pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -109,7 +114,7 @@ class GetRaftAutopilotStateResult:
|
|
109
114
|
|
110
115
|
@property
|
111
116
|
@pulumi.getter(name="redundancyZones")
|
112
|
-
def redundancy_zones(self) -> Mapping[str,
|
117
|
+
def redundancy_zones(self) -> Mapping[str, str]:
|
113
118
|
"""
|
114
119
|
Additional output related to redundancy zones stored as a serialized map of strings.
|
115
120
|
"""
|
@@ -125,7 +130,7 @@ class GetRaftAutopilotStateResult:
|
|
125
130
|
|
126
131
|
@property
|
127
132
|
@pulumi.getter
|
128
|
-
def servers(self) -> Mapping[str,
|
133
|
+
def servers(self) -> Mapping[str, str]:
|
129
134
|
"""
|
130
135
|
Additionaly output related to servers in the cluster stored as a serialized map of strings.
|
131
136
|
"""
|
@@ -141,7 +146,7 @@ class GetRaftAutopilotStateResult:
|
|
141
146
|
|
142
147
|
@property
|
143
148
|
@pulumi.getter(name="upgradeInfo")
|
144
|
-
def upgrade_info(self) -> Mapping[str,
|
149
|
+
def upgrade_info(self) -> Mapping[str, str]:
|
145
150
|
"""
|
146
151
|
Additional output related to upgrade information stored as a serialized map of strings.
|
147
152
|
"""
|
@@ -190,7 +195,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
190
195
|
"""
|
191
196
|
## Example Usage
|
192
197
|
|
193
|
-
<!--Start PulumiCodeChooser -->
|
194
198
|
```python
|
195
199
|
import pulumi
|
196
200
|
import pulumi_vault as vault
|
@@ -198,12 +202,11 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
198
202
|
main = vault.get_raft_autopilot_state()
|
199
203
|
pulumi.export("failure-tolerance", main.failure_tolerance)
|
200
204
|
```
|
201
|
-
<!--End PulumiCodeChooser -->
|
202
205
|
|
203
206
|
|
204
207
|
:param str namespace: The namespace of the target resource.
|
205
208
|
The value should not contain leading or trailing forward slashes.
|
206
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
209
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
207
210
|
*Available only for Vault Enterprise*.
|
208
211
|
"""
|
209
212
|
__args__ = dict()
|
@@ -225,15 +228,11 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
225
228
|
upgrade_info=pulumi.get(__ret__, 'upgrade_info'),
|
226
229
|
upgrade_info_json=pulumi.get(__ret__, 'upgrade_info_json'),
|
227
230
|
voters=pulumi.get(__ret__, 'voters'))
|
228
|
-
|
229
|
-
|
230
|
-
@_utilities.lift_output_func(get_raft_autopilot_state)
|
231
231
|
def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
232
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
|
232
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
|
233
233
|
"""
|
234
234
|
## Example Usage
|
235
235
|
|
236
|
-
<!--Start PulumiCodeChooser -->
|
237
236
|
```python
|
238
237
|
import pulumi
|
239
238
|
import pulumi_vault as vault
|
@@ -241,12 +240,28 @@ def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[st
|
|
241
240
|
main = vault.get_raft_autopilot_state()
|
242
241
|
pulumi.export("failure-tolerance", main.failure_tolerance)
|
243
242
|
```
|
244
|
-
<!--End PulumiCodeChooser -->
|
245
243
|
|
246
244
|
|
247
245
|
:param str namespace: The namespace of the target resource.
|
248
246
|
The value should not contain leading or trailing forward slashes.
|
249
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
247
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
250
248
|
*Available only for Vault Enterprise*.
|
251
249
|
"""
|
252
|
-
|
250
|
+
__args__ = dict()
|
251
|
+
__args__['namespace'] = namespace
|
252
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
253
|
+
__ret__ = pulumi.runtime.invoke_output('vault:index/getRaftAutopilotState:getRaftAutopilotState', __args__, opts=opts, typ=GetRaftAutopilotStateResult)
|
254
|
+
return __ret__.apply(lambda __response__: GetRaftAutopilotStateResult(
|
255
|
+
failure_tolerance=pulumi.get(__response__, 'failure_tolerance'),
|
256
|
+
healthy=pulumi.get(__response__, 'healthy'),
|
257
|
+
id=pulumi.get(__response__, 'id'),
|
258
|
+
leader=pulumi.get(__response__, 'leader'),
|
259
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
260
|
+
optimistic_failure_tolerance=pulumi.get(__response__, 'optimistic_failure_tolerance'),
|
261
|
+
redundancy_zones=pulumi.get(__response__, 'redundancy_zones'),
|
262
|
+
redundancy_zones_json=pulumi.get(__response__, 'redundancy_zones_json'),
|
263
|
+
servers=pulumi.get(__response__, 'servers'),
|
264
|
+
servers_json=pulumi.get(__response__, 'servers_json'),
|
265
|
+
upgrade_info=pulumi.get(__response__, 'upgrade_info'),
|
266
|
+
upgrade_info_json=pulumi.get(__response__, 'upgrade_info_json'),
|
267
|
+
voters=pulumi.get(__response__, 'voters')))
|
pulumi_vault/github/_inputs.py
CHANGED
@@ -4,15 +4,70 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'AuthBackendTuneArgs',
|
19
|
+
'AuthBackendTuneArgsDict',
|
14
20
|
]
|
15
21
|
|
22
|
+
MYPY = False
|
23
|
+
|
24
|
+
if not MYPY:
|
25
|
+
class AuthBackendTuneArgsDict(TypedDict):
|
26
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
27
|
+
"""
|
28
|
+
List of headers to whitelist and allowing
|
29
|
+
a plugin to include them in the response.
|
30
|
+
"""
|
31
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
32
|
+
"""
|
33
|
+
Specifies the list of keys that will
|
34
|
+
not be HMAC'd by audit devices in the request data object.
|
35
|
+
"""
|
36
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
37
|
+
"""
|
38
|
+
Specifies the list of keys that will
|
39
|
+
not be HMAC'd by audit devices in the response data object.
|
40
|
+
"""
|
41
|
+
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
42
|
+
"""
|
43
|
+
Specifies the default time-to-live.
|
44
|
+
If set, this overrides the global default.
|
45
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
46
|
+
"""
|
47
|
+
listing_visibility: NotRequired[pulumi.Input[str]]
|
48
|
+
"""
|
49
|
+
Specifies whether to show this mount in
|
50
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
51
|
+
"""
|
52
|
+
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
53
|
+
"""
|
54
|
+
Specifies the maximum time-to-live.
|
55
|
+
If set, this overrides the global default.
|
56
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
57
|
+
"""
|
58
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
59
|
+
"""
|
60
|
+
List of headers to whitelist and
|
61
|
+
pass from the request to the backend.
|
62
|
+
"""
|
63
|
+
token_type: NotRequired[pulumi.Input[str]]
|
64
|
+
"""
|
65
|
+
Specifies the type of tokens that should be returned by
|
66
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
67
|
+
"""
|
68
|
+
elif False:
|
69
|
+
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
70
|
+
|
16
71
|
@pulumi.input_type
|
17
72
|
class AuthBackendTuneArgs:
|
18
73
|
def __init__(__self__, *,
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -44,7 +49,7 @@ class AuthBackendArgs:
|
|
44
49
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
45
50
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
46
51
|
The value should not contain leading or trailing forward slashes.
|
47
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
52
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
48
53
|
*Available only for Vault Enterprise*.
|
49
54
|
:param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
|
50
55
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
@@ -168,7 +173,7 @@ class AuthBackendArgs:
|
|
168
173
|
"""
|
169
174
|
The namespace to provision the resource in.
|
170
175
|
The value should not contain leading or trailing forward slashes.
|
171
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
176
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
172
177
|
*Available only for Vault Enterprise*.
|
173
178
|
"""
|
174
179
|
return pulumi.get(self, "namespace")
|
@@ -372,7 +377,7 @@ class _AuthBackendState:
|
|
372
377
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
373
378
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
374
379
|
The value should not contain leading or trailing forward slashes.
|
375
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
380
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
376
381
|
*Available only for Vault Enterprise*.
|
377
382
|
:param pulumi.Input[str] organization: The organization configured users must be part of.
|
378
383
|
:param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
|
@@ -500,7 +505,7 @@ class _AuthBackendState:
|
|
500
505
|
"""
|
501
506
|
The namespace to provision the resource in.
|
502
507
|
The value should not contain leading or trailing forward slashes.
|
503
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
508
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
504
509
|
*Available only for Vault Enterprise*.
|
505
510
|
"""
|
506
511
|
return pulumi.get(self, "namespace")
|
@@ -705,7 +710,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
705
710
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
706
711
|
token_ttl: Optional[pulumi.Input[int]] = None,
|
707
712
|
token_type: Optional[pulumi.Input[str]] = None,
|
708
|
-
tune: Optional[pulumi.Input[
|
713
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
709
714
|
__props__=None):
|
710
715
|
"""
|
711
716
|
Manages a GitHub Auth mount in a Vault server. See the [Vault
|
@@ -714,14 +719,12 @@ class AuthBackend(pulumi.CustomResource):
|
|
714
719
|
|
715
720
|
## Example Usage
|
716
721
|
|
717
|
-
<!--Start PulumiCodeChooser -->
|
718
722
|
```python
|
719
723
|
import pulumi
|
720
724
|
import pulumi_vault as vault
|
721
725
|
|
722
726
|
example = vault.github.AuthBackend("example", organization="myorg")
|
723
727
|
```
|
724
|
-
<!--End PulumiCodeChooser -->
|
725
728
|
|
726
729
|
## Import
|
727
730
|
|
@@ -741,7 +744,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
741
744
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
742
745
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
743
746
|
The value should not contain leading or trailing forward slashes.
|
744
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
747
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
745
748
|
*Available only for Vault Enterprise*.
|
746
749
|
:param pulumi.Input[str] organization: The organization configured users must be part of.
|
747
750
|
:param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
|
@@ -771,7 +774,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
771
774
|
Its current value will be referenced at renewal time.
|
772
775
|
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
773
776
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
774
|
-
:param pulumi.Input[
|
777
|
+
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
775
778
|
|
776
779
|
The `tune` block is used to tune the auth backend:
|
777
780
|
"""
|
@@ -788,14 +791,12 @@ class AuthBackend(pulumi.CustomResource):
|
|
788
791
|
|
789
792
|
## Example Usage
|
790
793
|
|
791
|
-
<!--Start PulumiCodeChooser -->
|
792
794
|
```python
|
793
795
|
import pulumi
|
794
796
|
import pulumi_vault as vault
|
795
797
|
|
796
798
|
example = vault.github.AuthBackend("example", organization="myorg")
|
797
799
|
```
|
798
|
-
<!--End PulumiCodeChooser -->
|
799
800
|
|
800
801
|
## Import
|
801
802
|
|
@@ -836,7 +837,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
836
837
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
837
838
|
token_ttl: Optional[pulumi.Input[int]] = None,
|
838
839
|
token_type: Optional[pulumi.Input[str]] = None,
|
839
|
-
tune: Optional[pulumi.Input[
|
840
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
840
841
|
__props__=None):
|
841
842
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
842
843
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -893,7 +894,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
893
894
|
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
894
895
|
token_ttl: Optional[pulumi.Input[int]] = None,
|
895
896
|
token_type: Optional[pulumi.Input[str]] = None,
|
896
|
-
tune: Optional[pulumi.Input[
|
897
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
|
897
898
|
"""
|
898
899
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
899
900
|
properties used to qualify the lookup.
|
@@ -910,7 +911,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
910
911
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
911
912
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
912
913
|
The value should not contain leading or trailing forward slashes.
|
913
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
914
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
914
915
|
*Available only for Vault Enterprise*.
|
915
916
|
:param pulumi.Input[str] organization: The organization configured users must be part of.
|
916
917
|
:param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
|
@@ -940,7 +941,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
940
941
|
Its current value will be referenced at renewal time.
|
941
942
|
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
942
943
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
943
|
-
:param pulumi.Input[
|
944
|
+
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
944
945
|
|
945
946
|
The `tune` block is used to tune the auth backend:
|
946
947
|
"""
|
@@ -1009,7 +1010,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1009
1010
|
"""
|
1010
1011
|
The namespace to provision the resource in.
|
1011
1012
|
The value should not contain leading or trailing forward slashes.
|
1012
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1013
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1013
1014
|
*Available only for Vault Enterprise*.
|
1014
1015
|
"""
|
1015
1016
|
return pulumi.get(self, "namespace")
|
pulumi_vault/github/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
pulumi_vault/github/team.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['TeamArgs', 'Team']
|
@@ -25,7 +30,7 @@ class TeamArgs:
|
|
25
30
|
if not specified.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
|
31
36
|
issued using this role.
|
@@ -69,7 +74,7 @@ class TeamArgs:
|
|
69
74
|
"""
|
70
75
|
The namespace to provision the resource in.
|
71
76
|
The value should not contain leading or trailing forward slashes.
|
72
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
77
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
73
78
|
*Available only for Vault Enterprise*.
|
74
79
|
"""
|
75
80
|
return pulumi.get(self, "namespace")
|
@@ -105,7 +110,7 @@ class _TeamState:
|
|
105
110
|
if not specified.
|
106
111
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
107
112
|
The value should not contain leading or trailing forward slashes.
|
108
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
113
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
109
114
|
*Available only for Vault Enterprise*.
|
110
115
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
|
111
116
|
issued using this role.
|
@@ -139,7 +144,7 @@ class _TeamState:
|
|
139
144
|
"""
|
140
145
|
The namespace to provision the resource in.
|
141
146
|
The value should not contain leading or trailing forward slashes.
|
142
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
147
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
143
148
|
*Available only for Vault Enterprise*.
|
144
149
|
"""
|
145
150
|
return pulumi.get(self, "namespace")
|
@@ -191,13 +196,12 @@ class Team(pulumi.CustomResource):
|
|
191
196
|
|
192
197
|
## Example Usage
|
193
198
|
|
194
|
-
<!--Start PulumiCodeChooser -->
|
195
199
|
```python
|
196
200
|
import pulumi
|
197
201
|
import pulumi_vault as vault
|
198
202
|
|
199
203
|
example = vault.github.AuthBackend("example", organization="myorg")
|
200
|
-
tf_devs = vault.github.Team("
|
204
|
+
tf_devs = vault.github.Team("tf_devs",
|
201
205
|
backend=example.id,
|
202
206
|
team="terraform-developers",
|
203
207
|
policies=[
|
@@ -205,7 +209,6 @@ class Team(pulumi.CustomResource):
|
|
205
209
|
"read-only",
|
206
210
|
])
|
207
211
|
```
|
208
|
-
<!--End PulumiCodeChooser -->
|
209
212
|
|
210
213
|
## Import
|
211
214
|
|
@@ -221,7 +224,7 @@ class Team(pulumi.CustomResource):
|
|
221
224
|
if not specified.
|
222
225
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
223
226
|
The value should not contain leading or trailing forward slashes.
|
224
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
227
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
225
228
|
*Available only for Vault Enterprise*.
|
226
229
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
|
227
230
|
issued using this role.
|
@@ -240,13 +243,12 @@ class Team(pulumi.CustomResource):
|
|
240
243
|
|
241
244
|
## Example Usage
|
242
245
|
|
243
|
-
<!--Start PulumiCodeChooser -->
|
244
246
|
```python
|
245
247
|
import pulumi
|
246
248
|
import pulumi_vault as vault
|
247
249
|
|
248
250
|
example = vault.github.AuthBackend("example", organization="myorg")
|
249
|
-
tf_devs = vault.github.Team("
|
251
|
+
tf_devs = vault.github.Team("tf_devs",
|
250
252
|
backend=example.id,
|
251
253
|
team="terraform-developers",
|
252
254
|
policies=[
|
@@ -254,7 +256,6 @@ class Team(pulumi.CustomResource):
|
|
254
256
|
"read-only",
|
255
257
|
])
|
256
258
|
```
|
257
|
-
<!--End PulumiCodeChooser -->
|
258
259
|
|
259
260
|
## Import
|
260
261
|
|
@@ -323,7 +324,7 @@ class Team(pulumi.CustomResource):
|
|
323
324
|
if not specified.
|
324
325
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
325
326
|
The value should not contain leading or trailing forward slashes.
|
326
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
327
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
327
328
|
*Available only for Vault Enterprise*.
|
328
329
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
|
329
330
|
issued using this role.
|
@@ -354,7 +355,7 @@ class Team(pulumi.CustomResource):
|
|
354
355
|
"""
|
355
356
|
The namespace to provision the resource in.
|
356
357
|
The value should not contain leading or trailing forward slashes.
|
357
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
358
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
358
359
|
*Available only for Vault Enterprise*.
|
359
360
|
"""
|
360
361
|
return pulumi.get(self, "namespace")
|
pulumi_vault/github/user.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['UserArgs', 'User']
|
@@ -25,7 +30,7 @@ class UserArgs:
|
|
25
30
|
if not specified.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
|
31
36
|
using this role.
|
@@ -69,7 +74,7 @@ class UserArgs:
|
|
69
74
|
"""
|
70
75
|
The namespace to provision the resource in.
|
71
76
|
The value should not contain leading or trailing forward slashes.
|
72
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
77
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
73
78
|
*Available only for Vault Enterprise*.
|
74
79
|
"""
|
75
80
|
return pulumi.get(self, "namespace")
|
@@ -105,7 +110,7 @@ class _UserState:
|
|
105
110
|
if not specified.
|
106
111
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
107
112
|
The value should not contain leading or trailing forward slashes.
|
108
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
113
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
109
114
|
*Available only for Vault Enterprise*.
|
110
115
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
|
111
116
|
using this role.
|
@@ -139,7 +144,7 @@ class _UserState:
|
|
139
144
|
"""
|
140
145
|
The namespace to provision the resource in.
|
141
146
|
The value should not contain leading or trailing forward slashes.
|
142
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
147
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
143
148
|
*Available only for Vault Enterprise*.
|
144
149
|
"""
|
145
150
|
return pulumi.get(self, "namespace")
|
@@ -191,13 +196,12 @@ class User(pulumi.CustomResource):
|
|
191
196
|
|
192
197
|
## Example Usage
|
193
198
|
|
194
|
-
<!--Start PulumiCodeChooser -->
|
195
199
|
```python
|
196
200
|
import pulumi
|
197
201
|
import pulumi_vault as vault
|
198
202
|
|
199
203
|
example = vault.github.AuthBackend("example", organization="myorg")
|
200
|
-
tf_user = vault.github.User("
|
204
|
+
tf_user = vault.github.User("tf_user",
|
201
205
|
backend=example.id,
|
202
206
|
user="john.doe",
|
203
207
|
policies=[
|
@@ -205,7 +209,6 @@ class User(pulumi.CustomResource):
|
|
205
209
|
"read-only",
|
206
210
|
])
|
207
211
|
```
|
208
|
-
<!--End PulumiCodeChooser -->
|
209
212
|
|
210
213
|
## Import
|
211
214
|
|
@@ -221,7 +224,7 @@ class User(pulumi.CustomResource):
|
|
221
224
|
if not specified.
|
222
225
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
223
226
|
The value should not contain leading or trailing forward slashes.
|
224
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
227
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
225
228
|
*Available only for Vault Enterprise*.
|
226
229
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
|
227
230
|
using this role.
|
@@ -240,13 +243,12 @@ class User(pulumi.CustomResource):
|
|
240
243
|
|
241
244
|
## Example Usage
|
242
245
|
|
243
|
-
<!--Start PulumiCodeChooser -->
|
244
246
|
```python
|
245
247
|
import pulumi
|
246
248
|
import pulumi_vault as vault
|
247
249
|
|
248
250
|
example = vault.github.AuthBackend("example", organization="myorg")
|
249
|
-
tf_user = vault.github.User("
|
251
|
+
tf_user = vault.github.User("tf_user",
|
250
252
|
backend=example.id,
|
251
253
|
user="john.doe",
|
252
254
|
policies=[
|
@@ -254,7 +256,6 @@ class User(pulumi.CustomResource):
|
|
254
256
|
"read-only",
|
255
257
|
])
|
256
258
|
```
|
257
|
-
<!--End PulumiCodeChooser -->
|
258
259
|
|
259
260
|
## Import
|
260
261
|
|
@@ -323,7 +324,7 @@ class User(pulumi.CustomResource):
|
|
323
324
|
if not specified.
|
324
325
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
325
326
|
The value should not contain leading or trailing forward slashes.
|
326
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
327
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
327
328
|
*Available only for Vault Enterprise*.
|
328
329
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
|
329
330
|
using this role.
|
@@ -354,7 +355,7 @@ class User(pulumi.CustomResource):
|
|
354
355
|
"""
|
355
356
|
The namespace to provision the resource in.
|
356
357
|
The value should not contain leading or trailing forward slashes.
|
357
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
358
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
358
359
|
*Available only for Vault Enterprise*.
|
359
360
|
"""
|
360
361
|
return pulumi.get(self, "namespace")
|