pulumi-vault 7.1.0a1752118888__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0a1752118888.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/provider.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -21,8 +20,8 @@ __all__ = ['ProviderArgs', 'Provider']
|
|
21
20
|
@pulumi.input_type
|
22
21
|
class ProviderArgs:
|
23
22
|
def __init__(__self__, *,
|
24
|
-
add_address_to_env: Optional[pulumi.Input[
|
25
|
-
address: Optional[pulumi.Input[
|
23
|
+
add_address_to_env: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
26
25
|
auth_login: Optional[pulumi.Input['ProviderAuthLoginArgs']] = None,
|
27
26
|
auth_login_aws: Optional[pulumi.Input['ProviderAuthLoginAwsArgs']] = None,
|
28
27
|
auth_login_azure: Optional[pulumi.Input['ProviderAuthLoginAzureArgs']] = None,
|
@@ -35,25 +34,25 @@ class ProviderArgs:
|
|
35
34
|
auth_login_radius: Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']] = None,
|
36
35
|
auth_login_token_file: Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']] = None,
|
37
36
|
auth_login_userpass: Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']] = None,
|
38
|
-
ca_cert_dir: Optional[pulumi.Input[
|
39
|
-
ca_cert_file: Optional[pulumi.Input[
|
37
|
+
ca_cert_dir: Optional[pulumi.Input[_builtins.str]] = None,
|
38
|
+
ca_cert_file: Optional[pulumi.Input[_builtins.str]] = None,
|
40
39
|
client_auth: Optional[pulumi.Input['ProviderClientAuthArgs']] = None,
|
41
40
|
headers: Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]] = None,
|
42
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
43
|
-
max_retries: Optional[pulumi.Input[
|
44
|
-
max_retries_ccc: Optional[pulumi.Input[
|
45
|
-
namespace: Optional[pulumi.Input[
|
46
|
-
set_namespace_from_token: Optional[pulumi.Input[
|
47
|
-
skip_child_token: Optional[pulumi.Input[
|
48
|
-
skip_get_vault_version: Optional[pulumi.Input[
|
49
|
-
skip_tls_verify: Optional[pulumi.Input[
|
50
|
-
tls_server_name: Optional[pulumi.Input[
|
51
|
-
token: Optional[pulumi.Input[
|
52
|
-
token_name: Optional[pulumi.Input[
|
53
|
-
vault_version_override: Optional[pulumi.Input[
|
41
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
42
|
+
max_retries: Optional[pulumi.Input[_builtins.int]] = None,
|
43
|
+
max_retries_ccc: Optional[pulumi.Input[_builtins.int]] = None,
|
44
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
45
|
+
set_namespace_from_token: Optional[pulumi.Input[_builtins.bool]] = None,
|
46
|
+
skip_child_token: Optional[pulumi.Input[_builtins.bool]] = None,
|
47
|
+
skip_get_vault_version: Optional[pulumi.Input[_builtins.bool]] = None,
|
48
|
+
skip_tls_verify: Optional[pulumi.Input[_builtins.bool]] = None,
|
49
|
+
tls_server_name: Optional[pulumi.Input[_builtins.str]] = None,
|
50
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
51
|
+
token_name: Optional[pulumi.Input[_builtins.str]] = None,
|
52
|
+
vault_version_override: Optional[pulumi.Input[_builtins.str]] = None):
|
54
53
|
"""
|
55
54
|
The set of arguments for constructing a Provider resource.
|
56
|
-
:param pulumi.Input[
|
55
|
+
:param pulumi.Input[_builtins.str] address: URL of the root of the target Vault server.
|
57
56
|
:param pulumi.Input['ProviderAuthLoginArgs'] auth_login: Login to vault with an existing auth method using auth/<mount>/login
|
58
57
|
:param pulumi.Input['ProviderAuthLoginAwsArgs'] auth_login_aws: Login to vault using the AWS method
|
59
58
|
:param pulumi.Input['ProviderAuthLoginAzureArgs'] auth_login_azure: Login to vault using the azure method
|
@@ -66,23 +65,23 @@ class ProviderArgs:
|
|
66
65
|
:param pulumi.Input['ProviderAuthLoginRadiusArgs'] auth_login_radius: Login to vault using the radius method
|
67
66
|
:param pulumi.Input['ProviderAuthLoginTokenFileArgs'] auth_login_token_file: Login to vault using
|
68
67
|
:param pulumi.Input['ProviderAuthLoginUserpassArgs'] auth_login_userpass: Login to vault using the userpass method
|
69
|
-
:param pulumi.Input[
|
70
|
-
:param pulumi.Input[
|
68
|
+
:param pulumi.Input[_builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
|
69
|
+
:param pulumi.Input[_builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
|
71
70
|
:param pulumi.Input['ProviderClientAuthArgs'] client_auth: Client authentication credentials.
|
72
71
|
:param pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]] headers: The headers to send with each Vault request.
|
73
|
-
:param pulumi.Input[
|
74
|
-
:param pulumi.Input[
|
75
|
-
:param pulumi.Input[
|
76
|
-
:param pulumi.Input[
|
77
|
-
:param pulumi.Input[
|
72
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
|
73
|
+
:param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
|
74
|
+
:param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
|
75
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
|
76
|
+
:param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
78
77
|
token namespace as the root namespace for all resources.
|
79
|
-
:param pulumi.Input[
|
80
|
-
:param pulumi.Input[
|
81
|
-
:param pulumi.Input[
|
82
|
-
:param pulumi.Input[
|
83
|
-
:param pulumi.Input[
|
84
|
-
:param pulumi.Input[
|
85
|
-
:param pulumi.Input[
|
78
|
+
:param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
|
79
|
+
:param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
|
80
|
+
:param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
|
81
|
+
:param pulumi.Input[_builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
|
82
|
+
:param pulumi.Input[_builtins.str] token: Token to use to authenticate to Vault.
|
83
|
+
:param pulumi.Input[_builtins.str] token_name: Token name to use for creating the Vault child token.
|
84
|
+
:param pulumi.Input[_builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
|
86
85
|
"""
|
87
86
|
if add_address_to_env is not None:
|
88
87
|
pulumi.set(__self__, "add_address_to_env", add_address_to_env)
|
@@ -151,28 +150,28 @@ class ProviderArgs:
|
|
151
150
|
if vault_version_override is not None:
|
152
151
|
pulumi.set(__self__, "vault_version_override", vault_version_override)
|
153
152
|
|
154
|
-
@property
|
153
|
+
@_builtins.property
|
155
154
|
@pulumi.getter(name="addAddressToEnv")
|
156
|
-
def add_address_to_env(self) -> Optional[pulumi.Input[
|
155
|
+
def add_address_to_env(self) -> Optional[pulumi.Input[_builtins.str]]:
|
157
156
|
return pulumi.get(self, "add_address_to_env")
|
158
157
|
|
159
158
|
@add_address_to_env.setter
|
160
|
-
def add_address_to_env(self, value: Optional[pulumi.Input[
|
159
|
+
def add_address_to_env(self, value: Optional[pulumi.Input[_builtins.str]]):
|
161
160
|
pulumi.set(self, "add_address_to_env", value)
|
162
161
|
|
163
|
-
@property
|
162
|
+
@_builtins.property
|
164
163
|
@pulumi.getter
|
165
|
-
def address(self) -> Optional[pulumi.Input[
|
164
|
+
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
166
165
|
"""
|
167
166
|
URL of the root of the target Vault server.
|
168
167
|
"""
|
169
168
|
return pulumi.get(self, "address")
|
170
169
|
|
171
170
|
@address.setter
|
172
|
-
def address(self, value: Optional[pulumi.Input[
|
171
|
+
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
173
172
|
pulumi.set(self, "address", value)
|
174
173
|
|
175
|
-
@property
|
174
|
+
@_builtins.property
|
176
175
|
@pulumi.getter(name="authLogin")
|
177
176
|
def auth_login(self) -> Optional[pulumi.Input['ProviderAuthLoginArgs']]:
|
178
177
|
"""
|
@@ -184,7 +183,7 @@ class ProviderArgs:
|
|
184
183
|
def auth_login(self, value: Optional[pulumi.Input['ProviderAuthLoginArgs']]):
|
185
184
|
pulumi.set(self, "auth_login", value)
|
186
185
|
|
187
|
-
@property
|
186
|
+
@_builtins.property
|
188
187
|
@pulumi.getter(name="authLoginAws")
|
189
188
|
def auth_login_aws(self) -> Optional[pulumi.Input['ProviderAuthLoginAwsArgs']]:
|
190
189
|
"""
|
@@ -196,7 +195,7 @@ class ProviderArgs:
|
|
196
195
|
def auth_login_aws(self, value: Optional[pulumi.Input['ProviderAuthLoginAwsArgs']]):
|
197
196
|
pulumi.set(self, "auth_login_aws", value)
|
198
197
|
|
199
|
-
@property
|
198
|
+
@_builtins.property
|
200
199
|
@pulumi.getter(name="authLoginAzure")
|
201
200
|
def auth_login_azure(self) -> Optional[pulumi.Input['ProviderAuthLoginAzureArgs']]:
|
202
201
|
"""
|
@@ -208,7 +207,7 @@ class ProviderArgs:
|
|
208
207
|
def auth_login_azure(self, value: Optional[pulumi.Input['ProviderAuthLoginAzureArgs']]):
|
209
208
|
pulumi.set(self, "auth_login_azure", value)
|
210
209
|
|
211
|
-
@property
|
210
|
+
@_builtins.property
|
212
211
|
@pulumi.getter(name="authLoginCert")
|
213
212
|
def auth_login_cert(self) -> Optional[pulumi.Input['ProviderAuthLoginCertArgs']]:
|
214
213
|
"""
|
@@ -220,7 +219,7 @@ class ProviderArgs:
|
|
220
219
|
def auth_login_cert(self, value: Optional[pulumi.Input['ProviderAuthLoginCertArgs']]):
|
221
220
|
pulumi.set(self, "auth_login_cert", value)
|
222
221
|
|
223
|
-
@property
|
222
|
+
@_builtins.property
|
224
223
|
@pulumi.getter(name="authLoginGcp")
|
225
224
|
def auth_login_gcp(self) -> Optional[pulumi.Input['ProviderAuthLoginGcpArgs']]:
|
226
225
|
"""
|
@@ -232,7 +231,7 @@ class ProviderArgs:
|
|
232
231
|
def auth_login_gcp(self, value: Optional[pulumi.Input['ProviderAuthLoginGcpArgs']]):
|
233
232
|
pulumi.set(self, "auth_login_gcp", value)
|
234
233
|
|
235
|
-
@property
|
234
|
+
@_builtins.property
|
236
235
|
@pulumi.getter(name="authLoginJwt")
|
237
236
|
def auth_login_jwt(self) -> Optional[pulumi.Input['ProviderAuthLoginJwtArgs']]:
|
238
237
|
"""
|
@@ -244,7 +243,7 @@ class ProviderArgs:
|
|
244
243
|
def auth_login_jwt(self, value: Optional[pulumi.Input['ProviderAuthLoginJwtArgs']]):
|
245
244
|
pulumi.set(self, "auth_login_jwt", value)
|
246
245
|
|
247
|
-
@property
|
246
|
+
@_builtins.property
|
248
247
|
@pulumi.getter(name="authLoginKerberos")
|
249
248
|
def auth_login_kerberos(self) -> Optional[pulumi.Input['ProviderAuthLoginKerberosArgs']]:
|
250
249
|
"""
|
@@ -256,7 +255,7 @@ class ProviderArgs:
|
|
256
255
|
def auth_login_kerberos(self, value: Optional[pulumi.Input['ProviderAuthLoginKerberosArgs']]):
|
257
256
|
pulumi.set(self, "auth_login_kerberos", value)
|
258
257
|
|
259
|
-
@property
|
258
|
+
@_builtins.property
|
260
259
|
@pulumi.getter(name="authLoginOci")
|
261
260
|
def auth_login_oci(self) -> Optional[pulumi.Input['ProviderAuthLoginOciArgs']]:
|
262
261
|
"""
|
@@ -268,7 +267,7 @@ class ProviderArgs:
|
|
268
267
|
def auth_login_oci(self, value: Optional[pulumi.Input['ProviderAuthLoginOciArgs']]):
|
269
268
|
pulumi.set(self, "auth_login_oci", value)
|
270
269
|
|
271
|
-
@property
|
270
|
+
@_builtins.property
|
272
271
|
@pulumi.getter(name="authLoginOidc")
|
273
272
|
def auth_login_oidc(self) -> Optional[pulumi.Input['ProviderAuthLoginOidcArgs']]:
|
274
273
|
"""
|
@@ -280,7 +279,7 @@ class ProviderArgs:
|
|
280
279
|
def auth_login_oidc(self, value: Optional[pulumi.Input['ProviderAuthLoginOidcArgs']]):
|
281
280
|
pulumi.set(self, "auth_login_oidc", value)
|
282
281
|
|
283
|
-
@property
|
282
|
+
@_builtins.property
|
284
283
|
@pulumi.getter(name="authLoginRadius")
|
285
284
|
def auth_login_radius(self) -> Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']]:
|
286
285
|
"""
|
@@ -292,7 +291,7 @@ class ProviderArgs:
|
|
292
291
|
def auth_login_radius(self, value: Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']]):
|
293
292
|
pulumi.set(self, "auth_login_radius", value)
|
294
293
|
|
295
|
-
@property
|
294
|
+
@_builtins.property
|
296
295
|
@pulumi.getter(name="authLoginTokenFile")
|
297
296
|
def auth_login_token_file(self) -> Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']]:
|
298
297
|
"""
|
@@ -304,7 +303,7 @@ class ProviderArgs:
|
|
304
303
|
def auth_login_token_file(self, value: Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']]):
|
305
304
|
pulumi.set(self, "auth_login_token_file", value)
|
306
305
|
|
307
|
-
@property
|
306
|
+
@_builtins.property
|
308
307
|
@pulumi.getter(name="authLoginUserpass")
|
309
308
|
def auth_login_userpass(self) -> Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']]:
|
310
309
|
"""
|
@@ -316,31 +315,31 @@ class ProviderArgs:
|
|
316
315
|
def auth_login_userpass(self, value: Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']]):
|
317
316
|
pulumi.set(self, "auth_login_userpass", value)
|
318
317
|
|
319
|
-
@property
|
318
|
+
@_builtins.property
|
320
319
|
@pulumi.getter(name="caCertDir")
|
321
|
-
def ca_cert_dir(self) -> Optional[pulumi.Input[
|
320
|
+
def ca_cert_dir(self) -> Optional[pulumi.Input[_builtins.str]]:
|
322
321
|
"""
|
323
322
|
Path to directory containing CA certificate files to validate the server's certificate.
|
324
323
|
"""
|
325
324
|
return pulumi.get(self, "ca_cert_dir")
|
326
325
|
|
327
326
|
@ca_cert_dir.setter
|
328
|
-
def ca_cert_dir(self, value: Optional[pulumi.Input[
|
327
|
+
def ca_cert_dir(self, value: Optional[pulumi.Input[_builtins.str]]):
|
329
328
|
pulumi.set(self, "ca_cert_dir", value)
|
330
329
|
|
331
|
-
@property
|
330
|
+
@_builtins.property
|
332
331
|
@pulumi.getter(name="caCertFile")
|
333
|
-
def ca_cert_file(self) -> Optional[pulumi.Input[
|
332
|
+
def ca_cert_file(self) -> Optional[pulumi.Input[_builtins.str]]:
|
334
333
|
"""
|
335
334
|
Path to a CA certificate file to validate the server's certificate.
|
336
335
|
"""
|
337
336
|
return pulumi.get(self, "ca_cert_file")
|
338
337
|
|
339
338
|
@ca_cert_file.setter
|
340
|
-
def ca_cert_file(self, value: Optional[pulumi.Input[
|
339
|
+
def ca_cert_file(self, value: Optional[pulumi.Input[_builtins.str]]):
|
341
340
|
pulumi.set(self, "ca_cert_file", value)
|
342
341
|
|
343
|
-
@property
|
342
|
+
@_builtins.property
|
344
343
|
@pulumi.getter(name="clientAuth")
|
345
344
|
def client_auth(self) -> Optional[pulumi.Input['ProviderClientAuthArgs']]:
|
346
345
|
"""
|
@@ -352,7 +351,7 @@ class ProviderArgs:
|
|
352
351
|
def client_auth(self, value: Optional[pulumi.Input['ProviderClientAuthArgs']]):
|
353
352
|
pulumi.set(self, "client_auth", value)
|
354
353
|
|
355
|
-
@property
|
354
|
+
@_builtins.property
|
356
355
|
@pulumi.getter
|
357
356
|
def headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]]:
|
358
357
|
"""
|
@@ -364,57 +363,57 @@ class ProviderArgs:
|
|
364
363
|
def headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]]):
|
365
364
|
pulumi.set(self, "headers", value)
|
366
365
|
|
367
|
-
@property
|
366
|
+
@_builtins.property
|
368
367
|
@pulumi.getter(name="maxLeaseTtlSeconds")
|
369
|
-
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[
|
368
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
370
369
|
"""
|
371
370
|
Maximum TTL for secret leases requested by this provider.
|
372
371
|
"""
|
373
372
|
return pulumi.get(self, "max_lease_ttl_seconds")
|
374
373
|
|
375
374
|
@max_lease_ttl_seconds.setter
|
376
|
-
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[
|
375
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
377
376
|
pulumi.set(self, "max_lease_ttl_seconds", value)
|
378
377
|
|
379
|
-
@property
|
378
|
+
@_builtins.property
|
380
379
|
@pulumi.getter(name="maxRetries")
|
381
|
-
def max_retries(self) -> Optional[pulumi.Input[
|
380
|
+
def max_retries(self) -> Optional[pulumi.Input[_builtins.int]]:
|
382
381
|
"""
|
383
382
|
Maximum number of retries when a 5xx error code is encountered.
|
384
383
|
"""
|
385
384
|
return pulumi.get(self, "max_retries")
|
386
385
|
|
387
386
|
@max_retries.setter
|
388
|
-
def max_retries(self, value: Optional[pulumi.Input[
|
387
|
+
def max_retries(self, value: Optional[pulumi.Input[_builtins.int]]):
|
389
388
|
pulumi.set(self, "max_retries", value)
|
390
389
|
|
391
|
-
@property
|
390
|
+
@_builtins.property
|
392
391
|
@pulumi.getter(name="maxRetriesCcc")
|
393
|
-
def max_retries_ccc(self) -> Optional[pulumi.Input[
|
392
|
+
def max_retries_ccc(self) -> Optional[pulumi.Input[_builtins.int]]:
|
394
393
|
"""
|
395
394
|
Maximum number of retries for Client Controlled Consistency related operations
|
396
395
|
"""
|
397
396
|
return pulumi.get(self, "max_retries_ccc")
|
398
397
|
|
399
398
|
@max_retries_ccc.setter
|
400
|
-
def max_retries_ccc(self, value: Optional[pulumi.Input[
|
399
|
+
def max_retries_ccc(self, value: Optional[pulumi.Input[_builtins.int]]):
|
401
400
|
pulumi.set(self, "max_retries_ccc", value)
|
402
401
|
|
403
|
-
@property
|
402
|
+
@_builtins.property
|
404
403
|
@pulumi.getter
|
405
|
-
def namespace(self) -> Optional[pulumi.Input[
|
404
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
406
405
|
"""
|
407
406
|
The namespace to use. Available only for Vault Enterprise.
|
408
407
|
"""
|
409
408
|
return pulumi.get(self, "namespace")
|
410
409
|
|
411
410
|
@namespace.setter
|
412
|
-
def namespace(self, value: Optional[pulumi.Input[
|
411
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
413
412
|
pulumi.set(self, "namespace", value)
|
414
413
|
|
415
|
-
@property
|
414
|
+
@_builtins.property
|
416
415
|
@pulumi.getter(name="setNamespaceFromToken")
|
417
|
-
def set_namespace_from_token(self) -> Optional[pulumi.Input[
|
416
|
+
def set_namespace_from_token(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
418
417
|
"""
|
419
418
|
In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
420
419
|
token namespace as the root namespace for all resources.
|
@@ -422,91 +421,91 @@ class ProviderArgs:
|
|
422
421
|
return pulumi.get(self, "set_namespace_from_token")
|
423
422
|
|
424
423
|
@set_namespace_from_token.setter
|
425
|
-
def set_namespace_from_token(self, value: Optional[pulumi.Input[
|
424
|
+
def set_namespace_from_token(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
426
425
|
pulumi.set(self, "set_namespace_from_token", value)
|
427
426
|
|
428
|
-
@property
|
427
|
+
@_builtins.property
|
429
428
|
@pulumi.getter(name="skipChildToken")
|
430
|
-
def skip_child_token(self) -> Optional[pulumi.Input[
|
429
|
+
def skip_child_token(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
431
430
|
"""
|
432
431
|
Set this to true to prevent the creation of ephemeral child token used by this provider.
|
433
432
|
"""
|
434
433
|
return pulumi.get(self, "skip_child_token")
|
435
434
|
|
436
435
|
@skip_child_token.setter
|
437
|
-
def skip_child_token(self, value: Optional[pulumi.Input[
|
436
|
+
def skip_child_token(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
438
437
|
pulumi.set(self, "skip_child_token", value)
|
439
438
|
|
440
|
-
@property
|
439
|
+
@_builtins.property
|
441
440
|
@pulumi.getter(name="skipGetVaultVersion")
|
442
|
-
def skip_get_vault_version(self) -> Optional[pulumi.Input[
|
441
|
+
def skip_get_vault_version(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
443
442
|
"""
|
444
443
|
Skip the dynamic fetching of the Vault server version.
|
445
444
|
"""
|
446
445
|
return pulumi.get(self, "skip_get_vault_version")
|
447
446
|
|
448
447
|
@skip_get_vault_version.setter
|
449
|
-
def skip_get_vault_version(self, value: Optional[pulumi.Input[
|
448
|
+
def skip_get_vault_version(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
450
449
|
pulumi.set(self, "skip_get_vault_version", value)
|
451
450
|
|
452
|
-
@property
|
451
|
+
@_builtins.property
|
453
452
|
@pulumi.getter(name="skipTlsVerify")
|
454
|
-
def skip_tls_verify(self) -> Optional[pulumi.Input[
|
453
|
+
def skip_tls_verify(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
455
454
|
"""
|
456
455
|
Set this to true only if the target Vault server is an insecure development instance.
|
457
456
|
"""
|
458
457
|
return pulumi.get(self, "skip_tls_verify")
|
459
458
|
|
460
459
|
@skip_tls_verify.setter
|
461
|
-
def skip_tls_verify(self, value: Optional[pulumi.Input[
|
460
|
+
def skip_tls_verify(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
462
461
|
pulumi.set(self, "skip_tls_verify", value)
|
463
462
|
|
464
|
-
@property
|
463
|
+
@_builtins.property
|
465
464
|
@pulumi.getter(name="tlsServerName")
|
466
|
-
def tls_server_name(self) -> Optional[pulumi.Input[
|
465
|
+
def tls_server_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
467
466
|
"""
|
468
467
|
Name to use as the SNI host when connecting via TLS.
|
469
468
|
"""
|
470
469
|
return pulumi.get(self, "tls_server_name")
|
471
470
|
|
472
471
|
@tls_server_name.setter
|
473
|
-
def tls_server_name(self, value: Optional[pulumi.Input[
|
472
|
+
def tls_server_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
474
473
|
pulumi.set(self, "tls_server_name", value)
|
475
474
|
|
476
|
-
@property
|
475
|
+
@_builtins.property
|
477
476
|
@pulumi.getter
|
478
|
-
def token(self) -> Optional[pulumi.Input[
|
477
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
479
478
|
"""
|
480
479
|
Token to use to authenticate to Vault.
|
481
480
|
"""
|
482
481
|
return pulumi.get(self, "token")
|
483
482
|
|
484
483
|
@token.setter
|
485
|
-
def token(self, value: Optional[pulumi.Input[
|
484
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
486
485
|
pulumi.set(self, "token", value)
|
487
486
|
|
488
|
-
@property
|
487
|
+
@_builtins.property
|
489
488
|
@pulumi.getter(name="tokenName")
|
490
|
-
def token_name(self) -> Optional[pulumi.Input[
|
489
|
+
def token_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
491
490
|
"""
|
492
491
|
Token name to use for creating the Vault child token.
|
493
492
|
"""
|
494
493
|
return pulumi.get(self, "token_name")
|
495
494
|
|
496
495
|
@token_name.setter
|
497
|
-
def token_name(self, value: Optional[pulumi.Input[
|
496
|
+
def token_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
498
497
|
pulumi.set(self, "token_name", value)
|
499
498
|
|
500
|
-
@property
|
499
|
+
@_builtins.property
|
501
500
|
@pulumi.getter(name="vaultVersionOverride")
|
502
|
-
def vault_version_override(self) -> Optional[pulumi.Input[
|
501
|
+
def vault_version_override(self) -> Optional[pulumi.Input[_builtins.str]]:
|
503
502
|
"""
|
504
503
|
Override the Vault server version, which is normally determined dynamically from the target Vault server
|
505
504
|
"""
|
506
505
|
return pulumi.get(self, "vault_version_override")
|
507
506
|
|
508
507
|
@vault_version_override.setter
|
509
|
-
def vault_version_override(self, value: Optional[pulumi.Input[
|
508
|
+
def vault_version_override(self, value: Optional[pulumi.Input[_builtins.str]]):
|
510
509
|
pulumi.set(self, "vault_version_override", value)
|
511
510
|
|
512
511
|
|
@@ -516,8 +515,8 @@ class Provider(pulumi.ProviderResource):
|
|
516
515
|
def __init__(__self__,
|
517
516
|
resource_name: str,
|
518
517
|
opts: Optional[pulumi.ResourceOptions] = None,
|
519
|
-
add_address_to_env: Optional[pulumi.Input[
|
520
|
-
address: Optional[pulumi.Input[
|
518
|
+
add_address_to_env: Optional[pulumi.Input[_builtins.str]] = None,
|
519
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
521
520
|
auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
|
522
521
|
auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
|
523
522
|
auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
|
@@ -530,22 +529,22 @@ class Provider(pulumi.ProviderResource):
|
|
530
529
|
auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
|
531
530
|
auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
|
532
531
|
auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
|
533
|
-
ca_cert_dir: Optional[pulumi.Input[
|
534
|
-
ca_cert_file: Optional[pulumi.Input[
|
532
|
+
ca_cert_dir: Optional[pulumi.Input[_builtins.str]] = None,
|
533
|
+
ca_cert_file: Optional[pulumi.Input[_builtins.str]] = None,
|
535
534
|
client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
|
536
535
|
headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
|
537
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
538
|
-
max_retries: Optional[pulumi.Input[
|
539
|
-
max_retries_ccc: Optional[pulumi.Input[
|
540
|
-
namespace: Optional[pulumi.Input[
|
541
|
-
set_namespace_from_token: Optional[pulumi.Input[
|
542
|
-
skip_child_token: Optional[pulumi.Input[
|
543
|
-
skip_get_vault_version: Optional[pulumi.Input[
|
544
|
-
skip_tls_verify: Optional[pulumi.Input[
|
545
|
-
tls_server_name: Optional[pulumi.Input[
|
546
|
-
token: Optional[pulumi.Input[
|
547
|
-
token_name: Optional[pulumi.Input[
|
548
|
-
vault_version_override: Optional[pulumi.Input[
|
536
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
537
|
+
max_retries: Optional[pulumi.Input[_builtins.int]] = None,
|
538
|
+
max_retries_ccc: Optional[pulumi.Input[_builtins.int]] = None,
|
539
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
540
|
+
set_namespace_from_token: Optional[pulumi.Input[_builtins.bool]] = None,
|
541
|
+
skip_child_token: Optional[pulumi.Input[_builtins.bool]] = None,
|
542
|
+
skip_get_vault_version: Optional[pulumi.Input[_builtins.bool]] = None,
|
543
|
+
skip_tls_verify: Optional[pulumi.Input[_builtins.bool]] = None,
|
544
|
+
tls_server_name: Optional[pulumi.Input[_builtins.str]] = None,
|
545
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
546
|
+
token_name: Optional[pulumi.Input[_builtins.str]] = None,
|
547
|
+
vault_version_override: Optional[pulumi.Input[_builtins.str]] = None,
|
549
548
|
__props__=None):
|
550
549
|
"""
|
551
550
|
The provider type for the vault package. By default, resources use package-wide configuration
|
@@ -555,7 +554,7 @@ class Provider(pulumi.ProviderResource):
|
|
555
554
|
|
556
555
|
:param str resource_name: The name of the resource.
|
557
556
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
558
|
-
:param pulumi.Input[
|
557
|
+
:param pulumi.Input[_builtins.str] address: URL of the root of the target Vault server.
|
559
558
|
:param pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']] auth_login: Login to vault with an existing auth method using auth/<mount>/login
|
560
559
|
:param pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']] auth_login_aws: Login to vault using the AWS method
|
561
560
|
:param pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']] auth_login_azure: Login to vault using the azure method
|
@@ -568,23 +567,23 @@ class Provider(pulumi.ProviderResource):
|
|
568
567
|
:param pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']] auth_login_radius: Login to vault using the radius method
|
569
568
|
:param pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']] auth_login_token_file: Login to vault using
|
570
569
|
:param pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']] auth_login_userpass: Login to vault using the userpass method
|
571
|
-
:param pulumi.Input[
|
572
|
-
:param pulumi.Input[
|
570
|
+
:param pulumi.Input[_builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
|
571
|
+
:param pulumi.Input[_builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
|
573
572
|
:param pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']] client_auth: Client authentication credentials.
|
574
573
|
:param pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]] headers: The headers to send with each Vault request.
|
575
|
-
:param pulumi.Input[
|
576
|
-
:param pulumi.Input[
|
577
|
-
:param pulumi.Input[
|
578
|
-
:param pulumi.Input[
|
579
|
-
:param pulumi.Input[
|
574
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
|
575
|
+
:param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
|
576
|
+
:param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
|
577
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
|
578
|
+
:param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
|
580
579
|
token namespace as the root namespace for all resources.
|
581
|
-
:param pulumi.Input[
|
582
|
-
:param pulumi.Input[
|
583
|
-
:param pulumi.Input[
|
584
|
-
:param pulumi.Input[
|
585
|
-
:param pulumi.Input[
|
586
|
-
:param pulumi.Input[
|
587
|
-
:param pulumi.Input[
|
580
|
+
:param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
|
581
|
+
:param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
|
582
|
+
:param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
|
583
|
+
:param pulumi.Input[_builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
|
584
|
+
:param pulumi.Input[_builtins.str] token: Token to use to authenticate to Vault.
|
585
|
+
:param pulumi.Input[_builtins.str] token_name: Token name to use for creating the Vault child token.
|
586
|
+
:param pulumi.Input[_builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
|
588
587
|
"""
|
589
588
|
...
|
590
589
|
@overload
|
@@ -613,8 +612,8 @@ class Provider(pulumi.ProviderResource):
|
|
613
612
|
def _internal_init(__self__,
|
614
613
|
resource_name: str,
|
615
614
|
opts: Optional[pulumi.ResourceOptions] = None,
|
616
|
-
add_address_to_env: Optional[pulumi.Input[
|
617
|
-
address: Optional[pulumi.Input[
|
615
|
+
add_address_to_env: Optional[pulumi.Input[_builtins.str]] = None,
|
616
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
618
617
|
auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
|
619
618
|
auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
|
620
619
|
auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
|
@@ -627,22 +626,22 @@ class Provider(pulumi.ProviderResource):
|
|
627
626
|
auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
|
628
627
|
auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
|
629
628
|
auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
|
630
|
-
ca_cert_dir: Optional[pulumi.Input[
|
631
|
-
ca_cert_file: Optional[pulumi.Input[
|
629
|
+
ca_cert_dir: Optional[pulumi.Input[_builtins.str]] = None,
|
630
|
+
ca_cert_file: Optional[pulumi.Input[_builtins.str]] = None,
|
632
631
|
client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
|
633
632
|
headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
|
634
|
-
max_lease_ttl_seconds: Optional[pulumi.Input[
|
635
|
-
max_retries: Optional[pulumi.Input[
|
636
|
-
max_retries_ccc: Optional[pulumi.Input[
|
637
|
-
namespace: Optional[pulumi.Input[
|
638
|
-
set_namespace_from_token: Optional[pulumi.Input[
|
639
|
-
skip_child_token: Optional[pulumi.Input[
|
640
|
-
skip_get_vault_version: Optional[pulumi.Input[
|
641
|
-
skip_tls_verify: Optional[pulumi.Input[
|
642
|
-
tls_server_name: Optional[pulumi.Input[
|
643
|
-
token: Optional[pulumi.Input[
|
644
|
-
token_name: Optional[pulumi.Input[
|
645
|
-
vault_version_override: Optional[pulumi.Input[
|
633
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
634
|
+
max_retries: Optional[pulumi.Input[_builtins.int]] = None,
|
635
|
+
max_retries_ccc: Optional[pulumi.Input[_builtins.int]] = None,
|
636
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
637
|
+
set_namespace_from_token: Optional[pulumi.Input[_builtins.bool]] = None,
|
638
|
+
skip_child_token: Optional[pulumi.Input[_builtins.bool]] = None,
|
639
|
+
skip_get_vault_version: Optional[pulumi.Input[_builtins.bool]] = None,
|
640
|
+
skip_tls_verify: Optional[pulumi.Input[_builtins.bool]] = None,
|
641
|
+
tls_server_name: Optional[pulumi.Input[_builtins.str]] = None,
|
642
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
643
|
+
token_name: Optional[pulumi.Input[_builtins.str]] = None,
|
644
|
+
vault_version_override: Optional[pulumi.Input[_builtins.str]] = None,
|
646
645
|
__props__=None):
|
647
646
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
648
647
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -694,70 +693,70 @@ class Provider(pulumi.ProviderResource):
|
|
694
693
|
__props__,
|
695
694
|
opts)
|
696
695
|
|
697
|
-
@property
|
696
|
+
@_builtins.property
|
698
697
|
@pulumi.getter(name="addAddressToEnv")
|
699
|
-
def add_address_to_env(self) -> pulumi.Output[Optional[
|
698
|
+
def add_address_to_env(self) -> pulumi.Output[Optional[_builtins.str]]:
|
700
699
|
return pulumi.get(self, "add_address_to_env")
|
701
700
|
|
702
|
-
@property
|
701
|
+
@_builtins.property
|
703
702
|
@pulumi.getter
|
704
|
-
def address(self) -> pulumi.Output[Optional[
|
703
|
+
def address(self) -> pulumi.Output[Optional[_builtins.str]]:
|
705
704
|
"""
|
706
705
|
URL of the root of the target Vault server.
|
707
706
|
"""
|
708
707
|
return pulumi.get(self, "address")
|
709
708
|
|
710
|
-
@property
|
709
|
+
@_builtins.property
|
711
710
|
@pulumi.getter(name="caCertDir")
|
712
|
-
def ca_cert_dir(self) -> pulumi.Output[Optional[
|
711
|
+
def ca_cert_dir(self) -> pulumi.Output[Optional[_builtins.str]]:
|
713
712
|
"""
|
714
713
|
Path to directory containing CA certificate files to validate the server's certificate.
|
715
714
|
"""
|
716
715
|
return pulumi.get(self, "ca_cert_dir")
|
717
716
|
|
718
|
-
@property
|
717
|
+
@_builtins.property
|
719
718
|
@pulumi.getter(name="caCertFile")
|
720
|
-
def ca_cert_file(self) -> pulumi.Output[Optional[
|
719
|
+
def ca_cert_file(self) -> pulumi.Output[Optional[_builtins.str]]:
|
721
720
|
"""
|
722
721
|
Path to a CA certificate file to validate the server's certificate.
|
723
722
|
"""
|
724
723
|
return pulumi.get(self, "ca_cert_file")
|
725
724
|
|
726
|
-
@property
|
725
|
+
@_builtins.property
|
727
726
|
@pulumi.getter
|
728
|
-
def namespace(self) -> pulumi.Output[Optional[
|
727
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
729
728
|
"""
|
730
729
|
The namespace to use. Available only for Vault Enterprise.
|
731
730
|
"""
|
732
731
|
return pulumi.get(self, "namespace")
|
733
732
|
|
734
|
-
@property
|
733
|
+
@_builtins.property
|
735
734
|
@pulumi.getter(name="tlsServerName")
|
736
|
-
def tls_server_name(self) -> pulumi.Output[Optional[
|
735
|
+
def tls_server_name(self) -> pulumi.Output[Optional[_builtins.str]]:
|
737
736
|
"""
|
738
737
|
Name to use as the SNI host when connecting via TLS.
|
739
738
|
"""
|
740
739
|
return pulumi.get(self, "tls_server_name")
|
741
740
|
|
742
|
-
@property
|
741
|
+
@_builtins.property
|
743
742
|
@pulumi.getter
|
744
|
-
def token(self) -> pulumi.Output[Optional[
|
743
|
+
def token(self) -> pulumi.Output[Optional[_builtins.str]]:
|
745
744
|
"""
|
746
745
|
Token to use to authenticate to Vault.
|
747
746
|
"""
|
748
747
|
return pulumi.get(self, "token")
|
749
748
|
|
750
|
-
@property
|
749
|
+
@_builtins.property
|
751
750
|
@pulumi.getter(name="tokenName")
|
752
|
-
def token_name(self) -> pulumi.Output[Optional[
|
751
|
+
def token_name(self) -> pulumi.Output[Optional[_builtins.str]]:
|
753
752
|
"""
|
754
753
|
Token name to use for creating the Vault child token.
|
755
754
|
"""
|
756
755
|
return pulumi.get(self, "token_name")
|
757
756
|
|
758
|
-
@property
|
757
|
+
@_builtins.property
|
759
758
|
@pulumi.getter(name="vaultVersionOverride")
|
760
|
-
def vault_version_override(self) -> pulumi.Output[Optional[
|
759
|
+
def vault_version_override(self) -> pulumi.Output[Optional[_builtins.str]]:
|
761
760
|
"""
|
762
761
|
Override the Vault server version, which is normally determined dynamically from the target Vault server
|
763
762
|
"""
|
@@ -770,7 +769,7 @@ class Provider(pulumi.ProviderResource):
|
|
770
769
|
raise TypeError("Expected argument 'result' to be a dict")
|
771
770
|
pulumi.set(__self__, "result", result)
|
772
771
|
|
773
|
-
@property
|
772
|
+
@_builtins.property
|
774
773
|
@pulumi.getter
|
775
774
|
def result(self) -> Mapping[str, Any]:
|
776
775
|
return pulumi.get(self, "result")
|