pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,14 +19,14 @@ __all__ = ['OidcKeyAllowedClientIDArgs', 'OidcKeyAllowedClientID']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class OidcKeyAllowedClientIDArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
allowed_client_id: pulumi.Input[
|
24
|
-
key_name: pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
allowed_client_id: pulumi.Input[_builtins.str],
|
23
|
+
key_name: pulumi.Input[_builtins.str],
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
26
25
|
"""
|
27
26
|
The set of arguments for constructing a OidcKeyAllowedClientID resource.
|
28
|
-
:param pulumi.Input[
|
29
|
-
:param pulumi.Input[
|
30
|
-
:param pulumi.Input[
|
27
|
+
:param pulumi.Input[_builtins.str] allowed_client_id: Client ID to allow usage with the OIDC named key
|
28
|
+
:param pulumi.Input[_builtins.str] key_name: Name of the OIDC Key allow the Client ID.
|
29
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
31
30
|
The value should not contain leading or trailing forward slashes.
|
32
31
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
32
|
*Available only for Vault Enterprise*.
|
@@ -37,33 +36,33 @@ class OidcKeyAllowedClientIDArgs:
|
|
37
36
|
if namespace is not None:
|
38
37
|
pulumi.set(__self__, "namespace", namespace)
|
39
38
|
|
40
|
-
@property
|
39
|
+
@_builtins.property
|
41
40
|
@pulumi.getter(name="allowedClientId")
|
42
|
-
def allowed_client_id(self) -> pulumi.Input[
|
41
|
+
def allowed_client_id(self) -> pulumi.Input[_builtins.str]:
|
43
42
|
"""
|
44
43
|
Client ID to allow usage with the OIDC named key
|
45
44
|
"""
|
46
45
|
return pulumi.get(self, "allowed_client_id")
|
47
46
|
|
48
47
|
@allowed_client_id.setter
|
49
|
-
def allowed_client_id(self, value: pulumi.Input[
|
48
|
+
def allowed_client_id(self, value: pulumi.Input[_builtins.str]):
|
50
49
|
pulumi.set(self, "allowed_client_id", value)
|
51
50
|
|
52
|
-
@property
|
51
|
+
@_builtins.property
|
53
52
|
@pulumi.getter(name="keyName")
|
54
|
-
def key_name(self) -> pulumi.Input[
|
53
|
+
def key_name(self) -> pulumi.Input[_builtins.str]:
|
55
54
|
"""
|
56
55
|
Name of the OIDC Key allow the Client ID.
|
57
56
|
"""
|
58
57
|
return pulumi.get(self, "key_name")
|
59
58
|
|
60
59
|
@key_name.setter
|
61
|
-
def key_name(self, value: pulumi.Input[
|
60
|
+
def key_name(self, value: pulumi.Input[_builtins.str]):
|
62
61
|
pulumi.set(self, "key_name", value)
|
63
62
|
|
64
|
-
@property
|
63
|
+
@_builtins.property
|
65
64
|
@pulumi.getter
|
66
|
-
def namespace(self) -> Optional[pulumi.Input[
|
65
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
67
66
|
"""
|
68
67
|
The namespace to provision the resource in.
|
69
68
|
The value should not contain leading or trailing forward slashes.
|
@@ -73,21 +72,21 @@ class OidcKeyAllowedClientIDArgs:
|
|
73
72
|
return pulumi.get(self, "namespace")
|
74
73
|
|
75
74
|
@namespace.setter
|
76
|
-
def namespace(self, value: Optional[pulumi.Input[
|
75
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
77
76
|
pulumi.set(self, "namespace", value)
|
78
77
|
|
79
78
|
|
80
79
|
@pulumi.input_type
|
81
80
|
class _OidcKeyAllowedClientIDState:
|
82
81
|
def __init__(__self__, *,
|
83
|
-
allowed_client_id: Optional[pulumi.Input[
|
84
|
-
key_name: Optional[pulumi.Input[
|
85
|
-
namespace: Optional[pulumi.Input[
|
82
|
+
allowed_client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
83
|
+
key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
84
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
86
85
|
"""
|
87
86
|
Input properties used for looking up and filtering OidcKeyAllowedClientID resources.
|
88
|
-
:param pulumi.Input[
|
89
|
-
:param pulumi.Input[
|
90
|
-
:param pulumi.Input[
|
87
|
+
:param pulumi.Input[_builtins.str] allowed_client_id: Client ID to allow usage with the OIDC named key
|
88
|
+
:param pulumi.Input[_builtins.str] key_name: Name of the OIDC Key allow the Client ID.
|
89
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
91
90
|
The value should not contain leading or trailing forward slashes.
|
92
91
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
93
92
|
*Available only for Vault Enterprise*.
|
@@ -99,33 +98,33 @@ class _OidcKeyAllowedClientIDState:
|
|
99
98
|
if namespace is not None:
|
100
99
|
pulumi.set(__self__, "namespace", namespace)
|
101
100
|
|
102
|
-
@property
|
101
|
+
@_builtins.property
|
103
102
|
@pulumi.getter(name="allowedClientId")
|
104
|
-
def allowed_client_id(self) -> Optional[pulumi.Input[
|
103
|
+
def allowed_client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
105
104
|
"""
|
106
105
|
Client ID to allow usage with the OIDC named key
|
107
106
|
"""
|
108
107
|
return pulumi.get(self, "allowed_client_id")
|
109
108
|
|
110
109
|
@allowed_client_id.setter
|
111
|
-
def allowed_client_id(self, value: Optional[pulumi.Input[
|
110
|
+
def allowed_client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
112
111
|
pulumi.set(self, "allowed_client_id", value)
|
113
112
|
|
114
|
-
@property
|
113
|
+
@_builtins.property
|
115
114
|
@pulumi.getter(name="keyName")
|
116
|
-
def key_name(self) -> Optional[pulumi.Input[
|
115
|
+
def key_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
117
116
|
"""
|
118
117
|
Name of the OIDC Key allow the Client ID.
|
119
118
|
"""
|
120
119
|
return pulumi.get(self, "key_name")
|
121
120
|
|
122
121
|
@key_name.setter
|
123
|
-
def key_name(self, value: Optional[pulumi.Input[
|
122
|
+
def key_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
124
123
|
pulumi.set(self, "key_name", value)
|
125
124
|
|
126
|
-
@property
|
125
|
+
@_builtins.property
|
127
126
|
@pulumi.getter
|
128
|
-
def namespace(self) -> Optional[pulumi.Input[
|
127
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
129
128
|
"""
|
130
129
|
The namespace to provision the resource in.
|
131
130
|
The value should not contain leading or trailing forward slashes.
|
@@ -135,7 +134,7 @@ class _OidcKeyAllowedClientIDState:
|
|
135
134
|
return pulumi.get(self, "namespace")
|
136
135
|
|
137
136
|
@namespace.setter
|
138
|
-
def namespace(self, value: Optional[pulumi.Input[
|
137
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
139
138
|
pulumi.set(self, "namespace", value)
|
140
139
|
|
141
140
|
|
@@ -145,9 +144,9 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
145
144
|
def __init__(__self__,
|
146
145
|
resource_name: str,
|
147
146
|
opts: Optional[pulumi.ResourceOptions] = None,
|
148
|
-
allowed_client_id: Optional[pulumi.Input[
|
149
|
-
key_name: Optional[pulumi.Input[
|
150
|
-
namespace: Optional[pulumi.Input[
|
147
|
+
allowed_client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
148
|
+
key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
149
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
151
150
|
__props__=None):
|
152
151
|
"""
|
153
152
|
## Example Usage
|
@@ -169,9 +168,9 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
169
168
|
|
170
169
|
:param str resource_name: The name of the resource.
|
171
170
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
172
|
-
:param pulumi.Input[
|
173
|
-
:param pulumi.Input[
|
174
|
-
:param pulumi.Input[
|
171
|
+
:param pulumi.Input[_builtins.str] allowed_client_id: Client ID to allow usage with the OIDC named key
|
172
|
+
:param pulumi.Input[_builtins.str] key_name: Name of the OIDC Key allow the Client ID.
|
173
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
175
174
|
The value should not contain leading or trailing forward slashes.
|
176
175
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
177
176
|
*Available only for Vault Enterprise*.
|
@@ -215,9 +214,9 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
215
214
|
def _internal_init(__self__,
|
216
215
|
resource_name: str,
|
217
216
|
opts: Optional[pulumi.ResourceOptions] = None,
|
218
|
-
allowed_client_id: Optional[pulumi.Input[
|
219
|
-
key_name: Optional[pulumi.Input[
|
220
|
-
namespace: Optional[pulumi.Input[
|
217
|
+
allowed_client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
218
|
+
key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
219
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
221
220
|
__props__=None):
|
222
221
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
223
222
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -244,9 +243,9 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
244
243
|
def get(resource_name: str,
|
245
244
|
id: pulumi.Input[str],
|
246
245
|
opts: Optional[pulumi.ResourceOptions] = None,
|
247
|
-
allowed_client_id: Optional[pulumi.Input[
|
248
|
-
key_name: Optional[pulumi.Input[
|
249
|
-
namespace: Optional[pulumi.Input[
|
246
|
+
allowed_client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
247
|
+
key_name: Optional[pulumi.Input[_builtins.str]] = None,
|
248
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'OidcKeyAllowedClientID':
|
250
249
|
"""
|
251
250
|
Get an existing OidcKeyAllowedClientID resource's state with the given name, id, and optional extra
|
252
251
|
properties used to qualify the lookup.
|
@@ -254,9 +253,9 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
254
253
|
:param str resource_name: The unique name of the resulting resource.
|
255
254
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
256
255
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
257
|
-
:param pulumi.Input[
|
258
|
-
:param pulumi.Input[
|
259
|
-
:param pulumi.Input[
|
256
|
+
:param pulumi.Input[_builtins.str] allowed_client_id: Client ID to allow usage with the OIDC named key
|
257
|
+
:param pulumi.Input[_builtins.str] key_name: Name of the OIDC Key allow the Client ID.
|
258
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
260
259
|
The value should not contain leading or trailing forward slashes.
|
261
260
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
262
261
|
*Available only for Vault Enterprise*.
|
@@ -270,25 +269,25 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
270
269
|
__props__.__dict__["namespace"] = namespace
|
271
270
|
return OidcKeyAllowedClientID(resource_name, opts=opts, __props__=__props__)
|
272
271
|
|
273
|
-
@property
|
272
|
+
@_builtins.property
|
274
273
|
@pulumi.getter(name="allowedClientId")
|
275
|
-
def allowed_client_id(self) -> pulumi.Output[
|
274
|
+
def allowed_client_id(self) -> pulumi.Output[_builtins.str]:
|
276
275
|
"""
|
277
276
|
Client ID to allow usage with the OIDC named key
|
278
277
|
"""
|
279
278
|
return pulumi.get(self, "allowed_client_id")
|
280
279
|
|
281
|
-
@property
|
280
|
+
@_builtins.property
|
282
281
|
@pulumi.getter(name="keyName")
|
283
|
-
def key_name(self) -> pulumi.Output[
|
282
|
+
def key_name(self) -> pulumi.Output[_builtins.str]:
|
284
283
|
"""
|
285
284
|
Name of the OIDC Key allow the Client ID.
|
286
285
|
"""
|
287
286
|
return pulumi.get(self, "key_name")
|
288
287
|
|
289
|
-
@property
|
288
|
+
@_builtins.property
|
290
289
|
@pulumi.getter
|
291
|
-
def namespace(self) -> pulumi.Output[Optional[
|
290
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
292
291
|
"""
|
293
292
|
The namespace to provision the resource in.
|
294
293
|
The value should not contain leading or trailing forward slashes.
|