pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
pulumi_vault/namespace.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['NamespaceArgs', 'Namespace']
|
@@ -15,17 +20,17 @@ __all__ = ['NamespaceArgs', 'Namespace']
|
|
15
20
|
class NamespaceArgs:
|
16
21
|
def __init__(__self__, *,
|
17
22
|
path: pulumi.Input[str],
|
18
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
23
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
19
24
|
namespace: Optional[pulumi.Input[str]] = None,
|
20
25
|
path_fq: Optional[pulumi.Input[str]] = None):
|
21
26
|
"""
|
22
27
|
The set of arguments for constructing a Namespace resource.
|
23
28
|
:param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
|
24
|
-
:param pulumi.Input[Mapping[str,
|
29
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
|
25
30
|
is `map[string]string`. Requires Vault version 1.12+.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
:param pulumi.Input[str] path_fq: The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
|
31
36
|
The path is relative to the provider's `namespace` argument.
|
@@ -52,7 +57,7 @@ class NamespaceArgs:
|
|
52
57
|
|
53
58
|
@property
|
54
59
|
@pulumi.getter(name="customMetadata")
|
55
|
-
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
60
|
+
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
56
61
|
"""
|
57
62
|
Custom metadata describing this namespace. Value type
|
58
63
|
is `map[string]string`. Requires Vault version 1.12+.
|
@@ -60,7 +65,7 @@ class NamespaceArgs:
|
|
60
65
|
return pulumi.get(self, "custom_metadata")
|
61
66
|
|
62
67
|
@custom_metadata.setter
|
63
|
-
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
68
|
+
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
64
69
|
pulumi.set(self, "custom_metadata", value)
|
65
70
|
|
66
71
|
@property
|
@@ -69,7 +74,7 @@ class NamespaceArgs:
|
|
69
74
|
"""
|
70
75
|
The namespace to provision the resource in.
|
71
76
|
The value should not contain leading or trailing forward slashes.
|
72
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
77
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
73
78
|
*Available only for Vault Enterprise*.
|
74
79
|
"""
|
75
80
|
return pulumi.get(self, "namespace")
|
@@ -95,18 +100,18 @@ class NamespaceArgs:
|
|
95
100
|
@pulumi.input_type
|
96
101
|
class _NamespaceState:
|
97
102
|
def __init__(__self__, *,
|
98
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
103
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
99
104
|
namespace: Optional[pulumi.Input[str]] = None,
|
100
105
|
namespace_id: Optional[pulumi.Input[str]] = None,
|
101
106
|
path: Optional[pulumi.Input[str]] = None,
|
102
107
|
path_fq: Optional[pulumi.Input[str]] = None):
|
103
108
|
"""
|
104
109
|
Input properties used for looking up and filtering Namespace resources.
|
105
|
-
:param pulumi.Input[Mapping[str,
|
110
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
|
106
111
|
is `map[string]string`. Requires Vault version 1.12+.
|
107
112
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
108
113
|
The value should not contain leading or trailing forward slashes.
|
109
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
114
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
110
115
|
*Available only for Vault Enterprise*.
|
111
116
|
:param pulumi.Input[str] namespace_id: Vault server's internal ID of the namespace.
|
112
117
|
:param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
|
@@ -126,7 +131,7 @@ class _NamespaceState:
|
|
126
131
|
|
127
132
|
@property
|
128
133
|
@pulumi.getter(name="customMetadata")
|
129
|
-
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
134
|
+
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
130
135
|
"""
|
131
136
|
Custom metadata describing this namespace. Value type
|
132
137
|
is `map[string]string`. Requires Vault version 1.12+.
|
@@ -134,7 +139,7 @@ class _NamespaceState:
|
|
134
139
|
return pulumi.get(self, "custom_metadata")
|
135
140
|
|
136
141
|
@custom_metadata.setter
|
137
|
-
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
142
|
+
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
138
143
|
pulumi.set(self, "custom_metadata", value)
|
139
144
|
|
140
145
|
@property
|
@@ -143,7 +148,7 @@ class _NamespaceState:
|
|
143
148
|
"""
|
144
149
|
The namespace to provision the resource in.
|
145
150
|
The value should not contain leading or trailing forward slashes.
|
146
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
151
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
147
152
|
*Available only for Vault Enterprise*.
|
148
153
|
"""
|
149
154
|
return pulumi.get(self, "namespace")
|
@@ -195,7 +200,7 @@ class Namespace(pulumi.CustomResource):
|
|
195
200
|
def __init__(__self__,
|
196
201
|
resource_name: str,
|
197
202
|
opts: Optional[pulumi.ResourceOptions] = None,
|
198
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
203
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
199
204
|
namespace: Optional[pulumi.Input[str]] = None,
|
200
205
|
path: Optional[pulumi.Input[str]] = None,
|
201
206
|
path_fq: Optional[pulumi.Input[str]] = None,
|
@@ -253,11 +258,11 @@ class Namespace(pulumi.CustomResource):
|
|
253
258
|
|
254
259
|
:param str resource_name: The name of the resource.
|
255
260
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
256
|
-
:param pulumi.Input[Mapping[str,
|
261
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
|
257
262
|
is `map[string]string`. Requires Vault version 1.12+.
|
258
263
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
259
264
|
The value should not contain leading or trailing forward slashes.
|
260
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
265
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
261
266
|
*Available only for Vault Enterprise*.
|
262
267
|
:param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
|
263
268
|
:param pulumi.Input[str] path_fq: The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
|
@@ -335,7 +340,7 @@ class Namespace(pulumi.CustomResource):
|
|
335
340
|
def _internal_init(__self__,
|
336
341
|
resource_name: str,
|
337
342
|
opts: Optional[pulumi.ResourceOptions] = None,
|
338
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
343
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
339
344
|
namespace: Optional[pulumi.Input[str]] = None,
|
340
345
|
path: Optional[pulumi.Input[str]] = None,
|
341
346
|
path_fq: Optional[pulumi.Input[str]] = None,
|
@@ -365,7 +370,7 @@ class Namespace(pulumi.CustomResource):
|
|
365
370
|
def get(resource_name: str,
|
366
371
|
id: pulumi.Input[str],
|
367
372
|
opts: Optional[pulumi.ResourceOptions] = None,
|
368
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str,
|
373
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
369
374
|
namespace: Optional[pulumi.Input[str]] = None,
|
370
375
|
namespace_id: Optional[pulumi.Input[str]] = None,
|
371
376
|
path: Optional[pulumi.Input[str]] = None,
|
@@ -377,11 +382,11 @@ class Namespace(pulumi.CustomResource):
|
|
377
382
|
:param str resource_name: The unique name of the resulting resource.
|
378
383
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
379
384
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
380
|
-
:param pulumi.Input[Mapping[str,
|
385
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] custom_metadata: Custom metadata describing this namespace. Value type
|
381
386
|
is `map[string]string`. Requires Vault version 1.12+.
|
382
387
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
383
388
|
The value should not contain leading or trailing forward slashes.
|
384
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
389
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
385
390
|
*Available only for Vault Enterprise*.
|
386
391
|
:param pulumi.Input[str] namespace_id: Vault server's internal ID of the namespace.
|
387
392
|
:param pulumi.Input[str] path: The path of the namespace. Must not have a trailing `/`.
|
@@ -401,7 +406,7 @@ class Namespace(pulumi.CustomResource):
|
|
401
406
|
|
402
407
|
@property
|
403
408
|
@pulumi.getter(name="customMetadata")
|
404
|
-
def custom_metadata(self) -> pulumi.Output[Mapping[str,
|
409
|
+
def custom_metadata(self) -> pulumi.Output[Mapping[str, str]]:
|
405
410
|
"""
|
406
411
|
Custom metadata describing this namespace. Value type
|
407
412
|
is `map[string]string`. Requires Vault version 1.12+.
|
@@ -414,7 +419,7 @@ class Namespace(pulumi.CustomResource):
|
|
414
419
|
"""
|
415
420
|
The namespace to provision the resource in.
|
416
421
|
The value should not contain leading or trailing forward slashes.
|
417
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
422
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
418
423
|
*Available only for Vault Enterprise*.
|
419
424
|
"""
|
420
425
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
|
@@ -52,7 +57,7 @@ class NomadSecretBackendArgs:
|
|
52
57
|
:param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
53
58
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
54
59
|
The value should not contain leading or trailing forward slashes.
|
55
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
60
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
56
61
|
*Available only for Vault Enterprise*.
|
57
62
|
:param pulumi.Input[str] token: Specifies the Nomad Management token to use.
|
58
63
|
:param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
|
@@ -245,7 +250,7 @@ class NomadSecretBackendArgs:
|
|
245
250
|
"""
|
246
251
|
The namespace to provision the resource in.
|
247
252
|
The value should not contain leading or trailing forward slashes.
|
248
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
253
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
249
254
|
*Available only for Vault Enterprise*.
|
250
255
|
"""
|
251
256
|
return pulumi.get(self, "namespace")
|
@@ -320,7 +325,7 @@ class _NomadSecretBackendState:
|
|
320
325
|
:param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
321
326
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
322
327
|
The value should not contain leading or trailing forward slashes.
|
323
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
328
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
324
329
|
*Available only for Vault Enterprise*.
|
325
330
|
:param pulumi.Input[str] token: Specifies the Nomad Management token to use.
|
326
331
|
:param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
|
@@ -513,7 +518,7 @@ class _NomadSecretBackendState:
|
|
513
518
|
"""
|
514
519
|
The namespace to provision the resource in.
|
515
520
|
The value should not contain leading or trailing forward slashes.
|
516
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
521
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
517
522
|
*Available only for Vault Enterprise*.
|
518
523
|
"""
|
519
524
|
return pulumi.get(self, "namespace")
|
@@ -571,22 +576,20 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
571
576
|
"""
|
572
577
|
## Example Usage
|
573
578
|
|
574
|
-
<!--Start PulumiCodeChooser -->
|
575
579
|
```python
|
576
580
|
import pulumi
|
577
581
|
import pulumi_vault as vault
|
578
582
|
|
579
583
|
config = vault.NomadSecretBackend("config",
|
580
|
-
address="https://127.0.0.1:4646",
|
581
584
|
backend="nomad",
|
582
|
-
default_lease_ttl_seconds=3600,
|
583
585
|
description="test description",
|
586
|
+
default_lease_ttl_seconds=3600,
|
584
587
|
max_lease_ttl_seconds=7200,
|
585
588
|
max_ttl=240,
|
589
|
+
address="https://127.0.0.1:4646",
|
586
590
|
token="ae20ceaa-...",
|
587
591
|
ttl=120)
|
588
592
|
```
|
589
|
-
<!--End PulumiCodeChooser -->
|
590
593
|
|
591
594
|
## Import
|
592
595
|
|
@@ -619,7 +622,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
619
622
|
:param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
620
623
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
621
624
|
The value should not contain leading or trailing forward slashes.
|
622
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
625
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
623
626
|
*Available only for Vault Enterprise*.
|
624
627
|
:param pulumi.Input[str] token: Specifies the Nomad Management token to use.
|
625
628
|
:param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
|
@@ -633,22 +636,20 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
633
636
|
"""
|
634
637
|
## Example Usage
|
635
638
|
|
636
|
-
<!--Start PulumiCodeChooser -->
|
637
639
|
```python
|
638
640
|
import pulumi
|
639
641
|
import pulumi_vault as vault
|
640
642
|
|
641
643
|
config = vault.NomadSecretBackend("config",
|
642
|
-
address="https://127.0.0.1:4646",
|
643
644
|
backend="nomad",
|
644
|
-
default_lease_ttl_seconds=3600,
|
645
645
|
description="test description",
|
646
|
+
default_lease_ttl_seconds=3600,
|
646
647
|
max_lease_ttl_seconds=7200,
|
647
648
|
max_ttl=240,
|
649
|
+
address="https://127.0.0.1:4646",
|
648
650
|
token="ae20ceaa-...",
|
649
651
|
ttl=120)
|
650
652
|
```
|
651
|
-
<!--End PulumiCodeChooser -->
|
652
653
|
|
653
654
|
## Import
|
654
655
|
|
@@ -767,7 +768,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
767
768
|
:param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
|
768
769
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
769
770
|
The value should not contain leading or trailing forward slashes.
|
770
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
771
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
771
772
|
*Available only for Vault Enterprise*.
|
772
773
|
:param pulumi.Input[str] token: Specifies the Nomad Management token to use.
|
773
774
|
:param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
|
@@ -902,7 +903,7 @@ class NomadSecretBackend(pulumi.CustomResource):
|
|
902
903
|
"""
|
903
904
|
The namespace to provision the resource in.
|
904
905
|
The value should not contain leading or trailing forward slashes.
|
905
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
906
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
906
907
|
*Available only for Vault Enterprise*.
|
907
908
|
"""
|
908
909
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
|
@@ -29,7 +34,7 @@ class NomadSecretRoleArgs:
|
|
29
34
|
false.
|
30
35
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
36
|
The value should not contain leading or trailing forward slashes.
|
32
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
37
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
38
|
*Available only for Vault Enterprise*.
|
34
39
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
|
35
40
|
when `type` is 'client'.
|
@@ -91,7 +96,7 @@ class NomadSecretRoleArgs:
|
|
91
96
|
"""
|
92
97
|
The namespace to provision the resource in.
|
93
98
|
The value should not contain leading or trailing forward slashes.
|
94
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
99
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
95
100
|
*Available only for Vault Enterprise*.
|
96
101
|
"""
|
97
102
|
return pulumi.get(self, "namespace")
|
@@ -143,7 +148,7 @@ class _NomadSecretRoleState:
|
|
143
148
|
false.
|
144
149
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
145
150
|
The value should not contain leading or trailing forward slashes.
|
146
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
151
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
147
152
|
*Available only for Vault Enterprise*.
|
148
153
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
|
149
154
|
when `type` is 'client'.
|
@@ -196,7 +201,7 @@ class _NomadSecretRoleState:
|
|
196
201
|
"""
|
197
202
|
The namespace to provision the resource in.
|
198
203
|
The value should not contain leading or trailing forward slashes.
|
199
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
204
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
200
205
|
*Available only for Vault Enterprise*.
|
201
206
|
"""
|
202
207
|
return pulumi.get(self, "namespace")
|
@@ -260,7 +265,6 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
260
265
|
"""
|
261
266
|
## Example Usage
|
262
267
|
|
263
|
-
<!--Start PulumiCodeChooser -->
|
264
268
|
```python
|
265
269
|
import pulumi
|
266
270
|
import pulumi_vault as vault
|
@@ -278,7 +282,6 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
278
282
|
type="client",
|
279
283
|
policies=["readonly"])
|
280
284
|
```
|
281
|
-
<!--End PulumiCodeChooser -->
|
282
285
|
|
283
286
|
## Import
|
284
287
|
|
@@ -295,7 +298,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
295
298
|
false.
|
296
299
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
297
300
|
The value should not contain leading or trailing forward slashes.
|
298
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
301
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
299
302
|
*Available only for Vault Enterprise*.
|
300
303
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
|
301
304
|
when `type` is 'client'.
|
@@ -313,7 +316,6 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
313
316
|
"""
|
314
317
|
## Example Usage
|
315
318
|
|
316
|
-
<!--Start PulumiCodeChooser -->
|
317
319
|
```python
|
318
320
|
import pulumi
|
319
321
|
import pulumi_vault as vault
|
@@ -331,7 +333,6 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
331
333
|
type="client",
|
332
334
|
policies=["readonly"])
|
333
335
|
```
|
334
|
-
<!--End PulumiCodeChooser -->
|
335
336
|
|
336
337
|
## Import
|
337
338
|
|
@@ -409,7 +410,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
409
410
|
false.
|
410
411
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
411
412
|
The value should not contain leading or trailing forward slashes.
|
412
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
413
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
413
414
|
*Available only for Vault Enterprise*.
|
414
415
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
|
415
416
|
when `type` is 'client'.
|
@@ -453,7 +454,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
453
454
|
"""
|
454
455
|
The namespace to provision the resource in.
|
455
456
|
The value should not contain leading or trailing forward slashes.
|
456
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
457
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
457
458
|
*Available only for Vault Enterprise*.
|
458
459
|
"""
|
459
460
|
return pulumi.get(self, "namespace")
|
pulumi_vault/okta/_inputs.py
CHANGED
@@ -4,24 +4,46 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'AuthBackendGroupArgs',
|
19
|
+
'AuthBackendGroupArgsDict',
|
14
20
|
'AuthBackendUserArgs',
|
21
|
+
'AuthBackendUserArgsDict',
|
15
22
|
]
|
16
23
|
|
24
|
+
MYPY = False
|
25
|
+
|
26
|
+
if not MYPY:
|
27
|
+
class AuthBackendGroupArgsDict(TypedDict):
|
28
|
+
group_name: pulumi.Input[str]
|
29
|
+
"""
|
30
|
+
Name of the Okta group
|
31
|
+
"""
|
32
|
+
policies: pulumi.Input[Sequence[pulumi.Input[str]]]
|
33
|
+
"""
|
34
|
+
Policies to associate with this group
|
35
|
+
"""
|
36
|
+
elif False:
|
37
|
+
AuthBackendGroupArgsDict: TypeAlias = Mapping[str, Any]
|
38
|
+
|
17
39
|
@pulumi.input_type
|
18
40
|
class AuthBackendGroupArgs:
|
19
41
|
def __init__(__self__, *,
|
20
42
|
group_name: pulumi.Input[str],
|
21
43
|
policies: pulumi.Input[Sequence[pulumi.Input[str]]]):
|
22
44
|
"""
|
23
|
-
:param pulumi.Input[str] group_name: Name of the group
|
24
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies:
|
45
|
+
:param pulumi.Input[str] group_name: Name of the Okta group
|
46
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this group
|
25
47
|
"""
|
26
48
|
pulumi.set(__self__, "group_name", group_name)
|
27
49
|
pulumi.set(__self__, "policies", policies)
|
@@ -30,7 +52,7 @@ class AuthBackendGroupArgs:
|
|
30
52
|
@pulumi.getter(name="groupName")
|
31
53
|
def group_name(self) -> pulumi.Input[str]:
|
32
54
|
"""
|
33
|
-
Name of the group
|
55
|
+
Name of the Okta group
|
34
56
|
"""
|
35
57
|
return pulumi.get(self, "group_name")
|
36
58
|
|
@@ -42,7 +64,7 @@ class AuthBackendGroupArgs:
|
|
42
64
|
@pulumi.getter
|
43
65
|
def policies(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
44
66
|
"""
|
45
|
-
|
67
|
+
Policies to associate with this group
|
46
68
|
"""
|
47
69
|
return pulumi.get(self, "policies")
|
48
70
|
|
@@ -51,6 +73,23 @@ class AuthBackendGroupArgs:
|
|
51
73
|
pulumi.set(self, "policies", value)
|
52
74
|
|
53
75
|
|
76
|
+
if not MYPY:
|
77
|
+
class AuthBackendUserArgsDict(TypedDict):
|
78
|
+
username: pulumi.Input[str]
|
79
|
+
"""
|
80
|
+
Name of the user within Okta
|
81
|
+
"""
|
82
|
+
groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
83
|
+
"""
|
84
|
+
Groups within the Okta auth backend to associate with this user
|
85
|
+
"""
|
86
|
+
policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
87
|
+
"""
|
88
|
+
Policies to associate with this user
|
89
|
+
"""
|
90
|
+
elif False:
|
91
|
+
AuthBackendUserArgsDict: TypeAlias = Mapping[str, Any]
|
92
|
+
|
54
93
|
@pulumi.input_type
|
55
94
|
class AuthBackendUserArgs:
|
56
95
|
def __init__(__self__, *,
|
@@ -59,8 +98,8 @@ class AuthBackendUserArgs:
|
|
59
98
|
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
60
99
|
"""
|
61
100
|
:param pulumi.Input[str] username: Name of the user within Okta
|
62
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups:
|
63
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies:
|
101
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Groups within the Okta auth backend to associate with this user
|
102
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this user
|
64
103
|
"""
|
65
104
|
pulumi.set(__self__, "username", username)
|
66
105
|
if groups is not None:
|
@@ -84,7 +123,7 @@ class AuthBackendUserArgs:
|
|
84
123
|
@pulumi.getter
|
85
124
|
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
86
125
|
"""
|
87
|
-
|
126
|
+
Groups within the Okta auth backend to associate with this user
|
88
127
|
"""
|
89
128
|
return pulumi.get(self, "groups")
|
90
129
|
|
@@ -96,7 +135,7 @@ class AuthBackendUserArgs:
|
|
96
135
|
@pulumi.getter
|
97
136
|
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
98
137
|
"""
|
99
|
-
|
138
|
+
Policies to associate with this user
|
100
139
|
"""
|
101
140
|
return pulumi.get(self, "policies")
|
102
141
|
|