pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,26 +19,26 @@ __all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class NomadSecretRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
role: pulumi.Input[
|
25
|
-
global_: Optional[pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
27
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
type: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
role: pulumi.Input[_builtins.str],
|
24
|
+
global_: Optional[pulumi.Input[_builtins.bool]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
type: Optional[pulumi.Input[_builtins.str]] = None):
|
29
28
|
"""
|
30
29
|
The set of arguments for constructing a NomadSecretRole resource.
|
31
|
-
:param pulumi.Input[
|
32
|
-
:param pulumi.Input[
|
30
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
|
31
|
+
:param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
|
33
32
|
Must be unique within the backend.
|
34
|
-
:param pulumi.Input[
|
33
|
+
:param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
|
35
34
|
false.
|
36
|
-
:param pulumi.Input[
|
35
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
37
36
|
The value should not contain leading or trailing forward slashes.
|
38
37
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
39
38
|
*Available only for Vault Enterprise*.
|
40
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
39
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
|
41
40
|
when `type` is 'client'.
|
42
|
-
:param pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
|
43
42
|
settings are 'client' and 'management'. Defaults to 'client'.
|
44
43
|
"""
|
45
44
|
pulumi.set(__self__, "backend", backend)
|
@@ -53,21 +52,21 @@ class NomadSecretRoleArgs:
|
|
53
52
|
if type is not None:
|
54
53
|
pulumi.set(__self__, "type", type)
|
55
54
|
|
56
|
-
@property
|
55
|
+
@_builtins.property
|
57
56
|
@pulumi.getter
|
58
|
-
def backend(self) -> pulumi.Input[
|
57
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
59
58
|
"""
|
60
59
|
The unique path this backend should be mounted at.
|
61
60
|
"""
|
62
61
|
return pulumi.get(self, "backend")
|
63
62
|
|
64
63
|
@backend.setter
|
65
|
-
def backend(self, value: pulumi.Input[
|
64
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
66
65
|
pulumi.set(self, "backend", value)
|
67
66
|
|
68
|
-
@property
|
67
|
+
@_builtins.property
|
69
68
|
@pulumi.getter
|
70
|
-
def role(self) -> pulumi.Input[
|
69
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
71
70
|
"""
|
72
71
|
The name to identify this role within the backend.
|
73
72
|
Must be unique within the backend.
|
@@ -75,12 +74,12 @@ class NomadSecretRoleArgs:
|
|
75
74
|
return pulumi.get(self, "role")
|
76
75
|
|
77
76
|
@role.setter
|
78
|
-
def role(self, value: pulumi.Input[
|
77
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
79
78
|
pulumi.set(self, "role", value)
|
80
79
|
|
81
|
-
@property
|
80
|
+
@_builtins.property
|
82
81
|
@pulumi.getter(name="global")
|
83
|
-
def global_(self) -> Optional[pulumi.Input[
|
82
|
+
def global_(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
84
83
|
"""
|
85
84
|
Specifies if the generated token should be global. Defaults to
|
86
85
|
false.
|
@@ -88,12 +87,12 @@ class NomadSecretRoleArgs:
|
|
88
87
|
return pulumi.get(self, "global_")
|
89
88
|
|
90
89
|
@global_.setter
|
91
|
-
def global_(self, value: Optional[pulumi.Input[
|
90
|
+
def global_(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
92
91
|
pulumi.set(self, "global_", value)
|
93
92
|
|
94
|
-
@property
|
93
|
+
@_builtins.property
|
95
94
|
@pulumi.getter
|
96
|
-
def namespace(self) -> Optional[pulumi.Input[
|
95
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
97
96
|
"""
|
98
97
|
The namespace to provision the resource in.
|
99
98
|
The value should not contain leading or trailing forward slashes.
|
@@ -103,12 +102,12 @@ class NomadSecretRoleArgs:
|
|
103
102
|
return pulumi.get(self, "namespace")
|
104
103
|
|
105
104
|
@namespace.setter
|
106
|
-
def namespace(self, value: Optional[pulumi.Input[
|
105
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
107
106
|
pulumi.set(self, "namespace", value)
|
108
107
|
|
109
|
-
@property
|
108
|
+
@_builtins.property
|
110
109
|
@pulumi.getter
|
111
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
110
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
112
111
|
"""
|
113
112
|
List of policies attached to the generated token. This setting is only used
|
114
113
|
when `type` is 'client'.
|
@@ -116,12 +115,12 @@ class NomadSecretRoleArgs:
|
|
116
115
|
return pulumi.get(self, "policies")
|
117
116
|
|
118
117
|
@policies.setter
|
119
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
118
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
120
119
|
pulumi.set(self, "policies", value)
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter
|
124
|
-
def type(self) -> Optional[pulumi.Input[
|
123
|
+
def type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
125
124
|
"""
|
126
125
|
Specifies the type of token to create when using this role. Valid
|
127
126
|
settings are 'client' and 'management'. Defaults to 'client'.
|
@@ -129,33 +128,33 @@ class NomadSecretRoleArgs:
|
|
129
128
|
return pulumi.get(self, "type")
|
130
129
|
|
131
130
|
@type.setter
|
132
|
-
def type(self, value: Optional[pulumi.Input[
|
131
|
+
def type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
133
132
|
pulumi.set(self, "type", value)
|
134
133
|
|
135
134
|
|
136
135
|
@pulumi.input_type
|
137
136
|
class _NomadSecretRoleState:
|
138
137
|
def __init__(__self__, *,
|
139
|
-
backend: Optional[pulumi.Input[
|
140
|
-
global_: Optional[pulumi.Input[
|
141
|
-
namespace: Optional[pulumi.Input[
|
142
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
143
|
-
role: Optional[pulumi.Input[
|
144
|
-
type: Optional[pulumi.Input[
|
138
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
139
|
+
global_: Optional[pulumi.Input[_builtins.bool]] = None,
|
140
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
141
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
142
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
143
|
+
type: Optional[pulumi.Input[_builtins.str]] = None):
|
145
144
|
"""
|
146
145
|
Input properties used for looking up and filtering NomadSecretRole resources.
|
147
|
-
:param pulumi.Input[
|
148
|
-
:param pulumi.Input[
|
146
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
|
147
|
+
:param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
|
149
148
|
false.
|
150
|
-
:param pulumi.Input[
|
149
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
151
150
|
The value should not contain leading or trailing forward slashes.
|
152
151
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
153
152
|
*Available only for Vault Enterprise*.
|
154
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
153
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
|
155
154
|
when `type` is 'client'.
|
156
|
-
:param pulumi.Input[
|
155
|
+
:param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
|
157
156
|
Must be unique within the backend.
|
158
|
-
:param pulumi.Input[
|
157
|
+
:param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
|
159
158
|
settings are 'client' and 'management'. Defaults to 'client'.
|
160
159
|
"""
|
161
160
|
if backend is not None:
|
@@ -171,21 +170,21 @@ class _NomadSecretRoleState:
|
|
171
170
|
if type is not None:
|
172
171
|
pulumi.set(__self__, "type", type)
|
173
172
|
|
174
|
-
@property
|
173
|
+
@_builtins.property
|
175
174
|
@pulumi.getter
|
176
|
-
def backend(self) -> Optional[pulumi.Input[
|
175
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
177
176
|
"""
|
178
177
|
The unique path this backend should be mounted at.
|
179
178
|
"""
|
180
179
|
return pulumi.get(self, "backend")
|
181
180
|
|
182
181
|
@backend.setter
|
183
|
-
def backend(self, value: Optional[pulumi.Input[
|
182
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
184
183
|
pulumi.set(self, "backend", value)
|
185
184
|
|
186
|
-
@property
|
185
|
+
@_builtins.property
|
187
186
|
@pulumi.getter(name="global")
|
188
|
-
def global_(self) -> Optional[pulumi.Input[
|
187
|
+
def global_(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
189
188
|
"""
|
190
189
|
Specifies if the generated token should be global. Defaults to
|
191
190
|
false.
|
@@ -193,12 +192,12 @@ class _NomadSecretRoleState:
|
|
193
192
|
return pulumi.get(self, "global_")
|
194
193
|
|
195
194
|
@global_.setter
|
196
|
-
def global_(self, value: Optional[pulumi.Input[
|
195
|
+
def global_(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
197
196
|
pulumi.set(self, "global_", value)
|
198
197
|
|
199
|
-
@property
|
198
|
+
@_builtins.property
|
200
199
|
@pulumi.getter
|
201
|
-
def namespace(self) -> Optional[pulumi.Input[
|
200
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
202
201
|
"""
|
203
202
|
The namespace to provision the resource in.
|
204
203
|
The value should not contain leading or trailing forward slashes.
|
@@ -208,12 +207,12 @@ class _NomadSecretRoleState:
|
|
208
207
|
return pulumi.get(self, "namespace")
|
209
208
|
|
210
209
|
@namespace.setter
|
211
|
-
def namespace(self, value: Optional[pulumi.Input[
|
210
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
212
211
|
pulumi.set(self, "namespace", value)
|
213
212
|
|
214
|
-
@property
|
213
|
+
@_builtins.property
|
215
214
|
@pulumi.getter
|
216
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
215
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
217
216
|
"""
|
218
217
|
List of policies attached to the generated token. This setting is only used
|
219
218
|
when `type` is 'client'.
|
@@ -221,12 +220,12 @@ class _NomadSecretRoleState:
|
|
221
220
|
return pulumi.get(self, "policies")
|
222
221
|
|
223
222
|
@policies.setter
|
224
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
223
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
225
224
|
pulumi.set(self, "policies", value)
|
226
225
|
|
227
|
-
@property
|
226
|
+
@_builtins.property
|
228
227
|
@pulumi.getter
|
229
|
-
def role(self) -> Optional[pulumi.Input[
|
228
|
+
def role(self) -> Optional[pulumi.Input[_builtins.str]]:
|
230
229
|
"""
|
231
230
|
The name to identify this role within the backend.
|
232
231
|
Must be unique within the backend.
|
@@ -234,12 +233,12 @@ class _NomadSecretRoleState:
|
|
234
233
|
return pulumi.get(self, "role")
|
235
234
|
|
236
235
|
@role.setter
|
237
|
-
def role(self, value: Optional[pulumi.Input[
|
236
|
+
def role(self, value: Optional[pulumi.Input[_builtins.str]]):
|
238
237
|
pulumi.set(self, "role", value)
|
239
238
|
|
240
|
-
@property
|
239
|
+
@_builtins.property
|
241
240
|
@pulumi.getter
|
242
|
-
def type(self) -> Optional[pulumi.Input[
|
241
|
+
def type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
243
242
|
"""
|
244
243
|
Specifies the type of token to create when using this role. Valid
|
245
244
|
settings are 'client' and 'management'. Defaults to 'client'.
|
@@ -247,7 +246,7 @@ class _NomadSecretRoleState:
|
|
247
246
|
return pulumi.get(self, "type")
|
248
247
|
|
249
248
|
@type.setter
|
250
|
-
def type(self, value: Optional[pulumi.Input[
|
249
|
+
def type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
251
250
|
pulumi.set(self, "type", value)
|
252
251
|
|
253
252
|
|
@@ -257,12 +256,12 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
257
256
|
def __init__(__self__,
|
258
257
|
resource_name: str,
|
259
258
|
opts: Optional[pulumi.ResourceOptions] = None,
|
260
|
-
backend: Optional[pulumi.Input[
|
261
|
-
global_: Optional[pulumi.Input[
|
262
|
-
namespace: Optional[pulumi.Input[
|
263
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
264
|
-
role: Optional[pulumi.Input[
|
265
|
-
type: Optional[pulumi.Input[
|
259
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
260
|
+
global_: Optional[pulumi.Input[_builtins.bool]] = None,
|
261
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
262
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
263
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
264
|
+
type: Optional[pulumi.Input[_builtins.str]] = None,
|
266
265
|
__props__=None):
|
267
266
|
"""
|
268
267
|
## Example Usage
|
@@ -295,18 +294,18 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
295
294
|
|
296
295
|
:param str resource_name: The name of the resource.
|
297
296
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
298
|
-
:param pulumi.Input[
|
299
|
-
:param pulumi.Input[
|
297
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
|
298
|
+
:param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
|
300
299
|
false.
|
301
|
-
:param pulumi.Input[
|
300
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
302
301
|
The value should not contain leading or trailing forward slashes.
|
303
302
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
304
303
|
*Available only for Vault Enterprise*.
|
305
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
304
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
|
306
305
|
when `type` is 'client'.
|
307
|
-
:param pulumi.Input[
|
306
|
+
:param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
|
308
307
|
Must be unique within the backend.
|
309
|
-
:param pulumi.Input[
|
308
|
+
:param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
|
310
309
|
settings are 'client' and 'management'. Defaults to 'client'.
|
311
310
|
"""
|
312
311
|
...
|
@@ -359,12 +358,12 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
359
358
|
def _internal_init(__self__,
|
360
359
|
resource_name: str,
|
361
360
|
opts: Optional[pulumi.ResourceOptions] = None,
|
362
|
-
backend: Optional[pulumi.Input[
|
363
|
-
global_: Optional[pulumi.Input[
|
364
|
-
namespace: Optional[pulumi.Input[
|
365
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
366
|
-
role: Optional[pulumi.Input[
|
367
|
-
type: Optional[pulumi.Input[
|
361
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
362
|
+
global_: Optional[pulumi.Input[_builtins.bool]] = None,
|
363
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
364
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
365
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
366
|
+
type: Optional[pulumi.Input[_builtins.str]] = None,
|
368
367
|
__props__=None):
|
369
368
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
370
369
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -394,12 +393,12 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
394
393
|
def get(resource_name: str,
|
395
394
|
id: pulumi.Input[str],
|
396
395
|
opts: Optional[pulumi.ResourceOptions] = None,
|
397
|
-
backend: Optional[pulumi.Input[
|
398
|
-
global_: Optional[pulumi.Input[
|
399
|
-
namespace: Optional[pulumi.Input[
|
400
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
401
|
-
role: Optional[pulumi.Input[
|
402
|
-
type: Optional[pulumi.Input[
|
396
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
397
|
+
global_: Optional[pulumi.Input[_builtins.bool]] = None,
|
398
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
399
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
400
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
401
|
+
type: Optional[pulumi.Input[_builtins.str]] = None) -> 'NomadSecretRole':
|
403
402
|
"""
|
404
403
|
Get an existing NomadSecretRole resource's state with the given name, id, and optional extra
|
405
404
|
properties used to qualify the lookup.
|
@@ -407,18 +406,18 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
407
406
|
:param str resource_name: The unique name of the resulting resource.
|
408
407
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
409
408
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
410
|
-
:param pulumi.Input[
|
411
|
-
:param pulumi.Input[
|
409
|
+
:param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
|
410
|
+
:param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
|
412
411
|
false.
|
413
|
-
:param pulumi.Input[
|
412
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
414
413
|
The value should not contain leading or trailing forward slashes.
|
415
414
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
416
415
|
*Available only for Vault Enterprise*.
|
417
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
416
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
|
418
417
|
when `type` is 'client'.
|
419
|
-
:param pulumi.Input[
|
418
|
+
:param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
|
420
419
|
Must be unique within the backend.
|
421
|
-
:param pulumi.Input[
|
420
|
+
:param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
|
422
421
|
settings are 'client' and 'management'. Defaults to 'client'.
|
423
422
|
"""
|
424
423
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -433,26 +432,26 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
433
432
|
__props__.__dict__["type"] = type
|
434
433
|
return NomadSecretRole(resource_name, opts=opts, __props__=__props__)
|
435
434
|
|
436
|
-
@property
|
435
|
+
@_builtins.property
|
437
436
|
@pulumi.getter
|
438
|
-
def backend(self) -> pulumi.Output[
|
437
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
439
438
|
"""
|
440
439
|
The unique path this backend should be mounted at.
|
441
440
|
"""
|
442
441
|
return pulumi.get(self, "backend")
|
443
442
|
|
444
|
-
@property
|
443
|
+
@_builtins.property
|
445
444
|
@pulumi.getter(name="global")
|
446
|
-
def global_(self) -> pulumi.Output[
|
445
|
+
def global_(self) -> pulumi.Output[_builtins.bool]:
|
447
446
|
"""
|
448
447
|
Specifies if the generated token should be global. Defaults to
|
449
448
|
false.
|
450
449
|
"""
|
451
450
|
return pulumi.get(self, "global_")
|
452
451
|
|
453
|
-
@property
|
452
|
+
@_builtins.property
|
454
453
|
@pulumi.getter
|
455
|
-
def namespace(self) -> pulumi.Output[Optional[
|
454
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
456
455
|
"""
|
457
456
|
The namespace to provision the resource in.
|
458
457
|
The value should not contain leading or trailing forward slashes.
|
@@ -461,27 +460,27 @@ class NomadSecretRole(pulumi.CustomResource):
|
|
461
460
|
"""
|
462
461
|
return pulumi.get(self, "namespace")
|
463
462
|
|
464
|
-
@property
|
463
|
+
@_builtins.property
|
465
464
|
@pulumi.getter
|
466
|
-
def policies(self) -> pulumi.Output[Sequence[
|
465
|
+
def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
467
466
|
"""
|
468
467
|
List of policies attached to the generated token. This setting is only used
|
469
468
|
when `type` is 'client'.
|
470
469
|
"""
|
471
470
|
return pulumi.get(self, "policies")
|
472
471
|
|
473
|
-
@property
|
472
|
+
@_builtins.property
|
474
473
|
@pulumi.getter
|
475
|
-
def role(self) -> pulumi.Output[
|
474
|
+
def role(self) -> pulumi.Output[_builtins.str]:
|
476
475
|
"""
|
477
476
|
The name to identify this role within the backend.
|
478
477
|
Must be unique within the backend.
|
479
478
|
"""
|
480
479
|
return pulumi.get(self, "role")
|
481
480
|
|
482
|
-
@property
|
481
|
+
@_builtins.property
|
483
482
|
@pulumi.getter
|
484
|
-
def type(self) -> pulumi.Output[
|
483
|
+
def type(self) -> pulumi.Output[_builtins.str]:
|
485
484
|
"""
|
486
485
|
Specifies the type of token to create when using this role. Valid
|
487
486
|
settings are 'client' and 'management'. Defaults to 'client'.
|
pulumi_vault/okta/__init__.py
CHANGED
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|
pulumi_vault/okta/_inputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -26,11 +25,11 @@ MYPY = False
|
|
26
25
|
|
27
26
|
if not MYPY:
|
28
27
|
class AuthBackendGroupArgsDict(TypedDict):
|
29
|
-
group_name: pulumi.Input[
|
28
|
+
group_name: pulumi.Input[_builtins.str]
|
30
29
|
"""
|
31
30
|
Name of the Okta group
|
32
31
|
"""
|
33
|
-
policies: pulumi.Input[Sequence[pulumi.Input[
|
32
|
+
policies: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]
|
34
33
|
"""
|
35
34
|
Policies to associate with this group
|
36
35
|
"""
|
@@ -40,51 +39,51 @@ elif False:
|
|
40
39
|
@pulumi.input_type
|
41
40
|
class AuthBackendGroupArgs:
|
42
41
|
def __init__(__self__, *,
|
43
|
-
group_name: pulumi.Input[
|
44
|
-
policies: pulumi.Input[Sequence[pulumi.Input[
|
42
|
+
group_name: pulumi.Input[_builtins.str],
|
43
|
+
policies: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
45
44
|
"""
|
46
|
-
:param pulumi.Input[
|
47
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.str] group_name: Name of the Okta group
|
46
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies to associate with this group
|
48
47
|
"""
|
49
48
|
pulumi.set(__self__, "group_name", group_name)
|
50
49
|
pulumi.set(__self__, "policies", policies)
|
51
50
|
|
52
|
-
@property
|
51
|
+
@_builtins.property
|
53
52
|
@pulumi.getter(name="groupName")
|
54
|
-
def group_name(self) -> pulumi.Input[
|
53
|
+
def group_name(self) -> pulumi.Input[_builtins.str]:
|
55
54
|
"""
|
56
55
|
Name of the Okta group
|
57
56
|
"""
|
58
57
|
return pulumi.get(self, "group_name")
|
59
58
|
|
60
59
|
@group_name.setter
|
61
|
-
def group_name(self, value: pulumi.Input[
|
60
|
+
def group_name(self, value: pulumi.Input[_builtins.str]):
|
62
61
|
pulumi.set(self, "group_name", value)
|
63
62
|
|
64
|
-
@property
|
63
|
+
@_builtins.property
|
65
64
|
@pulumi.getter
|
66
|
-
def policies(self) -> pulumi.Input[Sequence[pulumi.Input[
|
65
|
+
def policies(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
67
66
|
"""
|
68
67
|
Policies to associate with this group
|
69
68
|
"""
|
70
69
|
return pulumi.get(self, "policies")
|
71
70
|
|
72
71
|
@policies.setter
|
73
|
-
def policies(self, value: pulumi.Input[Sequence[pulumi.Input[
|
72
|
+
def policies(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
74
73
|
pulumi.set(self, "policies", value)
|
75
74
|
|
76
75
|
|
77
76
|
if not MYPY:
|
78
77
|
class AuthBackendUserArgsDict(TypedDict):
|
79
|
-
username: pulumi.Input[
|
78
|
+
username: pulumi.Input[_builtins.str]
|
80
79
|
"""
|
81
80
|
Name of the user within Okta
|
82
81
|
"""
|
83
|
-
groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
82
|
+
groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
84
83
|
"""
|
85
84
|
Groups within the Okta auth backend to associate with this user
|
86
85
|
"""
|
87
|
-
policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
86
|
+
policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
88
87
|
"""
|
89
88
|
Policies to associate with this user
|
90
89
|
"""
|
@@ -94,13 +93,13 @@ elif False:
|
|
94
93
|
@pulumi.input_type
|
95
94
|
class AuthBackendUserArgs:
|
96
95
|
def __init__(__self__, *,
|
97
|
-
username: pulumi.Input[
|
98
|
-
groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
99
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
96
|
+
username: pulumi.Input[_builtins.str],
|
97
|
+
groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
98
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
100
99
|
"""
|
101
|
-
:param pulumi.Input[
|
102
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
103
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
100
|
+
:param pulumi.Input[_builtins.str] username: Name of the user within Okta
|
101
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: Groups within the Okta auth backend to associate with this user
|
102
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies to associate with this user
|
104
103
|
"""
|
105
104
|
pulumi.set(__self__, "username", username)
|
106
105
|
if groups is not None:
|
@@ -108,40 +107,40 @@ class AuthBackendUserArgs:
|
|
108
107
|
if policies is not None:
|
109
108
|
pulumi.set(__self__, "policies", policies)
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter
|
113
|
-
def username(self) -> pulumi.Input[
|
112
|
+
def username(self) -> pulumi.Input[_builtins.str]:
|
114
113
|
"""
|
115
114
|
Name of the user within Okta
|
116
115
|
"""
|
117
116
|
return pulumi.get(self, "username")
|
118
117
|
|
119
118
|
@username.setter
|
120
|
-
def username(self, value: pulumi.Input[
|
119
|
+
def username(self, value: pulumi.Input[_builtins.str]):
|
121
120
|
pulumi.set(self, "username", value)
|
122
121
|
|
123
|
-
@property
|
122
|
+
@_builtins.property
|
124
123
|
@pulumi.getter
|
125
|
-
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
124
|
+
def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
126
125
|
"""
|
127
126
|
Groups within the Okta auth backend to associate with this user
|
128
127
|
"""
|
129
128
|
return pulumi.get(self, "groups")
|
130
129
|
|
131
130
|
@groups.setter
|
132
|
-
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
131
|
+
def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
133
132
|
pulumi.set(self, "groups", value)
|
134
133
|
|
135
|
-
@property
|
134
|
+
@_builtins.property
|
136
135
|
@pulumi.getter
|
137
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
136
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
138
137
|
"""
|
139
138
|
Policies to associate with this user
|
140
139
|
"""
|
141
140
|
return pulumi.get(self, "policies")
|
142
141
|
|
143
142
|
@policies.setter
|
144
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
143
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
145
144
|
pulumi.set(self, "policies", value)
|
146
145
|
|
147
146
|
|