pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
pulumi_vault/identity/entity.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,23 +19,23 @@ __all__ = ['EntityArgs', 'Entity']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class EntityArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
disabled: Optional[pulumi.Input[
|
24
|
-
external_policies: Optional[pulumi.Input[
|
25
|
-
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
26
|
-
name: Optional[pulumi.Input[
|
27
|
-
namespace: Optional[pulumi.Input[
|
28
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
22
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
23
|
+
external_policies: Optional[pulumi.Input[_builtins.bool]] = None,
|
24
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
29
28
|
"""
|
30
29
|
The set of arguments for constructing a Entity resource.
|
31
|
-
:param pulumi.Input[
|
32
|
-
:param pulumi.Input[
|
33
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
30
|
+
:param pulumi.Input[_builtins.bool] disabled: True/false Is this entity currently disabled. Defaults to `false`
|
31
|
+
:param pulumi.Input[_builtins.bool] external_policies: `false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
|
32
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: A Map of additional metadata to associate with the user.
|
33
|
+
:param pulumi.Input[_builtins.str] name: Name of the identity entity to create.
|
34
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
36
35
|
The value should not contain leading or trailing forward slashes.
|
37
36
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
37
|
*Available only for Vault Enterprise*.
|
39
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
38
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies to apply to the entity.
|
40
39
|
"""
|
41
40
|
if disabled is not None:
|
42
41
|
pulumi.set(__self__, "disabled", disabled)
|
@@ -51,57 +50,57 @@ class EntityArgs:
|
|
51
50
|
if policies is not None:
|
52
51
|
pulumi.set(__self__, "policies", policies)
|
53
52
|
|
54
|
-
@property
|
53
|
+
@_builtins.property
|
55
54
|
@pulumi.getter
|
56
|
-
def disabled(self) -> Optional[pulumi.Input[
|
55
|
+
def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
57
56
|
"""
|
58
57
|
True/false Is this entity currently disabled. Defaults to `false`
|
59
58
|
"""
|
60
59
|
return pulumi.get(self, "disabled")
|
61
60
|
|
62
61
|
@disabled.setter
|
63
|
-
def disabled(self, value: Optional[pulumi.Input[
|
62
|
+
def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
64
63
|
pulumi.set(self, "disabled", value)
|
65
64
|
|
66
|
-
@property
|
65
|
+
@_builtins.property
|
67
66
|
@pulumi.getter(name="externalPolicies")
|
68
|
-
def external_policies(self) -> Optional[pulumi.Input[
|
67
|
+
def external_policies(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
69
68
|
"""
|
70
69
|
`false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
|
71
70
|
"""
|
72
71
|
return pulumi.get(self, "external_policies")
|
73
72
|
|
74
73
|
@external_policies.setter
|
75
|
-
def external_policies(self, value: Optional[pulumi.Input[
|
74
|
+
def external_policies(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
76
75
|
pulumi.set(self, "external_policies", value)
|
77
76
|
|
78
|
-
@property
|
77
|
+
@_builtins.property
|
79
78
|
@pulumi.getter
|
80
|
-
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
79
|
+
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
81
80
|
"""
|
82
81
|
A Map of additional metadata to associate with the user.
|
83
82
|
"""
|
84
83
|
return pulumi.get(self, "metadata")
|
85
84
|
|
86
85
|
@metadata.setter
|
87
|
-
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
86
|
+
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
88
87
|
pulumi.set(self, "metadata", value)
|
89
88
|
|
90
|
-
@property
|
89
|
+
@_builtins.property
|
91
90
|
@pulumi.getter
|
92
|
-
def name(self) -> Optional[pulumi.Input[
|
91
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
93
92
|
"""
|
94
93
|
Name of the identity entity to create.
|
95
94
|
"""
|
96
95
|
return pulumi.get(self, "name")
|
97
96
|
|
98
97
|
@name.setter
|
99
|
-
def name(self, value: Optional[pulumi.Input[
|
98
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
100
99
|
pulumi.set(self, "name", value)
|
101
100
|
|
102
|
-
@property
|
101
|
+
@_builtins.property
|
103
102
|
@pulumi.getter
|
104
|
-
def namespace(self) -> Optional[pulumi.Input[
|
103
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
105
104
|
"""
|
106
105
|
The namespace to provision the resource in.
|
107
106
|
The value should not contain leading or trailing forward slashes.
|
@@ -111,42 +110,42 @@ class EntityArgs:
|
|
111
110
|
return pulumi.get(self, "namespace")
|
112
111
|
|
113
112
|
@namespace.setter
|
114
|
-
def namespace(self, value: Optional[pulumi.Input[
|
113
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
115
114
|
pulumi.set(self, "namespace", value)
|
116
115
|
|
117
|
-
@property
|
116
|
+
@_builtins.property
|
118
117
|
@pulumi.getter
|
119
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
118
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
120
119
|
"""
|
121
120
|
A list of policies to apply to the entity.
|
122
121
|
"""
|
123
122
|
return pulumi.get(self, "policies")
|
124
123
|
|
125
124
|
@policies.setter
|
126
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
125
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
127
126
|
pulumi.set(self, "policies", value)
|
128
127
|
|
129
128
|
|
130
129
|
@pulumi.input_type
|
131
130
|
class _EntityState:
|
132
131
|
def __init__(__self__, *,
|
133
|
-
disabled: Optional[pulumi.Input[
|
134
|
-
external_policies: Optional[pulumi.Input[
|
135
|
-
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
136
|
-
name: Optional[pulumi.Input[
|
137
|
-
namespace: Optional[pulumi.Input[
|
138
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
132
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
133
|
+
external_policies: Optional[pulumi.Input[_builtins.bool]] = None,
|
134
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
135
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
136
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
137
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
139
138
|
"""
|
140
139
|
Input properties used for looking up and filtering Entity resources.
|
141
|
-
:param pulumi.Input[
|
142
|
-
:param pulumi.Input[
|
143
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
144
|
-
:param pulumi.Input[
|
145
|
-
:param pulumi.Input[
|
140
|
+
:param pulumi.Input[_builtins.bool] disabled: True/false Is this entity currently disabled. Defaults to `false`
|
141
|
+
:param pulumi.Input[_builtins.bool] external_policies: `false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
|
142
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: A Map of additional metadata to associate with the user.
|
143
|
+
:param pulumi.Input[_builtins.str] name: Name of the identity entity to create.
|
144
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
146
145
|
The value should not contain leading or trailing forward slashes.
|
147
146
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
148
147
|
*Available only for Vault Enterprise*.
|
149
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
148
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies to apply to the entity.
|
150
149
|
"""
|
151
150
|
if disabled is not None:
|
152
151
|
pulumi.set(__self__, "disabled", disabled)
|
@@ -161,57 +160,57 @@ class _EntityState:
|
|
161
160
|
if policies is not None:
|
162
161
|
pulumi.set(__self__, "policies", policies)
|
163
162
|
|
164
|
-
@property
|
163
|
+
@_builtins.property
|
165
164
|
@pulumi.getter
|
166
|
-
def disabled(self) -> Optional[pulumi.Input[
|
165
|
+
def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
167
166
|
"""
|
168
167
|
True/false Is this entity currently disabled. Defaults to `false`
|
169
168
|
"""
|
170
169
|
return pulumi.get(self, "disabled")
|
171
170
|
|
172
171
|
@disabled.setter
|
173
|
-
def disabled(self, value: Optional[pulumi.Input[
|
172
|
+
def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
174
173
|
pulumi.set(self, "disabled", value)
|
175
174
|
|
176
|
-
@property
|
175
|
+
@_builtins.property
|
177
176
|
@pulumi.getter(name="externalPolicies")
|
178
|
-
def external_policies(self) -> Optional[pulumi.Input[
|
177
|
+
def external_policies(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
179
178
|
"""
|
180
179
|
`false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
|
181
180
|
"""
|
182
181
|
return pulumi.get(self, "external_policies")
|
183
182
|
|
184
183
|
@external_policies.setter
|
185
|
-
def external_policies(self, value: Optional[pulumi.Input[
|
184
|
+
def external_policies(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
186
185
|
pulumi.set(self, "external_policies", value)
|
187
186
|
|
188
|
-
@property
|
187
|
+
@_builtins.property
|
189
188
|
@pulumi.getter
|
190
|
-
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
189
|
+
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
191
190
|
"""
|
192
191
|
A Map of additional metadata to associate with the user.
|
193
192
|
"""
|
194
193
|
return pulumi.get(self, "metadata")
|
195
194
|
|
196
195
|
@metadata.setter
|
197
|
-
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
196
|
+
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
198
197
|
pulumi.set(self, "metadata", value)
|
199
198
|
|
200
|
-
@property
|
199
|
+
@_builtins.property
|
201
200
|
@pulumi.getter
|
202
|
-
def name(self) -> Optional[pulumi.Input[
|
201
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
203
202
|
"""
|
204
203
|
Name of the identity entity to create.
|
205
204
|
"""
|
206
205
|
return pulumi.get(self, "name")
|
207
206
|
|
208
207
|
@name.setter
|
209
|
-
def name(self, value: Optional[pulumi.Input[
|
208
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
210
209
|
pulumi.set(self, "name", value)
|
211
210
|
|
212
|
-
@property
|
211
|
+
@_builtins.property
|
213
212
|
@pulumi.getter
|
214
|
-
def namespace(self) -> Optional[pulumi.Input[
|
213
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
215
214
|
"""
|
216
215
|
The namespace to provision the resource in.
|
217
216
|
The value should not contain leading or trailing forward slashes.
|
@@ -221,19 +220,19 @@ class _EntityState:
|
|
221
220
|
return pulumi.get(self, "namespace")
|
222
221
|
|
223
222
|
@namespace.setter
|
224
|
-
def namespace(self, value: Optional[pulumi.Input[
|
223
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
225
224
|
pulumi.set(self, "namespace", value)
|
226
225
|
|
227
|
-
@property
|
226
|
+
@_builtins.property
|
228
227
|
@pulumi.getter
|
229
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
228
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
230
229
|
"""
|
231
230
|
A list of policies to apply to the entity.
|
232
231
|
"""
|
233
232
|
return pulumi.get(self, "policies")
|
234
233
|
|
235
234
|
@policies.setter
|
236
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
235
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
237
236
|
pulumi.set(self, "policies", value)
|
238
237
|
|
239
238
|
|
@@ -243,12 +242,12 @@ class Entity(pulumi.CustomResource):
|
|
243
242
|
def __init__(__self__,
|
244
243
|
resource_name: str,
|
245
244
|
opts: Optional[pulumi.ResourceOptions] = None,
|
246
|
-
disabled: Optional[pulumi.Input[
|
247
|
-
external_policies: Optional[pulumi.Input[
|
248
|
-
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
249
|
-
name: Optional[pulumi.Input[
|
250
|
-
namespace: Optional[pulumi.Input[
|
251
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
245
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
246
|
+
external_policies: Optional[pulumi.Input[_builtins.bool]] = None,
|
247
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
248
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
249
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
250
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
252
251
|
__props__=None):
|
253
252
|
"""
|
254
253
|
## Example Usage
|
@@ -275,15 +274,15 @@ class Entity(pulumi.CustomResource):
|
|
275
274
|
|
276
275
|
:param str resource_name: The name of the resource.
|
277
276
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
278
|
-
:param pulumi.Input[
|
279
|
-
:param pulumi.Input[
|
280
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
281
|
-
:param pulumi.Input[
|
282
|
-
:param pulumi.Input[
|
277
|
+
:param pulumi.Input[_builtins.bool] disabled: True/false Is this entity currently disabled. Defaults to `false`
|
278
|
+
:param pulumi.Input[_builtins.bool] external_policies: `false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
|
279
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: A Map of additional metadata to associate with the user.
|
280
|
+
:param pulumi.Input[_builtins.str] name: Name of the identity entity to create.
|
281
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
283
282
|
The value should not contain leading or trailing forward slashes.
|
284
283
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
285
284
|
*Available only for Vault Enterprise*.
|
286
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
285
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies to apply to the entity.
|
287
286
|
"""
|
288
287
|
...
|
289
288
|
@overload
|
@@ -329,12 +328,12 @@ class Entity(pulumi.CustomResource):
|
|
329
328
|
def _internal_init(__self__,
|
330
329
|
resource_name: str,
|
331
330
|
opts: Optional[pulumi.ResourceOptions] = None,
|
332
|
-
disabled: Optional[pulumi.Input[
|
333
|
-
external_policies: Optional[pulumi.Input[
|
334
|
-
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
335
|
-
name: Optional[pulumi.Input[
|
336
|
-
namespace: Optional[pulumi.Input[
|
337
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
331
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
332
|
+
external_policies: Optional[pulumi.Input[_builtins.bool]] = None,
|
333
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
334
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
335
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
336
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
338
337
|
__props__=None):
|
339
338
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
340
339
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -360,12 +359,12 @@ class Entity(pulumi.CustomResource):
|
|
360
359
|
def get(resource_name: str,
|
361
360
|
id: pulumi.Input[str],
|
362
361
|
opts: Optional[pulumi.ResourceOptions] = None,
|
363
|
-
disabled: Optional[pulumi.Input[
|
364
|
-
external_policies: Optional[pulumi.Input[
|
365
|
-
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
366
|
-
name: Optional[pulumi.Input[
|
367
|
-
namespace: Optional[pulumi.Input[
|
368
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
362
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
363
|
+
external_policies: Optional[pulumi.Input[_builtins.bool]] = None,
|
364
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
365
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
366
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
367
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'Entity':
|
369
368
|
"""
|
370
369
|
Get an existing Entity resource's state with the given name, id, and optional extra
|
371
370
|
properties used to qualify the lookup.
|
@@ -373,15 +372,15 @@ class Entity(pulumi.CustomResource):
|
|
373
372
|
:param str resource_name: The unique name of the resulting resource.
|
374
373
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
375
374
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
376
|
-
:param pulumi.Input[
|
377
|
-
:param pulumi.Input[
|
378
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
379
|
-
:param pulumi.Input[
|
380
|
-
:param pulumi.Input[
|
375
|
+
:param pulumi.Input[_builtins.bool] disabled: True/false Is this entity currently disabled. Defaults to `false`
|
376
|
+
:param pulumi.Input[_builtins.bool] external_policies: `false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
|
377
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: A Map of additional metadata to associate with the user.
|
378
|
+
:param pulumi.Input[_builtins.str] name: Name of the identity entity to create.
|
379
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
381
380
|
The value should not contain leading or trailing forward slashes.
|
382
381
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
383
382
|
*Available only for Vault Enterprise*.
|
384
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
383
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies to apply to the entity.
|
385
384
|
"""
|
386
385
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
387
386
|
|
@@ -395,41 +394,41 @@ class Entity(pulumi.CustomResource):
|
|
395
394
|
__props__.__dict__["policies"] = policies
|
396
395
|
return Entity(resource_name, opts=opts, __props__=__props__)
|
397
396
|
|
398
|
-
@property
|
397
|
+
@_builtins.property
|
399
398
|
@pulumi.getter
|
400
|
-
def disabled(self) -> pulumi.Output[Optional[
|
399
|
+
def disabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
401
400
|
"""
|
402
401
|
True/false Is this entity currently disabled. Defaults to `false`
|
403
402
|
"""
|
404
403
|
return pulumi.get(self, "disabled")
|
405
404
|
|
406
|
-
@property
|
405
|
+
@_builtins.property
|
407
406
|
@pulumi.getter(name="externalPolicies")
|
408
|
-
def external_policies(self) -> pulumi.Output[Optional[
|
407
|
+
def external_policies(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
409
408
|
"""
|
410
409
|
`false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
|
411
410
|
"""
|
412
411
|
return pulumi.get(self, "external_policies")
|
413
412
|
|
414
|
-
@property
|
413
|
+
@_builtins.property
|
415
414
|
@pulumi.getter
|
416
|
-
def metadata(self) -> pulumi.Output[Optional[Mapping[str,
|
415
|
+
def metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
417
416
|
"""
|
418
417
|
A Map of additional metadata to associate with the user.
|
419
418
|
"""
|
420
419
|
return pulumi.get(self, "metadata")
|
421
420
|
|
422
|
-
@property
|
421
|
+
@_builtins.property
|
423
422
|
@pulumi.getter
|
424
|
-
def name(self) -> pulumi.Output[
|
423
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
425
424
|
"""
|
426
425
|
Name of the identity entity to create.
|
427
426
|
"""
|
428
427
|
return pulumi.get(self, "name")
|
429
428
|
|
430
|
-
@property
|
429
|
+
@_builtins.property
|
431
430
|
@pulumi.getter
|
432
|
-
def namespace(self) -> pulumi.Output[Optional[
|
431
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
433
432
|
"""
|
434
433
|
The namespace to provision the resource in.
|
435
434
|
The value should not contain leading or trailing forward slashes.
|
@@ -438,9 +437,9 @@ class Entity(pulumi.CustomResource):
|
|
438
437
|
"""
|
439
438
|
return pulumi.get(self, "namespace")
|
440
439
|
|
441
|
-
@property
|
440
|
+
@_builtins.property
|
442
441
|
@pulumi.getter
|
443
|
-
def policies(self) -> pulumi.Output[Optional[Sequence[
|
442
|
+
def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
444
443
|
"""
|
445
444
|
A list of policies to apply to the entity.
|
446
445
|
"""
|