pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,24 +20,24 @@ __all__ = ['AuthBackendConfigIdentityArgs', 'AuthBackendConfigIdentity']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendConfigIdentityArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
backend: Optional[pulumi.Input[str]] = None,
|
23
|
-
ec2_alias: Optional[pulumi.Input[str]] = None,
|
24
|
-
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
|
-
iam_alias: Optional[pulumi.Input[str]] = None,
|
26
|
-
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
27
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
24
|
+
ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
26
|
+
iam_alias: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
28
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
28
29
|
"""
|
29
30
|
The set of arguments for constructing a AuthBackendConfigIdentity resource.
|
30
|
-
:param pulumi.Input[str] backend: Unique name of the auth backend to configure.
|
31
|
-
:param pulumi.Input[str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
31
|
+
:param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
|
32
|
+
:param pulumi.Input[builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
32
33
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
33
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
34
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
34
35
|
added to both audit logs, and on the `ec2_alias`
|
35
|
-
:param pulumi.Input[str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
|
36
|
+
:param pulumi.Input[builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
|
36
37
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
37
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
38
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
38
39
|
added to both audit logs, and on the `iam_alias`
|
39
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
40
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
40
41
|
The value should not contain leading or trailing forward slashes.
|
41
42
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
42
43
|
*Available only for Vault Enterprise*.
|
@@ -56,19 +57,19 @@ class AuthBackendConfigIdentityArgs:
|
|
56
57
|
|
57
58
|
@property
|
58
59
|
@pulumi.getter
|
59
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
60
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
60
61
|
"""
|
61
62
|
Unique name of the auth backend to configure.
|
62
63
|
"""
|
63
64
|
return pulumi.get(self, "backend")
|
64
65
|
|
65
66
|
@backend.setter
|
66
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
67
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
67
68
|
pulumi.set(self, "backend", value)
|
68
69
|
|
69
70
|
@property
|
70
71
|
@pulumi.getter(name="ec2Alias")
|
71
|
-
def ec2_alias(self) -> Optional[pulumi.Input[str]]:
|
72
|
+
def ec2_alias(self) -> Optional[pulumi.Input[builtins.str]]:
|
72
73
|
"""
|
73
74
|
How to generate the identity alias when using the ec2 auth method. Valid choices are
|
74
75
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
@@ -76,12 +77,12 @@ class AuthBackendConfigIdentityArgs:
|
|
76
77
|
return pulumi.get(self, "ec2_alias")
|
77
78
|
|
78
79
|
@ec2_alias.setter
|
79
|
-
def ec2_alias(self, value: Optional[pulumi.Input[str]]):
|
80
|
+
def ec2_alias(self, value: Optional[pulumi.Input[builtins.str]]):
|
80
81
|
pulumi.set(self, "ec2_alias", value)
|
81
82
|
|
82
83
|
@property
|
83
84
|
@pulumi.getter(name="ec2Metadatas")
|
84
|
-
def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
85
|
+
def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
85
86
|
"""
|
86
87
|
The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
87
88
|
added to both audit logs, and on the `ec2_alias`
|
@@ -89,12 +90,12 @@ class AuthBackendConfigIdentityArgs:
|
|
89
90
|
return pulumi.get(self, "ec2_metadatas")
|
90
91
|
|
91
92
|
@ec2_metadatas.setter
|
92
|
-
def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
93
|
+
def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
93
94
|
pulumi.set(self, "ec2_metadatas", value)
|
94
95
|
|
95
96
|
@property
|
96
97
|
@pulumi.getter(name="iamAlias")
|
97
|
-
def iam_alias(self) -> Optional[pulumi.Input[str]]:
|
98
|
+
def iam_alias(self) -> Optional[pulumi.Input[builtins.str]]:
|
98
99
|
"""
|
99
100
|
How to generate the identity alias when using the iam auth method. Valid choices are
|
100
101
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
@@ -102,12 +103,12 @@ class AuthBackendConfigIdentityArgs:
|
|
102
103
|
return pulumi.get(self, "iam_alias")
|
103
104
|
|
104
105
|
@iam_alias.setter
|
105
|
-
def iam_alias(self, value: Optional[pulumi.Input[str]]):
|
106
|
+
def iam_alias(self, value: Optional[pulumi.Input[builtins.str]]):
|
106
107
|
pulumi.set(self, "iam_alias", value)
|
107
108
|
|
108
109
|
@property
|
109
110
|
@pulumi.getter(name="iamMetadatas")
|
110
|
-
def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
111
|
+
def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
111
112
|
"""
|
112
113
|
The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
113
114
|
added to both audit logs, and on the `iam_alias`
|
@@ -115,12 +116,12 @@ class AuthBackendConfigIdentityArgs:
|
|
115
116
|
return pulumi.get(self, "iam_metadatas")
|
116
117
|
|
117
118
|
@iam_metadatas.setter
|
118
|
-
def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
119
|
+
def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
119
120
|
pulumi.set(self, "iam_metadatas", value)
|
120
121
|
|
121
122
|
@property
|
122
123
|
@pulumi.getter
|
123
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
124
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
124
125
|
"""
|
125
126
|
The namespace to provision the resource in.
|
126
127
|
The value should not contain leading or trailing forward slashes.
|
@@ -130,31 +131,31 @@ class AuthBackendConfigIdentityArgs:
|
|
130
131
|
return pulumi.get(self, "namespace")
|
131
132
|
|
132
133
|
@namespace.setter
|
133
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
134
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
134
135
|
pulumi.set(self, "namespace", value)
|
135
136
|
|
136
137
|
|
137
138
|
@pulumi.input_type
|
138
139
|
class _AuthBackendConfigIdentityState:
|
139
140
|
def __init__(__self__, *,
|
140
|
-
backend: Optional[pulumi.Input[str]] = None,
|
141
|
-
ec2_alias: Optional[pulumi.Input[str]] = None,
|
142
|
-
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
143
|
-
iam_alias: Optional[pulumi.Input[str]] = None,
|
144
|
-
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
145
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
141
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
142
|
+
ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
|
143
|
+
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
144
|
+
iam_alias: Optional[pulumi.Input[builtins.str]] = None,
|
145
|
+
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
146
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
146
147
|
"""
|
147
148
|
Input properties used for looking up and filtering AuthBackendConfigIdentity resources.
|
148
|
-
:param pulumi.Input[str] backend: Unique name of the auth backend to configure.
|
149
|
-
:param pulumi.Input[str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
149
|
+
:param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
|
150
|
+
:param pulumi.Input[builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
150
151
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
151
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
152
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
152
153
|
added to both audit logs, and on the `ec2_alias`
|
153
|
-
:param pulumi.Input[str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
|
154
|
+
:param pulumi.Input[builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
|
154
155
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
155
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
156
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
156
157
|
added to both audit logs, and on the `iam_alias`
|
157
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
158
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
158
159
|
The value should not contain leading or trailing forward slashes.
|
159
160
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
160
161
|
*Available only for Vault Enterprise*.
|
@@ -174,19 +175,19 @@ class _AuthBackendConfigIdentityState:
|
|
174
175
|
|
175
176
|
@property
|
176
177
|
@pulumi.getter
|
177
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
178
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
178
179
|
"""
|
179
180
|
Unique name of the auth backend to configure.
|
180
181
|
"""
|
181
182
|
return pulumi.get(self, "backend")
|
182
183
|
|
183
184
|
@backend.setter
|
184
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
185
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
185
186
|
pulumi.set(self, "backend", value)
|
186
187
|
|
187
188
|
@property
|
188
189
|
@pulumi.getter(name="ec2Alias")
|
189
|
-
def ec2_alias(self) -> Optional[pulumi.Input[str]]:
|
190
|
+
def ec2_alias(self) -> Optional[pulumi.Input[builtins.str]]:
|
190
191
|
"""
|
191
192
|
How to generate the identity alias when using the ec2 auth method. Valid choices are
|
192
193
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
@@ -194,12 +195,12 @@ class _AuthBackendConfigIdentityState:
|
|
194
195
|
return pulumi.get(self, "ec2_alias")
|
195
196
|
|
196
197
|
@ec2_alias.setter
|
197
|
-
def ec2_alias(self, value: Optional[pulumi.Input[str]]):
|
198
|
+
def ec2_alias(self, value: Optional[pulumi.Input[builtins.str]]):
|
198
199
|
pulumi.set(self, "ec2_alias", value)
|
199
200
|
|
200
201
|
@property
|
201
202
|
@pulumi.getter(name="ec2Metadatas")
|
202
|
-
def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
203
|
+
def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
203
204
|
"""
|
204
205
|
The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
205
206
|
added to both audit logs, and on the `ec2_alias`
|
@@ -207,12 +208,12 @@ class _AuthBackendConfigIdentityState:
|
|
207
208
|
return pulumi.get(self, "ec2_metadatas")
|
208
209
|
|
209
210
|
@ec2_metadatas.setter
|
210
|
-
def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
211
|
+
def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
211
212
|
pulumi.set(self, "ec2_metadatas", value)
|
212
213
|
|
213
214
|
@property
|
214
215
|
@pulumi.getter(name="iamAlias")
|
215
|
-
def iam_alias(self) -> Optional[pulumi.Input[str]]:
|
216
|
+
def iam_alias(self) -> Optional[pulumi.Input[builtins.str]]:
|
216
217
|
"""
|
217
218
|
How to generate the identity alias when using the iam auth method. Valid choices are
|
218
219
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
@@ -220,12 +221,12 @@ class _AuthBackendConfigIdentityState:
|
|
220
221
|
return pulumi.get(self, "iam_alias")
|
221
222
|
|
222
223
|
@iam_alias.setter
|
223
|
-
def iam_alias(self, value: Optional[pulumi.Input[str]]):
|
224
|
+
def iam_alias(self, value: Optional[pulumi.Input[builtins.str]]):
|
224
225
|
pulumi.set(self, "iam_alias", value)
|
225
226
|
|
226
227
|
@property
|
227
228
|
@pulumi.getter(name="iamMetadatas")
|
228
|
-
def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
229
|
+
def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
229
230
|
"""
|
230
231
|
The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
231
232
|
added to both audit logs, and on the `iam_alias`
|
@@ -233,12 +234,12 @@ class _AuthBackendConfigIdentityState:
|
|
233
234
|
return pulumi.get(self, "iam_metadatas")
|
234
235
|
|
235
236
|
@iam_metadatas.setter
|
236
|
-
def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
237
|
+
def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
237
238
|
pulumi.set(self, "iam_metadatas", value)
|
238
239
|
|
239
240
|
@property
|
240
241
|
@pulumi.getter
|
241
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
242
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
242
243
|
"""
|
243
244
|
The namespace to provision the resource in.
|
244
245
|
The value should not contain leading or trailing forward slashes.
|
@@ -248,7 +249,7 @@ class _AuthBackendConfigIdentityState:
|
|
248
249
|
return pulumi.get(self, "namespace")
|
249
250
|
|
250
251
|
@namespace.setter
|
251
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
252
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
252
253
|
pulumi.set(self, "namespace", value)
|
253
254
|
|
254
255
|
|
@@ -257,12 +258,12 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
257
258
|
def __init__(__self__,
|
258
259
|
resource_name: str,
|
259
260
|
opts: Optional[pulumi.ResourceOptions] = None,
|
260
|
-
backend: Optional[pulumi.Input[str]] = None,
|
261
|
-
ec2_alias: Optional[pulumi.Input[str]] = None,
|
262
|
-
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
263
|
-
iam_alias: Optional[pulumi.Input[str]] = None,
|
264
|
-
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
265
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
261
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
262
|
+
ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
|
263
|
+
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
264
|
+
iam_alias: Optional[pulumi.Input[builtins.str]] = None,
|
265
|
+
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
266
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
266
267
|
__props__=None):
|
267
268
|
"""
|
268
269
|
Manages an AWS auth backend identity configuration in a Vault server. This configuration defines how Vault interacts
|
@@ -295,16 +296,16 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
295
296
|
|
296
297
|
:param str resource_name: The name of the resource.
|
297
298
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
298
|
-
:param pulumi.Input[str] backend: Unique name of the auth backend to configure.
|
299
|
-
:param pulumi.Input[str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
299
|
+
:param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
|
300
|
+
:param pulumi.Input[builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
300
301
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
301
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
302
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
302
303
|
added to both audit logs, and on the `ec2_alias`
|
303
|
-
:param pulumi.Input[str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
|
304
|
+
:param pulumi.Input[builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
|
304
305
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
305
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
306
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
306
307
|
added to both audit logs, and on the `iam_alias`
|
307
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
308
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
308
309
|
The value should not contain leading or trailing forward slashes.
|
309
310
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
310
311
|
*Available only for Vault Enterprise*.
|
@@ -359,12 +360,12 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
359
360
|
def _internal_init(__self__,
|
360
361
|
resource_name: str,
|
361
362
|
opts: Optional[pulumi.ResourceOptions] = None,
|
362
|
-
backend: Optional[pulumi.Input[str]] = None,
|
363
|
-
ec2_alias: Optional[pulumi.Input[str]] = None,
|
364
|
-
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
365
|
-
iam_alias: Optional[pulumi.Input[str]] = None,
|
366
|
-
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
367
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
363
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
364
|
+
ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
|
365
|
+
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
366
|
+
iam_alias: Optional[pulumi.Input[builtins.str]] = None,
|
367
|
+
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
368
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
368
369
|
__props__=None):
|
369
370
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
370
371
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -390,12 +391,12 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
390
391
|
def get(resource_name: str,
|
391
392
|
id: pulumi.Input[str],
|
392
393
|
opts: Optional[pulumi.ResourceOptions] = None,
|
393
|
-
backend: Optional[pulumi.Input[str]] = None,
|
394
|
-
ec2_alias: Optional[pulumi.Input[str]] = None,
|
395
|
-
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
396
|
-
iam_alias: Optional[pulumi.Input[str]] = None,
|
397
|
-
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
398
|
-
namespace: Optional[pulumi.Input[str]] = None) -> 'AuthBackendConfigIdentity':
|
394
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
395
|
+
ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
|
396
|
+
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
397
|
+
iam_alias: Optional[pulumi.Input[builtins.str]] = None,
|
398
|
+
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
399
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendConfigIdentity':
|
399
400
|
"""
|
400
401
|
Get an existing AuthBackendConfigIdentity resource's state with the given name, id, and optional extra
|
401
402
|
properties used to qualify the lookup.
|
@@ -403,16 +404,16 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
403
404
|
:param str resource_name: The unique name of the resulting resource.
|
404
405
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
405
406
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
406
|
-
:param pulumi.Input[str] backend: Unique name of the auth backend to configure.
|
407
|
-
:param pulumi.Input[str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
407
|
+
:param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
|
408
|
+
:param pulumi.Input[builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
408
409
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
409
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
410
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
410
411
|
added to both audit logs, and on the `ec2_alias`
|
411
|
-
:param pulumi.Input[str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
|
412
|
+
:param pulumi.Input[builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
|
412
413
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
413
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
414
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
414
415
|
added to both audit logs, and on the `iam_alias`
|
415
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
416
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
416
417
|
The value should not contain leading or trailing forward slashes.
|
417
418
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
418
419
|
*Available only for Vault Enterprise*.
|
@@ -431,7 +432,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
431
432
|
|
432
433
|
@property
|
433
434
|
@pulumi.getter
|
434
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
435
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
435
436
|
"""
|
436
437
|
Unique name of the auth backend to configure.
|
437
438
|
"""
|
@@ -439,7 +440,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
439
440
|
|
440
441
|
@property
|
441
442
|
@pulumi.getter(name="ec2Alias")
|
442
|
-
def ec2_alias(self) -> pulumi.Output[Optional[str]]:
|
443
|
+
def ec2_alias(self) -> pulumi.Output[Optional[builtins.str]]:
|
443
444
|
"""
|
444
445
|
How to generate the identity alias when using the ec2 auth method. Valid choices are
|
445
446
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
@@ -448,7 +449,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
448
449
|
|
449
450
|
@property
|
450
451
|
@pulumi.getter(name="ec2Metadatas")
|
451
|
-
def ec2_metadatas(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
452
|
+
def ec2_metadatas(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
452
453
|
"""
|
453
454
|
The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
454
455
|
added to both audit logs, and on the `ec2_alias`
|
@@ -457,7 +458,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
457
458
|
|
458
459
|
@property
|
459
460
|
@pulumi.getter(name="iamAlias")
|
460
|
-
def iam_alias(self) -> pulumi.Output[Optional[str]]:
|
461
|
+
def iam_alias(self) -> pulumi.Output[Optional[builtins.str]]:
|
461
462
|
"""
|
462
463
|
How to generate the identity alias when using the iam auth method. Valid choices are
|
463
464
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
@@ -466,7 +467,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
466
467
|
|
467
468
|
@property
|
468
469
|
@pulumi.getter(name="iamMetadatas")
|
469
|
-
def iam_metadatas(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
470
|
+
def iam_metadatas(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
470
471
|
"""
|
471
472
|
The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
472
473
|
added to both audit logs, and on the `iam_alias`
|
@@ -475,7 +476,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
475
476
|
|
476
477
|
@property
|
477
478
|
@pulumi.getter
|
478
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
479
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
479
480
|
"""
|
480
481
|
The namespace to provision the resource in.
|
481
482
|
The value should not contain leading or trailing forward slashes.
|