pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,21 +19,21 @@ __all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendUserInitArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
path: pulumi.Input[
|
24
|
-
username: pulumi.Input[
|
25
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
27
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
22
|
+
path: pulumi.Input[_builtins.str],
|
23
|
+
username: pulumi.Input[_builtins.str],
|
24
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
28
27
|
"""
|
29
28
|
The set of arguments for constructing a AuthBackendUser resource.
|
30
|
-
:param pulumi.Input[
|
31
|
-
:param pulumi.Input[
|
32
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
33
|
-
:param pulumi.Input[
|
29
|
+
:param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
|
30
|
+
:param pulumi.Input[_builtins.str] username: Name of the user within Okta
|
31
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: List of Okta groups to associate with this user
|
32
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
34
33
|
The value should not contain leading or trailing forward slashes.
|
35
34
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
36
35
|
*Available only for Vault Enterprise*.
|
37
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
36
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of Vault policies to associate with this user
|
38
37
|
"""
|
39
38
|
pulumi.set(__self__, "path", path)
|
40
39
|
pulumi.set(__self__, "username", username)
|
@@ -45,45 +44,45 @@ class AuthBackendUserInitArgs:
|
|
45
44
|
if policies is not None:
|
46
45
|
pulumi.set(__self__, "policies", policies)
|
47
46
|
|
48
|
-
@property
|
47
|
+
@_builtins.property
|
49
48
|
@pulumi.getter
|
50
|
-
def path(self) -> pulumi.Input[
|
49
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
51
50
|
"""
|
52
51
|
The path where the Okta auth backend is mounted
|
53
52
|
"""
|
54
53
|
return pulumi.get(self, "path")
|
55
54
|
|
56
55
|
@path.setter
|
57
|
-
def path(self, value: pulumi.Input[
|
56
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
58
57
|
pulumi.set(self, "path", value)
|
59
58
|
|
60
|
-
@property
|
59
|
+
@_builtins.property
|
61
60
|
@pulumi.getter
|
62
|
-
def username(self) -> pulumi.Input[
|
61
|
+
def username(self) -> pulumi.Input[_builtins.str]:
|
63
62
|
"""
|
64
63
|
Name of the user within Okta
|
65
64
|
"""
|
66
65
|
return pulumi.get(self, "username")
|
67
66
|
|
68
67
|
@username.setter
|
69
|
-
def username(self, value: pulumi.Input[
|
68
|
+
def username(self, value: pulumi.Input[_builtins.str]):
|
70
69
|
pulumi.set(self, "username", value)
|
71
70
|
|
72
|
-
@property
|
71
|
+
@_builtins.property
|
73
72
|
@pulumi.getter
|
74
|
-
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
73
|
+
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
75
74
|
"""
|
76
75
|
List of Okta groups to associate with this user
|
77
76
|
"""
|
78
77
|
return pulumi.get(self, "groups")
|
79
78
|
|
80
79
|
@groups.setter
|
81
|
-
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
80
|
+
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
82
81
|
pulumi.set(self, "groups", value)
|
83
82
|
|
84
|
-
@property
|
83
|
+
@_builtins.property
|
85
84
|
@pulumi.getter
|
86
|
-
def namespace(self) -> Optional[pulumi.Input[
|
85
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
87
86
|
"""
|
88
87
|
The namespace to provision the resource in.
|
89
88
|
The value should not contain leading or trailing forward slashes.
|
@@ -93,40 +92,40 @@ class AuthBackendUserInitArgs:
|
|
93
92
|
return pulumi.get(self, "namespace")
|
94
93
|
|
95
94
|
@namespace.setter
|
96
|
-
def namespace(self, value: Optional[pulumi.Input[
|
95
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
97
96
|
pulumi.set(self, "namespace", value)
|
98
97
|
|
99
|
-
@property
|
98
|
+
@_builtins.property
|
100
99
|
@pulumi.getter
|
101
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
100
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
102
101
|
"""
|
103
102
|
List of Vault policies to associate with this user
|
104
103
|
"""
|
105
104
|
return pulumi.get(self, "policies")
|
106
105
|
|
107
106
|
@policies.setter
|
108
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
107
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
109
108
|
pulumi.set(self, "policies", value)
|
110
109
|
|
111
110
|
|
112
111
|
@pulumi.input_type
|
113
112
|
class _AuthBackendUserState:
|
114
113
|
def __init__(__self__, *,
|
115
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
116
|
-
namespace: Optional[pulumi.Input[
|
117
|
-
path: Optional[pulumi.Input[
|
118
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
119
|
-
username: Optional[pulumi.Input[
|
114
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
115
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
116
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
117
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
118
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
120
119
|
"""
|
121
120
|
Input properties used for looking up and filtering AuthBackendUser resources.
|
122
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
123
|
-
:param pulumi.Input[
|
121
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: List of Okta groups to associate with this user
|
122
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
124
123
|
The value should not contain leading or trailing forward slashes.
|
125
124
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
126
125
|
*Available only for Vault Enterprise*.
|
127
|
-
:param pulumi.Input[
|
128
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
129
|
-
:param pulumi.Input[
|
126
|
+
:param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
|
127
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of Vault policies to associate with this user
|
128
|
+
:param pulumi.Input[_builtins.str] username: Name of the user within Okta
|
130
129
|
"""
|
131
130
|
if groups is not None:
|
132
131
|
pulumi.set(__self__, "groups", groups)
|
@@ -139,21 +138,21 @@ class _AuthBackendUserState:
|
|
139
138
|
if username is not None:
|
140
139
|
pulumi.set(__self__, "username", username)
|
141
140
|
|
142
|
-
@property
|
141
|
+
@_builtins.property
|
143
142
|
@pulumi.getter
|
144
|
-
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
143
|
+
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
145
144
|
"""
|
146
145
|
List of Okta groups to associate with this user
|
147
146
|
"""
|
148
147
|
return pulumi.get(self, "groups")
|
149
148
|
|
150
149
|
@groups.setter
|
151
|
-
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
150
|
+
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
152
151
|
pulumi.set(self, "groups", value)
|
153
152
|
|
154
|
-
@property
|
153
|
+
@_builtins.property
|
155
154
|
@pulumi.getter
|
156
|
-
def namespace(self) -> Optional[pulumi.Input[
|
155
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
157
156
|
"""
|
158
157
|
The namespace to provision the resource in.
|
159
158
|
The value should not contain leading or trailing forward slashes.
|
@@ -163,43 +162,43 @@ class _AuthBackendUserState:
|
|
163
162
|
return pulumi.get(self, "namespace")
|
164
163
|
|
165
164
|
@namespace.setter
|
166
|
-
def namespace(self, value: Optional[pulumi.Input[
|
165
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
167
166
|
pulumi.set(self, "namespace", value)
|
168
167
|
|
169
|
-
@property
|
168
|
+
@_builtins.property
|
170
169
|
@pulumi.getter
|
171
|
-
def path(self) -> Optional[pulumi.Input[
|
170
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
172
171
|
"""
|
173
172
|
The path where the Okta auth backend is mounted
|
174
173
|
"""
|
175
174
|
return pulumi.get(self, "path")
|
176
175
|
|
177
176
|
@path.setter
|
178
|
-
def path(self, value: Optional[pulumi.Input[
|
177
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
179
178
|
pulumi.set(self, "path", value)
|
180
179
|
|
181
|
-
@property
|
180
|
+
@_builtins.property
|
182
181
|
@pulumi.getter
|
183
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
182
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
184
183
|
"""
|
185
184
|
List of Vault policies to associate with this user
|
186
185
|
"""
|
187
186
|
return pulumi.get(self, "policies")
|
188
187
|
|
189
188
|
@policies.setter
|
190
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
189
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
191
190
|
pulumi.set(self, "policies", value)
|
192
191
|
|
193
|
-
@property
|
192
|
+
@_builtins.property
|
194
193
|
@pulumi.getter
|
195
|
-
def username(self) -> Optional[pulumi.Input[
|
194
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
196
195
|
"""
|
197
196
|
Name of the user within Okta
|
198
197
|
"""
|
199
198
|
return pulumi.get(self, "username")
|
200
199
|
|
201
200
|
@username.setter
|
202
|
-
def username(self, value: Optional[pulumi.Input[
|
201
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
203
202
|
pulumi.set(self, "username", value)
|
204
203
|
|
205
204
|
|
@@ -209,11 +208,11 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
209
208
|
def __init__(__self__,
|
210
209
|
resource_name: str,
|
211
210
|
opts: Optional[pulumi.ResourceOptions] = None,
|
212
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
213
|
-
namespace: Optional[pulumi.Input[
|
214
|
-
path: Optional[pulumi.Input[
|
215
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
216
|
-
username: Optional[pulumi.Input[
|
211
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
212
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
213
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
214
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
215
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
217
216
|
__props__=None):
|
218
217
|
"""
|
219
218
|
Provides a resource to create a user in an
|
@@ -247,14 +246,14 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
247
246
|
|
248
247
|
:param str resource_name: The name of the resource.
|
249
248
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
250
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
251
|
-
:param pulumi.Input[
|
249
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: List of Okta groups to associate with this user
|
250
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
252
251
|
The value should not contain leading or trailing forward slashes.
|
253
252
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
254
253
|
*Available only for Vault Enterprise*.
|
255
|
-
:param pulumi.Input[
|
256
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
257
|
-
:param pulumi.Input[
|
254
|
+
:param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
|
255
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of Vault policies to associate with this user
|
256
|
+
:param pulumi.Input[_builtins.str] username: Name of the user within Okta
|
258
257
|
"""
|
259
258
|
...
|
260
259
|
@overload
|
@@ -307,11 +306,11 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
307
306
|
def _internal_init(__self__,
|
308
307
|
resource_name: str,
|
309
308
|
opts: Optional[pulumi.ResourceOptions] = None,
|
310
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
311
|
-
namespace: Optional[pulumi.Input[
|
312
|
-
path: Optional[pulumi.Input[
|
313
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
314
|
-
username: Optional[pulumi.Input[
|
309
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
310
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
311
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
312
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
313
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
315
314
|
__props__=None):
|
316
315
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
317
316
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -340,11 +339,11 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
340
339
|
def get(resource_name: str,
|
341
340
|
id: pulumi.Input[str],
|
342
341
|
opts: Optional[pulumi.ResourceOptions] = None,
|
343
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
344
|
-
namespace: Optional[pulumi.Input[
|
345
|
-
path: Optional[pulumi.Input[
|
346
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
347
|
-
username: Optional[pulumi.Input[
|
342
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
343
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
344
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
345
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
346
|
+
username: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendUser':
|
348
347
|
"""
|
349
348
|
Get an existing AuthBackendUser resource's state with the given name, id, and optional extra
|
350
349
|
properties used to qualify the lookup.
|
@@ -352,14 +351,14 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
352
351
|
:param str resource_name: The unique name of the resulting resource.
|
353
352
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
354
353
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
355
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
356
|
-
:param pulumi.Input[
|
354
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: List of Okta groups to associate with this user
|
355
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
357
356
|
The value should not contain leading or trailing forward slashes.
|
358
357
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
359
358
|
*Available only for Vault Enterprise*.
|
360
|
-
:param pulumi.Input[
|
361
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
362
|
-
:param pulumi.Input[
|
359
|
+
:param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
|
360
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of Vault policies to associate with this user
|
361
|
+
:param pulumi.Input[_builtins.str] username: Name of the user within Okta
|
363
362
|
"""
|
364
363
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
365
364
|
|
@@ -372,17 +371,17 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
372
371
|
__props__.__dict__["username"] = username
|
373
372
|
return AuthBackendUser(resource_name, opts=opts, __props__=__props__)
|
374
373
|
|
375
|
-
@property
|
374
|
+
@_builtins.property
|
376
375
|
@pulumi.getter
|
377
|
-
def groups(self) -> pulumi.Output[Optional[Sequence[
|
376
|
+
def groups(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
378
377
|
"""
|
379
378
|
List of Okta groups to associate with this user
|
380
379
|
"""
|
381
380
|
return pulumi.get(self, "groups")
|
382
381
|
|
383
|
-
@property
|
382
|
+
@_builtins.property
|
384
383
|
@pulumi.getter
|
385
|
-
def namespace(self) -> pulumi.Output[Optional[
|
384
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
386
385
|
"""
|
387
386
|
The namespace to provision the resource in.
|
388
387
|
The value should not contain leading or trailing forward slashes.
|
@@ -391,25 +390,25 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
391
390
|
"""
|
392
391
|
return pulumi.get(self, "namespace")
|
393
392
|
|
394
|
-
@property
|
393
|
+
@_builtins.property
|
395
394
|
@pulumi.getter
|
396
|
-
def path(self) -> pulumi.Output[
|
395
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
397
396
|
"""
|
398
397
|
The path where the Okta auth backend is mounted
|
399
398
|
"""
|
400
399
|
return pulumi.get(self, "path")
|
401
400
|
|
402
|
-
@property
|
401
|
+
@_builtins.property
|
403
402
|
@pulumi.getter
|
404
|
-
def policies(self) -> pulumi.Output[Optional[Sequence[
|
403
|
+
def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
405
404
|
"""
|
406
405
|
List of Vault policies to associate with this user
|
407
406
|
"""
|
408
407
|
return pulumi.get(self, "policies")
|
409
408
|
|
410
|
-
@property
|
409
|
+
@_builtins.property
|
411
410
|
@pulumi.getter
|
412
|
-
def username(self) -> pulumi.Output[
|
411
|
+
def username(self) -> pulumi.Output[_builtins.str]:
|
413
412
|
"""
|
414
413
|
Name of the user within Okta
|
415
414
|
"""
|
pulumi_vault/okta/outputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -40,26 +39,26 @@ class AuthBackendGroup(dict):
|
|
40
39
|
return super().get(key, default)
|
41
40
|
|
42
41
|
def __init__(__self__, *,
|
43
|
-
group_name:
|
44
|
-
policies: Sequence[
|
42
|
+
group_name: _builtins.str,
|
43
|
+
policies: Sequence[_builtins.str]):
|
45
44
|
"""
|
46
|
-
:param
|
47
|
-
:param Sequence[
|
45
|
+
:param _builtins.str group_name: Name of the Okta group
|
46
|
+
:param Sequence[_builtins.str] policies: Policies to associate with this group
|
48
47
|
"""
|
49
48
|
pulumi.set(__self__, "group_name", group_name)
|
50
49
|
pulumi.set(__self__, "policies", policies)
|
51
50
|
|
52
|
-
@property
|
51
|
+
@_builtins.property
|
53
52
|
@pulumi.getter(name="groupName")
|
54
|
-
def group_name(self) ->
|
53
|
+
def group_name(self) -> _builtins.str:
|
55
54
|
"""
|
56
55
|
Name of the Okta group
|
57
56
|
"""
|
58
57
|
return pulumi.get(self, "group_name")
|
59
58
|
|
60
|
-
@property
|
59
|
+
@_builtins.property
|
61
60
|
@pulumi.getter
|
62
|
-
def policies(self) -> Sequence[
|
61
|
+
def policies(self) -> Sequence[_builtins.str]:
|
63
62
|
"""
|
64
63
|
Policies to associate with this group
|
65
64
|
"""
|
@@ -69,13 +68,13 @@ class AuthBackendGroup(dict):
|
|
69
68
|
@pulumi.output_type
|
70
69
|
class AuthBackendUser(dict):
|
71
70
|
def __init__(__self__, *,
|
72
|
-
username:
|
73
|
-
groups: Optional[Sequence[
|
74
|
-
policies: Optional[Sequence[
|
71
|
+
username: _builtins.str,
|
72
|
+
groups: Optional[Sequence[_builtins.str]] = None,
|
73
|
+
policies: Optional[Sequence[_builtins.str]] = None):
|
75
74
|
"""
|
76
|
-
:param
|
77
|
-
:param Sequence[
|
78
|
-
:param Sequence[
|
75
|
+
:param _builtins.str username: Name of the user within Okta
|
76
|
+
:param Sequence[_builtins.str] groups: Groups within the Okta auth backend to associate with this user
|
77
|
+
:param Sequence[_builtins.str] policies: Policies to associate with this user
|
79
78
|
"""
|
80
79
|
pulumi.set(__self__, "username", username)
|
81
80
|
if groups is not None:
|
@@ -83,25 +82,25 @@ class AuthBackendUser(dict):
|
|
83
82
|
if policies is not None:
|
84
83
|
pulumi.set(__self__, "policies", policies)
|
85
84
|
|
86
|
-
@property
|
85
|
+
@_builtins.property
|
87
86
|
@pulumi.getter
|
88
|
-
def username(self) ->
|
87
|
+
def username(self) -> _builtins.str:
|
89
88
|
"""
|
90
89
|
Name of the user within Okta
|
91
90
|
"""
|
92
91
|
return pulumi.get(self, "username")
|
93
92
|
|
94
|
-
@property
|
93
|
+
@_builtins.property
|
95
94
|
@pulumi.getter
|
96
|
-
def groups(self) -> Optional[Sequence[
|
95
|
+
def groups(self) -> Optional[Sequence[_builtins.str]]:
|
97
96
|
"""
|
98
97
|
Groups within the Okta auth backend to associate with this user
|
99
98
|
"""
|
100
99
|
return pulumi.get(self, "groups")
|
101
100
|
|
102
|
-
@property
|
101
|
+
@_builtins.property
|
103
102
|
@pulumi.getter
|
104
|
-
def policies(self) -> Optional[Sequence[
|
103
|
+
def policies(self) -> Optional[Sequence[_builtins.str]]:
|
105
104
|
"""
|
106
105
|
Policies to associate with this user
|
107
106
|
"""
|