pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,21 +20,21 @@ __all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendGroupArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
groupname: pulumi.Input[str],
|
23
|
-
backend: Optional[pulumi.Input[str]] = None,
|
24
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
25
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
23
|
+
groupname: pulumi.Input[builtins.str],
|
24
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
26
27
|
"""
|
27
28
|
The set of arguments for constructing a AuthBackendGroup resource.
|
28
|
-
:param pulumi.Input[str] groupname: The LDAP groupname
|
29
|
-
:param pulumi.Input[str] backend: Path to the authentication backend
|
29
|
+
:param pulumi.Input[builtins.str] groupname: The LDAP groupname
|
30
|
+
:param pulumi.Input[builtins.str] backend: Path to the authentication backend
|
30
31
|
|
31
32
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
32
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
33
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
33
34
|
The value should not contain leading or trailing forward slashes.
|
34
35
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
35
36
|
*Available only for Vault Enterprise*.
|
36
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to members of the group
|
37
38
|
"""
|
38
39
|
pulumi.set(__self__, "groupname", groupname)
|
39
40
|
if backend is not None:
|
@@ -45,19 +46,19 @@ class AuthBackendGroupArgs:
|
|
45
46
|
|
46
47
|
@property
|
47
48
|
@pulumi.getter
|
48
|
-
def groupname(self) -> pulumi.Input[str]:
|
49
|
+
def groupname(self) -> pulumi.Input[builtins.str]:
|
49
50
|
"""
|
50
51
|
The LDAP groupname
|
51
52
|
"""
|
52
53
|
return pulumi.get(self, "groupname")
|
53
54
|
|
54
55
|
@groupname.setter
|
55
|
-
def groupname(self, value: pulumi.Input[str]):
|
56
|
+
def groupname(self, value: pulumi.Input[builtins.str]):
|
56
57
|
pulumi.set(self, "groupname", value)
|
57
58
|
|
58
59
|
@property
|
59
60
|
@pulumi.getter
|
60
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
61
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
61
62
|
"""
|
62
63
|
Path to the authentication backend
|
63
64
|
|
@@ -66,12 +67,12 @@ class AuthBackendGroupArgs:
|
|
66
67
|
return pulumi.get(self, "backend")
|
67
68
|
|
68
69
|
@backend.setter
|
69
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
70
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
70
71
|
pulumi.set(self, "backend", value)
|
71
72
|
|
72
73
|
@property
|
73
74
|
@pulumi.getter
|
74
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
75
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
75
76
|
"""
|
76
77
|
The namespace to provision the resource in.
|
77
78
|
The value should not contain leading or trailing forward slashes.
|
@@ -81,40 +82,40 @@ class AuthBackendGroupArgs:
|
|
81
82
|
return pulumi.get(self, "namespace")
|
82
83
|
|
83
84
|
@namespace.setter
|
84
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
85
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
85
86
|
pulumi.set(self, "namespace", value)
|
86
87
|
|
87
88
|
@property
|
88
89
|
@pulumi.getter
|
89
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
90
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
90
91
|
"""
|
91
92
|
Policies which should be granted to members of the group
|
92
93
|
"""
|
93
94
|
return pulumi.get(self, "policies")
|
94
95
|
|
95
96
|
@policies.setter
|
96
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
97
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
97
98
|
pulumi.set(self, "policies", value)
|
98
99
|
|
99
100
|
|
100
101
|
@pulumi.input_type
|
101
102
|
class _AuthBackendGroupState:
|
102
103
|
def __init__(__self__, *,
|
103
|
-
backend: Optional[pulumi.Input[str]] = None,
|
104
|
-
groupname: Optional[pulumi.Input[str]] = None,
|
105
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
106
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
104
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
105
|
+
groupname: Optional[pulumi.Input[builtins.str]] = None,
|
106
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
107
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
107
108
|
"""
|
108
109
|
Input properties used for looking up and filtering AuthBackendGroup resources.
|
109
|
-
:param pulumi.Input[str] backend: Path to the authentication backend
|
110
|
+
:param pulumi.Input[builtins.str] backend: Path to the authentication backend
|
110
111
|
|
111
112
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
112
|
-
:param pulumi.Input[str] groupname: The LDAP groupname
|
113
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
113
|
+
:param pulumi.Input[builtins.str] groupname: The LDAP groupname
|
114
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
114
115
|
The value should not contain leading or trailing forward slashes.
|
115
116
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
116
117
|
*Available only for Vault Enterprise*.
|
117
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
|
118
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to members of the group
|
118
119
|
"""
|
119
120
|
if backend is not None:
|
120
121
|
pulumi.set(__self__, "backend", backend)
|
@@ -127,7 +128,7 @@ class _AuthBackendGroupState:
|
|
127
128
|
|
128
129
|
@property
|
129
130
|
@pulumi.getter
|
130
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
131
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
131
132
|
"""
|
132
133
|
Path to the authentication backend
|
133
134
|
|
@@ -136,24 +137,24 @@ class _AuthBackendGroupState:
|
|
136
137
|
return pulumi.get(self, "backend")
|
137
138
|
|
138
139
|
@backend.setter
|
139
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
140
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
140
141
|
pulumi.set(self, "backend", value)
|
141
142
|
|
142
143
|
@property
|
143
144
|
@pulumi.getter
|
144
|
-
def groupname(self) -> Optional[pulumi.Input[str]]:
|
145
|
+
def groupname(self) -> Optional[pulumi.Input[builtins.str]]:
|
145
146
|
"""
|
146
147
|
The LDAP groupname
|
147
148
|
"""
|
148
149
|
return pulumi.get(self, "groupname")
|
149
150
|
|
150
151
|
@groupname.setter
|
151
|
-
def groupname(self, value: Optional[pulumi.Input[str]]):
|
152
|
+
def groupname(self, value: Optional[pulumi.Input[builtins.str]]):
|
152
153
|
pulumi.set(self, "groupname", value)
|
153
154
|
|
154
155
|
@property
|
155
156
|
@pulumi.getter
|
156
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
157
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
157
158
|
"""
|
158
159
|
The namespace to provision the resource in.
|
159
160
|
The value should not contain leading or trailing forward slashes.
|
@@ -163,19 +164,19 @@ class _AuthBackendGroupState:
|
|
163
164
|
return pulumi.get(self, "namespace")
|
164
165
|
|
165
166
|
@namespace.setter
|
166
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
167
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
167
168
|
pulumi.set(self, "namespace", value)
|
168
169
|
|
169
170
|
@property
|
170
171
|
@pulumi.getter
|
171
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
172
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
172
173
|
"""
|
173
174
|
Policies which should be granted to members of the group
|
174
175
|
"""
|
175
176
|
return pulumi.get(self, "policies")
|
176
177
|
|
177
178
|
@policies.setter
|
178
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
179
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
179
180
|
pulumi.set(self, "policies", value)
|
180
181
|
|
181
182
|
|
@@ -184,10 +185,10 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
184
185
|
def __init__(__self__,
|
185
186
|
resource_name: str,
|
186
187
|
opts: Optional[pulumi.ResourceOptions] = None,
|
187
|
-
backend: Optional[pulumi.Input[str]] = None,
|
188
|
-
groupname: Optional[pulumi.Input[str]] = None,
|
189
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
190
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
188
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
189
|
+
groupname: Optional[pulumi.Input[builtins.str]] = None,
|
190
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
191
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
191
192
|
__props__=None):
|
192
193
|
"""
|
193
194
|
Provides a resource to create a group in an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
|
@@ -223,15 +224,15 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
223
224
|
|
224
225
|
:param str resource_name: The name of the resource.
|
225
226
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
226
|
-
:param pulumi.Input[str] backend: Path to the authentication backend
|
227
|
+
:param pulumi.Input[builtins.str] backend: Path to the authentication backend
|
227
228
|
|
228
229
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
229
|
-
:param pulumi.Input[str] groupname: The LDAP groupname
|
230
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
230
|
+
:param pulumi.Input[builtins.str] groupname: The LDAP groupname
|
231
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
231
232
|
The value should not contain leading or trailing forward slashes.
|
232
233
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
233
234
|
*Available only for Vault Enterprise*.
|
234
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
|
235
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to members of the group
|
235
236
|
"""
|
236
237
|
...
|
237
238
|
@overload
|
@@ -286,10 +287,10 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
286
287
|
def _internal_init(__self__,
|
287
288
|
resource_name: str,
|
288
289
|
opts: Optional[pulumi.ResourceOptions] = None,
|
289
|
-
backend: Optional[pulumi.Input[str]] = None,
|
290
|
-
groupname: Optional[pulumi.Input[str]] = None,
|
291
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
292
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
290
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
291
|
+
groupname: Optional[pulumi.Input[builtins.str]] = None,
|
292
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
293
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
293
294
|
__props__=None):
|
294
295
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
295
296
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -315,10 +316,10 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
315
316
|
def get(resource_name: str,
|
316
317
|
id: pulumi.Input[str],
|
317
318
|
opts: Optional[pulumi.ResourceOptions] = None,
|
318
|
-
backend: Optional[pulumi.Input[str]] = None,
|
319
|
-
groupname: Optional[pulumi.Input[str]] = None,
|
320
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
321
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'AuthBackendGroup':
|
319
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
320
|
+
groupname: Optional[pulumi.Input[builtins.str]] = None,
|
321
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
322
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'AuthBackendGroup':
|
322
323
|
"""
|
323
324
|
Get an existing AuthBackendGroup resource's state with the given name, id, and optional extra
|
324
325
|
properties used to qualify the lookup.
|
@@ -326,15 +327,15 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
326
327
|
:param str resource_name: The unique name of the resulting resource.
|
327
328
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
328
329
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
329
|
-
:param pulumi.Input[str] backend: Path to the authentication backend
|
330
|
+
:param pulumi.Input[builtins.str] backend: Path to the authentication backend
|
330
331
|
|
331
332
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
332
|
-
:param pulumi.Input[str] groupname: The LDAP groupname
|
333
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
333
|
+
:param pulumi.Input[builtins.str] groupname: The LDAP groupname
|
334
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
334
335
|
The value should not contain leading or trailing forward slashes.
|
335
336
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
336
337
|
*Available only for Vault Enterprise*.
|
337
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
|
338
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to members of the group
|
338
339
|
"""
|
339
340
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
340
341
|
|
@@ -348,7 +349,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
348
349
|
|
349
350
|
@property
|
350
351
|
@pulumi.getter
|
351
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
352
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
352
353
|
"""
|
353
354
|
Path to the authentication backend
|
354
355
|
|
@@ -358,7 +359,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
358
359
|
|
359
360
|
@property
|
360
361
|
@pulumi.getter
|
361
|
-
def groupname(self) -> pulumi.Output[str]:
|
362
|
+
def groupname(self) -> pulumi.Output[builtins.str]:
|
362
363
|
"""
|
363
364
|
The LDAP groupname
|
364
365
|
"""
|
@@ -366,7 +367,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
366
367
|
|
367
368
|
@property
|
368
369
|
@pulumi.getter
|
369
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
370
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
370
371
|
"""
|
371
372
|
The namespace to provision the resource in.
|
372
373
|
The value should not contain leading or trailing forward slashes.
|
@@ -377,7 +378,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
377
378
|
|
378
379
|
@property
|
379
380
|
@pulumi.getter
|
380
|
-
def policies(self) -> pulumi.Output[Sequence[str]]:
|
381
|
+
def policies(self) -> pulumi.Output[Sequence[builtins.str]]:
|
381
382
|
"""
|
382
383
|
Policies which should be granted to members of the group
|
383
384
|
"""
|