pulumi-vault 6.6.0a1741415971__py3-none-any.whl → 6.7.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +9 -0
- pulumi_vault/_inputs.py +583 -562
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +425 -200
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +523 -306
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +288 -70
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +383 -130
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +432 -186
- pulumi_vault/azure/backend_role.py +188 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +3857 -2200
- pulumi_vault/database/outputs.py +2483 -1330
- pulumi_vault/database/secret_backend_connection.py +333 -112
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +283 -140
- pulumi_vault/database/secrets_mount.py +275 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +426 -205
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +420 -179
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +68 -18
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +754 -533
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +720 -499
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +73 -60
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +31 -36
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +174 -126
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1377 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +152 -104
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +278 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +35 -17
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +139 -25
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -31
- pulumi_vault/pkisecret/secret_backend_cert.py +439 -297
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +237 -182
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +520 -378
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +441 -175
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +894 -644
- pulumi_vault/pkisecret/secret_backend_root_cert.py +851 -427
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +936 -357
- pulumi_vault/pkisecret/secret_backend_sign.py +347 -252
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +2 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +295 -0
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +96 -95
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +3 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +325 -0
- pulumi_vault/transit/get_verify.py +355 -0
- pulumi_vault/transit/secret_backend_key.py +394 -231
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.7.0.dist-info/RECORD +265 -0
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
- pulumi_vault-6.6.0a1741415971.dist-info/RECORD +0 -260
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,26 +20,26 @@ __all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class NomadSecretRoleArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: pulumi.Input[str],
|
23
|
-
role: pulumi.Input[str],
|
24
|
-
global_: Optional[pulumi.Input[bool]] = None,
|
25
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
26
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
27
|
-
type: Optional[pulumi.Input[str]] = None):
|
23
|
+
backend: pulumi.Input[builtins.str],
|
24
|
+
role: pulumi.Input[builtins.str],
|
25
|
+
global_: Optional[pulumi.Input[builtins.bool]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
28
|
+
type: Optional[pulumi.Input[builtins.str]] = None):
|
28
29
|
"""
|
29
30
|
The set of arguments for constructing a NomadSecretRole resource.
|
30
|
-
:param pulumi.Input[str] backend: The unique path this backend should be mounted at.
|
31
|
-
:param pulumi.Input[str] role: The name to identify this role within the backend.
|
31
|
+
:param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
|
32
|
+
:param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
|
32
33
|
Must be unique within the backend.
|
33
|
-
:param pulumi.Input[bool] global_: Specifies if the generated token should be global. Defaults to
|
34
|
+
:param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
|
34
35
|
false.
|
35
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
36
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
36
37
|
The value should not contain leading or trailing forward slashes.
|
37
38
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
39
|
*Available only for Vault Enterprise*.
|
39
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
|
40
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
|
40
41
|
when `type` is 'client'.
|
41
|
-
:param pulumi.Input[str] type: Specifies the type of token to create when using this role. Valid
|
42
|
+
:param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
|
42
43
|
settings are 'client' and 'management'. Defaults to 'client'.
|
43
44
|
"""
|
44
45
|
pulumi.set(__self__, "backend", backend)
|
@@ -54,19 +55,19 @@ class NomadSecretRoleArgs:
|
|
54
55
|
|
55
56
|
@property
|
56
57
|
@pulumi.getter
|
57
|
-
def backend(self) -> pulumi.Input[str]:
|
58
|
+
def backend(self) -> pulumi.Input[builtins.str]:
|
58
59
|
"""
|
59
60
|
The unique path this backend should be mounted at.
|
60
61
|
"""
|
61
62
|
return pulumi.get(self, "backend")
|
62
63
|
|
63
64
|
@backend.setter
|
64
|
-
def backend(self, value: pulumi.Input[str]):
|
65
|
+
def backend(self, value: pulumi.Input[builtins.str]):
|
65
66
|
pulumi.set(self, "backend", value)
|
66
67
|
|
67
68
|
@property
|
68
69
|
@pulumi.getter
|
69
|
-
def role(self) -> pulumi.Input[str]:
|
70
|
+
def role(self) -> pulumi.Input[builtins.str]:
|
70
71
|
"""
|
71
72
|
The name to identify this role within the backend.
|
72
73
|
Must be unique within the backend.
|
@@ -74,12 +75,12 @@ class NomadSecretRoleArgs:
|
|
74
75
|
return pulumi.get(self, "role")
|
75
76
|
|
76
77
|
@role.setter
|
77
|
-
def role(self, value: pulumi.Input[str]):
|
78
|
+
def role(self, value: pulumi.Input[builtins.str]):
|
78
79
|
pulumi.set(self, "role", value)
|
79
80
|
|
80
81
|
@property
|
81
82
|
@pulumi.getter(name="global")
|
82
|
-
def global_(self) -> Optional[pulumi.Input[bool]]:
|
83
|
+
def global_(self) -> Optional[pulumi.Input[builtins.bool]]:
|
83
84
|
"""
|
84
85
|
Specifies if the generated token should be global. Defaults to
|
85
86
|
false.
|
@@ -87,12 +88,12 @@ class NomadSecretRoleArgs:
|
|
87
88
|
return pulumi.get(self, "global_")
|
88
89
|
|
89
90
|
@global_.setter
|
90
|
-
def global_(self, value: Optional[pulumi.Input[bool]]):
|
91
|
+
def global_(self, value: Optional[pulumi.Input[builtins.bool]]):
|
91
92
|
pulumi.set(self, "global_", value)
|
92
93
|
|
93
94
|
@property
|
94
95
|
@pulumi.getter
|
95
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
96
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
96
97
|
"""
|
97
98
|
The namespace to provision the resource in.
|
98
99
|
The value should not contain leading or trailing forward slashes.
|
@@ -102,12 +103,12 @@ class NomadSecretRoleArgs:
|
|
102
103
|
return pulumi.get(self, "namespace")
|
103
104
|
|
104
105
|
@namespace.setter
|
105
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
106
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
106
107
|
pulumi.set(self, "namespace", value)
|
107
108
|
|
108
109
|
@property
|
109
110
|
@pulumi.getter
|
110
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
111
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
111
112
|
"""
|
112
113
|
List of policies attached to the generated token. This setting is only used
|
113
114
|
when `type` is 'client'.
|
@@ -115,12 +116,12 @@ class NomadSecretRoleArgs:
|
|
115
116
|
return pulumi.get(self, "policies")
|
116
117
|
|
117
118
|
@policies.setter
|
118
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
119
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
119
120
|
pulumi.set(self, "policies", value)
|
120
121
|
|
121
122
|
@property
|
122
123
|
@pulumi.getter
|
123
|
-
def type(self) -> Optional[pulumi.Input[str]]:
|
124
|
+
def type(self) -> Optional[pulumi.Input[builtins.str]]:
|
124
125
|
"""
|
125
126
|
Specifies the type of token to create when using this role. Valid
|
126
127
|
settings are 'client' and 'management'. Defaults to 'client'.
|
@@ -128,33 +129,33 @@ class NomadSecretRoleArgs:
|
|
128
129
|
return pulumi.get(self, "type")
|
129
130
|
|
130
131
|
@type.setter
|
131
|
-
def type(self, value: Optional[pulumi.Input[str]]):
|
132
|
+
def type(self, value: Optional[pulumi.Input[builtins.str]]):
|
132
133
|
pulumi.set(self, "type", value)
|
133
134
|
|
134
135
|
|
135
136
|
@pulumi.input_type
|
136
137
|
class _NomadSecretRoleState:
|
137
138
|
def __init__(__self__, *,
|
138
|
-
backend: Optional[pulumi.Input[str]] = None,
|
139
|
-
global_: Optional[pulumi.Input[bool]] = None,
|
140
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
141
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
142
|
-
role: Optional[pulumi.Input[str]] = None,
|
143
|
-
type: Optional[pulumi.Input[str]] = None):
|
139
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
140
|
+
global_: Optional[pulumi.Input[builtins.bool]] = None,
|
141
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
142
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
143
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
144
|
+
type: Optional[pulumi.Input[builtins.str]] = None):
|
144
145
|
"""
|
145
146
|
Input properties used for looking up and filtering NomadSecretRole resources.
|
146
|
-
:param pulumi.Input[str] backend: The unique path this backend should be mounted at.
|
147
|
-
:param pulumi.Input[bool] global_: Specifies if the generated token should be global. Defaults to
|
147
|
+
:param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
|
148
|
+
:param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
|
148
149
|
false.
|
149
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
150
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
150
151
|
The value should not contain leading or trailing forward slashes.
|
151
152
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
152
153
|
*Available only for Vault Enterprise*.
|
153
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
|
154
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
|
154
155
|
when `type` is 'client'.
|
155
|
-
:param pulumi.Input[str] role: The name to identify this role within the backend.
|
156
|
+
:param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
|
156
157
|
Must be unique within the backend.
|
157
|
-
:param pulumi.Input[str] type: Specifies the type of token to create when using this role. Valid
|
158
|
+
:param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
|
158
159
|
settings are 'client' and 'management'. Defaults to 'client'.
|
159
160
|
"""
|
160
161
|
if backend is not None:
|
@@ -172,19 +173,19 @@ class _NomadSecretRoleState:
|
|
172
173
|
|
173
174
|
@property
|
174
175
|
@pulumi.getter
|
175
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
176
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
176
177
|
"""
|
177
178
|
The unique path this backend should be mounted at.
|
178
179
|
"""
|
179
180
|
return pulumi.get(self, "backend")
|
180
181
|
|
181
182
|
@backend.setter
|
182
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
183
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
183
184
|
pulumi.set(self, "backend", value)
|
184
185
|
|
185
186
|
@property
|
186
187
|
@pulumi.getter(name="global")
|
187
|
-
def global_(self) -> Optional[pulumi.Input[bool]]:
|
188
|
+
def global_(self) -> Optional[pulumi.Input[builtins.bool]]:
|
188
189
|
"""
|
189
190
|
Specifies if the generated token should be global. Defaults to
|
190
191
|
false.
|
@@ -192,12 +193,12 @@ class _NomadSecretRoleState:
|
|
192
193
|
return pulumi.get(self, "global_")
|
193
194
|
|
194
195
|
@global_.setter
|
195
|
-
def global_(self, value: Optional[pulumi.Input[bool]]):
|
196
|
+
def global_(self, value: Optional[pulumi.Input[builtins.bool]]):
|
196
197
|
pulumi.set(self, "global_", value)
|
197
198
|
|
198
199
|
@property
|
199
200
|
@pulumi.getter
|
200
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
201
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
201
202
|
"""
|
202
203
|
The namespace to provision the resource in.
|
203
204
|
The value should not contain leading or trailing forward slashes.
|
@@ -207,12 +208,12 @@ class _NomadSecretRoleState:
|
|
207
208
|
return pulumi.get(self, "namespace")
|
208
209
|
|
209
210
|
@namespace.setter
|
210
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
211
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
211
212
|
pulumi.set(self, "namespace", value)
|
212
213
|
|
213
214
|
@property
|
214
215
|
@pulumi.getter
|
215
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
216
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
216
217
|
"""
|
217
218
|
List of policies attached to the generated token. This setting is only used
|
218
219
|
when `type` is 'client'.
|
@@ -220,12 +221,12 @@ class _NomadSecretRoleState:
|
|
220
221
|
return pulumi.get(self, "policies")
|
221
222
|
|
222
223
|
@policies.setter
|
223
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
224
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
224
225
|
pulumi.set(self, "policies", value)
|
225
226
|
|
226
227
|
@property
|
227
228
|
@pulumi.getter
|
228
|
-
def role(self) -> Optional[pulumi.Input[str]]:
|
229
|
+
def role(self) -> Optional[pulumi.Input[builtins.str]]:
|
229
230
|
"""
|
230
231
|
The name to identify this role within the backend.
|
231
232
|
Must be unique within the backend.
|
@@ -233,12 +234,12 @@ class _NomadSecretRoleState:
|
|
233
234
|
return pulumi.get(self, "role")
|
234
235
|
|
235
236
|
@role.setter
|
236
|
-
def role(self, value: Optional[pulumi.Input[str]]):
|
237
|
+
def role(self, value: Optional[pulumi.Input[builtins.str]]):
|
237
238
|
pulumi.set(self, "role", value)
|
238
239
|
|
239
240
|
@property
|
240
241
|
@pulumi.getter
|
241
|
-
def type(self) -> Optional[pulumi.Input[str]]:
|
242
|
+
def type(self) -> Optional[pulumi.Input[builtins.str]]:
|
242
243
|
"""
|
243
244
|
Specifies the type of token to create when using this role. Valid
|
244
245
|
settings are 'client' and 'management'. Defaults to 'client'.
|
@@ -246,7 +247,7 @@ class _NomadSecretRoleState:
|
|
246
247
|
return pulumi.get(self, "type")
|
247
248
|
|
248
249
|
@type.setter
|
249
|
-
def type(self, value: Optional[pulumi.Input[str]]):
|
250
|
+
def type(self, value: Optional[pulumi.Input[builtins.str]]):
|
250
251
|
pulumi.set(self, "type", value)
|
251
252
|
|
252
253
|
|
@@ -255,12 +256,12 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
255
256
|
def __init__(__self__,
|
256
257
|
resource_name: str,
|
257
258
|
opts: Optional[pulumi.ResourceOptions] = None,
|
258
|
-
backend: Optional[pulumi.Input[str]] = None,
|
259
|
-
global_: Optional[pulumi.Input[bool]] = None,
|
260
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
261
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
262
|
-
role: Optional[pulumi.Input[str]] = None,
|
263
|
-
type: Optional[pulumi.Input[str]] = None,
|
259
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
260
|
+
global_: Optional[pulumi.Input[builtins.bool]] = None,
|
261
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
262
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
263
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
264
|
+
type: Optional[pulumi.Input[builtins.str]] = None,
|
264
265
|
__props__=None):
|
265
266
|
"""
|
266
267
|
## Example Usage
|
@@ -293,18 +294,18 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
293
294
|
|
294
295
|
:param str resource_name: The name of the resource.
|
295
296
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
296
|
-
:param pulumi.Input[str] backend: The unique path this backend should be mounted at.
|
297
|
-
:param pulumi.Input[bool] global_: Specifies if the generated token should be global. Defaults to
|
297
|
+
:param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
|
298
|
+
:param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
|
298
299
|
false.
|
299
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
300
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
300
301
|
The value should not contain leading or trailing forward slashes.
|
301
302
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
302
303
|
*Available only for Vault Enterprise*.
|
303
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
|
304
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
|
304
305
|
when `type` is 'client'.
|
305
|
-
:param pulumi.Input[str] role: The name to identify this role within the backend.
|
306
|
+
:param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
|
306
307
|
Must be unique within the backend.
|
307
|
-
:param pulumi.Input[str] type: Specifies the type of token to create when using this role. Valid
|
308
|
+
:param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
|
308
309
|
settings are 'client' and 'management'. Defaults to 'client'.
|
309
310
|
"""
|
310
311
|
...
|
@@ -357,12 +358,12 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
357
358
|
def _internal_init(__self__,
|
358
359
|
resource_name: str,
|
359
360
|
opts: Optional[pulumi.ResourceOptions] = None,
|
360
|
-
backend: Optional[pulumi.Input[str]] = None,
|
361
|
-
global_: Optional[pulumi.Input[bool]] = None,
|
362
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
363
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
364
|
-
role: Optional[pulumi.Input[str]] = None,
|
365
|
-
type: Optional[pulumi.Input[str]] = None,
|
361
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
362
|
+
global_: Optional[pulumi.Input[builtins.bool]] = None,
|
363
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
364
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
365
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
366
|
+
type: Optional[pulumi.Input[builtins.str]] = None,
|
366
367
|
__props__=None):
|
367
368
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
368
369
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -392,12 +393,12 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
392
393
|
def get(resource_name: str,
|
393
394
|
id: pulumi.Input[str],
|
394
395
|
opts: Optional[pulumi.ResourceOptions] = None,
|
395
|
-
backend: Optional[pulumi.Input[str]] = None,
|
396
|
-
global_: Optional[pulumi.Input[bool]] = None,
|
397
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
398
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
399
|
-
role: Optional[pulumi.Input[str]] = None,
|
400
|
-
type: Optional[pulumi.Input[str]] = None) -> 'NomadSecretRole':
|
396
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
397
|
+
global_: Optional[pulumi.Input[builtins.bool]] = None,
|
398
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
399
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
400
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
401
|
+
type: Optional[pulumi.Input[builtins.str]] = None) -> 'NomadSecretRole':
|
401
402
|
"""
|
402
403
|
Get an existing NomadSecretRole resource's state with the given name, id, and optional extra
|
403
404
|
properties used to qualify the lookup.
|
@@ -405,18 +406,18 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
405
406
|
:param str resource_name: The unique name of the resulting resource.
|
406
407
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
407
408
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
408
|
-
:param pulumi.Input[str] backend: The unique path this backend should be mounted at.
|
409
|
-
:param pulumi.Input[bool] global_: Specifies if the generated token should be global. Defaults to
|
409
|
+
:param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
|
410
|
+
:param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
|
410
411
|
false.
|
411
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
412
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
412
413
|
The value should not contain leading or trailing forward slashes.
|
413
414
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
414
415
|
*Available only for Vault Enterprise*.
|
415
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
|
416
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
|
416
417
|
when `type` is 'client'.
|
417
|
-
:param pulumi.Input[str] role: The name to identify this role within the backend.
|
418
|
+
:param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
|
418
419
|
Must be unique within the backend.
|
419
|
-
:param pulumi.Input[str] type: Specifies the type of token to create when using this role. Valid
|
420
|
+
:param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
|
420
421
|
settings are 'client' and 'management'. Defaults to 'client'.
|
421
422
|
"""
|
422
423
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -433,7 +434,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
433
434
|
|
434
435
|
@property
|
435
436
|
@pulumi.getter
|
436
|
-
def backend(self) -> pulumi.Output[str]:
|
437
|
+
def backend(self) -> pulumi.Output[builtins.str]:
|
437
438
|
"""
|
438
439
|
The unique path this backend should be mounted at.
|
439
440
|
"""
|
@@ -441,7 +442,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
441
442
|
|
442
443
|
@property
|
443
444
|
@pulumi.getter(name="global")
|
444
|
-
def global_(self) -> pulumi.Output[bool]:
|
445
|
+
def global_(self) -> pulumi.Output[builtins.bool]:
|
445
446
|
"""
|
446
447
|
Specifies if the generated token should be global. Defaults to
|
447
448
|
false.
|
@@ -450,7 +451,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
450
451
|
|
451
452
|
@property
|
452
453
|
@pulumi.getter
|
453
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
454
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
454
455
|
"""
|
455
456
|
The namespace to provision the resource in.
|
456
457
|
The value should not contain leading or trailing forward slashes.
|
@@ -461,7 +462,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
461
462
|
|
462
463
|
@property
|
463
464
|
@pulumi.getter
|
464
|
-
def policies(self) -> pulumi.Output[Sequence[str]]:
|
465
|
+
def policies(self) -> pulumi.Output[Sequence[builtins.str]]:
|
465
466
|
"""
|
466
467
|
List of policies attached to the generated token. This setting is only used
|
467
468
|
when `type` is 'client'.
|
@@ -470,7 +471,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
470
471
|
|
471
472
|
@property
|
472
473
|
@pulumi.getter
|
473
|
-
def role(self) -> pulumi.Output[str]:
|
474
|
+
def role(self) -> pulumi.Output[builtins.str]:
|
474
475
|
"""
|
475
476
|
The name to identify this role within the backend.
|
476
477
|
Must be unique within the backend.
|
@@ -479,7 +480,7 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
479
480
|
|
480
481
|
@property
|
481
482
|
@pulumi.getter
|
482
|
-
def type(self) -> pulumi.Output[str]:
|
483
|
+
def type(self) -> pulumi.Output[builtins.str]:
|
483
484
|
"""
|
484
485
|
Specifies the type of token to create when using this role. Valid
|
485
486
|
settings are 'client' and 'management'. Defaults to 'client'.
|
pulumi_vault/okta/__init__.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
from .. import _utilities
|
6
7
|
import typing
|
7
8
|
# Export this package's modules as members:
|
pulumi_vault/okta/_inputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -25,11 +26,11 @@ MYPY = False
|
|
25
26
|
|
26
27
|
if not MYPY:
|
27
28
|
class AuthBackendGroupArgsDict(TypedDict):
|
28
|
-
group_name: pulumi.Input[str]
|
29
|
+
group_name: pulumi.Input[builtins.str]
|
29
30
|
"""
|
30
31
|
Name of the Okta group
|
31
32
|
"""
|
32
|
-
policies: pulumi.Input[Sequence[pulumi.Input[str]]]
|
33
|
+
policies: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]
|
33
34
|
"""
|
34
35
|
Policies to associate with this group
|
35
36
|
"""
|
@@ -39,51 +40,51 @@ elif False:
|
|
39
40
|
@pulumi.input_type
|
40
41
|
class AuthBackendGroupArgs:
|
41
42
|
def __init__(__self__, *,
|
42
|
-
group_name: pulumi.Input[str],
|
43
|
-
policies: pulumi.Input[Sequence[pulumi.Input[str]]]):
|
43
|
+
group_name: pulumi.Input[builtins.str],
|
44
|
+
policies: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
|
44
45
|
"""
|
45
|
-
:param pulumi.Input[str] group_name: Name of the Okta group
|
46
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this group
|
46
|
+
:param pulumi.Input[builtins.str] group_name: Name of the Okta group
|
47
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies to associate with this group
|
47
48
|
"""
|
48
49
|
pulumi.set(__self__, "group_name", group_name)
|
49
50
|
pulumi.set(__self__, "policies", policies)
|
50
51
|
|
51
52
|
@property
|
52
53
|
@pulumi.getter(name="groupName")
|
53
|
-
def group_name(self) -> pulumi.Input[str]:
|
54
|
+
def group_name(self) -> pulumi.Input[builtins.str]:
|
54
55
|
"""
|
55
56
|
Name of the Okta group
|
56
57
|
"""
|
57
58
|
return pulumi.get(self, "group_name")
|
58
59
|
|
59
60
|
@group_name.setter
|
60
|
-
def group_name(self, value: pulumi.Input[str]):
|
61
|
+
def group_name(self, value: pulumi.Input[builtins.str]):
|
61
62
|
pulumi.set(self, "group_name", value)
|
62
63
|
|
63
64
|
@property
|
64
65
|
@pulumi.getter
|
65
|
-
def policies(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
66
|
+
def policies(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
|
66
67
|
"""
|
67
68
|
Policies to associate with this group
|
68
69
|
"""
|
69
70
|
return pulumi.get(self, "policies")
|
70
71
|
|
71
72
|
@policies.setter
|
72
|
-
def policies(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
|
73
|
+
def policies(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
|
73
74
|
pulumi.set(self, "policies", value)
|
74
75
|
|
75
76
|
|
76
77
|
if not MYPY:
|
77
78
|
class AuthBackendUserArgsDict(TypedDict):
|
78
|
-
username: pulumi.Input[str]
|
79
|
+
username: pulumi.Input[builtins.str]
|
79
80
|
"""
|
80
81
|
Name of the user within Okta
|
81
82
|
"""
|
82
|
-
groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
83
|
+
groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
|
83
84
|
"""
|
84
85
|
Groups within the Okta auth backend to associate with this user
|
85
86
|
"""
|
86
|
-
policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
87
|
+
policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
|
87
88
|
"""
|
88
89
|
Policies to associate with this user
|
89
90
|
"""
|
@@ -93,13 +94,13 @@ elif False:
|
|
93
94
|
@pulumi.input_type
|
94
95
|
class AuthBackendUserArgs:
|
95
96
|
def __init__(__self__, *,
|
96
|
-
username: pulumi.Input[str],
|
97
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
98
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
97
|
+
username: pulumi.Input[builtins.str],
|
98
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
99
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
99
100
|
"""
|
100
|
-
:param pulumi.Input[str] username: Name of the user within Okta
|
101
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Groups within the Okta auth backend to associate with this user
|
102
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this user
|
101
|
+
:param pulumi.Input[builtins.str] username: Name of the user within Okta
|
102
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Groups within the Okta auth backend to associate with this user
|
103
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies to associate with this user
|
103
104
|
"""
|
104
105
|
pulumi.set(__self__, "username", username)
|
105
106
|
if groups is not None:
|
@@ -109,38 +110,38 @@ class AuthBackendUserArgs:
|
|
109
110
|
|
110
111
|
@property
|
111
112
|
@pulumi.getter
|
112
|
-
def username(self) -> pulumi.Input[str]:
|
113
|
+
def username(self) -> pulumi.Input[builtins.str]:
|
113
114
|
"""
|
114
115
|
Name of the user within Okta
|
115
116
|
"""
|
116
117
|
return pulumi.get(self, "username")
|
117
118
|
|
118
119
|
@username.setter
|
119
|
-
def username(self, value: pulumi.Input[str]):
|
120
|
+
def username(self, value: pulumi.Input[builtins.str]):
|
120
121
|
pulumi.set(self, "username", value)
|
121
122
|
|
122
123
|
@property
|
123
124
|
@pulumi.getter
|
124
|
-
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
125
|
+
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
125
126
|
"""
|
126
127
|
Groups within the Okta auth backend to associate with this user
|
127
128
|
"""
|
128
129
|
return pulumi.get(self, "groups")
|
129
130
|
|
130
131
|
@groups.setter
|
131
|
-
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
132
|
+
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
132
133
|
pulumi.set(self, "groups", value)
|
133
134
|
|
134
135
|
@property
|
135
136
|
@pulumi.getter
|
136
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
137
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
137
138
|
"""
|
138
139
|
Policies to associate with this user
|
139
140
|
"""
|
140
141
|
return pulumi.get(self, "policies")
|
141
142
|
|
142
143
|
@policies.setter
|
143
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
144
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
144
145
|
pulumi.set(self, "policies", value)
|
145
146
|
|
146
147
|
|