pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['EntityAliasArgs', 'EntityAlias']
|
@@ -27,7 +32,7 @@ class EntityAliasArgs:
|
|
27
32
|
:param pulumi.Input[str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
|
28
33
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
29
34
|
The value should not contain leading or trailing forward slashes.
|
30
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
35
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
31
36
|
*Available only for Vault Enterprise*.
|
32
37
|
"""
|
33
38
|
pulumi.set(__self__, "canonical_id", canonical_id)
|
@@ -93,7 +98,7 @@ class EntityAliasArgs:
|
|
93
98
|
"""
|
94
99
|
The namespace to provision the resource in.
|
95
100
|
The value should not contain leading or trailing forward slashes.
|
96
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
101
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
97
102
|
*Available only for Vault Enterprise*.
|
98
103
|
"""
|
99
104
|
return pulumi.get(self, "namespace")
|
@@ -119,7 +124,7 @@ class _EntityAliasState:
|
|
119
124
|
:param pulumi.Input[str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
|
120
125
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
121
126
|
The value should not contain leading or trailing forward slashes.
|
122
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
127
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
123
128
|
*Available only for Vault Enterprise*.
|
124
129
|
"""
|
125
130
|
if canonical_id is not None:
|
@@ -187,7 +192,7 @@ class _EntityAliasState:
|
|
187
192
|
"""
|
188
193
|
The namespace to provision the resource in.
|
189
194
|
The value should not contain leading or trailing forward slashes.
|
190
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
195
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
191
196
|
*Available only for Vault Enterprise*.
|
192
197
|
"""
|
193
198
|
return pulumi.get(self, "namespace")
|
@@ -216,8 +221,9 @@ class EntityAlias(pulumi.CustomResource):
|
|
216
221
|
import pulumi_vault as vault
|
217
222
|
|
218
223
|
test = vault.identity.EntityAlias("test",
|
219
|
-
|
220
|
-
mount_accessor="token_1f2bd5"
|
224
|
+
name="user_1",
|
225
|
+
mount_accessor="token_1f2bd5",
|
226
|
+
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
|
221
227
|
```
|
222
228
|
|
223
229
|
## Import
|
@@ -225,7 +231,7 @@ class EntityAlias(pulumi.CustomResource):
|
|
225
231
|
Identity entity alias can be imported using the `id`, e.g.
|
226
232
|
|
227
233
|
```sh
|
228
|
-
|
234
|
+
$ pulumi import vault:identity/entityAlias:EntityAlias test "3856fb4d-3c91-dcaf-2401-68f446796bfb"
|
229
235
|
```
|
230
236
|
|
231
237
|
:param str resource_name: The name of the resource.
|
@@ -236,7 +242,7 @@ class EntityAlias(pulumi.CustomResource):
|
|
236
242
|
:param pulumi.Input[str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
|
237
243
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
238
244
|
The value should not contain leading or trailing forward slashes.
|
239
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
245
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
240
246
|
*Available only for Vault Enterprise*.
|
241
247
|
"""
|
242
248
|
...
|
@@ -253,8 +259,9 @@ class EntityAlias(pulumi.CustomResource):
|
|
253
259
|
import pulumi_vault as vault
|
254
260
|
|
255
261
|
test = vault.identity.EntityAlias("test",
|
256
|
-
|
257
|
-
mount_accessor="token_1f2bd5"
|
262
|
+
name="user_1",
|
263
|
+
mount_accessor="token_1f2bd5",
|
264
|
+
canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
|
258
265
|
```
|
259
266
|
|
260
267
|
## Import
|
@@ -262,7 +269,7 @@ class EntityAlias(pulumi.CustomResource):
|
|
262
269
|
Identity entity alias can be imported using the `id`, e.g.
|
263
270
|
|
264
271
|
```sh
|
265
|
-
|
272
|
+
$ pulumi import vault:identity/entityAlias:EntityAlias test "3856fb4d-3c91-dcaf-2401-68f446796bfb"
|
266
273
|
```
|
267
274
|
|
268
275
|
:param str resource_name: The name of the resource.
|
@@ -331,7 +338,7 @@ class EntityAlias(pulumi.CustomResource):
|
|
331
338
|
:param pulumi.Input[str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
|
332
339
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
333
340
|
The value should not contain leading or trailing forward slashes.
|
334
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
341
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
335
342
|
*Available only for Vault Enterprise*.
|
336
343
|
"""
|
337
344
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -383,7 +390,7 @@ class EntityAlias(pulumi.CustomResource):
|
|
383
390
|
"""
|
384
391
|
The namespace to provision the resource in.
|
385
392
|
The value should not contain leading or trailing forward slashes.
|
386
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
393
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
387
394
|
*Available only for Vault Enterprise*.
|
388
395
|
"""
|
389
396
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['EntityPoliciesArgs', 'EntityPolicies']
|
@@ -29,7 +34,7 @@ class EntityPoliciesArgs:
|
|
29
34
|
If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the entity. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
|
30
35
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
36
|
The value should not contain leading or trailing forward slashes.
|
32
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
37
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
38
|
*Available only for Vault Enterprise*.
|
34
39
|
"""
|
35
40
|
pulumi.set(__self__, "entity_id", entity_id)
|
@@ -85,7 +90,7 @@ class EntityPoliciesArgs:
|
|
85
90
|
"""
|
86
91
|
The namespace to provision the resource in.
|
87
92
|
The value should not contain leading or trailing forward slashes.
|
88
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
93
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
89
94
|
*Available only for Vault Enterprise*.
|
90
95
|
"""
|
91
96
|
return pulumi.get(self, "namespace")
|
@@ -114,7 +119,7 @@ class _EntityPoliciesState:
|
|
114
119
|
If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the entity. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
|
115
120
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
116
121
|
The value should not contain leading or trailing forward slashes.
|
117
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
122
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
118
123
|
*Available only for Vault Enterprise*.
|
119
124
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the entity
|
120
125
|
"""
|
@@ -175,7 +180,7 @@ class _EntityPoliciesState:
|
|
175
180
|
"""
|
176
181
|
The namespace to provision the resource in.
|
177
182
|
The value should not contain leading or trailing forward slashes.
|
178
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
183
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
179
184
|
*Available only for Vault Enterprise*.
|
180
185
|
"""
|
181
186
|
return pulumi.get(self, "namespace")
|
@@ -211,13 +216,16 @@ class EntityPolicies(pulumi.CustomResource):
|
|
211
216
|
Manages policies for an Identity Entity for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
|
212
217
|
|
213
218
|
## Example Usage
|
219
|
+
|
214
220
|
### Exclusive Policies
|
215
221
|
|
216
222
|
```python
|
217
223
|
import pulumi
|
218
224
|
import pulumi_vault as vault
|
219
225
|
|
220
|
-
entity = vault.identity.Entity("entity",
|
226
|
+
entity = vault.identity.Entity("entity",
|
227
|
+
name="entity",
|
228
|
+
external_policies=True)
|
221
229
|
policies = vault.identity.EntityPolicies("policies",
|
222
230
|
policies=[
|
223
231
|
"default",
|
@@ -226,13 +234,16 @@ class EntityPolicies(pulumi.CustomResource):
|
|
226
234
|
exclusive=True,
|
227
235
|
entity_id=entity.id)
|
228
236
|
```
|
237
|
+
|
229
238
|
### Non-exclusive Policies
|
230
239
|
|
231
240
|
```python
|
232
241
|
import pulumi
|
233
242
|
import pulumi_vault as vault
|
234
243
|
|
235
|
-
entity = vault.identity.Entity("entity",
|
244
|
+
entity = vault.identity.Entity("entity",
|
245
|
+
name="entity",
|
246
|
+
external_policies=True)
|
236
247
|
default = vault.identity.EntityPolicies("default",
|
237
248
|
policies=[
|
238
249
|
"default",
|
@@ -256,7 +267,7 @@ class EntityPolicies(pulumi.CustomResource):
|
|
256
267
|
If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the entity. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
|
257
268
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
258
269
|
The value should not contain leading or trailing forward slashes.
|
259
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
270
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
260
271
|
*Available only for Vault Enterprise*.
|
261
272
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the entity
|
262
273
|
"""
|
@@ -270,13 +281,16 @@ class EntityPolicies(pulumi.CustomResource):
|
|
270
281
|
Manages policies for an Identity Entity for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
|
271
282
|
|
272
283
|
## Example Usage
|
284
|
+
|
273
285
|
### Exclusive Policies
|
274
286
|
|
275
287
|
```python
|
276
288
|
import pulumi
|
277
289
|
import pulumi_vault as vault
|
278
290
|
|
279
|
-
entity = vault.identity.Entity("entity",
|
291
|
+
entity = vault.identity.Entity("entity",
|
292
|
+
name="entity",
|
293
|
+
external_policies=True)
|
280
294
|
policies = vault.identity.EntityPolicies("policies",
|
281
295
|
policies=[
|
282
296
|
"default",
|
@@ -285,13 +299,16 @@ class EntityPolicies(pulumi.CustomResource):
|
|
285
299
|
exclusive=True,
|
286
300
|
entity_id=entity.id)
|
287
301
|
```
|
302
|
+
|
288
303
|
### Non-exclusive Policies
|
289
304
|
|
290
305
|
```python
|
291
306
|
import pulumi
|
292
307
|
import pulumi_vault as vault
|
293
308
|
|
294
|
-
entity = vault.identity.Entity("entity",
|
309
|
+
entity = vault.identity.Entity("entity",
|
310
|
+
name="entity",
|
311
|
+
external_policies=True)
|
295
312
|
default = vault.identity.EntityPolicies("default",
|
296
313
|
policies=[
|
297
314
|
"default",
|
@@ -373,7 +390,7 @@ class EntityPolicies(pulumi.CustomResource):
|
|
373
390
|
If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the entity. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
|
374
391
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
375
392
|
The value should not contain leading or trailing forward slashes.
|
376
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
393
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
377
394
|
*Available only for Vault Enterprise*.
|
378
395
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the entity
|
379
396
|
"""
|
@@ -422,7 +439,7 @@ class EntityPolicies(pulumi.CustomResource):
|
|
422
439
|
"""
|
423
440
|
The namespace to provision the resource in.
|
424
441
|
The value should not contain leading or trailing forward slashes.
|
425
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
442
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
426
443
|
*Available only for Vault Enterprise*.
|
427
444
|
"""
|
428
445
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
|
@@ -189,7 +194,7 @@ class GetEntityResult:
|
|
189
194
|
|
190
195
|
@property
|
191
196
|
@pulumi.getter
|
192
|
-
def metadata(self) -> Mapping[str,
|
197
|
+
def metadata(self) -> Mapping[str, str]:
|
193
198
|
"""
|
194
199
|
Arbitrary metadata
|
195
200
|
"""
|
@@ -260,9 +265,10 @@ def get_entity(alias_id: Optional[str] = None,
|
|
260
265
|
|
261
266
|
entity = vault.identity.get_entity(entity_name="entity_12345")
|
262
267
|
```
|
268
|
+
|
263
269
|
## Required Vault Capabilities
|
264
270
|
|
265
|
-
Use of this resource requires the `
|
271
|
+
Use of this resource requires the `update` capability on `/identity/lookup/entity`.
|
266
272
|
|
267
273
|
|
268
274
|
:param str alias_id: ID of the alias.
|
@@ -277,7 +283,7 @@ def get_entity(alias_id: Optional[str] = None,
|
|
277
283
|
:param str entity_name: Name of the entity.
|
278
284
|
:param str namespace: The namespace of the target resource.
|
279
285
|
The value should not contain leading or trailing forward slashes.
|
280
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
286
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
281
287
|
*Available only for Vault Enterprise*.
|
282
288
|
"""
|
283
289
|
__args__ = dict()
|
@@ -310,16 +316,13 @@ def get_entity(alias_id: Optional[str] = None,
|
|
310
316
|
namespace=pulumi.get(__ret__, 'namespace'),
|
311
317
|
namespace_id=pulumi.get(__ret__, 'namespace_id'),
|
312
318
|
policies=pulumi.get(__ret__, 'policies'))
|
313
|
-
|
314
|
-
|
315
|
-
@_utilities.lift_output_func(get_entity)
|
316
319
|
def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
317
320
|
alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
|
318
321
|
alias_name: Optional[pulumi.Input[Optional[str]]] = None,
|
319
322
|
entity_id: Optional[pulumi.Input[Optional[str]]] = None,
|
320
323
|
entity_name: Optional[pulumi.Input[Optional[str]]] = None,
|
321
324
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
322
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEntityResult]:
|
325
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetEntityResult]:
|
323
326
|
"""
|
324
327
|
## Example Usage
|
325
328
|
|
@@ -329,9 +332,10 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
329
332
|
|
330
333
|
entity = vault.identity.get_entity(entity_name="entity_12345")
|
331
334
|
```
|
335
|
+
|
332
336
|
## Required Vault Capabilities
|
333
337
|
|
334
|
-
Use of this resource requires the `
|
338
|
+
Use of this resource requires the `update` capability on `/identity/lookup/entity`.
|
335
339
|
|
336
340
|
|
337
341
|
:param str alias_id: ID of the alias.
|
@@ -346,7 +350,35 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
346
350
|
:param str entity_name: Name of the entity.
|
347
351
|
:param str namespace: The namespace of the target resource.
|
348
352
|
The value should not contain leading or trailing forward slashes.
|
349
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
353
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
350
354
|
*Available only for Vault Enterprise*.
|
351
355
|
"""
|
352
|
-
|
356
|
+
__args__ = dict()
|
357
|
+
__args__['aliasId'] = alias_id
|
358
|
+
__args__['aliasMountAccessor'] = alias_mount_accessor
|
359
|
+
__args__['aliasName'] = alias_name
|
360
|
+
__args__['entityId'] = entity_id
|
361
|
+
__args__['entityName'] = entity_name
|
362
|
+
__args__['namespace'] = namespace
|
363
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
364
|
+
__ret__ = pulumi.runtime.invoke_output('vault:identity/getEntity:getEntity', __args__, opts=opts, typ=GetEntityResult)
|
365
|
+
return __ret__.apply(lambda __response__: GetEntityResult(
|
366
|
+
alias_id=pulumi.get(__response__, 'alias_id'),
|
367
|
+
alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
|
368
|
+
alias_name=pulumi.get(__response__, 'alias_name'),
|
369
|
+
aliases=pulumi.get(__response__, 'aliases'),
|
370
|
+
creation_time=pulumi.get(__response__, 'creation_time'),
|
371
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
372
|
+
direct_group_ids=pulumi.get(__response__, 'direct_group_ids'),
|
373
|
+
disabled=pulumi.get(__response__, 'disabled'),
|
374
|
+
entity_id=pulumi.get(__response__, 'entity_id'),
|
375
|
+
entity_name=pulumi.get(__response__, 'entity_name'),
|
376
|
+
group_ids=pulumi.get(__response__, 'group_ids'),
|
377
|
+
id=pulumi.get(__response__, 'id'),
|
378
|
+
inherited_group_ids=pulumi.get(__response__, 'inherited_group_ids'),
|
379
|
+
last_update_time=pulumi.get(__response__, 'last_update_time'),
|
380
|
+
merged_entity_ids=pulumi.get(__response__, 'merged_entity_ids'),
|
381
|
+
metadata=pulumi.get(__response__, 'metadata'),
|
382
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
383
|
+
namespace_id=pulumi.get(__response__, 'namespace_id'),
|
384
|
+
policies=pulumi.get(__response__, 'policies')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -137,7 +142,7 @@ class GetGroupResult:
|
|
137
142
|
|
138
143
|
@property
|
139
144
|
@pulumi.getter(name="aliasMetadata")
|
140
|
-
def alias_metadata(self) -> Mapping[str,
|
145
|
+
def alias_metadata(self) -> Mapping[str, str]:
|
141
146
|
"""
|
142
147
|
Arbitrary metadata
|
143
148
|
"""
|
@@ -230,7 +235,7 @@ class GetGroupResult:
|
|
230
235
|
|
231
236
|
@property
|
232
237
|
@pulumi.getter
|
233
|
-
def metadata(self) -> Mapping[str,
|
238
|
+
def metadata(self) -> Mapping[str, str]:
|
234
239
|
"""
|
235
240
|
Arbitrary metadata
|
236
241
|
"""
|
@@ -331,6 +336,7 @@ def get_group(alias_id: Optional[str] = None,
|
|
331
336
|
|
332
337
|
group = vault.identity.get_group(group_name="user")
|
333
338
|
```
|
339
|
+
|
334
340
|
## Required Vault Capabilities
|
335
341
|
|
336
342
|
Use of this resource requires the `create` capability on `/identity/lookup/group`.
|
@@ -348,7 +354,7 @@ def get_group(alias_id: Optional[str] = None,
|
|
348
354
|
:param str group_name: Name of the group.
|
349
355
|
:param str namespace: The namespace of the target resource.
|
350
356
|
The value should not contain leading or trailing forward slashes.
|
351
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
357
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
352
358
|
*Available only for Vault Enterprise*.
|
353
359
|
"""
|
354
360
|
__args__ = dict()
|
@@ -387,16 +393,13 @@ def get_group(alias_id: Optional[str] = None,
|
|
387
393
|
parent_group_ids=pulumi.get(__ret__, 'parent_group_ids'),
|
388
394
|
policies=pulumi.get(__ret__, 'policies'),
|
389
395
|
type=pulumi.get(__ret__, 'type'))
|
390
|
-
|
391
|
-
|
392
|
-
@_utilities.lift_output_func(get_group)
|
393
396
|
def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
394
397
|
alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
|
395
398
|
alias_name: Optional[pulumi.Input[Optional[str]]] = None,
|
396
399
|
group_id: Optional[pulumi.Input[Optional[str]]] = None,
|
397
400
|
group_name: Optional[pulumi.Input[Optional[str]]] = None,
|
398
401
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
399
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetGroupResult]:
|
402
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetGroupResult]:
|
400
403
|
"""
|
401
404
|
## Example Usage
|
402
405
|
|
@@ -406,6 +409,7 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
406
409
|
|
407
410
|
group = vault.identity.get_group(group_name="user")
|
408
411
|
```
|
412
|
+
|
409
413
|
## Required Vault Capabilities
|
410
414
|
|
411
415
|
Use of this resource requires the `create` capability on `/identity/lookup/group`.
|
@@ -423,7 +427,41 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
423
427
|
:param str group_name: Name of the group.
|
424
428
|
:param str namespace: The namespace of the target resource.
|
425
429
|
The value should not contain leading or trailing forward slashes.
|
426
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
430
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
427
431
|
*Available only for Vault Enterprise*.
|
428
432
|
"""
|
429
|
-
|
433
|
+
__args__ = dict()
|
434
|
+
__args__['aliasId'] = alias_id
|
435
|
+
__args__['aliasMountAccessor'] = alias_mount_accessor
|
436
|
+
__args__['aliasName'] = alias_name
|
437
|
+
__args__['groupId'] = group_id
|
438
|
+
__args__['groupName'] = group_name
|
439
|
+
__args__['namespace'] = namespace
|
440
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
441
|
+
__ret__ = pulumi.runtime.invoke_output('vault:identity/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult)
|
442
|
+
return __ret__.apply(lambda __response__: GetGroupResult(
|
443
|
+
alias_canonical_id=pulumi.get(__response__, 'alias_canonical_id'),
|
444
|
+
alias_creation_time=pulumi.get(__response__, 'alias_creation_time'),
|
445
|
+
alias_id=pulumi.get(__response__, 'alias_id'),
|
446
|
+
alias_last_update_time=pulumi.get(__response__, 'alias_last_update_time'),
|
447
|
+
alias_merged_from_canonical_ids=pulumi.get(__response__, 'alias_merged_from_canonical_ids'),
|
448
|
+
alias_metadata=pulumi.get(__response__, 'alias_metadata'),
|
449
|
+
alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
|
450
|
+
alias_mount_path=pulumi.get(__response__, 'alias_mount_path'),
|
451
|
+
alias_mount_type=pulumi.get(__response__, 'alias_mount_type'),
|
452
|
+
alias_name=pulumi.get(__response__, 'alias_name'),
|
453
|
+
creation_time=pulumi.get(__response__, 'creation_time'),
|
454
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
455
|
+
group_id=pulumi.get(__response__, 'group_id'),
|
456
|
+
group_name=pulumi.get(__response__, 'group_name'),
|
457
|
+
id=pulumi.get(__response__, 'id'),
|
458
|
+
last_update_time=pulumi.get(__response__, 'last_update_time'),
|
459
|
+
member_entity_ids=pulumi.get(__response__, 'member_entity_ids'),
|
460
|
+
member_group_ids=pulumi.get(__response__, 'member_group_ids'),
|
461
|
+
metadata=pulumi.get(__response__, 'metadata'),
|
462
|
+
modify_index=pulumi.get(__response__, 'modify_index'),
|
463
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
464
|
+
namespace_id=pulumi.get(__response__, 'namespace_id'),
|
465
|
+
parent_group_ids=pulumi.get(__response__, 'parent_group_ids'),
|
466
|
+
policies=pulumi.get(__response__, 'policies'),
|
467
|
+
type=pulumi.get(__response__, 'type')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -98,6 +103,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
98
103
|
import pulumi_vault as vault
|
99
104
|
|
100
105
|
app = vault.identity.OidcClient("app",
|
106
|
+
name="application",
|
101
107
|
redirect_uris=[
|
102
108
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
103
109
|
"http://127.0.0.1:8251/callback",
|
@@ -112,7 +118,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
112
118
|
:param str name: The name of the OIDC Client in Vault.
|
113
119
|
:param str namespace: The namespace of the target resource.
|
114
120
|
The value should not contain leading or trailing forward slashes.
|
115
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
121
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
116
122
|
*Available only for Vault Enterprise*.
|
117
123
|
"""
|
118
124
|
__args__ = dict()
|
@@ -127,12 +133,9 @@ def get_oidc_client_creds(name: Optional[str] = None,
|
|
127
133
|
id=pulumi.get(__ret__, 'id'),
|
128
134
|
name=pulumi.get(__ret__, 'name'),
|
129
135
|
namespace=pulumi.get(__ret__, 'namespace'))
|
130
|
-
|
131
|
-
|
132
|
-
@_utilities.lift_output_func(get_oidc_client_creds)
|
133
136
|
def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
134
137
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
135
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcClientCredsResult]:
|
138
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetOidcClientCredsResult]:
|
136
139
|
"""
|
137
140
|
## Example Usage
|
138
141
|
|
@@ -141,6 +144,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
141
144
|
import pulumi_vault as vault
|
142
145
|
|
143
146
|
app = vault.identity.OidcClient("app",
|
147
|
+
name="application",
|
144
148
|
redirect_uris=[
|
145
149
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
146
150
|
"http://127.0.0.1:8251/callback",
|
@@ -155,7 +159,17 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
|
|
155
159
|
:param str name: The name of the OIDC Client in Vault.
|
156
160
|
:param str namespace: The namespace of the target resource.
|
157
161
|
The value should not contain leading or trailing forward slashes.
|
158
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
162
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
159
163
|
*Available only for Vault Enterprise*.
|
160
164
|
"""
|
161
|
-
|
165
|
+
__args__ = dict()
|
166
|
+
__args__['name'] = name
|
167
|
+
__args__['namespace'] = namespace
|
168
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
169
|
+
__ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcClientCreds:getOidcClientCreds', __args__, opts=opts, typ=GetOidcClientCredsResult)
|
170
|
+
return __ret__.apply(lambda __response__: GetOidcClientCredsResult(
|
171
|
+
client_id=pulumi.get(__response__, 'client_id'),
|
172
|
+
client_secret=pulumi.get(__response__, 'client_secret'),
|
173
|
+
id=pulumi.get(__response__, 'id'),
|
174
|
+
name=pulumi.get(__response__, 'name'),
|
175
|
+
namespace=pulumi.get(__response__, 'namespace')))
|