pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,24 +19,24 @@ __all__ = ['AuthBackendConfigIdentityArgs', 'AuthBackendConfigIdentity']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendConfigIdentityArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: Optional[pulumi.Input[
|
24
|
-
ec2_alias: Optional[pulumi.Input[
|
25
|
-
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
iam_alias: Optional[pulumi.Input[
|
27
|
-
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
29
28
|
"""
|
30
29
|
The set of arguments for constructing a AuthBackendConfigIdentity resource.
|
31
|
-
:param pulumi.Input[
|
32
|
-
:param pulumi.Input[
|
30
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
|
31
|
+
:param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
33
32
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
34
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
33
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
35
34
|
added to both audit logs, and on the `ec2_alias`
|
36
|
-
:param pulumi.Input[
|
35
|
+
:param pulumi.Input[_builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
|
37
36
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
38
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
39
38
|
added to both audit logs, and on the `iam_alias`
|
40
|
-
:param pulumi.Input[
|
39
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
41
40
|
The value should not contain leading or trailing forward slashes.
|
42
41
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
43
42
|
*Available only for Vault Enterprise*.
|
@@ -55,21 +54,21 @@ class AuthBackendConfigIdentityArgs:
|
|
55
54
|
if namespace is not None:
|
56
55
|
pulumi.set(__self__, "namespace", namespace)
|
57
56
|
|
58
|
-
@property
|
57
|
+
@_builtins.property
|
59
58
|
@pulumi.getter
|
60
|
-
def backend(self) -> Optional[pulumi.Input[
|
59
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
61
60
|
"""
|
62
61
|
Unique name of the auth backend to configure.
|
63
62
|
"""
|
64
63
|
return pulumi.get(self, "backend")
|
65
64
|
|
66
65
|
@backend.setter
|
67
|
-
def backend(self, value: Optional[pulumi.Input[
|
66
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
68
67
|
pulumi.set(self, "backend", value)
|
69
68
|
|
70
|
-
@property
|
69
|
+
@_builtins.property
|
71
70
|
@pulumi.getter(name="ec2Alias")
|
72
|
-
def ec2_alias(self) -> Optional[pulumi.Input[
|
71
|
+
def ec2_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
|
73
72
|
"""
|
74
73
|
How to generate the identity alias when using the ec2 auth method. Valid choices are
|
75
74
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
@@ -77,12 +76,12 @@ class AuthBackendConfigIdentityArgs:
|
|
77
76
|
return pulumi.get(self, "ec2_alias")
|
78
77
|
|
79
78
|
@ec2_alias.setter
|
80
|
-
def ec2_alias(self, value: Optional[pulumi.Input[
|
79
|
+
def ec2_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
|
81
80
|
pulumi.set(self, "ec2_alias", value)
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter(name="ec2Metadatas")
|
85
|
-
def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
84
|
+
def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
86
85
|
"""
|
87
86
|
The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
88
87
|
added to both audit logs, and on the `ec2_alias`
|
@@ -90,12 +89,12 @@ class AuthBackendConfigIdentityArgs:
|
|
90
89
|
return pulumi.get(self, "ec2_metadatas")
|
91
90
|
|
92
91
|
@ec2_metadatas.setter
|
93
|
-
def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
92
|
+
def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
94
93
|
pulumi.set(self, "ec2_metadatas", value)
|
95
94
|
|
96
|
-
@property
|
95
|
+
@_builtins.property
|
97
96
|
@pulumi.getter(name="iamAlias")
|
98
|
-
def iam_alias(self) -> Optional[pulumi.Input[
|
97
|
+
def iam_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
|
99
98
|
"""
|
100
99
|
How to generate the identity alias when using the iam auth method. Valid choices are
|
101
100
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
@@ -103,12 +102,12 @@ class AuthBackendConfigIdentityArgs:
|
|
103
102
|
return pulumi.get(self, "iam_alias")
|
104
103
|
|
105
104
|
@iam_alias.setter
|
106
|
-
def iam_alias(self, value: Optional[pulumi.Input[
|
105
|
+
def iam_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
|
107
106
|
pulumi.set(self, "iam_alias", value)
|
108
107
|
|
109
|
-
@property
|
108
|
+
@_builtins.property
|
110
109
|
@pulumi.getter(name="iamMetadatas")
|
111
|
-
def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
110
|
+
def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
112
111
|
"""
|
113
112
|
The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
114
113
|
added to both audit logs, and on the `iam_alias`
|
@@ -116,12 +115,12 @@ class AuthBackendConfigIdentityArgs:
|
|
116
115
|
return pulumi.get(self, "iam_metadatas")
|
117
116
|
|
118
117
|
@iam_metadatas.setter
|
119
|
-
def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
118
|
+
def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
120
119
|
pulumi.set(self, "iam_metadatas", value)
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter
|
124
|
-
def namespace(self) -> Optional[pulumi.Input[
|
123
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
125
124
|
"""
|
126
125
|
The namespace to provision the resource in.
|
127
126
|
The value should not contain leading or trailing forward slashes.
|
@@ -131,31 +130,31 @@ class AuthBackendConfigIdentityArgs:
|
|
131
130
|
return pulumi.get(self, "namespace")
|
132
131
|
|
133
132
|
@namespace.setter
|
134
|
-
def namespace(self, value: Optional[pulumi.Input[
|
133
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
135
134
|
pulumi.set(self, "namespace", value)
|
136
135
|
|
137
136
|
|
138
137
|
@pulumi.input_type
|
139
138
|
class _AuthBackendConfigIdentityState:
|
140
139
|
def __init__(__self__, *,
|
141
|
-
backend: Optional[pulumi.Input[
|
142
|
-
ec2_alias: Optional[pulumi.Input[
|
143
|
-
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
144
|
-
iam_alias: Optional[pulumi.Input[
|
145
|
-
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
146
|
-
namespace: Optional[pulumi.Input[
|
140
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
141
|
+
ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
|
142
|
+
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
143
|
+
iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
|
144
|
+
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
145
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
147
146
|
"""
|
148
147
|
Input properties used for looking up and filtering AuthBackendConfigIdentity resources.
|
149
|
-
:param pulumi.Input[
|
150
|
-
:param pulumi.Input[
|
148
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
|
149
|
+
:param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
151
150
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
152
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
151
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
153
152
|
added to both audit logs, and on the `ec2_alias`
|
154
|
-
:param pulumi.Input[
|
153
|
+
:param pulumi.Input[_builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
|
155
154
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
156
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
155
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
157
156
|
added to both audit logs, and on the `iam_alias`
|
158
|
-
:param pulumi.Input[
|
157
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
159
158
|
The value should not contain leading or trailing forward slashes.
|
160
159
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
161
160
|
*Available only for Vault Enterprise*.
|
@@ -173,21 +172,21 @@ class _AuthBackendConfigIdentityState:
|
|
173
172
|
if namespace is not None:
|
174
173
|
pulumi.set(__self__, "namespace", namespace)
|
175
174
|
|
176
|
-
@property
|
175
|
+
@_builtins.property
|
177
176
|
@pulumi.getter
|
178
|
-
def backend(self) -> Optional[pulumi.Input[
|
177
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
179
178
|
"""
|
180
179
|
Unique name of the auth backend to configure.
|
181
180
|
"""
|
182
181
|
return pulumi.get(self, "backend")
|
183
182
|
|
184
183
|
@backend.setter
|
185
|
-
def backend(self, value: Optional[pulumi.Input[
|
184
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
186
185
|
pulumi.set(self, "backend", value)
|
187
186
|
|
188
|
-
@property
|
187
|
+
@_builtins.property
|
189
188
|
@pulumi.getter(name="ec2Alias")
|
190
|
-
def ec2_alias(self) -> Optional[pulumi.Input[
|
189
|
+
def ec2_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
|
191
190
|
"""
|
192
191
|
How to generate the identity alias when using the ec2 auth method. Valid choices are
|
193
192
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
@@ -195,12 +194,12 @@ class _AuthBackendConfigIdentityState:
|
|
195
194
|
return pulumi.get(self, "ec2_alias")
|
196
195
|
|
197
196
|
@ec2_alias.setter
|
198
|
-
def ec2_alias(self, value: Optional[pulumi.Input[
|
197
|
+
def ec2_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
|
199
198
|
pulumi.set(self, "ec2_alias", value)
|
200
199
|
|
201
|
-
@property
|
200
|
+
@_builtins.property
|
202
201
|
@pulumi.getter(name="ec2Metadatas")
|
203
|
-
def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
202
|
+
def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
204
203
|
"""
|
205
204
|
The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
206
205
|
added to both audit logs, and on the `ec2_alias`
|
@@ -208,12 +207,12 @@ class _AuthBackendConfigIdentityState:
|
|
208
207
|
return pulumi.get(self, "ec2_metadatas")
|
209
208
|
|
210
209
|
@ec2_metadatas.setter
|
211
|
-
def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
210
|
+
def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
212
211
|
pulumi.set(self, "ec2_metadatas", value)
|
213
212
|
|
214
|
-
@property
|
213
|
+
@_builtins.property
|
215
214
|
@pulumi.getter(name="iamAlias")
|
216
|
-
def iam_alias(self) -> Optional[pulumi.Input[
|
215
|
+
def iam_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
|
217
216
|
"""
|
218
217
|
How to generate the identity alias when using the iam auth method. Valid choices are
|
219
218
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
@@ -221,12 +220,12 @@ class _AuthBackendConfigIdentityState:
|
|
221
220
|
return pulumi.get(self, "iam_alias")
|
222
221
|
|
223
222
|
@iam_alias.setter
|
224
|
-
def iam_alias(self, value: Optional[pulumi.Input[
|
223
|
+
def iam_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
|
225
224
|
pulumi.set(self, "iam_alias", value)
|
226
225
|
|
227
|
-
@property
|
226
|
+
@_builtins.property
|
228
227
|
@pulumi.getter(name="iamMetadatas")
|
229
|
-
def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
228
|
+
def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
230
229
|
"""
|
231
230
|
The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
232
231
|
added to both audit logs, and on the `iam_alias`
|
@@ -234,12 +233,12 @@ class _AuthBackendConfigIdentityState:
|
|
234
233
|
return pulumi.get(self, "iam_metadatas")
|
235
234
|
|
236
235
|
@iam_metadatas.setter
|
237
|
-
def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
236
|
+
def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
238
237
|
pulumi.set(self, "iam_metadatas", value)
|
239
238
|
|
240
|
-
@property
|
239
|
+
@_builtins.property
|
241
240
|
@pulumi.getter
|
242
|
-
def namespace(self) -> Optional[pulumi.Input[
|
241
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
243
242
|
"""
|
244
243
|
The namespace to provision the resource in.
|
245
244
|
The value should not contain leading or trailing forward slashes.
|
@@ -249,7 +248,7 @@ class _AuthBackendConfigIdentityState:
|
|
249
248
|
return pulumi.get(self, "namespace")
|
250
249
|
|
251
250
|
@namespace.setter
|
252
|
-
def namespace(self, value: Optional[pulumi.Input[
|
251
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
253
252
|
pulumi.set(self, "namespace", value)
|
254
253
|
|
255
254
|
|
@@ -259,12 +258,12 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
259
258
|
def __init__(__self__,
|
260
259
|
resource_name: str,
|
261
260
|
opts: Optional[pulumi.ResourceOptions] = None,
|
262
|
-
backend: Optional[pulumi.Input[
|
263
|
-
ec2_alias: Optional[pulumi.Input[
|
264
|
-
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
265
|
-
iam_alias: Optional[pulumi.Input[
|
266
|
-
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
267
|
-
namespace: Optional[pulumi.Input[
|
261
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
262
|
+
ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
|
263
|
+
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
264
|
+
iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
|
265
|
+
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
266
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
268
267
|
__props__=None):
|
269
268
|
"""
|
270
269
|
Manages an AWS auth backend identity configuration in a Vault server. This configuration defines how Vault interacts
|
@@ -297,16 +296,16 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
297
296
|
|
298
297
|
:param str resource_name: The name of the resource.
|
299
298
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
300
|
-
:param pulumi.Input[
|
301
|
-
:param pulumi.Input[
|
299
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
|
300
|
+
:param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
302
301
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
303
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
302
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
304
303
|
added to both audit logs, and on the `ec2_alias`
|
305
|
-
:param pulumi.Input[
|
304
|
+
:param pulumi.Input[_builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
|
306
305
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
307
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
306
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
308
307
|
added to both audit logs, and on the `iam_alias`
|
309
|
-
:param pulumi.Input[
|
308
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
310
309
|
The value should not contain leading or trailing forward slashes.
|
311
310
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
312
311
|
*Available only for Vault Enterprise*.
|
@@ -361,12 +360,12 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
361
360
|
def _internal_init(__self__,
|
362
361
|
resource_name: str,
|
363
362
|
opts: Optional[pulumi.ResourceOptions] = None,
|
364
|
-
backend: Optional[pulumi.Input[
|
365
|
-
ec2_alias: Optional[pulumi.Input[
|
366
|
-
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
367
|
-
iam_alias: Optional[pulumi.Input[
|
368
|
-
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
369
|
-
namespace: Optional[pulumi.Input[
|
363
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
364
|
+
ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
|
365
|
+
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
366
|
+
iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
|
367
|
+
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
368
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
370
369
|
__props__=None):
|
371
370
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
372
371
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -392,12 +391,12 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
392
391
|
def get(resource_name: str,
|
393
392
|
id: pulumi.Input[str],
|
394
393
|
opts: Optional[pulumi.ResourceOptions] = None,
|
395
|
-
backend: Optional[pulumi.Input[
|
396
|
-
ec2_alias: Optional[pulumi.Input[
|
397
|
-
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
398
|
-
iam_alias: Optional[pulumi.Input[
|
399
|
-
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[
|
400
|
-
namespace: Optional[pulumi.Input[
|
394
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
395
|
+
ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
|
396
|
+
ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
397
|
+
iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
|
398
|
+
iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
399
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendConfigIdentity':
|
401
400
|
"""
|
402
401
|
Get an existing AuthBackendConfigIdentity resource's state with the given name, id, and optional extra
|
403
402
|
properties used to qualify the lookup.
|
@@ -405,16 +404,16 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
405
404
|
:param str resource_name: The unique name of the resulting resource.
|
406
405
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
407
406
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
408
|
-
:param pulumi.Input[
|
409
|
-
:param pulumi.Input[
|
407
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
|
408
|
+
:param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
|
410
409
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
411
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
410
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
412
411
|
added to both audit logs, and on the `ec2_alias`
|
413
|
-
:param pulumi.Input[
|
412
|
+
:param pulumi.Input[_builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
|
414
413
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
415
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
414
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
416
415
|
added to both audit logs, and on the `iam_alias`
|
417
|
-
:param pulumi.Input[
|
416
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
418
417
|
The value should not contain leading or trailing forward slashes.
|
419
418
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
420
419
|
*Available only for Vault Enterprise*.
|
@@ -431,53 +430,53 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
|
|
431
430
|
__props__.__dict__["namespace"] = namespace
|
432
431
|
return AuthBackendConfigIdentity(resource_name, opts=opts, __props__=__props__)
|
433
432
|
|
434
|
-
@property
|
433
|
+
@_builtins.property
|
435
434
|
@pulumi.getter
|
436
|
-
def backend(self) -> pulumi.Output[Optional[
|
435
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
437
436
|
"""
|
438
437
|
Unique name of the auth backend to configure.
|
439
438
|
"""
|
440
439
|
return pulumi.get(self, "backend")
|
441
440
|
|
442
|
-
@property
|
441
|
+
@_builtins.property
|
443
442
|
@pulumi.getter(name="ec2Alias")
|
444
|
-
def ec2_alias(self) -> pulumi.Output[Optional[
|
443
|
+
def ec2_alias(self) -> pulumi.Output[Optional[_builtins.str]]:
|
445
444
|
"""
|
446
445
|
How to generate the identity alias when using the ec2 auth method. Valid choices are
|
447
446
|
`role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
|
448
447
|
"""
|
449
448
|
return pulumi.get(self, "ec2_alias")
|
450
449
|
|
451
|
-
@property
|
450
|
+
@_builtins.property
|
452
451
|
@pulumi.getter(name="ec2Metadatas")
|
453
|
-
def ec2_metadatas(self) -> pulumi.Output[Optional[Sequence[
|
452
|
+
def ec2_metadatas(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
454
453
|
"""
|
455
454
|
The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
456
455
|
added to both audit logs, and on the `ec2_alias`
|
457
456
|
"""
|
458
457
|
return pulumi.get(self, "ec2_metadatas")
|
459
458
|
|
460
|
-
@property
|
459
|
+
@_builtins.property
|
461
460
|
@pulumi.getter(name="iamAlias")
|
462
|
-
def iam_alias(self) -> pulumi.Output[Optional[
|
461
|
+
def iam_alias(self) -> pulumi.Output[Optional[_builtins.str]]:
|
463
462
|
"""
|
464
463
|
How to generate the identity alias when using the iam auth method. Valid choices are
|
465
464
|
`role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
|
466
465
|
"""
|
467
466
|
return pulumi.get(self, "iam_alias")
|
468
467
|
|
469
|
-
@property
|
468
|
+
@_builtins.property
|
470
469
|
@pulumi.getter(name="iamMetadatas")
|
471
|
-
def iam_metadatas(self) -> pulumi.Output[Optional[Sequence[
|
470
|
+
def iam_metadatas(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
472
471
|
"""
|
473
472
|
The metadata to include on the token returned by the `login` endpoint. This metadata will be
|
474
473
|
added to both audit logs, and on the `iam_alias`
|
475
474
|
"""
|
476
475
|
return pulumi.get(self, "iam_metadatas")
|
477
476
|
|
478
|
-
@property
|
477
|
+
@_builtins.property
|
479
478
|
@pulumi.getter
|
480
|
-
def namespace(self) -> pulumi.Output[Optional[
|
479
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
481
480
|
"""
|
482
481
|
The namespace to provision the resource in.
|
483
482
|
The value should not contain leading or trailing forward slashes.
|