pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
|
@@ -26,7 +31,7 @@ class AuthBackendGroupArgs:
|
|
26
31
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
27
32
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
28
33
|
The value should not contain leading or trailing forward slashes.
|
29
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
34
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
30
35
|
*Available only for Vault Enterprise*.
|
31
36
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
|
32
37
|
"""
|
@@ -70,7 +75,7 @@ class AuthBackendGroupArgs:
|
|
70
75
|
"""
|
71
76
|
The namespace to provision the resource in.
|
72
77
|
The value should not contain leading or trailing forward slashes.
|
73
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
78
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
74
79
|
*Available only for Vault Enterprise*.
|
75
80
|
"""
|
76
81
|
return pulumi.get(self, "namespace")
|
@@ -107,7 +112,7 @@ class _AuthBackendGroupState:
|
|
107
112
|
:param pulumi.Input[str] groupname: The LDAP groupname
|
108
113
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
109
114
|
The value should not contain leading or trailing forward slashes.
|
110
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
115
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
111
116
|
*Available only for Vault Enterprise*.
|
112
117
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
|
113
118
|
"""
|
@@ -152,7 +157,7 @@ class _AuthBackendGroupState:
|
|
152
157
|
"""
|
153
158
|
The namespace to provision the resource in.
|
154
159
|
The value should not contain leading or trailing forward slashes.
|
155
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
160
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
156
161
|
*Available only for Vault Enterprise*.
|
157
162
|
"""
|
158
163
|
return pulumi.get(self, "namespace")
|
@@ -213,7 +218,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
213
218
|
LDAP authentication backend groups can be imported using the `path`, e.g.
|
214
219
|
|
215
220
|
```sh
|
216
|
-
|
221
|
+
$ pulumi import vault:ldap/authBackendGroup:AuthBackendGroup foo auth/ldap/groups/foo
|
217
222
|
```
|
218
223
|
|
219
224
|
:param str resource_name: The name of the resource.
|
@@ -224,7 +229,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
224
229
|
:param pulumi.Input[str] groupname: The LDAP groupname
|
225
230
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
226
231
|
The value should not contain leading or trailing forward slashes.
|
227
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
232
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
228
233
|
*Available only for Vault Enterprise*.
|
229
234
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
|
230
235
|
"""
|
@@ -263,7 +268,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
263
268
|
LDAP authentication backend groups can be imported using the `path`, e.g.
|
264
269
|
|
265
270
|
```sh
|
266
|
-
|
271
|
+
$ pulumi import vault:ldap/authBackendGroup:AuthBackendGroup foo auth/ldap/groups/foo
|
267
272
|
```
|
268
273
|
|
269
274
|
:param str resource_name: The name of the resource.
|
@@ -327,7 +332,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
327
332
|
:param pulumi.Input[str] groupname: The LDAP groupname
|
328
333
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
329
334
|
The value should not contain leading or trailing forward slashes.
|
330
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
335
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
331
336
|
*Available only for Vault Enterprise*.
|
332
337
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
|
333
338
|
"""
|
@@ -365,7 +370,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
365
370
|
"""
|
366
371
|
The namespace to provision the resource in.
|
367
372
|
The value should not contain leading or trailing forward slashes.
|
368
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
373
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
369
374
|
*Available only for Vault Enterprise*.
|
370
375
|
"""
|
371
376
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
|
@@ -28,7 +33,7 @@ class AuthBackendUserArgs:
|
|
28
33
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
|
29
34
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
30
35
|
The value should not contain leading or trailing forward slashes.
|
31
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
36
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
32
37
|
*Available only for Vault Enterprise*.
|
33
38
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
|
34
39
|
"""
|
@@ -86,7 +91,7 @@ class AuthBackendUserArgs:
|
|
86
91
|
"""
|
87
92
|
The namespace to provision the resource in.
|
88
93
|
The value should not contain leading or trailing forward slashes.
|
89
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
94
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
90
95
|
*Available only for Vault Enterprise*.
|
91
96
|
"""
|
92
97
|
return pulumi.get(self, "namespace")
|
@@ -124,7 +129,7 @@ class _AuthBackendUserState:
|
|
124
129
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
|
125
130
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
126
131
|
The value should not contain leading or trailing forward slashes.
|
127
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
132
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
128
133
|
*Available only for Vault Enterprise*.
|
129
134
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
|
130
135
|
:param pulumi.Input[str] username: The LDAP username
|
@@ -172,7 +177,7 @@ class _AuthBackendUserState:
|
|
172
177
|
"""
|
173
178
|
The namespace to provision the resource in.
|
174
179
|
The value should not contain leading or trailing forward slashes.
|
175
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
180
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
176
181
|
*Available only for Vault Enterprise*.
|
177
182
|
"""
|
178
183
|
return pulumi.get(self, "namespace")
|
@@ -249,7 +254,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
249
254
|
LDAP authentication backend users can be imported using the `path`, e.g.
|
250
255
|
|
251
256
|
```sh
|
252
|
-
|
257
|
+
$ pulumi import vault:ldap/authBackendUser:AuthBackendUser foo auth/ldap/users/foo
|
253
258
|
```
|
254
259
|
|
255
260
|
:param str resource_name: The name of the resource.
|
@@ -260,7 +265,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
260
265
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
|
261
266
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
262
267
|
The value should not contain leading or trailing forward slashes.
|
263
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
268
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
264
269
|
*Available only for Vault Enterprise*.
|
265
270
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
|
266
271
|
:param pulumi.Input[str] username: The LDAP username
|
@@ -303,7 +308,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
303
308
|
LDAP authentication backend users can be imported using the `path`, e.g.
|
304
309
|
|
305
310
|
```sh
|
306
|
-
|
311
|
+
$ pulumi import vault:ldap/authBackendUser:AuthBackendUser foo auth/ldap/users/foo
|
307
312
|
```
|
308
313
|
|
309
314
|
:param str resource_name: The name of the resource.
|
@@ -370,7 +375,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
370
375
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
|
371
376
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
372
377
|
The value should not contain leading or trailing forward slashes.
|
373
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
378
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
374
379
|
*Available only for Vault Enterprise*.
|
375
380
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
|
376
381
|
:param pulumi.Input[str] username: The LDAP username
|
@@ -410,7 +415,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
410
415
|
"""
|
411
416
|
The namespace to provision the resource in.
|
412
417
|
The value should not contain leading or trailing forward slashes.
|
413
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
418
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
414
419
|
*Available only for Vault Enterprise*.
|
415
420
|
"""
|
416
421
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -150,14 +155,27 @@ def get_dynamic_credentials(mount: Optional[str] = None,
|
|
150
155
|
password=pulumi.get(__ret__, 'password'),
|
151
156
|
role_name=pulumi.get(__ret__, 'role_name'),
|
152
157
|
username=pulumi.get(__ret__, 'username'))
|
153
|
-
|
154
|
-
|
155
|
-
@_utilities.lift_output_func(get_dynamic_credentials)
|
156
158
|
def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
157
159
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
158
160
|
role_name: Optional[pulumi.Input[str]] = None,
|
159
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDynamicCredentialsResult]:
|
161
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDynamicCredentialsResult]:
|
160
162
|
"""
|
161
163
|
Use this data source to access information about an existing resource.
|
162
164
|
"""
|
163
|
-
|
165
|
+
__args__ = dict()
|
166
|
+
__args__['mount'] = mount
|
167
|
+
__args__['namespace'] = namespace
|
168
|
+
__args__['roleName'] = role_name
|
169
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
170
|
+
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
|
171
|
+
return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
|
172
|
+
distinguished_names=pulumi.get(__response__, 'distinguished_names'),
|
173
|
+
id=pulumi.get(__response__, 'id'),
|
174
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
175
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
176
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
177
|
+
mount=pulumi.get(__response__, 'mount'),
|
178
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
179
|
+
password=pulumi.get(__response__, 'password'),
|
180
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
181
|
+
username=pulumi.get(__response__, 'username')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -160,14 +165,28 @@ def get_static_credentials(mount: Optional[str] = None,
|
|
160
165
|
rotation_period=pulumi.get(__ret__, 'rotation_period'),
|
161
166
|
ttl=pulumi.get(__ret__, 'ttl'),
|
162
167
|
username=pulumi.get(__ret__, 'username'))
|
163
|
-
|
164
|
-
|
165
|
-
@_utilities.lift_output_func(get_static_credentials)
|
166
168
|
def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
167
169
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
168
170
|
role_name: Optional[pulumi.Input[str]] = None,
|
169
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetStaticCredentialsResult]:
|
171
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticCredentialsResult]:
|
170
172
|
"""
|
171
173
|
Use this data source to access information about an existing resource.
|
172
174
|
"""
|
173
|
-
|
175
|
+
__args__ = dict()
|
176
|
+
__args__['mount'] = mount
|
177
|
+
__args__['namespace'] = namespace
|
178
|
+
__args__['roleName'] = role_name
|
179
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
180
|
+
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
|
181
|
+
return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
|
182
|
+
dn=pulumi.get(__response__, 'dn'),
|
183
|
+
id=pulumi.get(__response__, 'id'),
|
184
|
+
last_password=pulumi.get(__response__, 'last_password'),
|
185
|
+
last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
|
186
|
+
mount=pulumi.get(__response__, 'mount'),
|
187
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
188
|
+
password=pulumi.get(__response__, 'password'),
|
189
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
190
|
+
rotation_period=pulumi.get(__response__, 'rotation_period'),
|
191
|
+
ttl=pulumi.get(__response__, 'ttl'),
|
192
|
+
username=pulumi.get(__response__, 'username')))
|