pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,447 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['EntityArgs', 'Entity']
18
+
19
+ @pulumi.input_type
20
+ class EntityArgs:
21
+ def __init__(__self__, *,
22
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
23
+ external_policies: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
25
+ name: Optional[pulumi.Input[_builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
27
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
28
+ """
29
+ The set of arguments for constructing a Entity resource.
30
+ :param pulumi.Input[_builtins.bool] disabled: True/false Is this entity currently disabled. Defaults to `false`
31
+ :param pulumi.Input[_builtins.bool] external_policies: `false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
32
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: A Map of additional metadata to associate with the user.
33
+ :param pulumi.Input[_builtins.str] name: Name of the identity entity to create.
34
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
35
+ The value should not contain leading or trailing forward slashes.
36
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
37
+ *Available only for Vault Enterprise*.
38
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies to apply to the entity.
39
+ """
40
+ if disabled is not None:
41
+ pulumi.set(__self__, "disabled", disabled)
42
+ if external_policies is not None:
43
+ pulumi.set(__self__, "external_policies", external_policies)
44
+ if metadata is not None:
45
+ pulumi.set(__self__, "metadata", metadata)
46
+ if name is not None:
47
+ pulumi.set(__self__, "name", name)
48
+ if namespace is not None:
49
+ pulumi.set(__self__, "namespace", namespace)
50
+ if policies is not None:
51
+ pulumi.set(__self__, "policies", policies)
52
+
53
+ @_builtins.property
54
+ @pulumi.getter
55
+ def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
56
+ """
57
+ True/false Is this entity currently disabled. Defaults to `false`
58
+ """
59
+ return pulumi.get(self, "disabled")
60
+
61
+ @disabled.setter
62
+ def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
63
+ pulumi.set(self, "disabled", value)
64
+
65
+ @_builtins.property
66
+ @pulumi.getter(name="externalPolicies")
67
+ def external_policies(self) -> Optional[pulumi.Input[_builtins.bool]]:
68
+ """
69
+ `false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
70
+ """
71
+ return pulumi.get(self, "external_policies")
72
+
73
+ @external_policies.setter
74
+ def external_policies(self, value: Optional[pulumi.Input[_builtins.bool]]):
75
+ pulumi.set(self, "external_policies", value)
76
+
77
+ @_builtins.property
78
+ @pulumi.getter
79
+ def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
80
+ """
81
+ A Map of additional metadata to associate with the user.
82
+ """
83
+ return pulumi.get(self, "metadata")
84
+
85
+ @metadata.setter
86
+ def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
87
+ pulumi.set(self, "metadata", value)
88
+
89
+ @_builtins.property
90
+ @pulumi.getter
91
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
92
+ """
93
+ Name of the identity entity to create.
94
+ """
95
+ return pulumi.get(self, "name")
96
+
97
+ @name.setter
98
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
99
+ pulumi.set(self, "name", value)
100
+
101
+ @_builtins.property
102
+ @pulumi.getter
103
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
104
+ """
105
+ The namespace to provision the resource in.
106
+ The value should not contain leading or trailing forward slashes.
107
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
108
+ *Available only for Vault Enterprise*.
109
+ """
110
+ return pulumi.get(self, "namespace")
111
+
112
+ @namespace.setter
113
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
114
+ pulumi.set(self, "namespace", value)
115
+
116
+ @_builtins.property
117
+ @pulumi.getter
118
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
119
+ """
120
+ A list of policies to apply to the entity.
121
+ """
122
+ return pulumi.get(self, "policies")
123
+
124
+ @policies.setter
125
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
126
+ pulumi.set(self, "policies", value)
127
+
128
+
129
+ @pulumi.input_type
130
+ class _EntityState:
131
+ def __init__(__self__, *,
132
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
133
+ external_policies: Optional[pulumi.Input[_builtins.bool]] = None,
134
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
135
+ name: Optional[pulumi.Input[_builtins.str]] = None,
136
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
137
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
138
+ """
139
+ Input properties used for looking up and filtering Entity resources.
140
+ :param pulumi.Input[_builtins.bool] disabled: True/false Is this entity currently disabled. Defaults to `false`
141
+ :param pulumi.Input[_builtins.bool] external_policies: `false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
142
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: A Map of additional metadata to associate with the user.
143
+ :param pulumi.Input[_builtins.str] name: Name of the identity entity to create.
144
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
145
+ The value should not contain leading or trailing forward slashes.
146
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
147
+ *Available only for Vault Enterprise*.
148
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies to apply to the entity.
149
+ """
150
+ if disabled is not None:
151
+ pulumi.set(__self__, "disabled", disabled)
152
+ if external_policies is not None:
153
+ pulumi.set(__self__, "external_policies", external_policies)
154
+ if metadata is not None:
155
+ pulumi.set(__self__, "metadata", metadata)
156
+ if name is not None:
157
+ pulumi.set(__self__, "name", name)
158
+ if namespace is not None:
159
+ pulumi.set(__self__, "namespace", namespace)
160
+ if policies is not None:
161
+ pulumi.set(__self__, "policies", policies)
162
+
163
+ @_builtins.property
164
+ @pulumi.getter
165
+ def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
166
+ """
167
+ True/false Is this entity currently disabled. Defaults to `false`
168
+ """
169
+ return pulumi.get(self, "disabled")
170
+
171
+ @disabled.setter
172
+ def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
173
+ pulumi.set(self, "disabled", value)
174
+
175
+ @_builtins.property
176
+ @pulumi.getter(name="externalPolicies")
177
+ def external_policies(self) -> Optional[pulumi.Input[_builtins.bool]]:
178
+ """
179
+ `false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
180
+ """
181
+ return pulumi.get(self, "external_policies")
182
+
183
+ @external_policies.setter
184
+ def external_policies(self, value: Optional[pulumi.Input[_builtins.bool]]):
185
+ pulumi.set(self, "external_policies", value)
186
+
187
+ @_builtins.property
188
+ @pulumi.getter
189
+ def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
190
+ """
191
+ A Map of additional metadata to associate with the user.
192
+ """
193
+ return pulumi.get(self, "metadata")
194
+
195
+ @metadata.setter
196
+ def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
197
+ pulumi.set(self, "metadata", value)
198
+
199
+ @_builtins.property
200
+ @pulumi.getter
201
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
202
+ """
203
+ Name of the identity entity to create.
204
+ """
205
+ return pulumi.get(self, "name")
206
+
207
+ @name.setter
208
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
209
+ pulumi.set(self, "name", value)
210
+
211
+ @_builtins.property
212
+ @pulumi.getter
213
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
214
+ """
215
+ The namespace to provision the resource in.
216
+ The value should not contain leading or trailing forward slashes.
217
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
218
+ *Available only for Vault Enterprise*.
219
+ """
220
+ return pulumi.get(self, "namespace")
221
+
222
+ @namespace.setter
223
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
224
+ pulumi.set(self, "namespace", value)
225
+
226
+ @_builtins.property
227
+ @pulumi.getter
228
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
229
+ """
230
+ A list of policies to apply to the entity.
231
+ """
232
+ return pulumi.get(self, "policies")
233
+
234
+ @policies.setter
235
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
236
+ pulumi.set(self, "policies", value)
237
+
238
+
239
+ @pulumi.type_token("vault:identity/entity:Entity")
240
+ class Entity(pulumi.CustomResource):
241
+ @overload
242
+ def __init__(__self__,
243
+ resource_name: str,
244
+ opts: Optional[pulumi.ResourceOptions] = None,
245
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
246
+ external_policies: Optional[pulumi.Input[_builtins.bool]] = None,
247
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
248
+ name: Optional[pulumi.Input[_builtins.str]] = None,
249
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
250
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
251
+ __props__=None):
252
+ """
253
+ ## Example Usage
254
+
255
+ ```python
256
+ import pulumi
257
+ import pulumi_vault as vault
258
+
259
+ test = vault.identity.Entity("test",
260
+ name="tester1",
261
+ policies=["test"],
262
+ metadata={
263
+ "foo": "bar",
264
+ })
265
+ ```
266
+
267
+ ## Import
268
+
269
+ Identity entity can be imported using the `id`, e.g.
270
+
271
+ ```sh
272
+ $ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
273
+ ```
274
+
275
+ :param str resource_name: The name of the resource.
276
+ :param pulumi.ResourceOptions opts: Options for the resource.
277
+ :param pulumi.Input[_builtins.bool] disabled: True/false Is this entity currently disabled. Defaults to `false`
278
+ :param pulumi.Input[_builtins.bool] external_policies: `false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
279
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: A Map of additional metadata to associate with the user.
280
+ :param pulumi.Input[_builtins.str] name: Name of the identity entity to create.
281
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
282
+ The value should not contain leading or trailing forward slashes.
283
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
284
+ *Available only for Vault Enterprise*.
285
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies to apply to the entity.
286
+ """
287
+ ...
288
+ @overload
289
+ def __init__(__self__,
290
+ resource_name: str,
291
+ args: Optional[EntityArgs] = None,
292
+ opts: Optional[pulumi.ResourceOptions] = None):
293
+ """
294
+ ## Example Usage
295
+
296
+ ```python
297
+ import pulumi
298
+ import pulumi_vault as vault
299
+
300
+ test = vault.identity.Entity("test",
301
+ name="tester1",
302
+ policies=["test"],
303
+ metadata={
304
+ "foo": "bar",
305
+ })
306
+ ```
307
+
308
+ ## Import
309
+
310
+ Identity entity can be imported using the `id`, e.g.
311
+
312
+ ```sh
313
+ $ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
314
+ ```
315
+
316
+ :param str resource_name: The name of the resource.
317
+ :param EntityArgs args: The arguments to use to populate this resource's properties.
318
+ :param pulumi.ResourceOptions opts: Options for the resource.
319
+ """
320
+ ...
321
+ def __init__(__self__, resource_name: str, *args, **kwargs):
322
+ resource_args, opts = _utilities.get_resource_args_opts(EntityArgs, pulumi.ResourceOptions, *args, **kwargs)
323
+ if resource_args is not None:
324
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
325
+ else:
326
+ __self__._internal_init(resource_name, *args, **kwargs)
327
+
328
+ def _internal_init(__self__,
329
+ resource_name: str,
330
+ opts: Optional[pulumi.ResourceOptions] = None,
331
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
332
+ external_policies: Optional[pulumi.Input[_builtins.bool]] = None,
333
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
334
+ name: Optional[pulumi.Input[_builtins.str]] = None,
335
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
336
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
337
+ __props__=None):
338
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
339
+ if not isinstance(opts, pulumi.ResourceOptions):
340
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
341
+ if opts.id is None:
342
+ if __props__ is not None:
343
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
344
+ __props__ = EntityArgs.__new__(EntityArgs)
345
+
346
+ __props__.__dict__["disabled"] = disabled
347
+ __props__.__dict__["external_policies"] = external_policies
348
+ __props__.__dict__["metadata"] = metadata
349
+ __props__.__dict__["name"] = name
350
+ __props__.__dict__["namespace"] = namespace
351
+ __props__.__dict__["policies"] = policies
352
+ super(Entity, __self__).__init__(
353
+ 'vault:identity/entity:Entity',
354
+ resource_name,
355
+ __props__,
356
+ opts)
357
+
358
+ @staticmethod
359
+ def get(resource_name: str,
360
+ id: pulumi.Input[str],
361
+ opts: Optional[pulumi.ResourceOptions] = None,
362
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
363
+ external_policies: Optional[pulumi.Input[_builtins.bool]] = None,
364
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
365
+ name: Optional[pulumi.Input[_builtins.str]] = None,
366
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
367
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'Entity':
368
+ """
369
+ Get an existing Entity resource's state with the given name, id, and optional extra
370
+ properties used to qualify the lookup.
371
+
372
+ :param str resource_name: The unique name of the resulting resource.
373
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
374
+ :param pulumi.ResourceOptions opts: Options for the resource.
375
+ :param pulumi.Input[_builtins.bool] disabled: True/false Is this entity currently disabled. Defaults to `false`
376
+ :param pulumi.Input[_builtins.bool] external_policies: `false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
377
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: A Map of additional metadata to associate with the user.
378
+ :param pulumi.Input[_builtins.str] name: Name of the identity entity to create.
379
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
380
+ The value should not contain leading or trailing forward slashes.
381
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
382
+ *Available only for Vault Enterprise*.
383
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies to apply to the entity.
384
+ """
385
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
386
+
387
+ __props__ = _EntityState.__new__(_EntityState)
388
+
389
+ __props__.__dict__["disabled"] = disabled
390
+ __props__.__dict__["external_policies"] = external_policies
391
+ __props__.__dict__["metadata"] = metadata
392
+ __props__.__dict__["name"] = name
393
+ __props__.__dict__["namespace"] = namespace
394
+ __props__.__dict__["policies"] = policies
395
+ return Entity(resource_name, opts=opts, __props__=__props__)
396
+
397
+ @_builtins.property
398
+ @pulumi.getter
399
+ def disabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
400
+ """
401
+ True/false Is this entity currently disabled. Defaults to `false`
402
+ """
403
+ return pulumi.get(self, "disabled")
404
+
405
+ @_builtins.property
406
+ @pulumi.getter(name="externalPolicies")
407
+ def external_policies(self) -> pulumi.Output[Optional[_builtins.bool]]:
408
+ """
409
+ `false` by default. If set to `true`, this resource will ignore any policies return from Vault or specified in the resource. You can use `identity.EntityPolicies` to manage policies for this entity in a decoupled manner.
410
+ """
411
+ return pulumi.get(self, "external_policies")
412
+
413
+ @_builtins.property
414
+ @pulumi.getter
415
+ def metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
416
+ """
417
+ A Map of additional metadata to associate with the user.
418
+ """
419
+ return pulumi.get(self, "metadata")
420
+
421
+ @_builtins.property
422
+ @pulumi.getter
423
+ def name(self) -> pulumi.Output[_builtins.str]:
424
+ """
425
+ Name of the identity entity to create.
426
+ """
427
+ return pulumi.get(self, "name")
428
+
429
+ @_builtins.property
430
+ @pulumi.getter
431
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
432
+ """
433
+ The namespace to provision the resource in.
434
+ The value should not contain leading or trailing forward slashes.
435
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
436
+ *Available only for Vault Enterprise*.
437
+ """
438
+ return pulumi.get(self, "namespace")
439
+
440
+ @_builtins.property
441
+ @pulumi.getter
442
+ def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
443
+ """
444
+ A list of policies to apply to the entity.
445
+ """
446
+ return pulumi.get(self, "policies")
447
+