pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,550 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['OidcProviderArgs', 'OidcProvider']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class OidcProviderArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
23
|
+
https_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
24
|
+
issuer_host: Optional[pulumi.Input[_builtins.str]] = None,
|
|
25
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
|
+
scopes_supporteds: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
|
28
|
+
"""
|
|
29
|
+
The set of arguments for constructing a OidcProvider resource.
|
|
30
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: The client IDs that are permitted to use the provider.
|
|
31
|
+
If empty, no clients are allowed. If `*`, all clients are allowed.
|
|
32
|
+
:param pulumi.Input[_builtins.bool] https_enabled: Set to true if the issuer endpoint uses HTTPS.
|
|
33
|
+
:param pulumi.Input[_builtins.str] issuer_host: The host for the issuer. Can be either host or host:port.
|
|
34
|
+
:param pulumi.Input[_builtins.str] name: The name of the provider.
|
|
35
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
36
|
+
The value should not contain leading or trailing forward slashes.
|
|
37
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
38
|
+
*Available only for Vault Enterprise*.
|
|
39
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] scopes_supporteds: The scopes available for requesting on the provider.
|
|
40
|
+
"""
|
|
41
|
+
if allowed_client_ids is not None:
|
|
42
|
+
pulumi.set(__self__, "allowed_client_ids", allowed_client_ids)
|
|
43
|
+
if https_enabled is not None:
|
|
44
|
+
pulumi.set(__self__, "https_enabled", https_enabled)
|
|
45
|
+
if issuer_host is not None:
|
|
46
|
+
pulumi.set(__self__, "issuer_host", issuer_host)
|
|
47
|
+
if name is not None:
|
|
48
|
+
pulumi.set(__self__, "name", name)
|
|
49
|
+
if namespace is not None:
|
|
50
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
51
|
+
if scopes_supporteds is not None:
|
|
52
|
+
pulumi.set(__self__, "scopes_supporteds", scopes_supporteds)
|
|
53
|
+
|
|
54
|
+
@_builtins.property
|
|
55
|
+
@pulumi.getter(name="allowedClientIds")
|
|
56
|
+
def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
57
|
+
"""
|
|
58
|
+
The client IDs that are permitted to use the provider.
|
|
59
|
+
If empty, no clients are allowed. If `*`, all clients are allowed.
|
|
60
|
+
"""
|
|
61
|
+
return pulumi.get(self, "allowed_client_ids")
|
|
62
|
+
|
|
63
|
+
@allowed_client_ids.setter
|
|
64
|
+
def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
65
|
+
pulumi.set(self, "allowed_client_ids", value)
|
|
66
|
+
|
|
67
|
+
@_builtins.property
|
|
68
|
+
@pulumi.getter(name="httpsEnabled")
|
|
69
|
+
def https_enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
70
|
+
"""
|
|
71
|
+
Set to true if the issuer endpoint uses HTTPS.
|
|
72
|
+
"""
|
|
73
|
+
return pulumi.get(self, "https_enabled")
|
|
74
|
+
|
|
75
|
+
@https_enabled.setter
|
|
76
|
+
def https_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
77
|
+
pulumi.set(self, "https_enabled", value)
|
|
78
|
+
|
|
79
|
+
@_builtins.property
|
|
80
|
+
@pulumi.getter(name="issuerHost")
|
|
81
|
+
def issuer_host(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
82
|
+
"""
|
|
83
|
+
The host for the issuer. Can be either host or host:port.
|
|
84
|
+
"""
|
|
85
|
+
return pulumi.get(self, "issuer_host")
|
|
86
|
+
|
|
87
|
+
@issuer_host.setter
|
|
88
|
+
def issuer_host(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
89
|
+
pulumi.set(self, "issuer_host", value)
|
|
90
|
+
|
|
91
|
+
@_builtins.property
|
|
92
|
+
@pulumi.getter
|
|
93
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
94
|
+
"""
|
|
95
|
+
The name of the provider.
|
|
96
|
+
"""
|
|
97
|
+
return pulumi.get(self, "name")
|
|
98
|
+
|
|
99
|
+
@name.setter
|
|
100
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
101
|
+
pulumi.set(self, "name", value)
|
|
102
|
+
|
|
103
|
+
@_builtins.property
|
|
104
|
+
@pulumi.getter
|
|
105
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
106
|
+
"""
|
|
107
|
+
The namespace to provision the resource in.
|
|
108
|
+
The value should not contain leading or trailing forward slashes.
|
|
109
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
110
|
+
*Available only for Vault Enterprise*.
|
|
111
|
+
"""
|
|
112
|
+
return pulumi.get(self, "namespace")
|
|
113
|
+
|
|
114
|
+
@namespace.setter
|
|
115
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
116
|
+
pulumi.set(self, "namespace", value)
|
|
117
|
+
|
|
118
|
+
@_builtins.property
|
|
119
|
+
@pulumi.getter(name="scopesSupporteds")
|
|
120
|
+
def scopes_supporteds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
121
|
+
"""
|
|
122
|
+
The scopes available for requesting on the provider.
|
|
123
|
+
"""
|
|
124
|
+
return pulumi.get(self, "scopes_supporteds")
|
|
125
|
+
|
|
126
|
+
@scopes_supporteds.setter
|
|
127
|
+
def scopes_supporteds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
128
|
+
pulumi.set(self, "scopes_supporteds", value)
|
|
129
|
+
|
|
130
|
+
|
|
131
|
+
@pulumi.input_type
|
|
132
|
+
class _OidcProviderState:
|
|
133
|
+
def __init__(__self__, *,
|
|
134
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
135
|
+
https_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
136
|
+
issuer: Optional[pulumi.Input[_builtins.str]] = None,
|
|
137
|
+
issuer_host: Optional[pulumi.Input[_builtins.str]] = None,
|
|
138
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
139
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
140
|
+
scopes_supporteds: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
|
141
|
+
"""
|
|
142
|
+
Input properties used for looking up and filtering OidcProvider resources.
|
|
143
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: The client IDs that are permitted to use the provider.
|
|
144
|
+
If empty, no clients are allowed. If `*`, all clients are allowed.
|
|
145
|
+
:param pulumi.Input[_builtins.bool] https_enabled: Set to true if the issuer endpoint uses HTTPS.
|
|
146
|
+
:param pulumi.Input[_builtins.str] issuer: Specifies what will be used as the `scheme://host:port`
|
|
147
|
+
component for the `iss` claim of ID tokens. This value is computed using the
|
|
148
|
+
`issuer_host` and `https_enabled` fields.
|
|
149
|
+
:param pulumi.Input[_builtins.str] issuer_host: The host for the issuer. Can be either host or host:port.
|
|
150
|
+
:param pulumi.Input[_builtins.str] name: The name of the provider.
|
|
151
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
152
|
+
The value should not contain leading or trailing forward slashes.
|
|
153
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
154
|
+
*Available only for Vault Enterprise*.
|
|
155
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] scopes_supporteds: The scopes available for requesting on the provider.
|
|
156
|
+
"""
|
|
157
|
+
if allowed_client_ids is not None:
|
|
158
|
+
pulumi.set(__self__, "allowed_client_ids", allowed_client_ids)
|
|
159
|
+
if https_enabled is not None:
|
|
160
|
+
pulumi.set(__self__, "https_enabled", https_enabled)
|
|
161
|
+
if issuer is not None:
|
|
162
|
+
pulumi.set(__self__, "issuer", issuer)
|
|
163
|
+
if issuer_host is not None:
|
|
164
|
+
pulumi.set(__self__, "issuer_host", issuer_host)
|
|
165
|
+
if name is not None:
|
|
166
|
+
pulumi.set(__self__, "name", name)
|
|
167
|
+
if namespace is not None:
|
|
168
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
169
|
+
if scopes_supporteds is not None:
|
|
170
|
+
pulumi.set(__self__, "scopes_supporteds", scopes_supporteds)
|
|
171
|
+
|
|
172
|
+
@_builtins.property
|
|
173
|
+
@pulumi.getter(name="allowedClientIds")
|
|
174
|
+
def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
175
|
+
"""
|
|
176
|
+
The client IDs that are permitted to use the provider.
|
|
177
|
+
If empty, no clients are allowed. If `*`, all clients are allowed.
|
|
178
|
+
"""
|
|
179
|
+
return pulumi.get(self, "allowed_client_ids")
|
|
180
|
+
|
|
181
|
+
@allowed_client_ids.setter
|
|
182
|
+
def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
183
|
+
pulumi.set(self, "allowed_client_ids", value)
|
|
184
|
+
|
|
185
|
+
@_builtins.property
|
|
186
|
+
@pulumi.getter(name="httpsEnabled")
|
|
187
|
+
def https_enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
188
|
+
"""
|
|
189
|
+
Set to true if the issuer endpoint uses HTTPS.
|
|
190
|
+
"""
|
|
191
|
+
return pulumi.get(self, "https_enabled")
|
|
192
|
+
|
|
193
|
+
@https_enabled.setter
|
|
194
|
+
def https_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
195
|
+
pulumi.set(self, "https_enabled", value)
|
|
196
|
+
|
|
197
|
+
@_builtins.property
|
|
198
|
+
@pulumi.getter
|
|
199
|
+
def issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
200
|
+
"""
|
|
201
|
+
Specifies what will be used as the `scheme://host:port`
|
|
202
|
+
component for the `iss` claim of ID tokens. This value is computed using the
|
|
203
|
+
`issuer_host` and `https_enabled` fields.
|
|
204
|
+
"""
|
|
205
|
+
return pulumi.get(self, "issuer")
|
|
206
|
+
|
|
207
|
+
@issuer.setter
|
|
208
|
+
def issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
209
|
+
pulumi.set(self, "issuer", value)
|
|
210
|
+
|
|
211
|
+
@_builtins.property
|
|
212
|
+
@pulumi.getter(name="issuerHost")
|
|
213
|
+
def issuer_host(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
214
|
+
"""
|
|
215
|
+
The host for the issuer. Can be either host or host:port.
|
|
216
|
+
"""
|
|
217
|
+
return pulumi.get(self, "issuer_host")
|
|
218
|
+
|
|
219
|
+
@issuer_host.setter
|
|
220
|
+
def issuer_host(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
221
|
+
pulumi.set(self, "issuer_host", value)
|
|
222
|
+
|
|
223
|
+
@_builtins.property
|
|
224
|
+
@pulumi.getter
|
|
225
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
226
|
+
"""
|
|
227
|
+
The name of the provider.
|
|
228
|
+
"""
|
|
229
|
+
return pulumi.get(self, "name")
|
|
230
|
+
|
|
231
|
+
@name.setter
|
|
232
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
233
|
+
pulumi.set(self, "name", value)
|
|
234
|
+
|
|
235
|
+
@_builtins.property
|
|
236
|
+
@pulumi.getter
|
|
237
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
238
|
+
"""
|
|
239
|
+
The namespace to provision the resource in.
|
|
240
|
+
The value should not contain leading or trailing forward slashes.
|
|
241
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
242
|
+
*Available only for Vault Enterprise*.
|
|
243
|
+
"""
|
|
244
|
+
return pulumi.get(self, "namespace")
|
|
245
|
+
|
|
246
|
+
@namespace.setter
|
|
247
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
248
|
+
pulumi.set(self, "namespace", value)
|
|
249
|
+
|
|
250
|
+
@_builtins.property
|
|
251
|
+
@pulumi.getter(name="scopesSupporteds")
|
|
252
|
+
def scopes_supporteds(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
253
|
+
"""
|
|
254
|
+
The scopes available for requesting on the provider.
|
|
255
|
+
"""
|
|
256
|
+
return pulumi.get(self, "scopes_supporteds")
|
|
257
|
+
|
|
258
|
+
@scopes_supporteds.setter
|
|
259
|
+
def scopes_supporteds(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
260
|
+
pulumi.set(self, "scopes_supporteds", value)
|
|
261
|
+
|
|
262
|
+
|
|
263
|
+
@pulumi.type_token("vault:identity/oidcProvider:OidcProvider")
|
|
264
|
+
class OidcProvider(pulumi.CustomResource):
|
|
265
|
+
@overload
|
|
266
|
+
def __init__(__self__,
|
|
267
|
+
resource_name: str,
|
|
268
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
269
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
270
|
+
https_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
271
|
+
issuer_host: Optional[pulumi.Input[_builtins.str]] = None,
|
|
272
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
273
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
274
|
+
scopes_supporteds: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
275
|
+
__props__=None):
|
|
276
|
+
"""
|
|
277
|
+
Manages OIDC Providers in a Vault server. See the [Vault documentation](https://www.vaultproject.io/api-docs/secret/identity/oidc-provider#create-or-update-an-assignment)
|
|
278
|
+
for more information.
|
|
279
|
+
|
|
280
|
+
## Example Usage
|
|
281
|
+
|
|
282
|
+
```python
|
|
283
|
+
import pulumi
|
|
284
|
+
import json
|
|
285
|
+
import pulumi_vault as vault
|
|
286
|
+
|
|
287
|
+
test = vault.identity.OidcKey("test",
|
|
288
|
+
name="my-key",
|
|
289
|
+
allowed_client_ids=["*"],
|
|
290
|
+
rotation_period=3600,
|
|
291
|
+
verification_ttl=3600)
|
|
292
|
+
test_oidc_assignment = vault.identity.OidcAssignment("test",
|
|
293
|
+
name="my-assignment",
|
|
294
|
+
entity_ids=["fake-ascbascas-2231a-sdfaa"],
|
|
295
|
+
group_ids=["fake-sajkdsad-32414-sfsada"])
|
|
296
|
+
test_oidc_client = vault.identity.OidcClient("test",
|
|
297
|
+
name="application",
|
|
298
|
+
key=test.name,
|
|
299
|
+
redirect_uris=[
|
|
300
|
+
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
301
|
+
"http://127.0.0.1:8251/callback",
|
|
302
|
+
"http://127.0.0.1:8080/callback",
|
|
303
|
+
],
|
|
304
|
+
assignments=[test_oidc_assignment.name],
|
|
305
|
+
id_token_ttl=2400,
|
|
306
|
+
access_token_ttl=7200)
|
|
307
|
+
test_oidc_scope = vault.identity.OidcScope("test",
|
|
308
|
+
name="groups",
|
|
309
|
+
template=json.dumps({
|
|
310
|
+
"groups": "{{identity.entity.groups.names}}",
|
|
311
|
+
}),
|
|
312
|
+
description="Groups scope.")
|
|
313
|
+
test_oidc_provider = vault.identity.OidcProvider("test",
|
|
314
|
+
name="my-provider",
|
|
315
|
+
https_enabled=False,
|
|
316
|
+
issuer_host="127.0.0.1:8200",
|
|
317
|
+
allowed_client_ids=[test_oidc_client.client_id],
|
|
318
|
+
scopes_supporteds=[test_oidc_scope.name])
|
|
319
|
+
```
|
|
320
|
+
|
|
321
|
+
## Import
|
|
322
|
+
|
|
323
|
+
OIDC Providers can be imported using the `name`, e.g.
|
|
324
|
+
|
|
325
|
+
```sh
|
|
326
|
+
$ pulumi import vault:identity/oidcProvider:OidcProvider test my-provider
|
|
327
|
+
```
|
|
328
|
+
|
|
329
|
+
:param str resource_name: The name of the resource.
|
|
330
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
331
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: The client IDs that are permitted to use the provider.
|
|
332
|
+
If empty, no clients are allowed. If `*`, all clients are allowed.
|
|
333
|
+
:param pulumi.Input[_builtins.bool] https_enabled: Set to true if the issuer endpoint uses HTTPS.
|
|
334
|
+
:param pulumi.Input[_builtins.str] issuer_host: The host for the issuer. Can be either host or host:port.
|
|
335
|
+
:param pulumi.Input[_builtins.str] name: The name of the provider.
|
|
336
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
337
|
+
The value should not contain leading or trailing forward slashes.
|
|
338
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
339
|
+
*Available only for Vault Enterprise*.
|
|
340
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] scopes_supporteds: The scopes available for requesting on the provider.
|
|
341
|
+
"""
|
|
342
|
+
...
|
|
343
|
+
@overload
|
|
344
|
+
def __init__(__self__,
|
|
345
|
+
resource_name: str,
|
|
346
|
+
args: Optional[OidcProviderArgs] = None,
|
|
347
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
348
|
+
"""
|
|
349
|
+
Manages OIDC Providers in a Vault server. See the [Vault documentation](https://www.vaultproject.io/api-docs/secret/identity/oidc-provider#create-or-update-an-assignment)
|
|
350
|
+
for more information.
|
|
351
|
+
|
|
352
|
+
## Example Usage
|
|
353
|
+
|
|
354
|
+
```python
|
|
355
|
+
import pulumi
|
|
356
|
+
import json
|
|
357
|
+
import pulumi_vault as vault
|
|
358
|
+
|
|
359
|
+
test = vault.identity.OidcKey("test",
|
|
360
|
+
name="my-key",
|
|
361
|
+
allowed_client_ids=["*"],
|
|
362
|
+
rotation_period=3600,
|
|
363
|
+
verification_ttl=3600)
|
|
364
|
+
test_oidc_assignment = vault.identity.OidcAssignment("test",
|
|
365
|
+
name="my-assignment",
|
|
366
|
+
entity_ids=["fake-ascbascas-2231a-sdfaa"],
|
|
367
|
+
group_ids=["fake-sajkdsad-32414-sfsada"])
|
|
368
|
+
test_oidc_client = vault.identity.OidcClient("test",
|
|
369
|
+
name="application",
|
|
370
|
+
key=test.name,
|
|
371
|
+
redirect_uris=[
|
|
372
|
+
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
373
|
+
"http://127.0.0.1:8251/callback",
|
|
374
|
+
"http://127.0.0.1:8080/callback",
|
|
375
|
+
],
|
|
376
|
+
assignments=[test_oidc_assignment.name],
|
|
377
|
+
id_token_ttl=2400,
|
|
378
|
+
access_token_ttl=7200)
|
|
379
|
+
test_oidc_scope = vault.identity.OidcScope("test",
|
|
380
|
+
name="groups",
|
|
381
|
+
template=json.dumps({
|
|
382
|
+
"groups": "{{identity.entity.groups.names}}",
|
|
383
|
+
}),
|
|
384
|
+
description="Groups scope.")
|
|
385
|
+
test_oidc_provider = vault.identity.OidcProvider("test",
|
|
386
|
+
name="my-provider",
|
|
387
|
+
https_enabled=False,
|
|
388
|
+
issuer_host="127.0.0.1:8200",
|
|
389
|
+
allowed_client_ids=[test_oidc_client.client_id],
|
|
390
|
+
scopes_supporteds=[test_oidc_scope.name])
|
|
391
|
+
```
|
|
392
|
+
|
|
393
|
+
## Import
|
|
394
|
+
|
|
395
|
+
OIDC Providers can be imported using the `name`, e.g.
|
|
396
|
+
|
|
397
|
+
```sh
|
|
398
|
+
$ pulumi import vault:identity/oidcProvider:OidcProvider test my-provider
|
|
399
|
+
```
|
|
400
|
+
|
|
401
|
+
:param str resource_name: The name of the resource.
|
|
402
|
+
:param OidcProviderArgs args: The arguments to use to populate this resource's properties.
|
|
403
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
404
|
+
"""
|
|
405
|
+
...
|
|
406
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
407
|
+
resource_args, opts = _utilities.get_resource_args_opts(OidcProviderArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
408
|
+
if resource_args is not None:
|
|
409
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
410
|
+
else:
|
|
411
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
412
|
+
|
|
413
|
+
def _internal_init(__self__,
|
|
414
|
+
resource_name: str,
|
|
415
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
416
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
417
|
+
https_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
418
|
+
issuer_host: Optional[pulumi.Input[_builtins.str]] = None,
|
|
419
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
420
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
421
|
+
scopes_supporteds: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
422
|
+
__props__=None):
|
|
423
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
424
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
425
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
426
|
+
if opts.id is None:
|
|
427
|
+
if __props__ is not None:
|
|
428
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
429
|
+
__props__ = OidcProviderArgs.__new__(OidcProviderArgs)
|
|
430
|
+
|
|
431
|
+
__props__.__dict__["allowed_client_ids"] = allowed_client_ids
|
|
432
|
+
__props__.__dict__["https_enabled"] = https_enabled
|
|
433
|
+
__props__.__dict__["issuer_host"] = issuer_host
|
|
434
|
+
__props__.__dict__["name"] = name
|
|
435
|
+
__props__.__dict__["namespace"] = namespace
|
|
436
|
+
__props__.__dict__["scopes_supporteds"] = scopes_supporteds
|
|
437
|
+
__props__.__dict__["issuer"] = None
|
|
438
|
+
super(OidcProvider, __self__).__init__(
|
|
439
|
+
'vault:identity/oidcProvider:OidcProvider',
|
|
440
|
+
resource_name,
|
|
441
|
+
__props__,
|
|
442
|
+
opts)
|
|
443
|
+
|
|
444
|
+
@staticmethod
|
|
445
|
+
def get(resource_name: str,
|
|
446
|
+
id: pulumi.Input[str],
|
|
447
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
448
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
449
|
+
https_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
450
|
+
issuer: Optional[pulumi.Input[_builtins.str]] = None,
|
|
451
|
+
issuer_host: Optional[pulumi.Input[_builtins.str]] = None,
|
|
452
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
453
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
454
|
+
scopes_supporteds: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'OidcProvider':
|
|
455
|
+
"""
|
|
456
|
+
Get an existing OidcProvider resource's state with the given name, id, and optional extra
|
|
457
|
+
properties used to qualify the lookup.
|
|
458
|
+
|
|
459
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
460
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
461
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
462
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: The client IDs that are permitted to use the provider.
|
|
463
|
+
If empty, no clients are allowed. If `*`, all clients are allowed.
|
|
464
|
+
:param pulumi.Input[_builtins.bool] https_enabled: Set to true if the issuer endpoint uses HTTPS.
|
|
465
|
+
:param pulumi.Input[_builtins.str] issuer: Specifies what will be used as the `scheme://host:port`
|
|
466
|
+
component for the `iss` claim of ID tokens. This value is computed using the
|
|
467
|
+
`issuer_host` and `https_enabled` fields.
|
|
468
|
+
:param pulumi.Input[_builtins.str] issuer_host: The host for the issuer. Can be either host or host:port.
|
|
469
|
+
:param pulumi.Input[_builtins.str] name: The name of the provider.
|
|
470
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
471
|
+
The value should not contain leading or trailing forward slashes.
|
|
472
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
473
|
+
*Available only for Vault Enterprise*.
|
|
474
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] scopes_supporteds: The scopes available for requesting on the provider.
|
|
475
|
+
"""
|
|
476
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
477
|
+
|
|
478
|
+
__props__ = _OidcProviderState.__new__(_OidcProviderState)
|
|
479
|
+
|
|
480
|
+
__props__.__dict__["allowed_client_ids"] = allowed_client_ids
|
|
481
|
+
__props__.__dict__["https_enabled"] = https_enabled
|
|
482
|
+
__props__.__dict__["issuer"] = issuer
|
|
483
|
+
__props__.__dict__["issuer_host"] = issuer_host
|
|
484
|
+
__props__.__dict__["name"] = name
|
|
485
|
+
__props__.__dict__["namespace"] = namespace
|
|
486
|
+
__props__.__dict__["scopes_supporteds"] = scopes_supporteds
|
|
487
|
+
return OidcProvider(resource_name, opts=opts, __props__=__props__)
|
|
488
|
+
|
|
489
|
+
@_builtins.property
|
|
490
|
+
@pulumi.getter(name="allowedClientIds")
|
|
491
|
+
def allowed_client_ids(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
492
|
+
"""
|
|
493
|
+
The client IDs that are permitted to use the provider.
|
|
494
|
+
If empty, no clients are allowed. If `*`, all clients are allowed.
|
|
495
|
+
"""
|
|
496
|
+
return pulumi.get(self, "allowed_client_ids")
|
|
497
|
+
|
|
498
|
+
@_builtins.property
|
|
499
|
+
@pulumi.getter(name="httpsEnabled")
|
|
500
|
+
def https_enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
501
|
+
"""
|
|
502
|
+
Set to true if the issuer endpoint uses HTTPS.
|
|
503
|
+
"""
|
|
504
|
+
return pulumi.get(self, "https_enabled")
|
|
505
|
+
|
|
506
|
+
@_builtins.property
|
|
507
|
+
@pulumi.getter
|
|
508
|
+
def issuer(self) -> pulumi.Output[_builtins.str]:
|
|
509
|
+
"""
|
|
510
|
+
Specifies what will be used as the `scheme://host:port`
|
|
511
|
+
component for the `iss` claim of ID tokens. This value is computed using the
|
|
512
|
+
`issuer_host` and `https_enabled` fields.
|
|
513
|
+
"""
|
|
514
|
+
return pulumi.get(self, "issuer")
|
|
515
|
+
|
|
516
|
+
@_builtins.property
|
|
517
|
+
@pulumi.getter(name="issuerHost")
|
|
518
|
+
def issuer_host(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
519
|
+
"""
|
|
520
|
+
The host for the issuer. Can be either host or host:port.
|
|
521
|
+
"""
|
|
522
|
+
return pulumi.get(self, "issuer_host")
|
|
523
|
+
|
|
524
|
+
@_builtins.property
|
|
525
|
+
@pulumi.getter
|
|
526
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
|
527
|
+
"""
|
|
528
|
+
The name of the provider.
|
|
529
|
+
"""
|
|
530
|
+
return pulumi.get(self, "name")
|
|
531
|
+
|
|
532
|
+
@_builtins.property
|
|
533
|
+
@pulumi.getter
|
|
534
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
535
|
+
"""
|
|
536
|
+
The namespace to provision the resource in.
|
|
537
|
+
The value should not contain leading or trailing forward slashes.
|
|
538
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
539
|
+
*Available only for Vault Enterprise*.
|
|
540
|
+
"""
|
|
541
|
+
return pulumi.get(self, "namespace")
|
|
542
|
+
|
|
543
|
+
@_builtins.property
|
|
544
|
+
@pulumi.getter(name="scopesSupporteds")
|
|
545
|
+
def scopes_supporteds(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
546
|
+
"""
|
|
547
|
+
The scopes available for requesting on the provider.
|
|
548
|
+
"""
|
|
549
|
+
return pulumi.get(self, "scopes_supporteds")
|
|
550
|
+
|