pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/github/_inputs.py
CHANGED
@@ -4,15 +4,70 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'AuthBackendTuneArgs',
|
19
|
+
'AuthBackendTuneArgsDict',
|
14
20
|
]
|
15
21
|
|
22
|
+
MYPY = False
|
23
|
+
|
24
|
+
if not MYPY:
|
25
|
+
class AuthBackendTuneArgsDict(TypedDict):
|
26
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
27
|
+
"""
|
28
|
+
List of headers to whitelist and allowing
|
29
|
+
a plugin to include them in the response.
|
30
|
+
"""
|
31
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
32
|
+
"""
|
33
|
+
Specifies the list of keys that will
|
34
|
+
not be HMAC'd by audit devices in the request data object.
|
35
|
+
"""
|
36
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
37
|
+
"""
|
38
|
+
Specifies the list of keys that will
|
39
|
+
not be HMAC'd by audit devices in the response data object.
|
40
|
+
"""
|
41
|
+
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
42
|
+
"""
|
43
|
+
Specifies the default time-to-live.
|
44
|
+
If set, this overrides the global default.
|
45
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
46
|
+
"""
|
47
|
+
listing_visibility: NotRequired[pulumi.Input[str]]
|
48
|
+
"""
|
49
|
+
Specifies whether to show this mount in
|
50
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
51
|
+
"""
|
52
|
+
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
53
|
+
"""
|
54
|
+
Specifies the maximum time-to-live.
|
55
|
+
If set, this overrides the global default.
|
56
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
57
|
+
"""
|
58
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
59
|
+
"""
|
60
|
+
List of headers to whitelist and
|
61
|
+
pass from the request to the backend.
|
62
|
+
"""
|
63
|
+
token_type: NotRequired[pulumi.Input[str]]
|
64
|
+
"""
|
65
|
+
Specifies the type of tokens that should be returned by
|
66
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
67
|
+
"""
|
68
|
+
elif False:
|
69
|
+
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
70
|
+
|
16
71
|
@pulumi.input_type
|
17
72
|
class AuthBackendTuneArgs:
|
18
73
|
def __init__(__self__, *,
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -44,7 +49,7 @@ class AuthBackendArgs:
|
|
44
49
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
45
50
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
46
51
|
The value should not contain leading or trailing forward slashes.
|
47
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
52
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
48
53
|
*Available only for Vault Enterprise*.
|
49
54
|
:param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
|
50
55
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
@@ -168,7 +173,7 @@ class AuthBackendArgs:
|
|
168
173
|
"""
|
169
174
|
The namespace to provision the resource in.
|
170
175
|
The value should not contain leading or trailing forward slashes.
|
171
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
176
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
172
177
|
*Available only for Vault Enterprise*.
|
173
178
|
"""
|
174
179
|
return pulumi.get(self, "namespace")
|
@@ -372,7 +377,7 @@ class _AuthBackendState:
|
|
372
377
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
373
378
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
374
379
|
The value should not contain leading or trailing forward slashes.
|
375
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
380
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
376
381
|
*Available only for Vault Enterprise*.
|
377
382
|
:param pulumi.Input[str] organization: The organization configured users must be part of.
|
378
383
|
:param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
|
@@ -500,7 +505,7 @@ class _AuthBackendState:
|
|
500
505
|
"""
|
501
506
|
The namespace to provision the resource in.
|
502
507
|
The value should not contain leading or trailing forward slashes.
|
503
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
508
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
504
509
|
*Available only for Vault Enterprise*.
|
505
510
|
"""
|
506
511
|
return pulumi.get(self, "namespace")
|
@@ -705,7 +710,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
705
710
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
706
711
|
token_ttl: Optional[pulumi.Input[int]] = None,
|
707
712
|
token_type: Optional[pulumi.Input[str]] = None,
|
708
|
-
tune: Optional[pulumi.Input[
|
713
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
709
714
|
__props__=None):
|
710
715
|
"""
|
711
716
|
Manages a GitHub Auth mount in a Vault server. See the [Vault
|
@@ -726,7 +731,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
726
731
|
GitHub authentication mounts can be imported using the `path`, e.g.
|
727
732
|
|
728
733
|
```sh
|
729
|
-
|
734
|
+
$ pulumi import vault:github/authBackend:AuthBackend example github
|
730
735
|
```
|
731
736
|
|
732
737
|
:param str resource_name: The name of the resource.
|
@@ -739,7 +744,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
739
744
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
740
745
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
741
746
|
The value should not contain leading or trailing forward slashes.
|
742
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
747
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
743
748
|
*Available only for Vault Enterprise*.
|
744
749
|
:param pulumi.Input[str] organization: The organization configured users must be part of.
|
745
750
|
:param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
|
@@ -769,7 +774,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
769
774
|
Its current value will be referenced at renewal time.
|
770
775
|
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
771
776
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
772
|
-
:param pulumi.Input[
|
777
|
+
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
773
778
|
|
774
779
|
The `tune` block is used to tune the auth backend:
|
775
780
|
"""
|
@@ -798,7 +803,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
798
803
|
GitHub authentication mounts can be imported using the `path`, e.g.
|
799
804
|
|
800
805
|
```sh
|
801
|
-
|
806
|
+
$ pulumi import vault:github/authBackend:AuthBackend example github
|
802
807
|
```
|
803
808
|
|
804
809
|
:param str resource_name: The name of the resource.
|
@@ -832,7 +837,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
832
837
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
833
838
|
token_ttl: Optional[pulumi.Input[int]] = None,
|
834
839
|
token_type: Optional[pulumi.Input[str]] = None,
|
835
|
-
tune: Optional[pulumi.Input[
|
840
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
836
841
|
__props__=None):
|
837
842
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
838
843
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -889,7 +894,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
889
894
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
890
895
|
token_ttl: Optional[pulumi.Input[int]] = None,
|
891
896
|
token_type: Optional[pulumi.Input[str]] = None,
|
892
|
-
tune: Optional[pulumi.Input[
|
897
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
|
893
898
|
"""
|
894
899
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
895
900
|
properties used to qualify the lookup.
|
@@ -906,7 +911,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
906
911
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
907
912
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
908
913
|
The value should not contain leading or trailing forward slashes.
|
909
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
914
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
910
915
|
*Available only for Vault Enterprise*.
|
911
916
|
:param pulumi.Input[str] organization: The organization configured users must be part of.
|
912
917
|
:param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
|
@@ -936,7 +941,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
936
941
|
Its current value will be referenced at renewal time.
|
937
942
|
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
938
943
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
939
|
-
:param pulumi.Input[
|
944
|
+
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
940
945
|
|
941
946
|
The `tune` block is used to tune the auth backend:
|
942
947
|
"""
|
@@ -1005,7 +1010,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1005
1010
|
"""
|
1006
1011
|
The namespace to provision the resource in.
|
1007
1012
|
The value should not contain leading or trailing forward slashes.
|
1008
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1013
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1009
1014
|
*Available only for Vault Enterprise*.
|
1010
1015
|
"""
|
1011
1016
|
return pulumi.get(self, "namespace")
|
pulumi_vault/github/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
pulumi_vault/github/team.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['TeamArgs', 'Team']
|
@@ -25,7 +30,7 @@ class TeamArgs:
|
|
25
30
|
if not specified.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
|
31
36
|
issued using this role.
|
@@ -69,7 +74,7 @@ class TeamArgs:
|
|
69
74
|
"""
|
70
75
|
The namespace to provision the resource in.
|
71
76
|
The value should not contain leading or trailing forward slashes.
|
72
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
77
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
73
78
|
*Available only for Vault Enterprise*.
|
74
79
|
"""
|
75
80
|
return pulumi.get(self, "namespace")
|
@@ -105,7 +110,7 @@ class _TeamState:
|
|
105
110
|
if not specified.
|
106
111
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
107
112
|
The value should not contain leading or trailing forward slashes.
|
108
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
113
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
109
114
|
*Available only for Vault Enterprise*.
|
110
115
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
|
111
116
|
issued using this role.
|
@@ -139,7 +144,7 @@ class _TeamState:
|
|
139
144
|
"""
|
140
145
|
The namespace to provision the resource in.
|
141
146
|
The value should not contain leading or trailing forward slashes.
|
142
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
147
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
143
148
|
*Available only for Vault Enterprise*.
|
144
149
|
"""
|
145
150
|
return pulumi.get(self, "namespace")
|
@@ -196,7 +201,7 @@ class Team(pulumi.CustomResource):
|
|
196
201
|
import pulumi_vault as vault
|
197
202
|
|
198
203
|
example = vault.github.AuthBackend("example", organization="myorg")
|
199
|
-
tf_devs = vault.github.Team("
|
204
|
+
tf_devs = vault.github.Team("tf_devs",
|
200
205
|
backend=example.id,
|
201
206
|
team="terraform-developers",
|
202
207
|
policies=[
|
@@ -210,7 +215,7 @@ class Team(pulumi.CustomResource):
|
|
210
215
|
Github team mappings can be imported using the `path`, e.g.
|
211
216
|
|
212
217
|
```sh
|
213
|
-
|
218
|
+
$ pulumi import vault:github/team:Team tf_devs auth/github/map/teams/terraform-developers
|
214
219
|
```
|
215
220
|
|
216
221
|
:param str resource_name: The name of the resource.
|
@@ -219,7 +224,7 @@ class Team(pulumi.CustomResource):
|
|
219
224
|
if not specified.
|
220
225
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
221
226
|
The value should not contain leading or trailing forward slashes.
|
222
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
227
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
223
228
|
*Available only for Vault Enterprise*.
|
224
229
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
|
225
230
|
issued using this role.
|
@@ -243,7 +248,7 @@ class Team(pulumi.CustomResource):
|
|
243
248
|
import pulumi_vault as vault
|
244
249
|
|
245
250
|
example = vault.github.AuthBackend("example", organization="myorg")
|
246
|
-
tf_devs = vault.github.Team("
|
251
|
+
tf_devs = vault.github.Team("tf_devs",
|
247
252
|
backend=example.id,
|
248
253
|
team="terraform-developers",
|
249
254
|
policies=[
|
@@ -257,7 +262,7 @@ class Team(pulumi.CustomResource):
|
|
257
262
|
Github team mappings can be imported using the `path`, e.g.
|
258
263
|
|
259
264
|
```sh
|
260
|
-
|
265
|
+
$ pulumi import vault:github/team:Team tf_devs auth/github/map/teams/terraform-developers
|
261
266
|
```
|
262
267
|
|
263
268
|
:param str resource_name: The name of the resource.
|
@@ -319,7 +324,7 @@ class Team(pulumi.CustomResource):
|
|
319
324
|
if not specified.
|
320
325
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
321
326
|
The value should not contain leading or trailing forward slashes.
|
322
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
327
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
323
328
|
*Available only for Vault Enterprise*.
|
324
329
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
|
325
330
|
issued using this role.
|
@@ -350,7 +355,7 @@ class Team(pulumi.CustomResource):
|
|
350
355
|
"""
|
351
356
|
The namespace to provision the resource in.
|
352
357
|
The value should not contain leading or trailing forward slashes.
|
353
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
358
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
354
359
|
*Available only for Vault Enterprise*.
|
355
360
|
"""
|
356
361
|
return pulumi.get(self, "namespace")
|
pulumi_vault/github/user.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['UserArgs', 'User']
|
@@ -25,7 +30,7 @@ class UserArgs:
|
|
25
30
|
if not specified.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
|
31
36
|
using this role.
|
@@ -69,7 +74,7 @@ class UserArgs:
|
|
69
74
|
"""
|
70
75
|
The namespace to provision the resource in.
|
71
76
|
The value should not contain leading or trailing forward slashes.
|
72
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
77
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
73
78
|
*Available only for Vault Enterprise*.
|
74
79
|
"""
|
75
80
|
return pulumi.get(self, "namespace")
|
@@ -105,7 +110,7 @@ class _UserState:
|
|
105
110
|
if not specified.
|
106
111
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
107
112
|
The value should not contain leading or trailing forward slashes.
|
108
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
113
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
109
114
|
*Available only for Vault Enterprise*.
|
110
115
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
|
111
116
|
using this role.
|
@@ -139,7 +144,7 @@ class _UserState:
|
|
139
144
|
"""
|
140
145
|
The namespace to provision the resource in.
|
141
146
|
The value should not contain leading or trailing forward slashes.
|
142
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
147
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
143
148
|
*Available only for Vault Enterprise*.
|
144
149
|
"""
|
145
150
|
return pulumi.get(self, "namespace")
|
@@ -196,7 +201,7 @@ class User(pulumi.CustomResource):
|
|
196
201
|
import pulumi_vault as vault
|
197
202
|
|
198
203
|
example = vault.github.AuthBackend("example", organization="myorg")
|
199
|
-
tf_user = vault.github.User("
|
204
|
+
tf_user = vault.github.User("tf_user",
|
200
205
|
backend=example.id,
|
201
206
|
user="john.doe",
|
202
207
|
policies=[
|
@@ -210,7 +215,7 @@ class User(pulumi.CustomResource):
|
|
210
215
|
Github user mappings can be imported using the `path`, e.g.
|
211
216
|
|
212
217
|
```sh
|
213
|
-
|
218
|
+
$ pulumi import vault:github/user:User tf_user auth/github/map/users/john.doe
|
214
219
|
```
|
215
220
|
|
216
221
|
:param str resource_name: The name of the resource.
|
@@ -219,7 +224,7 @@ class User(pulumi.CustomResource):
|
|
219
224
|
if not specified.
|
220
225
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
221
226
|
The value should not contain leading or trailing forward slashes.
|
222
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
227
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
223
228
|
*Available only for Vault Enterprise*.
|
224
229
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
|
225
230
|
using this role.
|
@@ -243,7 +248,7 @@ class User(pulumi.CustomResource):
|
|
243
248
|
import pulumi_vault as vault
|
244
249
|
|
245
250
|
example = vault.github.AuthBackend("example", organization="myorg")
|
246
|
-
tf_user = vault.github.User("
|
251
|
+
tf_user = vault.github.User("tf_user",
|
247
252
|
backend=example.id,
|
248
253
|
user="john.doe",
|
249
254
|
policies=[
|
@@ -257,7 +262,7 @@ class User(pulumi.CustomResource):
|
|
257
262
|
Github user mappings can be imported using the `path`, e.g.
|
258
263
|
|
259
264
|
```sh
|
260
|
-
|
265
|
+
$ pulumi import vault:github/user:User tf_user auth/github/map/users/john.doe
|
261
266
|
```
|
262
267
|
|
263
268
|
:param str resource_name: The name of the resource.
|
@@ -319,7 +324,7 @@ class User(pulumi.CustomResource):
|
|
319
324
|
if not specified.
|
320
325
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
321
326
|
The value should not contain leading or trailing forward slashes.
|
322
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
327
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
323
328
|
*Available only for Vault Enterprise*.
|
324
329
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
|
325
330
|
using this role.
|
@@ -350,7 +355,7 @@ class User(pulumi.CustomResource):
|
|
350
355
|
"""
|
351
356
|
The namespace to provision the resource in.
|
352
357
|
The value should not contain leading or trailing forward slashes.
|
353
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
358
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
354
359
|
*Available only for Vault Enterprise*.
|
355
360
|
"""
|
356
361
|
return pulumi.get(self, "namespace")
|
pulumi_vault/identity/entity.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['EntityArgs', 'Entity']
|
@@ -28,7 +33,7 @@ class EntityArgs:
|
|
28
33
|
:param pulumi.Input[str] name: Name of the identity entity to create.
|
29
34
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
30
35
|
The value should not contain leading or trailing forward slashes.
|
31
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
36
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
32
37
|
*Available only for Vault Enterprise*.
|
33
38
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies to apply to the entity.
|
34
39
|
"""
|
@@ -99,7 +104,7 @@ class EntityArgs:
|
|
99
104
|
"""
|
100
105
|
The namespace to provision the resource in.
|
101
106
|
The value should not contain leading or trailing forward slashes.
|
102
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
107
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
103
108
|
*Available only for Vault Enterprise*.
|
104
109
|
"""
|
105
110
|
return pulumi.get(self, "namespace")
|
@@ -138,7 +143,7 @@ class _EntityState:
|
|
138
143
|
:param pulumi.Input[str] name: Name of the identity entity to create.
|
139
144
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
140
145
|
The value should not contain leading or trailing forward slashes.
|
141
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
146
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
142
147
|
*Available only for Vault Enterprise*.
|
143
148
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies to apply to the entity.
|
144
149
|
"""
|
@@ -209,7 +214,7 @@ class _EntityState:
|
|
209
214
|
"""
|
210
215
|
The namespace to provision the resource in.
|
211
216
|
The value should not contain leading or trailing forward slashes.
|
212
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
217
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
213
218
|
*Available only for Vault Enterprise*.
|
214
219
|
"""
|
215
220
|
return pulumi.get(self, "namespace")
|
@@ -251,10 +256,11 @@ class Entity(pulumi.CustomResource):
|
|
251
256
|
import pulumi_vault as vault
|
252
257
|
|
253
258
|
test = vault.identity.Entity("test",
|
259
|
+
name="tester1",
|
260
|
+
policies=["test"],
|
254
261
|
metadata={
|
255
262
|
"foo": "bar",
|
256
|
-
}
|
257
|
-
policies=["test"])
|
263
|
+
})
|
258
264
|
```
|
259
265
|
|
260
266
|
## Import
|
@@ -262,7 +268,7 @@ class Entity(pulumi.CustomResource):
|
|
262
268
|
Identity entity can be imported using the `id`, e.g.
|
263
269
|
|
264
270
|
```sh
|
265
|
-
|
271
|
+
$ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
|
266
272
|
```
|
267
273
|
|
268
274
|
:param str resource_name: The name of the resource.
|
@@ -273,7 +279,7 @@ class Entity(pulumi.CustomResource):
|
|
273
279
|
:param pulumi.Input[str] name: Name of the identity entity to create.
|
274
280
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
275
281
|
The value should not contain leading or trailing forward slashes.
|
276
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
282
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
277
283
|
*Available only for Vault Enterprise*.
|
278
284
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies to apply to the entity.
|
279
285
|
"""
|
@@ -291,10 +297,11 @@ class Entity(pulumi.CustomResource):
|
|
291
297
|
import pulumi_vault as vault
|
292
298
|
|
293
299
|
test = vault.identity.Entity("test",
|
300
|
+
name="tester1",
|
301
|
+
policies=["test"],
|
294
302
|
metadata={
|
295
303
|
"foo": "bar",
|
296
|
-
}
|
297
|
-
policies=["test"])
|
304
|
+
})
|
298
305
|
```
|
299
306
|
|
300
307
|
## Import
|
@@ -302,7 +309,7 @@ class Entity(pulumi.CustomResource):
|
|
302
309
|
Identity entity can be imported using the `id`, e.g.
|
303
310
|
|
304
311
|
```sh
|
305
|
-
|
312
|
+
$ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
|
306
313
|
```
|
307
314
|
|
308
315
|
:param str resource_name: The name of the resource.
|
@@ -370,7 +377,7 @@ class Entity(pulumi.CustomResource):
|
|
370
377
|
:param pulumi.Input[str] name: Name of the identity entity to create.
|
371
378
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
372
379
|
The value should not contain leading or trailing forward slashes.
|
373
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
380
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
374
381
|
*Available only for Vault Enterprise*.
|
375
382
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies to apply to the entity.
|
376
383
|
"""
|
@@ -424,7 +431,7 @@ class Entity(pulumi.CustomResource):
|
|
424
431
|
"""
|
425
432
|
The namespace to provision the resource in.
|
426
433
|
The value should not contain leading or trailing forward slashes.
|
427
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
434
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
428
435
|
*Available only for Vault Enterprise*.
|
429
436
|
"""
|
430
437
|
return pulumi.get(self, "namespace")
|