com.pulumi.vault.ldap.kotlin.SecretBackendLibrarySetArgs.kt Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of pulumi-vault-kotlin Show documentation
Show all versions of pulumi-vault-kotlin Show documentation
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.vault.ldap.kotlin
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.vault.ldap.SecretBackendLibrarySetArgs.builder
import kotlin.Boolean
import kotlin.Int
import kotlin.String
import kotlin.Suppress
import kotlin.collections.List
import kotlin.jvm.JvmName
/**
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as vault from "@pulumi/vault";
* const config = new vault.ldap.SecretBackend("config", {
* path: "ldap",
* binddn: "CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
* bindpass: "SuperSecretPassw0rd",
* url: "ldaps://localhost",
* insecureTls: true,
* userdn: "CN=Users,DC=corp,DC=example,DC=net",
* });
* const qa = new vault.ldap.SecretBackendLibrarySet("qa", {
* mount: config.path,
* name: "qa",
* serviceAccountNames: [
* "Bob",
* "Mary",
* ],
* ttl: 60,
* disableCheckInEnforcement: true,
* maxTtl: 120,
* });
* ```
* ```python
* import pulumi
* import pulumi_vault as vault
* config = vault.ldap.SecretBackend("config",
* path="ldap",
* binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
* bindpass="SuperSecretPassw0rd",
* url="ldaps://localhost",
* insecure_tls=True,
* userdn="CN=Users,DC=corp,DC=example,DC=net")
* qa = vault.ldap.SecretBackendLibrarySet("qa",
* mount=config.path,
* name="qa",
* service_account_names=[
* "Bob",
* "Mary",
* ],
* ttl=60,
* disable_check_in_enforcement=True,
* max_ttl=120)
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Vault = Pulumi.Vault;
* return await Deployment.RunAsync(() =>
* {
* var config = new Vault.Ldap.SecretBackend("config", new()
* {
* Path = "ldap",
* Binddn = "CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
* Bindpass = "SuperSecretPassw0rd",
* Url = "ldaps://localhost",
* InsecureTls = true,
* Userdn = "CN=Users,DC=corp,DC=example,DC=net",
* });
* var qa = new Vault.Ldap.SecretBackendLibrarySet("qa", new()
* {
* Mount = config.Path,
* Name = "qa",
* ServiceAccountNames = new[]
* {
* "Bob",
* "Mary",
* },
* Ttl = 60,
* DisableCheckInEnforcement = true,
* MaxTtl = 120,
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-vault/sdk/v6/go/vault/ldap"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* config, err := ldap.NewSecretBackend(ctx, "config", &ldap.SecretBackendArgs{
* Path: pulumi.String("ldap"),
* Binddn: pulumi.String("CN=Administrator,CN=Users,DC=corp,DC=example,DC=net"),
* Bindpass: pulumi.String("SuperSecretPassw0rd"),
* Url: pulumi.String("ldaps://localhost"),
* InsecureTls: pulumi.Bool(true),
* Userdn: pulumi.String("CN=Users,DC=corp,DC=example,DC=net"),
* })
* if err != nil {
* return err
* }
* _, err = ldap.NewSecretBackendLibrarySet(ctx, "qa", &ldap.SecretBackendLibrarySetArgs{
* Mount: config.Path,
* Name: pulumi.String("qa"),
* ServiceAccountNames: pulumi.StringArray{
* pulumi.String("Bob"),
* pulumi.String("Mary"),
* },
* Ttl: pulumi.Int(60),
* DisableCheckInEnforcement: pulumi.Bool(true),
* MaxTtl: pulumi.Int(120),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.vault.ldap.SecretBackend;
* import com.pulumi.vault.ldap.SecretBackendArgs;
* import com.pulumi.vault.ldap.SecretBackendLibrarySet;
* import com.pulumi.vault.ldap.SecretBackendLibrarySetArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var config = new SecretBackend("config", SecretBackendArgs.builder()
* .path("ldap")
* .binddn("CN=Administrator,CN=Users,DC=corp,DC=example,DC=net")
* .bindpass("SuperSecretPassw0rd")
* .url("ldaps://localhost")
* .insecureTls("true")
* .userdn("CN=Users,DC=corp,DC=example,DC=net")
* .build());
* var qa = new SecretBackendLibrarySet("qa", SecretBackendLibrarySetArgs.builder()
* .mount(config.path())
* .name("qa")
* .serviceAccountNames(
* "Bob",
* "Mary")
* .ttl(60)
* .disableCheckInEnforcement(true)
* .maxTtl(120)
* .build());
* }
* }
* ```
* ```yaml
* resources:
* config:
* type: vault:ldap:SecretBackend
* properties:
* path: ldap
* binddn: CN=Administrator,CN=Users,DC=corp,DC=example,DC=net
* bindpass: SuperSecretPassw0rd
* url: ldaps://localhost
* insecureTls: 'true'
* userdn: CN=Users,DC=corp,DC=example,DC=net
* qa:
* type: vault:ldap:SecretBackendLibrarySet
* properties:
* mount: ${config.path}
* name: qa
* serviceAccountNames:
* - Bob
* - Mary
* ttl: 60
* disableCheckInEnforcement: true
* maxTtl: 120
* ```
*
* ## Import
* LDAP secret backend libraries can be imported using the `path`, e.g.
* ```sh
* $ pulumi import vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet qa ldap/library/bob
* ```
* @property disableCheckInEnforcement Disable enforcing that service
* accounts must be checked in by the entity or client token that checked them
* out. Defaults to false.
* @property maxTtl The maximum password time-to-live in seconds. Defaults
* to the configuration max_ttl if not provided.
* @property mount The path where the LDAP secrets backend is mounted.
* @property name The name to identify this set of service accounts.
* Must be unique within the backend.
* @property namespace The namespace to provision the resource in.
* The value should not contain leading or trailing forward slashes.
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
* *Available only for Vault Enterprise*.
* @property serviceAccountNames Specifies the slice of service accounts mapped to this set.
* @property ttl The password time-to-live in seconds. Defaults to the configuration
* ttl if not provided.
*/
public data class SecretBackendLibrarySetArgs(
public val disableCheckInEnforcement: Output? = null,
public val maxTtl: Output? = null,
public val mount: Output? = null,
public val name: Output? = null,
public val namespace: Output? = null,
public val serviceAccountNames: Output>? = null,
public val ttl: Output? = null,
) : ConvertibleToJava {
override fun toJava(): com.pulumi.vault.ldap.SecretBackendLibrarySetArgs =
com.pulumi.vault.ldap.SecretBackendLibrarySetArgs.builder()
.disableCheckInEnforcement(disableCheckInEnforcement?.applyValue({ args0 -> args0 }))
.maxTtl(maxTtl?.applyValue({ args0 -> args0 }))
.mount(mount?.applyValue({ args0 -> args0 }))
.name(name?.applyValue({ args0 -> args0 }))
.namespace(namespace?.applyValue({ args0 -> args0 }))
.serviceAccountNames(serviceAccountNames?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.ttl(ttl?.applyValue({ args0 -> args0 })).build()
}
/**
* Builder for [SecretBackendLibrarySetArgs].
*/
@PulumiTagMarker
public class SecretBackendLibrarySetArgsBuilder internal constructor() {
private var disableCheckInEnforcement: Output? = null
private var maxTtl: Output? = null
private var mount: Output? = null
private var name: Output? = null
private var namespace: Output? = null
private var serviceAccountNames: Output>? = null
private var ttl: Output? = null
/**
* @param value Disable enforcing that service
* accounts must be checked in by the entity or client token that checked them
* out. Defaults to false.
*/
@JvmName("ntjwbgjppfepmuel")
public suspend fun disableCheckInEnforcement(`value`: Output) {
this.disableCheckInEnforcement = value
}
/**
* @param value The maximum password time-to-live in seconds. Defaults
* to the configuration max_ttl if not provided.
*/
@JvmName("bwmssabwprayynrj")
public suspend fun maxTtl(`value`: Output) {
this.maxTtl = value
}
/**
* @param value The path where the LDAP secrets backend is mounted.
*/
@JvmName("veawfogiletrkdiu")
public suspend fun mount(`value`: Output) {
this.mount = value
}
/**
* @param value The name to identify this set of service accounts.
* Must be unique within the backend.
*/
@JvmName("narcwckupmpngegw")
public suspend fun name(`value`: Output) {
this.name = value
}
/**
* @param value The namespace to provision the resource in.
* The value should not contain leading or trailing forward slashes.
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
* *Available only for Vault Enterprise*.
*/
@JvmName("rldtnnyyfqujdglt")
public suspend fun namespace(`value`: Output) {
this.namespace = value
}
/**
* @param value Specifies the slice of service accounts mapped to this set.
*/
@JvmName("xnmdosomjvopxivo")
public suspend fun serviceAccountNames(`value`: Output>) {
this.serviceAccountNames = value
}
@JvmName("hrqsfberaypsyyfv")
public suspend fun serviceAccountNames(vararg values: Output) {
this.serviceAccountNames = Output.all(values.asList())
}
/**
* @param values Specifies the slice of service accounts mapped to this set.
*/
@JvmName("opsgsphyysvyljrb")
public suspend fun serviceAccountNames(values: List
© 2015 - 2025 Weber Informatics LLC | Privacy Policy