cyral.RepositoryConfAuth
Explore with Pulumi AI
# cyral.RepositoryConfAuth (Resource)
Manages Repository Analysis Configuration. This resource allows configuring Logs, Alerts, Analysis and Enforcement configurations for Data Repositories.See also.
Import ID syntax is
{repository_id}
.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as cyral from "@pulumi/cyral";
const someResourceName = new cyral.RepositoryConfAuth("someResourceName", {
allowNativeAuth: true,
clientTls: "enable|disable",
identityProvider: "",
repoTls: "enable|disable|enableAndVerifyCert",
repositoryId: "",
});
import pulumi
import pulumi_cyral as cyral
some_resource_name = cyral.RepositoryConfAuth("someResourceName",
allow_native_auth=True,
client_tls="enable|disable",
identity_provider="",
repo_tls="enable|disable|enableAndVerifyCert",
repository_id="")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/cyral/v4/cyral"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := cyral.NewRepositoryConfAuth(ctx, "someResourceName", &cyral.RepositoryConfAuthArgs{
AllowNativeAuth: pulumi.Bool(true),
ClientTls: pulumi.String("enable|disable"),
IdentityProvider: pulumi.String(""),
RepoTls: pulumi.String("enable|disable|enableAndVerifyCert"),
RepositoryId: pulumi.String(""),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Cyral = Pulumi.Cyral;
return await Deployment.RunAsync(() =>
{
var someResourceName = new Cyral.RepositoryConfAuth("someResourceName", new()
{
AllowNativeAuth = true,
ClientTls = "enable|disable",
IdentityProvider = "",
RepoTls = "enable|disable|enableAndVerifyCert",
RepositoryId = "",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.cyral.RepositoryConfAuth;
import com.pulumi.cyral.RepositoryConfAuthArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var someResourceName = new RepositoryConfAuth("someResourceName", RepositoryConfAuthArgs.builder()
.allowNativeAuth(true)
.clientTls("enable|disable")
.identityProvider("")
.repoTls("enable|disable|enableAndVerifyCert")
.repositoryId("")
.build());
}
}
resources:
someResourceName:
type: cyral:RepositoryConfAuth
properties:
allowNativeAuth: true
clientTls: enable|disable
identityProvider: ""
repoTls: enable|disable|enableAndVerifyCert
repositoryId: ""
Create RepositoryConfAuth Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new RepositoryConfAuth(name: string, args: RepositoryConfAuthArgs, opts?: CustomResourceOptions);
@overload
def RepositoryConfAuth(resource_name: str,
args: RepositoryConfAuthArgs,
opts: Optional[ResourceOptions] = None)
@overload
def RepositoryConfAuth(resource_name: str,
opts: Optional[ResourceOptions] = None,
repository_id: Optional[str] = None,
allow_native_auth: Optional[bool] = None,
auth_type: Optional[str] = None,
client_tls: Optional[str] = None,
identity_provider: Optional[str] = None,
repo_tls: Optional[str] = None)
func NewRepositoryConfAuth(ctx *Context, name string, args RepositoryConfAuthArgs, opts ...ResourceOption) (*RepositoryConfAuth, error)
public RepositoryConfAuth(string name, RepositoryConfAuthArgs args, CustomResourceOptions? opts = null)
public RepositoryConfAuth(String name, RepositoryConfAuthArgs args)
public RepositoryConfAuth(String name, RepositoryConfAuthArgs args, CustomResourceOptions options)
type: cyral:RepositoryConfAuth
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args RepositoryConfAuthArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args RepositoryConfAuthArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args RepositoryConfAuthArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args RepositoryConfAuthArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args RepositoryConfAuthArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var repositoryConfAuthResource = new Cyral.RepositoryConfAuth("repositoryConfAuthResource", new()
{
RepositoryId = "string",
AllowNativeAuth = false,
AuthType = "string",
ClientTls = "string",
IdentityProvider = "string",
RepoTls = "string",
});
example, err := cyral.NewRepositoryConfAuth(ctx, "repositoryConfAuthResource", &cyral.RepositoryConfAuthArgs{
RepositoryId: pulumi.String("string"),
AllowNativeAuth: pulumi.Bool(false),
AuthType: pulumi.String("string"),
ClientTls: pulumi.String("string"),
IdentityProvider: pulumi.String("string"),
RepoTls: pulumi.String("string"),
})
var repositoryConfAuthResource = new RepositoryConfAuth("repositoryConfAuthResource", RepositoryConfAuthArgs.builder()
.repositoryId("string")
.allowNativeAuth(false)
.authType("string")
.clientTls("string")
.identityProvider("string")
.repoTls("string")
.build());
repository_conf_auth_resource = cyral.RepositoryConfAuth("repositoryConfAuthResource",
repository_id="string",
allow_native_auth=False,
auth_type="string",
client_tls="string",
identity_provider="string",
repo_tls="string")
const repositoryConfAuthResource = new cyral.RepositoryConfAuth("repositoryConfAuthResource", {
repositoryId: "string",
allowNativeAuth: false,
authType: "string",
clientTls: "string",
identityProvider: "string",
repoTls: "string",
});
type: cyral:RepositoryConfAuth
properties:
allowNativeAuth: false
authType: string
clientTls: string
identityProvider: string
repoTls: string
repositoryId: string
RepositoryConfAuth Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The RepositoryConfAuth resource accepts the following input properties:
- Repository
Id string - The ID of the repository to be configured.
- Allow
Native boolAuth - Should the communication allow native authentication?
- Auth
Type string - Authentication type for this repository. Note:
AWS_IAM
is currently only supported bymongodb
repo type. List of supported values: -ACCESS_TOKEN
-AWS_IAM
- Client
Tls string - Specifies whether the sidecar will require TLS communication with clients. Defaults to
disable
. List of supported values: -enable
-disable
- Identity
Provider string - The semantics of this field changed in control planes
v4.13
and later. See how it should be configured depending on your control plane version: -v4.12
and below: - Provide the ID (Alias) of the identity provider integration to allow user authentication using an IdP. -v4.13
and later: - If not supplied, then end-user authentication is disabled. - If end-user authentication with Cyral Access Token is desired, then set toACCESS_TOKEN
or any other non-empty string. - If end-user authentication with AWS IAM is desired, then this must be the ID of an AWS IAM integration, and theauth_type
attribute must be set toAWS_IAM
. - Repo
Tls string - Specifies whether the sidecar will communicate with the repository using TLS. Defaults to
disable
. List of supported values: -enable
-enableAndVerifyCert
-disable
- Repository
Id string - The ID of the repository to be configured.
- Allow
Native boolAuth - Should the communication allow native authentication?
- Auth
Type string - Authentication type for this repository. Note:
AWS_IAM
is currently only supported bymongodb
repo type. List of supported values: -ACCESS_TOKEN
-AWS_IAM
- Client
Tls string - Specifies whether the sidecar will require TLS communication with clients. Defaults to
disable
. List of supported values: -enable
-disable
- Identity
Provider string - The semantics of this field changed in control planes
v4.13
and later. See how it should be configured depending on your control plane version: -v4.12
and below: - Provide the ID (Alias) of the identity provider integration to allow user authentication using an IdP. -v4.13
and later: - If not supplied, then end-user authentication is disabled. - If end-user authentication with Cyral Access Token is desired, then set toACCESS_TOKEN
or any other non-empty string. - If end-user authentication with AWS IAM is desired, then this must be the ID of an AWS IAM integration, and theauth_type
attribute must be set toAWS_IAM
. - Repo
Tls string - Specifies whether the sidecar will communicate with the repository using TLS. Defaults to
disable
. List of supported values: -enable
-enableAndVerifyCert
-disable
- repository
Id String - The ID of the repository to be configured.
- allow
Native BooleanAuth - Should the communication allow native authentication?
- auth
Type String - Authentication type for this repository. Note:
AWS_IAM
is currently only supported bymongodb
repo type. List of supported values: -ACCESS_TOKEN
-AWS_IAM
- client
Tls String - Specifies whether the sidecar will require TLS communication with clients. Defaults to
disable
. List of supported values: -enable
-disable
- identity
Provider String - The semantics of this field changed in control planes
v4.13
and later. See how it should be configured depending on your control plane version: -v4.12
and below: - Provide the ID (Alias) of the identity provider integration to allow user authentication using an IdP. -v4.13
and later: - If not supplied, then end-user authentication is disabled. - If end-user authentication with Cyral Access Token is desired, then set toACCESS_TOKEN
or any other non-empty string. - If end-user authentication with AWS IAM is desired, then this must be the ID of an AWS IAM integration, and theauth_type
attribute must be set toAWS_IAM
. - repo
Tls String - Specifies whether the sidecar will communicate with the repository using TLS. Defaults to
disable
. List of supported values: -enable
-enableAndVerifyCert
-disable
- repository
Id string - The ID of the repository to be configured.
- allow
Native booleanAuth - Should the communication allow native authentication?
- auth
Type string - Authentication type for this repository. Note:
AWS_IAM
is currently only supported bymongodb
repo type. List of supported values: -ACCESS_TOKEN
-AWS_IAM
- client
Tls string - Specifies whether the sidecar will require TLS communication with clients. Defaults to
disable
. List of supported values: -enable
-disable
- identity
Provider string - The semantics of this field changed in control planes
v4.13
and later. See how it should be configured depending on your control plane version: -v4.12
and below: - Provide the ID (Alias) of the identity provider integration to allow user authentication using an IdP. -v4.13
and later: - If not supplied, then end-user authentication is disabled. - If end-user authentication with Cyral Access Token is desired, then set toACCESS_TOKEN
or any other non-empty string. - If end-user authentication with AWS IAM is desired, then this must be the ID of an AWS IAM integration, and theauth_type
attribute must be set toAWS_IAM
. - repo
Tls string - Specifies whether the sidecar will communicate with the repository using TLS. Defaults to
disable
. List of supported values: -enable
-enableAndVerifyCert
-disable
- repository_
id str - The ID of the repository to be configured.
- allow_
native_ boolauth - Should the communication allow native authentication?
- auth_
type str - Authentication type for this repository. Note:
AWS_IAM
is currently only supported bymongodb
repo type. List of supported values: -ACCESS_TOKEN
-AWS_IAM
- client_
tls str - Specifies whether the sidecar will require TLS communication with clients. Defaults to
disable
. List of supported values: -enable
-disable
- identity_
provider str - The semantics of this field changed in control planes
v4.13
and later. See how it should be configured depending on your control plane version: -v4.12
and below: - Provide the ID (Alias) of the identity provider integration to allow user authentication using an IdP. -v4.13
and later: - If not supplied, then end-user authentication is disabled. - If end-user authentication with Cyral Access Token is desired, then set toACCESS_TOKEN
or any other non-empty string. - If end-user authentication with AWS IAM is desired, then this must be the ID of an AWS IAM integration, and theauth_type
attribute must be set toAWS_IAM
. - repo_
tls str - Specifies whether the sidecar will communicate with the repository using TLS. Defaults to
disable
. List of supported values: -enable
-enableAndVerifyCert
-disable
- repository
Id String - The ID of the repository to be configured.
- allow
Native BooleanAuth - Should the communication allow native authentication?
- auth
Type String - Authentication type for this repository. Note:
AWS_IAM
is currently only supported bymongodb
repo type. List of supported values: -ACCESS_TOKEN
-AWS_IAM
- client
Tls String - Specifies whether the sidecar will require TLS communication with clients. Defaults to
disable
. List of supported values: -enable
-disable
- identity
Provider String - The semantics of this field changed in control planes
v4.13
and later. See how it should be configured depending on your control plane version: -v4.12
and below: - Provide the ID (Alias) of the identity provider integration to allow user authentication using an IdP. -v4.13
and later: - If not supplied, then end-user authentication is disabled. - If end-user authentication with Cyral Access Token is desired, then set toACCESS_TOKEN
or any other non-empty string. - If end-user authentication with AWS IAM is desired, then this must be the ID of an AWS IAM integration, and theauth_type
attribute must be set toAWS_IAM
. - repo
Tls String - Specifies whether the sidecar will communicate with the repository using TLS. Defaults to
disable
. List of supported values: -enable
-enableAndVerifyCert
-disable
Outputs
All input properties are implicitly available as output properties. Additionally, the RepositoryConfAuth resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing RepositoryConfAuth Resource
Get an existing RepositoryConfAuth resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: RepositoryConfAuthState, opts?: CustomResourceOptions): RepositoryConfAuth
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
allow_native_auth: Optional[bool] = None,
auth_type: Optional[str] = None,
client_tls: Optional[str] = None,
identity_provider: Optional[str] = None,
repo_tls: Optional[str] = None,
repository_id: Optional[str] = None) -> RepositoryConfAuth
func GetRepositoryConfAuth(ctx *Context, name string, id IDInput, state *RepositoryConfAuthState, opts ...ResourceOption) (*RepositoryConfAuth, error)
public static RepositoryConfAuth Get(string name, Input<string> id, RepositoryConfAuthState? state, CustomResourceOptions? opts = null)
public static RepositoryConfAuth get(String name, Output<String> id, RepositoryConfAuthState state, CustomResourceOptions options)
resources: _: type: cyral:RepositoryConfAuth get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Allow
Native boolAuth - Should the communication allow native authentication?
- Auth
Type string - Authentication type for this repository. Note:
AWS_IAM
is currently only supported bymongodb
repo type. List of supported values: -ACCESS_TOKEN
-AWS_IAM
- Client
Tls string - Specifies whether the sidecar will require TLS communication with clients. Defaults to
disable
. List of supported values: -enable
-disable
- Identity
Provider string - The semantics of this field changed in control planes
v4.13
and later. See how it should be configured depending on your control plane version: -v4.12
and below: - Provide the ID (Alias) of the identity provider integration to allow user authentication using an IdP. -v4.13
and later: - If not supplied, then end-user authentication is disabled. - If end-user authentication with Cyral Access Token is desired, then set toACCESS_TOKEN
or any other non-empty string. - If end-user authentication with AWS IAM is desired, then this must be the ID of an AWS IAM integration, and theauth_type
attribute must be set toAWS_IAM
. - Repo
Tls string - Specifies whether the sidecar will communicate with the repository using TLS. Defaults to
disable
. List of supported values: -enable
-enableAndVerifyCert
-disable
- Repository
Id string - The ID of the repository to be configured.
- Allow
Native boolAuth - Should the communication allow native authentication?
- Auth
Type string - Authentication type for this repository. Note:
AWS_IAM
is currently only supported bymongodb
repo type. List of supported values: -ACCESS_TOKEN
-AWS_IAM
- Client
Tls string - Specifies whether the sidecar will require TLS communication with clients. Defaults to
disable
. List of supported values: -enable
-disable
- Identity
Provider string - The semantics of this field changed in control planes
v4.13
and later. See how it should be configured depending on your control plane version: -v4.12
and below: - Provide the ID (Alias) of the identity provider integration to allow user authentication using an IdP. -v4.13
and later: - If not supplied, then end-user authentication is disabled. - If end-user authentication with Cyral Access Token is desired, then set toACCESS_TOKEN
or any other non-empty string. - If end-user authentication with AWS IAM is desired, then this must be the ID of an AWS IAM integration, and theauth_type
attribute must be set toAWS_IAM
. - Repo
Tls string - Specifies whether the sidecar will communicate with the repository using TLS. Defaults to
disable
. List of supported values: -enable
-enableAndVerifyCert
-disable
- Repository
Id string - The ID of the repository to be configured.
- allow
Native BooleanAuth - Should the communication allow native authentication?
- auth
Type String - Authentication type for this repository. Note:
AWS_IAM
is currently only supported bymongodb
repo type. List of supported values: -ACCESS_TOKEN
-AWS_IAM
- client
Tls String - Specifies whether the sidecar will require TLS communication with clients. Defaults to
disable
. List of supported values: -enable
-disable
- identity
Provider String - The semantics of this field changed in control planes
v4.13
and later. See how it should be configured depending on your control plane version: -v4.12
and below: - Provide the ID (Alias) of the identity provider integration to allow user authentication using an IdP. -v4.13
and later: - If not supplied, then end-user authentication is disabled. - If end-user authentication with Cyral Access Token is desired, then set toACCESS_TOKEN
or any other non-empty string. - If end-user authentication with AWS IAM is desired, then this must be the ID of an AWS IAM integration, and theauth_type
attribute must be set toAWS_IAM
. - repo
Tls String - Specifies whether the sidecar will communicate with the repository using TLS. Defaults to
disable
. List of supported values: -enable
-enableAndVerifyCert
-disable
- repository
Id String - The ID of the repository to be configured.
- allow
Native booleanAuth - Should the communication allow native authentication?
- auth
Type string - Authentication type for this repository. Note:
AWS_IAM
is currently only supported bymongodb
repo type. List of supported values: -ACCESS_TOKEN
-AWS_IAM
- client
Tls string - Specifies whether the sidecar will require TLS communication with clients. Defaults to
disable
. List of supported values: -enable
-disable
- identity
Provider string - The semantics of this field changed in control planes
v4.13
and later. See how it should be configured depending on your control plane version: -v4.12
and below: - Provide the ID (Alias) of the identity provider integration to allow user authentication using an IdP. -v4.13
and later: - If not supplied, then end-user authentication is disabled. - If end-user authentication with Cyral Access Token is desired, then set toACCESS_TOKEN
or any other non-empty string. - If end-user authentication with AWS IAM is desired, then this must be the ID of an AWS IAM integration, and theauth_type
attribute must be set toAWS_IAM
. - repo
Tls string - Specifies whether the sidecar will communicate with the repository using TLS. Defaults to
disable
. List of supported values: -enable
-enableAndVerifyCert
-disable
- repository
Id string - The ID of the repository to be configured.
- allow_
native_ boolauth - Should the communication allow native authentication?
- auth_
type str - Authentication type for this repository. Note:
AWS_IAM
is currently only supported bymongodb
repo type. List of supported values: -ACCESS_TOKEN
-AWS_IAM
- client_
tls str - Specifies whether the sidecar will require TLS communication with clients. Defaults to
disable
. List of supported values: -enable
-disable
- identity_
provider str - The semantics of this field changed in control planes
v4.13
and later. See how it should be configured depending on your control plane version: -v4.12
and below: - Provide the ID (Alias) of the identity provider integration to allow user authentication using an IdP. -v4.13
and later: - If not supplied, then end-user authentication is disabled. - If end-user authentication with Cyral Access Token is desired, then set toACCESS_TOKEN
or any other non-empty string. - If end-user authentication with AWS IAM is desired, then this must be the ID of an AWS IAM integration, and theauth_type
attribute must be set toAWS_IAM
. - repo_
tls str - Specifies whether the sidecar will communicate with the repository using TLS. Defaults to
disable
. List of supported values: -enable
-enableAndVerifyCert
-disable
- repository_
id str - The ID of the repository to be configured.
- allow
Native BooleanAuth - Should the communication allow native authentication?
- auth
Type String - Authentication type for this repository. Note:
AWS_IAM
is currently only supported bymongodb
repo type. List of supported values: -ACCESS_TOKEN
-AWS_IAM
- client
Tls String - Specifies whether the sidecar will require TLS communication with clients. Defaults to
disable
. List of supported values: -enable
-disable
- identity
Provider String - The semantics of this field changed in control planes
v4.13
and later. See how it should be configured depending on your control plane version: -v4.12
and below: - Provide the ID (Alias) of the identity provider integration to allow user authentication using an IdP. -v4.13
and later: - If not supplied, then end-user authentication is disabled. - If end-user authentication with Cyral Access Token is desired, then set toACCESS_TOKEN
or any other non-empty string. - If end-user authentication with AWS IAM is desired, then this must be the ID of an AWS IAM integration, and theauth_type
attribute must be set toAWS_IAM
. - repo
Tls String - Specifies whether the sidecar will communicate with the repository using TLS. Defaults to
disable
. List of supported values: -enable
-enableAndVerifyCert
-disable
- repository
Id String - The ID of the repository to be configured.
Package Details
- Repository
- cyral cyralinc/terraform-provider-cyral
- License
- Notes
- This Pulumi package is based on the
cyral
Terraform Provider.