pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,386 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendGroupArgs:
21
+ def __init__(__self__, *,
22
+ groupname: pulumi.Input[_builtins.str],
23
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
26
+ """
27
+ The set of arguments for constructing a AuthBackendGroup resource.
28
+ :param pulumi.Input[_builtins.str] groupname: The LDAP groupname
29
+ :param pulumi.Input[_builtins.str] backend: Path to the authentication backend
30
+
31
+ For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
32
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
33
+ The value should not contain leading or trailing forward slashes.
34
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
+ *Available only for Vault Enterprise*.
36
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to members of the group
37
+ """
38
+ pulumi.set(__self__, "groupname", groupname)
39
+ if backend is not None:
40
+ pulumi.set(__self__, "backend", backend)
41
+ if namespace is not None:
42
+ pulumi.set(__self__, "namespace", namespace)
43
+ if policies is not None:
44
+ pulumi.set(__self__, "policies", policies)
45
+
46
+ @_builtins.property
47
+ @pulumi.getter
48
+ def groupname(self) -> pulumi.Input[_builtins.str]:
49
+ """
50
+ The LDAP groupname
51
+ """
52
+ return pulumi.get(self, "groupname")
53
+
54
+ @groupname.setter
55
+ def groupname(self, value: pulumi.Input[_builtins.str]):
56
+ pulumi.set(self, "groupname", value)
57
+
58
+ @_builtins.property
59
+ @pulumi.getter
60
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
61
+ """
62
+ Path to the authentication backend
63
+
64
+ For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
65
+ """
66
+ return pulumi.get(self, "backend")
67
+
68
+ @backend.setter
69
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
70
+ pulumi.set(self, "backend", value)
71
+
72
+ @_builtins.property
73
+ @pulumi.getter
74
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
75
+ """
76
+ The namespace to provision the resource in.
77
+ The value should not contain leading or trailing forward slashes.
78
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
79
+ *Available only for Vault Enterprise*.
80
+ """
81
+ return pulumi.get(self, "namespace")
82
+
83
+ @namespace.setter
84
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
85
+ pulumi.set(self, "namespace", value)
86
+
87
+ @_builtins.property
88
+ @pulumi.getter
89
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
90
+ """
91
+ Policies which should be granted to members of the group
92
+ """
93
+ return pulumi.get(self, "policies")
94
+
95
+ @policies.setter
96
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
97
+ pulumi.set(self, "policies", value)
98
+
99
+
100
+ @pulumi.input_type
101
+ class _AuthBackendGroupState:
102
+ def __init__(__self__, *,
103
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
104
+ groupname: Optional[pulumi.Input[_builtins.str]] = None,
105
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
106
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
107
+ """
108
+ Input properties used for looking up and filtering AuthBackendGroup resources.
109
+ :param pulumi.Input[_builtins.str] backend: Path to the authentication backend
110
+
111
+ For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
112
+ :param pulumi.Input[_builtins.str] groupname: The LDAP groupname
113
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
114
+ The value should not contain leading or trailing forward slashes.
115
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
116
+ *Available only for Vault Enterprise*.
117
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to members of the group
118
+ """
119
+ if backend is not None:
120
+ pulumi.set(__self__, "backend", backend)
121
+ if groupname is not None:
122
+ pulumi.set(__self__, "groupname", groupname)
123
+ if namespace is not None:
124
+ pulumi.set(__self__, "namespace", namespace)
125
+ if policies is not None:
126
+ pulumi.set(__self__, "policies", policies)
127
+
128
+ @_builtins.property
129
+ @pulumi.getter
130
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
131
+ """
132
+ Path to the authentication backend
133
+
134
+ For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
135
+ """
136
+ return pulumi.get(self, "backend")
137
+
138
+ @backend.setter
139
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
140
+ pulumi.set(self, "backend", value)
141
+
142
+ @_builtins.property
143
+ @pulumi.getter
144
+ def groupname(self) -> Optional[pulumi.Input[_builtins.str]]:
145
+ """
146
+ The LDAP groupname
147
+ """
148
+ return pulumi.get(self, "groupname")
149
+
150
+ @groupname.setter
151
+ def groupname(self, value: Optional[pulumi.Input[_builtins.str]]):
152
+ pulumi.set(self, "groupname", value)
153
+
154
+ @_builtins.property
155
+ @pulumi.getter
156
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
157
+ """
158
+ The namespace to provision the resource in.
159
+ The value should not contain leading or trailing forward slashes.
160
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
161
+ *Available only for Vault Enterprise*.
162
+ """
163
+ return pulumi.get(self, "namespace")
164
+
165
+ @namespace.setter
166
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
167
+ pulumi.set(self, "namespace", value)
168
+
169
+ @_builtins.property
170
+ @pulumi.getter
171
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
172
+ """
173
+ Policies which should be granted to members of the group
174
+ """
175
+ return pulumi.get(self, "policies")
176
+
177
+ @policies.setter
178
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
179
+ pulumi.set(self, "policies", value)
180
+
181
+
182
+ @pulumi.type_token("vault:ldap/authBackendGroup:AuthBackendGroup")
183
+ class AuthBackendGroup(pulumi.CustomResource):
184
+ @overload
185
+ def __init__(__self__,
186
+ resource_name: str,
187
+ opts: Optional[pulumi.ResourceOptions] = None,
188
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
189
+ groupname: Optional[pulumi.Input[_builtins.str]] = None,
190
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
191
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
192
+ __props__=None):
193
+ """
194
+ Provides a resource to create a group in an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
195
+
196
+ ## Example Usage
197
+
198
+ ```python
199
+ import pulumi
200
+ import pulumi_vault as vault
201
+
202
+ ldap = vault.ldap.AuthBackend("ldap",
203
+ path="ldap",
204
+ url="ldaps://dc-01.example.org",
205
+ userdn="OU=Users,OU=Accounts,DC=example,DC=org",
206
+ userattr="sAMAccountName",
207
+ upndomain="EXAMPLE.ORG",
208
+ discoverdn=False,
209
+ groupdn="OU=Groups,DC=example,DC=org",
210
+ groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
211
+ group = vault.ldap.AuthBackendGroup("group",
212
+ groupname="dba",
213
+ policies=["dba"],
214
+ backend=ldap.path)
215
+ ```
216
+
217
+ ## Import
218
+
219
+ LDAP authentication backend groups can be imported using the `path`, e.g.
220
+
221
+ ```sh
222
+ $ pulumi import vault:ldap/authBackendGroup:AuthBackendGroup foo auth/ldap/groups/foo
223
+ ```
224
+
225
+ :param str resource_name: The name of the resource.
226
+ :param pulumi.ResourceOptions opts: Options for the resource.
227
+ :param pulumi.Input[_builtins.str] backend: Path to the authentication backend
228
+
229
+ For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
230
+ :param pulumi.Input[_builtins.str] groupname: The LDAP groupname
231
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
232
+ The value should not contain leading or trailing forward slashes.
233
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
234
+ *Available only for Vault Enterprise*.
235
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to members of the group
236
+ """
237
+ ...
238
+ @overload
239
+ def __init__(__self__,
240
+ resource_name: str,
241
+ args: AuthBackendGroupArgs,
242
+ opts: Optional[pulumi.ResourceOptions] = None):
243
+ """
244
+ Provides a resource to create a group in an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
245
+
246
+ ## Example Usage
247
+
248
+ ```python
249
+ import pulumi
250
+ import pulumi_vault as vault
251
+
252
+ ldap = vault.ldap.AuthBackend("ldap",
253
+ path="ldap",
254
+ url="ldaps://dc-01.example.org",
255
+ userdn="OU=Users,OU=Accounts,DC=example,DC=org",
256
+ userattr="sAMAccountName",
257
+ upndomain="EXAMPLE.ORG",
258
+ discoverdn=False,
259
+ groupdn="OU=Groups,DC=example,DC=org",
260
+ groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
261
+ group = vault.ldap.AuthBackendGroup("group",
262
+ groupname="dba",
263
+ policies=["dba"],
264
+ backend=ldap.path)
265
+ ```
266
+
267
+ ## Import
268
+
269
+ LDAP authentication backend groups can be imported using the `path`, e.g.
270
+
271
+ ```sh
272
+ $ pulumi import vault:ldap/authBackendGroup:AuthBackendGroup foo auth/ldap/groups/foo
273
+ ```
274
+
275
+ :param str resource_name: The name of the resource.
276
+ :param AuthBackendGroupArgs args: The arguments to use to populate this resource's properties.
277
+ :param pulumi.ResourceOptions opts: Options for the resource.
278
+ """
279
+ ...
280
+ def __init__(__self__, resource_name: str, *args, **kwargs):
281
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendGroupArgs, pulumi.ResourceOptions, *args, **kwargs)
282
+ if resource_args is not None:
283
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
284
+ else:
285
+ __self__._internal_init(resource_name, *args, **kwargs)
286
+
287
+ def _internal_init(__self__,
288
+ resource_name: str,
289
+ opts: Optional[pulumi.ResourceOptions] = None,
290
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
291
+ groupname: Optional[pulumi.Input[_builtins.str]] = None,
292
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
293
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
294
+ __props__=None):
295
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
296
+ if not isinstance(opts, pulumi.ResourceOptions):
297
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
298
+ if opts.id is None:
299
+ if __props__ is not None:
300
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
301
+ __props__ = AuthBackendGroupArgs.__new__(AuthBackendGroupArgs)
302
+
303
+ __props__.__dict__["backend"] = backend
304
+ if groupname is None and not opts.urn:
305
+ raise TypeError("Missing required property 'groupname'")
306
+ __props__.__dict__["groupname"] = groupname
307
+ __props__.__dict__["namespace"] = namespace
308
+ __props__.__dict__["policies"] = policies
309
+ super(AuthBackendGroup, __self__).__init__(
310
+ 'vault:ldap/authBackendGroup:AuthBackendGroup',
311
+ resource_name,
312
+ __props__,
313
+ opts)
314
+
315
+ @staticmethod
316
+ def get(resource_name: str,
317
+ id: pulumi.Input[str],
318
+ opts: Optional[pulumi.ResourceOptions] = None,
319
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
320
+ groupname: Optional[pulumi.Input[_builtins.str]] = None,
321
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
322
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'AuthBackendGroup':
323
+ """
324
+ Get an existing AuthBackendGroup resource's state with the given name, id, and optional extra
325
+ properties used to qualify the lookup.
326
+
327
+ :param str resource_name: The unique name of the resulting resource.
328
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
329
+ :param pulumi.ResourceOptions opts: Options for the resource.
330
+ :param pulumi.Input[_builtins.str] backend: Path to the authentication backend
331
+
332
+ For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
333
+ :param pulumi.Input[_builtins.str] groupname: The LDAP groupname
334
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
335
+ The value should not contain leading or trailing forward slashes.
336
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
337
+ *Available only for Vault Enterprise*.
338
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to members of the group
339
+ """
340
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
341
+
342
+ __props__ = _AuthBackendGroupState.__new__(_AuthBackendGroupState)
343
+
344
+ __props__.__dict__["backend"] = backend
345
+ __props__.__dict__["groupname"] = groupname
346
+ __props__.__dict__["namespace"] = namespace
347
+ __props__.__dict__["policies"] = policies
348
+ return AuthBackendGroup(resource_name, opts=opts, __props__=__props__)
349
+
350
+ @_builtins.property
351
+ @pulumi.getter
352
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
353
+ """
354
+ Path to the authentication backend
355
+
356
+ For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
357
+ """
358
+ return pulumi.get(self, "backend")
359
+
360
+ @_builtins.property
361
+ @pulumi.getter
362
+ def groupname(self) -> pulumi.Output[_builtins.str]:
363
+ """
364
+ The LDAP groupname
365
+ """
366
+ return pulumi.get(self, "groupname")
367
+
368
+ @_builtins.property
369
+ @pulumi.getter
370
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
371
+ """
372
+ The namespace to provision the resource in.
373
+ The value should not contain leading or trailing forward slashes.
374
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
375
+ *Available only for Vault Enterprise*.
376
+ """
377
+ return pulumi.get(self, "namespace")
378
+
379
+ @_builtins.property
380
+ @pulumi.getter
381
+ def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
382
+ """
383
+ Policies which should be granted to members of the group
384
+ """
385
+ return pulumi.get(self, "policies")
386
+