pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendIdentityWhitelistArgs', 'AuthBackendIdentityWhitelist']
|
@@ -25,7 +30,7 @@ class AuthBackendIdentityWhitelistArgs:
|
|
25
30
|
tidying of the identity-whitelist entries.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
:param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
|
31
36
|
have passed beyond the roletag expiration, before it is removed from the
|
@@ -71,7 +76,7 @@ class AuthBackendIdentityWhitelistArgs:
|
|
71
76
|
"""
|
72
77
|
The namespace to provision the resource in.
|
73
78
|
The value should not contain leading or trailing forward slashes.
|
74
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
79
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
75
80
|
*Available only for Vault Enterprise*.
|
76
81
|
"""
|
77
82
|
return pulumi.get(self, "namespace")
|
@@ -109,7 +114,7 @@ class _AuthBackendIdentityWhitelistState:
|
|
109
114
|
tidying of the identity-whitelist entries.
|
110
115
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
111
116
|
The value should not contain leading or trailing forward slashes.
|
112
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
117
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
113
118
|
*Available only for Vault Enterprise*.
|
114
119
|
:param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
|
115
120
|
have passed beyond the roletag expiration, before it is removed from the
|
@@ -155,7 +160,7 @@ class _AuthBackendIdentityWhitelistState:
|
|
155
160
|
"""
|
156
161
|
The namespace to provision the resource in.
|
157
162
|
The value should not contain leading or trailing forward slashes.
|
158
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
163
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
159
164
|
*Available only for Vault Enterprise*.
|
160
165
|
"""
|
161
166
|
return pulumi.get(self, "namespace")
|
@@ -197,17 +202,15 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
197
202
|
|
198
203
|
## Example Usage
|
199
204
|
|
200
|
-
<!--Start PulumiCodeChooser -->
|
201
205
|
```python
|
202
206
|
import pulumi
|
203
207
|
import pulumi_vault as vault
|
204
208
|
|
205
|
-
|
206
|
-
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("
|
207
|
-
backend=
|
209
|
+
example = vault.AuthBackend("example", type="aws")
|
210
|
+
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
|
211
|
+
backend=example.path,
|
208
212
|
safety_buffer=3600)
|
209
213
|
```
|
210
|
-
<!--End PulumiCodeChooser -->
|
211
214
|
|
212
215
|
## Import
|
213
216
|
|
@@ -224,7 +227,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
224
227
|
tidying of the identity-whitelist entries.
|
225
228
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
226
229
|
The value should not contain leading or trailing forward slashes.
|
227
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
230
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
228
231
|
*Available only for Vault Enterprise*.
|
229
232
|
:param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
|
230
233
|
have passed beyond the roletag expiration, before it is removed from the
|
@@ -244,17 +247,15 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
244
247
|
|
245
248
|
## Example Usage
|
246
249
|
|
247
|
-
<!--Start PulumiCodeChooser -->
|
248
250
|
```python
|
249
251
|
import pulumi
|
250
252
|
import pulumi_vault as vault
|
251
253
|
|
252
|
-
|
253
|
-
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("
|
254
|
-
backend=
|
254
|
+
example = vault.AuthBackend("example", type="aws")
|
255
|
+
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("example",
|
256
|
+
backend=example.path,
|
255
257
|
safety_buffer=3600)
|
256
258
|
```
|
257
|
-
<!--End PulumiCodeChooser -->
|
258
259
|
|
259
260
|
## Import
|
260
261
|
|
@@ -322,7 +323,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
322
323
|
tidying of the identity-whitelist entries.
|
323
324
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
324
325
|
The value should not contain leading or trailing forward slashes.
|
325
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
326
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
326
327
|
*Available only for Vault Enterprise*.
|
327
328
|
:param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
|
328
329
|
have passed beyond the roletag expiration, before it is removed from the
|
@@ -361,7 +362,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
361
362
|
"""
|
362
363
|
The namespace to provision the resource in.
|
363
364
|
The value should not contain leading or trailing forward slashes.
|
364
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
365
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
365
366
|
*Available only for Vault Enterprise*.
|
366
367
|
"""
|
367
368
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
|
@@ -41,7 +46,7 @@ class AuthBackendLoginArgs:
|
|
41
46
|
authenticate with. Can be retrieved from the EC2 metadata server.
|
42
47
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
43
48
|
The value should not contain leading or trailing forward slashes.
|
44
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
49
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
45
50
|
*Available only for Vault Enterprise*.
|
46
51
|
:param pulumi.Input[str] nonce: The unique nonce to be used for login requests. Can be
|
47
52
|
set to a user-specified value, or will contain the server-generated value
|
@@ -163,7 +168,7 @@ class AuthBackendLoginArgs:
|
|
163
168
|
"""
|
164
169
|
The namespace to provision the resource in.
|
165
170
|
The value should not contain leading or trailing forward slashes.
|
166
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
171
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
167
172
|
*Available only for Vault Enterprise*.
|
168
173
|
"""
|
169
174
|
return pulumi.get(self, "namespace")
|
@@ -243,7 +248,7 @@ class _AuthBackendLoginState:
|
|
243
248
|
identity: Optional[pulumi.Input[str]] = None,
|
244
249
|
lease_duration: Optional[pulumi.Input[int]] = None,
|
245
250
|
lease_start_time: Optional[pulumi.Input[str]] = None,
|
246
|
-
metadata: Optional[pulumi.Input[Mapping[str,
|
251
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
247
252
|
namespace: Optional[pulumi.Input[str]] = None,
|
248
253
|
nonce: Optional[pulumi.Input[str]] = None,
|
249
254
|
pkcs7: Optional[pulumi.Input[str]] = None,
|
@@ -270,12 +275,11 @@ class _AuthBackendLoginState:
|
|
270
275
|
authenticate with. Can be retrieved from the EC2 metadata server.
|
271
276
|
:param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
|
272
277
|
to the time in `lease_start_time`.
|
273
|
-
:param pulumi.Input[str]
|
274
|
-
:param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
|
278
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: A map of information returned by the Vault server about the
|
275
279
|
authentication used to generate this token.
|
276
280
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
277
281
|
The value should not contain leading or trailing forward slashes.
|
278
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
282
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
279
283
|
*Available only for Vault Enterprise*.
|
280
284
|
:param pulumi.Input[str] nonce: The unique nonce to be used for login requests. Can be
|
281
285
|
set to a user-specified value, or will contain the server-generated value
|
@@ -461,9 +465,6 @@ class _AuthBackendLoginState:
|
|
461
465
|
@property
|
462
466
|
@pulumi.getter(name="leaseStartTime")
|
463
467
|
def lease_start_time(self) -> Optional[pulumi.Input[str]]:
|
464
|
-
"""
|
465
|
-
Time at which the lease was read, using the clock of the system where Terraform was running
|
466
|
-
"""
|
467
468
|
return pulumi.get(self, "lease_start_time")
|
468
469
|
|
469
470
|
@lease_start_time.setter
|
@@ -472,7 +473,7 @@ class _AuthBackendLoginState:
|
|
472
473
|
|
473
474
|
@property
|
474
475
|
@pulumi.getter
|
475
|
-
def metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
476
|
+
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
476
477
|
"""
|
477
478
|
A map of information returned by the Vault server about the
|
478
479
|
authentication used to generate this token.
|
@@ -480,7 +481,7 @@ class _AuthBackendLoginState:
|
|
480
481
|
return pulumi.get(self, "metadata")
|
481
482
|
|
482
483
|
@metadata.setter
|
483
|
-
def metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
484
|
+
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
484
485
|
pulumi.set(self, "metadata", value)
|
485
486
|
|
486
487
|
@property
|
@@ -489,7 +490,7 @@ class _AuthBackendLoginState:
|
|
489
490
|
"""
|
490
491
|
The namespace to provision the resource in.
|
491
492
|
The value should not contain leading or trailing forward slashes.
|
492
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
493
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
493
494
|
*Available only for Vault Enterprise*.
|
494
495
|
"""
|
495
496
|
return pulumi.get(self, "namespace")
|
@@ -618,7 +619,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
618
619
|
authenticate with. Can be retrieved from the EC2 metadata server.
|
619
620
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
620
621
|
The value should not contain leading or trailing forward slashes.
|
621
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
622
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
622
623
|
*Available only for Vault Enterprise*.
|
623
624
|
:param pulumi.Input[str] nonce: The unique nonce to be used for login requests. Can be
|
624
625
|
set to a user-specified value, or will contain the server-generated value
|
@@ -722,7 +723,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
722
723
|
identity: Optional[pulumi.Input[str]] = None,
|
723
724
|
lease_duration: Optional[pulumi.Input[int]] = None,
|
724
725
|
lease_start_time: Optional[pulumi.Input[str]] = None,
|
725
|
-
metadata: Optional[pulumi.Input[Mapping[str,
|
726
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
726
727
|
namespace: Optional[pulumi.Input[str]] = None,
|
727
728
|
nonce: Optional[pulumi.Input[str]] = None,
|
728
729
|
pkcs7: Optional[pulumi.Input[str]] = None,
|
@@ -754,12 +755,11 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
754
755
|
authenticate with. Can be retrieved from the EC2 metadata server.
|
755
756
|
:param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
|
756
757
|
to the time in `lease_start_time`.
|
757
|
-
:param pulumi.Input[str]
|
758
|
-
:param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
|
758
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: A map of information returned by the Vault server about the
|
759
759
|
authentication used to generate this token.
|
760
760
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
761
761
|
The value should not contain leading or trailing forward slashes.
|
762
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
762
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
763
763
|
*Available only for Vault Enterprise*.
|
764
764
|
:param pulumi.Input[str] nonce: The unique nonce to be used for login requests. Can be
|
765
765
|
set to a user-specified value, or will contain the server-generated value
|
@@ -891,14 +891,11 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
891
891
|
@property
|
892
892
|
@pulumi.getter(name="leaseStartTime")
|
893
893
|
def lease_start_time(self) -> pulumi.Output[str]:
|
894
|
-
"""
|
895
|
-
Time at which the lease was read, using the clock of the system where Terraform was running
|
896
|
-
"""
|
897
894
|
return pulumi.get(self, "lease_start_time")
|
898
895
|
|
899
896
|
@property
|
900
897
|
@pulumi.getter
|
901
|
-
def metadata(self) -> pulumi.Output[Mapping[str,
|
898
|
+
def metadata(self) -> pulumi.Output[Mapping[str, str]]:
|
902
899
|
"""
|
903
900
|
A map of information returned by the Vault server about the
|
904
901
|
authentication used to generate this token.
|
@@ -911,7 +908,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
911
908
|
"""
|
912
909
|
The namespace to provision the resource in.
|
913
910
|
The value should not contain leading or trailing forward slashes.
|
914
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
911
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
915
912
|
*Available only for Vault Enterprise*.
|
916
913
|
"""
|
917
914
|
return pulumi.get(self, "namespace")
|