pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/github/user.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,20 +19,20 @@ __all__ = ['UserArgs', 'User']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class UserArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
user: pulumi.Input[
|
24
|
-
backend: Optional[pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
26
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
22
|
+
user: pulumi.Input[_builtins.str],
|
23
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a User resource.
|
29
|
-
:param pulumi.Input[
|
30
|
-
:param pulumi.Input[
|
28
|
+
:param pulumi.Input[_builtins.str] user: GitHub user name.
|
29
|
+
:param pulumi.Input[_builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
31
30
|
if not specified.
|
32
|
-
:param pulumi.Input[
|
31
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
33
32
|
The value should not contain leading or trailing forward slashes.
|
34
33
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
35
34
|
*Available only for Vault Enterprise*.
|
36
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
35
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: An array of strings specifying the policies to be set on tokens issued
|
37
36
|
using this role.
|
38
37
|
"""
|
39
38
|
pulumi.set(__self__, "user", user)
|
@@ -44,21 +43,21 @@ class UserArgs:
|
|
44
43
|
if policies is not None:
|
45
44
|
pulumi.set(__self__, "policies", policies)
|
46
45
|
|
47
|
-
@property
|
46
|
+
@_builtins.property
|
48
47
|
@pulumi.getter
|
49
|
-
def user(self) -> pulumi.Input[
|
48
|
+
def user(self) -> pulumi.Input[_builtins.str]:
|
50
49
|
"""
|
51
50
|
GitHub user name.
|
52
51
|
"""
|
53
52
|
return pulumi.get(self, "user")
|
54
53
|
|
55
54
|
@user.setter
|
56
|
-
def user(self, value: pulumi.Input[
|
55
|
+
def user(self, value: pulumi.Input[_builtins.str]):
|
57
56
|
pulumi.set(self, "user", value)
|
58
57
|
|
59
|
-
@property
|
58
|
+
@_builtins.property
|
60
59
|
@pulumi.getter
|
61
|
-
def backend(self) -> Optional[pulumi.Input[
|
60
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
62
61
|
"""
|
63
62
|
Path where the github auth backend is mounted. Defaults to `github`
|
64
63
|
if not specified.
|
@@ -66,12 +65,12 @@ class UserArgs:
|
|
66
65
|
return pulumi.get(self, "backend")
|
67
66
|
|
68
67
|
@backend.setter
|
69
|
-
def backend(self, value: Optional[pulumi.Input[
|
68
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
70
69
|
pulumi.set(self, "backend", value)
|
71
70
|
|
72
|
-
@property
|
71
|
+
@_builtins.property
|
73
72
|
@pulumi.getter
|
74
|
-
def namespace(self) -> Optional[pulumi.Input[
|
73
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
75
74
|
"""
|
76
75
|
The namespace to provision the resource in.
|
77
76
|
The value should not contain leading or trailing forward slashes.
|
@@ -81,12 +80,12 @@ class UserArgs:
|
|
81
80
|
return pulumi.get(self, "namespace")
|
82
81
|
|
83
82
|
@namespace.setter
|
84
|
-
def namespace(self, value: Optional[pulumi.Input[
|
83
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
85
84
|
pulumi.set(self, "namespace", value)
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter
|
89
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
88
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
90
89
|
"""
|
91
90
|
An array of strings specifying the policies to be set on tokens issued
|
92
91
|
using this role.
|
@@ -94,28 +93,28 @@ class UserArgs:
|
|
94
93
|
return pulumi.get(self, "policies")
|
95
94
|
|
96
95
|
@policies.setter
|
97
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
96
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
98
97
|
pulumi.set(self, "policies", value)
|
99
98
|
|
100
99
|
|
101
100
|
@pulumi.input_type
|
102
101
|
class _UserState:
|
103
102
|
def __init__(__self__, *,
|
104
|
-
backend: Optional[pulumi.Input[
|
105
|
-
namespace: Optional[pulumi.Input[
|
106
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
107
|
-
user: Optional[pulumi.Input[
|
103
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
104
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
105
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
106
|
+
user: Optional[pulumi.Input[_builtins.str]] = None):
|
108
107
|
"""
|
109
108
|
Input properties used for looking up and filtering User resources.
|
110
|
-
:param pulumi.Input[
|
109
|
+
:param pulumi.Input[_builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
111
110
|
if not specified.
|
112
|
-
:param pulumi.Input[
|
111
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
113
112
|
The value should not contain leading or trailing forward slashes.
|
114
113
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
115
114
|
*Available only for Vault Enterprise*.
|
116
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
115
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: An array of strings specifying the policies to be set on tokens issued
|
117
116
|
using this role.
|
118
|
-
:param pulumi.Input[
|
117
|
+
:param pulumi.Input[_builtins.str] user: GitHub user name.
|
119
118
|
"""
|
120
119
|
if backend is not None:
|
121
120
|
pulumi.set(__self__, "backend", backend)
|
@@ -126,9 +125,9 @@ class _UserState:
|
|
126
125
|
if user is not None:
|
127
126
|
pulumi.set(__self__, "user", user)
|
128
127
|
|
129
|
-
@property
|
128
|
+
@_builtins.property
|
130
129
|
@pulumi.getter
|
131
|
-
def backend(self) -> Optional[pulumi.Input[
|
130
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
132
131
|
"""
|
133
132
|
Path where the github auth backend is mounted. Defaults to `github`
|
134
133
|
if not specified.
|
@@ -136,12 +135,12 @@ class _UserState:
|
|
136
135
|
return pulumi.get(self, "backend")
|
137
136
|
|
138
137
|
@backend.setter
|
139
|
-
def backend(self, value: Optional[pulumi.Input[
|
138
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
140
139
|
pulumi.set(self, "backend", value)
|
141
140
|
|
142
|
-
@property
|
141
|
+
@_builtins.property
|
143
142
|
@pulumi.getter
|
144
|
-
def namespace(self) -> Optional[pulumi.Input[
|
143
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
145
144
|
"""
|
146
145
|
The namespace to provision the resource in.
|
147
146
|
The value should not contain leading or trailing forward slashes.
|
@@ -151,12 +150,12 @@ class _UserState:
|
|
151
150
|
return pulumi.get(self, "namespace")
|
152
151
|
|
153
152
|
@namespace.setter
|
154
|
-
def namespace(self, value: Optional[pulumi.Input[
|
153
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
155
154
|
pulumi.set(self, "namespace", value)
|
156
155
|
|
157
|
-
@property
|
156
|
+
@_builtins.property
|
158
157
|
@pulumi.getter
|
159
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
158
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
160
159
|
"""
|
161
160
|
An array of strings specifying the policies to be set on tokens issued
|
162
161
|
using this role.
|
@@ -164,19 +163,19 @@ class _UserState:
|
|
164
163
|
return pulumi.get(self, "policies")
|
165
164
|
|
166
165
|
@policies.setter
|
167
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
166
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
168
167
|
pulumi.set(self, "policies", value)
|
169
168
|
|
170
|
-
@property
|
169
|
+
@_builtins.property
|
171
170
|
@pulumi.getter
|
172
|
-
def user(self) -> Optional[pulumi.Input[
|
171
|
+
def user(self) -> Optional[pulumi.Input[_builtins.str]]:
|
173
172
|
"""
|
174
173
|
GitHub user name.
|
175
174
|
"""
|
176
175
|
return pulumi.get(self, "user")
|
177
176
|
|
178
177
|
@user.setter
|
179
|
-
def user(self, value: Optional[pulumi.Input[
|
178
|
+
def user(self, value: Optional[pulumi.Input[_builtins.str]]):
|
180
179
|
pulumi.set(self, "user", value)
|
181
180
|
|
182
181
|
|
@@ -186,10 +185,10 @@ class User(pulumi.CustomResource):
|
|
186
185
|
def __init__(__self__,
|
187
186
|
resource_name: str,
|
188
187
|
opts: Optional[pulumi.ResourceOptions] = None,
|
189
|
-
backend: Optional[pulumi.Input[
|
190
|
-
namespace: Optional[pulumi.Input[
|
191
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
192
|
-
user: Optional[pulumi.Input[
|
188
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
189
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
190
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
191
|
+
user: Optional[pulumi.Input[_builtins.str]] = None,
|
193
192
|
__props__=None):
|
194
193
|
"""
|
195
194
|
Manages policy mappings for Github Users authenticated via Github. See the [Vault
|
@@ -222,15 +221,15 @@ class User(pulumi.CustomResource):
|
|
222
221
|
|
223
222
|
:param str resource_name: The name of the resource.
|
224
223
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
225
|
-
:param pulumi.Input[
|
224
|
+
:param pulumi.Input[_builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
226
225
|
if not specified.
|
227
|
-
:param pulumi.Input[
|
226
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
228
227
|
The value should not contain leading or trailing forward slashes.
|
229
228
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
230
229
|
*Available only for Vault Enterprise*.
|
231
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
230
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: An array of strings specifying the policies to be set on tokens issued
|
232
231
|
using this role.
|
233
|
-
:param pulumi.Input[
|
232
|
+
:param pulumi.Input[_builtins.str] user: GitHub user name.
|
234
233
|
"""
|
235
234
|
...
|
236
235
|
@overload
|
@@ -282,10 +281,10 @@ class User(pulumi.CustomResource):
|
|
282
281
|
def _internal_init(__self__,
|
283
282
|
resource_name: str,
|
284
283
|
opts: Optional[pulumi.ResourceOptions] = None,
|
285
|
-
backend: Optional[pulumi.Input[
|
286
|
-
namespace: Optional[pulumi.Input[
|
287
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
288
|
-
user: Optional[pulumi.Input[
|
284
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
285
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
286
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
287
|
+
user: Optional[pulumi.Input[_builtins.str]] = None,
|
289
288
|
__props__=None):
|
290
289
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
291
290
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -311,10 +310,10 @@ class User(pulumi.CustomResource):
|
|
311
310
|
def get(resource_name: str,
|
312
311
|
id: pulumi.Input[str],
|
313
312
|
opts: Optional[pulumi.ResourceOptions] = None,
|
314
|
-
backend: Optional[pulumi.Input[
|
315
|
-
namespace: Optional[pulumi.Input[
|
316
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
317
|
-
user: Optional[pulumi.Input[
|
313
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
314
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
315
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
316
|
+
user: Optional[pulumi.Input[_builtins.str]] = None) -> 'User':
|
318
317
|
"""
|
319
318
|
Get an existing User resource's state with the given name, id, and optional extra
|
320
319
|
properties used to qualify the lookup.
|
@@ -322,15 +321,15 @@ class User(pulumi.CustomResource):
|
|
322
321
|
:param str resource_name: The unique name of the resulting resource.
|
323
322
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
324
323
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
325
|
-
:param pulumi.Input[
|
324
|
+
:param pulumi.Input[_builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
|
326
325
|
if not specified.
|
327
|
-
:param pulumi.Input[
|
326
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
328
327
|
The value should not contain leading or trailing forward slashes.
|
329
328
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
330
329
|
*Available only for Vault Enterprise*.
|
331
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
330
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: An array of strings specifying the policies to be set on tokens issued
|
332
331
|
using this role.
|
333
|
-
:param pulumi.Input[
|
332
|
+
:param pulumi.Input[_builtins.str] user: GitHub user name.
|
334
333
|
"""
|
335
334
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
336
335
|
|
@@ -342,18 +341,18 @@ class User(pulumi.CustomResource):
|
|
342
341
|
__props__.__dict__["user"] = user
|
343
342
|
return User(resource_name, opts=opts, __props__=__props__)
|
344
343
|
|
345
|
-
@property
|
344
|
+
@_builtins.property
|
346
345
|
@pulumi.getter
|
347
|
-
def backend(self) -> pulumi.Output[Optional[
|
346
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
348
347
|
"""
|
349
348
|
Path where the github auth backend is mounted. Defaults to `github`
|
350
349
|
if not specified.
|
351
350
|
"""
|
352
351
|
return pulumi.get(self, "backend")
|
353
352
|
|
354
|
-
@property
|
353
|
+
@_builtins.property
|
355
354
|
@pulumi.getter
|
356
|
-
def namespace(self) -> pulumi.Output[Optional[
|
355
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
357
356
|
"""
|
358
357
|
The namespace to provision the resource in.
|
359
358
|
The value should not contain leading or trailing forward slashes.
|
@@ -362,18 +361,18 @@ class User(pulumi.CustomResource):
|
|
362
361
|
"""
|
363
362
|
return pulumi.get(self, "namespace")
|
364
363
|
|
365
|
-
@property
|
364
|
+
@_builtins.property
|
366
365
|
@pulumi.getter
|
367
|
-
def policies(self) -> pulumi.Output[Optional[Sequence[
|
366
|
+
def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
368
367
|
"""
|
369
368
|
An array of strings specifying the policies to be set on tokens issued
|
370
369
|
using this role.
|
371
370
|
"""
|
372
371
|
return pulumi.get(self, "policies")
|
373
372
|
|
374
|
-
@property
|
373
|
+
@_builtins.property
|
375
374
|
@pulumi.getter
|
376
|
-
def user(self) -> pulumi.Output[
|
375
|
+
def user(self) -> pulumi.Output[_builtins.str]:
|
377
376
|
"""
|
378
377
|
GitHub user name.
|
379
378
|
"""
|
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|