pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,550 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['OidcProviderArgs', 'OidcProvider']
18
+
19
+ @pulumi.input_type
20
+ class OidcProviderArgs:
21
+ def __init__(__self__, *,
22
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
23
+ https_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ issuer_host: Optional[pulumi.Input[_builtins.str]] = None,
25
+ name: Optional[pulumi.Input[_builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
27
+ scopes_supporteds: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
28
+ """
29
+ The set of arguments for constructing a OidcProvider resource.
30
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: The client IDs that are permitted to use the provider.
31
+ If empty, no clients are allowed. If `*`, all clients are allowed.
32
+ :param pulumi.Input[_builtins.bool] https_enabled: Set to true if the issuer endpoint uses HTTPS.
33
+ :param pulumi.Input[_builtins.str] issuer_host: The host for the issuer. Can be either host or host:port.
34
+ :param pulumi.Input[_builtins.str] name: The name of the provider.
35
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
36
+ The value should not contain leading or trailing forward slashes.
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
+ *Available only for Vault Enterprise*.
39
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] scopes_supporteds: The scopes available for requesting on the provider.
40
+ """
41
+ if allowed_client_ids is not None:
42
+ pulumi.set(__self__, "allowed_client_ids", allowed_client_ids)
43
+ if https_enabled is not None:
44
+ pulumi.set(__self__, "https_enabled", https_enabled)
45
+ if issuer_host is not None:
46
+ pulumi.set(__self__, "issuer_host", issuer_host)
47
+ if name is not None:
48
+ pulumi.set(__self__, "name", name)
49
+ if namespace is not None:
50
+ pulumi.set(__self__, "namespace", namespace)
51
+ if scopes_supporteds is not None:
52
+ pulumi.set(__self__, "scopes_supporteds", scopes_supporteds)
53
+
54
+ @_builtins.property
55
+ @pulumi.getter(name="allowedClientIds")
56
+ def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
57
+ """
58
+ The client IDs that are permitted to use the provider.
59
+ If empty, no clients are allowed. If `*`, all clients are allowed.
60
+ """
61
+ return pulumi.get(self, "allowed_client_ids")
62
+
63
+ @allowed_client_ids.setter
64
+ def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
65
+ pulumi.set(self, "allowed_client_ids", value)
66
+
67
+ @_builtins.property
68
+ @pulumi.getter(name="httpsEnabled")
69
+ def https_enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
70
+ """
71
+ Set to true if the issuer endpoint uses HTTPS.
72
+ """
73
+ return pulumi.get(self, "https_enabled")
74
+
75
+ @https_enabled.setter
76
+ def https_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
77
+ pulumi.set(self, "https_enabled", value)
78
+
79
+ @_builtins.property
80
+ @pulumi.getter(name="issuerHost")
81
+ def issuer_host(self) -> Optional[pulumi.Input[_builtins.str]]:
82
+ """
83
+ The host for the issuer. Can be either host or host:port.
84
+ """
85
+ return pulumi.get(self, "issuer_host")
86
+
87
+ @issuer_host.setter
88
+ def issuer_host(self, value: Optional[pulumi.Input[_builtins.str]]):
89
+ pulumi.set(self, "issuer_host", value)
90
+
91
+ @_builtins.property
92
+ @pulumi.getter
93
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
94
+ """
95
+ The name of the provider.
96
+ """
97
+ return pulumi.get(self, "name")
98
+
99
+ @name.setter
100
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
101
+ pulumi.set(self, "name", value)
102
+
103
+ @_builtins.property
104
+ @pulumi.getter
105
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
106
+ """
107
+ The namespace to provision the resource in.
108
+ The value should not contain leading or trailing forward slashes.
109
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
110
+ *Available only for Vault Enterprise*.
111
+ """
112
+ return pulumi.get(self, "namespace")
113
+
114
+ @namespace.setter
115
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
116
+ pulumi.set(self, "namespace", value)
117
+
118
+ @_builtins.property
119
+ @pulumi.getter(name="scopesSupporteds")
120
+ def scopes_supporteds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
121
+ """
122
+ The scopes available for requesting on the provider.
123
+ """
124
+ return pulumi.get(self, "scopes_supporteds")
125
+
126
+ @scopes_supporteds.setter
127
+ def scopes_supporteds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
128
+ pulumi.set(self, "scopes_supporteds", value)
129
+
130
+
131
+ @pulumi.input_type
132
+ class _OidcProviderState:
133
+ def __init__(__self__, *,
134
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
135
+ https_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
136
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
137
+ issuer_host: Optional[pulumi.Input[_builtins.str]] = None,
138
+ name: Optional[pulumi.Input[_builtins.str]] = None,
139
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
140
+ scopes_supporteds: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
141
+ """
142
+ Input properties used for looking up and filtering OidcProvider resources.
143
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: The client IDs that are permitted to use the provider.
144
+ If empty, no clients are allowed. If `*`, all clients are allowed.
145
+ :param pulumi.Input[_builtins.bool] https_enabled: Set to true if the issuer endpoint uses HTTPS.
146
+ :param pulumi.Input[_builtins.str] issuer: Specifies what will be used as the `scheme://host:port`
147
+ component for the `iss` claim of ID tokens. This value is computed using the
148
+ `issuer_host` and `https_enabled` fields.
149
+ :param pulumi.Input[_builtins.str] issuer_host: The host for the issuer. Can be either host or host:port.
150
+ :param pulumi.Input[_builtins.str] name: The name of the provider.
151
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
152
+ The value should not contain leading or trailing forward slashes.
153
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
154
+ *Available only for Vault Enterprise*.
155
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] scopes_supporteds: The scopes available for requesting on the provider.
156
+ """
157
+ if allowed_client_ids is not None:
158
+ pulumi.set(__self__, "allowed_client_ids", allowed_client_ids)
159
+ if https_enabled is not None:
160
+ pulumi.set(__self__, "https_enabled", https_enabled)
161
+ if issuer is not None:
162
+ pulumi.set(__self__, "issuer", issuer)
163
+ if issuer_host is not None:
164
+ pulumi.set(__self__, "issuer_host", issuer_host)
165
+ if name is not None:
166
+ pulumi.set(__self__, "name", name)
167
+ if namespace is not None:
168
+ pulumi.set(__self__, "namespace", namespace)
169
+ if scopes_supporteds is not None:
170
+ pulumi.set(__self__, "scopes_supporteds", scopes_supporteds)
171
+
172
+ @_builtins.property
173
+ @pulumi.getter(name="allowedClientIds")
174
+ def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
175
+ """
176
+ The client IDs that are permitted to use the provider.
177
+ If empty, no clients are allowed. If `*`, all clients are allowed.
178
+ """
179
+ return pulumi.get(self, "allowed_client_ids")
180
+
181
+ @allowed_client_ids.setter
182
+ def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
183
+ pulumi.set(self, "allowed_client_ids", value)
184
+
185
+ @_builtins.property
186
+ @pulumi.getter(name="httpsEnabled")
187
+ def https_enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
188
+ """
189
+ Set to true if the issuer endpoint uses HTTPS.
190
+ """
191
+ return pulumi.get(self, "https_enabled")
192
+
193
+ @https_enabled.setter
194
+ def https_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
195
+ pulumi.set(self, "https_enabled", value)
196
+
197
+ @_builtins.property
198
+ @pulumi.getter
199
+ def issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
200
+ """
201
+ Specifies what will be used as the `scheme://host:port`
202
+ component for the `iss` claim of ID tokens. This value is computed using the
203
+ `issuer_host` and `https_enabled` fields.
204
+ """
205
+ return pulumi.get(self, "issuer")
206
+
207
+ @issuer.setter
208
+ def issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
209
+ pulumi.set(self, "issuer", value)
210
+
211
+ @_builtins.property
212
+ @pulumi.getter(name="issuerHost")
213
+ def issuer_host(self) -> Optional[pulumi.Input[_builtins.str]]:
214
+ """
215
+ The host for the issuer. Can be either host or host:port.
216
+ """
217
+ return pulumi.get(self, "issuer_host")
218
+
219
+ @issuer_host.setter
220
+ def issuer_host(self, value: Optional[pulumi.Input[_builtins.str]]):
221
+ pulumi.set(self, "issuer_host", value)
222
+
223
+ @_builtins.property
224
+ @pulumi.getter
225
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
226
+ """
227
+ The name of the provider.
228
+ """
229
+ return pulumi.get(self, "name")
230
+
231
+ @name.setter
232
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
233
+ pulumi.set(self, "name", value)
234
+
235
+ @_builtins.property
236
+ @pulumi.getter
237
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
238
+ """
239
+ The namespace to provision the resource in.
240
+ The value should not contain leading or trailing forward slashes.
241
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
242
+ *Available only for Vault Enterprise*.
243
+ """
244
+ return pulumi.get(self, "namespace")
245
+
246
+ @namespace.setter
247
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
248
+ pulumi.set(self, "namespace", value)
249
+
250
+ @_builtins.property
251
+ @pulumi.getter(name="scopesSupporteds")
252
+ def scopes_supporteds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
253
+ """
254
+ The scopes available for requesting on the provider.
255
+ """
256
+ return pulumi.get(self, "scopes_supporteds")
257
+
258
+ @scopes_supporteds.setter
259
+ def scopes_supporteds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
260
+ pulumi.set(self, "scopes_supporteds", value)
261
+
262
+
263
+ @pulumi.type_token("vault:identity/oidcProvider:OidcProvider")
264
+ class OidcProvider(pulumi.CustomResource):
265
+ @overload
266
+ def __init__(__self__,
267
+ resource_name: str,
268
+ opts: Optional[pulumi.ResourceOptions] = None,
269
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
270
+ https_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
271
+ issuer_host: Optional[pulumi.Input[_builtins.str]] = None,
272
+ name: Optional[pulumi.Input[_builtins.str]] = None,
273
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
274
+ scopes_supporteds: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
275
+ __props__=None):
276
+ """
277
+ Manages OIDC Providers in a Vault server. See the [Vault documentation](https://www.vaultproject.io/api-docs/secret/identity/oidc-provider#create-or-update-an-assignment)
278
+ for more information.
279
+
280
+ ## Example Usage
281
+
282
+ ```python
283
+ import pulumi
284
+ import json
285
+ import pulumi_vault as vault
286
+
287
+ test = vault.identity.OidcKey("test",
288
+ name="my-key",
289
+ allowed_client_ids=["*"],
290
+ rotation_period=3600,
291
+ verification_ttl=3600)
292
+ test_oidc_assignment = vault.identity.OidcAssignment("test",
293
+ name="my-assignment",
294
+ entity_ids=["fake-ascbascas-2231a-sdfaa"],
295
+ group_ids=["fake-sajkdsad-32414-sfsada"])
296
+ test_oidc_client = vault.identity.OidcClient("test",
297
+ name="application",
298
+ key=test.name,
299
+ redirect_uris=[
300
+ "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
301
+ "http://127.0.0.1:8251/callback",
302
+ "http://127.0.0.1:8080/callback",
303
+ ],
304
+ assignments=[test_oidc_assignment.name],
305
+ id_token_ttl=2400,
306
+ access_token_ttl=7200)
307
+ test_oidc_scope = vault.identity.OidcScope("test",
308
+ name="groups",
309
+ template=json.dumps({
310
+ "groups": "{{identity.entity.groups.names}}",
311
+ }),
312
+ description="Groups scope.")
313
+ test_oidc_provider = vault.identity.OidcProvider("test",
314
+ name="my-provider",
315
+ https_enabled=False,
316
+ issuer_host="127.0.0.1:8200",
317
+ allowed_client_ids=[test_oidc_client.client_id],
318
+ scopes_supporteds=[test_oidc_scope.name])
319
+ ```
320
+
321
+ ## Import
322
+
323
+ OIDC Providers can be imported using the `name`, e.g.
324
+
325
+ ```sh
326
+ $ pulumi import vault:identity/oidcProvider:OidcProvider test my-provider
327
+ ```
328
+
329
+ :param str resource_name: The name of the resource.
330
+ :param pulumi.ResourceOptions opts: Options for the resource.
331
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: The client IDs that are permitted to use the provider.
332
+ If empty, no clients are allowed. If `*`, all clients are allowed.
333
+ :param pulumi.Input[_builtins.bool] https_enabled: Set to true if the issuer endpoint uses HTTPS.
334
+ :param pulumi.Input[_builtins.str] issuer_host: The host for the issuer. Can be either host or host:port.
335
+ :param pulumi.Input[_builtins.str] name: The name of the provider.
336
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
337
+ The value should not contain leading or trailing forward slashes.
338
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
339
+ *Available only for Vault Enterprise*.
340
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] scopes_supporteds: The scopes available for requesting on the provider.
341
+ """
342
+ ...
343
+ @overload
344
+ def __init__(__self__,
345
+ resource_name: str,
346
+ args: Optional[OidcProviderArgs] = None,
347
+ opts: Optional[pulumi.ResourceOptions] = None):
348
+ """
349
+ Manages OIDC Providers in a Vault server. See the [Vault documentation](https://www.vaultproject.io/api-docs/secret/identity/oidc-provider#create-or-update-an-assignment)
350
+ for more information.
351
+
352
+ ## Example Usage
353
+
354
+ ```python
355
+ import pulumi
356
+ import json
357
+ import pulumi_vault as vault
358
+
359
+ test = vault.identity.OidcKey("test",
360
+ name="my-key",
361
+ allowed_client_ids=["*"],
362
+ rotation_period=3600,
363
+ verification_ttl=3600)
364
+ test_oidc_assignment = vault.identity.OidcAssignment("test",
365
+ name="my-assignment",
366
+ entity_ids=["fake-ascbascas-2231a-sdfaa"],
367
+ group_ids=["fake-sajkdsad-32414-sfsada"])
368
+ test_oidc_client = vault.identity.OidcClient("test",
369
+ name="application",
370
+ key=test.name,
371
+ redirect_uris=[
372
+ "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
373
+ "http://127.0.0.1:8251/callback",
374
+ "http://127.0.0.1:8080/callback",
375
+ ],
376
+ assignments=[test_oidc_assignment.name],
377
+ id_token_ttl=2400,
378
+ access_token_ttl=7200)
379
+ test_oidc_scope = vault.identity.OidcScope("test",
380
+ name="groups",
381
+ template=json.dumps({
382
+ "groups": "{{identity.entity.groups.names}}",
383
+ }),
384
+ description="Groups scope.")
385
+ test_oidc_provider = vault.identity.OidcProvider("test",
386
+ name="my-provider",
387
+ https_enabled=False,
388
+ issuer_host="127.0.0.1:8200",
389
+ allowed_client_ids=[test_oidc_client.client_id],
390
+ scopes_supporteds=[test_oidc_scope.name])
391
+ ```
392
+
393
+ ## Import
394
+
395
+ OIDC Providers can be imported using the `name`, e.g.
396
+
397
+ ```sh
398
+ $ pulumi import vault:identity/oidcProvider:OidcProvider test my-provider
399
+ ```
400
+
401
+ :param str resource_name: The name of the resource.
402
+ :param OidcProviderArgs args: The arguments to use to populate this resource's properties.
403
+ :param pulumi.ResourceOptions opts: Options for the resource.
404
+ """
405
+ ...
406
+ def __init__(__self__, resource_name: str, *args, **kwargs):
407
+ resource_args, opts = _utilities.get_resource_args_opts(OidcProviderArgs, pulumi.ResourceOptions, *args, **kwargs)
408
+ if resource_args is not None:
409
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
410
+ else:
411
+ __self__._internal_init(resource_name, *args, **kwargs)
412
+
413
+ def _internal_init(__self__,
414
+ resource_name: str,
415
+ opts: Optional[pulumi.ResourceOptions] = None,
416
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
417
+ https_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
418
+ issuer_host: Optional[pulumi.Input[_builtins.str]] = None,
419
+ name: Optional[pulumi.Input[_builtins.str]] = None,
420
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
421
+ scopes_supporteds: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
422
+ __props__=None):
423
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
424
+ if not isinstance(opts, pulumi.ResourceOptions):
425
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
426
+ if opts.id is None:
427
+ if __props__ is not None:
428
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
429
+ __props__ = OidcProviderArgs.__new__(OidcProviderArgs)
430
+
431
+ __props__.__dict__["allowed_client_ids"] = allowed_client_ids
432
+ __props__.__dict__["https_enabled"] = https_enabled
433
+ __props__.__dict__["issuer_host"] = issuer_host
434
+ __props__.__dict__["name"] = name
435
+ __props__.__dict__["namespace"] = namespace
436
+ __props__.__dict__["scopes_supporteds"] = scopes_supporteds
437
+ __props__.__dict__["issuer"] = None
438
+ super(OidcProvider, __self__).__init__(
439
+ 'vault:identity/oidcProvider:OidcProvider',
440
+ resource_name,
441
+ __props__,
442
+ opts)
443
+
444
+ @staticmethod
445
+ def get(resource_name: str,
446
+ id: pulumi.Input[str],
447
+ opts: Optional[pulumi.ResourceOptions] = None,
448
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
449
+ https_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
450
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
451
+ issuer_host: Optional[pulumi.Input[_builtins.str]] = None,
452
+ name: Optional[pulumi.Input[_builtins.str]] = None,
453
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
454
+ scopes_supporteds: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'OidcProvider':
455
+ """
456
+ Get an existing OidcProvider resource's state with the given name, id, and optional extra
457
+ properties used to qualify the lookup.
458
+
459
+ :param str resource_name: The unique name of the resulting resource.
460
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
461
+ :param pulumi.ResourceOptions opts: Options for the resource.
462
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: The client IDs that are permitted to use the provider.
463
+ If empty, no clients are allowed. If `*`, all clients are allowed.
464
+ :param pulumi.Input[_builtins.bool] https_enabled: Set to true if the issuer endpoint uses HTTPS.
465
+ :param pulumi.Input[_builtins.str] issuer: Specifies what will be used as the `scheme://host:port`
466
+ component for the `iss` claim of ID tokens. This value is computed using the
467
+ `issuer_host` and `https_enabled` fields.
468
+ :param pulumi.Input[_builtins.str] issuer_host: The host for the issuer. Can be either host or host:port.
469
+ :param pulumi.Input[_builtins.str] name: The name of the provider.
470
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
471
+ The value should not contain leading or trailing forward slashes.
472
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
473
+ *Available only for Vault Enterprise*.
474
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] scopes_supporteds: The scopes available for requesting on the provider.
475
+ """
476
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
477
+
478
+ __props__ = _OidcProviderState.__new__(_OidcProviderState)
479
+
480
+ __props__.__dict__["allowed_client_ids"] = allowed_client_ids
481
+ __props__.__dict__["https_enabled"] = https_enabled
482
+ __props__.__dict__["issuer"] = issuer
483
+ __props__.__dict__["issuer_host"] = issuer_host
484
+ __props__.__dict__["name"] = name
485
+ __props__.__dict__["namespace"] = namespace
486
+ __props__.__dict__["scopes_supporteds"] = scopes_supporteds
487
+ return OidcProvider(resource_name, opts=opts, __props__=__props__)
488
+
489
+ @_builtins.property
490
+ @pulumi.getter(name="allowedClientIds")
491
+ def allowed_client_ids(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
492
+ """
493
+ The client IDs that are permitted to use the provider.
494
+ If empty, no clients are allowed. If `*`, all clients are allowed.
495
+ """
496
+ return pulumi.get(self, "allowed_client_ids")
497
+
498
+ @_builtins.property
499
+ @pulumi.getter(name="httpsEnabled")
500
+ def https_enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
501
+ """
502
+ Set to true if the issuer endpoint uses HTTPS.
503
+ """
504
+ return pulumi.get(self, "https_enabled")
505
+
506
+ @_builtins.property
507
+ @pulumi.getter
508
+ def issuer(self) -> pulumi.Output[_builtins.str]:
509
+ """
510
+ Specifies what will be used as the `scheme://host:port`
511
+ component for the `iss` claim of ID tokens. This value is computed using the
512
+ `issuer_host` and `https_enabled` fields.
513
+ """
514
+ return pulumi.get(self, "issuer")
515
+
516
+ @_builtins.property
517
+ @pulumi.getter(name="issuerHost")
518
+ def issuer_host(self) -> pulumi.Output[Optional[_builtins.str]]:
519
+ """
520
+ The host for the issuer. Can be either host or host:port.
521
+ """
522
+ return pulumi.get(self, "issuer_host")
523
+
524
+ @_builtins.property
525
+ @pulumi.getter
526
+ def name(self) -> pulumi.Output[_builtins.str]:
527
+ """
528
+ The name of the provider.
529
+ """
530
+ return pulumi.get(self, "name")
531
+
532
+ @_builtins.property
533
+ @pulumi.getter
534
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
535
+ """
536
+ The namespace to provision the resource in.
537
+ The value should not contain leading or trailing forward slashes.
538
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
539
+ *Available only for Vault Enterprise*.
540
+ """
541
+ return pulumi.get(self, "namespace")
542
+
543
+ @_builtins.property
544
+ @pulumi.getter(name="scopesSupporteds")
545
+ def scopes_supporteds(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
546
+ """
547
+ The scopes available for requesting on the provider.
548
+ """
549
+ return pulumi.get(self, "scopes_supporteds")
550
+