pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
pulumi_vault/provider.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -20,9 +21,9 @@ __all__ = ['ProviderArgs', 'Provider']
|
|
20
21
|
@pulumi.input_type
|
21
22
|
class ProviderArgs:
|
22
23
|
def __init__(__self__, *,
|
23
|
-
address: pulumi.Input[str],
|
24
|
-
token: pulumi.Input[str],
|
25
|
-
add_address_to_env: Optional[pulumi.Input[str]] = None,
|
24
|
+
address: pulumi.Input[builtins.str],
|
25
|
+
token: pulumi.Input[builtins.str],
|
26
|
+
add_address_to_env: Optional[pulumi.Input[builtins.str]] = None,
|
26
27
|
auth_login: Optional[pulumi.Input['ProviderAuthLoginArgs']] = None,
|
27
28
|
auth_login_aws: Optional[pulumi.Input['ProviderAuthLoginAwsArgs']] = None,
|
28
29
|
auth_login_azure: Optional[pulumi.Input['ProviderAuthLoginAzureArgs']] = None,
|
@@ -35,25 +36,25 @@ class ProviderArgs:
|
|
35
36
|
auth_login_radius: Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']] = None,
|
36
37
|
auth_login_token_file: Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']] = None,
|
37
38
|
auth_login_userpass: Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']] = None,
|
38
|
-
ca_cert_dir: Optional[pulumi.Input[str]] = None,
|
39
|
-
ca_cert_file: Optional[pulumi.Input[str]] = None,
|
39
|
+
ca_cert_dir: Optional[pulumi.Input[builtins.str]] = None,
|
40
|
+
ca_cert_file: Optional[pulumi.Input[builtins.str]] = None,
|
40
41
|
client_auth: Optional[pulumi.Input['ProviderClientAuthArgs']] = None,
|
41
42
|
headers: Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]] = None,
|
42
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
43
|
-
max_retries: Optional[pulumi.Input[int]] = None,
|
44
|
-
max_retries_ccc: Optional[pulumi.Input[int]] = None,
|
45
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
46
|
-
set_namespace_from_token: Optional[pulumi.Input[bool]] = None,
|
47
|
-
skip_child_token: Optional[pulumi.Input[bool]] = None,
|
48
|
-
skip_get_vault_version: Optional[pulumi.Input[bool]] = None,
|
49
|
-
skip_tls_verify: Optional[pulumi.Input[bool]] = None,
|
50
|
-
tls_server_name: Optional[pulumi.Input[str]] = None,
|
51
|
-
token_name: Optional[pulumi.Input[str]] = None,
|
52
|
-
vault_version_override: Optional[pulumi.Input[str]] = None):
|
43
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
44
|
+
max_retries: Optional[pulumi.Input[builtins.int]] = None,
|
45
|
+
max_retries_ccc: Optional[pulumi.Input[builtins.int]] = None,
|
46
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
47
|
+
set_namespace_from_token: Optional[pulumi.Input[builtins.bool]] = None,
|
48
|
+
skip_child_token: Optional[pulumi.Input[builtins.bool]] = None,
|
49
|
+
skip_get_vault_version: Optional[pulumi.Input[builtins.bool]] = None,
|
50
|
+
skip_tls_verify: Optional[pulumi.Input[builtins.bool]] = None,
|
51
|
+
tls_server_name: Optional[pulumi.Input[builtins.str]] = None,
|
52
|
+
token_name: Optional[pulumi.Input[builtins.str]] = None,
|
53
|
+
vault_version_override: Optional[pulumi.Input[builtins.str]] = None):
|
53
54
|
"""
|
54
55
|
The set of arguments for constructing a Provider resource.
|
55
|
-
:param pulumi.Input[str] address: URL of the root of the target Vault server.
|
56
|
-
:param pulumi.Input[str] token: Token to use to authenticate to Vault.
|
56
|
+
:param pulumi.Input[builtins.str] address: URL of the root of the target Vault server.
|
57
|
+
:param pulumi.Input[builtins.str] token: Token to use to authenticate to Vault.
|
57
58
|
:param pulumi.Input['ProviderAuthLoginArgs'] auth_login: Login to vault with an existing auth method using auth/<mount>/login
|
58
59
|
:param pulumi.Input['ProviderAuthLoginAwsArgs'] auth_login_aws: Login to vault using the AWS method
|
59
60
|
:param pulumi.Input['ProviderAuthLoginAzureArgs'] auth_login_azure: Login to vault using the azure method
|
@@ -66,22 +67,22 @@ class ProviderArgs:
|
|
66
67
|
:param pulumi.Input['ProviderAuthLoginRadiusArgs'] auth_login_radius: Login to vault using the radius method
|
67
68
|
:param pulumi.Input['ProviderAuthLoginTokenFileArgs'] auth_login_token_file: Login to vault using
|
68
69
|
:param pulumi.Input['ProviderAuthLoginUserpassArgs'] auth_login_userpass: Login to vault using the userpass method
|
69
|
-
:param pulumi.Input[str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
|
70
|
-
:param pulumi.Input[str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
|
70
|
+
:param pulumi.Input[builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
|
71
|
+
:param pulumi.Input[builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
|
71
72
|
:param pulumi.Input['ProviderClientAuthArgs'] client_auth: Client authentication credentials.
|
72
73
|
:param pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]] headers: The headers to send with each Vault request.
|
73
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
|
74
|
-
:param pulumi.Input[int] max_retries: Maximum number of retries when a 5xx error code is encountered.
|
75
|
-
:param pulumi.Input[int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
|
76
|
-
:param pulumi.Input[str] namespace: The namespace to use. Available only for Vault Enterprise.
|
77
|
-
:param pulumi.Input[bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
74
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
|
75
|
+
:param pulumi.Input[builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
|
76
|
+
:param pulumi.Input[builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
|
77
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
|
78
|
+
:param pulumi.Input[builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
78
79
|
token namespace as the root namespace for all resources.
|
79
|
-
:param pulumi.Input[bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
|
80
|
-
:param pulumi.Input[bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
|
81
|
-
:param pulumi.Input[bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
|
82
|
-
:param pulumi.Input[str] tls_server_name: Name to use as the SNI host when connecting via TLS.
|
83
|
-
:param pulumi.Input[str] token_name: Token name to use for creating the Vault child token.
|
84
|
-
:param pulumi.Input[str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
|
80
|
+
:param pulumi.Input[builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
|
81
|
+
:param pulumi.Input[builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
|
82
|
+
:param pulumi.Input[builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
|
83
|
+
:param pulumi.Input[builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
|
84
|
+
:param pulumi.Input[builtins.str] token_name: Token name to use for creating the Vault child token.
|
85
|
+
:param pulumi.Input[builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
|
85
86
|
"""
|
86
87
|
pulumi.set(__self__, "address", address)
|
87
88
|
pulumi.set(__self__, "token", token)
|
@@ -153,35 +154,35 @@ class ProviderArgs:
|
|
153
154
|
|
154
155
|
@property
|
155
156
|
@pulumi.getter
|
156
|
-
def address(self) -> pulumi.Input[str]:
|
157
|
+
def address(self) -> pulumi.Input[builtins.str]:
|
157
158
|
"""
|
158
159
|
URL of the root of the target Vault server.
|
159
160
|
"""
|
160
161
|
return pulumi.get(self, "address")
|
161
162
|
|
162
163
|
@address.setter
|
163
|
-
def address(self, value: pulumi.Input[str]):
|
164
|
+
def address(self, value: pulumi.Input[builtins.str]):
|
164
165
|
pulumi.set(self, "address", value)
|
165
166
|
|
166
167
|
@property
|
167
168
|
@pulumi.getter
|
168
|
-
def token(self) -> pulumi.Input[str]:
|
169
|
+
def token(self) -> pulumi.Input[builtins.str]:
|
169
170
|
"""
|
170
171
|
Token to use to authenticate to Vault.
|
171
172
|
"""
|
172
173
|
return pulumi.get(self, "token")
|
173
174
|
|
174
175
|
@token.setter
|
175
|
-
def token(self, value: pulumi.Input[str]):
|
176
|
+
def token(self, value: pulumi.Input[builtins.str]):
|
176
177
|
pulumi.set(self, "token", value)
|
177
178
|
|
178
179
|
@property
|
179
180
|
@pulumi.getter(name="addAddressToEnv")
|
180
|
-
def add_address_to_env(self) -> Optional[pulumi.Input[str]]:
|
181
|
+
def add_address_to_env(self) -> Optional[pulumi.Input[builtins.str]]:
|
181
182
|
return pulumi.get(self, "add_address_to_env")
|
182
183
|
|
183
184
|
@add_address_to_env.setter
|
184
|
-
def add_address_to_env(self, value: Optional[pulumi.Input[str]]):
|
185
|
+
def add_address_to_env(self, value: Optional[pulumi.Input[builtins.str]]):
|
185
186
|
pulumi.set(self, "add_address_to_env", value)
|
186
187
|
|
187
188
|
@property
|
@@ -330,26 +331,26 @@ class ProviderArgs:
|
|
330
331
|
|
331
332
|
@property
|
332
333
|
@pulumi.getter(name="caCertDir")
|
333
|
-
def ca_cert_dir(self) -> Optional[pulumi.Input[str]]:
|
334
|
+
def ca_cert_dir(self) -> Optional[pulumi.Input[builtins.str]]:
|
334
335
|
"""
|
335
336
|
Path to directory containing CA certificate files to validate the server's certificate.
|
336
337
|
"""
|
337
338
|
return pulumi.get(self, "ca_cert_dir")
|
338
339
|
|
339
340
|
@ca_cert_dir.setter
|
340
|
-
def ca_cert_dir(self, value: Optional[pulumi.Input[str]]):
|
341
|
+
def ca_cert_dir(self, value: Optional[pulumi.Input[builtins.str]]):
|
341
342
|
pulumi.set(self, "ca_cert_dir", value)
|
342
343
|
|
343
344
|
@property
|
344
345
|
@pulumi.getter(name="caCertFile")
|
345
|
-
def ca_cert_file(self) -> Optional[pulumi.Input[str]]:
|
346
|
+
def ca_cert_file(self) -> Optional[pulumi.Input[builtins.str]]:
|
346
347
|
"""
|
347
348
|
Path to a CA certificate file to validate the server's certificate.
|
348
349
|
"""
|
349
350
|
return pulumi.get(self, "ca_cert_file")
|
350
351
|
|
351
352
|
@ca_cert_file.setter
|
352
|
-
def ca_cert_file(self, value: Optional[pulumi.Input[str]]):
|
353
|
+
def ca_cert_file(self, value: Optional[pulumi.Input[builtins.str]]):
|
353
354
|
pulumi.set(self, "ca_cert_file", value)
|
354
355
|
|
355
356
|
@property
|
@@ -379,55 +380,55 @@ class ProviderArgs:
|
|
379
380
|
|
380
381
|
@property
|
381
382
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
382
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
|
383
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
|
383
384
|
"""
|
384
385
|
Maximum TTL for secret leases requested by this provider.
|
385
386
|
"""
|
386
387
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
387
388
|
|
388
389
|
@max_lease_ttl_seconds.setter
|
389
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
390
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
|
390
391
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
391
392
|
|
392
393
|
@property
|
393
394
|
@pulumi.getter(name="maxRetries")
|
394
|
-
def max_retries(self) -> Optional[pulumi.Input[int]]:
|
395
|
+
def max_retries(self) -> Optional[pulumi.Input[builtins.int]]:
|
395
396
|
"""
|
396
397
|
Maximum number of retries when a 5xx error code is encountered.
|
397
398
|
"""
|
398
399
|
return pulumi.get(self, "max_retries")
|
399
400
|
|
400
401
|
@max_retries.setter
|
401
|
-
def max_retries(self, value: Optional[pulumi.Input[int]]):
|
402
|
+
def max_retries(self, value: Optional[pulumi.Input[builtins.int]]):
|
402
403
|
pulumi.set(self, "max_retries", value)
|
403
404
|
|
404
405
|
@property
|
405
406
|
@pulumi.getter(name="maxRetriesCcc")
|
406
|
-
def max_retries_ccc(self) -> Optional[pulumi.Input[int]]:
|
407
|
+
def max_retries_ccc(self) -> Optional[pulumi.Input[builtins.int]]:
|
407
408
|
"""
|
408
409
|
Maximum number of retries for Client Controlled Consistency related operations
|
409
410
|
"""
|
410
411
|
return pulumi.get(self, "max_retries_ccc")
|
411
412
|
|
412
413
|
@max_retries_ccc.setter
|
413
|
-
def max_retries_ccc(self, value: Optional[pulumi.Input[int]]):
|
414
|
+
def max_retries_ccc(self, value: Optional[pulumi.Input[builtins.int]]):
|
414
415
|
pulumi.set(self, "max_retries_ccc", value)
|
415
416
|
|
416
417
|
@property
|
417
418
|
@pulumi.getter
|
418
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
419
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
419
420
|
"""
|
420
421
|
The namespace to use. Available only for Vault Enterprise.
|
421
422
|
"""
|
422
423
|
return pulumi.get(self, "namespace")
|
423
424
|
|
424
425
|
@namespace.setter
|
425
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
426
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
426
427
|
pulumi.set(self, "namespace", value)
|
427
428
|
|
428
429
|
@property
|
429
430
|
@pulumi.getter(name="setNamespaceFromToken")
|
430
|
-
def set_namespace_from_token(self) -> Optional[pulumi.Input[bool]]:
|
431
|
+
def set_namespace_from_token(self) -> Optional[pulumi.Input[builtins.bool]]:
|
431
432
|
"""
|
432
433
|
In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
433
434
|
token namespace as the root namespace for all resources.
|
@@ -435,79 +436,79 @@ class ProviderArgs:
|
|
435
436
|
return pulumi.get(self, "set_namespace_from_token")
|
436
437
|
|
437
438
|
@set_namespace_from_token.setter
|
438
|
-
def set_namespace_from_token(self, value: Optional[pulumi.Input[bool]]):
|
439
|
+
def set_namespace_from_token(self, value: Optional[pulumi.Input[builtins.bool]]):
|
439
440
|
pulumi.set(self, "set_namespace_from_token", value)
|
440
441
|
|
441
442
|
@property
|
442
443
|
@pulumi.getter(name="skipChildToken")
|
443
|
-
def skip_child_token(self) -> Optional[pulumi.Input[bool]]:
|
444
|
+
def skip_child_token(self) -> Optional[pulumi.Input[builtins.bool]]:
|
444
445
|
"""
|
445
446
|
Set this to true to prevent the creation of ephemeral child token used by this provider.
|
446
447
|
"""
|
447
448
|
return pulumi.get(self, "skip_child_token")
|
448
449
|
|
449
450
|
@skip_child_token.setter
|
450
|
-
def skip_child_token(self, value: Optional[pulumi.Input[bool]]):
|
451
|
+
def skip_child_token(self, value: Optional[pulumi.Input[builtins.bool]]):
|
451
452
|
pulumi.set(self, "skip_child_token", value)
|
452
453
|
|
453
454
|
@property
|
454
455
|
@pulumi.getter(name="skipGetVaultVersion")
|
455
|
-
def skip_get_vault_version(self) -> Optional[pulumi.Input[bool]]:
|
456
|
+
def skip_get_vault_version(self) -> Optional[pulumi.Input[builtins.bool]]:
|
456
457
|
"""
|
457
458
|
Skip the dynamic fetching of the Vault server version.
|
458
459
|
"""
|
459
460
|
return pulumi.get(self, "skip_get_vault_version")
|
460
461
|
|
461
462
|
@skip_get_vault_version.setter
|
462
|
-
def skip_get_vault_version(self, value: Optional[pulumi.Input[bool]]):
|
463
|
+
def skip_get_vault_version(self, value: Optional[pulumi.Input[builtins.bool]]):
|
463
464
|
pulumi.set(self, "skip_get_vault_version", value)
|
464
465
|
|
465
466
|
@property
|
466
467
|
@pulumi.getter(name="skipTlsVerify")
|
467
|
-
def skip_tls_verify(self) -> Optional[pulumi.Input[bool]]:
|
468
|
+
def skip_tls_verify(self) -> Optional[pulumi.Input[builtins.bool]]:
|
468
469
|
"""
|
469
470
|
Set this to true only if the target Vault server is an insecure development instance.
|
470
471
|
"""
|
471
472
|
return pulumi.get(self, "skip_tls_verify")
|
472
473
|
|
473
474
|
@skip_tls_verify.setter
|
474
|
-
def skip_tls_verify(self, value: Optional[pulumi.Input[bool]]):
|
475
|
+
def skip_tls_verify(self, value: Optional[pulumi.Input[builtins.bool]]):
|
475
476
|
pulumi.set(self, "skip_tls_verify", value)
|
476
477
|
|
477
478
|
@property
|
478
479
|
@pulumi.getter(name="tlsServerName")
|
479
|
-
def tls_server_name(self) -> Optional[pulumi.Input[str]]:
|
480
|
+
def tls_server_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
480
481
|
"""
|
481
482
|
Name to use as the SNI host when connecting via TLS.
|
482
483
|
"""
|
483
484
|
return pulumi.get(self, "tls_server_name")
|
484
485
|
|
485
486
|
@tls_server_name.setter
|
486
|
-
def tls_server_name(self, value: Optional[pulumi.Input[str]]):
|
487
|
+
def tls_server_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
487
488
|
pulumi.set(self, "tls_server_name", value)
|
488
489
|
|
489
490
|
@property
|
490
491
|
@pulumi.getter(name="tokenName")
|
491
|
-
def token_name(self) -> Optional[pulumi.Input[str]]:
|
492
|
+
def token_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
492
493
|
"""
|
493
494
|
Token name to use for creating the Vault child token.
|
494
495
|
"""
|
495
496
|
return pulumi.get(self, "token_name")
|
496
497
|
|
497
498
|
@token_name.setter
|
498
|
-
def token_name(self, value: Optional[pulumi.Input[str]]):
|
499
|
+
def token_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
499
500
|
pulumi.set(self, "token_name", value)
|
500
501
|
|
501
502
|
@property
|
502
503
|
@pulumi.getter(name="vaultVersionOverride")
|
503
|
-
def vault_version_override(self) -> Optional[pulumi.Input[str]]:
|
504
|
+
def vault_version_override(self) -> Optional[pulumi.Input[builtins.str]]:
|
504
505
|
"""
|
505
506
|
Override the Vault server version, which is normally determined dynamically from the target Vault server
|
506
507
|
"""
|
507
508
|
return pulumi.get(self, "vault_version_override")
|
508
509
|
|
509
510
|
@vault_version_override.setter
|
510
|
-
def vault_version_override(self, value: Optional[pulumi.Input[str]]):
|
511
|
+
def vault_version_override(self, value: Optional[pulumi.Input[builtins.str]]):
|
511
512
|
pulumi.set(self, "vault_version_override", value)
|
512
513
|
|
513
514
|
|
@@ -516,8 +517,8 @@ class Provider(pulumi.ProviderResource):
|
|
516
517
|
def __init__(__self__,
|
517
518
|
resource_name: str,
|
518
519
|
opts: Optional[pulumi.ResourceOptions] = None,
|
519
|
-
add_address_to_env: Optional[pulumi.Input[str]] = None,
|
520
|
-
address: Optional[pulumi.Input[str]] = None,
|
520
|
+
add_address_to_env: Optional[pulumi.Input[builtins.str]] = None,
|
521
|
+
address: Optional[pulumi.Input[builtins.str]] = None,
|
521
522
|
auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
|
522
523
|
auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
|
523
524
|
auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
|
@@ -530,22 +531,22 @@ class Provider(pulumi.ProviderResource):
|
|
530
531
|
auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
|
531
532
|
auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
|
532
533
|
auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
|
533
|
-
ca_cert_dir: Optional[pulumi.Input[str]] = None,
|
534
|
-
ca_cert_file: Optional[pulumi.Input[str]] = None,
|
534
|
+
ca_cert_dir: Optional[pulumi.Input[builtins.str]] = None,
|
535
|
+
ca_cert_file: Optional[pulumi.Input[builtins.str]] = None,
|
535
536
|
client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
|
536
537
|
headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
|
537
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
538
|
-
max_retries: Optional[pulumi.Input[int]] = None,
|
539
|
-
max_retries_ccc: Optional[pulumi.Input[int]] = None,
|
540
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
541
|
-
set_namespace_from_token: Optional[pulumi.Input[bool]] = None,
|
542
|
-
skip_child_token: Optional[pulumi.Input[bool]] = None,
|
543
|
-
skip_get_vault_version: Optional[pulumi.Input[bool]] = None,
|
544
|
-
skip_tls_verify: Optional[pulumi.Input[bool]] = None,
|
545
|
-
tls_server_name: Optional[pulumi.Input[str]] = None,
|
546
|
-
token: Optional[pulumi.Input[str]] = None,
|
547
|
-
token_name: Optional[pulumi.Input[str]] = None,
|
548
|
-
vault_version_override: Optional[pulumi.Input[str]] = None,
|
538
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
539
|
+
max_retries: Optional[pulumi.Input[builtins.int]] = None,
|
540
|
+
max_retries_ccc: Optional[pulumi.Input[builtins.int]] = None,
|
541
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
542
|
+
set_namespace_from_token: Optional[pulumi.Input[builtins.bool]] = None,
|
543
|
+
skip_child_token: Optional[pulumi.Input[builtins.bool]] = None,
|
544
|
+
skip_get_vault_version: Optional[pulumi.Input[builtins.bool]] = None,
|
545
|
+
skip_tls_verify: Optional[pulumi.Input[builtins.bool]] = None,
|
546
|
+
tls_server_name: Optional[pulumi.Input[builtins.str]] = None,
|
547
|
+
token: Optional[pulumi.Input[builtins.str]] = None,
|
548
|
+
token_name: Optional[pulumi.Input[builtins.str]] = None,
|
549
|
+
vault_version_override: Optional[pulumi.Input[builtins.str]] = None,
|
549
550
|
__props__=None):
|
550
551
|
"""
|
551
552
|
The provider type for the vault package. By default, resources use package-wide configuration
|
@@ -555,7 +556,7 @@ class Provider(pulumi.ProviderResource):
|
|
555
556
|
|
556
557
|
:param str resource_name: The name of the resource.
|
557
558
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
558
|
-
:param pulumi.Input[str] address: URL of the root of the target Vault server.
|
559
|
+
:param pulumi.Input[builtins.str] address: URL of the root of the target Vault server.
|
559
560
|
:param pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']] auth_login: Login to vault with an existing auth method using auth/<mount>/login
|
560
561
|
:param pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']] auth_login_aws: Login to vault using the AWS method
|
561
562
|
:param pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']] auth_login_azure: Login to vault using the azure method
|
@@ -568,23 +569,23 @@ class Provider(pulumi.ProviderResource):
|
|
568
569
|
:param pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']] auth_login_radius: Login to vault using the radius method
|
569
570
|
:param pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']] auth_login_token_file: Login to vault using
|
570
571
|
:param pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']] auth_login_userpass: Login to vault using the userpass method
|
571
|
-
:param pulumi.Input[str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
|
572
|
-
:param pulumi.Input[str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
|
572
|
+
:param pulumi.Input[builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
|
573
|
+
:param pulumi.Input[builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
|
573
574
|
:param pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']] client_auth: Client authentication credentials.
|
574
575
|
:param pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]] headers: The headers to send with each Vault request.
|
575
|
-
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
|
576
|
-
:param pulumi.Input[int] max_retries: Maximum number of retries when a 5xx error code is encountered.
|
577
|
-
:param pulumi.Input[int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
|
578
|
-
:param pulumi.Input[str] namespace: The namespace to use. Available only for Vault Enterprise.
|
579
|
-
:param pulumi.Input[bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
576
|
+
:param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
|
577
|
+
:param pulumi.Input[builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
|
578
|
+
:param pulumi.Input[builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
|
579
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
|
580
|
+
:param pulumi.Input[builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
580
581
|
token namespace as the root namespace for all resources.
|
581
|
-
:param pulumi.Input[bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
|
582
|
-
:param pulumi.Input[bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
|
583
|
-
:param pulumi.Input[bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
|
584
|
-
:param pulumi.Input[str] tls_server_name: Name to use as the SNI host when connecting via TLS.
|
585
|
-
:param pulumi.Input[str] token: Token to use to authenticate to Vault.
|
586
|
-
:param pulumi.Input[str] token_name: Token name to use for creating the Vault child token.
|
587
|
-
:param pulumi.Input[str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
|
582
|
+
:param pulumi.Input[builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
|
583
|
+
:param pulumi.Input[builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
|
584
|
+
:param pulumi.Input[builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
|
585
|
+
:param pulumi.Input[builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
|
586
|
+
:param pulumi.Input[builtins.str] token: Token to use to authenticate to Vault.
|
587
|
+
:param pulumi.Input[builtins.str] token_name: Token name to use for creating the Vault child token.
|
588
|
+
:param pulumi.Input[builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
|
588
589
|
"""
|
589
590
|
...
|
590
591
|
@overload
|
@@ -613,8 +614,8 @@ class Provider(pulumi.ProviderResource):
|
|
613
614
|
def _internal_init(__self__,
|
614
615
|
resource_name: str,
|
615
616
|
opts: Optional[pulumi.ResourceOptions] = None,
|
616
|
-
add_address_to_env: Optional[pulumi.Input[str]] = None,
|
617
|
-
address: Optional[pulumi.Input[str]] = None,
|
617
|
+
add_address_to_env: Optional[pulumi.Input[builtins.str]] = None,
|
618
|
+
address: Optional[pulumi.Input[builtins.str]] = None,
|
618
619
|
auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
|
619
620
|
auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
|
620
621
|
auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
|
@@ -627,22 +628,22 @@ class Provider(pulumi.ProviderResource):
|
|
627
628
|
auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
|
628
629
|
auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
|
629
630
|
auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
|
630
|
-
ca_cert_dir: Optional[pulumi.Input[str]] = None,
|
631
|
-
ca_cert_file: Optional[pulumi.Input[str]] = None,
|
631
|
+
ca_cert_dir: Optional[pulumi.Input[builtins.str]] = None,
|
632
|
+
ca_cert_file: Optional[pulumi.Input[builtins.str]] = None,
|
632
633
|
client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
|
633
634
|
headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
|
634
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
635
|
-
max_retries: Optional[pulumi.Input[int]] = None,
|
636
|
-
max_retries_ccc: Optional[pulumi.Input[int]] = None,
|
637
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
638
|
-
set_namespace_from_token: Optional[pulumi.Input[bool]] = None,
|
639
|
-
skip_child_token: Optional[pulumi.Input[bool]] = None,
|
640
|
-
skip_get_vault_version: Optional[pulumi.Input[bool]] = None,
|
641
|
-
skip_tls_verify: Optional[pulumi.Input[bool]] = None,
|
642
|
-
tls_server_name: Optional[pulumi.Input[str]] = None,
|
643
|
-
token: Optional[pulumi.Input[str]] = None,
|
644
|
-
token_name: Optional[pulumi.Input[str]] = None,
|
645
|
-
vault_version_override: Optional[pulumi.Input[str]] = None,
|
635
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
|
636
|
+
max_retries: Optional[pulumi.Input[builtins.int]] = None,
|
637
|
+
max_retries_ccc: Optional[pulumi.Input[builtins.int]] = None,
|
638
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
639
|
+
set_namespace_from_token: Optional[pulumi.Input[builtins.bool]] = None,
|
640
|
+
skip_child_token: Optional[pulumi.Input[builtins.bool]] = None,
|
641
|
+
skip_get_vault_version: Optional[pulumi.Input[builtins.bool]] = None,
|
642
|
+
skip_tls_verify: Optional[pulumi.Input[builtins.bool]] = None,
|
643
|
+
tls_server_name: Optional[pulumi.Input[builtins.str]] = None,
|
644
|
+
token: Optional[pulumi.Input[builtins.str]] = None,
|
645
|
+
token_name: Optional[pulumi.Input[builtins.str]] = None,
|
646
|
+
vault_version_override: Optional[pulumi.Input[builtins.str]] = None,
|
646
647
|
__props__=None):
|
647
648
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
648
649
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -700,12 +701,12 @@ class Provider(pulumi.ProviderResource):
|
|
700
701
|
|
701
702
|
@property
|
702
703
|
@pulumi.getter(name="addAddressToEnv")
|
703
|
-
def add_address_to_env(self) -> pulumi.Output[Optional[str]]:
|
704
|
+
def add_address_to_env(self) -> pulumi.Output[Optional[builtins.str]]:
|
704
705
|
return pulumi.get(self, "add_address_to_env")
|
705
706
|
|
706
707
|
@property
|
707
708
|
@pulumi.getter
|
708
|
-
def address(self) -> pulumi.Output[str]:
|
709
|
+
def address(self) -> pulumi.Output[builtins.str]:
|
709
710
|
"""
|
710
711
|
URL of the root of the target Vault server.
|
711
712
|
"""
|
@@ -713,7 +714,7 @@ class Provider(pulumi.ProviderResource):
|
|
713
714
|
|
714
715
|
@property
|
715
716
|
@pulumi.getter(name="caCertDir")
|
716
|
-
def ca_cert_dir(self) -> pulumi.Output[Optional[str]]:
|
717
|
+
def ca_cert_dir(self) -> pulumi.Output[Optional[builtins.str]]:
|
717
718
|
"""
|
718
719
|
Path to directory containing CA certificate files to validate the server's certificate.
|
719
720
|
"""
|
@@ -721,7 +722,7 @@ class Provider(pulumi.ProviderResource):
|
|
721
722
|
|
722
723
|
@property
|
723
724
|
@pulumi.getter(name="caCertFile")
|
724
|
-
def ca_cert_file(self) -> pulumi.Output[Optional[str]]:
|
725
|
+
def ca_cert_file(self) -> pulumi.Output[Optional[builtins.str]]:
|
725
726
|
"""
|
726
727
|
Path to a CA certificate file to validate the server's certificate.
|
727
728
|
"""
|
@@ -729,7 +730,7 @@ class Provider(pulumi.ProviderResource):
|
|
729
730
|
|
730
731
|
@property
|
731
732
|
@pulumi.getter
|
732
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
733
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
733
734
|
"""
|
734
735
|
The namespace to use. Available only for Vault Enterprise.
|
735
736
|
"""
|
@@ -737,7 +738,7 @@ class Provider(pulumi.ProviderResource):
|
|
737
738
|
|
738
739
|
@property
|
739
740
|
@pulumi.getter(name="tlsServerName")
|
740
|
-
def tls_server_name(self) -> pulumi.Output[Optional[str]]:
|
741
|
+
def tls_server_name(self) -> pulumi.Output[Optional[builtins.str]]:
|
741
742
|
"""
|
742
743
|
Name to use as the SNI host when connecting via TLS.
|
743
744
|
"""
|
@@ -745,7 +746,7 @@ class Provider(pulumi.ProviderResource):
|
|
745
746
|
|
746
747
|
@property
|
747
748
|
@pulumi.getter
|
748
|
-
def token(self) -> pulumi.Output[str]:
|
749
|
+
def token(self) -> pulumi.Output[builtins.str]:
|
749
750
|
"""
|
750
751
|
Token to use to authenticate to Vault.
|
751
752
|
"""
|
@@ -753,7 +754,7 @@ class Provider(pulumi.ProviderResource):
|
|
753
754
|
|
754
755
|
@property
|
755
756
|
@pulumi.getter(name="tokenName")
|
756
|
-
def token_name(self) -> pulumi.Output[Optional[str]]:
|
757
|
+
def token_name(self) -> pulumi.Output[Optional[builtins.str]]:
|
757
758
|
"""
|
758
759
|
Token name to use for creating the Vault child token.
|
759
760
|
"""
|
@@ -761,7 +762,7 @@ class Provider(pulumi.ProviderResource):
|
|
761
762
|
|
762
763
|
@property
|
763
764
|
@pulumi.getter(name="vaultVersionOverride")
|
764
|
-
def vault_version_override(self) -> pulumi.Output[Optional[str]]:
|
765
|
+
def vault_version_override(self) -> pulumi.Output[Optional[builtins.str]]:
|
765
766
|
"""
|
766
767
|
Override the Vault server version, which is normally determined dynamically from the target Vault server
|
767
768
|
"""
|
pulumi_vault/pulumi-plugin.json
CHANGED