pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -19,11 +19,7 @@ class AuthBackendClientArgs:
|
|
19
19
|
ec2_endpoint: Optional[pulumi.Input[str]] = None,
|
20
20
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
21
21
|
iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
|
22
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
23
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
24
|
-
max_retries: Optional[pulumi.Input[int]] = None,
|
25
22
|
namespace: Optional[pulumi.Input[str]] = None,
|
26
|
-
role_arn: Optional[pulumi.Input[str]] = None,
|
27
23
|
secret_key: Optional[pulumi.Input[str]] = None,
|
28
24
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
29
25
|
sts_region: Optional[pulumi.Input[str]] = None,
|
@@ -31,7 +27,7 @@ class AuthBackendClientArgs:
|
|
31
27
|
"""
|
32
28
|
The set of arguments for constructing a AuthBackendClient resource.
|
33
29
|
:param pulumi.Input[str] access_key: The AWS access key that Vault should use for the
|
34
|
-
auth backend.
|
30
|
+
auth backend.
|
35
31
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
36
32
|
mounted at. Defaults to `aws`.
|
37
33
|
:param pulumi.Input[str] ec2_endpoint: Override the URL Vault uses when making EC2 API
|
@@ -41,18 +37,10 @@ class AuthBackendClientArgs:
|
|
41
37
|
:param pulumi.Input[str] iam_server_id_header_value: The value to require in the
|
42
38
|
`X-Vault-AWS-IAM-Server-ID` header as part of `GetCallerIdentity` requests
|
43
39
|
that are used in the IAM auth method.
|
44
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value. Mutually exclusive with `access_key`.
|
45
|
-
Requires Vault 1.17+. *Available only for Vault Enterprise*
|
46
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
47
|
-
*Available only for Vault Enterprise*
|
48
|
-
:param pulumi.Input[int] max_retries: Number of max retries the client should use for recoverable errors.
|
49
|
-
The default `-1` falls back to the AWS SDK's default behavior.
|
50
40
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
51
41
|
The value should not contain leading or trailing forward slashes.
|
52
42
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
53
43
|
*Available only for Vault Enterprise*.
|
54
|
-
:param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
|
55
|
-
*Available only for Vault Enterprise*
|
56
44
|
:param pulumi.Input[str] secret_key: The AWS secret key that Vault should use for the
|
57
45
|
auth backend.
|
58
46
|
:param pulumi.Input[str] sts_endpoint: Override the URL Vault uses when making STS API
|
@@ -75,16 +63,8 @@ class AuthBackendClientArgs:
|
|
75
63
|
pulumi.set(__self__, "iam_endpoint", iam_endpoint)
|
76
64
|
if iam_server_id_header_value is not None:
|
77
65
|
pulumi.set(__self__, "iam_server_id_header_value", iam_server_id_header_value)
|
78
|
-
if identity_token_audience is not None:
|
79
|
-
pulumi.set(__self__, "identity_token_audience", identity_token_audience)
|
80
|
-
if identity_token_ttl is not None:
|
81
|
-
pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
|
82
|
-
if max_retries is not None:
|
83
|
-
pulumi.set(__self__, "max_retries", max_retries)
|
84
66
|
if namespace is not None:
|
85
67
|
pulumi.set(__self__, "namespace", namespace)
|
86
|
-
if role_arn is not None:
|
87
|
-
pulumi.set(__self__, "role_arn", role_arn)
|
88
68
|
if secret_key is not None:
|
89
69
|
pulumi.set(__self__, "secret_key", secret_key)
|
90
70
|
if sts_endpoint is not None:
|
@@ -99,7 +79,7 @@ class AuthBackendClientArgs:
|
|
99
79
|
def access_key(self) -> Optional[pulumi.Input[str]]:
|
100
80
|
"""
|
101
81
|
The AWS access key that Vault should use for the
|
102
|
-
auth backend.
|
82
|
+
auth backend.
|
103
83
|
"""
|
104
84
|
return pulumi.get(self, "access_key")
|
105
85
|
|
@@ -160,45 +140,6 @@ class AuthBackendClientArgs:
|
|
160
140
|
def iam_server_id_header_value(self, value: Optional[pulumi.Input[str]]):
|
161
141
|
pulumi.set(self, "iam_server_id_header_value", value)
|
162
142
|
|
163
|
-
@property
|
164
|
-
@pulumi.getter(name="identityTokenAudience")
|
165
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
|
166
|
-
"""
|
167
|
-
The audience claim value. Mutually exclusive with `access_key`.
|
168
|
-
Requires Vault 1.17+. *Available only for Vault Enterprise*
|
169
|
-
"""
|
170
|
-
return pulumi.get(self, "identity_token_audience")
|
171
|
-
|
172
|
-
@identity_token_audience.setter
|
173
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
|
174
|
-
pulumi.set(self, "identity_token_audience", value)
|
175
|
-
|
176
|
-
@property
|
177
|
-
@pulumi.getter(name="identityTokenTtl")
|
178
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
|
179
|
-
"""
|
180
|
-
The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
181
|
-
*Available only for Vault Enterprise*
|
182
|
-
"""
|
183
|
-
return pulumi.get(self, "identity_token_ttl")
|
184
|
-
|
185
|
-
@identity_token_ttl.setter
|
186
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
|
187
|
-
pulumi.set(self, "identity_token_ttl", value)
|
188
|
-
|
189
|
-
@property
|
190
|
-
@pulumi.getter(name="maxRetries")
|
191
|
-
def max_retries(self) -> Optional[pulumi.Input[int]]:
|
192
|
-
"""
|
193
|
-
Number of max retries the client should use for recoverable errors.
|
194
|
-
The default `-1` falls back to the AWS SDK's default behavior.
|
195
|
-
"""
|
196
|
-
return pulumi.get(self, "max_retries")
|
197
|
-
|
198
|
-
@max_retries.setter
|
199
|
-
def max_retries(self, value: Optional[pulumi.Input[int]]):
|
200
|
-
pulumi.set(self, "max_retries", value)
|
201
|
-
|
202
143
|
@property
|
203
144
|
@pulumi.getter
|
204
145
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -214,19 +155,6 @@ class AuthBackendClientArgs:
|
|
214
155
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
215
156
|
pulumi.set(self, "namespace", value)
|
216
157
|
|
217
|
-
@property
|
218
|
-
@pulumi.getter(name="roleArn")
|
219
|
-
def role_arn(self) -> Optional[pulumi.Input[str]]:
|
220
|
-
"""
|
221
|
-
Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
|
222
|
-
*Available only for Vault Enterprise*
|
223
|
-
"""
|
224
|
-
return pulumi.get(self, "role_arn")
|
225
|
-
|
226
|
-
@role_arn.setter
|
227
|
-
def role_arn(self, value: Optional[pulumi.Input[str]]):
|
228
|
-
pulumi.set(self, "role_arn", value)
|
229
|
-
|
230
158
|
@property
|
231
159
|
@pulumi.getter(name="secretKey")
|
232
160
|
def secret_key(self) -> Optional[pulumi.Input[str]]:
|
@@ -291,11 +219,7 @@ class _AuthBackendClientState:
|
|
291
219
|
ec2_endpoint: Optional[pulumi.Input[str]] = None,
|
292
220
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
293
221
|
iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
|
294
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
295
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
296
|
-
max_retries: Optional[pulumi.Input[int]] = None,
|
297
222
|
namespace: Optional[pulumi.Input[str]] = None,
|
298
|
-
role_arn: Optional[pulumi.Input[str]] = None,
|
299
223
|
secret_key: Optional[pulumi.Input[str]] = None,
|
300
224
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
301
225
|
sts_region: Optional[pulumi.Input[str]] = None,
|
@@ -303,7 +227,7 @@ class _AuthBackendClientState:
|
|
303
227
|
"""
|
304
228
|
Input properties used for looking up and filtering AuthBackendClient resources.
|
305
229
|
:param pulumi.Input[str] access_key: The AWS access key that Vault should use for the
|
306
|
-
auth backend.
|
230
|
+
auth backend.
|
307
231
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
308
232
|
mounted at. Defaults to `aws`.
|
309
233
|
:param pulumi.Input[str] ec2_endpoint: Override the URL Vault uses when making EC2 API
|
@@ -313,18 +237,10 @@ class _AuthBackendClientState:
|
|
313
237
|
:param pulumi.Input[str] iam_server_id_header_value: The value to require in the
|
314
238
|
`X-Vault-AWS-IAM-Server-ID` header as part of `GetCallerIdentity` requests
|
315
239
|
that are used in the IAM auth method.
|
316
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value. Mutually exclusive with `access_key`.
|
317
|
-
Requires Vault 1.17+. *Available only for Vault Enterprise*
|
318
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
319
|
-
*Available only for Vault Enterprise*
|
320
|
-
:param pulumi.Input[int] max_retries: Number of max retries the client should use for recoverable errors.
|
321
|
-
The default `-1` falls back to the AWS SDK's default behavior.
|
322
240
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
323
241
|
The value should not contain leading or trailing forward slashes.
|
324
242
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
325
243
|
*Available only for Vault Enterprise*.
|
326
|
-
:param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
|
327
|
-
*Available only for Vault Enterprise*
|
328
244
|
:param pulumi.Input[str] secret_key: The AWS secret key that Vault should use for the
|
329
245
|
auth backend.
|
330
246
|
:param pulumi.Input[str] sts_endpoint: Override the URL Vault uses when making STS API
|
@@ -347,16 +263,8 @@ class _AuthBackendClientState:
|
|
347
263
|
pulumi.set(__self__, "iam_endpoint", iam_endpoint)
|
348
264
|
if iam_server_id_header_value is not None:
|
349
265
|
pulumi.set(__self__, "iam_server_id_header_value", iam_server_id_header_value)
|
350
|
-
if identity_token_audience is not None:
|
351
|
-
pulumi.set(__self__, "identity_token_audience", identity_token_audience)
|
352
|
-
if identity_token_ttl is not None:
|
353
|
-
pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
|
354
|
-
if max_retries is not None:
|
355
|
-
pulumi.set(__self__, "max_retries", max_retries)
|
356
266
|
if namespace is not None:
|
357
267
|
pulumi.set(__self__, "namespace", namespace)
|
358
|
-
if role_arn is not None:
|
359
|
-
pulumi.set(__self__, "role_arn", role_arn)
|
360
268
|
if secret_key is not None:
|
361
269
|
pulumi.set(__self__, "secret_key", secret_key)
|
362
270
|
if sts_endpoint is not None:
|
@@ -371,7 +279,7 @@ class _AuthBackendClientState:
|
|
371
279
|
def access_key(self) -> Optional[pulumi.Input[str]]:
|
372
280
|
"""
|
373
281
|
The AWS access key that Vault should use for the
|
374
|
-
auth backend.
|
282
|
+
auth backend.
|
375
283
|
"""
|
376
284
|
return pulumi.get(self, "access_key")
|
377
285
|
|
@@ -432,45 +340,6 @@ class _AuthBackendClientState:
|
|
432
340
|
def iam_server_id_header_value(self, value: Optional[pulumi.Input[str]]):
|
433
341
|
pulumi.set(self, "iam_server_id_header_value", value)
|
434
342
|
|
435
|
-
@property
|
436
|
-
@pulumi.getter(name="identityTokenAudience")
|
437
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
|
438
|
-
"""
|
439
|
-
The audience claim value. Mutually exclusive with `access_key`.
|
440
|
-
Requires Vault 1.17+. *Available only for Vault Enterprise*
|
441
|
-
"""
|
442
|
-
return pulumi.get(self, "identity_token_audience")
|
443
|
-
|
444
|
-
@identity_token_audience.setter
|
445
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
|
446
|
-
pulumi.set(self, "identity_token_audience", value)
|
447
|
-
|
448
|
-
@property
|
449
|
-
@pulumi.getter(name="identityTokenTtl")
|
450
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
|
451
|
-
"""
|
452
|
-
The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
453
|
-
*Available only for Vault Enterprise*
|
454
|
-
"""
|
455
|
-
return pulumi.get(self, "identity_token_ttl")
|
456
|
-
|
457
|
-
@identity_token_ttl.setter
|
458
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
|
459
|
-
pulumi.set(self, "identity_token_ttl", value)
|
460
|
-
|
461
|
-
@property
|
462
|
-
@pulumi.getter(name="maxRetries")
|
463
|
-
def max_retries(self) -> Optional[pulumi.Input[int]]:
|
464
|
-
"""
|
465
|
-
Number of max retries the client should use for recoverable errors.
|
466
|
-
The default `-1` falls back to the AWS SDK's default behavior.
|
467
|
-
"""
|
468
|
-
return pulumi.get(self, "max_retries")
|
469
|
-
|
470
|
-
@max_retries.setter
|
471
|
-
def max_retries(self, value: Optional[pulumi.Input[int]]):
|
472
|
-
pulumi.set(self, "max_retries", value)
|
473
|
-
|
474
343
|
@property
|
475
344
|
@pulumi.getter
|
476
345
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -486,19 +355,6 @@ class _AuthBackendClientState:
|
|
486
355
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
487
356
|
pulumi.set(self, "namespace", value)
|
488
357
|
|
489
|
-
@property
|
490
|
-
@pulumi.getter(name="roleArn")
|
491
|
-
def role_arn(self) -> Optional[pulumi.Input[str]]:
|
492
|
-
"""
|
493
|
-
Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
|
494
|
-
*Available only for Vault Enterprise*
|
495
|
-
"""
|
496
|
-
return pulumi.get(self, "role_arn")
|
497
|
-
|
498
|
-
@role_arn.setter
|
499
|
-
def role_arn(self, value: Optional[pulumi.Input[str]]):
|
500
|
-
pulumi.set(self, "role_arn", value)
|
501
|
-
|
502
358
|
@property
|
503
359
|
@pulumi.getter(name="secretKey")
|
504
360
|
def secret_key(self) -> Optional[pulumi.Input[str]]:
|
@@ -565,11 +421,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
565
421
|
ec2_endpoint: Optional[pulumi.Input[str]] = None,
|
566
422
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
567
423
|
iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
|
568
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
569
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
570
|
-
max_retries: Optional[pulumi.Input[int]] = None,
|
571
424
|
namespace: Optional[pulumi.Input[str]] = None,
|
572
|
-
role_arn: Optional[pulumi.Input[str]] = None,
|
573
425
|
secret_key: Optional[pulumi.Input[str]] = None,
|
574
426
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
575
427
|
sts_region: Optional[pulumi.Input[str]] = None,
|
@@ -578,28 +430,18 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
578
430
|
"""
|
579
431
|
## Example Usage
|
580
432
|
|
581
|
-
|
433
|
+
<!--Start PulumiCodeChooser -->
|
582
434
|
```python
|
583
435
|
import pulumi
|
584
436
|
import pulumi_vault as vault
|
585
437
|
|
586
|
-
|
587
|
-
example_auth_backend_client = vault.aws.AuthBackendClient("
|
588
|
-
|
589
|
-
identity_token_ttl="<TOKEN_TTL>",
|
590
|
-
role_arn="<AWS_ROLE_ARN>")
|
591
|
-
```
|
592
|
-
|
593
|
-
```python
|
594
|
-
import pulumi
|
595
|
-
import pulumi_vault as vault
|
596
|
-
|
597
|
-
example = vault.AuthBackend("example", type="aws")
|
598
|
-
example_auth_backend_client = vault.aws.AuthBackendClient("example",
|
599
|
-
backend=example.path,
|
438
|
+
example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
|
439
|
+
example_auth_backend_client = vault.aws.AuthBackendClient("exampleAuthBackendClient",
|
440
|
+
backend=example_auth_backend.path,
|
600
441
|
access_key="INSERT_AWS_ACCESS_KEY",
|
601
442
|
secret_key="INSERT_AWS_SECRET_KEY")
|
602
443
|
```
|
444
|
+
<!--End PulumiCodeChooser -->
|
603
445
|
|
604
446
|
## Import
|
605
447
|
|
@@ -612,7 +454,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
612
454
|
:param str resource_name: The name of the resource.
|
613
455
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
614
456
|
:param pulumi.Input[str] access_key: The AWS access key that Vault should use for the
|
615
|
-
auth backend.
|
457
|
+
auth backend.
|
616
458
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
617
459
|
mounted at. Defaults to `aws`.
|
618
460
|
:param pulumi.Input[str] ec2_endpoint: Override the URL Vault uses when making EC2 API
|
@@ -622,18 +464,10 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
622
464
|
:param pulumi.Input[str] iam_server_id_header_value: The value to require in the
|
623
465
|
`X-Vault-AWS-IAM-Server-ID` header as part of `GetCallerIdentity` requests
|
624
466
|
that are used in the IAM auth method.
|
625
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value. Mutually exclusive with `access_key`.
|
626
|
-
Requires Vault 1.17+. *Available only for Vault Enterprise*
|
627
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
628
|
-
*Available only for Vault Enterprise*
|
629
|
-
:param pulumi.Input[int] max_retries: Number of max retries the client should use for recoverable errors.
|
630
|
-
The default `-1` falls back to the AWS SDK's default behavior.
|
631
467
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
632
468
|
The value should not contain leading or trailing forward slashes.
|
633
469
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
634
470
|
*Available only for Vault Enterprise*.
|
635
|
-
:param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
|
636
|
-
*Available only for Vault Enterprise*
|
637
471
|
:param pulumi.Input[str] secret_key: The AWS secret key that Vault should use for the
|
638
472
|
auth backend.
|
639
473
|
:param pulumi.Input[str] sts_endpoint: Override the URL Vault uses when making STS API
|
@@ -655,28 +489,18 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
655
489
|
"""
|
656
490
|
## Example Usage
|
657
491
|
|
658
|
-
|
659
|
-
```python
|
660
|
-
import pulumi
|
661
|
-
import pulumi_vault as vault
|
662
|
-
|
663
|
-
example = vault.AuthBackend("example", type="aws")
|
664
|
-
example_auth_backend_client = vault.aws.AuthBackendClient("example",
|
665
|
-
identity_token_audience="<TOKEN_AUDIENCE>",
|
666
|
-
identity_token_ttl="<TOKEN_TTL>",
|
667
|
-
role_arn="<AWS_ROLE_ARN>")
|
668
|
-
```
|
669
|
-
|
492
|
+
<!--Start PulumiCodeChooser -->
|
670
493
|
```python
|
671
494
|
import pulumi
|
672
495
|
import pulumi_vault as vault
|
673
496
|
|
674
|
-
|
675
|
-
example_auth_backend_client = vault.aws.AuthBackendClient("
|
676
|
-
backend=
|
497
|
+
example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
|
498
|
+
example_auth_backend_client = vault.aws.AuthBackendClient("exampleAuthBackendClient",
|
499
|
+
backend=example_auth_backend.path,
|
677
500
|
access_key="INSERT_AWS_ACCESS_KEY",
|
678
501
|
secret_key="INSERT_AWS_SECRET_KEY")
|
679
502
|
```
|
503
|
+
<!--End PulumiCodeChooser -->
|
680
504
|
|
681
505
|
## Import
|
682
506
|
|
@@ -706,11 +530,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
706
530
|
ec2_endpoint: Optional[pulumi.Input[str]] = None,
|
707
531
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
708
532
|
iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
|
709
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
710
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
711
|
-
max_retries: Optional[pulumi.Input[int]] = None,
|
712
533
|
namespace: Optional[pulumi.Input[str]] = None,
|
713
|
-
role_arn: Optional[pulumi.Input[str]] = None,
|
714
534
|
secret_key: Optional[pulumi.Input[str]] = None,
|
715
535
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
716
536
|
sts_region: Optional[pulumi.Input[str]] = None,
|
@@ -729,11 +549,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
729
549
|
__props__.__dict__["ec2_endpoint"] = ec2_endpoint
|
730
550
|
__props__.__dict__["iam_endpoint"] = iam_endpoint
|
731
551
|
__props__.__dict__["iam_server_id_header_value"] = iam_server_id_header_value
|
732
|
-
__props__.__dict__["identity_token_audience"] = identity_token_audience
|
733
|
-
__props__.__dict__["identity_token_ttl"] = identity_token_ttl
|
734
|
-
__props__.__dict__["max_retries"] = max_retries
|
735
552
|
__props__.__dict__["namespace"] = namespace
|
736
|
-
__props__.__dict__["role_arn"] = role_arn
|
737
553
|
__props__.__dict__["secret_key"] = None if secret_key is None else pulumi.Output.secret(secret_key)
|
738
554
|
__props__.__dict__["sts_endpoint"] = sts_endpoint
|
739
555
|
__props__.__dict__["sts_region"] = sts_region
|
@@ -755,11 +571,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
755
571
|
ec2_endpoint: Optional[pulumi.Input[str]] = None,
|
756
572
|
iam_endpoint: Optional[pulumi.Input[str]] = None,
|
757
573
|
iam_server_id_header_value: Optional[pulumi.Input[str]] = None,
|
758
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
759
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
760
|
-
max_retries: Optional[pulumi.Input[int]] = None,
|
761
574
|
namespace: Optional[pulumi.Input[str]] = None,
|
762
|
-
role_arn: Optional[pulumi.Input[str]] = None,
|
763
575
|
secret_key: Optional[pulumi.Input[str]] = None,
|
764
576
|
sts_endpoint: Optional[pulumi.Input[str]] = None,
|
765
577
|
sts_region: Optional[pulumi.Input[str]] = None,
|
@@ -772,7 +584,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
772
584
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
773
585
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
774
586
|
:param pulumi.Input[str] access_key: The AWS access key that Vault should use for the
|
775
|
-
auth backend.
|
587
|
+
auth backend.
|
776
588
|
:param pulumi.Input[str] backend: The path the AWS auth backend being configured was
|
777
589
|
mounted at. Defaults to `aws`.
|
778
590
|
:param pulumi.Input[str] ec2_endpoint: Override the URL Vault uses when making EC2 API
|
@@ -782,18 +594,10 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
782
594
|
:param pulumi.Input[str] iam_server_id_header_value: The value to require in the
|
783
595
|
`X-Vault-AWS-IAM-Server-ID` header as part of `GetCallerIdentity` requests
|
784
596
|
that are used in the IAM auth method.
|
785
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value. Mutually exclusive with `access_key`.
|
786
|
-
Requires Vault 1.17+. *Available only for Vault Enterprise*
|
787
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
788
|
-
*Available only for Vault Enterprise*
|
789
|
-
:param pulumi.Input[int] max_retries: Number of max retries the client should use for recoverable errors.
|
790
|
-
The default `-1` falls back to the AWS SDK's default behavior.
|
791
597
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
792
598
|
The value should not contain leading or trailing forward slashes.
|
793
599
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
794
600
|
*Available only for Vault Enterprise*.
|
795
|
-
:param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
|
796
|
-
*Available only for Vault Enterprise*
|
797
601
|
:param pulumi.Input[str] secret_key: The AWS secret key that Vault should use for the
|
798
602
|
auth backend.
|
799
603
|
:param pulumi.Input[str] sts_endpoint: Override the URL Vault uses when making STS API
|
@@ -815,11 +619,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
815
619
|
__props__.__dict__["ec2_endpoint"] = ec2_endpoint
|
816
620
|
__props__.__dict__["iam_endpoint"] = iam_endpoint
|
817
621
|
__props__.__dict__["iam_server_id_header_value"] = iam_server_id_header_value
|
818
|
-
__props__.__dict__["identity_token_audience"] = identity_token_audience
|
819
|
-
__props__.__dict__["identity_token_ttl"] = identity_token_ttl
|
820
|
-
__props__.__dict__["max_retries"] = max_retries
|
821
622
|
__props__.__dict__["namespace"] = namespace
|
822
|
-
__props__.__dict__["role_arn"] = role_arn
|
823
623
|
__props__.__dict__["secret_key"] = secret_key
|
824
624
|
__props__.__dict__["sts_endpoint"] = sts_endpoint
|
825
625
|
__props__.__dict__["sts_region"] = sts_region
|
@@ -831,7 +631,7 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
831
631
|
def access_key(self) -> pulumi.Output[Optional[str]]:
|
832
632
|
"""
|
833
633
|
The AWS access key that Vault should use for the
|
834
|
-
auth backend.
|
634
|
+
auth backend.
|
835
635
|
"""
|
836
636
|
return pulumi.get(self, "access_key")
|
837
637
|
|
@@ -872,33 +672,6 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
872
672
|
"""
|
873
673
|
return pulumi.get(self, "iam_server_id_header_value")
|
874
674
|
|
875
|
-
@property
|
876
|
-
@pulumi.getter(name="identityTokenAudience")
|
877
|
-
def identity_token_audience(self) -> pulumi.Output[Optional[str]]:
|
878
|
-
"""
|
879
|
-
The audience claim value. Mutually exclusive with `access_key`.
|
880
|
-
Requires Vault 1.17+. *Available only for Vault Enterprise*
|
881
|
-
"""
|
882
|
-
return pulumi.get(self, "identity_token_audience")
|
883
|
-
|
884
|
-
@property
|
885
|
-
@pulumi.getter(name="identityTokenTtl")
|
886
|
-
def identity_token_ttl(self) -> pulumi.Output[int]:
|
887
|
-
"""
|
888
|
-
The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
|
889
|
-
*Available only for Vault Enterprise*
|
890
|
-
"""
|
891
|
-
return pulumi.get(self, "identity_token_ttl")
|
892
|
-
|
893
|
-
@property
|
894
|
-
@pulumi.getter(name="maxRetries")
|
895
|
-
def max_retries(self) -> pulumi.Output[Optional[int]]:
|
896
|
-
"""
|
897
|
-
Number of max retries the client should use for recoverable errors.
|
898
|
-
The default `-1` falls back to the AWS SDK's default behavior.
|
899
|
-
"""
|
900
|
-
return pulumi.get(self, "max_retries")
|
901
|
-
|
902
675
|
@property
|
903
676
|
@pulumi.getter
|
904
677
|
def namespace(self) -> pulumi.Output[Optional[str]]:
|
@@ -910,15 +683,6 @@ class AuthBackendClient(pulumi.CustomResource):
|
|
910
683
|
"""
|
911
684
|
return pulumi.get(self, "namespace")
|
912
685
|
|
913
|
-
@property
|
914
|
-
@pulumi.getter(name="roleArn")
|
915
|
-
def role_arn(self) -> pulumi.Output[Optional[str]]:
|
916
|
-
"""
|
917
|
-
Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
|
918
|
-
*Available only for Vault Enterprise*
|
919
|
-
"""
|
920
|
-
return pulumi.get(self, "role_arn")
|
921
|
-
|
922
686
|
@property
|
923
687
|
@pulumi.getter(name="secretKey")
|
924
688
|
def secret_key(self) -> pulumi.Output[Optional[str]]:
|
@@ -266,6 +266,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
266
266
|
|
267
267
|
## Example Usage
|
268
268
|
|
269
|
+
<!--Start PulumiCodeChooser -->
|
269
270
|
```python
|
270
271
|
import pulumi
|
271
272
|
import pulumi_vault as vault
|
@@ -279,6 +280,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
279
280
|
"account_id",
|
280
281
|
])
|
281
282
|
```
|
283
|
+
<!--End PulumiCodeChooser -->
|
282
284
|
|
283
285
|
## Import
|
284
286
|
|
@@ -317,6 +319,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
317
319
|
|
318
320
|
## Example Usage
|
319
321
|
|
322
|
+
<!--Start PulumiCodeChooser -->
|
320
323
|
```python
|
321
324
|
import pulumi
|
322
325
|
import pulumi_vault as vault
|
@@ -330,6 +333,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
330
333
|
"account_id",
|
331
334
|
])
|
332
335
|
```
|
336
|
+
<!--End PulumiCodeChooser -->
|
333
337
|
|
334
338
|
## Import
|
335
339
|
|
@@ -197,15 +197,17 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
197
197
|
|
198
198
|
## Example Usage
|
199
199
|
|
200
|
+
<!--Start PulumiCodeChooser -->
|
200
201
|
```python
|
201
202
|
import pulumi
|
202
203
|
import pulumi_vault as vault
|
203
204
|
|
204
|
-
|
205
|
-
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("
|
206
|
-
backend=
|
205
|
+
example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
|
206
|
+
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
|
207
|
+
backend=example_auth_backend.path,
|
207
208
|
safety_buffer=3600)
|
208
209
|
```
|
210
|
+
<!--End PulumiCodeChooser -->
|
209
211
|
|
210
212
|
## Import
|
211
213
|
|
@@ -242,15 +244,17 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
|
|
242
244
|
|
243
245
|
## Example Usage
|
244
246
|
|
247
|
+
<!--Start PulumiCodeChooser -->
|
245
248
|
```python
|
246
249
|
import pulumi
|
247
250
|
import pulumi_vault as vault
|
248
251
|
|
249
|
-
|
250
|
-
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("
|
251
|
-
backend=
|
252
|
+
example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
|
253
|
+
example_auth_backend_identity_whitelist = vault.aws.AuthBackendIdentityWhitelist("exampleAuthBackendIdentityWhitelist",
|
254
|
+
backend=example_auth_backend.path,
|
252
255
|
safety_buffer=3600)
|
253
256
|
```
|
257
|
+
<!--End PulumiCodeChooser -->
|
254
258
|
|
255
259
|
## Import
|
256
260
|
|
@@ -270,6 +270,7 @@ class _AuthBackendLoginState:
|
|
270
270
|
authenticate with. Can be retrieved from the EC2 metadata server.
|
271
271
|
:param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
|
272
272
|
to the time in `lease_start_time`.
|
273
|
+
:param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
|
273
274
|
:param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
|
274
275
|
authentication used to generate this token.
|
275
276
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -460,6 +461,9 @@ class _AuthBackendLoginState:
|
|
460
461
|
@property
|
461
462
|
@pulumi.getter(name="leaseStartTime")
|
462
463
|
def lease_start_time(self) -> Optional[pulumi.Input[str]]:
|
464
|
+
"""
|
465
|
+
Time at which the lease was read, using the clock of the system where Terraform was running
|
466
|
+
"""
|
463
467
|
return pulumi.get(self, "lease_start_time")
|
464
468
|
|
465
469
|
@lease_start_time.setter
|
@@ -750,6 +754,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
750
754
|
authenticate with. Can be retrieved from the EC2 metadata server.
|
751
755
|
:param pulumi.Input[int] lease_duration: The duration in seconds the token will be valid, relative
|
752
756
|
to the time in `lease_start_time`.
|
757
|
+
:param pulumi.Input[str] lease_start_time: Time at which the lease was read, using the clock of the system where Terraform was running
|
753
758
|
:param pulumi.Input[Mapping[str, Any]] metadata: A map of information returned by the Vault server about the
|
754
759
|
authentication used to generate this token.
|
755
760
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -886,6 +891,9 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
886
891
|
@property
|
887
892
|
@pulumi.getter(name="leaseStartTime")
|
888
893
|
def lease_start_time(self) -> pulumi.Output[str]:
|
894
|
+
"""
|
895
|
+
Time at which the lease was read, using the clock of the system where Terraform was running
|
896
|
+
"""
|
889
897
|
return pulumi.get(self, "lease_start_time")
|
890
898
|
|
891
899
|
@property
|