pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,21 +19,21 @@ __all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendGroupArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
groupname: pulumi.Input[
|
24
|
-
backend: Optional[pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
26
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
22
|
+
groupname: pulumi.Input[_builtins.str],
|
23
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a AuthBackendGroup resource.
|
29
|
-
:param pulumi.Input[
|
30
|
-
:param pulumi.Input[
|
28
|
+
:param pulumi.Input[_builtins.str] groupname: The LDAP groupname
|
29
|
+
:param pulumi.Input[_builtins.str] backend: Path to the authentication backend
|
31
30
|
|
32
31
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
33
|
-
:param pulumi.Input[
|
32
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
34
33
|
The value should not contain leading or trailing forward slashes.
|
35
34
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
36
35
|
*Available only for Vault Enterprise*.
|
37
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
36
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to members of the group
|
38
37
|
"""
|
39
38
|
pulumi.set(__self__, "groupname", groupname)
|
40
39
|
if backend is not None:
|
@@ -44,21 +43,21 @@ class AuthBackendGroupArgs:
|
|
44
43
|
if policies is not None:
|
45
44
|
pulumi.set(__self__, "policies", policies)
|
46
45
|
|
47
|
-
@property
|
46
|
+
@_builtins.property
|
48
47
|
@pulumi.getter
|
49
|
-
def groupname(self) -> pulumi.Input[
|
48
|
+
def groupname(self) -> pulumi.Input[_builtins.str]:
|
50
49
|
"""
|
51
50
|
The LDAP groupname
|
52
51
|
"""
|
53
52
|
return pulumi.get(self, "groupname")
|
54
53
|
|
55
54
|
@groupname.setter
|
56
|
-
def groupname(self, value: pulumi.Input[
|
55
|
+
def groupname(self, value: pulumi.Input[_builtins.str]):
|
57
56
|
pulumi.set(self, "groupname", value)
|
58
57
|
|
59
|
-
@property
|
58
|
+
@_builtins.property
|
60
59
|
@pulumi.getter
|
61
|
-
def backend(self) -> Optional[pulumi.Input[
|
60
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
62
61
|
"""
|
63
62
|
Path to the authentication backend
|
64
63
|
|
@@ -67,12 +66,12 @@ class AuthBackendGroupArgs:
|
|
67
66
|
return pulumi.get(self, "backend")
|
68
67
|
|
69
68
|
@backend.setter
|
70
|
-
def backend(self, value: Optional[pulumi.Input[
|
69
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
71
70
|
pulumi.set(self, "backend", value)
|
72
71
|
|
73
|
-
@property
|
72
|
+
@_builtins.property
|
74
73
|
@pulumi.getter
|
75
|
-
def namespace(self) -> Optional[pulumi.Input[
|
74
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
76
75
|
"""
|
77
76
|
The namespace to provision the resource in.
|
78
77
|
The value should not contain leading or trailing forward slashes.
|
@@ -82,40 +81,40 @@ class AuthBackendGroupArgs:
|
|
82
81
|
return pulumi.get(self, "namespace")
|
83
82
|
|
84
83
|
@namespace.setter
|
85
|
-
def namespace(self, value: Optional[pulumi.Input[
|
84
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
86
85
|
pulumi.set(self, "namespace", value)
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter
|
90
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
89
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
91
90
|
"""
|
92
91
|
Policies which should be granted to members of the group
|
93
92
|
"""
|
94
93
|
return pulumi.get(self, "policies")
|
95
94
|
|
96
95
|
@policies.setter
|
97
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
96
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
98
97
|
pulumi.set(self, "policies", value)
|
99
98
|
|
100
99
|
|
101
100
|
@pulumi.input_type
|
102
101
|
class _AuthBackendGroupState:
|
103
102
|
def __init__(__self__, *,
|
104
|
-
backend: Optional[pulumi.Input[
|
105
|
-
groupname: Optional[pulumi.Input[
|
106
|
-
namespace: Optional[pulumi.Input[
|
107
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
103
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
104
|
+
groupname: Optional[pulumi.Input[_builtins.str]] = None,
|
105
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
106
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
108
107
|
"""
|
109
108
|
Input properties used for looking up and filtering AuthBackendGroup resources.
|
110
|
-
:param pulumi.Input[
|
109
|
+
:param pulumi.Input[_builtins.str] backend: Path to the authentication backend
|
111
110
|
|
112
111
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
113
|
-
:param pulumi.Input[
|
114
|
-
:param pulumi.Input[
|
112
|
+
:param pulumi.Input[_builtins.str] groupname: The LDAP groupname
|
113
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
115
114
|
The value should not contain leading or trailing forward slashes.
|
116
115
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
117
116
|
*Available only for Vault Enterprise*.
|
118
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
117
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to members of the group
|
119
118
|
"""
|
120
119
|
if backend is not None:
|
121
120
|
pulumi.set(__self__, "backend", backend)
|
@@ -126,9 +125,9 @@ class _AuthBackendGroupState:
|
|
126
125
|
if policies is not None:
|
127
126
|
pulumi.set(__self__, "policies", policies)
|
128
127
|
|
129
|
-
@property
|
128
|
+
@_builtins.property
|
130
129
|
@pulumi.getter
|
131
|
-
def backend(self) -> Optional[pulumi.Input[
|
130
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
132
131
|
"""
|
133
132
|
Path to the authentication backend
|
134
133
|
|
@@ -137,24 +136,24 @@ class _AuthBackendGroupState:
|
|
137
136
|
return pulumi.get(self, "backend")
|
138
137
|
|
139
138
|
@backend.setter
|
140
|
-
def backend(self, value: Optional[pulumi.Input[
|
139
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
141
140
|
pulumi.set(self, "backend", value)
|
142
141
|
|
143
|
-
@property
|
142
|
+
@_builtins.property
|
144
143
|
@pulumi.getter
|
145
|
-
def groupname(self) -> Optional[pulumi.Input[
|
144
|
+
def groupname(self) -> Optional[pulumi.Input[_builtins.str]]:
|
146
145
|
"""
|
147
146
|
The LDAP groupname
|
148
147
|
"""
|
149
148
|
return pulumi.get(self, "groupname")
|
150
149
|
|
151
150
|
@groupname.setter
|
152
|
-
def groupname(self, value: Optional[pulumi.Input[
|
151
|
+
def groupname(self, value: Optional[pulumi.Input[_builtins.str]]):
|
153
152
|
pulumi.set(self, "groupname", value)
|
154
153
|
|
155
|
-
@property
|
154
|
+
@_builtins.property
|
156
155
|
@pulumi.getter
|
157
|
-
def namespace(self) -> Optional[pulumi.Input[
|
156
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
158
157
|
"""
|
159
158
|
The namespace to provision the resource in.
|
160
159
|
The value should not contain leading or trailing forward slashes.
|
@@ -164,19 +163,19 @@ class _AuthBackendGroupState:
|
|
164
163
|
return pulumi.get(self, "namespace")
|
165
164
|
|
166
165
|
@namespace.setter
|
167
|
-
def namespace(self, value: Optional[pulumi.Input[
|
166
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
168
167
|
pulumi.set(self, "namespace", value)
|
169
168
|
|
170
|
-
@property
|
169
|
+
@_builtins.property
|
171
170
|
@pulumi.getter
|
172
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
171
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
173
172
|
"""
|
174
173
|
Policies which should be granted to members of the group
|
175
174
|
"""
|
176
175
|
return pulumi.get(self, "policies")
|
177
176
|
|
178
177
|
@policies.setter
|
179
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
178
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
180
179
|
pulumi.set(self, "policies", value)
|
181
180
|
|
182
181
|
|
@@ -186,10 +185,10 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
186
185
|
def __init__(__self__,
|
187
186
|
resource_name: str,
|
188
187
|
opts: Optional[pulumi.ResourceOptions] = None,
|
189
|
-
backend: Optional[pulumi.Input[
|
190
|
-
groupname: Optional[pulumi.Input[
|
191
|
-
namespace: Optional[pulumi.Input[
|
192
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
188
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
189
|
+
groupname: Optional[pulumi.Input[_builtins.str]] = None,
|
190
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
191
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
193
192
|
__props__=None):
|
194
193
|
"""
|
195
194
|
Provides a resource to create a group in an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
|
@@ -225,15 +224,15 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
225
224
|
|
226
225
|
:param str resource_name: The name of the resource.
|
227
226
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
228
|
-
:param pulumi.Input[
|
227
|
+
:param pulumi.Input[_builtins.str] backend: Path to the authentication backend
|
229
228
|
|
230
229
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
231
|
-
:param pulumi.Input[
|
232
|
-
:param pulumi.Input[
|
230
|
+
:param pulumi.Input[_builtins.str] groupname: The LDAP groupname
|
231
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
233
232
|
The value should not contain leading or trailing forward slashes.
|
234
233
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
235
234
|
*Available only for Vault Enterprise*.
|
236
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
235
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to members of the group
|
237
236
|
"""
|
238
237
|
...
|
239
238
|
@overload
|
@@ -288,10 +287,10 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
288
287
|
def _internal_init(__self__,
|
289
288
|
resource_name: str,
|
290
289
|
opts: Optional[pulumi.ResourceOptions] = None,
|
291
|
-
backend: Optional[pulumi.Input[
|
292
|
-
groupname: Optional[pulumi.Input[
|
293
|
-
namespace: Optional[pulumi.Input[
|
294
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
290
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
291
|
+
groupname: Optional[pulumi.Input[_builtins.str]] = None,
|
292
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
293
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
295
294
|
__props__=None):
|
296
295
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
297
296
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -317,10 +316,10 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
317
316
|
def get(resource_name: str,
|
318
317
|
id: pulumi.Input[str],
|
319
318
|
opts: Optional[pulumi.ResourceOptions] = None,
|
320
|
-
backend: Optional[pulumi.Input[
|
321
|
-
groupname: Optional[pulumi.Input[
|
322
|
-
namespace: Optional[pulumi.Input[
|
323
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
319
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
320
|
+
groupname: Optional[pulumi.Input[_builtins.str]] = None,
|
321
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
322
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'AuthBackendGroup':
|
324
323
|
"""
|
325
324
|
Get an existing AuthBackendGroup resource's state with the given name, id, and optional extra
|
326
325
|
properties used to qualify the lookup.
|
@@ -328,15 +327,15 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
328
327
|
:param str resource_name: The unique name of the resulting resource.
|
329
328
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
330
329
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
331
|
-
:param pulumi.Input[
|
330
|
+
:param pulumi.Input[_builtins.str] backend: Path to the authentication backend
|
332
331
|
|
333
332
|
For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
|
334
|
-
:param pulumi.Input[
|
335
|
-
:param pulumi.Input[
|
333
|
+
:param pulumi.Input[_builtins.str] groupname: The LDAP groupname
|
334
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
336
335
|
The value should not contain leading or trailing forward slashes.
|
337
336
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
338
337
|
*Available only for Vault Enterprise*.
|
339
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
338
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to members of the group
|
340
339
|
"""
|
341
340
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
342
341
|
|
@@ -348,9 +347,9 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
348
347
|
__props__.__dict__["policies"] = policies
|
349
348
|
return AuthBackendGroup(resource_name, opts=opts, __props__=__props__)
|
350
349
|
|
351
|
-
@property
|
350
|
+
@_builtins.property
|
352
351
|
@pulumi.getter
|
353
|
-
def backend(self) -> pulumi.Output[Optional[
|
352
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
354
353
|
"""
|
355
354
|
Path to the authentication backend
|
356
355
|
|
@@ -358,17 +357,17 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
358
357
|
"""
|
359
358
|
return pulumi.get(self, "backend")
|
360
359
|
|
361
|
-
@property
|
360
|
+
@_builtins.property
|
362
361
|
@pulumi.getter
|
363
|
-
def groupname(self) -> pulumi.Output[
|
362
|
+
def groupname(self) -> pulumi.Output[_builtins.str]:
|
364
363
|
"""
|
365
364
|
The LDAP groupname
|
366
365
|
"""
|
367
366
|
return pulumi.get(self, "groupname")
|
368
367
|
|
369
|
-
@property
|
368
|
+
@_builtins.property
|
370
369
|
@pulumi.getter
|
371
|
-
def namespace(self) -> pulumi.Output[Optional[
|
370
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
372
371
|
"""
|
373
372
|
The namespace to provision the resource in.
|
374
373
|
The value should not contain leading or trailing forward slashes.
|
@@ -377,9 +376,9 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
377
376
|
"""
|
378
377
|
return pulumi.get(self, "namespace")
|
379
378
|
|
380
|
-
@property
|
379
|
+
@_builtins.property
|
381
380
|
@pulumi.getter
|
382
|
-
def policies(self) -> pulumi.Output[Sequence[
|
381
|
+
def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
383
382
|
"""
|
384
383
|
Policies which should be granted to members of the group
|
385
384
|
"""
|