pulumi-vault 6.6.0a1741836364__py3-none-any.whl → 6.7.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +583 -562
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +188 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +68 -18
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +73 -60
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.7.0.dist-info/RECORD +265 -0
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
- pulumi_vault-6.6.0a1741836364.dist-info/RECORD +0 -265
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
pulumi_vault/_inputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -57,44 +58,44 @@ MYPY = False
|
|
57
58
|
|
58
59
|
if not MYPY:
|
59
60
|
class AuthBackendTuneArgsDict(TypedDict):
|
60
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
61
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
|
61
62
|
"""
|
62
63
|
List of headers to whitelist and allowing
|
63
64
|
a plugin to include them in the response.
|
64
65
|
"""
|
65
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
66
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
|
66
67
|
"""
|
67
68
|
Specifies the list of keys that will
|
68
69
|
not be HMAC'd by audit devices in the request data object.
|
69
70
|
"""
|
70
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
71
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
|
71
72
|
"""
|
72
73
|
Specifies the list of keys that will
|
73
74
|
not be HMAC'd by audit devices in the response data object.
|
74
75
|
"""
|
75
|
-
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
76
|
+
default_lease_ttl: NotRequired[pulumi.Input[builtins.str]]
|
76
77
|
"""
|
77
78
|
Specifies the default time-to-live.
|
78
79
|
If set, this overrides the global default.
|
79
80
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
80
81
|
"""
|
81
|
-
listing_visibility: NotRequired[pulumi.Input[str]]
|
82
|
+
listing_visibility: NotRequired[pulumi.Input[builtins.str]]
|
82
83
|
"""
|
83
84
|
Specifies whether to show this mount in
|
84
85
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
85
86
|
"""
|
86
|
-
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
87
|
+
max_lease_ttl: NotRequired[pulumi.Input[builtins.str]]
|
87
88
|
"""
|
88
89
|
Specifies the maximum time-to-live.
|
89
90
|
If set, this overrides the global default.
|
90
91
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
91
92
|
"""
|
92
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
93
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
|
93
94
|
"""
|
94
95
|
List of headers to whitelist and
|
95
96
|
pass from the request to the backend.
|
96
97
|
"""
|
97
|
-
token_type: NotRequired[pulumi.Input[str]]
|
98
|
+
token_type: NotRequired[pulumi.Input[builtins.str]]
|
98
99
|
"""
|
99
100
|
Specifies the type of tokens that should be returned by
|
100
101
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -105,32 +106,32 @@ elif False:
|
|
105
106
|
@pulumi.input_type
|
106
107
|
class AuthBackendTuneArgs:
|
107
108
|
def __init__(__self__, *,
|
108
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
109
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
110
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
111
|
-
default_lease_ttl: Optional[pulumi.Input[str]] = None,
|
112
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
113
|
-
max_lease_ttl: Optional[pulumi.Input[str]] = None,
|
114
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
115
|
-
token_type: Optional[pulumi.Input[str]] = None):
|
116
|
-
"""
|
117
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to whitelist and allowing
|
109
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
110
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
111
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
112
|
+
default_lease_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
113
|
+
listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
|
114
|
+
max_lease_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
115
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
116
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None):
|
117
|
+
"""
|
118
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
|
118
119
|
a plugin to include them in the response.
|
119
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
|
120
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
|
120
121
|
not be HMAC'd by audit devices in the request data object.
|
121
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
|
122
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
|
122
123
|
not be HMAC'd by audit devices in the response data object.
|
123
|
-
:param pulumi.Input[str] default_lease_ttl: Specifies the default time-to-live.
|
124
|
+
:param pulumi.Input[builtins.str] default_lease_ttl: Specifies the default time-to-live.
|
124
125
|
If set, this overrides the global default.
|
125
126
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
126
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in
|
127
|
+
:param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in
|
127
128
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
128
|
-
:param pulumi.Input[str] max_lease_ttl: Specifies the maximum time-to-live.
|
129
|
+
:param pulumi.Input[builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
|
129
130
|
If set, this overrides the global default.
|
130
131
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
131
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to whitelist and
|
132
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to whitelist and
|
132
133
|
pass from the request to the backend.
|
133
|
-
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
134
|
+
:param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
|
134
135
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
135
136
|
"""
|
136
137
|
if allowed_response_headers is not None:
|
@@ -152,7 +153,7 @@ class AuthBackendTuneArgs:
|
|
152
153
|
|
153
154
|
@property
|
154
155
|
@pulumi.getter(name="allowedResponseHeaders")
|
155
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
156
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
156
157
|
"""
|
157
158
|
List of headers to whitelist and allowing
|
158
159
|
a plugin to include them in the response.
|
@@ -160,12 +161,12 @@ class AuthBackendTuneArgs:
|
|
160
161
|
return pulumi.get(self, "allowed_response_headers")
|
161
162
|
|
162
163
|
@allowed_response_headers.setter
|
163
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
164
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
164
165
|
pulumi.set(self, "allowed_response_headers", value)
|
165
166
|
|
166
167
|
@property
|
167
168
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
168
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
169
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
169
170
|
"""
|
170
171
|
Specifies the list of keys that will
|
171
172
|
not be HMAC'd by audit devices in the request data object.
|
@@ -173,12 +174,12 @@ class AuthBackendTuneArgs:
|
|
173
174
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
174
175
|
|
175
176
|
@audit_non_hmac_request_keys.setter
|
176
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
177
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
177
178
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
178
179
|
|
179
180
|
@property
|
180
181
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
181
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
182
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
182
183
|
"""
|
183
184
|
Specifies the list of keys that will
|
184
185
|
not be HMAC'd by audit devices in the response data object.
|
@@ -186,12 +187,12 @@ class AuthBackendTuneArgs:
|
|
186
187
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
187
188
|
|
188
189
|
@audit_non_hmac_response_keys.setter
|
189
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
190
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
190
191
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
191
192
|
|
192
193
|
@property
|
193
194
|
@pulumi.getter(name="defaultLeaseTtl")
|
194
|
-
def default_lease_ttl(self) -> Optional[pulumi.Input[str]]:
|
195
|
+
def default_lease_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
195
196
|
"""
|
196
197
|
Specifies the default time-to-live.
|
197
198
|
If set, this overrides the global default.
|
@@ -200,12 +201,12 @@ class AuthBackendTuneArgs:
|
|
200
201
|
return pulumi.get(self, "default_lease_ttl")
|
201
202
|
|
202
203
|
@default_lease_ttl.setter
|
203
|
-
def default_lease_ttl(self, value: Optional[pulumi.Input[str]]):
|
204
|
+
def default_lease_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
204
205
|
pulumi.set(self, "default_lease_ttl", value)
|
205
206
|
|
206
207
|
@property
|
207
208
|
@pulumi.getter(name="listingVisibility")
|
208
|
-
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
209
|
+
def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
|
209
210
|
"""
|
210
211
|
Specifies whether to show this mount in
|
211
212
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
@@ -213,12 +214,12 @@ class AuthBackendTuneArgs:
|
|
213
214
|
return pulumi.get(self, "listing_visibility")
|
214
215
|
|
215
216
|
@listing_visibility.setter
|
216
|
-
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
217
|
+
def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
|
217
218
|
pulumi.set(self, "listing_visibility", value)
|
218
219
|
|
219
220
|
@property
|
220
221
|
@pulumi.getter(name="maxLeaseTtl")
|
221
|
-
def max_lease_ttl(self) -> Optional[pulumi.Input[str]]:
|
222
|
+
def max_lease_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
222
223
|
"""
|
223
224
|
Specifies the maximum time-to-live.
|
224
225
|
If set, this overrides the global default.
|
@@ -227,12 +228,12 @@ class AuthBackendTuneArgs:
|
|
227
228
|
return pulumi.get(self, "max_lease_ttl")
|
228
229
|
|
229
230
|
@max_lease_ttl.setter
|
230
|
-
def max_lease_ttl(self, value: Optional[pulumi.Input[str]]):
|
231
|
+
def max_lease_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
231
232
|
pulumi.set(self, "max_lease_ttl", value)
|
232
233
|
|
233
234
|
@property
|
234
235
|
@pulumi.getter(name="passthroughRequestHeaders")
|
235
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
236
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
236
237
|
"""
|
237
238
|
List of headers to whitelist and
|
238
239
|
pass from the request to the backend.
|
@@ -240,12 +241,12 @@ class AuthBackendTuneArgs:
|
|
240
241
|
return pulumi.get(self, "passthrough_request_headers")
|
241
242
|
|
242
243
|
@passthrough_request_headers.setter
|
243
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
244
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
244
245
|
pulumi.set(self, "passthrough_request_headers", value)
|
245
246
|
|
246
247
|
@property
|
247
248
|
@pulumi.getter(name="tokenType")
|
248
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
249
|
+
def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
249
250
|
"""
|
250
251
|
Specifies the type of tokens that should be returned by
|
251
252
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -253,20 +254,20 @@ class AuthBackendTuneArgs:
|
|
253
254
|
return pulumi.get(self, "token_type")
|
254
255
|
|
255
256
|
@token_type.setter
|
256
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
257
|
+
def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
257
258
|
pulumi.set(self, "token_type", value)
|
258
259
|
|
259
260
|
|
260
261
|
if not MYPY:
|
261
262
|
class ProviderAuthLoginArgsDict(TypedDict):
|
262
|
-
path: pulumi.Input[str]
|
263
|
-
method: NotRequired[pulumi.Input[str]]
|
264
|
-
namespace: NotRequired[pulumi.Input[str]]
|
263
|
+
path: pulumi.Input[builtins.str]
|
264
|
+
method: NotRequired[pulumi.Input[builtins.str]]
|
265
|
+
namespace: NotRequired[pulumi.Input[builtins.str]]
|
265
266
|
"""
|
266
267
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
267
268
|
"""
|
268
|
-
parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
269
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
269
|
+
parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
|
270
|
+
use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
|
270
271
|
"""
|
271
272
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
272
273
|
"""
|
@@ -276,14 +277,14 @@ elif False:
|
|
276
277
|
@pulumi.input_type
|
277
278
|
class ProviderAuthLoginArgs:
|
278
279
|
def __init__(__self__, *,
|
279
|
-
path: pulumi.Input[str],
|
280
|
-
method: Optional[pulumi.Input[str]] = None,
|
281
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
282
|
-
parameters: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
283
|
-
use_root_namespace: Optional[pulumi.Input[bool]] = None):
|
280
|
+
path: pulumi.Input[builtins.str],
|
281
|
+
method: Optional[pulumi.Input[builtins.str]] = None,
|
282
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
283
|
+
parameters: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
284
|
+
use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
|
284
285
|
"""
|
285
|
-
:param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
286
|
-
:param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
286
|
+
:param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
287
|
+
:param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
287
288
|
"""
|
288
289
|
pulumi.set(__self__, "path", path)
|
289
290
|
if method is not None:
|
@@ -297,119 +298,119 @@ class ProviderAuthLoginArgs:
|
|
297
298
|
|
298
299
|
@property
|
299
300
|
@pulumi.getter
|
300
|
-
def path(self) -> pulumi.Input[str]:
|
301
|
+
def path(self) -> pulumi.Input[builtins.str]:
|
301
302
|
return pulumi.get(self, "path")
|
302
303
|
|
303
304
|
@path.setter
|
304
|
-
def path(self, value: pulumi.Input[str]):
|
305
|
+
def path(self, value: pulumi.Input[builtins.str]):
|
305
306
|
pulumi.set(self, "path", value)
|
306
307
|
|
307
308
|
@property
|
308
309
|
@pulumi.getter
|
309
|
-
def method(self) -> Optional[pulumi.Input[str]]:
|
310
|
+
def method(self) -> Optional[pulumi.Input[builtins.str]]:
|
310
311
|
return pulumi.get(self, "method")
|
311
312
|
|
312
313
|
@method.setter
|
313
|
-
def method(self, value: Optional[pulumi.Input[str]]):
|
314
|
+
def method(self, value: Optional[pulumi.Input[builtins.str]]):
|
314
315
|
pulumi.set(self, "method", value)
|
315
316
|
|
316
317
|
@property
|
317
318
|
@pulumi.getter
|
318
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
319
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
319
320
|
"""
|
320
321
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
321
322
|
"""
|
322
323
|
return pulumi.get(self, "namespace")
|
323
324
|
|
324
325
|
@namespace.setter
|
325
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
326
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
326
327
|
pulumi.set(self, "namespace", value)
|
327
328
|
|
328
329
|
@property
|
329
330
|
@pulumi.getter
|
330
|
-
def parameters(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
331
|
+
def parameters(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
331
332
|
return pulumi.get(self, "parameters")
|
332
333
|
|
333
334
|
@parameters.setter
|
334
|
-
def parameters(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
335
|
+
def parameters(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
335
336
|
pulumi.set(self, "parameters", value)
|
336
337
|
|
337
338
|
@property
|
338
339
|
@pulumi.getter(name="useRootNamespace")
|
339
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
|
340
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
|
340
341
|
"""
|
341
342
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
342
343
|
"""
|
343
344
|
return pulumi.get(self, "use_root_namespace")
|
344
345
|
|
345
346
|
@use_root_namespace.setter
|
346
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
|
347
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
|
347
348
|
pulumi.set(self, "use_root_namespace", value)
|
348
349
|
|
349
350
|
|
350
351
|
if not MYPY:
|
351
352
|
class ProviderAuthLoginAwsArgsDict(TypedDict):
|
352
|
-
role: pulumi.Input[str]
|
353
|
+
role: pulumi.Input[builtins.str]
|
353
354
|
"""
|
354
355
|
The Vault role to use when logging into Vault.
|
355
356
|
"""
|
356
|
-
aws_access_key_id: NotRequired[pulumi.Input[str]]
|
357
|
+
aws_access_key_id: NotRequired[pulumi.Input[builtins.str]]
|
357
358
|
"""
|
358
359
|
The AWS access key ID.
|
359
360
|
"""
|
360
|
-
aws_iam_endpoint: NotRequired[pulumi.Input[str]]
|
361
|
+
aws_iam_endpoint: NotRequired[pulumi.Input[builtins.str]]
|
361
362
|
"""
|
362
363
|
The IAM endpoint URL.
|
363
364
|
"""
|
364
|
-
aws_profile: NotRequired[pulumi.Input[str]]
|
365
|
+
aws_profile: NotRequired[pulumi.Input[builtins.str]]
|
365
366
|
"""
|
366
367
|
The name of the AWS profile.
|
367
368
|
"""
|
368
|
-
aws_region: NotRequired[pulumi.Input[str]]
|
369
|
+
aws_region: NotRequired[pulumi.Input[builtins.str]]
|
369
370
|
"""
|
370
371
|
The AWS region.
|
371
372
|
"""
|
372
|
-
aws_role_arn: NotRequired[pulumi.Input[str]]
|
373
|
+
aws_role_arn: NotRequired[pulumi.Input[builtins.str]]
|
373
374
|
"""
|
374
375
|
The ARN of the AWS Role to assume.Used during STS AssumeRole
|
375
376
|
"""
|
376
|
-
aws_role_session_name: NotRequired[pulumi.Input[str]]
|
377
|
+
aws_role_session_name: NotRequired[pulumi.Input[builtins.str]]
|
377
378
|
"""
|
378
379
|
Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
379
380
|
"""
|
380
|
-
aws_secret_access_key: NotRequired[pulumi.Input[str]]
|
381
|
+
aws_secret_access_key: NotRequired[pulumi.Input[builtins.str]]
|
381
382
|
"""
|
382
383
|
The AWS secret access key.
|
383
384
|
"""
|
384
|
-
aws_session_token: NotRequired[pulumi.Input[str]]
|
385
|
+
aws_session_token: NotRequired[pulumi.Input[builtins.str]]
|
385
386
|
"""
|
386
387
|
The AWS session token.
|
387
388
|
"""
|
388
|
-
aws_shared_credentials_file: NotRequired[pulumi.Input[str]]
|
389
|
+
aws_shared_credentials_file: NotRequired[pulumi.Input[builtins.str]]
|
389
390
|
"""
|
390
391
|
Path to the AWS shared credentials file.
|
391
392
|
"""
|
392
|
-
aws_sts_endpoint: NotRequired[pulumi.Input[str]]
|
393
|
+
aws_sts_endpoint: NotRequired[pulumi.Input[builtins.str]]
|
393
394
|
"""
|
394
395
|
The STS endpoint URL.
|
395
396
|
"""
|
396
|
-
aws_web_identity_token_file: NotRequired[pulumi.Input[str]]
|
397
|
+
aws_web_identity_token_file: NotRequired[pulumi.Input[builtins.str]]
|
397
398
|
"""
|
398
399
|
Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
399
400
|
"""
|
400
|
-
header_value: NotRequired[pulumi.Input[str]]
|
401
|
+
header_value: NotRequired[pulumi.Input[builtins.str]]
|
401
402
|
"""
|
402
403
|
The Vault header value to include in the STS signing request.
|
403
404
|
"""
|
404
|
-
mount: NotRequired[pulumi.Input[str]]
|
405
|
+
mount: NotRequired[pulumi.Input[builtins.str]]
|
405
406
|
"""
|
406
407
|
The path where the authentication engine is mounted.
|
407
408
|
"""
|
408
|
-
namespace: NotRequired[pulumi.Input[str]]
|
409
|
+
namespace: NotRequired[pulumi.Input[builtins.str]]
|
409
410
|
"""
|
410
411
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
411
412
|
"""
|
412
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
413
|
+
use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
|
413
414
|
"""
|
414
415
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
415
416
|
"""
|
@@ -419,39 +420,39 @@ elif False:
|
|
419
420
|
@pulumi.input_type
|
420
421
|
class ProviderAuthLoginAwsArgs:
|
421
422
|
def __init__(__self__, *,
|
422
|
-
role: pulumi.Input[str],
|
423
|
-
aws_access_key_id: Optional[pulumi.Input[str]] = None,
|
424
|
-
aws_iam_endpoint: Optional[pulumi.Input[str]] = None,
|
425
|
-
aws_profile: Optional[pulumi.Input[str]] = None,
|
426
|
-
aws_region: Optional[pulumi.Input[str]] = None,
|
427
|
-
aws_role_arn: Optional[pulumi.Input[str]] = None,
|
428
|
-
aws_role_session_name: Optional[pulumi.Input[str]] = None,
|
429
|
-
aws_secret_access_key: Optional[pulumi.Input[str]] = None,
|
430
|
-
aws_session_token: Optional[pulumi.Input[str]] = None,
|
431
|
-
aws_shared_credentials_file: Optional[pulumi.Input[str]] = None,
|
432
|
-
aws_sts_endpoint: Optional[pulumi.Input[str]] = None,
|
433
|
-
aws_web_identity_token_file: Optional[pulumi.Input[str]] = None,
|
434
|
-
header_value: Optional[pulumi.Input[str]] = None,
|
435
|
-
mount: Optional[pulumi.Input[str]] = None,
|
436
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
437
|
-
use_root_namespace: Optional[pulumi.Input[bool]] = None):
|
438
|
-
"""
|
439
|
-
:param pulumi.Input[str] role: The Vault role to use when logging into Vault.
|
440
|
-
:param pulumi.Input[str] aws_access_key_id: The AWS access key ID.
|
441
|
-
:param pulumi.Input[str] aws_iam_endpoint: The IAM endpoint URL.
|
442
|
-
:param pulumi.Input[str] aws_profile: The name of the AWS profile.
|
443
|
-
:param pulumi.Input[str] aws_region: The AWS region.
|
444
|
-
:param pulumi.Input[str] aws_role_arn: The ARN of the AWS Role to assume.Used during STS AssumeRole
|
445
|
-
:param pulumi.Input[str] aws_role_session_name: Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
446
|
-
:param pulumi.Input[str] aws_secret_access_key: The AWS secret access key.
|
447
|
-
:param pulumi.Input[str] aws_session_token: The AWS session token.
|
448
|
-
:param pulumi.Input[str] aws_shared_credentials_file: Path to the AWS shared credentials file.
|
449
|
-
:param pulumi.Input[str] aws_sts_endpoint: The STS endpoint URL.
|
450
|
-
:param pulumi.Input[str] aws_web_identity_token_file: Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
451
|
-
:param pulumi.Input[str] header_value: The Vault header value to include in the STS signing request.
|
452
|
-
:param pulumi.Input[str] mount: The path where the authentication engine is mounted.
|
453
|
-
:param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
454
|
-
:param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
423
|
+
role: pulumi.Input[builtins.str],
|
424
|
+
aws_access_key_id: Optional[pulumi.Input[builtins.str]] = None,
|
425
|
+
aws_iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
|
426
|
+
aws_profile: Optional[pulumi.Input[builtins.str]] = None,
|
427
|
+
aws_region: Optional[pulumi.Input[builtins.str]] = None,
|
428
|
+
aws_role_arn: Optional[pulumi.Input[builtins.str]] = None,
|
429
|
+
aws_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
|
430
|
+
aws_secret_access_key: Optional[pulumi.Input[builtins.str]] = None,
|
431
|
+
aws_session_token: Optional[pulumi.Input[builtins.str]] = None,
|
432
|
+
aws_shared_credentials_file: Optional[pulumi.Input[builtins.str]] = None,
|
433
|
+
aws_sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
|
434
|
+
aws_web_identity_token_file: Optional[pulumi.Input[builtins.str]] = None,
|
435
|
+
header_value: Optional[pulumi.Input[builtins.str]] = None,
|
436
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
437
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
438
|
+
use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
|
439
|
+
"""
|
440
|
+
:param pulumi.Input[builtins.str] role: The Vault role to use when logging into Vault.
|
441
|
+
:param pulumi.Input[builtins.str] aws_access_key_id: The AWS access key ID.
|
442
|
+
:param pulumi.Input[builtins.str] aws_iam_endpoint: The IAM endpoint URL.
|
443
|
+
:param pulumi.Input[builtins.str] aws_profile: The name of the AWS profile.
|
444
|
+
:param pulumi.Input[builtins.str] aws_region: The AWS region.
|
445
|
+
:param pulumi.Input[builtins.str] aws_role_arn: The ARN of the AWS Role to assume.Used during STS AssumeRole
|
446
|
+
:param pulumi.Input[builtins.str] aws_role_session_name: Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
447
|
+
:param pulumi.Input[builtins.str] aws_secret_access_key: The AWS secret access key.
|
448
|
+
:param pulumi.Input[builtins.str] aws_session_token: The AWS session token.
|
449
|
+
:param pulumi.Input[builtins.str] aws_shared_credentials_file: Path to the AWS shared credentials file.
|
450
|
+
:param pulumi.Input[builtins.str] aws_sts_endpoint: The STS endpoint URL.
|
451
|
+
:param pulumi.Input[builtins.str] aws_web_identity_token_file: Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
452
|
+
:param pulumi.Input[builtins.str] header_value: The Vault header value to include in the STS signing request.
|
453
|
+
:param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
|
454
|
+
:param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
455
|
+
:param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
455
456
|
"""
|
456
457
|
pulumi.set(__self__, "role", role)
|
457
458
|
if aws_access_key_id is not None:
|
@@ -487,244 +488,244 @@ class ProviderAuthLoginAwsArgs:
|
|
487
488
|
|
488
489
|
@property
|
489
490
|
@pulumi.getter
|
490
|
-
def role(self) -> pulumi.Input[str]:
|
491
|
+
def role(self) -> pulumi.Input[builtins.str]:
|
491
492
|
"""
|
492
493
|
The Vault role to use when logging into Vault.
|
493
494
|
"""
|
494
495
|
return pulumi.get(self, "role")
|
495
496
|
|
496
497
|
@role.setter
|
497
|
-
def role(self, value: pulumi.Input[str]):
|
498
|
+
def role(self, value: pulumi.Input[builtins.str]):
|
498
499
|
pulumi.set(self, "role", value)
|
499
500
|
|
500
501
|
@property
|
501
502
|
@pulumi.getter(name="awsAccessKeyId")
|
502
|
-
def aws_access_key_id(self) -> Optional[pulumi.Input[str]]:
|
503
|
+
def aws_access_key_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
503
504
|
"""
|
504
505
|
The AWS access key ID.
|
505
506
|
"""
|
506
507
|
return pulumi.get(self, "aws_access_key_id")
|
507
508
|
|
508
509
|
@aws_access_key_id.setter
|
509
|
-
def aws_access_key_id(self, value: Optional[pulumi.Input[str]]):
|
510
|
+
def aws_access_key_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
510
511
|
pulumi.set(self, "aws_access_key_id", value)
|
511
512
|
|
512
513
|
@property
|
513
514
|
@pulumi.getter(name="awsIamEndpoint")
|
514
|
-
def aws_iam_endpoint(self) -> Optional[pulumi.Input[str]]:
|
515
|
+
def aws_iam_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
|
515
516
|
"""
|
516
517
|
The IAM endpoint URL.
|
517
518
|
"""
|
518
519
|
return pulumi.get(self, "aws_iam_endpoint")
|
519
520
|
|
520
521
|
@aws_iam_endpoint.setter
|
521
|
-
def aws_iam_endpoint(self, value: Optional[pulumi.Input[str]]):
|
522
|
+
def aws_iam_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
|
522
523
|
pulumi.set(self, "aws_iam_endpoint", value)
|
523
524
|
|
524
525
|
@property
|
525
526
|
@pulumi.getter(name="awsProfile")
|
526
|
-
def aws_profile(self) -> Optional[pulumi.Input[str]]:
|
527
|
+
def aws_profile(self) -> Optional[pulumi.Input[builtins.str]]:
|
527
528
|
"""
|
528
529
|
The name of the AWS profile.
|
529
530
|
"""
|
530
531
|
return pulumi.get(self, "aws_profile")
|
531
532
|
|
532
533
|
@aws_profile.setter
|
533
|
-
def aws_profile(self, value: Optional[pulumi.Input[str]]):
|
534
|
+
def aws_profile(self, value: Optional[pulumi.Input[builtins.str]]):
|
534
535
|
pulumi.set(self, "aws_profile", value)
|
535
536
|
|
536
537
|
@property
|
537
538
|
@pulumi.getter(name="awsRegion")
|
538
|
-
def aws_region(self) -> Optional[pulumi.Input[str]]:
|
539
|
+
def aws_region(self) -> Optional[pulumi.Input[builtins.str]]:
|
539
540
|
"""
|
540
541
|
The AWS region.
|
541
542
|
"""
|
542
543
|
return pulumi.get(self, "aws_region")
|
543
544
|
|
544
545
|
@aws_region.setter
|
545
|
-
def aws_region(self, value: Optional[pulumi.Input[str]]):
|
546
|
+
def aws_region(self, value: Optional[pulumi.Input[builtins.str]]):
|
546
547
|
pulumi.set(self, "aws_region", value)
|
547
548
|
|
548
549
|
@property
|
549
550
|
@pulumi.getter(name="awsRoleArn")
|
550
|
-
def aws_role_arn(self) -> Optional[pulumi.Input[str]]:
|
551
|
+
def aws_role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
|
551
552
|
"""
|
552
553
|
The ARN of the AWS Role to assume.Used during STS AssumeRole
|
553
554
|
"""
|
554
555
|
return pulumi.get(self, "aws_role_arn")
|
555
556
|
|
556
557
|
@aws_role_arn.setter
|
557
|
-
def aws_role_arn(self, value: Optional[pulumi.Input[str]]):
|
558
|
+
def aws_role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
|
558
559
|
pulumi.set(self, "aws_role_arn", value)
|
559
560
|
|
560
561
|
@property
|
561
562
|
@pulumi.getter(name="awsRoleSessionName")
|
562
|
-
def aws_role_session_name(self) -> Optional[pulumi.Input[str]]:
|
563
|
+
def aws_role_session_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
563
564
|
"""
|
564
565
|
Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
565
566
|
"""
|
566
567
|
return pulumi.get(self, "aws_role_session_name")
|
567
568
|
|
568
569
|
@aws_role_session_name.setter
|
569
|
-
def aws_role_session_name(self, value: Optional[pulumi.Input[str]]):
|
570
|
+
def aws_role_session_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
570
571
|
pulumi.set(self, "aws_role_session_name", value)
|
571
572
|
|
572
573
|
@property
|
573
574
|
@pulumi.getter(name="awsSecretAccessKey")
|
574
|
-
def aws_secret_access_key(self) -> Optional[pulumi.Input[str]]:
|
575
|
+
def aws_secret_access_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
575
576
|
"""
|
576
577
|
The AWS secret access key.
|
577
578
|
"""
|
578
579
|
return pulumi.get(self, "aws_secret_access_key")
|
579
580
|
|
580
581
|
@aws_secret_access_key.setter
|
581
|
-
def aws_secret_access_key(self, value: Optional[pulumi.Input[str]]):
|
582
|
+
def aws_secret_access_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
582
583
|
pulumi.set(self, "aws_secret_access_key", value)
|
583
584
|
|
584
585
|
@property
|
585
586
|
@pulumi.getter(name="awsSessionToken")
|
586
|
-
def aws_session_token(self) -> Optional[pulumi.Input[str]]:
|
587
|
+
def aws_session_token(self) -> Optional[pulumi.Input[builtins.str]]:
|
587
588
|
"""
|
588
589
|
The AWS session token.
|
589
590
|
"""
|
590
591
|
return pulumi.get(self, "aws_session_token")
|
591
592
|
|
592
593
|
@aws_session_token.setter
|
593
|
-
def aws_session_token(self, value: Optional[pulumi.Input[str]]):
|
594
|
+
def aws_session_token(self, value: Optional[pulumi.Input[builtins.str]]):
|
594
595
|
pulumi.set(self, "aws_session_token", value)
|
595
596
|
|
596
597
|
@property
|
597
598
|
@pulumi.getter(name="awsSharedCredentialsFile")
|
598
|
-
def aws_shared_credentials_file(self) -> Optional[pulumi.Input[str]]:
|
599
|
+
def aws_shared_credentials_file(self) -> Optional[pulumi.Input[builtins.str]]:
|
599
600
|
"""
|
600
601
|
Path to the AWS shared credentials file.
|
601
602
|
"""
|
602
603
|
return pulumi.get(self, "aws_shared_credentials_file")
|
603
604
|
|
604
605
|
@aws_shared_credentials_file.setter
|
605
|
-
def aws_shared_credentials_file(self, value: Optional[pulumi.Input[str]]):
|
606
|
+
def aws_shared_credentials_file(self, value: Optional[pulumi.Input[builtins.str]]):
|
606
607
|
pulumi.set(self, "aws_shared_credentials_file", value)
|
607
608
|
|
608
609
|
@property
|
609
610
|
@pulumi.getter(name="awsStsEndpoint")
|
610
|
-
def aws_sts_endpoint(self) -> Optional[pulumi.Input[str]]:
|
611
|
+
def aws_sts_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
|
611
612
|
"""
|
612
613
|
The STS endpoint URL.
|
613
614
|
"""
|
614
615
|
return pulumi.get(self, "aws_sts_endpoint")
|
615
616
|
|
616
617
|
@aws_sts_endpoint.setter
|
617
|
-
def aws_sts_endpoint(self, value: Optional[pulumi.Input[str]]):
|
618
|
+
def aws_sts_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
|
618
619
|
pulumi.set(self, "aws_sts_endpoint", value)
|
619
620
|
|
620
621
|
@property
|
621
622
|
@pulumi.getter(name="awsWebIdentityTokenFile")
|
622
|
-
def aws_web_identity_token_file(self) -> Optional[pulumi.Input[str]]:
|
623
|
+
def aws_web_identity_token_file(self) -> Optional[pulumi.Input[builtins.str]]:
|
623
624
|
"""
|
624
625
|
Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
625
626
|
"""
|
626
627
|
return pulumi.get(self, "aws_web_identity_token_file")
|
627
628
|
|
628
629
|
@aws_web_identity_token_file.setter
|
629
|
-
def aws_web_identity_token_file(self, value: Optional[pulumi.Input[str]]):
|
630
|
+
def aws_web_identity_token_file(self, value: Optional[pulumi.Input[builtins.str]]):
|
630
631
|
pulumi.set(self, "aws_web_identity_token_file", value)
|
631
632
|
|
632
633
|
@property
|
633
634
|
@pulumi.getter(name="headerValue")
|
634
|
-
def header_value(self) -> Optional[pulumi.Input[str]]:
|
635
|
+
def header_value(self) -> Optional[pulumi.Input[builtins.str]]:
|
635
636
|
"""
|
636
637
|
The Vault header value to include in the STS signing request.
|
637
638
|
"""
|
638
639
|
return pulumi.get(self, "header_value")
|
639
640
|
|
640
641
|
@header_value.setter
|
641
|
-
def header_value(self, value: Optional[pulumi.Input[str]]):
|
642
|
+
def header_value(self, value: Optional[pulumi.Input[builtins.str]]):
|
642
643
|
pulumi.set(self, "header_value", value)
|
643
644
|
|
644
645
|
@property
|
645
646
|
@pulumi.getter
|
646
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
647
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
647
648
|
"""
|
648
649
|
The path where the authentication engine is mounted.
|
649
650
|
"""
|
650
651
|
return pulumi.get(self, "mount")
|
651
652
|
|
652
653
|
@mount.setter
|
653
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
654
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
654
655
|
pulumi.set(self, "mount", value)
|
655
656
|
|
656
657
|
@property
|
657
658
|
@pulumi.getter
|
658
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
659
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
659
660
|
"""
|
660
661
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
661
662
|
"""
|
662
663
|
return pulumi.get(self, "namespace")
|
663
664
|
|
664
665
|
@namespace.setter
|
665
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
666
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
666
667
|
pulumi.set(self, "namespace", value)
|
667
668
|
|
668
669
|
@property
|
669
670
|
@pulumi.getter(name="useRootNamespace")
|
670
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
|
671
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
|
671
672
|
"""
|
672
673
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
673
674
|
"""
|
674
675
|
return pulumi.get(self, "use_root_namespace")
|
675
676
|
|
676
677
|
@use_root_namespace.setter
|
677
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
|
678
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
|
678
679
|
pulumi.set(self, "use_root_namespace", value)
|
679
680
|
|
680
681
|
|
681
682
|
if not MYPY:
|
682
683
|
class ProviderAuthLoginAzureArgsDict(TypedDict):
|
683
|
-
resource_group_name: pulumi.Input[str]
|
684
|
+
resource_group_name: pulumi.Input[builtins.str]
|
684
685
|
"""
|
685
686
|
The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
686
687
|
"""
|
687
|
-
role: pulumi.Input[str]
|
688
|
+
role: pulumi.Input[builtins.str]
|
688
689
|
"""
|
689
690
|
Name of the login role.
|
690
691
|
"""
|
691
|
-
subscription_id: pulumi.Input[str]
|
692
|
+
subscription_id: pulumi.Input[builtins.str]
|
692
693
|
"""
|
693
694
|
The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
694
695
|
"""
|
695
|
-
client_id: NotRequired[pulumi.Input[str]]
|
696
|
+
client_id: NotRequired[pulumi.Input[builtins.str]]
|
696
697
|
"""
|
697
698
|
The identity's client ID.
|
698
699
|
"""
|
699
|
-
jwt: NotRequired[pulumi.Input[str]]
|
700
|
+
jwt: NotRequired[pulumi.Input[builtins.str]]
|
700
701
|
"""
|
701
702
|
A signed JSON Web Token. If not specified on will be created automatically
|
702
703
|
"""
|
703
|
-
mount: NotRequired[pulumi.Input[str]]
|
704
|
+
mount: NotRequired[pulumi.Input[builtins.str]]
|
704
705
|
"""
|
705
706
|
The path where the authentication engine is mounted.
|
706
707
|
"""
|
707
|
-
namespace: NotRequired[pulumi.Input[str]]
|
708
|
+
namespace: NotRequired[pulumi.Input[builtins.str]]
|
708
709
|
"""
|
709
710
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
710
711
|
"""
|
711
|
-
scope: NotRequired[pulumi.Input[str]]
|
712
|
+
scope: NotRequired[pulumi.Input[builtins.str]]
|
712
713
|
"""
|
713
714
|
The scopes to include in the token request.
|
714
715
|
"""
|
715
|
-
tenant_id: NotRequired[pulumi.Input[str]]
|
716
|
+
tenant_id: NotRequired[pulumi.Input[builtins.str]]
|
716
717
|
"""
|
717
718
|
Provides the tenant ID to use in a multi-tenant authentication scenario.
|
718
719
|
"""
|
719
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
720
|
+
use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
|
720
721
|
"""
|
721
722
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
722
723
|
"""
|
723
|
-
vm_name: NotRequired[pulumi.Input[str]]
|
724
|
+
vm_name: NotRequired[pulumi.Input[builtins.str]]
|
724
725
|
"""
|
725
726
|
The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
726
727
|
"""
|
727
|
-
vmss_name: NotRequired[pulumi.Input[str]]
|
728
|
+
vmss_name: NotRequired[pulumi.Input[builtins.str]]
|
728
729
|
"""
|
729
730
|
The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
730
731
|
"""
|
@@ -734,31 +735,31 @@ elif False:
|
|
734
735
|
@pulumi.input_type
|
735
736
|
class ProviderAuthLoginAzureArgs:
|
736
737
|
def __init__(__self__, *,
|
737
|
-
resource_group_name: pulumi.Input[str],
|
738
|
-
role: pulumi.Input[str],
|
739
|
-
subscription_id: pulumi.Input[str],
|
740
|
-
client_id: Optional[pulumi.Input[str]] = None,
|
741
|
-
jwt: Optional[pulumi.Input[str]] = None,
|
742
|
-
mount: Optional[pulumi.Input[str]] = None,
|
743
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
744
|
-
scope: Optional[pulumi.Input[str]] = None,
|
745
|
-
tenant_id: Optional[pulumi.Input[str]] = None,
|
746
|
-
use_root_namespace: Optional[pulumi.Input[bool]] = None,
|
747
|
-
vm_name: Optional[pulumi.Input[str]] = None,
|
748
|
-
vmss_name: Optional[pulumi.Input[str]] = None):
|
749
|
-
"""
|
750
|
-
:param pulumi.Input[str] resource_group_name: The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
751
|
-
:param pulumi.Input[str] role: Name of the login role.
|
752
|
-
:param pulumi.Input[str] subscription_id: The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
753
|
-
:param pulumi.Input[str] client_id: The identity's client ID.
|
754
|
-
:param pulumi.Input[str] jwt: A signed JSON Web Token. If not specified on will be created automatically
|
755
|
-
:param pulumi.Input[str] mount: The path where the authentication engine is mounted.
|
756
|
-
:param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
757
|
-
:param pulumi.Input[str] scope: The scopes to include in the token request.
|
758
|
-
:param pulumi.Input[str] tenant_id: Provides the tenant ID to use in a multi-tenant authentication scenario.
|
759
|
-
:param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
760
|
-
:param pulumi.Input[str] vm_name: The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
761
|
-
:param pulumi.Input[str] vmss_name: The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
738
|
+
resource_group_name: pulumi.Input[builtins.str],
|
739
|
+
role: pulumi.Input[builtins.str],
|
740
|
+
subscription_id: pulumi.Input[builtins.str],
|
741
|
+
client_id: Optional[pulumi.Input[builtins.str]] = None,
|
742
|
+
jwt: Optional[pulumi.Input[builtins.str]] = None,
|
743
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
744
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
745
|
+
scope: Optional[pulumi.Input[builtins.str]] = None,
|
746
|
+
tenant_id: Optional[pulumi.Input[builtins.str]] = None,
|
747
|
+
use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None,
|
748
|
+
vm_name: Optional[pulumi.Input[builtins.str]] = None,
|
749
|
+
vmss_name: Optional[pulumi.Input[builtins.str]] = None):
|
750
|
+
"""
|
751
|
+
:param pulumi.Input[builtins.str] resource_group_name: The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
752
|
+
:param pulumi.Input[builtins.str] role: Name of the login role.
|
753
|
+
:param pulumi.Input[builtins.str] subscription_id: The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
754
|
+
:param pulumi.Input[builtins.str] client_id: The identity's client ID.
|
755
|
+
:param pulumi.Input[builtins.str] jwt: A signed JSON Web Token. If not specified on will be created automatically
|
756
|
+
:param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
|
757
|
+
:param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
758
|
+
:param pulumi.Input[builtins.str] scope: The scopes to include in the token request.
|
759
|
+
:param pulumi.Input[builtins.str] tenant_id: Provides the tenant ID to use in a multi-tenant authentication scenario.
|
760
|
+
:param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
761
|
+
:param pulumi.Input[builtins.str] vm_name: The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
762
|
+
:param pulumi.Input[builtins.str] vmss_name: The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
762
763
|
"""
|
763
764
|
pulumi.set(__self__, "resource_group_name", resource_group_name)
|
764
765
|
pulumi.set(__self__, "role", role)
|
@@ -784,172 +785,172 @@ class ProviderAuthLoginAzureArgs:
|
|
784
785
|
|
785
786
|
@property
|
786
787
|
@pulumi.getter(name="resourceGroupName")
|
787
|
-
def resource_group_name(self) -> pulumi.Input[str]:
|
788
|
+
def resource_group_name(self) -> pulumi.Input[builtins.str]:
|
788
789
|
"""
|
789
790
|
The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
790
791
|
"""
|
791
792
|
return pulumi.get(self, "resource_group_name")
|
792
793
|
|
793
794
|
@resource_group_name.setter
|
794
|
-
def resource_group_name(self, value: pulumi.Input[str]):
|
795
|
+
def resource_group_name(self, value: pulumi.Input[builtins.str]):
|
795
796
|
pulumi.set(self, "resource_group_name", value)
|
796
797
|
|
797
798
|
@property
|
798
799
|
@pulumi.getter
|
799
|
-
def role(self) -> pulumi.Input[str]:
|
800
|
+
def role(self) -> pulumi.Input[builtins.str]:
|
800
801
|
"""
|
801
802
|
Name of the login role.
|
802
803
|
"""
|
803
804
|
return pulumi.get(self, "role")
|
804
805
|
|
805
806
|
@role.setter
|
806
|
-
def role(self, value: pulumi.Input[str]):
|
807
|
+
def role(self, value: pulumi.Input[builtins.str]):
|
807
808
|
pulumi.set(self, "role", value)
|
808
809
|
|
809
810
|
@property
|
810
811
|
@pulumi.getter(name="subscriptionId")
|
811
|
-
def subscription_id(self) -> pulumi.Input[str]:
|
812
|
+
def subscription_id(self) -> pulumi.Input[builtins.str]:
|
812
813
|
"""
|
813
814
|
The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
814
815
|
"""
|
815
816
|
return pulumi.get(self, "subscription_id")
|
816
817
|
|
817
818
|
@subscription_id.setter
|
818
|
-
def subscription_id(self, value: pulumi.Input[str]):
|
819
|
+
def subscription_id(self, value: pulumi.Input[builtins.str]):
|
819
820
|
pulumi.set(self, "subscription_id", value)
|
820
821
|
|
821
822
|
@property
|
822
823
|
@pulumi.getter(name="clientId")
|
823
|
-
def client_id(self) -> Optional[pulumi.Input[str]]:
|
824
|
+
def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
824
825
|
"""
|
825
826
|
The identity's client ID.
|
826
827
|
"""
|
827
828
|
return pulumi.get(self, "client_id")
|
828
829
|
|
829
830
|
@client_id.setter
|
830
|
-
def client_id(self, value: Optional[pulumi.Input[str]]):
|
831
|
+
def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
831
832
|
pulumi.set(self, "client_id", value)
|
832
833
|
|
833
834
|
@property
|
834
835
|
@pulumi.getter
|
835
|
-
def jwt(self) -> Optional[pulumi.Input[str]]:
|
836
|
+
def jwt(self) -> Optional[pulumi.Input[builtins.str]]:
|
836
837
|
"""
|
837
838
|
A signed JSON Web Token. If not specified on will be created automatically
|
838
839
|
"""
|
839
840
|
return pulumi.get(self, "jwt")
|
840
841
|
|
841
842
|
@jwt.setter
|
842
|
-
def jwt(self, value: Optional[pulumi.Input[str]]):
|
843
|
+
def jwt(self, value: Optional[pulumi.Input[builtins.str]]):
|
843
844
|
pulumi.set(self, "jwt", value)
|
844
845
|
|
845
846
|
@property
|
846
847
|
@pulumi.getter
|
847
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
848
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
848
849
|
"""
|
849
850
|
The path where the authentication engine is mounted.
|
850
851
|
"""
|
851
852
|
return pulumi.get(self, "mount")
|
852
853
|
|
853
854
|
@mount.setter
|
854
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
855
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
855
856
|
pulumi.set(self, "mount", value)
|
856
857
|
|
857
858
|
@property
|
858
859
|
@pulumi.getter
|
859
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
860
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
860
861
|
"""
|
861
862
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
862
863
|
"""
|
863
864
|
return pulumi.get(self, "namespace")
|
864
865
|
|
865
866
|
@namespace.setter
|
866
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
867
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
867
868
|
pulumi.set(self, "namespace", value)
|
868
869
|
|
869
870
|
@property
|
870
871
|
@pulumi.getter
|
871
|
-
def scope(self) -> Optional[pulumi.Input[str]]:
|
872
|
+
def scope(self) -> Optional[pulumi.Input[builtins.str]]:
|
872
873
|
"""
|
873
874
|
The scopes to include in the token request.
|
874
875
|
"""
|
875
876
|
return pulumi.get(self, "scope")
|
876
877
|
|
877
878
|
@scope.setter
|
878
|
-
def scope(self, value: Optional[pulumi.Input[str]]):
|
879
|
+
def scope(self, value: Optional[pulumi.Input[builtins.str]]):
|
879
880
|
pulumi.set(self, "scope", value)
|
880
881
|
|
881
882
|
@property
|
882
883
|
@pulumi.getter(name="tenantId")
|
883
|
-
def tenant_id(self) -> Optional[pulumi.Input[str]]:
|
884
|
+
def tenant_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
884
885
|
"""
|
885
886
|
Provides the tenant ID to use in a multi-tenant authentication scenario.
|
886
887
|
"""
|
887
888
|
return pulumi.get(self, "tenant_id")
|
888
889
|
|
889
890
|
@tenant_id.setter
|
890
|
-
def tenant_id(self, value: Optional[pulumi.Input[str]]):
|
891
|
+
def tenant_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
891
892
|
pulumi.set(self, "tenant_id", value)
|
892
893
|
|
893
894
|
@property
|
894
895
|
@pulumi.getter(name="useRootNamespace")
|
895
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
|
896
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
|
896
897
|
"""
|
897
898
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
898
899
|
"""
|
899
900
|
return pulumi.get(self, "use_root_namespace")
|
900
901
|
|
901
902
|
@use_root_namespace.setter
|
902
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
|
903
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
|
903
904
|
pulumi.set(self, "use_root_namespace", value)
|
904
905
|
|
905
906
|
@property
|
906
907
|
@pulumi.getter(name="vmName")
|
907
|
-
def vm_name(self) -> Optional[pulumi.Input[str]]:
|
908
|
+
def vm_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
908
909
|
"""
|
909
910
|
The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
910
911
|
"""
|
911
912
|
return pulumi.get(self, "vm_name")
|
912
913
|
|
913
914
|
@vm_name.setter
|
914
|
-
def vm_name(self, value: Optional[pulumi.Input[str]]):
|
915
|
+
def vm_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
915
916
|
pulumi.set(self, "vm_name", value)
|
916
917
|
|
917
918
|
@property
|
918
919
|
@pulumi.getter(name="vmssName")
|
919
|
-
def vmss_name(self) -> Optional[pulumi.Input[str]]:
|
920
|
+
def vmss_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
920
921
|
"""
|
921
922
|
The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
922
923
|
"""
|
923
924
|
return pulumi.get(self, "vmss_name")
|
924
925
|
|
925
926
|
@vmss_name.setter
|
926
|
-
def vmss_name(self, value: Optional[pulumi.Input[str]]):
|
927
|
+
def vmss_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
927
928
|
pulumi.set(self, "vmss_name", value)
|
928
929
|
|
929
930
|
|
930
931
|
if not MYPY:
|
931
932
|
class ProviderAuthLoginCertArgsDict(TypedDict):
|
932
|
-
cert_file: pulumi.Input[str]
|
933
|
+
cert_file: pulumi.Input[builtins.str]
|
933
934
|
"""
|
934
935
|
Path to a file containing the client certificate.
|
935
936
|
"""
|
936
|
-
key_file: pulumi.Input[str]
|
937
|
+
key_file: pulumi.Input[builtins.str]
|
937
938
|
"""
|
938
939
|
Path to a file containing the private key that the certificate was issued for.
|
939
940
|
"""
|
940
|
-
mount: NotRequired[pulumi.Input[str]]
|
941
|
+
mount: NotRequired[pulumi.Input[builtins.str]]
|
941
942
|
"""
|
942
943
|
The path where the authentication engine is mounted.
|
943
944
|
"""
|
944
|
-
name: NotRequired[pulumi.Input[str]]
|
945
|
+
name: NotRequired[pulumi.Input[builtins.str]]
|
945
946
|
"""
|
946
947
|
Name of the certificate's role
|
947
948
|
"""
|
948
|
-
namespace: NotRequired[pulumi.Input[str]]
|
949
|
+
namespace: NotRequired[pulumi.Input[builtins.str]]
|
949
950
|
"""
|
950
951
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
951
952
|
"""
|
952
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
953
|
+
use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
|
953
954
|
"""
|
954
955
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
955
956
|
"""
|
@@ -959,19 +960,19 @@ elif False:
|
|
959
960
|
@pulumi.input_type
|
960
961
|
class ProviderAuthLoginCertArgs:
|
961
962
|
def __init__(__self__, *,
|
962
|
-
cert_file: pulumi.Input[str],
|
963
|
-
key_file: pulumi.Input[str],
|
964
|
-
mount: Optional[pulumi.Input[str]] = None,
|
965
|
-
name: Optional[pulumi.Input[str]] = None,
|
966
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
967
|
-
use_root_namespace: Optional[pulumi.Input[bool]] = None):
|
968
|
-
"""
|
969
|
-
:param pulumi.Input[str] cert_file: Path to a file containing the client certificate.
|
970
|
-
:param pulumi.Input[str] key_file: Path to a file containing the private key that the certificate was issued for.
|
971
|
-
:param pulumi.Input[str] mount: The path where the authentication engine is mounted.
|
972
|
-
:param pulumi.Input[str] name: Name of the certificate's role
|
973
|
-
:param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
974
|
-
:param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
963
|
+
cert_file: pulumi.Input[builtins.str],
|
964
|
+
key_file: pulumi.Input[builtins.str],
|
965
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
966
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
967
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
968
|
+
use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
|
969
|
+
"""
|
970
|
+
:param pulumi.Input[builtins.str] cert_file: Path to a file containing the client certificate.
|
971
|
+
:param pulumi.Input[builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
|
972
|
+
:param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
|
973
|
+
:param pulumi.Input[builtins.str] name: Name of the certificate's role
|
974
|
+
:param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
975
|
+
:param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
975
976
|
"""
|
976
977
|
pulumi.set(__self__, "cert_file", cert_file)
|
977
978
|
pulumi.set(__self__, "key_file", key_file)
|
@@ -986,104 +987,104 @@ class ProviderAuthLoginCertArgs:
|
|
986
987
|
|
987
988
|
@property
|
988
989
|
@pulumi.getter(name="certFile")
|
989
|
-
def cert_file(self) -> pulumi.Input[str]:
|
990
|
+
def cert_file(self) -> pulumi.Input[builtins.str]:
|
990
991
|
"""
|
991
992
|
Path to a file containing the client certificate.
|
992
993
|
"""
|
993
994
|
return pulumi.get(self, "cert_file")
|
994
995
|
|
995
996
|
@cert_file.setter
|
996
|
-
def cert_file(self, value: pulumi.Input[str]):
|
997
|
+
def cert_file(self, value: pulumi.Input[builtins.str]):
|
997
998
|
pulumi.set(self, "cert_file", value)
|
998
999
|
|
999
1000
|
@property
|
1000
1001
|
@pulumi.getter(name="keyFile")
|
1001
|
-
def key_file(self) -> pulumi.Input[str]:
|
1002
|
+
def key_file(self) -> pulumi.Input[builtins.str]:
|
1002
1003
|
"""
|
1003
1004
|
Path to a file containing the private key that the certificate was issued for.
|
1004
1005
|
"""
|
1005
1006
|
return pulumi.get(self, "key_file")
|
1006
1007
|
|
1007
1008
|
@key_file.setter
|
1008
|
-
def key_file(self, value: pulumi.Input[str]):
|
1009
|
+
def key_file(self, value: pulumi.Input[builtins.str]):
|
1009
1010
|
pulumi.set(self, "key_file", value)
|
1010
1011
|
|
1011
1012
|
@property
|
1012
1013
|
@pulumi.getter
|
1013
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
1014
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
1014
1015
|
"""
|
1015
1016
|
The path where the authentication engine is mounted.
|
1016
1017
|
"""
|
1017
1018
|
return pulumi.get(self, "mount")
|
1018
1019
|
|
1019
1020
|
@mount.setter
|
1020
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
1021
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
1021
1022
|
pulumi.set(self, "mount", value)
|
1022
1023
|
|
1023
1024
|
@property
|
1024
1025
|
@pulumi.getter
|
1025
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
1026
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
1026
1027
|
"""
|
1027
1028
|
Name of the certificate's role
|
1028
1029
|
"""
|
1029
1030
|
return pulumi.get(self, "name")
|
1030
1031
|
|
1031
1032
|
@name.setter
|
1032
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
1033
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
1033
1034
|
pulumi.set(self, "name", value)
|
1034
1035
|
|
1035
1036
|
@property
|
1036
1037
|
@pulumi.getter
|
1037
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
1038
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
1038
1039
|
"""
|
1039
1040
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1040
1041
|
"""
|
1041
1042
|
return pulumi.get(self, "namespace")
|
1042
1043
|
|
1043
1044
|
@namespace.setter
|
1044
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
1045
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
1045
1046
|
pulumi.set(self, "namespace", value)
|
1046
1047
|
|
1047
1048
|
@property
|
1048
1049
|
@pulumi.getter(name="useRootNamespace")
|
1049
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
|
1050
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1050
1051
|
"""
|
1051
1052
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1052
1053
|
"""
|
1053
1054
|
return pulumi.get(self, "use_root_namespace")
|
1054
1055
|
|
1055
1056
|
@use_root_namespace.setter
|
1056
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
|
1057
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1057
1058
|
pulumi.set(self, "use_root_namespace", value)
|
1058
1059
|
|
1059
1060
|
|
1060
1061
|
if not MYPY:
|
1061
1062
|
class ProviderAuthLoginGcpArgsDict(TypedDict):
|
1062
|
-
role: pulumi.Input[str]
|
1063
|
+
role: pulumi.Input[builtins.str]
|
1063
1064
|
"""
|
1064
1065
|
Name of the login role.
|
1065
1066
|
"""
|
1066
|
-
credentials: NotRequired[pulumi.Input[str]]
|
1067
|
+
credentials: NotRequired[pulumi.Input[builtins.str]]
|
1067
1068
|
"""
|
1068
1069
|
Path to the Google Cloud credentials file.
|
1069
1070
|
"""
|
1070
|
-
jwt: NotRequired[pulumi.Input[str]]
|
1071
|
+
jwt: NotRequired[pulumi.Input[builtins.str]]
|
1071
1072
|
"""
|
1072
1073
|
A signed JSON Web Token.
|
1073
1074
|
"""
|
1074
|
-
mount: NotRequired[pulumi.Input[str]]
|
1075
|
+
mount: NotRequired[pulumi.Input[builtins.str]]
|
1075
1076
|
"""
|
1076
1077
|
The path where the authentication engine is mounted.
|
1077
1078
|
"""
|
1078
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1079
|
+
namespace: NotRequired[pulumi.Input[builtins.str]]
|
1079
1080
|
"""
|
1080
1081
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1081
1082
|
"""
|
1082
|
-
service_account: NotRequired[pulumi.Input[str]]
|
1083
|
+
service_account: NotRequired[pulumi.Input[builtins.str]]
|
1083
1084
|
"""
|
1084
1085
|
IAM service account.
|
1085
1086
|
"""
|
1086
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1087
|
+
use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
|
1087
1088
|
"""
|
1088
1089
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1089
1090
|
"""
|
@@ -1093,21 +1094,21 @@ elif False:
|
|
1093
1094
|
@pulumi.input_type
|
1094
1095
|
class ProviderAuthLoginGcpArgs:
|
1095
1096
|
def __init__(__self__, *,
|
1096
|
-
role: pulumi.Input[str],
|
1097
|
-
credentials: Optional[pulumi.Input[str]] = None,
|
1098
|
-
jwt: Optional[pulumi.Input[str]] = None,
|
1099
|
-
mount: Optional[pulumi.Input[str]] = None,
|
1100
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1101
|
-
service_account: Optional[pulumi.Input[str]] = None,
|
1102
|
-
use_root_namespace: Optional[pulumi.Input[bool]] = None):
|
1103
|
-
"""
|
1104
|
-
:param pulumi.Input[str] role: Name of the login role.
|
1105
|
-
:param pulumi.Input[str] credentials: Path to the Google Cloud credentials file.
|
1106
|
-
:param pulumi.Input[str] jwt: A signed JSON Web Token.
|
1107
|
-
:param pulumi.Input[str] mount: The path where the authentication engine is mounted.
|
1108
|
-
:param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1109
|
-
:param pulumi.Input[str] service_account: IAM service account.
|
1110
|
-
:param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1097
|
+
role: pulumi.Input[builtins.str],
|
1098
|
+
credentials: Optional[pulumi.Input[builtins.str]] = None,
|
1099
|
+
jwt: Optional[pulumi.Input[builtins.str]] = None,
|
1100
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
1101
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1102
|
+
service_account: Optional[pulumi.Input[builtins.str]] = None,
|
1103
|
+
use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
|
1104
|
+
"""
|
1105
|
+
:param pulumi.Input[builtins.str] role: Name of the login role.
|
1106
|
+
:param pulumi.Input[builtins.str] credentials: Path to the Google Cloud credentials file.
|
1107
|
+
:param pulumi.Input[builtins.str] jwt: A signed JSON Web Token.
|
1108
|
+
:param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
|
1109
|
+
:param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1110
|
+
:param pulumi.Input[builtins.str] service_account: IAM service account.
|
1111
|
+
:param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1111
1112
|
"""
|
1112
1113
|
pulumi.set(__self__, "role", role)
|
1113
1114
|
if credentials is not None:
|
@@ -1125,108 +1126,108 @@ class ProviderAuthLoginGcpArgs:
|
|
1125
1126
|
|
1126
1127
|
@property
|
1127
1128
|
@pulumi.getter
|
1128
|
-
def role(self) -> pulumi.Input[str]:
|
1129
|
+
def role(self) -> pulumi.Input[builtins.str]:
|
1129
1130
|
"""
|
1130
1131
|
Name of the login role.
|
1131
1132
|
"""
|
1132
1133
|
return pulumi.get(self, "role")
|
1133
1134
|
|
1134
1135
|
@role.setter
|
1135
|
-
def role(self, value: pulumi.Input[str]):
|
1136
|
+
def role(self, value: pulumi.Input[builtins.str]):
|
1136
1137
|
pulumi.set(self, "role", value)
|
1137
1138
|
|
1138
1139
|
@property
|
1139
1140
|
@pulumi.getter
|
1140
|
-
def credentials(self) -> Optional[pulumi.Input[str]]:
|
1141
|
+
def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
|
1141
1142
|
"""
|
1142
1143
|
Path to the Google Cloud credentials file.
|
1143
1144
|
"""
|
1144
1145
|
return pulumi.get(self, "credentials")
|
1145
1146
|
|
1146
1147
|
@credentials.setter
|
1147
|
-
def credentials(self, value: Optional[pulumi.Input[str]]):
|
1148
|
+
def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
|
1148
1149
|
pulumi.set(self, "credentials", value)
|
1149
1150
|
|
1150
1151
|
@property
|
1151
1152
|
@pulumi.getter
|
1152
|
-
def jwt(self) -> Optional[pulumi.Input[str]]:
|
1153
|
+
def jwt(self) -> Optional[pulumi.Input[builtins.str]]:
|
1153
1154
|
"""
|
1154
1155
|
A signed JSON Web Token.
|
1155
1156
|
"""
|
1156
1157
|
return pulumi.get(self, "jwt")
|
1157
1158
|
|
1158
1159
|
@jwt.setter
|
1159
|
-
def jwt(self, value: Optional[pulumi.Input[str]]):
|
1160
|
+
def jwt(self, value: Optional[pulumi.Input[builtins.str]]):
|
1160
1161
|
pulumi.set(self, "jwt", value)
|
1161
1162
|
|
1162
1163
|
@property
|
1163
1164
|
@pulumi.getter
|
1164
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
1165
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
1165
1166
|
"""
|
1166
1167
|
The path where the authentication engine is mounted.
|
1167
1168
|
"""
|
1168
1169
|
return pulumi.get(self, "mount")
|
1169
1170
|
|
1170
1171
|
@mount.setter
|
1171
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
1172
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
1172
1173
|
pulumi.set(self, "mount", value)
|
1173
1174
|
|
1174
1175
|
@property
|
1175
1176
|
@pulumi.getter
|
1176
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
1177
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
1177
1178
|
"""
|
1178
1179
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1179
1180
|
"""
|
1180
1181
|
return pulumi.get(self, "namespace")
|
1181
1182
|
|
1182
1183
|
@namespace.setter
|
1183
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
1184
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
1184
1185
|
pulumi.set(self, "namespace", value)
|
1185
1186
|
|
1186
1187
|
@property
|
1187
1188
|
@pulumi.getter(name="serviceAccount")
|
1188
|
-
def service_account(self) -> Optional[pulumi.Input[str]]:
|
1189
|
+
def service_account(self) -> Optional[pulumi.Input[builtins.str]]:
|
1189
1190
|
"""
|
1190
1191
|
IAM service account.
|
1191
1192
|
"""
|
1192
1193
|
return pulumi.get(self, "service_account")
|
1193
1194
|
|
1194
1195
|
@service_account.setter
|
1195
|
-
def service_account(self, value: Optional[pulumi.Input[str]]):
|
1196
|
+
def service_account(self, value: Optional[pulumi.Input[builtins.str]]):
|
1196
1197
|
pulumi.set(self, "service_account", value)
|
1197
1198
|
|
1198
1199
|
@property
|
1199
1200
|
@pulumi.getter(name="useRootNamespace")
|
1200
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
|
1201
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1201
1202
|
"""
|
1202
1203
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1203
1204
|
"""
|
1204
1205
|
return pulumi.get(self, "use_root_namespace")
|
1205
1206
|
|
1206
1207
|
@use_root_namespace.setter
|
1207
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
|
1208
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1208
1209
|
pulumi.set(self, "use_root_namespace", value)
|
1209
1210
|
|
1210
1211
|
|
1211
1212
|
if not MYPY:
|
1212
1213
|
class ProviderAuthLoginJwtArgsDict(TypedDict):
|
1213
|
-
jwt: pulumi.Input[str]
|
1214
|
+
jwt: pulumi.Input[builtins.str]
|
1214
1215
|
"""
|
1215
1216
|
A signed JSON Web Token.
|
1216
1217
|
"""
|
1217
|
-
role: pulumi.Input[str]
|
1218
|
+
role: pulumi.Input[builtins.str]
|
1218
1219
|
"""
|
1219
1220
|
Name of the login role.
|
1220
1221
|
"""
|
1221
|
-
mount: NotRequired[pulumi.Input[str]]
|
1222
|
+
mount: NotRequired[pulumi.Input[builtins.str]]
|
1222
1223
|
"""
|
1223
1224
|
The path where the authentication engine is mounted.
|
1224
1225
|
"""
|
1225
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1226
|
+
namespace: NotRequired[pulumi.Input[builtins.str]]
|
1226
1227
|
"""
|
1227
1228
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1228
1229
|
"""
|
1229
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1230
|
+
use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
|
1230
1231
|
"""
|
1231
1232
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1232
1233
|
"""
|
@@ -1236,17 +1237,17 @@ elif False:
|
|
1236
1237
|
@pulumi.input_type
|
1237
1238
|
class ProviderAuthLoginJwtArgs:
|
1238
1239
|
def __init__(__self__, *,
|
1239
|
-
jwt: pulumi.Input[str],
|
1240
|
-
role: pulumi.Input[str],
|
1241
|
-
mount: Optional[pulumi.Input[str]] = None,
|
1242
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1243
|
-
use_root_namespace: Optional[pulumi.Input[bool]] = None):
|
1244
|
-
"""
|
1245
|
-
:param pulumi.Input[str] jwt: A signed JSON Web Token.
|
1246
|
-
:param pulumi.Input[str] role: Name of the login role.
|
1247
|
-
:param pulumi.Input[str] mount: The path where the authentication engine is mounted.
|
1248
|
-
:param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1249
|
-
:param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1240
|
+
jwt: pulumi.Input[builtins.str],
|
1241
|
+
role: pulumi.Input[builtins.str],
|
1242
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
1243
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1244
|
+
use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
|
1245
|
+
"""
|
1246
|
+
:param pulumi.Input[builtins.str] jwt: A signed JSON Web Token.
|
1247
|
+
:param pulumi.Input[builtins.str] role: Name of the login role.
|
1248
|
+
:param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
|
1249
|
+
:param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1250
|
+
:param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1250
1251
|
"""
|
1251
1252
|
pulumi.set(__self__, "jwt", jwt)
|
1252
1253
|
pulumi.set(__self__, "role", role)
|
@@ -1259,108 +1260,108 @@ class ProviderAuthLoginJwtArgs:
|
|
1259
1260
|
|
1260
1261
|
@property
|
1261
1262
|
@pulumi.getter
|
1262
|
-
def jwt(self) -> pulumi.Input[str]:
|
1263
|
+
def jwt(self) -> pulumi.Input[builtins.str]:
|
1263
1264
|
"""
|
1264
1265
|
A signed JSON Web Token.
|
1265
1266
|
"""
|
1266
1267
|
return pulumi.get(self, "jwt")
|
1267
1268
|
|
1268
1269
|
@jwt.setter
|
1269
|
-
def jwt(self, value: pulumi.Input[str]):
|
1270
|
+
def jwt(self, value: pulumi.Input[builtins.str]):
|
1270
1271
|
pulumi.set(self, "jwt", value)
|
1271
1272
|
|
1272
1273
|
@property
|
1273
1274
|
@pulumi.getter
|
1274
|
-
def role(self) -> pulumi.Input[str]:
|
1275
|
+
def role(self) -> pulumi.Input[builtins.str]:
|
1275
1276
|
"""
|
1276
1277
|
Name of the login role.
|
1277
1278
|
"""
|
1278
1279
|
return pulumi.get(self, "role")
|
1279
1280
|
|
1280
1281
|
@role.setter
|
1281
|
-
def role(self, value: pulumi.Input[str]):
|
1282
|
+
def role(self, value: pulumi.Input[builtins.str]):
|
1282
1283
|
pulumi.set(self, "role", value)
|
1283
1284
|
|
1284
1285
|
@property
|
1285
1286
|
@pulumi.getter
|
1286
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
1287
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
1287
1288
|
"""
|
1288
1289
|
The path where the authentication engine is mounted.
|
1289
1290
|
"""
|
1290
1291
|
return pulumi.get(self, "mount")
|
1291
1292
|
|
1292
1293
|
@mount.setter
|
1293
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
1294
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
1294
1295
|
pulumi.set(self, "mount", value)
|
1295
1296
|
|
1296
1297
|
@property
|
1297
1298
|
@pulumi.getter
|
1298
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
1299
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
1299
1300
|
"""
|
1300
1301
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1301
1302
|
"""
|
1302
1303
|
return pulumi.get(self, "namespace")
|
1303
1304
|
|
1304
1305
|
@namespace.setter
|
1305
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
1306
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
1306
1307
|
pulumi.set(self, "namespace", value)
|
1307
1308
|
|
1308
1309
|
@property
|
1309
1310
|
@pulumi.getter(name="useRootNamespace")
|
1310
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
|
1311
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1311
1312
|
"""
|
1312
1313
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1313
1314
|
"""
|
1314
1315
|
return pulumi.get(self, "use_root_namespace")
|
1315
1316
|
|
1316
1317
|
@use_root_namespace.setter
|
1317
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
|
1318
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1318
1319
|
pulumi.set(self, "use_root_namespace", value)
|
1319
1320
|
|
1320
1321
|
|
1321
1322
|
if not MYPY:
|
1322
1323
|
class ProviderAuthLoginKerberosArgsDict(TypedDict):
|
1323
|
-
disable_fast_negotiation: NotRequired[pulumi.Input[bool]]
|
1324
|
+
disable_fast_negotiation: NotRequired[pulumi.Input[builtins.bool]]
|
1324
1325
|
"""
|
1325
1326
|
Disable the Kerberos FAST negotiation.
|
1326
1327
|
"""
|
1327
|
-
keytab_path: NotRequired[pulumi.Input[str]]
|
1328
|
+
keytab_path: NotRequired[pulumi.Input[builtins.str]]
|
1328
1329
|
"""
|
1329
1330
|
The Kerberos keytab file containing the entry of the login entity.
|
1330
1331
|
"""
|
1331
|
-
krb5conf_path: NotRequired[pulumi.Input[str]]
|
1332
|
+
krb5conf_path: NotRequired[pulumi.Input[builtins.str]]
|
1332
1333
|
"""
|
1333
1334
|
A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
1334
1335
|
"""
|
1335
|
-
mount: NotRequired[pulumi.Input[str]]
|
1336
|
+
mount: NotRequired[pulumi.Input[builtins.str]]
|
1336
1337
|
"""
|
1337
1338
|
The path where the authentication engine is mounted.
|
1338
1339
|
"""
|
1339
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1340
|
+
namespace: NotRequired[pulumi.Input[builtins.str]]
|
1340
1341
|
"""
|
1341
1342
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1342
1343
|
"""
|
1343
|
-
realm: NotRequired[pulumi.Input[str]]
|
1344
|
+
realm: NotRequired[pulumi.Input[builtins.str]]
|
1344
1345
|
"""
|
1345
1346
|
The Kerberos server's authoritative authentication domain
|
1346
1347
|
"""
|
1347
|
-
remove_instance_name: NotRequired[pulumi.Input[bool]]
|
1348
|
+
remove_instance_name: NotRequired[pulumi.Input[builtins.bool]]
|
1348
1349
|
"""
|
1349
1350
|
Strip the host from the username found in the keytab.
|
1350
1351
|
"""
|
1351
|
-
service: NotRequired[pulumi.Input[str]]
|
1352
|
+
service: NotRequired[pulumi.Input[builtins.str]]
|
1352
1353
|
"""
|
1353
1354
|
The service principle name.
|
1354
1355
|
"""
|
1355
|
-
token: NotRequired[pulumi.Input[str]]
|
1356
|
+
token: NotRequired[pulumi.Input[builtins.str]]
|
1356
1357
|
"""
|
1357
1358
|
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
1358
1359
|
"""
|
1359
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1360
|
+
use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
|
1360
1361
|
"""
|
1361
1362
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1362
1363
|
"""
|
1363
|
-
username: NotRequired[pulumi.Input[str]]
|
1364
|
+
username: NotRequired[pulumi.Input[builtins.str]]
|
1364
1365
|
"""
|
1365
1366
|
The username to login into Kerberos with.
|
1366
1367
|
"""
|
@@ -1370,29 +1371,29 @@ elif False:
|
|
1370
1371
|
@pulumi.input_type
|
1371
1372
|
class ProviderAuthLoginKerberosArgs:
|
1372
1373
|
def __init__(__self__, *,
|
1373
|
-
disable_fast_negotiation: Optional[pulumi.Input[bool]] = None,
|
1374
|
-
keytab_path: Optional[pulumi.Input[str]] = None,
|
1375
|
-
krb5conf_path: Optional[pulumi.Input[str]] = None,
|
1376
|
-
mount: Optional[pulumi.Input[str]] = None,
|
1377
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1378
|
-
realm: Optional[pulumi.Input[str]] = None,
|
1379
|
-
remove_instance_name: Optional[pulumi.Input[bool]] = None,
|
1380
|
-
service: Optional[pulumi.Input[str]] = None,
|
1381
|
-
token: Optional[pulumi.Input[str]] = None,
|
1382
|
-
use_root_namespace: Optional[pulumi.Input[bool]] = None,
|
1383
|
-
username: Optional[pulumi.Input[str]] = None):
|
1384
|
-
"""
|
1385
|
-
:param pulumi.Input[bool] disable_fast_negotiation: Disable the Kerberos FAST negotiation.
|
1386
|
-
:param pulumi.Input[str] keytab_path: The Kerberos keytab file containing the entry of the login entity.
|
1387
|
-
:param pulumi.Input[str] krb5conf_path: A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
1388
|
-
:param pulumi.Input[str] mount: The path where the authentication engine is mounted.
|
1389
|
-
:param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1390
|
-
:param pulumi.Input[str] realm: The Kerberos server's authoritative authentication domain
|
1391
|
-
:param pulumi.Input[bool] remove_instance_name: Strip the host from the username found in the keytab.
|
1392
|
-
:param pulumi.Input[str] service: The service principle name.
|
1393
|
-
:param pulumi.Input[str] token: Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
1394
|
-
:param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1395
|
-
:param pulumi.Input[str] username: The username to login into Kerberos with.
|
1374
|
+
disable_fast_negotiation: Optional[pulumi.Input[builtins.bool]] = None,
|
1375
|
+
keytab_path: Optional[pulumi.Input[builtins.str]] = None,
|
1376
|
+
krb5conf_path: Optional[pulumi.Input[builtins.str]] = None,
|
1377
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
1378
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1379
|
+
realm: Optional[pulumi.Input[builtins.str]] = None,
|
1380
|
+
remove_instance_name: Optional[pulumi.Input[builtins.bool]] = None,
|
1381
|
+
service: Optional[pulumi.Input[builtins.str]] = None,
|
1382
|
+
token: Optional[pulumi.Input[builtins.str]] = None,
|
1383
|
+
use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None,
|
1384
|
+
username: Optional[pulumi.Input[builtins.str]] = None):
|
1385
|
+
"""
|
1386
|
+
:param pulumi.Input[builtins.bool] disable_fast_negotiation: Disable the Kerberos FAST negotiation.
|
1387
|
+
:param pulumi.Input[builtins.str] keytab_path: The Kerberos keytab file containing the entry of the login entity.
|
1388
|
+
:param pulumi.Input[builtins.str] krb5conf_path: A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
1389
|
+
:param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
|
1390
|
+
:param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1391
|
+
:param pulumi.Input[builtins.str] realm: The Kerberos server's authoritative authentication domain
|
1392
|
+
:param pulumi.Input[builtins.bool] remove_instance_name: Strip the host from the username found in the keytab.
|
1393
|
+
:param pulumi.Input[builtins.str] service: The service principle name.
|
1394
|
+
:param pulumi.Input[builtins.str] token: Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
1395
|
+
:param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1396
|
+
:param pulumi.Input[builtins.str] username: The username to login into Kerberos with.
|
1396
1397
|
"""
|
1397
1398
|
if disable_fast_negotiation is not None:
|
1398
1399
|
pulumi.set(__self__, "disable_fast_negotiation", disable_fast_negotiation)
|
@@ -1419,156 +1420,156 @@ class ProviderAuthLoginKerberosArgs:
|
|
1419
1420
|
|
1420
1421
|
@property
|
1421
1422
|
@pulumi.getter(name="disableFastNegotiation")
|
1422
|
-
def disable_fast_negotiation(self) -> Optional[pulumi.Input[bool]]:
|
1423
|
+
def disable_fast_negotiation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1423
1424
|
"""
|
1424
1425
|
Disable the Kerberos FAST negotiation.
|
1425
1426
|
"""
|
1426
1427
|
return pulumi.get(self, "disable_fast_negotiation")
|
1427
1428
|
|
1428
1429
|
@disable_fast_negotiation.setter
|
1429
|
-
def disable_fast_negotiation(self, value: Optional[pulumi.Input[bool]]):
|
1430
|
+
def disable_fast_negotiation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1430
1431
|
pulumi.set(self, "disable_fast_negotiation", value)
|
1431
1432
|
|
1432
1433
|
@property
|
1433
1434
|
@pulumi.getter(name="keytabPath")
|
1434
|
-
def keytab_path(self) -> Optional[pulumi.Input[str]]:
|
1435
|
+
def keytab_path(self) -> Optional[pulumi.Input[builtins.str]]:
|
1435
1436
|
"""
|
1436
1437
|
The Kerberos keytab file containing the entry of the login entity.
|
1437
1438
|
"""
|
1438
1439
|
return pulumi.get(self, "keytab_path")
|
1439
1440
|
|
1440
1441
|
@keytab_path.setter
|
1441
|
-
def keytab_path(self, value: Optional[pulumi.Input[str]]):
|
1442
|
+
def keytab_path(self, value: Optional[pulumi.Input[builtins.str]]):
|
1442
1443
|
pulumi.set(self, "keytab_path", value)
|
1443
1444
|
|
1444
1445
|
@property
|
1445
1446
|
@pulumi.getter(name="krb5confPath")
|
1446
|
-
def krb5conf_path(self) -> Optional[pulumi.Input[str]]:
|
1447
|
+
def krb5conf_path(self) -> Optional[pulumi.Input[builtins.str]]:
|
1447
1448
|
"""
|
1448
1449
|
A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
1449
1450
|
"""
|
1450
1451
|
return pulumi.get(self, "krb5conf_path")
|
1451
1452
|
|
1452
1453
|
@krb5conf_path.setter
|
1453
|
-
def krb5conf_path(self, value: Optional[pulumi.Input[str]]):
|
1454
|
+
def krb5conf_path(self, value: Optional[pulumi.Input[builtins.str]]):
|
1454
1455
|
pulumi.set(self, "krb5conf_path", value)
|
1455
1456
|
|
1456
1457
|
@property
|
1457
1458
|
@pulumi.getter
|
1458
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
1459
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
1459
1460
|
"""
|
1460
1461
|
The path where the authentication engine is mounted.
|
1461
1462
|
"""
|
1462
1463
|
return pulumi.get(self, "mount")
|
1463
1464
|
|
1464
1465
|
@mount.setter
|
1465
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
1466
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
1466
1467
|
pulumi.set(self, "mount", value)
|
1467
1468
|
|
1468
1469
|
@property
|
1469
1470
|
@pulumi.getter
|
1470
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
1471
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
1471
1472
|
"""
|
1472
1473
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1473
1474
|
"""
|
1474
1475
|
return pulumi.get(self, "namespace")
|
1475
1476
|
|
1476
1477
|
@namespace.setter
|
1477
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
1478
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
1478
1479
|
pulumi.set(self, "namespace", value)
|
1479
1480
|
|
1480
1481
|
@property
|
1481
1482
|
@pulumi.getter
|
1482
|
-
def realm(self) -> Optional[pulumi.Input[str]]:
|
1483
|
+
def realm(self) -> Optional[pulumi.Input[builtins.str]]:
|
1483
1484
|
"""
|
1484
1485
|
The Kerberos server's authoritative authentication domain
|
1485
1486
|
"""
|
1486
1487
|
return pulumi.get(self, "realm")
|
1487
1488
|
|
1488
1489
|
@realm.setter
|
1489
|
-
def realm(self, value: Optional[pulumi.Input[str]]):
|
1490
|
+
def realm(self, value: Optional[pulumi.Input[builtins.str]]):
|
1490
1491
|
pulumi.set(self, "realm", value)
|
1491
1492
|
|
1492
1493
|
@property
|
1493
1494
|
@pulumi.getter(name="removeInstanceName")
|
1494
|
-
def remove_instance_name(self) -> Optional[pulumi.Input[bool]]:
|
1495
|
+
def remove_instance_name(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1495
1496
|
"""
|
1496
1497
|
Strip the host from the username found in the keytab.
|
1497
1498
|
"""
|
1498
1499
|
return pulumi.get(self, "remove_instance_name")
|
1499
1500
|
|
1500
1501
|
@remove_instance_name.setter
|
1501
|
-
def remove_instance_name(self, value: Optional[pulumi.Input[bool]]):
|
1502
|
+
def remove_instance_name(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1502
1503
|
pulumi.set(self, "remove_instance_name", value)
|
1503
1504
|
|
1504
1505
|
@property
|
1505
1506
|
@pulumi.getter
|
1506
|
-
def service(self) -> Optional[pulumi.Input[str]]:
|
1507
|
+
def service(self) -> Optional[pulumi.Input[builtins.str]]:
|
1507
1508
|
"""
|
1508
1509
|
The service principle name.
|
1509
1510
|
"""
|
1510
1511
|
return pulumi.get(self, "service")
|
1511
1512
|
|
1512
1513
|
@service.setter
|
1513
|
-
def service(self, value: Optional[pulumi.Input[str]]):
|
1514
|
+
def service(self, value: Optional[pulumi.Input[builtins.str]]):
|
1514
1515
|
pulumi.set(self, "service", value)
|
1515
1516
|
|
1516
1517
|
@property
|
1517
1518
|
@pulumi.getter
|
1518
|
-
def token(self) -> Optional[pulumi.Input[str]]:
|
1519
|
+
def token(self) -> Optional[pulumi.Input[builtins.str]]:
|
1519
1520
|
"""
|
1520
1521
|
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
1521
1522
|
"""
|
1522
1523
|
return pulumi.get(self, "token")
|
1523
1524
|
|
1524
1525
|
@token.setter
|
1525
|
-
def token(self, value: Optional[pulumi.Input[str]]):
|
1526
|
+
def token(self, value: Optional[pulumi.Input[builtins.str]]):
|
1526
1527
|
pulumi.set(self, "token", value)
|
1527
1528
|
|
1528
1529
|
@property
|
1529
1530
|
@pulumi.getter(name="useRootNamespace")
|
1530
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
|
1531
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1531
1532
|
"""
|
1532
1533
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1533
1534
|
"""
|
1534
1535
|
return pulumi.get(self, "use_root_namespace")
|
1535
1536
|
|
1536
1537
|
@use_root_namespace.setter
|
1537
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
|
1538
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1538
1539
|
pulumi.set(self, "use_root_namespace", value)
|
1539
1540
|
|
1540
1541
|
@property
|
1541
1542
|
@pulumi.getter
|
1542
|
-
def username(self) -> Optional[pulumi.Input[str]]:
|
1543
|
+
def username(self) -> Optional[pulumi.Input[builtins.str]]:
|
1543
1544
|
"""
|
1544
1545
|
The username to login into Kerberos with.
|
1545
1546
|
"""
|
1546
1547
|
return pulumi.get(self, "username")
|
1547
1548
|
|
1548
1549
|
@username.setter
|
1549
|
-
def username(self, value: Optional[pulumi.Input[str]]):
|
1550
|
+
def username(self, value: Optional[pulumi.Input[builtins.str]]):
|
1550
1551
|
pulumi.set(self, "username", value)
|
1551
1552
|
|
1552
1553
|
|
1553
1554
|
if not MYPY:
|
1554
1555
|
class ProviderAuthLoginOciArgsDict(TypedDict):
|
1555
|
-
auth_type: pulumi.Input[str]
|
1556
|
+
auth_type: pulumi.Input[builtins.str]
|
1556
1557
|
"""
|
1557
1558
|
Authentication type to use when getting OCI credentials.
|
1558
1559
|
"""
|
1559
|
-
role: pulumi.Input[str]
|
1560
|
+
role: pulumi.Input[builtins.str]
|
1560
1561
|
"""
|
1561
1562
|
Name of the login role.
|
1562
1563
|
"""
|
1563
|
-
mount: NotRequired[pulumi.Input[str]]
|
1564
|
+
mount: NotRequired[pulumi.Input[builtins.str]]
|
1564
1565
|
"""
|
1565
1566
|
The path where the authentication engine is mounted.
|
1566
1567
|
"""
|
1567
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1568
|
+
namespace: NotRequired[pulumi.Input[builtins.str]]
|
1568
1569
|
"""
|
1569
1570
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1570
1571
|
"""
|
1571
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1572
|
+
use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
|
1572
1573
|
"""
|
1573
1574
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1574
1575
|
"""
|
@@ -1578,17 +1579,17 @@ elif False:
|
|
1578
1579
|
@pulumi.input_type
|
1579
1580
|
class ProviderAuthLoginOciArgs:
|
1580
1581
|
def __init__(__self__, *,
|
1581
|
-
auth_type: pulumi.Input[str],
|
1582
|
-
role: pulumi.Input[str],
|
1583
|
-
mount: Optional[pulumi.Input[str]] = None,
|
1584
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1585
|
-
use_root_namespace: Optional[pulumi.Input[bool]] = None):
|
1586
|
-
"""
|
1587
|
-
:param pulumi.Input[str] auth_type: Authentication type to use when getting OCI credentials.
|
1588
|
-
:param pulumi.Input[str] role: Name of the login role.
|
1589
|
-
:param pulumi.Input[str] mount: The path where the authentication engine is mounted.
|
1590
|
-
:param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1591
|
-
:param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1582
|
+
auth_type: pulumi.Input[builtins.str],
|
1583
|
+
role: pulumi.Input[builtins.str],
|
1584
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
1585
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1586
|
+
use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
|
1587
|
+
"""
|
1588
|
+
:param pulumi.Input[builtins.str] auth_type: Authentication type to use when getting OCI credentials.
|
1589
|
+
:param pulumi.Input[builtins.str] role: Name of the login role.
|
1590
|
+
:param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
|
1591
|
+
:param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1592
|
+
:param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1592
1593
|
"""
|
1593
1594
|
pulumi.set(__self__, "auth_type", auth_type)
|
1594
1595
|
pulumi.set(__self__, "role", role)
|
@@ -1601,88 +1602,88 @@ class ProviderAuthLoginOciArgs:
|
|
1601
1602
|
|
1602
1603
|
@property
|
1603
1604
|
@pulumi.getter(name="authType")
|
1604
|
-
def auth_type(self) -> pulumi.Input[str]:
|
1605
|
+
def auth_type(self) -> pulumi.Input[builtins.str]:
|
1605
1606
|
"""
|
1606
1607
|
Authentication type to use when getting OCI credentials.
|
1607
1608
|
"""
|
1608
1609
|
return pulumi.get(self, "auth_type")
|
1609
1610
|
|
1610
1611
|
@auth_type.setter
|
1611
|
-
def auth_type(self, value: pulumi.Input[str]):
|
1612
|
+
def auth_type(self, value: pulumi.Input[builtins.str]):
|
1612
1613
|
pulumi.set(self, "auth_type", value)
|
1613
1614
|
|
1614
1615
|
@property
|
1615
1616
|
@pulumi.getter
|
1616
|
-
def role(self) -> pulumi.Input[str]:
|
1617
|
+
def role(self) -> pulumi.Input[builtins.str]:
|
1617
1618
|
"""
|
1618
1619
|
Name of the login role.
|
1619
1620
|
"""
|
1620
1621
|
return pulumi.get(self, "role")
|
1621
1622
|
|
1622
1623
|
@role.setter
|
1623
|
-
def role(self, value: pulumi.Input[str]):
|
1624
|
+
def role(self, value: pulumi.Input[builtins.str]):
|
1624
1625
|
pulumi.set(self, "role", value)
|
1625
1626
|
|
1626
1627
|
@property
|
1627
1628
|
@pulumi.getter
|
1628
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
1629
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
1629
1630
|
"""
|
1630
1631
|
The path where the authentication engine is mounted.
|
1631
1632
|
"""
|
1632
1633
|
return pulumi.get(self, "mount")
|
1633
1634
|
|
1634
1635
|
@mount.setter
|
1635
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
1636
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
1636
1637
|
pulumi.set(self, "mount", value)
|
1637
1638
|
|
1638
1639
|
@property
|
1639
1640
|
@pulumi.getter
|
1640
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
1641
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
1641
1642
|
"""
|
1642
1643
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1643
1644
|
"""
|
1644
1645
|
return pulumi.get(self, "namespace")
|
1645
1646
|
|
1646
1647
|
@namespace.setter
|
1647
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
1648
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
1648
1649
|
pulumi.set(self, "namespace", value)
|
1649
1650
|
|
1650
1651
|
@property
|
1651
1652
|
@pulumi.getter(name="useRootNamespace")
|
1652
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
|
1653
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1653
1654
|
"""
|
1654
1655
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1655
1656
|
"""
|
1656
1657
|
return pulumi.get(self, "use_root_namespace")
|
1657
1658
|
|
1658
1659
|
@use_root_namespace.setter
|
1659
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
|
1660
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1660
1661
|
pulumi.set(self, "use_root_namespace", value)
|
1661
1662
|
|
1662
1663
|
|
1663
1664
|
if not MYPY:
|
1664
1665
|
class ProviderAuthLoginOidcArgsDict(TypedDict):
|
1665
|
-
role: pulumi.Input[str]
|
1666
|
+
role: pulumi.Input[builtins.str]
|
1666
1667
|
"""
|
1667
1668
|
Name of the login role.
|
1668
1669
|
"""
|
1669
|
-
callback_address: NotRequired[pulumi.Input[str]]
|
1670
|
+
callback_address: NotRequired[pulumi.Input[builtins.str]]
|
1670
1671
|
"""
|
1671
1672
|
The callback address. Must be a valid URI without the path.
|
1672
1673
|
"""
|
1673
|
-
callback_listener_address: NotRequired[pulumi.Input[str]]
|
1674
|
+
callback_listener_address: NotRequired[pulumi.Input[builtins.str]]
|
1674
1675
|
"""
|
1675
1676
|
The callback listener's address. Must be a valid URI without the path.
|
1676
1677
|
"""
|
1677
|
-
mount: NotRequired[pulumi.Input[str]]
|
1678
|
+
mount: NotRequired[pulumi.Input[builtins.str]]
|
1678
1679
|
"""
|
1679
1680
|
The path where the authentication engine is mounted.
|
1680
1681
|
"""
|
1681
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1682
|
+
namespace: NotRequired[pulumi.Input[builtins.str]]
|
1682
1683
|
"""
|
1683
1684
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1684
1685
|
"""
|
1685
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1686
|
+
use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
|
1686
1687
|
"""
|
1687
1688
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1688
1689
|
"""
|
@@ -1692,19 +1693,19 @@ elif False:
|
|
1692
1693
|
@pulumi.input_type
|
1693
1694
|
class ProviderAuthLoginOidcArgs:
|
1694
1695
|
def __init__(__self__, *,
|
1695
|
-
role: pulumi.Input[str],
|
1696
|
-
callback_address: Optional[pulumi.Input[str]] = None,
|
1697
|
-
callback_listener_address: Optional[pulumi.Input[str]] = None,
|
1698
|
-
mount: Optional[pulumi.Input[str]] = None,
|
1699
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1700
|
-
use_root_namespace: Optional[pulumi.Input[bool]] = None):
|
1701
|
-
"""
|
1702
|
-
:param pulumi.Input[str] role: Name of the login role.
|
1703
|
-
:param pulumi.Input[str] callback_address: The callback address. Must be a valid URI without the path.
|
1704
|
-
:param pulumi.Input[str] callback_listener_address: The callback listener's address. Must be a valid URI without the path.
|
1705
|
-
:param pulumi.Input[str] mount: The path where the authentication engine is mounted.
|
1706
|
-
:param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1707
|
-
:param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1696
|
+
role: pulumi.Input[builtins.str],
|
1697
|
+
callback_address: Optional[pulumi.Input[builtins.str]] = None,
|
1698
|
+
callback_listener_address: Optional[pulumi.Input[builtins.str]] = None,
|
1699
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
1700
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1701
|
+
use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
|
1702
|
+
"""
|
1703
|
+
:param pulumi.Input[builtins.str] role: Name of the login role.
|
1704
|
+
:param pulumi.Input[builtins.str] callback_address: The callback address. Must be a valid URI without the path.
|
1705
|
+
:param pulumi.Input[builtins.str] callback_listener_address: The callback listener's address. Must be a valid URI without the path.
|
1706
|
+
:param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
|
1707
|
+
:param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1708
|
+
:param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1708
1709
|
"""
|
1709
1710
|
pulumi.set(__self__, "role", role)
|
1710
1711
|
if callback_address is not None:
|
@@ -1720,96 +1721,96 @@ class ProviderAuthLoginOidcArgs:
|
|
1720
1721
|
|
1721
1722
|
@property
|
1722
1723
|
@pulumi.getter
|
1723
|
-
def role(self) -> pulumi.Input[str]:
|
1724
|
+
def role(self) -> pulumi.Input[builtins.str]:
|
1724
1725
|
"""
|
1725
1726
|
Name of the login role.
|
1726
1727
|
"""
|
1727
1728
|
return pulumi.get(self, "role")
|
1728
1729
|
|
1729
1730
|
@role.setter
|
1730
|
-
def role(self, value: pulumi.Input[str]):
|
1731
|
+
def role(self, value: pulumi.Input[builtins.str]):
|
1731
1732
|
pulumi.set(self, "role", value)
|
1732
1733
|
|
1733
1734
|
@property
|
1734
1735
|
@pulumi.getter(name="callbackAddress")
|
1735
|
-
def callback_address(self) -> Optional[pulumi.Input[str]]:
|
1736
|
+
def callback_address(self) -> Optional[pulumi.Input[builtins.str]]:
|
1736
1737
|
"""
|
1737
1738
|
The callback address. Must be a valid URI without the path.
|
1738
1739
|
"""
|
1739
1740
|
return pulumi.get(self, "callback_address")
|
1740
1741
|
|
1741
1742
|
@callback_address.setter
|
1742
|
-
def callback_address(self, value: Optional[pulumi.Input[str]]):
|
1743
|
+
def callback_address(self, value: Optional[pulumi.Input[builtins.str]]):
|
1743
1744
|
pulumi.set(self, "callback_address", value)
|
1744
1745
|
|
1745
1746
|
@property
|
1746
1747
|
@pulumi.getter(name="callbackListenerAddress")
|
1747
|
-
def callback_listener_address(self) -> Optional[pulumi.Input[str]]:
|
1748
|
+
def callback_listener_address(self) -> Optional[pulumi.Input[builtins.str]]:
|
1748
1749
|
"""
|
1749
1750
|
The callback listener's address. Must be a valid URI without the path.
|
1750
1751
|
"""
|
1751
1752
|
return pulumi.get(self, "callback_listener_address")
|
1752
1753
|
|
1753
1754
|
@callback_listener_address.setter
|
1754
|
-
def callback_listener_address(self, value: Optional[pulumi.Input[str]]):
|
1755
|
+
def callback_listener_address(self, value: Optional[pulumi.Input[builtins.str]]):
|
1755
1756
|
pulumi.set(self, "callback_listener_address", value)
|
1756
1757
|
|
1757
1758
|
@property
|
1758
1759
|
@pulumi.getter
|
1759
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
1760
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
1760
1761
|
"""
|
1761
1762
|
The path where the authentication engine is mounted.
|
1762
1763
|
"""
|
1763
1764
|
return pulumi.get(self, "mount")
|
1764
1765
|
|
1765
1766
|
@mount.setter
|
1766
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
1767
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
1767
1768
|
pulumi.set(self, "mount", value)
|
1768
1769
|
|
1769
1770
|
@property
|
1770
1771
|
@pulumi.getter
|
1771
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
1772
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
1772
1773
|
"""
|
1773
1774
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1774
1775
|
"""
|
1775
1776
|
return pulumi.get(self, "namespace")
|
1776
1777
|
|
1777
1778
|
@namespace.setter
|
1778
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
1779
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
1779
1780
|
pulumi.set(self, "namespace", value)
|
1780
1781
|
|
1781
1782
|
@property
|
1782
1783
|
@pulumi.getter(name="useRootNamespace")
|
1783
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
|
1784
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1784
1785
|
"""
|
1785
1786
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1786
1787
|
"""
|
1787
1788
|
return pulumi.get(self, "use_root_namespace")
|
1788
1789
|
|
1789
1790
|
@use_root_namespace.setter
|
1790
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
|
1791
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1791
1792
|
pulumi.set(self, "use_root_namespace", value)
|
1792
1793
|
|
1793
1794
|
|
1794
1795
|
if not MYPY:
|
1795
1796
|
class ProviderAuthLoginRadiusArgsDict(TypedDict):
|
1796
|
-
password: pulumi.Input[str]
|
1797
|
+
password: pulumi.Input[builtins.str]
|
1797
1798
|
"""
|
1798
1799
|
The Radius password for username.
|
1799
1800
|
"""
|
1800
|
-
username: pulumi.Input[str]
|
1801
|
+
username: pulumi.Input[builtins.str]
|
1801
1802
|
"""
|
1802
1803
|
The Radius username.
|
1803
1804
|
"""
|
1804
|
-
mount: NotRequired[pulumi.Input[str]]
|
1805
|
+
mount: NotRequired[pulumi.Input[builtins.str]]
|
1805
1806
|
"""
|
1806
1807
|
The path where the authentication engine is mounted.
|
1807
1808
|
"""
|
1808
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1809
|
+
namespace: NotRequired[pulumi.Input[builtins.str]]
|
1809
1810
|
"""
|
1810
1811
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1811
1812
|
"""
|
1812
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1813
|
+
use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
|
1813
1814
|
"""
|
1814
1815
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1815
1816
|
"""
|
@@ -1819,17 +1820,17 @@ elif False:
|
|
1819
1820
|
@pulumi.input_type
|
1820
1821
|
class ProviderAuthLoginRadiusArgs:
|
1821
1822
|
def __init__(__self__, *,
|
1822
|
-
password: pulumi.Input[str],
|
1823
|
-
username: pulumi.Input[str],
|
1824
|
-
mount: Optional[pulumi.Input[str]] = None,
|
1825
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1826
|
-
use_root_namespace: Optional[pulumi.Input[bool]] = None):
|
1827
|
-
"""
|
1828
|
-
:param pulumi.Input[str] password: The Radius password for username.
|
1829
|
-
:param pulumi.Input[str] username: The Radius username.
|
1830
|
-
:param pulumi.Input[str] mount: The path where the authentication engine is mounted.
|
1831
|
-
:param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1832
|
-
:param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1823
|
+
password: pulumi.Input[builtins.str],
|
1824
|
+
username: pulumi.Input[builtins.str],
|
1825
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
1826
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1827
|
+
use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
|
1828
|
+
"""
|
1829
|
+
:param pulumi.Input[builtins.str] password: The Radius password for username.
|
1830
|
+
:param pulumi.Input[builtins.str] username: The Radius username.
|
1831
|
+
:param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
|
1832
|
+
:param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1833
|
+
:param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1833
1834
|
"""
|
1834
1835
|
pulumi.set(__self__, "password", password)
|
1835
1836
|
pulumi.set(__self__, "username", username)
|
@@ -1842,76 +1843,76 @@ class ProviderAuthLoginRadiusArgs:
|
|
1842
1843
|
|
1843
1844
|
@property
|
1844
1845
|
@pulumi.getter
|
1845
|
-
def password(self) -> pulumi.Input[str]:
|
1846
|
+
def password(self) -> pulumi.Input[builtins.str]:
|
1846
1847
|
"""
|
1847
1848
|
The Radius password for username.
|
1848
1849
|
"""
|
1849
1850
|
return pulumi.get(self, "password")
|
1850
1851
|
|
1851
1852
|
@password.setter
|
1852
|
-
def password(self, value: pulumi.Input[str]):
|
1853
|
+
def password(self, value: pulumi.Input[builtins.str]):
|
1853
1854
|
pulumi.set(self, "password", value)
|
1854
1855
|
|
1855
1856
|
@property
|
1856
1857
|
@pulumi.getter
|
1857
|
-
def username(self) -> pulumi.Input[str]:
|
1858
|
+
def username(self) -> pulumi.Input[builtins.str]:
|
1858
1859
|
"""
|
1859
1860
|
The Radius username.
|
1860
1861
|
"""
|
1861
1862
|
return pulumi.get(self, "username")
|
1862
1863
|
|
1863
1864
|
@username.setter
|
1864
|
-
def username(self, value: pulumi.Input[str]):
|
1865
|
+
def username(self, value: pulumi.Input[builtins.str]):
|
1865
1866
|
pulumi.set(self, "username", value)
|
1866
1867
|
|
1867
1868
|
@property
|
1868
1869
|
@pulumi.getter
|
1869
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
1870
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
1870
1871
|
"""
|
1871
1872
|
The path where the authentication engine is mounted.
|
1872
1873
|
"""
|
1873
1874
|
return pulumi.get(self, "mount")
|
1874
1875
|
|
1875
1876
|
@mount.setter
|
1876
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
1877
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
1877
1878
|
pulumi.set(self, "mount", value)
|
1878
1879
|
|
1879
1880
|
@property
|
1880
1881
|
@pulumi.getter
|
1881
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
1882
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
1882
1883
|
"""
|
1883
1884
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1884
1885
|
"""
|
1885
1886
|
return pulumi.get(self, "namespace")
|
1886
1887
|
|
1887
1888
|
@namespace.setter
|
1888
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
1889
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
1889
1890
|
pulumi.set(self, "namespace", value)
|
1890
1891
|
|
1891
1892
|
@property
|
1892
1893
|
@pulumi.getter(name="useRootNamespace")
|
1893
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
|
1894
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1894
1895
|
"""
|
1895
1896
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1896
1897
|
"""
|
1897
1898
|
return pulumi.get(self, "use_root_namespace")
|
1898
1899
|
|
1899
1900
|
@use_root_namespace.setter
|
1900
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
|
1901
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1901
1902
|
pulumi.set(self, "use_root_namespace", value)
|
1902
1903
|
|
1903
1904
|
|
1904
1905
|
if not MYPY:
|
1905
1906
|
class ProviderAuthLoginTokenFileArgsDict(TypedDict):
|
1906
|
-
filename: pulumi.Input[str]
|
1907
|
+
filename: pulumi.Input[builtins.str]
|
1907
1908
|
"""
|
1908
1909
|
The name of a file containing a single line that is a valid Vault token
|
1909
1910
|
"""
|
1910
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1911
|
+
namespace: NotRequired[pulumi.Input[builtins.str]]
|
1911
1912
|
"""
|
1912
1913
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1913
1914
|
"""
|
1914
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1915
|
+
use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
|
1915
1916
|
"""
|
1916
1917
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1917
1918
|
"""
|
@@ -1921,13 +1922,13 @@ elif False:
|
|
1921
1922
|
@pulumi.input_type
|
1922
1923
|
class ProviderAuthLoginTokenFileArgs:
|
1923
1924
|
def __init__(__self__, *,
|
1924
|
-
filename: pulumi.Input[str],
|
1925
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1926
|
-
use_root_namespace: Optional[pulumi.Input[bool]] = None):
|
1925
|
+
filename: pulumi.Input[builtins.str],
|
1926
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1927
|
+
use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
|
1927
1928
|
"""
|
1928
|
-
:param pulumi.Input[str] filename: The name of a file containing a single line that is a valid Vault token
|
1929
|
-
:param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1930
|
-
:param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1929
|
+
:param pulumi.Input[builtins.str] filename: The name of a file containing a single line that is a valid Vault token
|
1930
|
+
:param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1931
|
+
:param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1931
1932
|
"""
|
1932
1933
|
pulumi.set(__self__, "filename", filename)
|
1933
1934
|
if namespace is not None:
|
@@ -1937,64 +1938,64 @@ class ProviderAuthLoginTokenFileArgs:
|
|
1937
1938
|
|
1938
1939
|
@property
|
1939
1940
|
@pulumi.getter
|
1940
|
-
def filename(self) -> pulumi.Input[str]:
|
1941
|
+
def filename(self) -> pulumi.Input[builtins.str]:
|
1941
1942
|
"""
|
1942
1943
|
The name of a file containing a single line that is a valid Vault token
|
1943
1944
|
"""
|
1944
1945
|
return pulumi.get(self, "filename")
|
1945
1946
|
|
1946
1947
|
@filename.setter
|
1947
|
-
def filename(self, value: pulumi.Input[str]):
|
1948
|
+
def filename(self, value: pulumi.Input[builtins.str]):
|
1948
1949
|
pulumi.set(self, "filename", value)
|
1949
1950
|
|
1950
1951
|
@property
|
1951
1952
|
@pulumi.getter
|
1952
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
1953
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
1953
1954
|
"""
|
1954
1955
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1955
1956
|
"""
|
1956
1957
|
return pulumi.get(self, "namespace")
|
1957
1958
|
|
1958
1959
|
@namespace.setter
|
1959
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
1960
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
1960
1961
|
pulumi.set(self, "namespace", value)
|
1961
1962
|
|
1962
1963
|
@property
|
1963
1964
|
@pulumi.getter(name="useRootNamespace")
|
1964
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
|
1965
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1965
1966
|
"""
|
1966
1967
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1967
1968
|
"""
|
1968
1969
|
return pulumi.get(self, "use_root_namespace")
|
1969
1970
|
|
1970
1971
|
@use_root_namespace.setter
|
1971
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
|
1972
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1972
1973
|
pulumi.set(self, "use_root_namespace", value)
|
1973
1974
|
|
1974
1975
|
|
1975
1976
|
if not MYPY:
|
1976
1977
|
class ProviderAuthLoginUserpassArgsDict(TypedDict):
|
1977
|
-
username: pulumi.Input[str]
|
1978
|
+
username: pulumi.Input[builtins.str]
|
1978
1979
|
"""
|
1979
1980
|
Login with username
|
1980
1981
|
"""
|
1981
|
-
mount: NotRequired[pulumi.Input[str]]
|
1982
|
+
mount: NotRequired[pulumi.Input[builtins.str]]
|
1982
1983
|
"""
|
1983
1984
|
The path where the authentication engine is mounted.
|
1984
1985
|
"""
|
1985
|
-
namespace: NotRequired[pulumi.Input[str]]
|
1986
|
+
namespace: NotRequired[pulumi.Input[builtins.str]]
|
1986
1987
|
"""
|
1987
1988
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1988
1989
|
"""
|
1989
|
-
password: NotRequired[pulumi.Input[str]]
|
1990
|
+
password: NotRequired[pulumi.Input[builtins.str]]
|
1990
1991
|
"""
|
1991
1992
|
Login with password
|
1992
1993
|
"""
|
1993
|
-
password_file: NotRequired[pulumi.Input[str]]
|
1994
|
+
password_file: NotRequired[pulumi.Input[builtins.str]]
|
1994
1995
|
"""
|
1995
1996
|
Login with password from a file
|
1996
1997
|
"""
|
1997
|
-
use_root_namespace: NotRequired[pulumi.Input[bool]]
|
1998
|
+
use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
|
1998
1999
|
"""
|
1999
2000
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
2000
2001
|
"""
|
@@ -2004,19 +2005,19 @@ elif False:
|
|
2004
2005
|
@pulumi.input_type
|
2005
2006
|
class ProviderAuthLoginUserpassArgs:
|
2006
2007
|
def __init__(__self__, *,
|
2007
|
-
username: pulumi.Input[str],
|
2008
|
-
mount: Optional[pulumi.Input[str]] = None,
|
2009
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
2010
|
-
password: Optional[pulumi.Input[str]] = None,
|
2011
|
-
password_file: Optional[pulumi.Input[str]] = None,
|
2012
|
-
use_root_namespace: Optional[pulumi.Input[bool]] = None):
|
2013
|
-
"""
|
2014
|
-
:param pulumi.Input[str] username: Login with username
|
2015
|
-
:param pulumi.Input[str] mount: The path where the authentication engine is mounted.
|
2016
|
-
:param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
2017
|
-
:param pulumi.Input[str] password: Login with password
|
2018
|
-
:param pulumi.Input[str] password_file: Login with password from a file
|
2019
|
-
:param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
2008
|
+
username: pulumi.Input[builtins.str],
|
2009
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
2010
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
2011
|
+
password: Optional[pulumi.Input[builtins.str]] = None,
|
2012
|
+
password_file: Optional[pulumi.Input[builtins.str]] = None,
|
2013
|
+
use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
|
2014
|
+
"""
|
2015
|
+
:param pulumi.Input[builtins.str] username: Login with username
|
2016
|
+
:param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
|
2017
|
+
:param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
2018
|
+
:param pulumi.Input[builtins.str] password: Login with password
|
2019
|
+
:param pulumi.Input[builtins.str] password_file: Login with password from a file
|
2020
|
+
:param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
2020
2021
|
"""
|
2021
2022
|
pulumi.set(__self__, "username", username)
|
2022
2023
|
if mount is not None:
|
@@ -2032,84 +2033,84 @@ class ProviderAuthLoginUserpassArgs:
|
|
2032
2033
|
|
2033
2034
|
@property
|
2034
2035
|
@pulumi.getter
|
2035
|
-
def username(self) -> pulumi.Input[str]:
|
2036
|
+
def username(self) -> pulumi.Input[builtins.str]:
|
2036
2037
|
"""
|
2037
2038
|
Login with username
|
2038
2039
|
"""
|
2039
2040
|
return pulumi.get(self, "username")
|
2040
2041
|
|
2041
2042
|
@username.setter
|
2042
|
-
def username(self, value: pulumi.Input[str]):
|
2043
|
+
def username(self, value: pulumi.Input[builtins.str]):
|
2043
2044
|
pulumi.set(self, "username", value)
|
2044
2045
|
|
2045
2046
|
@property
|
2046
2047
|
@pulumi.getter
|
2047
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
2048
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
2048
2049
|
"""
|
2049
2050
|
The path where the authentication engine is mounted.
|
2050
2051
|
"""
|
2051
2052
|
return pulumi.get(self, "mount")
|
2052
2053
|
|
2053
2054
|
@mount.setter
|
2054
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
2055
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
2055
2056
|
pulumi.set(self, "mount", value)
|
2056
2057
|
|
2057
2058
|
@property
|
2058
2059
|
@pulumi.getter
|
2059
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
2060
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
2060
2061
|
"""
|
2061
2062
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
2062
2063
|
"""
|
2063
2064
|
return pulumi.get(self, "namespace")
|
2064
2065
|
|
2065
2066
|
@namespace.setter
|
2066
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
2067
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
2067
2068
|
pulumi.set(self, "namespace", value)
|
2068
2069
|
|
2069
2070
|
@property
|
2070
2071
|
@pulumi.getter
|
2071
|
-
def password(self) -> Optional[pulumi.Input[str]]:
|
2072
|
+
def password(self) -> Optional[pulumi.Input[builtins.str]]:
|
2072
2073
|
"""
|
2073
2074
|
Login with password
|
2074
2075
|
"""
|
2075
2076
|
return pulumi.get(self, "password")
|
2076
2077
|
|
2077
2078
|
@password.setter
|
2078
|
-
def password(self, value: Optional[pulumi.Input[str]]):
|
2079
|
+
def password(self, value: Optional[pulumi.Input[builtins.str]]):
|
2079
2080
|
pulumi.set(self, "password", value)
|
2080
2081
|
|
2081
2082
|
@property
|
2082
2083
|
@pulumi.getter(name="passwordFile")
|
2083
|
-
def password_file(self) -> Optional[pulumi.Input[str]]:
|
2084
|
+
def password_file(self) -> Optional[pulumi.Input[builtins.str]]:
|
2084
2085
|
"""
|
2085
2086
|
Login with password from a file
|
2086
2087
|
"""
|
2087
2088
|
return pulumi.get(self, "password_file")
|
2088
2089
|
|
2089
2090
|
@password_file.setter
|
2090
|
-
def password_file(self, value: Optional[pulumi.Input[str]]):
|
2091
|
+
def password_file(self, value: Optional[pulumi.Input[builtins.str]]):
|
2091
2092
|
pulumi.set(self, "password_file", value)
|
2092
2093
|
|
2093
2094
|
@property
|
2094
2095
|
@pulumi.getter(name="useRootNamespace")
|
2095
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
|
2096
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
|
2096
2097
|
"""
|
2097
2098
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
2098
2099
|
"""
|
2099
2100
|
return pulumi.get(self, "use_root_namespace")
|
2100
2101
|
|
2101
2102
|
@use_root_namespace.setter
|
2102
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
|
2103
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
|
2103
2104
|
pulumi.set(self, "use_root_namespace", value)
|
2104
2105
|
|
2105
2106
|
|
2106
2107
|
if not MYPY:
|
2107
2108
|
class ProviderClientAuthArgsDict(TypedDict):
|
2108
|
-
cert_file: pulumi.Input[str]
|
2109
|
+
cert_file: pulumi.Input[builtins.str]
|
2109
2110
|
"""
|
2110
2111
|
Path to a file containing the client certificate.
|
2111
2112
|
"""
|
2112
|
-
key_file: pulumi.Input[str]
|
2113
|
+
key_file: pulumi.Input[builtins.str]
|
2113
2114
|
"""
|
2114
2115
|
Path to a file containing the private key that the certificate was issued for.
|
2115
2116
|
"""
|
@@ -2119,47 +2120,47 @@ elif False:
|
|
2119
2120
|
@pulumi.input_type
|
2120
2121
|
class ProviderClientAuthArgs:
|
2121
2122
|
def __init__(__self__, *,
|
2122
|
-
cert_file: pulumi.Input[str],
|
2123
|
-
key_file: pulumi.Input[str]):
|
2123
|
+
cert_file: pulumi.Input[builtins.str],
|
2124
|
+
key_file: pulumi.Input[builtins.str]):
|
2124
2125
|
"""
|
2125
|
-
:param pulumi.Input[str] cert_file: Path to a file containing the client certificate.
|
2126
|
-
:param pulumi.Input[str] key_file: Path to a file containing the private key that the certificate was issued for.
|
2126
|
+
:param pulumi.Input[builtins.str] cert_file: Path to a file containing the client certificate.
|
2127
|
+
:param pulumi.Input[builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
|
2127
2128
|
"""
|
2128
2129
|
pulumi.set(__self__, "cert_file", cert_file)
|
2129
2130
|
pulumi.set(__self__, "key_file", key_file)
|
2130
2131
|
|
2131
2132
|
@property
|
2132
2133
|
@pulumi.getter(name="certFile")
|
2133
|
-
def cert_file(self) -> pulumi.Input[str]:
|
2134
|
+
def cert_file(self) -> pulumi.Input[builtins.str]:
|
2134
2135
|
"""
|
2135
2136
|
Path to a file containing the client certificate.
|
2136
2137
|
"""
|
2137
2138
|
return pulumi.get(self, "cert_file")
|
2138
2139
|
|
2139
2140
|
@cert_file.setter
|
2140
|
-
def cert_file(self, value: pulumi.Input[str]):
|
2141
|
+
def cert_file(self, value: pulumi.Input[builtins.str]):
|
2141
2142
|
pulumi.set(self, "cert_file", value)
|
2142
2143
|
|
2143
2144
|
@property
|
2144
2145
|
@pulumi.getter(name="keyFile")
|
2145
|
-
def key_file(self) -> pulumi.Input[str]:
|
2146
|
+
def key_file(self) -> pulumi.Input[builtins.str]:
|
2146
2147
|
"""
|
2147
2148
|
Path to a file containing the private key that the certificate was issued for.
|
2148
2149
|
"""
|
2149
2150
|
return pulumi.get(self, "key_file")
|
2150
2151
|
|
2151
2152
|
@key_file.setter
|
2152
|
-
def key_file(self, value: pulumi.Input[str]):
|
2153
|
+
def key_file(self, value: pulumi.Input[builtins.str]):
|
2153
2154
|
pulumi.set(self, "key_file", value)
|
2154
2155
|
|
2155
2156
|
|
2156
2157
|
if not MYPY:
|
2157
2158
|
class ProviderHeaderArgsDict(TypedDict):
|
2158
|
-
name: pulumi.Input[str]
|
2159
|
+
name: pulumi.Input[builtins.str]
|
2159
2160
|
"""
|
2160
2161
|
The header name
|
2161
2162
|
"""
|
2162
|
-
value: pulumi.Input[str]
|
2163
|
+
value: pulumi.Input[builtins.str]
|
2163
2164
|
"""
|
2164
2165
|
The header value
|
2165
2166
|
"""
|
@@ -2169,47 +2170,47 @@ elif False:
|
|
2169
2170
|
@pulumi.input_type
|
2170
2171
|
class ProviderHeaderArgs:
|
2171
2172
|
def __init__(__self__, *,
|
2172
|
-
name: pulumi.Input[str],
|
2173
|
-
value: pulumi.Input[str]):
|
2173
|
+
name: pulumi.Input[builtins.str],
|
2174
|
+
value: pulumi.Input[builtins.str]):
|
2174
2175
|
"""
|
2175
|
-
:param pulumi.Input[str] name: The header name
|
2176
|
-
:param pulumi.Input[str] value: The header value
|
2176
|
+
:param pulumi.Input[builtins.str] name: The header name
|
2177
|
+
:param pulumi.Input[builtins.str] value: The header value
|
2177
2178
|
"""
|
2178
2179
|
pulumi.set(__self__, "name", name)
|
2179
2180
|
pulumi.set(__self__, "value", value)
|
2180
2181
|
|
2181
2182
|
@property
|
2182
2183
|
@pulumi.getter
|
2183
|
-
def name(self) -> pulumi.Input[str]:
|
2184
|
+
def name(self) -> pulumi.Input[builtins.str]:
|
2184
2185
|
"""
|
2185
2186
|
The header name
|
2186
2187
|
"""
|
2187
2188
|
return pulumi.get(self, "name")
|
2188
2189
|
|
2189
2190
|
@name.setter
|
2190
|
-
def name(self, value: pulumi.Input[str]):
|
2191
|
+
def name(self, value: pulumi.Input[builtins.str]):
|
2191
2192
|
pulumi.set(self, "name", value)
|
2192
2193
|
|
2193
2194
|
@property
|
2194
2195
|
@pulumi.getter
|
2195
|
-
def value(self) -> pulumi.Input[str]:
|
2196
|
+
def value(self) -> pulumi.Input[builtins.str]:
|
2196
2197
|
"""
|
2197
2198
|
The header value
|
2198
2199
|
"""
|
2199
2200
|
return pulumi.get(self, "value")
|
2200
2201
|
|
2201
2202
|
@value.setter
|
2202
|
-
def value(self, value: pulumi.Input[str]):
|
2203
|
+
def value(self, value: pulumi.Input[builtins.str]):
|
2203
2204
|
pulumi.set(self, "value", value)
|
2204
2205
|
|
2205
2206
|
|
2206
2207
|
if not MYPY:
|
2207
2208
|
class GetPolicyDocumentRuleArgsDict(TypedDict):
|
2208
|
-
capabilities: Sequence[str]
|
2209
|
+
capabilities: Sequence[builtins.str]
|
2209
2210
|
"""
|
2210
2211
|
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
2211
2212
|
"""
|
2212
|
-
path: str
|
2213
|
+
path: builtins.str
|
2213
2214
|
"""
|
2214
2215
|
A path in Vault that this rule applies to.
|
2215
2216
|
"""
|
@@ -2221,45 +2222,51 @@ if not MYPY:
|
|
2221
2222
|
"""
|
2222
2223
|
Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
2223
2224
|
"""
|
2224
|
-
description: NotRequired[str]
|
2225
|
+
description: NotRequired[builtins.str]
|
2225
2226
|
"""
|
2226
2227
|
Description of the rule. Will be added as a comment to rendered rule.
|
2227
2228
|
"""
|
2228
|
-
max_wrapping_ttl: NotRequired[str]
|
2229
|
+
max_wrapping_ttl: NotRequired[builtins.str]
|
2229
2230
|
"""
|
2230
2231
|
The maximum allowed TTL that clients can specify for a wrapped response.
|
2231
2232
|
"""
|
2232
|
-
min_wrapping_ttl: NotRequired[str]
|
2233
|
+
min_wrapping_ttl: NotRequired[builtins.str]
|
2233
2234
|
"""
|
2234
2235
|
The minimum allowed TTL that clients can specify for a wrapped response.
|
2235
2236
|
"""
|
2236
|
-
required_parameters: NotRequired[Sequence[str]]
|
2237
|
+
required_parameters: NotRequired[Sequence[builtins.str]]
|
2237
2238
|
"""
|
2238
2239
|
A list of parameters that must be specified.
|
2239
2240
|
"""
|
2241
|
+
subscribe_event_types: NotRequired[Sequence[builtins.str]]
|
2242
|
+
"""
|
2243
|
+
A list of event types to subscribe to when using `subscribe` capability.
|
2244
|
+
"""
|
2240
2245
|
elif False:
|
2241
2246
|
GetPolicyDocumentRuleArgsDict: TypeAlias = Mapping[str, Any]
|
2242
2247
|
|
2243
2248
|
@pulumi.input_type
|
2244
2249
|
class GetPolicyDocumentRuleArgs:
|
2245
2250
|
def __init__(__self__, *,
|
2246
|
-
capabilities: Sequence[str],
|
2247
|
-
path: str,
|
2251
|
+
capabilities: Sequence[builtins.str],
|
2252
|
+
path: builtins.str,
|
2248
2253
|
allowed_parameters: Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']] = None,
|
2249
2254
|
denied_parameters: Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']] = None,
|
2250
|
-
description: Optional[str] = None,
|
2251
|
-
max_wrapping_ttl: Optional[str] = None,
|
2252
|
-
min_wrapping_ttl: Optional[str] = None,
|
2253
|
-
required_parameters: Optional[Sequence[str]] = None
|
2254
|
-
|
2255
|
-
|
2256
|
-
:param str
|
2255
|
+
description: Optional[builtins.str] = None,
|
2256
|
+
max_wrapping_ttl: Optional[builtins.str] = None,
|
2257
|
+
min_wrapping_ttl: Optional[builtins.str] = None,
|
2258
|
+
required_parameters: Optional[Sequence[builtins.str]] = None,
|
2259
|
+
subscribe_event_types: Optional[Sequence[builtins.str]] = None):
|
2260
|
+
"""
|
2261
|
+
:param Sequence[builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
2262
|
+
:param builtins.str path: A path in Vault that this rule applies to.
|
2257
2263
|
:param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
2258
2264
|
:param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
2259
|
-
:param str description: Description of the rule. Will be added as a comment to rendered rule.
|
2260
|
-
:param str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
2261
|
-
:param str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
2262
|
-
:param Sequence[str] required_parameters: A list of parameters that must be specified.
|
2265
|
+
:param builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
|
2266
|
+
:param builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
2267
|
+
:param builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
2268
|
+
:param Sequence[builtins.str] required_parameters: A list of parameters that must be specified.
|
2269
|
+
:param Sequence[builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
|
2263
2270
|
"""
|
2264
2271
|
pulumi.set(__self__, "capabilities", capabilities)
|
2265
2272
|
pulumi.set(__self__, "path", path)
|
@@ -2275,29 +2282,31 @@ class GetPolicyDocumentRuleArgs:
|
|
2275
2282
|
pulumi.set(__self__, "min_wrapping_ttl", min_wrapping_ttl)
|
2276
2283
|
if required_parameters is not None:
|
2277
2284
|
pulumi.set(__self__, "required_parameters", required_parameters)
|
2285
|
+
if subscribe_event_types is not None:
|
2286
|
+
pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
|
2278
2287
|
|
2279
2288
|
@property
|
2280
2289
|
@pulumi.getter
|
2281
|
-
def capabilities(self) -> Sequence[str]:
|
2290
|
+
def capabilities(self) -> Sequence[builtins.str]:
|
2282
2291
|
"""
|
2283
2292
|
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
2284
2293
|
"""
|
2285
2294
|
return pulumi.get(self, "capabilities")
|
2286
2295
|
|
2287
2296
|
@capabilities.setter
|
2288
|
-
def capabilities(self, value: Sequence[str]):
|
2297
|
+
def capabilities(self, value: Sequence[builtins.str]):
|
2289
2298
|
pulumi.set(self, "capabilities", value)
|
2290
2299
|
|
2291
2300
|
@property
|
2292
2301
|
@pulumi.getter
|
2293
|
-
def path(self) -> str:
|
2302
|
+
def path(self) -> builtins.str:
|
2294
2303
|
"""
|
2295
2304
|
A path in Vault that this rule applies to.
|
2296
2305
|
"""
|
2297
2306
|
return pulumi.get(self, "path")
|
2298
2307
|
|
2299
2308
|
@path.setter
|
2300
|
-
def path(self, value: str):
|
2309
|
+
def path(self, value: builtins.str):
|
2301
2310
|
pulumi.set(self, "path", value)
|
2302
2311
|
|
2303
2312
|
@property
|
@@ -2326,62 +2335,74 @@ class GetPolicyDocumentRuleArgs:
|
|
2326
2335
|
|
2327
2336
|
@property
|
2328
2337
|
@pulumi.getter
|
2329
|
-
def description(self) -> Optional[str]:
|
2338
|
+
def description(self) -> Optional[builtins.str]:
|
2330
2339
|
"""
|
2331
2340
|
Description of the rule. Will be added as a comment to rendered rule.
|
2332
2341
|
"""
|
2333
2342
|
return pulumi.get(self, "description")
|
2334
2343
|
|
2335
2344
|
@description.setter
|
2336
|
-
def description(self, value: Optional[str]):
|
2345
|
+
def description(self, value: Optional[builtins.str]):
|
2337
2346
|
pulumi.set(self, "description", value)
|
2338
2347
|
|
2339
2348
|
@property
|
2340
2349
|
@pulumi.getter(name="maxWrappingTtl")
|
2341
|
-
def max_wrapping_ttl(self) -> Optional[str]:
|
2350
|
+
def max_wrapping_ttl(self) -> Optional[builtins.str]:
|
2342
2351
|
"""
|
2343
2352
|
The maximum allowed TTL that clients can specify for a wrapped response.
|
2344
2353
|
"""
|
2345
2354
|
return pulumi.get(self, "max_wrapping_ttl")
|
2346
2355
|
|
2347
2356
|
@max_wrapping_ttl.setter
|
2348
|
-
def max_wrapping_ttl(self, value: Optional[str]):
|
2357
|
+
def max_wrapping_ttl(self, value: Optional[builtins.str]):
|
2349
2358
|
pulumi.set(self, "max_wrapping_ttl", value)
|
2350
2359
|
|
2351
2360
|
@property
|
2352
2361
|
@pulumi.getter(name="minWrappingTtl")
|
2353
|
-
def min_wrapping_ttl(self) -> Optional[str]:
|
2362
|
+
def min_wrapping_ttl(self) -> Optional[builtins.str]:
|
2354
2363
|
"""
|
2355
2364
|
The minimum allowed TTL that clients can specify for a wrapped response.
|
2356
2365
|
"""
|
2357
2366
|
return pulumi.get(self, "min_wrapping_ttl")
|
2358
2367
|
|
2359
2368
|
@min_wrapping_ttl.setter
|
2360
|
-
def min_wrapping_ttl(self, value: Optional[str]):
|
2369
|
+
def min_wrapping_ttl(self, value: Optional[builtins.str]):
|
2361
2370
|
pulumi.set(self, "min_wrapping_ttl", value)
|
2362
2371
|
|
2363
2372
|
@property
|
2364
2373
|
@pulumi.getter(name="requiredParameters")
|
2365
|
-
def required_parameters(self) -> Optional[Sequence[str]]:
|
2374
|
+
def required_parameters(self) -> Optional[Sequence[builtins.str]]:
|
2366
2375
|
"""
|
2367
2376
|
A list of parameters that must be specified.
|
2368
2377
|
"""
|
2369
2378
|
return pulumi.get(self, "required_parameters")
|
2370
2379
|
|
2371
2380
|
@required_parameters.setter
|
2372
|
-
def required_parameters(self, value: Optional[Sequence[str]]):
|
2381
|
+
def required_parameters(self, value: Optional[Sequence[builtins.str]]):
|
2373
2382
|
pulumi.set(self, "required_parameters", value)
|
2374
2383
|
|
2384
|
+
@property
|
2385
|
+
@pulumi.getter(name="subscribeEventTypes")
|
2386
|
+
def subscribe_event_types(self) -> Optional[Sequence[builtins.str]]:
|
2387
|
+
"""
|
2388
|
+
A list of event types to subscribe to when using `subscribe` capability.
|
2389
|
+
"""
|
2390
|
+
return pulumi.get(self, "subscribe_event_types")
|
2391
|
+
|
2392
|
+
@subscribe_event_types.setter
|
2393
|
+
def subscribe_event_types(self, value: Optional[Sequence[builtins.str]]):
|
2394
|
+
pulumi.set(self, "subscribe_event_types", value)
|
2395
|
+
|
2375
2396
|
|
2376
2397
|
if not MYPY:
|
2377
2398
|
class GetPolicyDocumentRuleAllowedParameterArgsDict(TypedDict):
|
2378
|
-
key: str
|
2399
|
+
key: builtins.str
|
2379
2400
|
"""
|
2380
|
-
|
2401
|
+
Name of permitted key.
|
2381
2402
|
"""
|
2382
|
-
values: Sequence[str]
|
2403
|
+
values: Sequence[builtins.str]
|
2383
2404
|
"""
|
2384
|
-
list of values what are permitted
|
2405
|
+
A list of values what are permitted by policy rule.
|
2385
2406
|
"""
|
2386
2407
|
elif False:
|
2387
2408
|
GetPolicyDocumentRuleAllowedParameterArgsDict: TypeAlias = Mapping[str, Any]
|
@@ -2389,49 +2410,49 @@ elif False:
|
|
2389
2410
|
@pulumi.input_type
|
2390
2411
|
class GetPolicyDocumentRuleAllowedParameterArgs:
|
2391
2412
|
def __init__(__self__, *,
|
2392
|
-
key: str,
|
2393
|
-
values: Sequence[str]):
|
2413
|
+
key: builtins.str,
|
2414
|
+
values: Sequence[builtins.str]):
|
2394
2415
|
"""
|
2395
|
-
:param str key:
|
2396
|
-
:param Sequence[str] values: list of values what are permitted
|
2416
|
+
:param builtins.str key: Name of permitted key.
|
2417
|
+
:param Sequence[builtins.str] values: A list of values what are permitted by policy rule.
|
2397
2418
|
"""
|
2398
2419
|
pulumi.set(__self__, "key", key)
|
2399
2420
|
pulumi.set(__self__, "values", values)
|
2400
2421
|
|
2401
2422
|
@property
|
2402
2423
|
@pulumi.getter
|
2403
|
-
def key(self) -> str:
|
2424
|
+
def key(self) -> builtins.str:
|
2404
2425
|
"""
|
2405
|
-
|
2426
|
+
Name of permitted key.
|
2406
2427
|
"""
|
2407
2428
|
return pulumi.get(self, "key")
|
2408
2429
|
|
2409
2430
|
@key.setter
|
2410
|
-
def key(self, value: str):
|
2431
|
+
def key(self, value: builtins.str):
|
2411
2432
|
pulumi.set(self, "key", value)
|
2412
2433
|
|
2413
2434
|
@property
|
2414
2435
|
@pulumi.getter
|
2415
|
-
def values(self) -> Sequence[str]:
|
2436
|
+
def values(self) -> Sequence[builtins.str]:
|
2416
2437
|
"""
|
2417
|
-
list of values what are permitted
|
2438
|
+
A list of values what are permitted by policy rule.
|
2418
2439
|
"""
|
2419
2440
|
return pulumi.get(self, "values")
|
2420
2441
|
|
2421
2442
|
@values.setter
|
2422
|
-
def values(self, value: Sequence[str]):
|
2443
|
+
def values(self, value: Sequence[builtins.str]):
|
2423
2444
|
pulumi.set(self, "values", value)
|
2424
2445
|
|
2425
2446
|
|
2426
2447
|
if not MYPY:
|
2427
2448
|
class GetPolicyDocumentRuleDeniedParameterArgsDict(TypedDict):
|
2428
|
-
key: str
|
2449
|
+
key: builtins.str
|
2429
2450
|
"""
|
2430
|
-
|
2451
|
+
Name of denied key.
|
2431
2452
|
"""
|
2432
|
-
values: Sequence[str]
|
2453
|
+
values: Sequence[builtins.str]
|
2433
2454
|
"""
|
2434
|
-
list of values what are
|
2455
|
+
A list of values what are denied by policy rule.
|
2435
2456
|
"""
|
2436
2457
|
elif False:
|
2437
2458
|
GetPolicyDocumentRuleDeniedParameterArgsDict: TypeAlias = Mapping[str, Any]
|
@@ -2439,37 +2460,37 @@ elif False:
|
|
2439
2460
|
@pulumi.input_type
|
2440
2461
|
class GetPolicyDocumentRuleDeniedParameterArgs:
|
2441
2462
|
def __init__(__self__, *,
|
2442
|
-
key: str,
|
2443
|
-
values: Sequence[str]):
|
2463
|
+
key: builtins.str,
|
2464
|
+
values: Sequence[builtins.str]):
|
2444
2465
|
"""
|
2445
|
-
:param str key:
|
2446
|
-
:param Sequence[str] values: list of values what are
|
2466
|
+
:param builtins.str key: Name of denied key.
|
2467
|
+
:param Sequence[builtins.str] values: A list of values what are denied by policy rule.
|
2447
2468
|
"""
|
2448
2469
|
pulumi.set(__self__, "key", key)
|
2449
2470
|
pulumi.set(__self__, "values", values)
|
2450
2471
|
|
2451
2472
|
@property
|
2452
2473
|
@pulumi.getter
|
2453
|
-
def key(self) -> str:
|
2474
|
+
def key(self) -> builtins.str:
|
2454
2475
|
"""
|
2455
|
-
|
2476
|
+
Name of denied key.
|
2456
2477
|
"""
|
2457
2478
|
return pulumi.get(self, "key")
|
2458
2479
|
|
2459
2480
|
@key.setter
|
2460
|
-
def key(self, value: str):
|
2481
|
+
def key(self, value: builtins.str):
|
2461
2482
|
pulumi.set(self, "key", value)
|
2462
2483
|
|
2463
2484
|
@property
|
2464
2485
|
@pulumi.getter
|
2465
|
-
def values(self) -> Sequence[str]:
|
2486
|
+
def values(self) -> Sequence[builtins.str]:
|
2466
2487
|
"""
|
2467
|
-
list of values what are
|
2488
|
+
A list of values what are denied by policy rule.
|
2468
2489
|
"""
|
2469
2490
|
return pulumi.get(self, "values")
|
2470
2491
|
|
2471
2492
|
@values.setter
|
2472
|
-
def values(self, value: Sequence[str]):
|
2493
|
+
def values(self, value: Sequence[builtins.str]):
|
2473
2494
|
pulumi.set(self, "values", value)
|
2474
2495
|
|
2475
2496
|
|