pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,19 +20,19 @@ __all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendGroupInitArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
group_name: pulumi.Input[str],
|
23
|
-
path: pulumi.Input[str],
|
24
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
25
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
23
|
+
group_name: pulumi.Input[builtins.str],
|
24
|
+
path: pulumi.Input[builtins.str],
|
25
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
26
27
|
"""
|
27
28
|
The set of arguments for constructing a AuthBackendGroup resource.
|
28
|
-
:param pulumi.Input[str] group_name: Name of the group within the Okta
|
29
|
-
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
30
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
29
|
+
:param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
|
30
|
+
:param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
|
31
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
31
32
|
The value should not contain leading or trailing forward slashes.
|
32
33
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
34
|
*Available only for Vault Enterprise*.
|
34
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
35
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
|
35
36
|
"""
|
36
37
|
pulumi.set(__self__, "group_name", group_name)
|
37
38
|
pulumi.set(__self__, "path", path)
|
@@ -42,31 +43,31 @@ class AuthBackendGroupInitArgs:
|
|
42
43
|
|
43
44
|
@property
|
44
45
|
@pulumi.getter(name="groupName")
|
45
|
-
def group_name(self) -> pulumi.Input[str]:
|
46
|
+
def group_name(self) -> pulumi.Input[builtins.str]:
|
46
47
|
"""
|
47
48
|
Name of the group within the Okta
|
48
49
|
"""
|
49
50
|
return pulumi.get(self, "group_name")
|
50
51
|
|
51
52
|
@group_name.setter
|
52
|
-
def group_name(self, value: pulumi.Input[str]):
|
53
|
+
def group_name(self, value: pulumi.Input[builtins.str]):
|
53
54
|
pulumi.set(self, "group_name", value)
|
54
55
|
|
55
56
|
@property
|
56
57
|
@pulumi.getter
|
57
|
-
def path(self) -> pulumi.Input[str]:
|
58
|
+
def path(self) -> pulumi.Input[builtins.str]:
|
58
59
|
"""
|
59
60
|
The path where the Okta auth backend is mounted
|
60
61
|
"""
|
61
62
|
return pulumi.get(self, "path")
|
62
63
|
|
63
64
|
@path.setter
|
64
|
-
def path(self, value: pulumi.Input[str]):
|
65
|
+
def path(self, value: pulumi.Input[builtins.str]):
|
65
66
|
pulumi.set(self, "path", value)
|
66
67
|
|
67
68
|
@property
|
68
69
|
@pulumi.getter
|
69
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
70
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
70
71
|
"""
|
71
72
|
The namespace to provision the resource in.
|
72
73
|
The value should not contain leading or trailing forward slashes.
|
@@ -76,38 +77,38 @@ class AuthBackendGroupInitArgs:
|
|
76
77
|
return pulumi.get(self, "namespace")
|
77
78
|
|
78
79
|
@namespace.setter
|
79
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
80
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
80
81
|
pulumi.set(self, "namespace", value)
|
81
82
|
|
82
83
|
@property
|
83
84
|
@pulumi.getter
|
84
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
85
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
85
86
|
"""
|
86
87
|
Vault policies to associate with this group
|
87
88
|
"""
|
88
89
|
return pulumi.get(self, "policies")
|
89
90
|
|
90
91
|
@policies.setter
|
91
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
92
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
92
93
|
pulumi.set(self, "policies", value)
|
93
94
|
|
94
95
|
|
95
96
|
@pulumi.input_type
|
96
97
|
class _AuthBackendGroupState:
|
97
98
|
def __init__(__self__, *,
|
98
|
-
group_name: Optional[pulumi.Input[str]] = None,
|
99
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
100
|
-
path: Optional[pulumi.Input[str]] = None,
|
101
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
99
|
+
group_name: Optional[pulumi.Input[builtins.str]] = None,
|
100
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
101
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
102
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
102
103
|
"""
|
103
104
|
Input properties used for looking up and filtering AuthBackendGroup resources.
|
104
|
-
:param pulumi.Input[str] group_name: Name of the group within the Okta
|
105
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
105
|
+
:param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
|
106
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
106
107
|
The value should not contain leading or trailing forward slashes.
|
107
108
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
108
109
|
*Available only for Vault Enterprise*.
|
109
|
-
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
110
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
110
|
+
:param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
|
111
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
|
111
112
|
"""
|
112
113
|
if group_name is not None:
|
113
114
|
pulumi.set(__self__, "group_name", group_name)
|
@@ -120,19 +121,19 @@ class _AuthBackendGroupState:
|
|
120
121
|
|
121
122
|
@property
|
122
123
|
@pulumi.getter(name="groupName")
|
123
|
-
def group_name(self) -> Optional[pulumi.Input[str]]:
|
124
|
+
def group_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
124
125
|
"""
|
125
126
|
Name of the group within the Okta
|
126
127
|
"""
|
127
128
|
return pulumi.get(self, "group_name")
|
128
129
|
|
129
130
|
@group_name.setter
|
130
|
-
def group_name(self, value: Optional[pulumi.Input[str]]):
|
131
|
+
def group_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
131
132
|
pulumi.set(self, "group_name", value)
|
132
133
|
|
133
134
|
@property
|
134
135
|
@pulumi.getter
|
135
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
136
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
136
137
|
"""
|
137
138
|
The namespace to provision the resource in.
|
138
139
|
The value should not contain leading or trailing forward slashes.
|
@@ -142,31 +143,31 @@ class _AuthBackendGroupState:
|
|
142
143
|
return pulumi.get(self, "namespace")
|
143
144
|
|
144
145
|
@namespace.setter
|
145
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
146
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
146
147
|
pulumi.set(self, "namespace", value)
|
147
148
|
|
148
149
|
@property
|
149
150
|
@pulumi.getter
|
150
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
151
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
151
152
|
"""
|
152
153
|
The path where the Okta auth backend is mounted
|
153
154
|
"""
|
154
155
|
return pulumi.get(self, "path")
|
155
156
|
|
156
157
|
@path.setter
|
157
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
158
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
158
159
|
pulumi.set(self, "path", value)
|
159
160
|
|
160
161
|
@property
|
161
162
|
@pulumi.getter
|
162
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
163
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
163
164
|
"""
|
164
165
|
Vault policies to associate with this group
|
165
166
|
"""
|
166
167
|
return pulumi.get(self, "policies")
|
167
168
|
|
168
169
|
@policies.setter
|
169
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
170
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
170
171
|
pulumi.set(self, "policies", value)
|
171
172
|
|
172
173
|
|
@@ -175,10 +176,10 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
175
176
|
def __init__(__self__,
|
176
177
|
resource_name: str,
|
177
178
|
opts: Optional[pulumi.ResourceOptions] = None,
|
178
|
-
group_name: Optional[pulumi.Input[str]] = None,
|
179
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
180
|
-
path: Optional[pulumi.Input[str]] = None,
|
181
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
179
|
+
group_name: Optional[pulumi.Input[builtins.str]] = None,
|
180
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
181
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
182
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
182
183
|
__props__=None):
|
183
184
|
"""
|
184
185
|
Provides a resource to create a group in an
|
@@ -212,13 +213,13 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
212
213
|
|
213
214
|
:param str resource_name: The name of the resource.
|
214
215
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
215
|
-
:param pulumi.Input[str] group_name: Name of the group within the Okta
|
216
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
216
|
+
:param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
|
217
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
217
218
|
The value should not contain leading or trailing forward slashes.
|
218
219
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
219
220
|
*Available only for Vault Enterprise*.
|
220
|
-
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
221
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
221
|
+
:param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
|
222
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
|
222
223
|
"""
|
223
224
|
...
|
224
225
|
@overload
|
@@ -271,10 +272,10 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
271
272
|
def _internal_init(__self__,
|
272
273
|
resource_name: str,
|
273
274
|
opts: Optional[pulumi.ResourceOptions] = None,
|
274
|
-
group_name: Optional[pulumi.Input[str]] = None,
|
275
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
276
|
-
path: Optional[pulumi.Input[str]] = None,
|
277
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
275
|
+
group_name: Optional[pulumi.Input[builtins.str]] = None,
|
276
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
277
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
278
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
278
279
|
__props__=None):
|
279
280
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
280
281
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -302,10 +303,10 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
302
303
|
def get(resource_name: str,
|
303
304
|
id: pulumi.Input[str],
|
304
305
|
opts: Optional[pulumi.ResourceOptions] = None,
|
305
|
-
group_name: Optional[pulumi.Input[str]] = None,
|
306
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
307
|
-
path: Optional[pulumi.Input[str]] = None,
|
308
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'AuthBackendGroup':
|
306
|
+
group_name: Optional[pulumi.Input[builtins.str]] = None,
|
307
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
308
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
309
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'AuthBackendGroup':
|
309
310
|
"""
|
310
311
|
Get an existing AuthBackendGroup resource's state with the given name, id, and optional extra
|
311
312
|
properties used to qualify the lookup.
|
@@ -313,13 +314,13 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
313
314
|
:param str resource_name: The unique name of the resulting resource.
|
314
315
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
315
316
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
316
|
-
:param pulumi.Input[str] group_name: Name of the group within the Okta
|
317
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
317
|
+
:param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
|
318
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
318
319
|
The value should not contain leading or trailing forward slashes.
|
319
320
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
320
321
|
*Available only for Vault Enterprise*.
|
321
|
-
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
322
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
|
322
|
+
:param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
|
323
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
|
323
324
|
"""
|
324
325
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
325
326
|
|
@@ -333,7 +334,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
333
334
|
|
334
335
|
@property
|
335
336
|
@pulumi.getter(name="groupName")
|
336
|
-
def group_name(self) -> pulumi.Output[str]:
|
337
|
+
def group_name(self) -> pulumi.Output[builtins.str]:
|
337
338
|
"""
|
338
339
|
Name of the group within the Okta
|
339
340
|
"""
|
@@ -341,7 +342,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
341
342
|
|
342
343
|
@property
|
343
344
|
@pulumi.getter
|
344
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
345
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
345
346
|
"""
|
346
347
|
The namespace to provision the resource in.
|
347
348
|
The value should not contain leading or trailing forward slashes.
|
@@ -352,7 +353,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
352
353
|
|
353
354
|
@property
|
354
355
|
@pulumi.getter
|
355
|
-
def path(self) -> pulumi.Output[str]:
|
356
|
+
def path(self) -> pulumi.Output[builtins.str]:
|
356
357
|
"""
|
357
358
|
The path where the Okta auth backend is mounted
|
358
359
|
"""
|
@@ -360,7 +361,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
360
361
|
|
361
362
|
@property
|
362
363
|
@pulumi.getter
|
363
|
-
def policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
364
|
+
def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
364
365
|
"""
|
365
366
|
Vault policies to associate with this group
|
366
367
|
"""
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,21 +20,21 @@ __all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendUserInitArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
path: pulumi.Input[str],
|
23
|
-
username: pulumi.Input[str],
|
24
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
26
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
23
|
+
path: pulumi.Input[builtins.str],
|
24
|
+
username: pulumi.Input[builtins.str],
|
25
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
27
28
|
"""
|
28
29
|
The set of arguments for constructing a AuthBackendUser resource.
|
29
|
-
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
30
|
-
:param pulumi.Input[str] username: Name of the user within Okta
|
31
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
32
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
30
|
+
:param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
|
31
|
+
:param pulumi.Input[builtins.str] username: Name of the user within Okta
|
32
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: List of Okta groups to associate with this user
|
33
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
33
34
|
The value should not contain leading or trailing forward slashes.
|
34
35
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
35
36
|
*Available only for Vault Enterprise*.
|
36
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of Vault policies to associate with this user
|
37
38
|
"""
|
38
39
|
pulumi.set(__self__, "path", path)
|
39
40
|
pulumi.set(__self__, "username", username)
|
@@ -46,43 +47,43 @@ class AuthBackendUserInitArgs:
|
|
46
47
|
|
47
48
|
@property
|
48
49
|
@pulumi.getter
|
49
|
-
def path(self) -> pulumi.Input[str]:
|
50
|
+
def path(self) -> pulumi.Input[builtins.str]:
|
50
51
|
"""
|
51
52
|
The path where the Okta auth backend is mounted
|
52
53
|
"""
|
53
54
|
return pulumi.get(self, "path")
|
54
55
|
|
55
56
|
@path.setter
|
56
|
-
def path(self, value: pulumi.Input[str]):
|
57
|
+
def path(self, value: pulumi.Input[builtins.str]):
|
57
58
|
pulumi.set(self, "path", value)
|
58
59
|
|
59
60
|
@property
|
60
61
|
@pulumi.getter
|
61
|
-
def username(self) -> pulumi.Input[str]:
|
62
|
+
def username(self) -> pulumi.Input[builtins.str]:
|
62
63
|
"""
|
63
64
|
Name of the user within Okta
|
64
65
|
"""
|
65
66
|
return pulumi.get(self, "username")
|
66
67
|
|
67
68
|
@username.setter
|
68
|
-
def username(self, value: pulumi.Input[str]):
|
69
|
+
def username(self, value: pulumi.Input[builtins.str]):
|
69
70
|
pulumi.set(self, "username", value)
|
70
71
|
|
71
72
|
@property
|
72
73
|
@pulumi.getter
|
73
|
-
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
74
|
+
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
74
75
|
"""
|
75
76
|
List of Okta groups to associate with this user
|
76
77
|
"""
|
77
78
|
return pulumi.get(self, "groups")
|
78
79
|
|
79
80
|
@groups.setter
|
80
|
-
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
81
|
+
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
81
82
|
pulumi.set(self, "groups", value)
|
82
83
|
|
83
84
|
@property
|
84
85
|
@pulumi.getter
|
85
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
86
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
86
87
|
"""
|
87
88
|
The namespace to provision the resource in.
|
88
89
|
The value should not contain leading or trailing forward slashes.
|
@@ -92,40 +93,40 @@ class AuthBackendUserInitArgs:
|
|
92
93
|
return pulumi.get(self, "namespace")
|
93
94
|
|
94
95
|
@namespace.setter
|
95
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
96
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
96
97
|
pulumi.set(self, "namespace", value)
|
97
98
|
|
98
99
|
@property
|
99
100
|
@pulumi.getter
|
100
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
101
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
101
102
|
"""
|
102
103
|
List of Vault policies to associate with this user
|
103
104
|
"""
|
104
105
|
return pulumi.get(self, "policies")
|
105
106
|
|
106
107
|
@policies.setter
|
107
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
108
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
108
109
|
pulumi.set(self, "policies", value)
|
109
110
|
|
110
111
|
|
111
112
|
@pulumi.input_type
|
112
113
|
class _AuthBackendUserState:
|
113
114
|
def __init__(__self__, *,
|
114
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
115
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
116
|
-
path: Optional[pulumi.Input[str]] = None,
|
117
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
118
|
-
username: Optional[pulumi.Input[str]] = None):
|
115
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
116
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
117
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
118
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
119
|
+
username: Optional[pulumi.Input[builtins.str]] = None):
|
119
120
|
"""
|
120
121
|
Input properties used for looking up and filtering AuthBackendUser resources.
|
121
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
122
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
122
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: List of Okta groups to associate with this user
|
123
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
123
124
|
The value should not contain leading or trailing forward slashes.
|
124
125
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
125
126
|
*Available only for Vault Enterprise*.
|
126
|
-
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
127
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
|
128
|
-
:param pulumi.Input[str] username: Name of the user within Okta
|
127
|
+
:param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
|
128
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of Vault policies to associate with this user
|
129
|
+
:param pulumi.Input[builtins.str] username: Name of the user within Okta
|
129
130
|
"""
|
130
131
|
if groups is not None:
|
131
132
|
pulumi.set(__self__, "groups", groups)
|
@@ -140,19 +141,19 @@ class _AuthBackendUserState:
|
|
140
141
|
|
141
142
|
@property
|
142
143
|
@pulumi.getter
|
143
|
-
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
144
|
+
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
144
145
|
"""
|
145
146
|
List of Okta groups to associate with this user
|
146
147
|
"""
|
147
148
|
return pulumi.get(self, "groups")
|
148
149
|
|
149
150
|
@groups.setter
|
150
|
-
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
151
|
+
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
151
152
|
pulumi.set(self, "groups", value)
|
152
153
|
|
153
154
|
@property
|
154
155
|
@pulumi.getter
|
155
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
156
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
156
157
|
"""
|
157
158
|
The namespace to provision the resource in.
|
158
159
|
The value should not contain leading or trailing forward slashes.
|
@@ -162,43 +163,43 @@ class _AuthBackendUserState:
|
|
162
163
|
return pulumi.get(self, "namespace")
|
163
164
|
|
164
165
|
@namespace.setter
|
165
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
166
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
166
167
|
pulumi.set(self, "namespace", value)
|
167
168
|
|
168
169
|
@property
|
169
170
|
@pulumi.getter
|
170
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
171
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
171
172
|
"""
|
172
173
|
The path where the Okta auth backend is mounted
|
173
174
|
"""
|
174
175
|
return pulumi.get(self, "path")
|
175
176
|
|
176
177
|
@path.setter
|
177
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
178
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
178
179
|
pulumi.set(self, "path", value)
|
179
180
|
|
180
181
|
@property
|
181
182
|
@pulumi.getter
|
182
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
183
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
183
184
|
"""
|
184
185
|
List of Vault policies to associate with this user
|
185
186
|
"""
|
186
187
|
return pulumi.get(self, "policies")
|
187
188
|
|
188
189
|
@policies.setter
|
189
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
190
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
190
191
|
pulumi.set(self, "policies", value)
|
191
192
|
|
192
193
|
@property
|
193
194
|
@pulumi.getter
|
194
|
-
def username(self) -> Optional[pulumi.Input[str]]:
|
195
|
+
def username(self) -> Optional[pulumi.Input[builtins.str]]:
|
195
196
|
"""
|
196
197
|
Name of the user within Okta
|
197
198
|
"""
|
198
199
|
return pulumi.get(self, "username")
|
199
200
|
|
200
201
|
@username.setter
|
201
|
-
def username(self, value: Optional[pulumi.Input[str]]):
|
202
|
+
def username(self, value: Optional[pulumi.Input[builtins.str]]):
|
202
203
|
pulumi.set(self, "username", value)
|
203
204
|
|
204
205
|
|
@@ -207,11 +208,11 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
207
208
|
def __init__(__self__,
|
208
209
|
resource_name: str,
|
209
210
|
opts: Optional[pulumi.ResourceOptions] = None,
|
210
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
211
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
212
|
-
path: Optional[pulumi.Input[str]] = None,
|
213
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
214
|
-
username: Optional[pulumi.Input[str]] = None,
|
211
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
212
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
213
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
214
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
215
|
+
username: Optional[pulumi.Input[builtins.str]] = None,
|
215
216
|
__props__=None):
|
216
217
|
"""
|
217
218
|
Provides a resource to create a user in an
|
@@ -245,14 +246,14 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
245
246
|
|
246
247
|
:param str resource_name: The name of the resource.
|
247
248
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
248
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
249
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
249
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: List of Okta groups to associate with this user
|
250
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
250
251
|
The value should not contain leading or trailing forward slashes.
|
251
252
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
252
253
|
*Available only for Vault Enterprise*.
|
253
|
-
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
254
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
|
255
|
-
:param pulumi.Input[str] username: Name of the user within Okta
|
254
|
+
:param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
|
255
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of Vault policies to associate with this user
|
256
|
+
:param pulumi.Input[builtins.str] username: Name of the user within Okta
|
256
257
|
"""
|
257
258
|
...
|
258
259
|
@overload
|
@@ -305,11 +306,11 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
305
306
|
def _internal_init(__self__,
|
306
307
|
resource_name: str,
|
307
308
|
opts: Optional[pulumi.ResourceOptions] = None,
|
308
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
309
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
310
|
-
path: Optional[pulumi.Input[str]] = None,
|
311
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
312
|
-
username: Optional[pulumi.Input[str]] = None,
|
309
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
310
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
311
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
312
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
313
|
+
username: Optional[pulumi.Input[builtins.str]] = None,
|
313
314
|
__props__=None):
|
314
315
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
315
316
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -338,11 +339,11 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
338
339
|
def get(resource_name: str,
|
339
340
|
id: pulumi.Input[str],
|
340
341
|
opts: Optional[pulumi.ResourceOptions] = None,
|
341
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
342
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
343
|
-
path: Optional[pulumi.Input[str]] = None,
|
344
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
345
|
-
username: Optional[pulumi.Input[str]] = None) -> 'AuthBackendUser':
|
342
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
343
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
344
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
345
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
346
|
+
username: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendUser':
|
346
347
|
"""
|
347
348
|
Get an existing AuthBackendUser resource's state with the given name, id, and optional extra
|
348
349
|
properties used to qualify the lookup.
|
@@ -350,14 +351,14 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
350
351
|
:param str resource_name: The unique name of the resulting resource.
|
351
352
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
352
353
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
353
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
|
354
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
354
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: List of Okta groups to associate with this user
|
355
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
355
356
|
The value should not contain leading or trailing forward slashes.
|
356
357
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
357
358
|
*Available only for Vault Enterprise*.
|
358
|
-
:param pulumi.Input[str] path: The path where the Okta auth backend is mounted
|
359
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
|
360
|
-
:param pulumi.Input[str] username: Name of the user within Okta
|
359
|
+
:param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
|
360
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of Vault policies to associate with this user
|
361
|
+
:param pulumi.Input[builtins.str] username: Name of the user within Okta
|
361
362
|
"""
|
362
363
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
363
364
|
|
@@ -372,7 +373,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
372
373
|
|
373
374
|
@property
|
374
375
|
@pulumi.getter
|
375
|
-
def groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
376
|
+
def groups(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
376
377
|
"""
|
377
378
|
List of Okta groups to associate with this user
|
378
379
|
"""
|
@@ -380,7 +381,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
380
381
|
|
381
382
|
@property
|
382
383
|
@pulumi.getter
|
383
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
384
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
384
385
|
"""
|
385
386
|
The namespace to provision the resource in.
|
386
387
|
The value should not contain leading or trailing forward slashes.
|
@@ -391,7 +392,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
391
392
|
|
392
393
|
@property
|
393
394
|
@pulumi.getter
|
394
|
-
def path(self) -> pulumi.Output[str]:
|
395
|
+
def path(self) -> pulumi.Output[builtins.str]:
|
395
396
|
"""
|
396
397
|
The path where the Okta auth backend is mounted
|
397
398
|
"""
|
@@ -399,7 +400,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
399
400
|
|
400
401
|
@property
|
401
402
|
@pulumi.getter
|
402
|
-
def policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
403
|
+
def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
403
404
|
"""
|
404
405
|
List of Vault policies to associate with this user
|
405
406
|
"""
|
@@ -407,7 +408,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
407
408
|
|
408
409
|
@property
|
409
410
|
@pulumi.getter
|
410
|
-
def username(self) -> pulumi.Output[str]:
|
411
|
+
def username(self) -> pulumi.Output[builtins.str]:
|
411
412
|
"""
|
412
413
|
Name of the user within Okta
|
413
414
|
"""
|