pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,39 +20,39 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
acs_urls: pulumi.Input[Sequence[pulumi.Input[str]]],
|
23
|
-
entity_id: pulumi.Input[str],
|
24
|
-
default_role: Optional[pulumi.Input[str]] = None,
|
25
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
26
|
-
idp_cert: Optional[pulumi.Input[str]] = None,
|
27
|
-
idp_entity_id: Optional[pulumi.Input[str]] = None,
|
28
|
-
idp_metadata_url: Optional[pulumi.Input[str]] = None,
|
29
|
-
idp_sso_url: Optional[pulumi.Input[str]] = None,
|
30
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
31
|
-
path: Optional[pulumi.Input[str]] = None,
|
32
|
-
verbose_logging: Optional[pulumi.Input[bool]] = None):
|
23
|
+
acs_urls: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
|
24
|
+
entity_id: pulumi.Input[builtins.str],
|
25
|
+
default_role: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
27
|
+
idp_cert: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
|
31
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
32
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
33
|
+
verbose_logging: Optional[pulumi.Input[builtins.bool]] = None):
|
33
34
|
"""
|
34
35
|
The set of arguments for constructing a AuthBackend resource.
|
35
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
|
36
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
|
36
37
|
that should receive a response from the identity provider.
|
37
|
-
:param pulumi.Input[str] entity_id: The entity ID of the SAML authentication service provider.
|
38
|
-
:param pulumi.Input[str] default_role: The role to use if no role is provided during login.
|
39
|
-
:param pulumi.Input[bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
|
38
|
+
:param pulumi.Input[builtins.str] entity_id: The entity ID of the SAML authentication service provider.
|
39
|
+
:param pulumi.Input[builtins.str] default_role: The role to use if no role is provided during login.
|
40
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
|
40
41
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
41
|
-
:param pulumi.Input[str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
|
42
|
+
:param pulumi.Input[builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
|
42
43
|
with `idp_metadata_url`.
|
43
|
-
:param pulumi.Input[str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
|
44
|
+
:param pulumi.Input[builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
|
44
45
|
`idp_metadata_url`.
|
45
|
-
:param pulumi.Input[str] idp_metadata_url: The metadata URL of the identity provider.
|
46
|
-
:param pulumi.Input[str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
|
46
|
+
:param pulumi.Input[builtins.str] idp_metadata_url: The metadata URL of the identity provider.
|
47
|
+
:param pulumi.Input[builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
|
47
48
|
`idp_metadata_url`.
|
48
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
49
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
49
50
|
The value should not contain leading or trailing forward slashes.
|
50
51
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
51
52
|
*Available only for Vault Enterprise*.
|
52
|
-
:param pulumi.Input[str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
53
|
+
:param pulumi.Input[builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
53
54
|
if not specified.
|
54
|
-
:param pulumi.Input[bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
|
55
|
+
:param pulumi.Input[builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
|
55
56
|
information during the SAML exchange according to the current logging level. Not
|
56
57
|
recommended for production.
|
57
58
|
"""
|
@@ -78,7 +79,7 @@ class AuthBackendArgs:
|
|
78
79
|
|
79
80
|
@property
|
80
81
|
@pulumi.getter(name="acsUrls")
|
81
|
-
def acs_urls(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
82
|
+
def acs_urls(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
|
82
83
|
"""
|
83
84
|
The well-formatted URLs of your Assertion Consumer Service (ACS)
|
84
85
|
that should receive a response from the identity provider.
|
@@ -86,36 +87,36 @@ class AuthBackendArgs:
|
|
86
87
|
return pulumi.get(self, "acs_urls")
|
87
88
|
|
88
89
|
@acs_urls.setter
|
89
|
-
def acs_urls(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
|
90
|
+
def acs_urls(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
|
90
91
|
pulumi.set(self, "acs_urls", value)
|
91
92
|
|
92
93
|
@property
|
93
94
|
@pulumi.getter(name="entityId")
|
94
|
-
def entity_id(self) -> pulumi.Input[str]:
|
95
|
+
def entity_id(self) -> pulumi.Input[builtins.str]:
|
95
96
|
"""
|
96
97
|
The entity ID of the SAML authentication service provider.
|
97
98
|
"""
|
98
99
|
return pulumi.get(self, "entity_id")
|
99
100
|
|
100
101
|
@entity_id.setter
|
101
|
-
def entity_id(self, value: pulumi.Input[str]):
|
102
|
+
def entity_id(self, value: pulumi.Input[builtins.str]):
|
102
103
|
pulumi.set(self, "entity_id", value)
|
103
104
|
|
104
105
|
@property
|
105
106
|
@pulumi.getter(name="defaultRole")
|
106
|
-
def default_role(self) -> Optional[pulumi.Input[str]]:
|
107
|
+
def default_role(self) -> Optional[pulumi.Input[builtins.str]]:
|
107
108
|
"""
|
108
109
|
The role to use if no role is provided during login.
|
109
110
|
"""
|
110
111
|
return pulumi.get(self, "default_role")
|
111
112
|
|
112
113
|
@default_role.setter
|
113
|
-
def default_role(self, value: Optional[pulumi.Input[str]]):
|
114
|
+
def default_role(self, value: Optional[pulumi.Input[builtins.str]]):
|
114
115
|
pulumi.set(self, "default_role", value)
|
115
116
|
|
116
117
|
@property
|
117
118
|
@pulumi.getter(name="disableRemount")
|
118
|
-
def disable_remount(self) -> Optional[pulumi.Input[bool]]:
|
119
|
+
def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
|
119
120
|
"""
|
120
121
|
If set to `true`, opts out of mount migration on path updates.
|
121
122
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -123,12 +124,12 @@ class AuthBackendArgs:
|
|
123
124
|
return pulumi.get(self, "disable_remount")
|
124
125
|
|
125
126
|
@disable_remount.setter
|
126
|
-
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
127
|
+
def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
|
127
128
|
pulumi.set(self, "disable_remount", value)
|
128
129
|
|
129
130
|
@property
|
130
131
|
@pulumi.getter(name="idpCert")
|
131
|
-
def idp_cert(self) -> Optional[pulumi.Input[str]]:
|
132
|
+
def idp_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
132
133
|
"""
|
133
134
|
The PEM encoded certificate of the identity provider. Mutually exclusive
|
134
135
|
with `idp_metadata_url`.
|
@@ -136,12 +137,12 @@ class AuthBackendArgs:
|
|
136
137
|
return pulumi.get(self, "idp_cert")
|
137
138
|
|
138
139
|
@idp_cert.setter
|
139
|
-
def idp_cert(self, value: Optional[pulumi.Input[str]]):
|
140
|
+
def idp_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
140
141
|
pulumi.set(self, "idp_cert", value)
|
141
142
|
|
142
143
|
@property
|
143
144
|
@pulumi.getter(name="idpEntityId")
|
144
|
-
def idp_entity_id(self) -> Optional[pulumi.Input[str]]:
|
145
|
+
def idp_entity_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
145
146
|
"""
|
146
147
|
The entity ID of the identity provider. Mutually exclusive with
|
147
148
|
`idp_metadata_url`.
|
@@ -149,24 +150,24 @@ class AuthBackendArgs:
|
|
149
150
|
return pulumi.get(self, "idp_entity_id")
|
150
151
|
|
151
152
|
@idp_entity_id.setter
|
152
|
-
def idp_entity_id(self, value: Optional[pulumi.Input[str]]):
|
153
|
+
def idp_entity_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
153
154
|
pulumi.set(self, "idp_entity_id", value)
|
154
155
|
|
155
156
|
@property
|
156
157
|
@pulumi.getter(name="idpMetadataUrl")
|
157
|
-
def idp_metadata_url(self) -> Optional[pulumi.Input[str]]:
|
158
|
+
def idp_metadata_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
158
159
|
"""
|
159
160
|
The metadata URL of the identity provider.
|
160
161
|
"""
|
161
162
|
return pulumi.get(self, "idp_metadata_url")
|
162
163
|
|
163
164
|
@idp_metadata_url.setter
|
164
|
-
def idp_metadata_url(self, value: Optional[pulumi.Input[str]]):
|
165
|
+
def idp_metadata_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
165
166
|
pulumi.set(self, "idp_metadata_url", value)
|
166
167
|
|
167
168
|
@property
|
168
169
|
@pulumi.getter(name="idpSsoUrl")
|
169
|
-
def idp_sso_url(self) -> Optional[pulumi.Input[str]]:
|
170
|
+
def idp_sso_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
170
171
|
"""
|
171
172
|
The SSO URL of the identity provider. Mutually exclusive with
|
172
173
|
`idp_metadata_url`.
|
@@ -174,12 +175,12 @@ class AuthBackendArgs:
|
|
174
175
|
return pulumi.get(self, "idp_sso_url")
|
175
176
|
|
176
177
|
@idp_sso_url.setter
|
177
|
-
def idp_sso_url(self, value: Optional[pulumi.Input[str]]):
|
178
|
+
def idp_sso_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
178
179
|
pulumi.set(self, "idp_sso_url", value)
|
179
180
|
|
180
181
|
@property
|
181
182
|
@pulumi.getter
|
182
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
183
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
183
184
|
"""
|
184
185
|
The namespace to provision the resource in.
|
185
186
|
The value should not contain leading or trailing forward slashes.
|
@@ -189,12 +190,12 @@ class AuthBackendArgs:
|
|
189
190
|
return pulumi.get(self, "namespace")
|
190
191
|
|
191
192
|
@namespace.setter
|
192
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
193
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
193
194
|
pulumi.set(self, "namespace", value)
|
194
195
|
|
195
196
|
@property
|
196
197
|
@pulumi.getter
|
197
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
198
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
198
199
|
"""
|
199
200
|
Path where the auth backend will be mounted. Defaults to `auth/saml`
|
200
201
|
if not specified.
|
@@ -202,12 +203,12 @@ class AuthBackendArgs:
|
|
202
203
|
return pulumi.get(self, "path")
|
203
204
|
|
204
205
|
@path.setter
|
205
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
206
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
206
207
|
pulumi.set(self, "path", value)
|
207
208
|
|
208
209
|
@property
|
209
210
|
@pulumi.getter(name="verboseLogging")
|
210
|
-
def verbose_logging(self) -> Optional[pulumi.Input[bool]]:
|
211
|
+
def verbose_logging(self) -> Optional[pulumi.Input[builtins.bool]]:
|
211
212
|
"""
|
212
213
|
If set to `true`, logs additional, potentially sensitive
|
213
214
|
information during the SAML exchange according to the current logging level. Not
|
@@ -216,46 +217,46 @@ class AuthBackendArgs:
|
|
216
217
|
return pulumi.get(self, "verbose_logging")
|
217
218
|
|
218
219
|
@verbose_logging.setter
|
219
|
-
def verbose_logging(self, value: Optional[pulumi.Input[bool]]):
|
220
|
+
def verbose_logging(self, value: Optional[pulumi.Input[builtins.bool]]):
|
220
221
|
pulumi.set(self, "verbose_logging", value)
|
221
222
|
|
222
223
|
|
223
224
|
@pulumi.input_type
|
224
225
|
class _AuthBackendState:
|
225
226
|
def __init__(__self__, *,
|
226
|
-
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
227
|
-
default_role: Optional[pulumi.Input[str]] = None,
|
228
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
229
|
-
entity_id: Optional[pulumi.Input[str]] = None,
|
230
|
-
idp_cert: Optional[pulumi.Input[str]] = None,
|
231
|
-
idp_entity_id: Optional[pulumi.Input[str]] = None,
|
232
|
-
idp_metadata_url: Optional[pulumi.Input[str]] = None,
|
233
|
-
idp_sso_url: Optional[pulumi.Input[str]] = None,
|
234
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
235
|
-
path: Optional[pulumi.Input[str]] = None,
|
236
|
-
verbose_logging: Optional[pulumi.Input[bool]] = None):
|
227
|
+
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
228
|
+
default_role: Optional[pulumi.Input[builtins.str]] = None,
|
229
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
230
|
+
entity_id: Optional[pulumi.Input[builtins.str]] = None,
|
231
|
+
idp_cert: Optional[pulumi.Input[builtins.str]] = None,
|
232
|
+
idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
|
233
|
+
idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
|
234
|
+
idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
|
235
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
236
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
237
|
+
verbose_logging: Optional[pulumi.Input[builtins.bool]] = None):
|
237
238
|
"""
|
238
239
|
Input properties used for looking up and filtering AuthBackend resources.
|
239
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
|
240
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
|
240
241
|
that should receive a response from the identity provider.
|
241
|
-
:param pulumi.Input[str] default_role: The role to use if no role is provided during login.
|
242
|
-
:param pulumi.Input[bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
|
242
|
+
:param pulumi.Input[builtins.str] default_role: The role to use if no role is provided during login.
|
243
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
|
243
244
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
244
|
-
:param pulumi.Input[str] entity_id: The entity ID of the SAML authentication service provider.
|
245
|
-
:param pulumi.Input[str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
|
245
|
+
:param pulumi.Input[builtins.str] entity_id: The entity ID of the SAML authentication service provider.
|
246
|
+
:param pulumi.Input[builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
|
246
247
|
with `idp_metadata_url`.
|
247
|
-
:param pulumi.Input[str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
|
248
|
+
:param pulumi.Input[builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
|
248
249
|
`idp_metadata_url`.
|
249
|
-
:param pulumi.Input[str] idp_metadata_url: The metadata URL of the identity provider.
|
250
|
-
:param pulumi.Input[str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
|
250
|
+
:param pulumi.Input[builtins.str] idp_metadata_url: The metadata URL of the identity provider.
|
251
|
+
:param pulumi.Input[builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
|
251
252
|
`idp_metadata_url`.
|
252
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
253
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
253
254
|
The value should not contain leading or trailing forward slashes.
|
254
255
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
255
256
|
*Available only for Vault Enterprise*.
|
256
|
-
:param pulumi.Input[str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
257
|
+
:param pulumi.Input[builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
257
258
|
if not specified.
|
258
|
-
:param pulumi.Input[bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
|
259
|
+
:param pulumi.Input[builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
|
259
260
|
information during the SAML exchange according to the current logging level. Not
|
260
261
|
recommended for production.
|
261
262
|
"""
|
@@ -284,7 +285,7 @@ class _AuthBackendState:
|
|
284
285
|
|
285
286
|
@property
|
286
287
|
@pulumi.getter(name="acsUrls")
|
287
|
-
def acs_urls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
288
|
+
def acs_urls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
288
289
|
"""
|
289
290
|
The well-formatted URLs of your Assertion Consumer Service (ACS)
|
290
291
|
that should receive a response from the identity provider.
|
@@ -292,24 +293,24 @@ class _AuthBackendState:
|
|
292
293
|
return pulumi.get(self, "acs_urls")
|
293
294
|
|
294
295
|
@acs_urls.setter
|
295
|
-
def acs_urls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
296
|
+
def acs_urls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
296
297
|
pulumi.set(self, "acs_urls", value)
|
297
298
|
|
298
299
|
@property
|
299
300
|
@pulumi.getter(name="defaultRole")
|
300
|
-
def default_role(self) -> Optional[pulumi.Input[str]]:
|
301
|
+
def default_role(self) -> Optional[pulumi.Input[builtins.str]]:
|
301
302
|
"""
|
302
303
|
The role to use if no role is provided during login.
|
303
304
|
"""
|
304
305
|
return pulumi.get(self, "default_role")
|
305
306
|
|
306
307
|
@default_role.setter
|
307
|
-
def default_role(self, value: Optional[pulumi.Input[str]]):
|
308
|
+
def default_role(self, value: Optional[pulumi.Input[builtins.str]]):
|
308
309
|
pulumi.set(self, "default_role", value)
|
309
310
|
|
310
311
|
@property
|
311
312
|
@pulumi.getter(name="disableRemount")
|
312
|
-
def disable_remount(self) -> Optional[pulumi.Input[bool]]:
|
313
|
+
def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
|
313
314
|
"""
|
314
315
|
If set to `true`, opts out of mount migration on path updates.
|
315
316
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -317,24 +318,24 @@ class _AuthBackendState:
|
|
317
318
|
return pulumi.get(self, "disable_remount")
|
318
319
|
|
319
320
|
@disable_remount.setter
|
320
|
-
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
321
|
+
def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
|
321
322
|
pulumi.set(self, "disable_remount", value)
|
322
323
|
|
323
324
|
@property
|
324
325
|
@pulumi.getter(name="entityId")
|
325
|
-
def entity_id(self) -> Optional[pulumi.Input[str]]:
|
326
|
+
def entity_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
326
327
|
"""
|
327
328
|
The entity ID of the SAML authentication service provider.
|
328
329
|
"""
|
329
330
|
return pulumi.get(self, "entity_id")
|
330
331
|
|
331
332
|
@entity_id.setter
|
332
|
-
def entity_id(self, value: Optional[pulumi.Input[str]]):
|
333
|
+
def entity_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
333
334
|
pulumi.set(self, "entity_id", value)
|
334
335
|
|
335
336
|
@property
|
336
337
|
@pulumi.getter(name="idpCert")
|
337
|
-
def idp_cert(self) -> Optional[pulumi.Input[str]]:
|
338
|
+
def idp_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
338
339
|
"""
|
339
340
|
The PEM encoded certificate of the identity provider. Mutually exclusive
|
340
341
|
with `idp_metadata_url`.
|
@@ -342,12 +343,12 @@ class _AuthBackendState:
|
|
342
343
|
return pulumi.get(self, "idp_cert")
|
343
344
|
|
344
345
|
@idp_cert.setter
|
345
|
-
def idp_cert(self, value: Optional[pulumi.Input[str]]):
|
346
|
+
def idp_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
346
347
|
pulumi.set(self, "idp_cert", value)
|
347
348
|
|
348
349
|
@property
|
349
350
|
@pulumi.getter(name="idpEntityId")
|
350
|
-
def idp_entity_id(self) -> Optional[pulumi.Input[str]]:
|
351
|
+
def idp_entity_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
351
352
|
"""
|
352
353
|
The entity ID of the identity provider. Mutually exclusive with
|
353
354
|
`idp_metadata_url`.
|
@@ -355,24 +356,24 @@ class _AuthBackendState:
|
|
355
356
|
return pulumi.get(self, "idp_entity_id")
|
356
357
|
|
357
358
|
@idp_entity_id.setter
|
358
|
-
def idp_entity_id(self, value: Optional[pulumi.Input[str]]):
|
359
|
+
def idp_entity_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
359
360
|
pulumi.set(self, "idp_entity_id", value)
|
360
361
|
|
361
362
|
@property
|
362
363
|
@pulumi.getter(name="idpMetadataUrl")
|
363
|
-
def idp_metadata_url(self) -> Optional[pulumi.Input[str]]:
|
364
|
+
def idp_metadata_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
364
365
|
"""
|
365
366
|
The metadata URL of the identity provider.
|
366
367
|
"""
|
367
368
|
return pulumi.get(self, "idp_metadata_url")
|
368
369
|
|
369
370
|
@idp_metadata_url.setter
|
370
|
-
def idp_metadata_url(self, value: Optional[pulumi.Input[str]]):
|
371
|
+
def idp_metadata_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
371
372
|
pulumi.set(self, "idp_metadata_url", value)
|
372
373
|
|
373
374
|
@property
|
374
375
|
@pulumi.getter(name="idpSsoUrl")
|
375
|
-
def idp_sso_url(self) -> Optional[pulumi.Input[str]]:
|
376
|
+
def idp_sso_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
376
377
|
"""
|
377
378
|
The SSO URL of the identity provider. Mutually exclusive with
|
378
379
|
`idp_metadata_url`.
|
@@ -380,12 +381,12 @@ class _AuthBackendState:
|
|
380
381
|
return pulumi.get(self, "idp_sso_url")
|
381
382
|
|
382
383
|
@idp_sso_url.setter
|
383
|
-
def idp_sso_url(self, value: Optional[pulumi.Input[str]]):
|
384
|
+
def idp_sso_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
384
385
|
pulumi.set(self, "idp_sso_url", value)
|
385
386
|
|
386
387
|
@property
|
387
388
|
@pulumi.getter
|
388
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
389
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
389
390
|
"""
|
390
391
|
The namespace to provision the resource in.
|
391
392
|
The value should not contain leading or trailing forward slashes.
|
@@ -395,12 +396,12 @@ class _AuthBackendState:
|
|
395
396
|
return pulumi.get(self, "namespace")
|
396
397
|
|
397
398
|
@namespace.setter
|
398
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
399
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
399
400
|
pulumi.set(self, "namespace", value)
|
400
401
|
|
401
402
|
@property
|
402
403
|
@pulumi.getter
|
403
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
404
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
404
405
|
"""
|
405
406
|
Path where the auth backend will be mounted. Defaults to `auth/saml`
|
406
407
|
if not specified.
|
@@ -408,12 +409,12 @@ class _AuthBackendState:
|
|
408
409
|
return pulumi.get(self, "path")
|
409
410
|
|
410
411
|
@path.setter
|
411
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
412
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
412
413
|
pulumi.set(self, "path", value)
|
413
414
|
|
414
415
|
@property
|
415
416
|
@pulumi.getter(name="verboseLogging")
|
416
|
-
def verbose_logging(self) -> Optional[pulumi.Input[bool]]:
|
417
|
+
def verbose_logging(self) -> Optional[pulumi.Input[builtins.bool]]:
|
417
418
|
"""
|
418
419
|
If set to `true`, logs additional, potentially sensitive
|
419
420
|
information during the SAML exchange according to the current logging level. Not
|
@@ -422,7 +423,7 @@ class _AuthBackendState:
|
|
422
423
|
return pulumi.get(self, "verbose_logging")
|
423
424
|
|
424
425
|
@verbose_logging.setter
|
425
|
-
def verbose_logging(self, value: Optional[pulumi.Input[bool]]):
|
426
|
+
def verbose_logging(self, value: Optional[pulumi.Input[builtins.bool]]):
|
426
427
|
pulumi.set(self, "verbose_logging", value)
|
427
428
|
|
428
429
|
|
@@ -431,17 +432,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
431
432
|
def __init__(__self__,
|
432
433
|
resource_name: str,
|
433
434
|
opts: Optional[pulumi.ResourceOptions] = None,
|
434
|
-
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
435
|
-
default_role: Optional[pulumi.Input[str]] = None,
|
436
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
437
|
-
entity_id: Optional[pulumi.Input[str]] = None,
|
438
|
-
idp_cert: Optional[pulumi.Input[str]] = None,
|
439
|
-
idp_entity_id: Optional[pulumi.Input[str]] = None,
|
440
|
-
idp_metadata_url: Optional[pulumi.Input[str]] = None,
|
441
|
-
idp_sso_url: Optional[pulumi.Input[str]] = None,
|
442
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
443
|
-
path: Optional[pulumi.Input[str]] = None,
|
444
|
-
verbose_logging: Optional[pulumi.Input[bool]] = None,
|
435
|
+
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
436
|
+
default_role: Optional[pulumi.Input[builtins.str]] = None,
|
437
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
438
|
+
entity_id: Optional[pulumi.Input[builtins.str]] = None,
|
439
|
+
idp_cert: Optional[pulumi.Input[builtins.str]] = None,
|
440
|
+
idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
|
441
|
+
idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
|
442
|
+
idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
|
443
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
444
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
445
|
+
verbose_logging: Optional[pulumi.Input[builtins.bool]] = None,
|
445
446
|
__props__=None):
|
446
447
|
"""
|
447
448
|
Manages a SAML Auth mount in a Vault server. See the [Vault
|
@@ -472,26 +473,26 @@ class AuthBackend(pulumi.CustomResource):
|
|
472
473
|
|
473
474
|
:param str resource_name: The name of the resource.
|
474
475
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
475
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
|
476
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
|
476
477
|
that should receive a response from the identity provider.
|
477
|
-
:param pulumi.Input[str] default_role: The role to use if no role is provided during login.
|
478
|
-
:param pulumi.Input[bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
|
478
|
+
:param pulumi.Input[builtins.str] default_role: The role to use if no role is provided during login.
|
479
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
|
479
480
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
480
|
-
:param pulumi.Input[str] entity_id: The entity ID of the SAML authentication service provider.
|
481
|
-
:param pulumi.Input[str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
|
481
|
+
:param pulumi.Input[builtins.str] entity_id: The entity ID of the SAML authentication service provider.
|
482
|
+
:param pulumi.Input[builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
|
482
483
|
with `idp_metadata_url`.
|
483
|
-
:param pulumi.Input[str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
|
484
|
+
:param pulumi.Input[builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
|
484
485
|
`idp_metadata_url`.
|
485
|
-
:param pulumi.Input[str] idp_metadata_url: The metadata URL of the identity provider.
|
486
|
-
:param pulumi.Input[str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
|
486
|
+
:param pulumi.Input[builtins.str] idp_metadata_url: The metadata URL of the identity provider.
|
487
|
+
:param pulumi.Input[builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
|
487
488
|
`idp_metadata_url`.
|
488
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
489
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
489
490
|
The value should not contain leading or trailing forward slashes.
|
490
491
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
491
492
|
*Available only for Vault Enterprise*.
|
492
|
-
:param pulumi.Input[str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
493
|
+
:param pulumi.Input[builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
493
494
|
if not specified.
|
494
|
-
:param pulumi.Input[bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
|
495
|
+
:param pulumi.Input[builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
|
495
496
|
information during the SAML exchange according to the current logging level. Not
|
496
497
|
recommended for production.
|
497
498
|
"""
|
@@ -543,17 +544,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
543
544
|
def _internal_init(__self__,
|
544
545
|
resource_name: str,
|
545
546
|
opts: Optional[pulumi.ResourceOptions] = None,
|
546
|
-
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
547
|
-
default_role: Optional[pulumi.Input[str]] = None,
|
548
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
549
|
-
entity_id: Optional[pulumi.Input[str]] = None,
|
550
|
-
idp_cert: Optional[pulumi.Input[str]] = None,
|
551
|
-
idp_entity_id: Optional[pulumi.Input[str]] = None,
|
552
|
-
idp_metadata_url: Optional[pulumi.Input[str]] = None,
|
553
|
-
idp_sso_url: Optional[pulumi.Input[str]] = None,
|
554
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
555
|
-
path: Optional[pulumi.Input[str]] = None,
|
556
|
-
verbose_logging: Optional[pulumi.Input[bool]] = None,
|
547
|
+
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
548
|
+
default_role: Optional[pulumi.Input[builtins.str]] = None,
|
549
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
550
|
+
entity_id: Optional[pulumi.Input[builtins.str]] = None,
|
551
|
+
idp_cert: Optional[pulumi.Input[builtins.str]] = None,
|
552
|
+
idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
|
553
|
+
idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
|
554
|
+
idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
|
555
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
556
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
557
|
+
verbose_logging: Optional[pulumi.Input[builtins.bool]] = None,
|
557
558
|
__props__=None):
|
558
559
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
559
560
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -588,17 +589,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
588
589
|
def get(resource_name: str,
|
589
590
|
id: pulumi.Input[str],
|
590
591
|
opts: Optional[pulumi.ResourceOptions] = None,
|
591
|
-
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
592
|
-
default_role: Optional[pulumi.Input[str]] = None,
|
593
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
594
|
-
entity_id: Optional[pulumi.Input[str]] = None,
|
595
|
-
idp_cert: Optional[pulumi.Input[str]] = None,
|
596
|
-
idp_entity_id: Optional[pulumi.Input[str]] = None,
|
597
|
-
idp_metadata_url: Optional[pulumi.Input[str]] = None,
|
598
|
-
idp_sso_url: Optional[pulumi.Input[str]] = None,
|
599
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
600
|
-
path: Optional[pulumi.Input[str]] = None,
|
601
|
-
verbose_logging: Optional[pulumi.Input[bool]] = None) -> 'AuthBackend':
|
592
|
+
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
593
|
+
default_role: Optional[pulumi.Input[builtins.str]] = None,
|
594
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
595
|
+
entity_id: Optional[pulumi.Input[builtins.str]] = None,
|
596
|
+
idp_cert: Optional[pulumi.Input[builtins.str]] = None,
|
597
|
+
idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
|
598
|
+
idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
|
599
|
+
idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
|
600
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
601
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
602
|
+
verbose_logging: Optional[pulumi.Input[builtins.bool]] = None) -> 'AuthBackend':
|
602
603
|
"""
|
603
604
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
604
605
|
properties used to qualify the lookup.
|
@@ -606,26 +607,26 @@ class AuthBackend(pulumi.CustomResource):
|
|
606
607
|
:param str resource_name: The unique name of the resulting resource.
|
607
608
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
608
609
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
609
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
|
610
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
|
610
611
|
that should receive a response from the identity provider.
|
611
|
-
:param pulumi.Input[str] default_role: The role to use if no role is provided during login.
|
612
|
-
:param pulumi.Input[bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
|
612
|
+
:param pulumi.Input[builtins.str] default_role: The role to use if no role is provided during login.
|
613
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
|
613
614
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
614
|
-
:param pulumi.Input[str] entity_id: The entity ID of the SAML authentication service provider.
|
615
|
-
:param pulumi.Input[str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
|
615
|
+
:param pulumi.Input[builtins.str] entity_id: The entity ID of the SAML authentication service provider.
|
616
|
+
:param pulumi.Input[builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
|
616
617
|
with `idp_metadata_url`.
|
617
|
-
:param pulumi.Input[str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
|
618
|
+
:param pulumi.Input[builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
|
618
619
|
`idp_metadata_url`.
|
619
|
-
:param pulumi.Input[str] idp_metadata_url: The metadata URL of the identity provider.
|
620
|
-
:param pulumi.Input[str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
|
620
|
+
:param pulumi.Input[builtins.str] idp_metadata_url: The metadata URL of the identity provider.
|
621
|
+
:param pulumi.Input[builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
|
621
622
|
`idp_metadata_url`.
|
622
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
623
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
623
624
|
The value should not contain leading or trailing forward slashes.
|
624
625
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
625
626
|
*Available only for Vault Enterprise*.
|
626
|
-
:param pulumi.Input[str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
627
|
+
:param pulumi.Input[builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
627
628
|
if not specified.
|
628
|
-
:param pulumi.Input[bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
|
629
|
+
:param pulumi.Input[builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
|
629
630
|
information during the SAML exchange according to the current logging level. Not
|
630
631
|
recommended for production.
|
631
632
|
"""
|
@@ -648,7 +649,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
648
649
|
|
649
650
|
@property
|
650
651
|
@pulumi.getter(name="acsUrls")
|
651
|
-
def acs_urls(self) -> pulumi.Output[Sequence[str]]:
|
652
|
+
def acs_urls(self) -> pulumi.Output[Sequence[builtins.str]]:
|
652
653
|
"""
|
653
654
|
The well-formatted URLs of your Assertion Consumer Service (ACS)
|
654
655
|
that should receive a response from the identity provider.
|
@@ -657,7 +658,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
657
658
|
|
658
659
|
@property
|
659
660
|
@pulumi.getter(name="defaultRole")
|
660
|
-
def default_role(self) -> pulumi.Output[Optional[str]]:
|
661
|
+
def default_role(self) -> pulumi.Output[Optional[builtins.str]]:
|
661
662
|
"""
|
662
663
|
The role to use if no role is provided during login.
|
663
664
|
"""
|
@@ -665,7 +666,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
665
666
|
|
666
667
|
@property
|
667
668
|
@pulumi.getter(name="disableRemount")
|
668
|
-
def disable_remount(self) -> pulumi.Output[Optional[bool]]:
|
669
|
+
def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
|
669
670
|
"""
|
670
671
|
If set to `true`, opts out of mount migration on path updates.
|
671
672
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -674,7 +675,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
674
675
|
|
675
676
|
@property
|
676
677
|
@pulumi.getter(name="entityId")
|
677
|
-
def entity_id(self) -> pulumi.Output[str]:
|
678
|
+
def entity_id(self) -> pulumi.Output[builtins.str]:
|
678
679
|
"""
|
679
680
|
The entity ID of the SAML authentication service provider.
|
680
681
|
"""
|
@@ -682,7 +683,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
682
683
|
|
683
684
|
@property
|
684
685
|
@pulumi.getter(name="idpCert")
|
685
|
-
def idp_cert(self) -> pulumi.Output[Optional[str]]:
|
686
|
+
def idp_cert(self) -> pulumi.Output[Optional[builtins.str]]:
|
686
687
|
"""
|
687
688
|
The PEM encoded certificate of the identity provider. Mutually exclusive
|
688
689
|
with `idp_metadata_url`.
|
@@ -691,7 +692,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
691
692
|
|
692
693
|
@property
|
693
694
|
@pulumi.getter(name="idpEntityId")
|
694
|
-
def idp_entity_id(self) -> pulumi.Output[Optional[str]]:
|
695
|
+
def idp_entity_id(self) -> pulumi.Output[Optional[builtins.str]]:
|
695
696
|
"""
|
696
697
|
The entity ID of the identity provider. Mutually exclusive with
|
697
698
|
`idp_metadata_url`.
|
@@ -700,7 +701,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
700
701
|
|
701
702
|
@property
|
702
703
|
@pulumi.getter(name="idpMetadataUrl")
|
703
|
-
def idp_metadata_url(self) -> pulumi.Output[Optional[str]]:
|
704
|
+
def idp_metadata_url(self) -> pulumi.Output[Optional[builtins.str]]:
|
704
705
|
"""
|
705
706
|
The metadata URL of the identity provider.
|
706
707
|
"""
|
@@ -708,7 +709,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
708
709
|
|
709
710
|
@property
|
710
711
|
@pulumi.getter(name="idpSsoUrl")
|
711
|
-
def idp_sso_url(self) -> pulumi.Output[Optional[str]]:
|
712
|
+
def idp_sso_url(self) -> pulumi.Output[Optional[builtins.str]]:
|
712
713
|
"""
|
713
714
|
The SSO URL of the identity provider. Mutually exclusive with
|
714
715
|
`idp_metadata_url`.
|
@@ -717,7 +718,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
717
718
|
|
718
719
|
@property
|
719
720
|
@pulumi.getter
|
720
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
721
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
721
722
|
"""
|
722
723
|
The namespace to provision the resource in.
|
723
724
|
The value should not contain leading or trailing forward slashes.
|
@@ -728,7 +729,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
728
729
|
|
729
730
|
@property
|
730
731
|
@pulumi.getter
|
731
|
-
def path(self) -> pulumi.Output[Optional[str]]:
|
732
|
+
def path(self) -> pulumi.Output[Optional[builtins.str]]:
|
732
733
|
"""
|
733
734
|
Path where the auth backend will be mounted. Defaults to `auth/saml`
|
734
735
|
if not specified.
|
@@ -737,7 +738,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
737
738
|
|
738
739
|
@property
|
739
740
|
@pulumi.getter(name="verboseLogging")
|
740
|
-
def verbose_logging(self) -> pulumi.Output[bool]:
|
741
|
+
def verbose_logging(self) -> pulumi.Output[builtins.bool]:
|
741
742
|
"""
|
742
743
|
If set to `true`, logs additional, potentially sensitive
|
743
744
|
information during the SAML exchange according to the current logging level. Not
|