pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,20 +19,20 @@ __all__ = ['GroupPoliciesArgs', 'GroupPolicies']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class GroupPoliciesArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
group_id: pulumi.Input[
|
24
|
-
policies: pulumi.Input[Sequence[pulumi.Input[
|
25
|
-
exclusive: Optional[pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
group_id: pulumi.Input[_builtins.str],
|
23
|
+
policies: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
24
|
+
exclusive: Optional[pulumi.Input[_builtins.bool]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a GroupPolicies resource.
|
29
|
-
:param pulumi.Input[
|
30
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
31
|
-
:param pulumi.Input[
|
28
|
+
:param pulumi.Input[_builtins.str] group_id: Group ID to assign policies to.
|
29
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies to assign to the group
|
30
|
+
:param pulumi.Input[_builtins.bool] exclusive: Defaults to `true`.
|
32
31
|
|
33
32
|
If `true`, this resource will take exclusive control of the policies assigned to the group and will set it equal to what is specified in the resource.
|
34
33
|
|
35
34
|
If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the group. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
|
36
|
-
:param pulumi.Input[
|
35
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
37
36
|
The value should not contain leading or trailing forward slashes.
|
38
37
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
39
38
|
*Available only for Vault Enterprise*.
|
@@ -45,33 +44,33 @@ class GroupPoliciesArgs:
|
|
45
44
|
if namespace is not None:
|
46
45
|
pulumi.set(__self__, "namespace", namespace)
|
47
46
|
|
48
|
-
@property
|
47
|
+
@_builtins.property
|
49
48
|
@pulumi.getter(name="groupId")
|
50
|
-
def group_id(self) -> pulumi.Input[
|
49
|
+
def group_id(self) -> pulumi.Input[_builtins.str]:
|
51
50
|
"""
|
52
51
|
Group ID to assign policies to.
|
53
52
|
"""
|
54
53
|
return pulumi.get(self, "group_id")
|
55
54
|
|
56
55
|
@group_id.setter
|
57
|
-
def group_id(self, value: pulumi.Input[
|
56
|
+
def group_id(self, value: pulumi.Input[_builtins.str]):
|
58
57
|
pulumi.set(self, "group_id", value)
|
59
58
|
|
60
|
-
@property
|
59
|
+
@_builtins.property
|
61
60
|
@pulumi.getter
|
62
|
-
def policies(self) -> pulumi.Input[Sequence[pulumi.Input[
|
61
|
+
def policies(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
63
62
|
"""
|
64
63
|
List of policies to assign to the group
|
65
64
|
"""
|
66
65
|
return pulumi.get(self, "policies")
|
67
66
|
|
68
67
|
@policies.setter
|
69
|
-
def policies(self, value: pulumi.Input[Sequence[pulumi.Input[
|
68
|
+
def policies(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
70
69
|
pulumi.set(self, "policies", value)
|
71
70
|
|
72
|
-
@property
|
71
|
+
@_builtins.property
|
73
72
|
@pulumi.getter
|
74
|
-
def exclusive(self) -> Optional[pulumi.Input[
|
73
|
+
def exclusive(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
75
74
|
"""
|
76
75
|
Defaults to `true`.
|
77
76
|
|
@@ -82,12 +81,12 @@ class GroupPoliciesArgs:
|
|
82
81
|
return pulumi.get(self, "exclusive")
|
83
82
|
|
84
83
|
@exclusive.setter
|
85
|
-
def exclusive(self, value: Optional[pulumi.Input[
|
84
|
+
def exclusive(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
86
85
|
pulumi.set(self, "exclusive", value)
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter
|
90
|
-
def namespace(self) -> Optional[pulumi.Input[
|
89
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
91
90
|
"""
|
92
91
|
The namespace to provision the resource in.
|
93
92
|
The value should not contain leading or trailing forward slashes.
|
@@ -97,32 +96,32 @@ class GroupPoliciesArgs:
|
|
97
96
|
return pulumi.get(self, "namespace")
|
98
97
|
|
99
98
|
@namespace.setter
|
100
|
-
def namespace(self, value: Optional[pulumi.Input[
|
99
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
101
100
|
pulumi.set(self, "namespace", value)
|
102
101
|
|
103
102
|
|
104
103
|
@pulumi.input_type
|
105
104
|
class _GroupPoliciesState:
|
106
105
|
def __init__(__self__, *,
|
107
|
-
exclusive: Optional[pulumi.Input[
|
108
|
-
group_id: Optional[pulumi.Input[
|
109
|
-
group_name: Optional[pulumi.Input[
|
110
|
-
namespace: Optional[pulumi.Input[
|
111
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
106
|
+
exclusive: Optional[pulumi.Input[_builtins.bool]] = None,
|
107
|
+
group_id: Optional[pulumi.Input[_builtins.str]] = None,
|
108
|
+
group_name: Optional[pulumi.Input[_builtins.str]] = None,
|
109
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
110
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
112
111
|
"""
|
113
112
|
Input properties used for looking up and filtering GroupPolicies resources.
|
114
|
-
:param pulumi.Input[
|
113
|
+
:param pulumi.Input[_builtins.bool] exclusive: Defaults to `true`.
|
115
114
|
|
116
115
|
If `true`, this resource will take exclusive control of the policies assigned to the group and will set it equal to what is specified in the resource.
|
117
116
|
|
118
117
|
If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the group. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
|
119
|
-
:param pulumi.Input[
|
120
|
-
:param pulumi.Input[
|
121
|
-
:param pulumi.Input[
|
118
|
+
:param pulumi.Input[_builtins.str] group_id: Group ID to assign policies to.
|
119
|
+
:param pulumi.Input[_builtins.str] group_name: The name of the group that are assigned the policies.
|
120
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
122
121
|
The value should not contain leading or trailing forward slashes.
|
123
122
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
124
123
|
*Available only for Vault Enterprise*.
|
125
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
124
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies to assign to the group
|
126
125
|
"""
|
127
126
|
if exclusive is not None:
|
128
127
|
pulumi.set(__self__, "exclusive", exclusive)
|
@@ -135,9 +134,9 @@ class _GroupPoliciesState:
|
|
135
134
|
if policies is not None:
|
136
135
|
pulumi.set(__self__, "policies", policies)
|
137
136
|
|
138
|
-
@property
|
137
|
+
@_builtins.property
|
139
138
|
@pulumi.getter
|
140
|
-
def exclusive(self) -> Optional[pulumi.Input[
|
139
|
+
def exclusive(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
141
140
|
"""
|
142
141
|
Defaults to `true`.
|
143
142
|
|
@@ -148,36 +147,36 @@ class _GroupPoliciesState:
|
|
148
147
|
return pulumi.get(self, "exclusive")
|
149
148
|
|
150
149
|
@exclusive.setter
|
151
|
-
def exclusive(self, value: Optional[pulumi.Input[
|
150
|
+
def exclusive(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
152
151
|
pulumi.set(self, "exclusive", value)
|
153
152
|
|
154
|
-
@property
|
153
|
+
@_builtins.property
|
155
154
|
@pulumi.getter(name="groupId")
|
156
|
-
def group_id(self) -> Optional[pulumi.Input[
|
155
|
+
def group_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
157
156
|
"""
|
158
157
|
Group ID to assign policies to.
|
159
158
|
"""
|
160
159
|
return pulumi.get(self, "group_id")
|
161
160
|
|
162
161
|
@group_id.setter
|
163
|
-
def group_id(self, value: Optional[pulumi.Input[
|
162
|
+
def group_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
164
163
|
pulumi.set(self, "group_id", value)
|
165
164
|
|
166
|
-
@property
|
165
|
+
@_builtins.property
|
167
166
|
@pulumi.getter(name="groupName")
|
168
|
-
def group_name(self) -> Optional[pulumi.Input[
|
167
|
+
def group_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
169
168
|
"""
|
170
169
|
The name of the group that are assigned the policies.
|
171
170
|
"""
|
172
171
|
return pulumi.get(self, "group_name")
|
173
172
|
|
174
173
|
@group_name.setter
|
175
|
-
def group_name(self, value: Optional[pulumi.Input[
|
174
|
+
def group_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
176
175
|
pulumi.set(self, "group_name", value)
|
177
176
|
|
178
|
-
@property
|
177
|
+
@_builtins.property
|
179
178
|
@pulumi.getter
|
180
|
-
def namespace(self) -> Optional[pulumi.Input[
|
179
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
181
180
|
"""
|
182
181
|
The namespace to provision the resource in.
|
183
182
|
The value should not contain leading or trailing forward slashes.
|
@@ -187,19 +186,19 @@ class _GroupPoliciesState:
|
|
187
186
|
return pulumi.get(self, "namespace")
|
188
187
|
|
189
188
|
@namespace.setter
|
190
|
-
def namespace(self, value: Optional[pulumi.Input[
|
189
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
191
190
|
pulumi.set(self, "namespace", value)
|
192
191
|
|
193
|
-
@property
|
192
|
+
@_builtins.property
|
194
193
|
@pulumi.getter
|
195
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
194
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
196
195
|
"""
|
197
196
|
List of policies to assign to the group
|
198
197
|
"""
|
199
198
|
return pulumi.get(self, "policies")
|
200
199
|
|
201
200
|
@policies.setter
|
202
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
201
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
203
202
|
pulumi.set(self, "policies", value)
|
204
203
|
|
205
204
|
|
@@ -209,10 +208,10 @@ class GroupPolicies(pulumi.CustomResource):
|
|
209
208
|
def __init__(__self__,
|
210
209
|
resource_name: str,
|
211
210
|
opts: Optional[pulumi.ResourceOptions] = None,
|
212
|
-
exclusive: Optional[pulumi.Input[
|
213
|
-
group_id: Optional[pulumi.Input[
|
214
|
-
namespace: Optional[pulumi.Input[
|
215
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
211
|
+
exclusive: Optional[pulumi.Input[_builtins.bool]] = None,
|
212
|
+
group_id: Optional[pulumi.Input[_builtins.str]] = None,
|
213
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
214
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
216
215
|
__props__=None):
|
217
216
|
"""
|
218
217
|
Manages policies for an Identity Group for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
|
@@ -269,17 +268,17 @@ class GroupPolicies(pulumi.CustomResource):
|
|
269
268
|
|
270
269
|
:param str resource_name: The name of the resource.
|
271
270
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
272
|
-
:param pulumi.Input[
|
271
|
+
:param pulumi.Input[_builtins.bool] exclusive: Defaults to `true`.
|
273
272
|
|
274
273
|
If `true`, this resource will take exclusive control of the policies assigned to the group and will set it equal to what is specified in the resource.
|
275
274
|
|
276
275
|
If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the group. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
|
277
|
-
:param pulumi.Input[
|
278
|
-
:param pulumi.Input[
|
276
|
+
:param pulumi.Input[_builtins.str] group_id: Group ID to assign policies to.
|
277
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
279
278
|
The value should not contain leading or trailing forward slashes.
|
280
279
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
281
280
|
*Available only for Vault Enterprise*.
|
282
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
281
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies to assign to the group
|
283
282
|
"""
|
284
283
|
...
|
285
284
|
@overload
|
@@ -355,10 +354,10 @@ class GroupPolicies(pulumi.CustomResource):
|
|
355
354
|
def _internal_init(__self__,
|
356
355
|
resource_name: str,
|
357
356
|
opts: Optional[pulumi.ResourceOptions] = None,
|
358
|
-
exclusive: Optional[pulumi.Input[
|
359
|
-
group_id: Optional[pulumi.Input[
|
360
|
-
namespace: Optional[pulumi.Input[
|
361
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
357
|
+
exclusive: Optional[pulumi.Input[_builtins.bool]] = None,
|
358
|
+
group_id: Optional[pulumi.Input[_builtins.str]] = None,
|
359
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
360
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
362
361
|
__props__=None):
|
363
362
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
364
363
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -387,11 +386,11 @@ class GroupPolicies(pulumi.CustomResource):
|
|
387
386
|
def get(resource_name: str,
|
388
387
|
id: pulumi.Input[str],
|
389
388
|
opts: Optional[pulumi.ResourceOptions] = None,
|
390
|
-
exclusive: Optional[pulumi.Input[
|
391
|
-
group_id: Optional[pulumi.Input[
|
392
|
-
group_name: Optional[pulumi.Input[
|
393
|
-
namespace: Optional[pulumi.Input[
|
394
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
389
|
+
exclusive: Optional[pulumi.Input[_builtins.bool]] = None,
|
390
|
+
group_id: Optional[pulumi.Input[_builtins.str]] = None,
|
391
|
+
group_name: Optional[pulumi.Input[_builtins.str]] = None,
|
392
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
393
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'GroupPolicies':
|
395
394
|
"""
|
396
395
|
Get an existing GroupPolicies resource's state with the given name, id, and optional extra
|
397
396
|
properties used to qualify the lookup.
|
@@ -399,18 +398,18 @@ class GroupPolicies(pulumi.CustomResource):
|
|
399
398
|
:param str resource_name: The unique name of the resulting resource.
|
400
399
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
401
400
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
402
|
-
:param pulumi.Input[
|
401
|
+
:param pulumi.Input[_builtins.bool] exclusive: Defaults to `true`.
|
403
402
|
|
404
403
|
If `true`, this resource will take exclusive control of the policies assigned to the group and will set it equal to what is specified in the resource.
|
405
404
|
|
406
405
|
If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the group. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
|
407
|
-
:param pulumi.Input[
|
408
|
-
:param pulumi.Input[
|
409
|
-
:param pulumi.Input[
|
406
|
+
:param pulumi.Input[_builtins.str] group_id: Group ID to assign policies to.
|
407
|
+
:param pulumi.Input[_builtins.str] group_name: The name of the group that are assigned the policies.
|
408
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
410
409
|
The value should not contain leading or trailing forward slashes.
|
411
410
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
412
411
|
*Available only for Vault Enterprise*.
|
413
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
412
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies to assign to the group
|
414
413
|
"""
|
415
414
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
416
415
|
|
@@ -423,9 +422,9 @@ class GroupPolicies(pulumi.CustomResource):
|
|
423
422
|
__props__.__dict__["policies"] = policies
|
424
423
|
return GroupPolicies(resource_name, opts=opts, __props__=__props__)
|
425
424
|
|
426
|
-
@property
|
425
|
+
@_builtins.property
|
427
426
|
@pulumi.getter
|
428
|
-
def exclusive(self) -> pulumi.Output[Optional[
|
427
|
+
def exclusive(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
429
428
|
"""
|
430
429
|
Defaults to `true`.
|
431
430
|
|
@@ -435,25 +434,25 @@ class GroupPolicies(pulumi.CustomResource):
|
|
435
434
|
"""
|
436
435
|
return pulumi.get(self, "exclusive")
|
437
436
|
|
438
|
-
@property
|
437
|
+
@_builtins.property
|
439
438
|
@pulumi.getter(name="groupId")
|
440
|
-
def group_id(self) -> pulumi.Output[
|
439
|
+
def group_id(self) -> pulumi.Output[_builtins.str]:
|
441
440
|
"""
|
442
441
|
Group ID to assign policies to.
|
443
442
|
"""
|
444
443
|
return pulumi.get(self, "group_id")
|
445
444
|
|
446
|
-
@property
|
445
|
+
@_builtins.property
|
447
446
|
@pulumi.getter(name="groupName")
|
448
|
-
def group_name(self) -> pulumi.Output[
|
447
|
+
def group_name(self) -> pulumi.Output[_builtins.str]:
|
449
448
|
"""
|
450
449
|
The name of the group that are assigned the policies.
|
451
450
|
"""
|
452
451
|
return pulumi.get(self, "group_name")
|
453
452
|
|
454
|
-
@property
|
453
|
+
@_builtins.property
|
455
454
|
@pulumi.getter
|
456
|
-
def namespace(self) -> pulumi.Output[Optional[
|
455
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
457
456
|
"""
|
458
457
|
The namespace to provision the resource in.
|
459
458
|
The value should not contain leading or trailing forward slashes.
|
@@ -462,9 +461,9 @@ class GroupPolicies(pulumi.CustomResource):
|
|
462
461
|
"""
|
463
462
|
return pulumi.get(self, "namespace")
|
464
463
|
|
465
|
-
@property
|
464
|
+
@_builtins.property
|
466
465
|
@pulumi.getter
|
467
|
-
def policies(self) -> pulumi.Output[Sequence[
|
466
|
+
def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
468
467
|
"""
|
469
468
|
List of policies to assign to the group
|
470
469
|
"""
|