pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,19 +19,19 @@ __all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendGroupInitArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
group_name: pulumi.Input[
|
24
|
-
path: pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
26
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
22
|
+
group_name: pulumi.Input[_builtins.str],
|
23
|
+
path: pulumi.Input[_builtins.str],
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
27
26
|
"""
|
28
27
|
The set of arguments for constructing a AuthBackendGroup resource.
|
29
|
-
:param pulumi.Input[
|
30
|
-
:param pulumi.Input[
|
31
|
-
:param pulumi.Input[
|
28
|
+
:param pulumi.Input[_builtins.str] group_name: Name of the group within the Okta
|
29
|
+
:param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
|
30
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
32
31
|
The value should not contain leading or trailing forward slashes.
|
33
32
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
34
33
|
*Available only for Vault Enterprise*.
|
35
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
34
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Vault policies to associate with this group
|
36
35
|
"""
|
37
36
|
pulumi.set(__self__, "group_name", group_name)
|
38
37
|
pulumi.set(__self__, "path", path)
|
@@ -41,33 +40,33 @@ class AuthBackendGroupInitArgs:
|
|
41
40
|
if policies is not None:
|
42
41
|
pulumi.set(__self__, "policies", policies)
|
43
42
|
|
44
|
-
@property
|
43
|
+
@_builtins.property
|
45
44
|
@pulumi.getter(name="groupName")
|
46
|
-
def group_name(self) -> pulumi.Input[
|
45
|
+
def group_name(self) -> pulumi.Input[_builtins.str]:
|
47
46
|
"""
|
48
47
|
Name of the group within the Okta
|
49
48
|
"""
|
50
49
|
return pulumi.get(self, "group_name")
|
51
50
|
|
52
51
|
@group_name.setter
|
53
|
-
def group_name(self, value: pulumi.Input[
|
52
|
+
def group_name(self, value: pulumi.Input[_builtins.str]):
|
54
53
|
pulumi.set(self, "group_name", value)
|
55
54
|
|
56
|
-
@property
|
55
|
+
@_builtins.property
|
57
56
|
@pulumi.getter
|
58
|
-
def path(self) -> pulumi.Input[
|
57
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
59
58
|
"""
|
60
59
|
The path where the Okta auth backend is mounted
|
61
60
|
"""
|
62
61
|
return pulumi.get(self, "path")
|
63
62
|
|
64
63
|
@path.setter
|
65
|
-
def path(self, value: pulumi.Input[
|
64
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
66
65
|
pulumi.set(self, "path", value)
|
67
66
|
|
68
|
-
@property
|
67
|
+
@_builtins.property
|
69
68
|
@pulumi.getter
|
70
|
-
def namespace(self) -> Optional[pulumi.Input[
|
69
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
71
70
|
"""
|
72
71
|
The namespace to provision the resource in.
|
73
72
|
The value should not contain leading or trailing forward slashes.
|
@@ -77,38 +76,38 @@ class AuthBackendGroupInitArgs:
|
|
77
76
|
return pulumi.get(self, "namespace")
|
78
77
|
|
79
78
|
@namespace.setter
|
80
|
-
def namespace(self, value: Optional[pulumi.Input[
|
79
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
81
80
|
pulumi.set(self, "namespace", value)
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter
|
85
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
84
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
86
85
|
"""
|
87
86
|
Vault policies to associate with this group
|
88
87
|
"""
|
89
88
|
return pulumi.get(self, "policies")
|
90
89
|
|
91
90
|
@policies.setter
|
92
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
91
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
93
92
|
pulumi.set(self, "policies", value)
|
94
93
|
|
95
94
|
|
96
95
|
@pulumi.input_type
|
97
96
|
class _AuthBackendGroupState:
|
98
97
|
def __init__(__self__, *,
|
99
|
-
group_name: Optional[pulumi.Input[
|
100
|
-
namespace: Optional[pulumi.Input[
|
101
|
-
path: Optional[pulumi.Input[
|
102
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
98
|
+
group_name: Optional[pulumi.Input[_builtins.str]] = None,
|
99
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
100
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
101
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
103
102
|
"""
|
104
103
|
Input properties used for looking up and filtering AuthBackendGroup resources.
|
105
|
-
:param pulumi.Input[
|
106
|
-
:param pulumi.Input[
|
104
|
+
:param pulumi.Input[_builtins.str] group_name: Name of the group within the Okta
|
105
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
107
106
|
The value should not contain leading or trailing forward slashes.
|
108
107
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
109
108
|
*Available only for Vault Enterprise*.
|
110
|
-
:param pulumi.Input[
|
111
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
109
|
+
:param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
|
110
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Vault policies to associate with this group
|
112
111
|
"""
|
113
112
|
if group_name is not None:
|
114
113
|
pulumi.set(__self__, "group_name", group_name)
|
@@ -119,21 +118,21 @@ class _AuthBackendGroupState:
|
|
119
118
|
if policies is not None:
|
120
119
|
pulumi.set(__self__, "policies", policies)
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter(name="groupName")
|
124
|
-
def group_name(self) -> Optional[pulumi.Input[
|
123
|
+
def group_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
125
124
|
"""
|
126
125
|
Name of the group within the Okta
|
127
126
|
"""
|
128
127
|
return pulumi.get(self, "group_name")
|
129
128
|
|
130
129
|
@group_name.setter
|
131
|
-
def group_name(self, value: Optional[pulumi.Input[
|
130
|
+
def group_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
132
131
|
pulumi.set(self, "group_name", value)
|
133
132
|
|
134
|
-
@property
|
133
|
+
@_builtins.property
|
135
134
|
@pulumi.getter
|
136
|
-
def namespace(self) -> Optional[pulumi.Input[
|
135
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
137
136
|
"""
|
138
137
|
The namespace to provision the resource in.
|
139
138
|
The value should not contain leading or trailing forward slashes.
|
@@ -143,31 +142,31 @@ class _AuthBackendGroupState:
|
|
143
142
|
return pulumi.get(self, "namespace")
|
144
143
|
|
145
144
|
@namespace.setter
|
146
|
-
def namespace(self, value: Optional[pulumi.Input[
|
145
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
147
146
|
pulumi.set(self, "namespace", value)
|
148
147
|
|
149
|
-
@property
|
148
|
+
@_builtins.property
|
150
149
|
@pulumi.getter
|
151
|
-
def path(self) -> Optional[pulumi.Input[
|
150
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
152
151
|
"""
|
153
152
|
The path where the Okta auth backend is mounted
|
154
153
|
"""
|
155
154
|
return pulumi.get(self, "path")
|
156
155
|
|
157
156
|
@path.setter
|
158
|
-
def path(self, value: Optional[pulumi.Input[
|
157
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
159
158
|
pulumi.set(self, "path", value)
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter
|
163
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
162
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
164
163
|
"""
|
165
164
|
Vault policies to associate with this group
|
166
165
|
"""
|
167
166
|
return pulumi.get(self, "policies")
|
168
167
|
|
169
168
|
@policies.setter
|
170
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
169
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
171
170
|
pulumi.set(self, "policies", value)
|
172
171
|
|
173
172
|
|
@@ -177,10 +176,10 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
177
176
|
def __init__(__self__,
|
178
177
|
resource_name: str,
|
179
178
|
opts: Optional[pulumi.ResourceOptions] = None,
|
180
|
-
group_name: Optional[pulumi.Input[
|
181
|
-
namespace: Optional[pulumi.Input[
|
182
|
-
path: Optional[pulumi.Input[
|
183
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
179
|
+
group_name: Optional[pulumi.Input[_builtins.str]] = None,
|
180
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
181
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
182
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
184
183
|
__props__=None):
|
185
184
|
"""
|
186
185
|
Provides a resource to create a group in an
|
@@ -214,13 +213,13 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
214
213
|
|
215
214
|
:param str resource_name: The name of the resource.
|
216
215
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
217
|
-
:param pulumi.Input[
|
218
|
-
:param pulumi.Input[
|
216
|
+
:param pulumi.Input[_builtins.str] group_name: Name of the group within the Okta
|
217
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
219
218
|
The value should not contain leading or trailing forward slashes.
|
220
219
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
221
220
|
*Available only for Vault Enterprise*.
|
222
|
-
:param pulumi.Input[
|
223
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
221
|
+
:param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
|
222
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Vault policies to associate with this group
|
224
223
|
"""
|
225
224
|
...
|
226
225
|
@overload
|
@@ -273,10 +272,10 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
273
272
|
def _internal_init(__self__,
|
274
273
|
resource_name: str,
|
275
274
|
opts: Optional[pulumi.ResourceOptions] = None,
|
276
|
-
group_name: Optional[pulumi.Input[
|
277
|
-
namespace: Optional[pulumi.Input[
|
278
|
-
path: Optional[pulumi.Input[
|
279
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
275
|
+
group_name: Optional[pulumi.Input[_builtins.str]] = None,
|
276
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
277
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
278
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
280
279
|
__props__=None):
|
281
280
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
282
281
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -304,10 +303,10 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
304
303
|
def get(resource_name: str,
|
305
304
|
id: pulumi.Input[str],
|
306
305
|
opts: Optional[pulumi.ResourceOptions] = None,
|
307
|
-
group_name: Optional[pulumi.Input[
|
308
|
-
namespace: Optional[pulumi.Input[
|
309
|
-
path: Optional[pulumi.Input[
|
310
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
306
|
+
group_name: Optional[pulumi.Input[_builtins.str]] = None,
|
307
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
308
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
309
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'AuthBackendGroup':
|
311
310
|
"""
|
312
311
|
Get an existing AuthBackendGroup resource's state with the given name, id, and optional extra
|
313
312
|
properties used to qualify the lookup.
|
@@ -315,13 +314,13 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
315
314
|
:param str resource_name: The unique name of the resulting resource.
|
316
315
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
317
316
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
318
|
-
:param pulumi.Input[
|
319
|
-
:param pulumi.Input[
|
317
|
+
:param pulumi.Input[_builtins.str] group_name: Name of the group within the Okta
|
318
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
320
319
|
The value should not contain leading or trailing forward slashes.
|
321
320
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
322
321
|
*Available only for Vault Enterprise*.
|
323
|
-
:param pulumi.Input[
|
324
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
322
|
+
:param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
|
323
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Vault policies to associate with this group
|
325
324
|
"""
|
326
325
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
327
326
|
|
@@ -333,17 +332,17 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
333
332
|
__props__.__dict__["policies"] = policies
|
334
333
|
return AuthBackendGroup(resource_name, opts=opts, __props__=__props__)
|
335
334
|
|
336
|
-
@property
|
335
|
+
@_builtins.property
|
337
336
|
@pulumi.getter(name="groupName")
|
338
|
-
def group_name(self) -> pulumi.Output[
|
337
|
+
def group_name(self) -> pulumi.Output[_builtins.str]:
|
339
338
|
"""
|
340
339
|
Name of the group within the Okta
|
341
340
|
"""
|
342
341
|
return pulumi.get(self, "group_name")
|
343
342
|
|
344
|
-
@property
|
343
|
+
@_builtins.property
|
345
344
|
@pulumi.getter
|
346
|
-
def namespace(self) -> pulumi.Output[Optional[
|
345
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
347
346
|
"""
|
348
347
|
The namespace to provision the resource in.
|
349
348
|
The value should not contain leading or trailing forward slashes.
|
@@ -352,17 +351,17 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
352
351
|
"""
|
353
352
|
return pulumi.get(self, "namespace")
|
354
353
|
|
355
|
-
@property
|
354
|
+
@_builtins.property
|
356
355
|
@pulumi.getter
|
357
|
-
def path(self) -> pulumi.Output[
|
356
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
358
357
|
"""
|
359
358
|
The path where the Okta auth backend is mounted
|
360
359
|
"""
|
361
360
|
return pulumi.get(self, "path")
|
362
361
|
|
363
|
-
@property
|
362
|
+
@_builtins.property
|
364
363
|
@pulumi.getter
|
365
|
-
def policies(self) -> pulumi.Output[Optional[Sequence[
|
364
|
+
def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
366
365
|
"""
|
367
366
|
Vault policies to associate with this group
|
368
367
|
"""
|