Example Usage
|
495
495
|
|
496
|
-
<!--Start PulumiCodeChooser -->
|
497
496
|
```python
|
498
497
|
import pulumi
|
499
498
|
import pulumi_vault as vault
|
500
499
|
|
501
500
|
example = vault.Mount("example",
|
502
|
-
description="This is an example mount",
|
503
501
|
path="dummy",
|
504
|
-
type="generic"
|
502
|
+
type="generic",
|
503
|
+
description="This is an example mount")
|
505
504
|
```
|
506
|
-
<!--End PulumiCodeChooser -->
|
507
505
|
|
508
|
-
<!--Start PulumiCodeChooser -->
|
509
506
|
```python
|
510
507
|
import pulumi
|
511
508
|
import pulumi_vault as vault
|
512
509
|
|
513
510
|
kvv2_example = vault.Mount("kvv2-example",
|
514
|
-
|
511
|
+
path="version2-example",
|
512
|
+
type="kv-v2",
|
515
513
|
options={
|
516
|
-
"type": "kv-v2",
|
517
514
|
"version": "2",
|
515
|
+
"type": "kv-v2",
|
518
516
|
},
|
519
|
-
|
520
|
-
type="kv-v2")
|
517
|
+
description="This is an example KV Version 2 secret engine mount")
|
521
518
|
```
|
522
|
-
<!--End PulumiCodeChooser -->
|
523
519
|
|
524
|
-
<!--Start PulumiCodeChooser -->
|
525
520
|
```python
|
526
521
|
import pulumi
|
527
522
|
import pulumi_vault as vault
|
528
523
|
|
529
524
|
transit_example = vault.Mount("transit-example",
|
525
|
+
path="transit-example",
|
526
|
+
type="transit",
|
530
527
|
description="This is an example transit secret engine mount",
|
531
528
|
options={
|
532
529
|
"convergent_encryption": False,
|
533
|
-
}
|
534
|
-
path="transit-example",
|
535
|
-
type="transit")
|
530
|
+
})
|
536
531
|
```
|
537
|
-
<!--End PulumiCodeChooser -->
|
538
532
|
|
539
|
-
<!--Start PulumiCodeChooser -->
|
540
533
|
```python
|
541
534
|
import pulumi
|
542
535
|
import pulumi_vault as vault
|
543
536
|
|
544
537
|
pki_example = vault.Mount("pki-example",
|
545
|
-
default_lease_ttl_seconds=3600,
|
546
|
-
description="This is an example PKI mount",
|
547
|
-
max_lease_ttl_seconds=86400,
|
548
538
|
path="pki-example",
|
549
|
-
type="pki"
|
539
|
+
type="pki",
|
540
|
+
description="This is an example PKI mount",
|
541
|
+
default_lease_ttl_seconds=3600,
|
542
|
+
max_lease_ttl_seconds=86400)
|
550
543
|
```
|
551
|
-
<!--End PulumiCodeChooser -->
|
552
544
|
|
553
545
|
## Import
|
554
546
|
|
@@ -588,62 +580,54 @@ class Mount(pulumi.CustomResource):
|
|
588
580
|
|
589
581
|
## Example Usage
|
590
582
|
|
591
|
-
<!--Start PulumiCodeChooser -->
|
592
583
|
```python
|
593
584
|
import pulumi
|
594
585
|
import pulumi_vault as vault
|
595
586
|
|
596
587
|
example = vault.Mount("example",
|
597
|
-
description="This is an example mount",
|
598
588
|
path="dummy",
|
599
|
-
type="generic"
|
589
|
+
type="generic",
|
590
|
+
description="This is an example mount")
|
600
591
|
```
|
601
|
-
<!--End PulumiCodeChooser -->
|
602
592
|
|
603
|
-
<!--Start PulumiCodeChooser -->
|
604
593
|
```python
|
605
594
|
import pulumi
|
606
595
|
import pulumi_vault as vault
|
607
596
|
|
608
597
|
kvv2_example = vault.Mount("kvv2-example",
|
609
|
-
|
598
|
+
path="version2-example",
|
599
|
+
type="kv-v2",
|
610
600
|
options={
|
611
|
-
"type": "kv-v2",
|
612
601
|
"version": "2",
|
602
|
+
"type": "kv-v2",
|
613
603
|
},
|
614
|
-
|
615
|
-
type="kv-v2")
|
604
|
+
description="This is an example KV Version 2 secret engine mount")
|
616
605
|
```
|
617
|
-
<!--End PulumiCodeChooser -->
|
618
606
|
|
619
|
-
<!--Start PulumiCodeChooser -->
|
620
607
|
```python
|
621
608
|
import pulumi
|
622
609
|
import pulumi_vault as vault
|
623
610
|
|
624
611
|
transit_example = vault.Mount("transit-example",
|
612
|
+
path="transit-example",
|
613
|
+
type="transit",
|
625
614
|
description="This is an example transit secret engine mount",
|
626
615
|
options={
|
627
616
|
"convergent_encryption": False,
|
628
|
-
}
|
629
|
-
path="transit-example",
|
630
|
-
type="transit")
|
617
|
+
})
|
631
618
|
```
|
632
|
-
<!--End PulumiCodeChooser -->
|
633
619
|
|
634
|
-
<!--Start PulumiCodeChooser -->
|
635
620
|
```python
|
636
621
|
import pulumi
|
637
622
|
import pulumi_vault as vault
|
638
623
|
|
639
624
|
pki_example = vault.Mount("pki-example",
|
640
|
-
default_lease_ttl_seconds=3600,
|
641
|
-
description="This is an example PKI mount",
|
642
|
-
max_lease_ttl_seconds=86400,
|
643
625
|
path="pki-example",
|
644
|
-
type="pki"
|
626
|
+
type="pki",
|
627
|
+
description="This is an example PKI mount",
|
628
|
+
default_lease_ttl_seconds=3600,
|
629
|
+
max_lease_ttl_seconds=86400)
|
645
630
|
```
|
646
|
-
<!--End PulumiCodeChooser -->
|
647
631
|
|
648
632
|
## Import
|
649
633
|
|
@@ -571,22 +571,20 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
571
571
|
"""
|
572
572
|
## Example Usage
|
573
573
|
|
574
|
-
<!--Start PulumiCodeChooser -->
|
575
574
|
```python
|
576
575
|
import pulumi
|
577
576
|
import pulumi_vault as vault
|
578
577
|
|
579
578
|
config = vault.NomadSecretBackend("config",
|
580
|
-
address="https://127.0.0.1:4646",
|
581
579
|
backend="nomad",
|
582
|
-
default_lease_ttl_seconds=3600,
|
583
580
|
description="test description",
|
581
|
+
default_lease_ttl_seconds=3600,
|
584
582
|
max_lease_ttl_seconds=7200,
|
585
583
|
max_ttl=240,
|
584
|
+
address="https://127.0.0.1:4646",
|
586
585
|
token="ae20ceaa-...",
|
587
586
|
ttl=120)
|
588
587
|
```
|
589
|
-
<!--End PulumiCodeChooser -->
|
590
588
|
|
591
589
|
## Import
|
592
590
|
|
@@ -633,22 +631,20 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
633
631
|
"""
|
634
632
|
## Example Usage
|
635
633
|
|
636
|
-
<!--Start PulumiCodeChooser -->
|
637
634
|
```python
|
638
635
|
import pulumi
|
639
636
|
import pulumi_vault as vault
|
640
637
|
|
641
638
|
config = vault.NomadSecretBackend("config",
|
642
|
-
address="https://127.0.0.1:4646",
|
643
639
|
backend="nomad",
|
644
|
-
default_lease_ttl_seconds=3600,
|
645
640
|
description="test description",
|
641
|
+
default_lease_ttl_seconds=3600,
|
646
642
|
max_lease_ttl_seconds=7200,
|
647
643
|
max_ttl=240,
|
644
|
+
address="https://127.0.0.1:4646",
|
648
645
|
token="ae20ceaa-...",
|
649
646
|
ttl=120)
|
650
647
|
```
|
651
|
-
<!--End PulumiCodeChooser -->
|
652
648
|
|
653
649
|
## Import
|
654
650
|
|
@@ -260,7 +260,6 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
260
260
|
"""
|
261
261
|
## Example Usage
|
262
262
|
|
263
|
-
<!--Start PulumiCodeChooser -->
|
264
263
|
```python
|
265
264
|
import pulumi
|
266
265
|
import pulumi_vault as vault
|
@@ -278,7 +277,6 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
278
277
|
type="client",
|
279
278
|
policies=["readonly"])
|
280
279
|
```
|
281
|
-
<!--End PulumiCodeChooser -->
|
282
280
|
|
283
281
|
## Import
|
284
282
|
|
@@ -313,7 +311,6 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
313
311
|
"""
|
314
312
|
## Example Usage
|
315
313
|
|
316
|
-
<!--Start PulumiCodeChooser -->
|
317
314
|
```python
|
318
315
|
import pulumi
|
319
316
|
import pulumi_vault as vault
|
@@ -331,7 +328,6 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
331
328
|
type="client",
|
332
329
|
policies=["readonly"])
|
333
330
|
```
|
334
|
-
<!--End PulumiCodeChooser -->
|
335
331
|
|
336
332
|
## Import
|
337
333
|
|
pulumi_vault/okta/_inputs.py
CHANGED
@@ -20,8 +20,8 @@ class AuthBackendGroupArgs:
|
|
20
20
|
group_name: pulumi.Input[str],
|
21
21
|
policies: pulumi.Input[Sequence[pulumi.Input[str]]]):
|
22
22
|
"""
|
23
|
-
:param pulumi.Input[str] group_name: Name of the group
|
24
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies:
|
23
|
+
:param pulumi.Input[str] group_name: Name of the Okta group
|
24
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this group
|
25
25
|
"""
|
26
26
|
pulumi.set(__self__, "group_name", group_name)
|
27
27
|
pulumi.set(__self__, "policies", policies)
|
@@ -30,7 +30,7 @@ class AuthBackendGroupArgs:
|
|
30
30
|
@pulumi.getter(name="groupName")
|
31
31
|
def group_name(self) -> pulumi.Input[str]:
|
32
32
|
"""
|
33
|
-
Name of the group
|
33
|
+
Name of the Okta group
|
34
34
|
"""
|
35
35
|
return pulumi.get(self, "group_name")
|
36
36
|
|
@@ -42,7 +42,7 @@ class AuthBackendGroupArgs:
|
|
42
42
|
@pulumi.getter
|
43
43
|
def policies(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
44
44
|
"""
|
45
|
-
|
45
|
+
Policies to associate with this group
|
46
46
|
"""
|
47
47
|
return pulumi.get(self, "policies")
|
48
48
|
|
@@ -59,8 +59,8 @@ class AuthBackendUserArgs:
|
|
59
59
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
60
60
|
"""
|
61
61
|
:param pulumi.Input[str] username: Name of the user within Okta
|
62
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups:
|
63
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies:
|
62
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Groups within the Okta auth backend to associate with this user
|
63
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this user
|
64
64
|
"""
|
65
65
|
pulumi.set(__self__, "username", username)
|
66
66
|
if groups is not None:
|
@@ -84,7 +84,7 @@ class AuthBackendUserArgs:
|
|
84
84
|
@pulumi.getter
|
85
85
|
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
86
86
|
"""
|
87
|
-
|
87
|
+
Groups within the Okta auth backend to associate with this user
|
88
88
|
"""
|
89
89
|
return pulumi.get(self, "groups")
|
90
90
|
|
@@ -96,7 +96,7 @@ class AuthBackendUserArgs:
|
|
96
96
|
@pulumi.getter
|
97
97
|
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
98
98
|
"""
|
99
|
-
|
99
|
+
Policies to associate with this user
|
100
100
|
"""
|
101
101
|
return pulumi.get(self, "policies")
|
102
102
|
|
@@ -488,13 +488,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
488
488
|
|
489
489
|
## Example Usage
|
490
490
|
|
491
|
-
<!--Start PulumiCodeChooser -->
|
492
491
|
```python
|
493
492
|
import pulumi
|
494
493
|
import pulumi_vault as vault
|
495
494
|
|
496
495
|
example = vault.okta.AuthBackend("example",
|
497
496
|
description="Demonstration of the Terraform Okta auth backend",
|
497
|
+
organization="example",
|
498
|
+
token="something that should be kept secret",
|
498
499
|
groups=[vault.okta.AuthBackendGroupArgs(
|
499
500
|
group_name="foo",
|
500
501
|
policies=[
|
@@ -502,14 +503,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
502
503
|
"two",
|
503
504
|
],
|
504
505
|
)],
|
505
|
-
organization="example",
|
506
|
-
token="something that should be kept secret",
|
507
506
|
users=[vault.okta.AuthBackendUserArgs(
|
508
|
-
groups=["foo"],
|
509
507
|
username="bar",
|
508
|
+
groups=["foo"],
|
510
509
|
)])
|
511
510
|
```
|
512
|
-
<!--End PulumiCodeChooser -->
|
513
511
|
|
514
512
|
## Import
|
515
513
|
|
@@ -555,13 +553,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
555
553
|
|
556
554
|
## Example Usage
|
557
555
|
|
558
|
-
<!--Start PulumiCodeChooser -->
|
559
556
|
```python
|
560
557
|
import pulumi
|
561
558
|
import pulumi_vault as vault
|
562
559
|
|
563
560
|
example = vault.okta.AuthBackend("example",
|
564
561
|
description="Demonstration of the Terraform Okta auth backend",
|
562
|
+
organization="example",
|
563
|
+
token="something that should be kept secret",
|
565
564
|
groups=[vault.okta.AuthBackendGroupArgs(
|
566
565
|
group_name="foo",
|
567
566
|
policies=[
|
@@ -569,14 +568,11 @@ class AuthBackend(pulumi.CustomResource):
|
|
569
568
|
"two",
|
570
569
|
],
|
571
570
|
)],
|
572
|
-
organization="example",
|
573
|
-
token="something that should be kept secret",
|
574
571
|
users=[vault.okta.AuthBackendUserArgs(
|
575
|
-
groups=["foo"],
|
576
572
|
username="bar",
|
573
|
+
groups=["foo"],
|
577
574
|
)])
|
578
575
|
```
|
579
|
-
<!--End PulumiCodeChooser -->
|
580
576
|
|
581
577
|
## Import
|
582
578
|
|
@@ -181,7 +181,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
181
181
|
|
182
182
|
## Example Usage
|
183
183
|
|
184
|
-
<!--Start PulumiCodeChooser -->
|
185
184
|
```python
|
186
185
|
import pulumi
|
187
186
|
import pulumi_vault as vault
|
@@ -197,7 +196,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
197
196
|
"two",
|
198
197
|
])
|
199
198
|
```
|
200
|
-
<!--End PulumiCodeChooser -->
|
201
199
|
|
202
200
|
## Import
|
203
201
|
|
@@ -229,7 +227,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
229
227
|
|
230
228
|
## Example Usage
|
231
229
|
|
232
|
-
<!--Start PulumiCodeChooser -->
|
233
230
|
```python
|
234
231
|
import pulumi
|
235
232
|
import pulumi_vault as vault
|
@@ -245,7 +242,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
245
242
|
"two",
|
246
243
|
])
|
247
244
|
```
|
248
|
-
<!--End PulumiCodeChooser -->
|
249
245
|
|
250
246
|
## Import
|
251
247
|
|
@@ -214,7 +214,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
214
214
|
|
215
215
|
## Example Usage
|
216
216
|
|
217
|
-
<!--Start PulumiCodeChooser -->
|
218
217
|
```python
|
219
218
|
import pulumi
|
220
219
|
import pulumi_vault as vault
|
@@ -230,7 +229,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
230
229
|
"two",
|
231
230
|
])
|
232
231
|
```
|
233
|
-
<!--End PulumiCodeChooser -->
|
234
232
|
|
235
233
|
## Import
|
236
234
|
|
@@ -263,7 +261,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
263
261
|
|
264
262
|
## Example Usage
|
265
263
|
|
266
|
-
<!--Start PulumiCodeChooser -->
|
267
264
|
```python
|
268
265
|
import pulumi
|
269
266
|
import pulumi_vault as vault
|
@@ -279,7 +276,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
279
276
|
"two",
|
280
277
|
])
|
281
278
|
```
|
282
|
-
<!--End PulumiCodeChooser -->
|
283
279
|
|
284
280
|
## Import
|
285
281
|
|
pulumi_vault/okta/outputs.py
CHANGED
@@ -37,8 +37,8 @@ class AuthBackendGroup(dict):
|
|
37
37
|
group_name: str,
|
38
38
|
policies: Sequence[str]):
|
39
39
|
"""
|
40
|
-
:param str group_name: Name of the group
|
41
|
-
:param Sequence[str] policies:
|
40
|
+
:param str group_name: Name of the Okta group
|
41
|
+
:param Sequence[str] policies: Policies to associate with this group
|
42
42
|
"""
|
43
43
|
pulumi.set(__self__, "group_name", group_name)
|
44
44
|
pulumi.set(__self__, "policies", policies)
|
@@ -47,7 +47,7 @@ class AuthBackendGroup(dict):
|
|
47
47
|
@pulumi.getter(name="groupName")
|
48
48
|
def group_name(self) -> str:
|
49
49
|
"""
|
50
|
-
Name of the group
|
50
|
+
Name of the Okta group
|
51
51
|
"""
|
52
52
|
return pulumi.get(self, "group_name")
|
53
53
|
|
@@ -55,7 +55,7 @@ class AuthBackendGroup(dict):
|
|
55
55
|
@pulumi.getter
|
56
56
|
def policies(self) -> Sequence[str]:
|
57
57
|
"""
|
58
|
-
|
58
|
+
Policies to associate with this group
|
59
59
|
"""
|
60
60
|
return pulumi.get(self, "policies")
|
61
61
|
|
@@ -68,8 +68,8 @@ class AuthBackendUser(dict):
|
|
68
68
|
policies: Optional[Sequence[str]] = None):
|
69
69
|
"""
|
70
70
|
:param str username: Name of the user within Okta
|
71
|
-
:param Sequence[str] groups:
|
72
|
-
:param Sequence[str] policies:
|
71
|
+
:param Sequence[str] groups: Groups within the Okta auth backend to associate with this user
|
72
|
+
:param Sequence[str] policies: Policies to associate with this user
|
73
73
|
"""
|
74
74
|
pulumi.set(__self__, "username", username)
|
75
75
|
if groups is not None:
|
@@ -89,7 +89,7 @@ class AuthBackendUser(dict):
|
|
89
89
|
@pulumi.getter
|
90
90
|
def groups(self) -> Optional[Sequence[str]]:
|
91
91
|
"""
|
92
|
-
|
92
|
+
Groups within the Okta auth backend to associate with this user
|
93
93
|
"""
|
94
94
|
return pulumi.get(self, "groups")
|
95
95
|
|
@@ -97,7 +97,7 @@ class AuthBackendUser(dict):
|
|
97
97
|
@pulumi.getter
|
98
98
|
def policies(self) -> Optional[Sequence[str]]:
|
99
99
|
"""
|
100
|
-
|
100
|
+
Policies to associate with this user
|
101
101
|
"""
|
102
102
|
return pulumi.get(self, "policies")
|
103
103
|
|
pulumi_vault/outputs.py
CHANGED
@@ -277,27 +277,17 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
277
277
|
def __init__(__self__, *,
|
278
278
|
key: str,
|
279
279
|
values: Sequence[str]):
|
280
|
-
"""
|
281
|
-
:param str key: name of permitted or denied parameter.
|
282
|
-
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
283
|
-
"""
|
284
280
|
pulumi.set(__self__, "key", key)
|
285
281
|
pulumi.set(__self__, "values", values)
|
286
282
|
|
287
283
|
@property
|
288
284
|
@pulumi.getter
|
289
285
|
def key(self) -> str:
|
290
|
-
"""
|
291
|
-
name of permitted or denied parameter.
|
292
|
-
"""
|
293
286
|
return pulumi.get(self, "key")
|
294
287
|
|
295
288
|
@property
|
296
289
|
@pulumi.getter
|
297
290
|
def values(self) -> Sequence[str]:
|
298
|
-
"""
|
299
|
-
list of values what are permitted or denied by policy rule.
|
300
|
-
"""
|
301
291
|
return pulumi.get(self, "values")
|
302
292
|
|
303
293
|
|
@@ -306,27 +296,17 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
306
296
|
def __init__(__self__, *,
|
307
297
|
key: str,
|
308
298
|
values: Sequence[str]):
|
309
|
-
"""
|
310
|
-
:param str key: name of permitted or denied parameter.
|
311
|
-
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
312
|
-
"""
|
313
299
|
pulumi.set(__self__, "key", key)
|
314
300
|
pulumi.set(__self__, "values", values)
|
315
301
|
|
316
302
|
@property
|
317
303
|
@pulumi.getter
|
318
304
|
def key(self) -> str:
|
319
|
-
"""
|
320
|
-
name of permitted or denied parameter.
|
321
|
-
"""
|
322
305
|
return pulumi.get(self, "key")
|
323
306
|
|
324
307
|
@property
|
325
308
|
@pulumi.getter
|
326
309
|
def values(self) -> Sequence[str]:
|
327
|
-
"""
|
328
|
-
list of values what are permitted or denied by policy rule.
|
329
|
-
"""
|
330
310
|
return pulumi.get(self, "values")
|
331
311
|
|
332
312
|
|