pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
|
@@ -26,7 +31,7 @@ class AuthBackendGroupArgs:
|
|
26
31
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
27
32
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
28
33
|
The value should not contain leading or trailing forward slashes.
|
29
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
34
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
30
35
|
*Available only for Vault Enterprise*.
|
31
36
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
|
32
37
|
"""
|
@@ -70,7 +75,7 @@ class AuthBackendGroupArgs:
|
|
70
75
|
"""
|
71
76
|
The namespace to provision the resource in.
|
72
77
|
The value should not contain leading or trailing forward slashes.
|
73
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
78
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
74
79
|
*Available only for Vault Enterprise*.
|
75
80
|
"""
|
76
81
|
return pulumi.get(self, "namespace")
|
@@ -107,7 +112,7 @@ class _AuthBackendGroupState:
|
|
107
112
|
:param pulumi.Input[str] groupname: The LDAP groupname
|
108
113
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
109
114
|
The value should not contain leading or trailing forward slashes.
|
110
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
115
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
111
116
|
*Available only for Vault Enterprise*.
|
112
117
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
|
113
118
|
"""
|
@@ -152,7 +157,7 @@ class _AuthBackendGroupState:
|
|
152
157
|
"""
|
153
158
|
The namespace to provision the resource in.
|
154
159
|
The value should not contain leading or trailing forward slashes.
|
155
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
160
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
156
161
|
*Available only for Vault Enterprise*.
|
157
162
|
"""
|
158
163
|
return pulumi.get(self, "namespace")
|
@@ -189,7 +194,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
189
194
|
|
190
195
|
## Example Usage
|
191
196
|
|
192
|
-
<!--Start PulumiCodeChooser -->
|
193
197
|
```python
|
194
198
|
import pulumi
|
195
199
|
import pulumi_vault as vault
|
@@ -208,7 +212,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
208
212
|
policies=["dba"],
|
209
213
|
backend=ldap.path)
|
210
214
|
```
|
211
|
-
<!--End PulumiCodeChooser -->
|
212
215
|
|
213
216
|
## Import
|
214
217
|
|
@@ -226,7 +229,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
226
229
|
:param pulumi.Input[str] groupname: The LDAP groupname
|
227
230
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
228
231
|
The value should not contain leading or trailing forward slashes.
|
229
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
232
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
230
233
|
*Available only for Vault Enterprise*.
|
231
234
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
|
232
235
|
"""
|
@@ -241,7 +244,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
241
244
|
|
242
245
|
## Example Usage
|
243
246
|
|
244
|
-
<!--Start PulumiCodeChooser -->
|
245
247
|
```python
|
246
248
|
import pulumi
|
247
249
|
import pulumi_vault as vault
|
@@ -260,7 +262,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
260
262
|
policies=["dba"],
|
261
263
|
backend=ldap.path)
|
262
264
|
```
|
263
|
-
<!--End PulumiCodeChooser -->
|
264
265
|
|
265
266
|
## Import
|
266
267
|
|
@@ -331,7 +332,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
331
332
|
:param pulumi.Input[str] groupname: The LDAP groupname
|
332
333
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
333
334
|
The value should not contain leading or trailing forward slashes.
|
334
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
335
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
335
336
|
*Available only for Vault Enterprise*.
|
336
337
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
|
337
338
|
"""
|
@@ -369,7 +370,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
369
370
|
"""
|
370
371
|
The namespace to provision the resource in.
|
371
372
|
The value should not contain leading or trailing forward slashes.
|
372
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
373
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
373
374
|
*Available only for Vault Enterprise*.
|
374
375
|
"""
|
375
376
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
|
@@ -28,7 +33,7 @@ class AuthBackendUserArgs:
|
|
28
33
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
|
29
34
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
30
35
|
The value should not contain leading or trailing forward slashes.
|
31
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
36
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
32
37
|
*Available only for Vault Enterprise*.
|
33
38
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
|
34
39
|
"""
|
@@ -86,7 +91,7 @@ class AuthBackendUserArgs:
|
|
86
91
|
"""
|
87
92
|
The namespace to provision the resource in.
|
88
93
|
The value should not contain leading or trailing forward slashes.
|
89
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
94
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
90
95
|
*Available only for Vault Enterprise*.
|
91
96
|
"""
|
92
97
|
return pulumi.get(self, "namespace")
|
@@ -124,7 +129,7 @@ class _AuthBackendUserState:
|
|
124
129
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
|
125
130
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
126
131
|
The value should not contain leading or trailing forward slashes.
|
127
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
132
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
128
133
|
*Available only for Vault Enterprise*.
|
129
134
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
|
130
135
|
:param pulumi.Input[str] username: The LDAP username
|
@@ -172,7 +177,7 @@ class _AuthBackendUserState:
|
|
172
177
|
"""
|
173
178
|
The namespace to provision the resource in.
|
174
179
|
The value should not contain leading or trailing forward slashes.
|
175
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
180
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
176
181
|
*Available only for Vault Enterprise*.
|
177
182
|
"""
|
178
183
|
return pulumi.get(self, "namespace")
|
@@ -222,7 +227,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
222
227
|
|
223
228
|
## Example Usage
|
224
229
|
|
225
|
-
<!--Start PulumiCodeChooser -->
|
226
230
|
```python
|
227
231
|
import pulumi
|
228
232
|
import pulumi_vault as vault
|
@@ -244,7 +248,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
244
248
|
],
|
245
249
|
backend=ldap.path)
|
246
250
|
```
|
247
|
-
<!--End PulumiCodeChooser -->
|
248
251
|
|
249
252
|
## Import
|
250
253
|
|
@@ -262,7 +265,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
262
265
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
|
263
266
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
264
267
|
The value should not contain leading or trailing forward slashes.
|
265
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
268
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
266
269
|
*Available only for Vault Enterprise*.
|
267
270
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
|
268
271
|
:param pulumi.Input[str] username: The LDAP username
|
@@ -278,7 +281,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
278
281
|
|
279
282
|
## Example Usage
|
280
283
|
|
281
|
-
<!--Start PulumiCodeChooser -->
|
282
284
|
```python
|
283
285
|
import pulumi
|
284
286
|
import pulumi_vault as vault
|
@@ -300,7 +302,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
300
302
|
],
|
301
303
|
backend=ldap.path)
|
302
304
|
```
|
303
|
-
<!--End PulumiCodeChooser -->
|
304
305
|
|
305
306
|
## Import
|
306
307
|
|
@@ -374,7 +375,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
374
375
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
|
375
376
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
376
377
|
The value should not contain leading or trailing forward slashes.
|
377
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
378
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
378
379
|
*Available only for Vault Enterprise*.
|
379
380
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
|
380
381
|
:param pulumi.Input[str] username: The LDAP username
|
@@ -414,7 +415,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
414
415
|
"""
|
415
416
|
The namespace to provision the resource in.
|
416
417
|
The value should not contain leading or trailing forward slashes.
|
417
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
418
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
418
419
|
*Available only for Vault Enterprise*.
|
419
420
|
"""
|
420
421
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -150,14 +155,27 @@ def get_dynamic_credentials(mount: Optional[str] = None,
|
|
150
155
|
password=pulumi.get(__ret__, 'password'),
|
151
156
|
role_name=pulumi.get(__ret__, 'role_name'),
|
152
157
|
username=pulumi.get(__ret__, 'username'))
|
153
|
-
|
154
|
-
|
155
|
-
@_utilities.lift_output_func(get_dynamic_credentials)
|
156
158
|
def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
157
159
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
158
160
|
role_name: Optional[pulumi.Input[str]] = None,
|
159
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetDynamicCredentialsResult]:
|
161
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDynamicCredentialsResult]:
|
160
162
|
"""
|
161
163
|
Use this data source to access information about an existing resource.
|
162
164
|
"""
|
163
|
-
|
165
|
+
__args__ = dict()
|
166
|
+
__args__['mount'] = mount
|
167
|
+
__args__['namespace'] = namespace
|
168
|
+
__args__['roleName'] = role_name
|
169
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
170
|
+
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
|
171
|
+
return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
|
172
|
+
distinguished_names=pulumi.get(__response__, 'distinguished_names'),
|
173
|
+
id=pulumi.get(__response__, 'id'),
|
174
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
175
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
176
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
177
|
+
mount=pulumi.get(__response__, 'mount'),
|
178
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
179
|
+
password=pulumi.get(__response__, 'password'),
|
180
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
181
|
+
username=pulumi.get(__response__, 'username')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -160,14 +165,28 @@ def get_static_credentials(mount: Optional[str] = None,
|
|
160
165
|
rotation_period=pulumi.get(__ret__, 'rotation_period'),
|
161
166
|
ttl=pulumi.get(__ret__, 'ttl'),
|
162
167
|
username=pulumi.get(__ret__, 'username'))
|
163
|
-
|
164
|
-
|
165
|
-
@_utilities.lift_output_func(get_static_credentials)
|
166
168
|
def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
167
169
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
168
170
|
role_name: Optional[pulumi.Input[str]] = None,
|
169
|
-
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetStaticCredentialsResult]:
|
171
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticCredentialsResult]:
|
170
172
|
"""
|
171
173
|
Use this data source to access information about an existing resource.
|
172
174
|
"""
|
173
|
-
|
175
|
+
__args__ = dict()
|
176
|
+
__args__['mount'] = mount
|
177
|
+
__args__['namespace'] = namespace
|
178
|
+
__args__['roleName'] = role_name
|
179
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
180
|
+
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
|
181
|
+
return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
|
182
|
+
dn=pulumi.get(__response__, 'dn'),
|
183
|
+
id=pulumi.get(__response__, 'id'),
|
184
|
+
last_password=pulumi.get(__response__, 'last_password'),
|
185
|
+
last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
|
186
|
+
mount=pulumi.get(__response__, 'mount'),
|
187
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
188
|
+
password=pulumi.get(__response__, 'password'),
|
189
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
190
|
+
rotation_period=pulumi.get(__response__, 'rotation_period'),
|
191
|
+
ttl=pulumi.get(__response__, 'ttl'),
|
192
|
+
username=pulumi.get(__response__, 'username')))
|