pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['GroupMemberEntityIdsArgs', 'GroupMemberEntityIds']
|
@@ -29,7 +34,7 @@ class GroupMemberEntityIdsArgs:
|
|
29
34
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] member_entity_ids: List of member entities that belong to the group
|
30
35
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
36
|
The value should not contain leading or trailing forward slashes.
|
32
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
37
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
38
|
*Available only for Vault Enterprise*.
|
34
39
|
"""
|
35
40
|
pulumi.set(__self__, "group_id", group_id)
|
@@ -86,7 +91,7 @@ class GroupMemberEntityIdsArgs:
|
|
86
91
|
"""
|
87
92
|
The namespace to provision the resource in.
|
88
93
|
The value should not contain leading or trailing forward slashes.
|
89
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
94
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
90
95
|
*Available only for Vault Enterprise*.
|
91
96
|
"""
|
92
97
|
return pulumi.get(self, "namespace")
|
@@ -101,7 +106,6 @@ class _GroupMemberEntityIdsState:
|
|
101
106
|
def __init__(__self__, *,
|
102
107
|
exclusive: Optional[pulumi.Input[bool]] = None,
|
103
108
|
group_id: Optional[pulumi.Input[str]] = None,
|
104
|
-
group_name: Optional[pulumi.Input[str]] = None,
|
105
109
|
member_entity_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
106
110
|
namespace: Optional[pulumi.Input[str]] = None):
|
107
111
|
"""
|
@@ -112,26 +116,16 @@ class _GroupMemberEntityIdsState:
|
|
112
116
|
|
113
117
|
If set to `false`, this resource will simply ensure that the member entities specified in the resource are present in the group. When destroying the resource, the resource will ensure that the member entities specified in the resource are removed.
|
114
118
|
:param pulumi.Input[str] group_id: Group ID to assign member entities to.
|
115
|
-
:param pulumi.Input[str] group_name: The name of the group that are assigned the member entities.
|
116
|
-
*Deprecated: The value for group_name may not always be accurate*
|
117
|
-
*use* `data.vault_identity_group.*.group_name`, *or* `vault_identity_group.*.group_name` *instead.*
|
118
119
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] member_entity_ids: List of member entities that belong to the group
|
119
120
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
120
121
|
The value should not contain leading or trailing forward slashes.
|
121
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
122
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
122
123
|
*Available only for Vault Enterprise*.
|
123
124
|
"""
|
124
125
|
if exclusive is not None:
|
125
126
|
pulumi.set(__self__, "exclusive", exclusive)
|
126
127
|
if group_id is not None:
|
127
128
|
pulumi.set(__self__, "group_id", group_id)
|
128
|
-
if group_name is not None:
|
129
|
-
warnings.warn("""The value for group_name may not always be accurate,
|
130
|
-
use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_name\" instead""", DeprecationWarning)
|
131
|
-
pulumi.log.warn("""group_name is deprecated: The value for group_name may not always be accurate,
|
132
|
-
use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_name\" instead""")
|
133
|
-
if group_name is not None:
|
134
|
-
pulumi.set(__self__, "group_name", group_name)
|
135
129
|
if member_entity_ids is not None:
|
136
130
|
pulumi.set(__self__, "member_entity_ids", member_entity_ids)
|
137
131
|
if namespace is not None:
|
@@ -165,25 +159,6 @@ use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_n
|
|
165
159
|
def group_id(self, value: Optional[pulumi.Input[str]]):
|
166
160
|
pulumi.set(self, "group_id", value)
|
167
161
|
|
168
|
-
@property
|
169
|
-
@pulumi.getter(name="groupName")
|
170
|
-
def group_name(self) -> Optional[pulumi.Input[str]]:
|
171
|
-
"""
|
172
|
-
The name of the group that are assigned the member entities.
|
173
|
-
*Deprecated: The value for group_name may not always be accurate*
|
174
|
-
*use* `data.vault_identity_group.*.group_name`, *or* `vault_identity_group.*.group_name` *instead.*
|
175
|
-
"""
|
176
|
-
warnings.warn("""The value for group_name may not always be accurate,
|
177
|
-
use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_name\" instead""", DeprecationWarning)
|
178
|
-
pulumi.log.warn("""group_name is deprecated: The value for group_name may not always be accurate,
|
179
|
-
use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_name\" instead""")
|
180
|
-
|
181
|
-
return pulumi.get(self, "group_name")
|
182
|
-
|
183
|
-
@group_name.setter
|
184
|
-
def group_name(self, value: Optional[pulumi.Input[str]]):
|
185
|
-
pulumi.set(self, "group_name", value)
|
186
|
-
|
187
162
|
@property
|
188
163
|
@pulumi.getter(name="memberEntityIds")
|
189
164
|
def member_entity_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -202,7 +177,7 @@ use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_n
|
|
202
177
|
"""
|
203
178
|
The namespace to provision the resource in.
|
204
179
|
The value should not contain leading or trailing forward slashes.
|
205
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
180
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
206
181
|
*Available only for Vault Enterprise*.
|
207
182
|
"""
|
208
183
|
return pulumi.get(self, "namespace")
|
@@ -226,6 +201,7 @@ class GroupMemberEntityIds(pulumi.CustomResource):
|
|
226
201
|
Manages member entities for an Identity Group for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
|
227
202
|
|
228
203
|
## Example Usage
|
204
|
+
|
229
205
|
### Exclusive Member Entities
|
230
206
|
|
231
207
|
```python
|
@@ -233,17 +209,19 @@ class GroupMemberEntityIds(pulumi.CustomResource):
|
|
233
209
|
import pulumi_vault as vault
|
234
210
|
|
235
211
|
internal = vault.identity.Group("internal",
|
212
|
+
name="internal",
|
236
213
|
type="internal",
|
237
214
|
external_member_entity_ids=True,
|
238
215
|
metadata={
|
239
216
|
"version": "2",
|
240
217
|
})
|
241
|
-
user = vault.identity.Entity("user")
|
218
|
+
user = vault.identity.Entity("user", name="user")
|
242
219
|
members = vault.identity.GroupMemberEntityIds("members",
|
243
220
|
exclusive=True,
|
244
221
|
member_entity_ids=[user.id],
|
245
222
|
group_id=internal.id)
|
246
223
|
```
|
224
|
+
|
247
225
|
### Non-exclusive Member Entities
|
248
226
|
|
249
227
|
```python
|
@@ -251,14 +229,15 @@ class GroupMemberEntityIds(pulumi.CustomResource):
|
|
251
229
|
import pulumi_vault as vault
|
252
230
|
|
253
231
|
internal = vault.identity.Group("internal",
|
232
|
+
name="internal",
|
254
233
|
type="internal",
|
255
234
|
external_member_entity_ids=True,
|
256
235
|
metadata={
|
257
236
|
"version": "2",
|
258
237
|
})
|
259
|
-
test_user = vault.identity.Entity("
|
260
|
-
second_test_user = vault.identity.Entity("
|
261
|
-
dev_user = vault.identity.Entity("
|
238
|
+
test_user = vault.identity.Entity("test_user", name="test")
|
239
|
+
second_test_user = vault.identity.Entity("second_test_user", name="second_test")
|
240
|
+
dev_user = vault.identity.Entity("dev_user", name="dev")
|
262
241
|
test = vault.identity.GroupMemberEntityIds("test",
|
263
242
|
member_entity_ids=[
|
264
243
|
test_user.id,
|
@@ -283,7 +262,7 @@ class GroupMemberEntityIds(pulumi.CustomResource):
|
|
283
262
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] member_entity_ids: List of member entities that belong to the group
|
284
263
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
285
264
|
The value should not contain leading or trailing forward slashes.
|
286
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
265
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
287
266
|
*Available only for Vault Enterprise*.
|
288
267
|
"""
|
289
268
|
...
|
@@ -296,6 +275,7 @@ class GroupMemberEntityIds(pulumi.CustomResource):
|
|
296
275
|
Manages member entities for an Identity Group for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
|
297
276
|
|
298
277
|
## Example Usage
|
278
|
+
|
299
279
|
### Exclusive Member Entities
|
300
280
|
|
301
281
|
```python
|
@@ -303,17 +283,19 @@ class GroupMemberEntityIds(pulumi.CustomResource):
|
|
303
283
|
import pulumi_vault as vault
|
304
284
|
|
305
285
|
internal = vault.identity.Group("internal",
|
286
|
+
name="internal",
|
306
287
|
type="internal",
|
307
288
|
external_member_entity_ids=True,
|
308
289
|
metadata={
|
309
290
|
"version": "2",
|
310
291
|
})
|
311
|
-
user = vault.identity.Entity("user")
|
292
|
+
user = vault.identity.Entity("user", name="user")
|
312
293
|
members = vault.identity.GroupMemberEntityIds("members",
|
313
294
|
exclusive=True,
|
314
295
|
member_entity_ids=[user.id],
|
315
296
|
group_id=internal.id)
|
316
297
|
```
|
298
|
+
|
317
299
|
### Non-exclusive Member Entities
|
318
300
|
|
319
301
|
```python
|
@@ -321,14 +303,15 @@ class GroupMemberEntityIds(pulumi.CustomResource):
|
|
321
303
|
import pulumi_vault as vault
|
322
304
|
|
323
305
|
internal = vault.identity.Group("internal",
|
306
|
+
name="internal",
|
324
307
|
type="internal",
|
325
308
|
external_member_entity_ids=True,
|
326
309
|
metadata={
|
327
310
|
"version": "2",
|
328
311
|
})
|
329
|
-
test_user = vault.identity.Entity("
|
330
|
-
second_test_user = vault.identity.Entity("
|
331
|
-
dev_user = vault.identity.Entity("
|
312
|
+
test_user = vault.identity.Entity("test_user", name="test")
|
313
|
+
second_test_user = vault.identity.Entity("second_test_user", name="second_test")
|
314
|
+
dev_user = vault.identity.Entity("dev_user", name="dev")
|
332
315
|
test = vault.identity.GroupMemberEntityIds("test",
|
333
316
|
member_entity_ids=[
|
334
317
|
test_user.id,
|
@@ -376,7 +359,6 @@ class GroupMemberEntityIds(pulumi.CustomResource):
|
|
376
359
|
__props__.__dict__["group_id"] = group_id
|
377
360
|
__props__.__dict__["member_entity_ids"] = member_entity_ids
|
378
361
|
__props__.__dict__["namespace"] = namespace
|
379
|
-
__props__.__dict__["group_name"] = None
|
380
362
|
super(GroupMemberEntityIds, __self__).__init__(
|
381
363
|
'vault:identity/groupMemberEntityIds:GroupMemberEntityIds',
|
382
364
|
resource_name,
|
@@ -389,7 +371,6 @@ class GroupMemberEntityIds(pulumi.CustomResource):
|
|
389
371
|
opts: Optional[pulumi.ResourceOptions] = None,
|
390
372
|
exclusive: Optional[pulumi.Input[bool]] = None,
|
391
373
|
group_id: Optional[pulumi.Input[str]] = None,
|
392
|
-
group_name: Optional[pulumi.Input[str]] = None,
|
393
374
|
member_entity_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
394
375
|
namespace: Optional[pulumi.Input[str]] = None) -> 'GroupMemberEntityIds':
|
395
376
|
"""
|
@@ -405,13 +386,10 @@ class GroupMemberEntityIds(pulumi.CustomResource):
|
|
405
386
|
|
406
387
|
If set to `false`, this resource will simply ensure that the member entities specified in the resource are present in the group. When destroying the resource, the resource will ensure that the member entities specified in the resource are removed.
|
407
388
|
:param pulumi.Input[str] group_id: Group ID to assign member entities to.
|
408
|
-
:param pulumi.Input[str] group_name: The name of the group that are assigned the member entities.
|
409
|
-
*Deprecated: The value for group_name may not always be accurate*
|
410
|
-
*use* `data.vault_identity_group.*.group_name`, *or* `vault_identity_group.*.group_name` *instead.*
|
411
389
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] member_entity_ids: List of member entities that belong to the group
|
412
390
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
413
391
|
The value should not contain leading or trailing forward slashes.
|
414
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
392
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
415
393
|
*Available only for Vault Enterprise*.
|
416
394
|
"""
|
417
395
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -420,7 +398,6 @@ class GroupMemberEntityIds(pulumi.CustomResource):
|
|
420
398
|
|
421
399
|
__props__.__dict__["exclusive"] = exclusive
|
422
400
|
__props__.__dict__["group_id"] = group_id
|
423
|
-
__props__.__dict__["group_name"] = group_name
|
424
401
|
__props__.__dict__["member_entity_ids"] = member_entity_ids
|
425
402
|
__props__.__dict__["namespace"] = namespace
|
426
403
|
return GroupMemberEntityIds(resource_name, opts=opts, __props__=__props__)
|
@@ -445,21 +422,6 @@ class GroupMemberEntityIds(pulumi.CustomResource):
|
|
445
422
|
"""
|
446
423
|
return pulumi.get(self, "group_id")
|
447
424
|
|
448
|
-
@property
|
449
|
-
@pulumi.getter(name="groupName")
|
450
|
-
def group_name(self) -> pulumi.Output[str]:
|
451
|
-
"""
|
452
|
-
The name of the group that are assigned the member entities.
|
453
|
-
*Deprecated: The value for group_name may not always be accurate*
|
454
|
-
*use* `data.vault_identity_group.*.group_name`, *or* `vault_identity_group.*.group_name` *instead.*
|
455
|
-
"""
|
456
|
-
warnings.warn("""The value for group_name may not always be accurate,
|
457
|
-
use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_name\" instead""", DeprecationWarning)
|
458
|
-
pulumi.log.warn("""group_name is deprecated: The value for group_name may not always be accurate,
|
459
|
-
use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_name\" instead""")
|
460
|
-
|
461
|
-
return pulumi.get(self, "group_name")
|
462
|
-
|
463
425
|
@property
|
464
426
|
@pulumi.getter(name="memberEntityIds")
|
465
427
|
def member_entity_ids(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
@@ -474,7 +436,7 @@ use \"data.vault_identity_group.*.group_name\", \"vault_identity_group.*.group_n
|
|
474
436
|
"""
|
475
437
|
The namespace to provision the resource in.
|
476
438
|
The value should not contain leading or trailing forward slashes.
|
477
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
439
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
478
440
|
*Available only for Vault Enterprise*.
|
479
441
|
"""
|
480
442
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['GroupMemberGroupIdsArgs', 'GroupMemberGroupIds']
|
@@ -32,7 +37,7 @@ class GroupMemberGroupIdsArgs:
|
|
32
37
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] member_group_ids: List of member groups that belong to the group
|
33
38
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
34
39
|
The value should not contain leading or trailing forward slashes.
|
35
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
40
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
36
41
|
*Available only for Vault Enterprise*.
|
37
42
|
"""
|
38
43
|
pulumi.set(__self__, "group_id", group_id)
|
@@ -92,7 +97,7 @@ class GroupMemberGroupIdsArgs:
|
|
92
97
|
"""
|
93
98
|
The namespace to provision the resource in.
|
94
99
|
The value should not contain leading or trailing forward slashes.
|
95
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
100
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
96
101
|
*Available only for Vault Enterprise*.
|
97
102
|
"""
|
98
103
|
return pulumi.get(self, "namespace")
|
@@ -123,7 +128,7 @@ class _GroupMemberGroupIdsState:
|
|
123
128
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] member_group_ids: List of member groups that belong to the group
|
124
129
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
125
130
|
The value should not contain leading or trailing forward slashes.
|
126
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
131
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
127
132
|
*Available only for Vault Enterprise*.
|
128
133
|
"""
|
129
134
|
if exclusive is not None:
|
@@ -184,7 +189,7 @@ class _GroupMemberGroupIdsState:
|
|
184
189
|
"""
|
185
190
|
The namespace to provision the resource in.
|
186
191
|
The value should not contain leading or trailing forward slashes.
|
187
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
192
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
188
193
|
*Available only for Vault Enterprise*.
|
189
194
|
"""
|
190
195
|
return pulumi.get(self, "namespace")
|
@@ -210,6 +215,7 @@ class GroupMemberGroupIds(pulumi.CustomResource):
|
|
210
215
|
is the identity management solution for Vault.
|
211
216
|
|
212
217
|
## Example Usage
|
218
|
+
|
213
219
|
### Exclusive Member Groups
|
214
220
|
|
215
221
|
```python
|
@@ -217,19 +223,23 @@ class GroupMemberGroupIds(pulumi.CustomResource):
|
|
217
223
|
import pulumi_vault as vault
|
218
224
|
|
219
225
|
internal = vault.identity.Group("internal",
|
226
|
+
name="internal",
|
220
227
|
type="internal",
|
221
228
|
external_member_group_ids=True,
|
222
229
|
metadata={
|
223
230
|
"version": "2",
|
224
231
|
})
|
225
|
-
users = vault.identity.Group("users",
|
226
|
-
"
|
227
|
-
|
232
|
+
users = vault.identity.Group("users",
|
233
|
+
name="users",
|
234
|
+
metadata={
|
235
|
+
"version": "2",
|
236
|
+
})
|
228
237
|
members = vault.identity.GroupMemberGroupIds("members",
|
229
238
|
exclusive=True,
|
230
239
|
member_group_ids=[users.id],
|
231
240
|
group_id=internal.id)
|
232
241
|
```
|
242
|
+
|
233
243
|
### Non-Exclusive Member Groups
|
234
244
|
|
235
245
|
```python
|
@@ -237,14 +247,17 @@ class GroupMemberGroupIds(pulumi.CustomResource):
|
|
237
247
|
import pulumi_vault as vault
|
238
248
|
|
239
249
|
internal = vault.identity.Group("internal",
|
250
|
+
name="internal",
|
240
251
|
type="internal",
|
241
252
|
external_member_group_ids=True,
|
242
253
|
metadata={
|
243
254
|
"version": "2",
|
244
255
|
})
|
245
|
-
users = vault.identity.Group("users",
|
246
|
-
"
|
247
|
-
|
256
|
+
users = vault.identity.Group("users",
|
257
|
+
name="users",
|
258
|
+
metadata={
|
259
|
+
"version": "2",
|
260
|
+
})
|
248
261
|
members = vault.identity.GroupMemberGroupIds("members",
|
249
262
|
exclusive=False,
|
250
263
|
member_group_ids=[users.id],
|
@@ -265,7 +278,7 @@ class GroupMemberGroupIds(pulumi.CustomResource):
|
|
265
278
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] member_group_ids: List of member groups that belong to the group
|
266
279
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
267
280
|
The value should not contain leading or trailing forward slashes.
|
268
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
281
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
269
282
|
*Available only for Vault Enterprise*.
|
270
283
|
"""
|
271
284
|
...
|
@@ -280,6 +293,7 @@ class GroupMemberGroupIds(pulumi.CustomResource):
|
|
280
293
|
is the identity management solution for Vault.
|
281
294
|
|
282
295
|
## Example Usage
|
296
|
+
|
283
297
|
### Exclusive Member Groups
|
284
298
|
|
285
299
|
```python
|
@@ -287,19 +301,23 @@ class GroupMemberGroupIds(pulumi.CustomResource):
|
|
287
301
|
import pulumi_vault as vault
|
288
302
|
|
289
303
|
internal = vault.identity.Group("internal",
|
304
|
+
name="internal",
|
290
305
|
type="internal",
|
291
306
|
external_member_group_ids=True,
|
292
307
|
metadata={
|
293
308
|
"version": "2",
|
294
309
|
})
|
295
|
-
users = vault.identity.Group("users",
|
296
|
-
"
|
297
|
-
|
310
|
+
users = vault.identity.Group("users",
|
311
|
+
name="users",
|
312
|
+
metadata={
|
313
|
+
"version": "2",
|
314
|
+
})
|
298
315
|
members = vault.identity.GroupMemberGroupIds("members",
|
299
316
|
exclusive=True,
|
300
317
|
member_group_ids=[users.id],
|
301
318
|
group_id=internal.id)
|
302
319
|
```
|
320
|
+
|
303
321
|
### Non-Exclusive Member Groups
|
304
322
|
|
305
323
|
```python
|
@@ -307,14 +325,17 @@ class GroupMemberGroupIds(pulumi.CustomResource):
|
|
307
325
|
import pulumi_vault as vault
|
308
326
|
|
309
327
|
internal = vault.identity.Group("internal",
|
328
|
+
name="internal",
|
310
329
|
type="internal",
|
311
330
|
external_member_group_ids=True,
|
312
331
|
metadata={
|
313
332
|
"version": "2",
|
314
333
|
})
|
315
|
-
users = vault.identity.Group("users",
|
316
|
-
"
|
317
|
-
|
334
|
+
users = vault.identity.Group("users",
|
335
|
+
name="users",
|
336
|
+
metadata={
|
337
|
+
"version": "2",
|
338
|
+
})
|
318
339
|
members = vault.identity.GroupMemberGroupIds("members",
|
319
340
|
exclusive=False,
|
320
341
|
member_group_ids=[users.id],
|
@@ -388,7 +409,7 @@ class GroupMemberGroupIds(pulumi.CustomResource):
|
|
388
409
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] member_group_ids: List of member groups that belong to the group
|
389
410
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
390
411
|
The value should not contain leading or trailing forward slashes.
|
391
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
412
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
392
413
|
*Available only for Vault Enterprise*.
|
393
414
|
"""
|
394
415
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -438,7 +459,7 @@ class GroupMemberGroupIds(pulumi.CustomResource):
|
|
438
459
|
"""
|
439
460
|
The namespace to provision the resource in.
|
440
461
|
The value should not contain leading or trailing forward slashes.
|
441
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
462
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
442
463
|
*Available only for Vault Enterprise*.
|
443
464
|
"""
|
444
465
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['GroupPoliciesArgs', 'GroupPolicies']
|
@@ -29,7 +34,7 @@ class GroupPoliciesArgs:
|
|
29
34
|
If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the group. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
|
30
35
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
36
|
The value should not contain leading or trailing forward slashes.
|
32
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
37
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
38
|
*Available only for Vault Enterprise*.
|
34
39
|
"""
|
35
40
|
pulumi.set(__self__, "group_id", group_id)
|
@@ -85,7 +90,7 @@ class GroupPoliciesArgs:
|
|
85
90
|
"""
|
86
91
|
The namespace to provision the resource in.
|
87
92
|
The value should not contain leading or trailing forward slashes.
|
88
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
93
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
89
94
|
*Available only for Vault Enterprise*.
|
90
95
|
"""
|
91
96
|
return pulumi.get(self, "namespace")
|
@@ -114,7 +119,7 @@ class _GroupPoliciesState:
|
|
114
119
|
:param pulumi.Input[str] group_name: The name of the group that are assigned the policies.
|
115
120
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
116
121
|
The value should not contain leading or trailing forward slashes.
|
117
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
122
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
118
123
|
*Available only for Vault Enterprise*.
|
119
124
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the group
|
120
125
|
"""
|
@@ -175,7 +180,7 @@ class _GroupPoliciesState:
|
|
175
180
|
"""
|
176
181
|
The namespace to provision the resource in.
|
177
182
|
The value should not contain leading or trailing forward slashes.
|
178
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
183
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
179
184
|
*Available only for Vault Enterprise*.
|
180
185
|
"""
|
181
186
|
return pulumi.get(self, "namespace")
|
@@ -211,6 +216,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
211
216
|
Manages policies for an Identity Group for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
|
212
217
|
|
213
218
|
## Example Usage
|
219
|
+
|
214
220
|
### Exclusive Policies
|
215
221
|
|
216
222
|
```python
|
@@ -218,6 +224,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
218
224
|
import pulumi_vault as vault
|
219
225
|
|
220
226
|
internal = vault.identity.Group("internal",
|
227
|
+
name="internal",
|
221
228
|
type="internal",
|
222
229
|
external_policies=True,
|
223
230
|
metadata={
|
@@ -231,6 +238,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
231
238
|
exclusive=True,
|
232
239
|
group_id=internal.id)
|
233
240
|
```
|
241
|
+
|
234
242
|
### Non-exclusive Policies
|
235
243
|
|
236
244
|
```python
|
@@ -238,6 +246,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
238
246
|
import pulumi_vault as vault
|
239
247
|
|
240
248
|
internal = vault.identity.Group("internal",
|
249
|
+
name="internal",
|
241
250
|
type="internal",
|
242
251
|
external_policies=True,
|
243
252
|
metadata={
|
@@ -266,7 +275,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
266
275
|
:param pulumi.Input[str] group_id: Group ID to assign policies to.
|
267
276
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
268
277
|
The value should not contain leading or trailing forward slashes.
|
269
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
278
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
270
279
|
*Available only for Vault Enterprise*.
|
271
280
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the group
|
272
281
|
"""
|
@@ -280,6 +289,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
280
289
|
Manages policies for an Identity Group for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
|
281
290
|
|
282
291
|
## Example Usage
|
292
|
+
|
283
293
|
### Exclusive Policies
|
284
294
|
|
285
295
|
```python
|
@@ -287,6 +297,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
287
297
|
import pulumi_vault as vault
|
288
298
|
|
289
299
|
internal = vault.identity.Group("internal",
|
300
|
+
name="internal",
|
290
301
|
type="internal",
|
291
302
|
external_policies=True,
|
292
303
|
metadata={
|
@@ -300,6 +311,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
300
311
|
exclusive=True,
|
301
312
|
group_id=internal.id)
|
302
313
|
```
|
314
|
+
|
303
315
|
### Non-exclusive Policies
|
304
316
|
|
305
317
|
```python
|
@@ -307,6 +319,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
307
319
|
import pulumi_vault as vault
|
308
320
|
|
309
321
|
internal = vault.identity.Group("internal",
|
322
|
+
name="internal",
|
310
323
|
type="internal",
|
311
324
|
external_policies=True,
|
312
325
|
metadata={
|
@@ -393,7 +406,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
393
406
|
:param pulumi.Input[str] group_name: The name of the group that are assigned the policies.
|
394
407
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
395
408
|
The value should not contain leading or trailing forward slashes.
|
396
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
409
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
397
410
|
*Available only for Vault Enterprise*.
|
398
411
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the group
|
399
412
|
"""
|
@@ -442,7 +455,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
442
455
|
"""
|
443
456
|
The namespace to provision the resource in.
|
444
457
|
The value should not contain leading or trailing forward slashes.
|
445
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
458
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
446
459
|
*Available only for Vault Enterprise*.
|
447
460
|
"""
|
448
461
|
return pulumi.get(self, "namespace")
|
pulumi_vault/identity/mfa_duo.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaDuoArgs', 'MfaDuo']
|
@@ -384,8 +389,8 @@ class MfaDuo(pulumi.CustomResource):
|
|
384
389
|
|
385
390
|
example = vault.identity.MfaDuo("example",
|
386
391
|
api_hostname="api-xxxxxxxx.duosecurity.com",
|
387
|
-
|
388
|
-
|
392
|
+
secret_key="secret-key",
|
393
|
+
integration_key="secret-int-key")
|
389
394
|
```
|
390
395
|
|
391
396
|
## Import
|
@@ -393,7 +398,7 @@ class MfaDuo(pulumi.CustomResource):
|
|
393
398
|
Resource can be imported using its `uuid` field, e.g.
|
394
399
|
|
395
400
|
```sh
|
396
|
-
|
401
|
+
$ pulumi import vault:identity/mfaDuo:MfaDuo example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
|
397
402
|
```
|
398
403
|
|
399
404
|
:param str resource_name: The name of the resource.
|
@@ -423,8 +428,8 @@ class MfaDuo(pulumi.CustomResource):
|
|
423
428
|
|
424
429
|
example = vault.identity.MfaDuo("example",
|
425
430
|
api_hostname="api-xxxxxxxx.duosecurity.com",
|
426
|
-
|
427
|
-
|
431
|
+
secret_key="secret-key",
|
432
|
+
integration_key="secret-int-key")
|
428
433
|
```
|
429
434
|
|
430
435
|
## Import
|
@@ -432,7 +437,7 @@ class MfaDuo(pulumi.CustomResource):
|
|
432
437
|
Resource can be imported using its `uuid` field, e.g.
|
433
438
|
|
434
439
|
```sh
|
435
|
-
|
440
|
+
$ pulumi import vault:identity/mfaDuo:MfaDuo example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
|
436
441
|
```
|
437
442
|
|
438
443
|
:param str resource_name: The name of the resource.
|