pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,355 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['OidcScopeArgs', 'OidcScope']
18
+
19
+ @pulumi.input_type
20
+ class OidcScopeArgs:
21
+ def __init__(__self__, *,
22
+ description: Optional[pulumi.Input[_builtins.str]] = None,
23
+ name: Optional[pulumi.Input[_builtins.str]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ template: Optional[pulumi.Input[_builtins.str]] = None):
26
+ """
27
+ The set of arguments for constructing a OidcScope resource.
28
+ :param pulumi.Input[_builtins.str] description: A description of the scope.
29
+ :param pulumi.Input[_builtins.str] name: The name of the scope. The `openid` scope name is reserved.
30
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
31
+ The value should not contain leading or trailing forward slashes.
32
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
+ *Available only for Vault Enterprise*.
34
+ :param pulumi.Input[_builtins.str] template: The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON.
35
+ """
36
+ if description is not None:
37
+ pulumi.set(__self__, "description", description)
38
+ if name is not None:
39
+ pulumi.set(__self__, "name", name)
40
+ if namespace is not None:
41
+ pulumi.set(__self__, "namespace", namespace)
42
+ if template is not None:
43
+ pulumi.set(__self__, "template", template)
44
+
45
+ @_builtins.property
46
+ @pulumi.getter
47
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
48
+ """
49
+ A description of the scope.
50
+ """
51
+ return pulumi.get(self, "description")
52
+
53
+ @description.setter
54
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
55
+ pulumi.set(self, "description", value)
56
+
57
+ @_builtins.property
58
+ @pulumi.getter
59
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
60
+ """
61
+ The name of the scope. The `openid` scope name is reserved.
62
+ """
63
+ return pulumi.get(self, "name")
64
+
65
+ @name.setter
66
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
67
+ pulumi.set(self, "name", value)
68
+
69
+ @_builtins.property
70
+ @pulumi.getter
71
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
72
+ """
73
+ The namespace to provision the resource in.
74
+ The value should not contain leading or trailing forward slashes.
75
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
76
+ *Available only for Vault Enterprise*.
77
+ """
78
+ return pulumi.get(self, "namespace")
79
+
80
+ @namespace.setter
81
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
82
+ pulumi.set(self, "namespace", value)
83
+
84
+ @_builtins.property
85
+ @pulumi.getter
86
+ def template(self) -> Optional[pulumi.Input[_builtins.str]]:
87
+ """
88
+ The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON.
89
+ """
90
+ return pulumi.get(self, "template")
91
+
92
+ @template.setter
93
+ def template(self, value: Optional[pulumi.Input[_builtins.str]]):
94
+ pulumi.set(self, "template", value)
95
+
96
+
97
+ @pulumi.input_type
98
+ class _OidcScopeState:
99
+ def __init__(__self__, *,
100
+ description: Optional[pulumi.Input[_builtins.str]] = None,
101
+ name: Optional[pulumi.Input[_builtins.str]] = None,
102
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
103
+ template: Optional[pulumi.Input[_builtins.str]] = None):
104
+ """
105
+ Input properties used for looking up and filtering OidcScope resources.
106
+ :param pulumi.Input[_builtins.str] description: A description of the scope.
107
+ :param pulumi.Input[_builtins.str] name: The name of the scope. The `openid` scope name is reserved.
108
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
109
+ The value should not contain leading or trailing forward slashes.
110
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
111
+ *Available only for Vault Enterprise*.
112
+ :param pulumi.Input[_builtins.str] template: The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON.
113
+ """
114
+ if description is not None:
115
+ pulumi.set(__self__, "description", description)
116
+ if name is not None:
117
+ pulumi.set(__self__, "name", name)
118
+ if namespace is not None:
119
+ pulumi.set(__self__, "namespace", namespace)
120
+ if template is not None:
121
+ pulumi.set(__self__, "template", template)
122
+
123
+ @_builtins.property
124
+ @pulumi.getter
125
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
126
+ """
127
+ A description of the scope.
128
+ """
129
+ return pulumi.get(self, "description")
130
+
131
+ @description.setter
132
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
133
+ pulumi.set(self, "description", value)
134
+
135
+ @_builtins.property
136
+ @pulumi.getter
137
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
138
+ """
139
+ The name of the scope. The `openid` scope name is reserved.
140
+ """
141
+ return pulumi.get(self, "name")
142
+
143
+ @name.setter
144
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
145
+ pulumi.set(self, "name", value)
146
+
147
+ @_builtins.property
148
+ @pulumi.getter
149
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
150
+ """
151
+ The namespace to provision the resource in.
152
+ The value should not contain leading or trailing forward slashes.
153
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
154
+ *Available only for Vault Enterprise*.
155
+ """
156
+ return pulumi.get(self, "namespace")
157
+
158
+ @namespace.setter
159
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
160
+ pulumi.set(self, "namespace", value)
161
+
162
+ @_builtins.property
163
+ @pulumi.getter
164
+ def template(self) -> Optional[pulumi.Input[_builtins.str]]:
165
+ """
166
+ The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON.
167
+ """
168
+ return pulumi.get(self, "template")
169
+
170
+ @template.setter
171
+ def template(self, value: Optional[pulumi.Input[_builtins.str]]):
172
+ pulumi.set(self, "template", value)
173
+
174
+
175
+ @pulumi.type_token("vault:identity/oidcScope:OidcScope")
176
+ class OidcScope(pulumi.CustomResource):
177
+ @overload
178
+ def __init__(__self__,
179
+ resource_name: str,
180
+ opts: Optional[pulumi.ResourceOptions] = None,
181
+ description: Optional[pulumi.Input[_builtins.str]] = None,
182
+ name: Optional[pulumi.Input[_builtins.str]] = None,
183
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
184
+ template: Optional[pulumi.Input[_builtins.str]] = None,
185
+ __props__=None):
186
+ """
187
+ Manages OIDC Scopes in a Vault server. See the [Vault documentation](https://www.vaultproject.io/api-docs/secret/identity/oidc-provider#create-or-update-a-scope)
188
+ for more information.
189
+
190
+ ## Example Usage
191
+
192
+ ```python
193
+ import pulumi
194
+ import pulumi_vault as vault
195
+
196
+ groups = vault.identity.OidcScope("groups",
197
+ name="groups",
198
+ template="{\\"groups\\":{{identity.entity.groups.names}}}",
199
+ description="Vault OIDC Groups Scope")
200
+ ```
201
+
202
+ ## Import
203
+
204
+ OIDC Scopes can be imported using the `name`, e.g.
205
+
206
+ ```sh
207
+ $ pulumi import vault:identity/oidcScope:OidcScope groups groups
208
+ ```
209
+
210
+ :param str resource_name: The name of the resource.
211
+ :param pulumi.ResourceOptions opts: Options for the resource.
212
+ :param pulumi.Input[_builtins.str] description: A description of the scope.
213
+ :param pulumi.Input[_builtins.str] name: The name of the scope. The `openid` scope name is reserved.
214
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
215
+ The value should not contain leading or trailing forward slashes.
216
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
217
+ *Available only for Vault Enterprise*.
218
+ :param pulumi.Input[_builtins.str] template: The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON.
219
+ """
220
+ ...
221
+ @overload
222
+ def __init__(__self__,
223
+ resource_name: str,
224
+ args: Optional[OidcScopeArgs] = None,
225
+ opts: Optional[pulumi.ResourceOptions] = None):
226
+ """
227
+ Manages OIDC Scopes in a Vault server. See the [Vault documentation](https://www.vaultproject.io/api-docs/secret/identity/oidc-provider#create-or-update-a-scope)
228
+ for more information.
229
+
230
+ ## Example Usage
231
+
232
+ ```python
233
+ import pulumi
234
+ import pulumi_vault as vault
235
+
236
+ groups = vault.identity.OidcScope("groups",
237
+ name="groups",
238
+ template="{\\"groups\\":{{identity.entity.groups.names}}}",
239
+ description="Vault OIDC Groups Scope")
240
+ ```
241
+
242
+ ## Import
243
+
244
+ OIDC Scopes can be imported using the `name`, e.g.
245
+
246
+ ```sh
247
+ $ pulumi import vault:identity/oidcScope:OidcScope groups groups
248
+ ```
249
+
250
+ :param str resource_name: The name of the resource.
251
+ :param OidcScopeArgs args: The arguments to use to populate this resource's properties.
252
+ :param pulumi.ResourceOptions opts: Options for the resource.
253
+ """
254
+ ...
255
+ def __init__(__self__, resource_name: str, *args, **kwargs):
256
+ resource_args, opts = _utilities.get_resource_args_opts(OidcScopeArgs, pulumi.ResourceOptions, *args, **kwargs)
257
+ if resource_args is not None:
258
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
259
+ else:
260
+ __self__._internal_init(resource_name, *args, **kwargs)
261
+
262
+ def _internal_init(__self__,
263
+ resource_name: str,
264
+ opts: Optional[pulumi.ResourceOptions] = None,
265
+ description: Optional[pulumi.Input[_builtins.str]] = None,
266
+ name: Optional[pulumi.Input[_builtins.str]] = None,
267
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
268
+ template: Optional[pulumi.Input[_builtins.str]] = None,
269
+ __props__=None):
270
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
271
+ if not isinstance(opts, pulumi.ResourceOptions):
272
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
273
+ if opts.id is None:
274
+ if __props__ is not None:
275
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
276
+ __props__ = OidcScopeArgs.__new__(OidcScopeArgs)
277
+
278
+ __props__.__dict__["description"] = description
279
+ __props__.__dict__["name"] = name
280
+ __props__.__dict__["namespace"] = namespace
281
+ __props__.__dict__["template"] = template
282
+ super(OidcScope, __self__).__init__(
283
+ 'vault:identity/oidcScope:OidcScope',
284
+ resource_name,
285
+ __props__,
286
+ opts)
287
+
288
+ @staticmethod
289
+ def get(resource_name: str,
290
+ id: pulumi.Input[str],
291
+ opts: Optional[pulumi.ResourceOptions] = None,
292
+ description: Optional[pulumi.Input[_builtins.str]] = None,
293
+ name: Optional[pulumi.Input[_builtins.str]] = None,
294
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
295
+ template: Optional[pulumi.Input[_builtins.str]] = None) -> 'OidcScope':
296
+ """
297
+ Get an existing OidcScope resource's state with the given name, id, and optional extra
298
+ properties used to qualify the lookup.
299
+
300
+ :param str resource_name: The unique name of the resulting resource.
301
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
302
+ :param pulumi.ResourceOptions opts: Options for the resource.
303
+ :param pulumi.Input[_builtins.str] description: A description of the scope.
304
+ :param pulumi.Input[_builtins.str] name: The name of the scope. The `openid` scope name is reserved.
305
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
306
+ The value should not contain leading or trailing forward slashes.
307
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
308
+ *Available only for Vault Enterprise*.
309
+ :param pulumi.Input[_builtins.str] template: The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON.
310
+ """
311
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
312
+
313
+ __props__ = _OidcScopeState.__new__(_OidcScopeState)
314
+
315
+ __props__.__dict__["description"] = description
316
+ __props__.__dict__["name"] = name
317
+ __props__.__dict__["namespace"] = namespace
318
+ __props__.__dict__["template"] = template
319
+ return OidcScope(resource_name, opts=opts, __props__=__props__)
320
+
321
+ @_builtins.property
322
+ @pulumi.getter
323
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
324
+ """
325
+ A description of the scope.
326
+ """
327
+ return pulumi.get(self, "description")
328
+
329
+ @_builtins.property
330
+ @pulumi.getter
331
+ def name(self) -> pulumi.Output[_builtins.str]:
332
+ """
333
+ The name of the scope. The `openid` scope name is reserved.
334
+ """
335
+ return pulumi.get(self, "name")
336
+
337
+ @_builtins.property
338
+ @pulumi.getter
339
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
340
+ """
341
+ The namespace to provision the resource in.
342
+ The value should not contain leading or trailing forward slashes.
343
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
344
+ *Available only for Vault Enterprise*.
345
+ """
346
+ return pulumi.get(self, "namespace")
347
+
348
+ @_builtins.property
349
+ @pulumi.getter
350
+ def template(self) -> pulumi.Output[Optional[_builtins.str]]:
351
+ """
352
+ The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON.
353
+ """
354
+ return pulumi.get(self, "template")
355
+
@@ -0,0 +1,137 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetEntityAliasResult',
19
+ ]
20
+
21
+ @pulumi.output_type
22
+ class GetEntityAliasResult(dict):
23
+ def __init__(__self__, *,
24
+ canonical_id: _builtins.str,
25
+ creation_time: _builtins.str,
26
+ id: _builtins.str,
27
+ last_update_time: _builtins.str,
28
+ merged_from_canonical_ids: Sequence[_builtins.str],
29
+ metadata: Mapping[str, _builtins.str],
30
+ mount_accessor: _builtins.str,
31
+ mount_path: _builtins.str,
32
+ mount_type: _builtins.str,
33
+ name: _builtins.str):
34
+ """
35
+ :param _builtins.str canonical_id: Canonical ID of the Alias
36
+ :param _builtins.str creation_time: Creation time of the Alias
37
+ :param _builtins.str id: ID of the alias
38
+ :param _builtins.str last_update_time: Last update time of the alias
39
+ :param Sequence[_builtins.str] merged_from_canonical_ids: List of canonical IDs merged with this alias
40
+ :param Mapping[str, _builtins.str] metadata: Arbitrary metadata
41
+ :param _builtins.str mount_accessor: Authentication mount acccessor which this alias belongs to
42
+ :param _builtins.str mount_path: Authentication mount path which this alias belongs to
43
+ :param _builtins.str mount_type: Authentication mount type which this alias belongs to
44
+ :param _builtins.str name: Name of the alias
45
+ """
46
+ pulumi.set(__self__, "canonical_id", canonical_id)
47
+ pulumi.set(__self__, "creation_time", creation_time)
48
+ pulumi.set(__self__, "id", id)
49
+ pulumi.set(__self__, "last_update_time", last_update_time)
50
+ pulumi.set(__self__, "merged_from_canonical_ids", merged_from_canonical_ids)
51
+ pulumi.set(__self__, "metadata", metadata)
52
+ pulumi.set(__self__, "mount_accessor", mount_accessor)
53
+ pulumi.set(__self__, "mount_path", mount_path)
54
+ pulumi.set(__self__, "mount_type", mount_type)
55
+ pulumi.set(__self__, "name", name)
56
+
57
+ @_builtins.property
58
+ @pulumi.getter(name="canonicalId")
59
+ def canonical_id(self) -> _builtins.str:
60
+ """
61
+ Canonical ID of the Alias
62
+ """
63
+ return pulumi.get(self, "canonical_id")
64
+
65
+ @_builtins.property
66
+ @pulumi.getter(name="creationTime")
67
+ def creation_time(self) -> _builtins.str:
68
+ """
69
+ Creation time of the Alias
70
+ """
71
+ return pulumi.get(self, "creation_time")
72
+
73
+ @_builtins.property
74
+ @pulumi.getter
75
+ def id(self) -> _builtins.str:
76
+ """
77
+ ID of the alias
78
+ """
79
+ return pulumi.get(self, "id")
80
+
81
+ @_builtins.property
82
+ @pulumi.getter(name="lastUpdateTime")
83
+ def last_update_time(self) -> _builtins.str:
84
+ """
85
+ Last update time of the alias
86
+ """
87
+ return pulumi.get(self, "last_update_time")
88
+
89
+ @_builtins.property
90
+ @pulumi.getter(name="mergedFromCanonicalIds")
91
+ def merged_from_canonical_ids(self) -> Sequence[_builtins.str]:
92
+ """
93
+ List of canonical IDs merged with this alias
94
+ """
95
+ return pulumi.get(self, "merged_from_canonical_ids")
96
+
97
+ @_builtins.property
98
+ @pulumi.getter
99
+ def metadata(self) -> Mapping[str, _builtins.str]:
100
+ """
101
+ Arbitrary metadata
102
+ """
103
+ return pulumi.get(self, "metadata")
104
+
105
+ @_builtins.property
106
+ @pulumi.getter(name="mountAccessor")
107
+ def mount_accessor(self) -> _builtins.str:
108
+ """
109
+ Authentication mount acccessor which this alias belongs to
110
+ """
111
+ return pulumi.get(self, "mount_accessor")
112
+
113
+ @_builtins.property
114
+ @pulumi.getter(name="mountPath")
115
+ def mount_path(self) -> _builtins.str:
116
+ """
117
+ Authentication mount path which this alias belongs to
118
+ """
119
+ return pulumi.get(self, "mount_path")
120
+
121
+ @_builtins.property
122
+ @pulumi.getter(name="mountType")
123
+ def mount_type(self) -> _builtins.str:
124
+ """
125
+ Authentication mount type which this alias belongs to
126
+ """
127
+ return pulumi.get(self, "mount_type")
128
+
129
+ @_builtins.property
130
+ @pulumi.getter
131
+ def name(self) -> _builtins.str:
132
+ """
133
+ Name of the alias
134
+ """
135
+ return pulumi.get(self, "name")
136
+
137
+
@@ -0,0 +1,12 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ from .. import _utilities
7
+ import typing
8
+ # Export this package's modules as members:
9
+ from .auth_backend import *
10
+ from .auth_backend_role import *
11
+ from ._inputs import *
12
+ from . import outputs