pulumi-vault 7.1.0a1752118888__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0a1752118888.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,18 +19,18 @@ __all__ = ['EntityAliasArgs', 'EntityAlias']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class EntityAliasArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
canonical_id: pulumi.Input[
|
24
|
-
mount_accessor: pulumi.Input[
|
25
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
26
|
-
name: Optional[pulumi.Input[
|
27
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
canonical_id: pulumi.Input[_builtins.str],
|
23
|
+
mount_accessor: pulumi.Input[_builtins.str],
|
24
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
28
27
|
"""
|
29
28
|
The set of arguments for constructing a EntityAlias resource.
|
30
|
-
:param pulumi.Input[
|
31
|
-
:param pulumi.Input[
|
32
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
33
|
-
:param pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
29
|
+
:param pulumi.Input[_builtins.str] canonical_id: Entity ID to which this alias belongs to.
|
30
|
+
:param pulumi.Input[_builtins.str] mount_accessor: Accessor of the mount to which the alias should belong to.
|
31
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_metadata: Custom metadata to be associated with this alias.
|
32
|
+
:param pulumi.Input[_builtins.str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
|
33
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
35
34
|
The value should not contain leading or trailing forward slashes.
|
36
35
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
37
36
|
*Available only for Vault Enterprise*.
|
@@ -45,57 +44,57 @@ class EntityAliasArgs:
|
|
45
44
|
if namespace is not None:
|
46
45
|
pulumi.set(__self__, "namespace", namespace)
|
47
46
|
|
48
|
-
@property
|
47
|
+
@_builtins.property
|
49
48
|
@pulumi.getter(name="canonicalId")
|
50
|
-
def canonical_id(self) -> pulumi.Input[
|
49
|
+
def canonical_id(self) -> pulumi.Input[_builtins.str]:
|
51
50
|
"""
|
52
51
|
Entity ID to which this alias belongs to.
|
53
52
|
"""
|
54
53
|
return pulumi.get(self, "canonical_id")
|
55
54
|
|
56
55
|
@canonical_id.setter
|
57
|
-
def canonical_id(self, value: pulumi.Input[
|
56
|
+
def canonical_id(self, value: pulumi.Input[_builtins.str]):
|
58
57
|
pulumi.set(self, "canonical_id", value)
|
59
58
|
|
60
|
-
@property
|
59
|
+
@_builtins.property
|
61
60
|
@pulumi.getter(name="mountAccessor")
|
62
|
-
def mount_accessor(self) -> pulumi.Input[
|
61
|
+
def mount_accessor(self) -> pulumi.Input[_builtins.str]:
|
63
62
|
"""
|
64
63
|
Accessor of the mount to which the alias should belong to.
|
65
64
|
"""
|
66
65
|
return pulumi.get(self, "mount_accessor")
|
67
66
|
|
68
67
|
@mount_accessor.setter
|
69
|
-
def mount_accessor(self, value: pulumi.Input[
|
68
|
+
def mount_accessor(self, value: pulumi.Input[_builtins.str]):
|
70
69
|
pulumi.set(self, "mount_accessor", value)
|
71
70
|
|
72
|
-
@property
|
71
|
+
@_builtins.property
|
73
72
|
@pulumi.getter(name="customMetadata")
|
74
|
-
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
73
|
+
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
75
74
|
"""
|
76
75
|
Custom metadata to be associated with this alias.
|
77
76
|
"""
|
78
77
|
return pulumi.get(self, "custom_metadata")
|
79
78
|
|
80
79
|
@custom_metadata.setter
|
81
|
-
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
80
|
+
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
82
81
|
pulumi.set(self, "custom_metadata", value)
|
83
82
|
|
84
|
-
@property
|
83
|
+
@_builtins.property
|
85
84
|
@pulumi.getter
|
86
|
-
def name(self) -> Optional[pulumi.Input[
|
85
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
87
86
|
"""
|
88
87
|
Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
|
89
88
|
"""
|
90
89
|
return pulumi.get(self, "name")
|
91
90
|
|
92
91
|
@name.setter
|
93
|
-
def name(self, value: Optional[pulumi.Input[
|
92
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
94
93
|
pulumi.set(self, "name", value)
|
95
94
|
|
96
|
-
@property
|
95
|
+
@_builtins.property
|
97
96
|
@pulumi.getter
|
98
|
-
def namespace(self) -> Optional[pulumi.Input[
|
97
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
99
98
|
"""
|
100
99
|
The namespace to provision the resource in.
|
101
100
|
The value should not contain leading or trailing forward slashes.
|
@@ -105,25 +104,25 @@ class EntityAliasArgs:
|
|
105
104
|
return pulumi.get(self, "namespace")
|
106
105
|
|
107
106
|
@namespace.setter
|
108
|
-
def namespace(self, value: Optional[pulumi.Input[
|
107
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
109
108
|
pulumi.set(self, "namespace", value)
|
110
109
|
|
111
110
|
|
112
111
|
@pulumi.input_type
|
113
112
|
class _EntityAliasState:
|
114
113
|
def __init__(__self__, *,
|
115
|
-
canonical_id: Optional[pulumi.Input[
|
116
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
117
|
-
mount_accessor: Optional[pulumi.Input[
|
118
|
-
name: Optional[pulumi.Input[
|
119
|
-
namespace: Optional[pulumi.Input[
|
114
|
+
canonical_id: Optional[pulumi.Input[_builtins.str]] = None,
|
115
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
116
|
+
mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
117
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
118
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
120
119
|
"""
|
121
120
|
Input properties used for looking up and filtering EntityAlias resources.
|
122
|
-
:param pulumi.Input[
|
123
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
124
|
-
:param pulumi.Input[
|
125
|
-
:param pulumi.Input[
|
126
|
-
:param pulumi.Input[
|
121
|
+
:param pulumi.Input[_builtins.str] canonical_id: Entity ID to which this alias belongs to.
|
122
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_metadata: Custom metadata to be associated with this alias.
|
123
|
+
:param pulumi.Input[_builtins.str] mount_accessor: Accessor of the mount to which the alias should belong to.
|
124
|
+
:param pulumi.Input[_builtins.str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
|
125
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
127
126
|
The value should not contain leading or trailing forward slashes.
|
128
127
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
129
128
|
*Available only for Vault Enterprise*.
|
@@ -139,57 +138,57 @@ class _EntityAliasState:
|
|
139
138
|
if namespace is not None:
|
140
139
|
pulumi.set(__self__, "namespace", namespace)
|
141
140
|
|
142
|
-
@property
|
141
|
+
@_builtins.property
|
143
142
|
@pulumi.getter(name="canonicalId")
|
144
|
-
def canonical_id(self) -> Optional[pulumi.Input[
|
143
|
+
def canonical_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
145
144
|
"""
|
146
145
|
Entity ID to which this alias belongs to.
|
147
146
|
"""
|
148
147
|
return pulumi.get(self, "canonical_id")
|
149
148
|
|
150
149
|
@canonical_id.setter
|
151
|
-
def canonical_id(self, value: Optional[pulumi.Input[
|
150
|
+
def canonical_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
152
151
|
pulumi.set(self, "canonical_id", value)
|
153
152
|
|
154
|
-
@property
|
153
|
+
@_builtins.property
|
155
154
|
@pulumi.getter(name="customMetadata")
|
156
|
-
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
155
|
+
def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
157
156
|
"""
|
158
157
|
Custom metadata to be associated with this alias.
|
159
158
|
"""
|
160
159
|
return pulumi.get(self, "custom_metadata")
|
161
160
|
|
162
161
|
@custom_metadata.setter
|
163
|
-
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
162
|
+
def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
164
163
|
pulumi.set(self, "custom_metadata", value)
|
165
164
|
|
166
|
-
@property
|
165
|
+
@_builtins.property
|
167
166
|
@pulumi.getter(name="mountAccessor")
|
168
|
-
def mount_accessor(self) -> Optional[pulumi.Input[
|
167
|
+
def mount_accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
169
168
|
"""
|
170
169
|
Accessor of the mount to which the alias should belong to.
|
171
170
|
"""
|
172
171
|
return pulumi.get(self, "mount_accessor")
|
173
172
|
|
174
173
|
@mount_accessor.setter
|
175
|
-
def mount_accessor(self, value: Optional[pulumi.Input[
|
174
|
+
def mount_accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
176
175
|
pulumi.set(self, "mount_accessor", value)
|
177
176
|
|
178
|
-
@property
|
177
|
+
@_builtins.property
|
179
178
|
@pulumi.getter
|
180
|
-
def name(self) -> Optional[pulumi.Input[
|
179
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
181
180
|
"""
|
182
181
|
Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
|
183
182
|
"""
|
184
183
|
return pulumi.get(self, "name")
|
185
184
|
|
186
185
|
@name.setter
|
187
|
-
def name(self, value: Optional[pulumi.Input[
|
186
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
188
187
|
pulumi.set(self, "name", value)
|
189
188
|
|
190
|
-
@property
|
189
|
+
@_builtins.property
|
191
190
|
@pulumi.getter
|
192
|
-
def namespace(self) -> Optional[pulumi.Input[
|
191
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
193
192
|
"""
|
194
193
|
The namespace to provision the resource in.
|
195
194
|
The value should not contain leading or trailing forward slashes.
|
@@ -199,7 +198,7 @@ class _EntityAliasState:
|
|
199
198
|
return pulumi.get(self, "namespace")
|
200
199
|
|
201
200
|
@namespace.setter
|
202
|
-
def namespace(self, value: Optional[pulumi.Input[
|
201
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
203
202
|
pulumi.set(self, "namespace", value)
|
204
203
|
|
205
204
|
|
@@ -209,11 +208,11 @@ class EntityAlias(pulumi.CustomResource):
|
|
209
208
|
def __init__(__self__,
|
210
209
|
resource_name: str,
|
211
210
|
opts: Optional[pulumi.ResourceOptions] = None,
|
212
|
-
canonical_id: Optional[pulumi.Input[
|
213
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
214
|
-
mount_accessor: Optional[pulumi.Input[
|
215
|
-
name: Optional[pulumi.Input[
|
216
|
-
namespace: Optional[pulumi.Input[
|
211
|
+
canonical_id: Optional[pulumi.Input[_builtins.str]] = None,
|
212
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
213
|
+
mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
214
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
215
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
217
216
|
__props__=None):
|
218
217
|
"""
|
219
218
|
## Example Usage
|
@@ -238,11 +237,11 @@ class EntityAlias(pulumi.CustomResource):
|
|
238
237
|
|
239
238
|
:param str resource_name: The name of the resource.
|
240
239
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
241
|
-
:param pulumi.Input[
|
242
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
243
|
-
:param pulumi.Input[
|
244
|
-
:param pulumi.Input[
|
245
|
-
:param pulumi.Input[
|
240
|
+
:param pulumi.Input[_builtins.str] canonical_id: Entity ID to which this alias belongs to.
|
241
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_metadata: Custom metadata to be associated with this alias.
|
242
|
+
:param pulumi.Input[_builtins.str] mount_accessor: Accessor of the mount to which the alias should belong to.
|
243
|
+
:param pulumi.Input[_builtins.str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
|
244
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
246
245
|
The value should not contain leading or trailing forward slashes.
|
247
246
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
248
247
|
*Available only for Vault Enterprise*.
|
@@ -289,11 +288,11 @@ class EntityAlias(pulumi.CustomResource):
|
|
289
288
|
def _internal_init(__self__,
|
290
289
|
resource_name: str,
|
291
290
|
opts: Optional[pulumi.ResourceOptions] = None,
|
292
|
-
canonical_id: Optional[pulumi.Input[
|
293
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
294
|
-
mount_accessor: Optional[pulumi.Input[
|
295
|
-
name: Optional[pulumi.Input[
|
296
|
-
namespace: Optional[pulumi.Input[
|
291
|
+
canonical_id: Optional[pulumi.Input[_builtins.str]] = None,
|
292
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
293
|
+
mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
294
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
295
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
297
296
|
__props__=None):
|
298
297
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
299
298
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -322,11 +321,11 @@ class EntityAlias(pulumi.CustomResource):
|
|
322
321
|
def get(resource_name: str,
|
323
322
|
id: pulumi.Input[str],
|
324
323
|
opts: Optional[pulumi.ResourceOptions] = None,
|
325
|
-
canonical_id: Optional[pulumi.Input[
|
326
|
-
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
327
|
-
mount_accessor: Optional[pulumi.Input[
|
328
|
-
name: Optional[pulumi.Input[
|
329
|
-
namespace: Optional[pulumi.Input[
|
324
|
+
canonical_id: Optional[pulumi.Input[_builtins.str]] = None,
|
325
|
+
custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
326
|
+
mount_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
327
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
328
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'EntityAlias':
|
330
329
|
"""
|
331
330
|
Get an existing EntityAlias resource's state with the given name, id, and optional extra
|
332
331
|
properties used to qualify the lookup.
|
@@ -334,11 +333,11 @@ class EntityAlias(pulumi.CustomResource):
|
|
334
333
|
:param str resource_name: The unique name of the resulting resource.
|
335
334
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
336
335
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
337
|
-
:param pulumi.Input[
|
338
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
339
|
-
:param pulumi.Input[
|
340
|
-
:param pulumi.Input[
|
341
|
-
:param pulumi.Input[
|
336
|
+
:param pulumi.Input[_builtins.str] canonical_id: Entity ID to which this alias belongs to.
|
337
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_metadata: Custom metadata to be associated with this alias.
|
338
|
+
:param pulumi.Input[_builtins.str] mount_accessor: Accessor of the mount to which the alias should belong to.
|
339
|
+
:param pulumi.Input[_builtins.str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
|
340
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
342
341
|
The value should not contain leading or trailing forward slashes.
|
343
342
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
344
343
|
*Available only for Vault Enterprise*.
|
@@ -354,41 +353,41 @@ class EntityAlias(pulumi.CustomResource):
|
|
354
353
|
__props__.__dict__["namespace"] = namespace
|
355
354
|
return EntityAlias(resource_name, opts=opts, __props__=__props__)
|
356
355
|
|
357
|
-
@property
|
356
|
+
@_builtins.property
|
358
357
|
@pulumi.getter(name="canonicalId")
|
359
|
-
def canonical_id(self) -> pulumi.Output[
|
358
|
+
def canonical_id(self) -> pulumi.Output[_builtins.str]:
|
360
359
|
"""
|
361
360
|
Entity ID to which this alias belongs to.
|
362
361
|
"""
|
363
362
|
return pulumi.get(self, "canonical_id")
|
364
363
|
|
365
|
-
@property
|
364
|
+
@_builtins.property
|
366
365
|
@pulumi.getter(name="customMetadata")
|
367
|
-
def custom_metadata(self) -> pulumi.Output[Optional[Mapping[str,
|
366
|
+
def custom_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
368
367
|
"""
|
369
368
|
Custom metadata to be associated with this alias.
|
370
369
|
"""
|
371
370
|
return pulumi.get(self, "custom_metadata")
|
372
371
|
|
373
|
-
@property
|
372
|
+
@_builtins.property
|
374
373
|
@pulumi.getter(name="mountAccessor")
|
375
|
-
def mount_accessor(self) -> pulumi.Output[
|
374
|
+
def mount_accessor(self) -> pulumi.Output[_builtins.str]:
|
376
375
|
"""
|
377
376
|
Accessor of the mount to which the alias should belong to.
|
378
377
|
"""
|
379
378
|
return pulumi.get(self, "mount_accessor")
|
380
379
|
|
381
|
-
@property
|
380
|
+
@_builtins.property
|
382
381
|
@pulumi.getter
|
383
|
-
def name(self) -> pulumi.Output[
|
382
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
384
383
|
"""
|
385
384
|
Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
|
386
385
|
"""
|
387
386
|
return pulumi.get(self, "name")
|
388
387
|
|
389
|
-
@property
|
388
|
+
@_builtins.property
|
390
389
|
@pulumi.getter
|
391
|
-
def namespace(self) -> pulumi.Output[Optional[
|
390
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
392
391
|
"""
|
393
392
|
The namespace to provision the resource in.
|
394
393
|
The value should not contain leading or trailing forward slashes.
|