pulumi-vault 7.1.0a1752118888__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0a1752118888.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/_inputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -18,6 +17,8 @@ from . import _utilities
|
|
18
17
|
__all__ = [
|
19
18
|
'AuthBackendTuneArgs',
|
20
19
|
'AuthBackendTuneArgsDict',
|
20
|
+
'OciAuthBackendTuneArgs',
|
21
|
+
'OciAuthBackendTuneArgsDict',
|
21
22
|
'ProviderAuthLoginArgs',
|
22
23
|
'ProviderAuthLoginArgsDict',
|
23
24
|
'ProviderAuthLoginAwsArgs',
|
@@ -58,44 +59,44 @@ MYPY = False
|
|
58
59
|
|
59
60
|
if not MYPY:
|
60
61
|
class AuthBackendTuneArgsDict(TypedDict):
|
61
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
62
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
62
63
|
"""
|
63
64
|
List of headers to whitelist and allowing
|
64
65
|
a plugin to include them in the response.
|
65
66
|
"""
|
66
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
67
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
67
68
|
"""
|
68
69
|
Specifies the list of keys that will
|
69
70
|
not be HMAC'd by audit devices in the request data object.
|
70
71
|
"""
|
71
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
72
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
72
73
|
"""
|
73
74
|
Specifies the list of keys that will
|
74
75
|
not be HMAC'd by audit devices in the response data object.
|
75
76
|
"""
|
76
|
-
default_lease_ttl: NotRequired[pulumi.Input[
|
77
|
+
default_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
77
78
|
"""
|
78
79
|
Specifies the default time-to-live.
|
79
80
|
If set, this overrides the global default.
|
80
81
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
81
82
|
"""
|
82
|
-
listing_visibility: NotRequired[pulumi.Input[
|
83
|
+
listing_visibility: NotRequired[pulumi.Input[_builtins.str]]
|
83
84
|
"""
|
84
85
|
Specifies whether to show this mount in
|
85
86
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
86
87
|
"""
|
87
|
-
max_lease_ttl: NotRequired[pulumi.Input[
|
88
|
+
max_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
88
89
|
"""
|
89
90
|
Specifies the maximum time-to-live.
|
90
91
|
If set, this overrides the global default.
|
91
92
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
92
93
|
"""
|
93
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
94
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
94
95
|
"""
|
95
96
|
List of headers to whitelist and
|
96
97
|
pass from the request to the backend.
|
97
98
|
"""
|
98
|
-
token_type: NotRequired[pulumi.Input[
|
99
|
+
token_type: NotRequired[pulumi.Input[_builtins.str]]
|
99
100
|
"""
|
100
101
|
Specifies the type of tokens that should be returned by
|
101
102
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -106,32 +107,32 @@ elif False:
|
|
106
107
|
@pulumi.input_type
|
107
108
|
class AuthBackendTuneArgs:
|
108
109
|
def __init__(__self__, *,
|
109
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
110
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
111
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
112
|
-
default_lease_ttl: Optional[pulumi.Input[
|
113
|
-
listing_visibility: Optional[pulumi.Input[
|
114
|
-
max_lease_ttl: Optional[pulumi.Input[
|
115
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
116
|
-
token_type: Optional[pulumi.Input[
|
117
|
-
"""
|
118
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
110
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
111
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
112
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
113
|
+
default_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
114
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
115
|
+
max_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
116
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
117
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
118
|
+
"""
|
119
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
|
119
120
|
a plugin to include them in the response.
|
120
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
121
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
|
121
122
|
not be HMAC'd by audit devices in the request data object.
|
122
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
123
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
|
123
124
|
not be HMAC'd by audit devices in the response data object.
|
124
|
-
:param pulumi.Input[
|
125
|
+
:param pulumi.Input[_builtins.str] default_lease_ttl: Specifies the default time-to-live.
|
125
126
|
If set, this overrides the global default.
|
126
127
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
127
|
-
:param pulumi.Input[
|
128
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in
|
128
129
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
129
|
-
:param pulumi.Input[
|
130
|
+
:param pulumi.Input[_builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
|
130
131
|
If set, this overrides the global default.
|
131
132
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
132
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
133
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to whitelist and
|
133
134
|
pass from the request to the backend.
|
134
|
-
:param pulumi.Input[
|
135
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
135
136
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
136
137
|
"""
|
137
138
|
if allowed_response_headers is not None:
|
@@ -151,9 +152,9 @@ class AuthBackendTuneArgs:
|
|
151
152
|
if token_type is not None:
|
152
153
|
pulumi.set(__self__, "token_type", token_type)
|
153
154
|
|
154
|
-
@property
|
155
|
+
@_builtins.property
|
155
156
|
@pulumi.getter(name="allowedResponseHeaders")
|
156
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
157
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
157
158
|
"""
|
158
159
|
List of headers to whitelist and allowing
|
159
160
|
a plugin to include them in the response.
|
@@ -161,12 +162,12 @@ class AuthBackendTuneArgs:
|
|
161
162
|
return pulumi.get(self, "allowed_response_headers")
|
162
163
|
|
163
164
|
@allowed_response_headers.setter
|
164
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
165
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
165
166
|
pulumi.set(self, "allowed_response_headers", value)
|
166
167
|
|
167
|
-
@property
|
168
|
+
@_builtins.property
|
168
169
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
169
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
170
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
170
171
|
"""
|
171
172
|
Specifies the list of keys that will
|
172
173
|
not be HMAC'd by audit devices in the request data object.
|
@@ -174,12 +175,12 @@ class AuthBackendTuneArgs:
|
|
174
175
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
175
176
|
|
176
177
|
@audit_non_hmac_request_keys.setter
|
177
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
178
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
178
179
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
179
180
|
|
180
|
-
@property
|
181
|
+
@_builtins.property
|
181
182
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
182
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
183
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
183
184
|
"""
|
184
185
|
Specifies the list of keys that will
|
185
186
|
not be HMAC'd by audit devices in the response data object.
|
@@ -187,12 +188,12 @@ class AuthBackendTuneArgs:
|
|
187
188
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
188
189
|
|
189
190
|
@audit_non_hmac_response_keys.setter
|
190
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
191
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
191
192
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
192
193
|
|
193
|
-
@property
|
194
|
+
@_builtins.property
|
194
195
|
@pulumi.getter(name="defaultLeaseTtl")
|
195
|
-
def default_lease_ttl(self) -> Optional[pulumi.Input[
|
196
|
+
def default_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
196
197
|
"""
|
197
198
|
Specifies the default time-to-live.
|
198
199
|
If set, this overrides the global default.
|
@@ -201,12 +202,12 @@ class AuthBackendTuneArgs:
|
|
201
202
|
return pulumi.get(self, "default_lease_ttl")
|
202
203
|
|
203
204
|
@default_lease_ttl.setter
|
204
|
-
def default_lease_ttl(self, value: Optional[pulumi.Input[
|
205
|
+
def default_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
205
206
|
pulumi.set(self, "default_lease_ttl", value)
|
206
207
|
|
207
|
-
@property
|
208
|
+
@_builtins.property
|
208
209
|
@pulumi.getter(name="listingVisibility")
|
209
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
210
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
210
211
|
"""
|
211
212
|
Specifies whether to show this mount in
|
212
213
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
@@ -214,12 +215,12 @@ class AuthBackendTuneArgs:
|
|
214
215
|
return pulumi.get(self, "listing_visibility")
|
215
216
|
|
216
217
|
@listing_visibility.setter
|
217
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
218
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
218
219
|
pulumi.set(self, "listing_visibility", value)
|
219
220
|
|
220
|
-
@property
|
221
|
+
@_builtins.property
|
221
222
|
@pulumi.getter(name="maxLeaseTtl")
|
222
|
-
def max_lease_ttl(self) -> Optional[pulumi.Input[
|
223
|
+
def max_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
223
224
|
"""
|
224
225
|
Specifies the maximum time-to-live.
|
225
226
|
If set, this overrides the global default.
|
@@ -228,12 +229,12 @@ class AuthBackendTuneArgs:
|
|
228
229
|
return pulumi.get(self, "max_lease_ttl")
|
229
230
|
|
230
231
|
@max_lease_ttl.setter
|
231
|
-
def max_lease_ttl(self, value: Optional[pulumi.Input[
|
232
|
+
def max_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
232
233
|
pulumi.set(self, "max_lease_ttl", value)
|
233
234
|
|
234
|
-
@property
|
235
|
+
@_builtins.property
|
235
236
|
@pulumi.getter(name="passthroughRequestHeaders")
|
236
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
237
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
237
238
|
"""
|
238
239
|
List of headers to whitelist and
|
239
240
|
pass from the request to the backend.
|
@@ -241,12 +242,12 @@ class AuthBackendTuneArgs:
|
|
241
242
|
return pulumi.get(self, "passthrough_request_headers")
|
242
243
|
|
243
244
|
@passthrough_request_headers.setter
|
244
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
245
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
245
246
|
pulumi.set(self, "passthrough_request_headers", value)
|
246
247
|
|
247
|
-
@property
|
248
|
+
@_builtins.property
|
248
249
|
@pulumi.getter(name="tokenType")
|
249
|
-
def token_type(self) -> Optional[pulumi.Input[
|
250
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
250
251
|
"""
|
251
252
|
Specifies the type of tokens that should be returned by
|
252
253
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -254,20 +255,219 @@ class AuthBackendTuneArgs:
|
|
254
255
|
return pulumi.get(self, "token_type")
|
255
256
|
|
256
257
|
@token_type.setter
|
257
|
-
def token_type(self, value: Optional[pulumi.Input[
|
258
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
259
|
+
pulumi.set(self, "token_type", value)
|
260
|
+
|
261
|
+
|
262
|
+
if not MYPY:
|
263
|
+
class OciAuthBackendTuneArgsDict(TypedDict):
|
264
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
265
|
+
"""
|
266
|
+
List of headers to whitelist and allowing
|
267
|
+
a plugin to include them in the response.
|
268
|
+
"""
|
269
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
270
|
+
"""
|
271
|
+
Specifies the list of keys that will
|
272
|
+
not be HMAC'd by audit devices in the request data object.
|
273
|
+
"""
|
274
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
275
|
+
"""
|
276
|
+
Specifies the list of keys that will
|
277
|
+
not be HMAC'd by audit devices in the response data object.
|
278
|
+
"""
|
279
|
+
default_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
280
|
+
"""
|
281
|
+
Specifies the default time-to-live.
|
282
|
+
If set, this overrides the global default.
|
283
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
284
|
+
"""
|
285
|
+
listing_visibility: NotRequired[pulumi.Input[_builtins.str]]
|
286
|
+
"""
|
287
|
+
Specifies whether to show this mount in
|
288
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
289
|
+
"""
|
290
|
+
max_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
291
|
+
"""
|
292
|
+
Specifies the maximum time-to-live.
|
293
|
+
If set, this overrides the global default.
|
294
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
295
|
+
"""
|
296
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
297
|
+
"""
|
298
|
+
List of headers to whitelist and
|
299
|
+
pass from the request to the backend.
|
300
|
+
"""
|
301
|
+
token_type: NotRequired[pulumi.Input[_builtins.str]]
|
302
|
+
"""
|
303
|
+
Specifies the type of tokens that should be returned by the mount.
|
304
|
+
"""
|
305
|
+
elif False:
|
306
|
+
OciAuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
307
|
+
|
308
|
+
@pulumi.input_type
|
309
|
+
class OciAuthBackendTuneArgs:
|
310
|
+
def __init__(__self__, *,
|
311
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
312
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
313
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
314
|
+
default_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
315
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
316
|
+
max_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
317
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
318
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
319
|
+
"""
|
320
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
|
321
|
+
a plugin to include them in the response.
|
322
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
|
323
|
+
not be HMAC'd by audit devices in the request data object.
|
324
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
|
325
|
+
not be HMAC'd by audit devices in the response data object.
|
326
|
+
:param pulumi.Input[_builtins.str] default_lease_ttl: Specifies the default time-to-live.
|
327
|
+
If set, this overrides the global default.
|
328
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
329
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in
|
330
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
331
|
+
:param pulumi.Input[_builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
|
332
|
+
If set, this overrides the global default.
|
333
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
334
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to whitelist and
|
335
|
+
pass from the request to the backend.
|
336
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by the mount.
|
337
|
+
"""
|
338
|
+
if allowed_response_headers is not None:
|
339
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
340
|
+
if audit_non_hmac_request_keys is not None:
|
341
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
342
|
+
if audit_non_hmac_response_keys is not None:
|
343
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
344
|
+
if default_lease_ttl is not None:
|
345
|
+
pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
|
346
|
+
if listing_visibility is not None:
|
347
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
348
|
+
if max_lease_ttl is not None:
|
349
|
+
pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
|
350
|
+
if passthrough_request_headers is not None:
|
351
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
352
|
+
if token_type is not None:
|
353
|
+
pulumi.set(__self__, "token_type", token_type)
|
354
|
+
|
355
|
+
@_builtins.property
|
356
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
357
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
358
|
+
"""
|
359
|
+
List of headers to whitelist and allowing
|
360
|
+
a plugin to include them in the response.
|
361
|
+
"""
|
362
|
+
return pulumi.get(self, "allowed_response_headers")
|
363
|
+
|
364
|
+
@allowed_response_headers.setter
|
365
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
366
|
+
pulumi.set(self, "allowed_response_headers", value)
|
367
|
+
|
368
|
+
@_builtins.property
|
369
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
370
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
371
|
+
"""
|
372
|
+
Specifies the list of keys that will
|
373
|
+
not be HMAC'd by audit devices in the request data object.
|
374
|
+
"""
|
375
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
376
|
+
|
377
|
+
@audit_non_hmac_request_keys.setter
|
378
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
379
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
380
|
+
|
381
|
+
@_builtins.property
|
382
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
383
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
384
|
+
"""
|
385
|
+
Specifies the list of keys that will
|
386
|
+
not be HMAC'd by audit devices in the response data object.
|
387
|
+
"""
|
388
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
389
|
+
|
390
|
+
@audit_non_hmac_response_keys.setter
|
391
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
392
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
393
|
+
|
394
|
+
@_builtins.property
|
395
|
+
@pulumi.getter(name="defaultLeaseTtl")
|
396
|
+
def default_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
397
|
+
"""
|
398
|
+
Specifies the default time-to-live.
|
399
|
+
If set, this overrides the global default.
|
400
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
401
|
+
"""
|
402
|
+
return pulumi.get(self, "default_lease_ttl")
|
403
|
+
|
404
|
+
@default_lease_ttl.setter
|
405
|
+
def default_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
406
|
+
pulumi.set(self, "default_lease_ttl", value)
|
407
|
+
|
408
|
+
@_builtins.property
|
409
|
+
@pulumi.getter(name="listingVisibility")
|
410
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
411
|
+
"""
|
412
|
+
Specifies whether to show this mount in
|
413
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
414
|
+
"""
|
415
|
+
return pulumi.get(self, "listing_visibility")
|
416
|
+
|
417
|
+
@listing_visibility.setter
|
418
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
419
|
+
pulumi.set(self, "listing_visibility", value)
|
420
|
+
|
421
|
+
@_builtins.property
|
422
|
+
@pulumi.getter(name="maxLeaseTtl")
|
423
|
+
def max_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
424
|
+
"""
|
425
|
+
Specifies the maximum time-to-live.
|
426
|
+
If set, this overrides the global default.
|
427
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
428
|
+
"""
|
429
|
+
return pulumi.get(self, "max_lease_ttl")
|
430
|
+
|
431
|
+
@max_lease_ttl.setter
|
432
|
+
def max_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
433
|
+
pulumi.set(self, "max_lease_ttl", value)
|
434
|
+
|
435
|
+
@_builtins.property
|
436
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
437
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
438
|
+
"""
|
439
|
+
List of headers to whitelist and
|
440
|
+
pass from the request to the backend.
|
441
|
+
"""
|
442
|
+
return pulumi.get(self, "passthrough_request_headers")
|
443
|
+
|
444
|
+
@passthrough_request_headers.setter
|
445
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
446
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
447
|
+
|
448
|
+
@_builtins.property
|
449
|
+
@pulumi.getter(name="tokenType")
|
450
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
451
|
+
"""
|
452
|
+
Specifies the type of tokens that should be returned by the mount.
|
453
|
+
"""
|
454
|
+
return pulumi.get(self, "token_type")
|
455
|
+
|
456
|
+
@token_type.setter
|
457
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
258
458
|
pulumi.set(self, "token_type", value)
|
259
459
|
|
260
460
|
|
261
461
|
if not MYPY:
|
262
462
|
class ProviderAuthLoginArgsDict(TypedDict):
|
263
|
-
path: pulumi.Input[
|
264
|
-
method: NotRequired[pulumi.Input[
|
265
|
-
namespace: NotRequired[pulumi.Input[
|
463
|
+
path: pulumi.Input[_builtins.str]
|
464
|
+
method: NotRequired[pulumi.Input[_builtins.str]]
|
465
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
266
466
|
"""
|
267
467
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
268
468
|
"""
|
269
|
-
parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
270
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
469
|
+
parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
470
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
271
471
|
"""
|
272
472
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
273
473
|
"""
|
@@ -277,14 +477,14 @@ elif False:
|
|
277
477
|
@pulumi.input_type
|
278
478
|
class ProviderAuthLoginArgs:
|
279
479
|
def __init__(__self__, *,
|
280
|
-
path: pulumi.Input[
|
281
|
-
method: Optional[pulumi.Input[
|
282
|
-
namespace: Optional[pulumi.Input[
|
283
|
-
parameters: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
284
|
-
use_root_namespace: Optional[pulumi.Input[
|
480
|
+
path: pulumi.Input[_builtins.str],
|
481
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
482
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
483
|
+
parameters: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
484
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
285
485
|
"""
|
286
|
-
:param pulumi.Input[
|
287
|
-
:param pulumi.Input[
|
486
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
487
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
288
488
|
"""
|
289
489
|
pulumi.set(__self__, "path", path)
|
290
490
|
if method is not None:
|
@@ -296,121 +496,121 @@ class ProviderAuthLoginArgs:
|
|
296
496
|
if use_root_namespace is not None:
|
297
497
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
298
498
|
|
299
|
-
@property
|
499
|
+
@_builtins.property
|
300
500
|
@pulumi.getter
|
301
|
-
def path(self) -> pulumi.Input[
|
501
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
302
502
|
return pulumi.get(self, "path")
|
303
503
|
|
304
504
|
@path.setter
|
305
|
-
def path(self, value: pulumi.Input[
|
505
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
306
506
|
pulumi.set(self, "path", value)
|
307
507
|
|
308
|
-
@property
|
508
|
+
@_builtins.property
|
309
509
|
@pulumi.getter
|
310
|
-
def method(self) -> Optional[pulumi.Input[
|
510
|
+
def method(self) -> Optional[pulumi.Input[_builtins.str]]:
|
311
511
|
return pulumi.get(self, "method")
|
312
512
|
|
313
513
|
@method.setter
|
314
|
-
def method(self, value: Optional[pulumi.Input[
|
514
|
+
def method(self, value: Optional[pulumi.Input[_builtins.str]]):
|
315
515
|
pulumi.set(self, "method", value)
|
316
516
|
|
317
|
-
@property
|
517
|
+
@_builtins.property
|
318
518
|
@pulumi.getter
|
319
|
-
def namespace(self) -> Optional[pulumi.Input[
|
519
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
320
520
|
"""
|
321
521
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
322
522
|
"""
|
323
523
|
return pulumi.get(self, "namespace")
|
324
524
|
|
325
525
|
@namespace.setter
|
326
|
-
def namespace(self, value: Optional[pulumi.Input[
|
526
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
327
527
|
pulumi.set(self, "namespace", value)
|
328
528
|
|
329
|
-
@property
|
529
|
+
@_builtins.property
|
330
530
|
@pulumi.getter
|
331
|
-
def parameters(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
531
|
+
def parameters(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
332
532
|
return pulumi.get(self, "parameters")
|
333
533
|
|
334
534
|
@parameters.setter
|
335
|
-
def parameters(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
535
|
+
def parameters(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
336
536
|
pulumi.set(self, "parameters", value)
|
337
537
|
|
338
|
-
@property
|
538
|
+
@_builtins.property
|
339
539
|
@pulumi.getter(name="useRootNamespace")
|
340
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
540
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
341
541
|
"""
|
342
542
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
343
543
|
"""
|
344
544
|
return pulumi.get(self, "use_root_namespace")
|
345
545
|
|
346
546
|
@use_root_namespace.setter
|
347
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
547
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
348
548
|
pulumi.set(self, "use_root_namespace", value)
|
349
549
|
|
350
550
|
|
351
551
|
if not MYPY:
|
352
552
|
class ProviderAuthLoginAwsArgsDict(TypedDict):
|
353
|
-
role: pulumi.Input[
|
553
|
+
role: pulumi.Input[_builtins.str]
|
354
554
|
"""
|
355
555
|
The Vault role to use when logging into Vault.
|
356
556
|
"""
|
357
|
-
aws_access_key_id: NotRequired[pulumi.Input[
|
557
|
+
aws_access_key_id: NotRequired[pulumi.Input[_builtins.str]]
|
358
558
|
"""
|
359
559
|
The AWS access key ID.
|
360
560
|
"""
|
361
|
-
aws_iam_endpoint: NotRequired[pulumi.Input[
|
561
|
+
aws_iam_endpoint: NotRequired[pulumi.Input[_builtins.str]]
|
362
562
|
"""
|
363
563
|
The IAM endpoint URL.
|
364
564
|
"""
|
365
|
-
aws_profile: NotRequired[pulumi.Input[
|
565
|
+
aws_profile: NotRequired[pulumi.Input[_builtins.str]]
|
366
566
|
"""
|
367
567
|
The name of the AWS profile.
|
368
568
|
"""
|
369
|
-
aws_region: NotRequired[pulumi.Input[
|
569
|
+
aws_region: NotRequired[pulumi.Input[_builtins.str]]
|
370
570
|
"""
|
371
571
|
The AWS region.
|
372
572
|
"""
|
373
|
-
aws_role_arn: NotRequired[pulumi.Input[
|
573
|
+
aws_role_arn: NotRequired[pulumi.Input[_builtins.str]]
|
374
574
|
"""
|
375
575
|
The ARN of the AWS Role to assume.Used during STS AssumeRole
|
376
576
|
"""
|
377
|
-
aws_role_session_name: NotRequired[pulumi.Input[
|
577
|
+
aws_role_session_name: NotRequired[pulumi.Input[_builtins.str]]
|
378
578
|
"""
|
379
579
|
Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
380
580
|
"""
|
381
|
-
aws_secret_access_key: NotRequired[pulumi.Input[
|
581
|
+
aws_secret_access_key: NotRequired[pulumi.Input[_builtins.str]]
|
382
582
|
"""
|
383
583
|
The AWS secret access key.
|
384
584
|
"""
|
385
|
-
aws_session_token: NotRequired[pulumi.Input[
|
585
|
+
aws_session_token: NotRequired[pulumi.Input[_builtins.str]]
|
386
586
|
"""
|
387
587
|
The AWS session token.
|
388
588
|
"""
|
389
|
-
aws_shared_credentials_file: NotRequired[pulumi.Input[
|
589
|
+
aws_shared_credentials_file: NotRequired[pulumi.Input[_builtins.str]]
|
390
590
|
"""
|
391
591
|
Path to the AWS shared credentials file.
|
392
592
|
"""
|
393
|
-
aws_sts_endpoint: NotRequired[pulumi.Input[
|
593
|
+
aws_sts_endpoint: NotRequired[pulumi.Input[_builtins.str]]
|
394
594
|
"""
|
395
595
|
The STS endpoint URL.
|
396
596
|
"""
|
397
|
-
aws_web_identity_token_file: NotRequired[pulumi.Input[
|
597
|
+
aws_web_identity_token_file: NotRequired[pulumi.Input[_builtins.str]]
|
398
598
|
"""
|
399
599
|
Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
400
600
|
"""
|
401
|
-
header_value: NotRequired[pulumi.Input[
|
601
|
+
header_value: NotRequired[pulumi.Input[_builtins.str]]
|
402
602
|
"""
|
403
603
|
The Vault header value to include in the STS signing request.
|
404
604
|
"""
|
405
|
-
mount: NotRequired[pulumi.Input[
|
605
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
406
606
|
"""
|
407
607
|
The path where the authentication engine is mounted.
|
408
608
|
"""
|
409
|
-
namespace: NotRequired[pulumi.Input[
|
609
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
410
610
|
"""
|
411
611
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
412
612
|
"""
|
413
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
613
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
414
614
|
"""
|
415
615
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
416
616
|
"""
|
@@ -420,39 +620,39 @@ elif False:
|
|
420
620
|
@pulumi.input_type
|
421
621
|
class ProviderAuthLoginAwsArgs:
|
422
622
|
def __init__(__self__, *,
|
423
|
-
role: pulumi.Input[
|
424
|
-
aws_access_key_id: Optional[pulumi.Input[
|
425
|
-
aws_iam_endpoint: Optional[pulumi.Input[
|
426
|
-
aws_profile: Optional[pulumi.Input[
|
427
|
-
aws_region: Optional[pulumi.Input[
|
428
|
-
aws_role_arn: Optional[pulumi.Input[
|
429
|
-
aws_role_session_name: Optional[pulumi.Input[
|
430
|
-
aws_secret_access_key: Optional[pulumi.Input[
|
431
|
-
aws_session_token: Optional[pulumi.Input[
|
432
|
-
aws_shared_credentials_file: Optional[pulumi.Input[
|
433
|
-
aws_sts_endpoint: Optional[pulumi.Input[
|
434
|
-
aws_web_identity_token_file: Optional[pulumi.Input[
|
435
|
-
header_value: Optional[pulumi.Input[
|
436
|
-
mount: Optional[pulumi.Input[
|
437
|
-
namespace: Optional[pulumi.Input[
|
438
|
-
use_root_namespace: Optional[pulumi.Input[
|
439
|
-
"""
|
440
|
-
:param pulumi.Input[
|
441
|
-
:param pulumi.Input[
|
442
|
-
:param pulumi.Input[
|
443
|
-
:param pulumi.Input[
|
444
|
-
:param pulumi.Input[
|
445
|
-
:param pulumi.Input[
|
446
|
-
:param pulumi.Input[
|
447
|
-
:param pulumi.Input[
|
448
|
-
:param pulumi.Input[
|
449
|
-
:param pulumi.Input[
|
450
|
-
:param pulumi.Input[
|
451
|
-
:param pulumi.Input[
|
452
|
-
:param pulumi.Input[
|
453
|
-
:param pulumi.Input[
|
454
|
-
:param pulumi.Input[
|
455
|
-
:param pulumi.Input[
|
623
|
+
role: pulumi.Input[_builtins.str],
|
624
|
+
aws_access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
625
|
+
aws_iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
626
|
+
aws_profile: Optional[pulumi.Input[_builtins.str]] = None,
|
627
|
+
aws_region: Optional[pulumi.Input[_builtins.str]] = None,
|
628
|
+
aws_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
629
|
+
aws_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
|
630
|
+
aws_secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
631
|
+
aws_session_token: Optional[pulumi.Input[_builtins.str]] = None,
|
632
|
+
aws_shared_credentials_file: Optional[pulumi.Input[_builtins.str]] = None,
|
633
|
+
aws_sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
634
|
+
aws_web_identity_token_file: Optional[pulumi.Input[_builtins.str]] = None,
|
635
|
+
header_value: Optional[pulumi.Input[_builtins.str]] = None,
|
636
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
637
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
638
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
639
|
+
"""
|
640
|
+
:param pulumi.Input[_builtins.str] role: The Vault role to use when logging into Vault.
|
641
|
+
:param pulumi.Input[_builtins.str] aws_access_key_id: The AWS access key ID.
|
642
|
+
:param pulumi.Input[_builtins.str] aws_iam_endpoint: The IAM endpoint URL.
|
643
|
+
:param pulumi.Input[_builtins.str] aws_profile: The name of the AWS profile.
|
644
|
+
:param pulumi.Input[_builtins.str] aws_region: The AWS region.
|
645
|
+
:param pulumi.Input[_builtins.str] aws_role_arn: The ARN of the AWS Role to assume.Used during STS AssumeRole
|
646
|
+
:param pulumi.Input[_builtins.str] aws_role_session_name: Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
647
|
+
:param pulumi.Input[_builtins.str] aws_secret_access_key: The AWS secret access key.
|
648
|
+
:param pulumi.Input[_builtins.str] aws_session_token: The AWS session token.
|
649
|
+
:param pulumi.Input[_builtins.str] aws_shared_credentials_file: Path to the AWS shared credentials file.
|
650
|
+
:param pulumi.Input[_builtins.str] aws_sts_endpoint: The STS endpoint URL.
|
651
|
+
:param pulumi.Input[_builtins.str] aws_web_identity_token_file: Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
652
|
+
:param pulumi.Input[_builtins.str] header_value: The Vault header value to include in the STS signing request.
|
653
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
654
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
655
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
456
656
|
"""
|
457
657
|
pulumi.set(__self__, "role", role)
|
458
658
|
if aws_access_key_id is not None:
|
@@ -486,246 +686,246 @@ class ProviderAuthLoginAwsArgs:
|
|
486
686
|
if use_root_namespace is not None:
|
487
687
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
488
688
|
|
489
|
-
@property
|
689
|
+
@_builtins.property
|
490
690
|
@pulumi.getter
|
491
|
-
def role(self) -> pulumi.Input[
|
691
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
492
692
|
"""
|
493
693
|
The Vault role to use when logging into Vault.
|
494
694
|
"""
|
495
695
|
return pulumi.get(self, "role")
|
496
696
|
|
497
697
|
@role.setter
|
498
|
-
def role(self, value: pulumi.Input[
|
698
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
499
699
|
pulumi.set(self, "role", value)
|
500
700
|
|
501
|
-
@property
|
701
|
+
@_builtins.property
|
502
702
|
@pulumi.getter(name="awsAccessKeyId")
|
503
|
-
def aws_access_key_id(self) -> Optional[pulumi.Input[
|
703
|
+
def aws_access_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
504
704
|
"""
|
505
705
|
The AWS access key ID.
|
506
706
|
"""
|
507
707
|
return pulumi.get(self, "aws_access_key_id")
|
508
708
|
|
509
709
|
@aws_access_key_id.setter
|
510
|
-
def aws_access_key_id(self, value: Optional[pulumi.Input[
|
710
|
+
def aws_access_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
511
711
|
pulumi.set(self, "aws_access_key_id", value)
|
512
712
|
|
513
|
-
@property
|
713
|
+
@_builtins.property
|
514
714
|
@pulumi.getter(name="awsIamEndpoint")
|
515
|
-
def aws_iam_endpoint(self) -> Optional[pulumi.Input[
|
715
|
+
def aws_iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
|
516
716
|
"""
|
517
717
|
The IAM endpoint URL.
|
518
718
|
"""
|
519
719
|
return pulumi.get(self, "aws_iam_endpoint")
|
520
720
|
|
521
721
|
@aws_iam_endpoint.setter
|
522
|
-
def aws_iam_endpoint(self, value: Optional[pulumi.Input[
|
722
|
+
def aws_iam_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
|
523
723
|
pulumi.set(self, "aws_iam_endpoint", value)
|
524
724
|
|
525
|
-
@property
|
725
|
+
@_builtins.property
|
526
726
|
@pulumi.getter(name="awsProfile")
|
527
|
-
def aws_profile(self) -> Optional[pulumi.Input[
|
727
|
+
def aws_profile(self) -> Optional[pulumi.Input[_builtins.str]]:
|
528
728
|
"""
|
529
729
|
The name of the AWS profile.
|
530
730
|
"""
|
531
731
|
return pulumi.get(self, "aws_profile")
|
532
732
|
|
533
733
|
@aws_profile.setter
|
534
|
-
def aws_profile(self, value: Optional[pulumi.Input[
|
734
|
+
def aws_profile(self, value: Optional[pulumi.Input[_builtins.str]]):
|
535
735
|
pulumi.set(self, "aws_profile", value)
|
536
736
|
|
537
|
-
@property
|
737
|
+
@_builtins.property
|
538
738
|
@pulumi.getter(name="awsRegion")
|
539
|
-
def aws_region(self) -> Optional[pulumi.Input[
|
739
|
+
def aws_region(self) -> Optional[pulumi.Input[_builtins.str]]:
|
540
740
|
"""
|
541
741
|
The AWS region.
|
542
742
|
"""
|
543
743
|
return pulumi.get(self, "aws_region")
|
544
744
|
|
545
745
|
@aws_region.setter
|
546
|
-
def aws_region(self, value: Optional[pulumi.Input[
|
746
|
+
def aws_region(self, value: Optional[pulumi.Input[_builtins.str]]):
|
547
747
|
pulumi.set(self, "aws_region", value)
|
548
748
|
|
549
|
-
@property
|
749
|
+
@_builtins.property
|
550
750
|
@pulumi.getter(name="awsRoleArn")
|
551
|
-
def aws_role_arn(self) -> Optional[pulumi.Input[
|
751
|
+
def aws_role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
552
752
|
"""
|
553
753
|
The ARN of the AWS Role to assume.Used during STS AssumeRole
|
554
754
|
"""
|
555
755
|
return pulumi.get(self, "aws_role_arn")
|
556
756
|
|
557
757
|
@aws_role_arn.setter
|
558
|
-
def aws_role_arn(self, value: Optional[pulumi.Input[
|
758
|
+
def aws_role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
559
759
|
pulumi.set(self, "aws_role_arn", value)
|
560
760
|
|
561
|
-
@property
|
761
|
+
@_builtins.property
|
562
762
|
@pulumi.getter(name="awsRoleSessionName")
|
563
|
-
def aws_role_session_name(self) -> Optional[pulumi.Input[
|
763
|
+
def aws_role_session_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
564
764
|
"""
|
565
765
|
Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
566
766
|
"""
|
567
767
|
return pulumi.get(self, "aws_role_session_name")
|
568
768
|
|
569
769
|
@aws_role_session_name.setter
|
570
|
-
def aws_role_session_name(self, value: Optional[pulumi.Input[
|
770
|
+
def aws_role_session_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
571
771
|
pulumi.set(self, "aws_role_session_name", value)
|
572
772
|
|
573
|
-
@property
|
773
|
+
@_builtins.property
|
574
774
|
@pulumi.getter(name="awsSecretAccessKey")
|
575
|
-
def aws_secret_access_key(self) -> Optional[pulumi.Input[
|
775
|
+
def aws_secret_access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
576
776
|
"""
|
577
777
|
The AWS secret access key.
|
578
778
|
"""
|
579
779
|
return pulumi.get(self, "aws_secret_access_key")
|
580
780
|
|
581
781
|
@aws_secret_access_key.setter
|
582
|
-
def aws_secret_access_key(self, value: Optional[pulumi.Input[
|
782
|
+
def aws_secret_access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
583
783
|
pulumi.set(self, "aws_secret_access_key", value)
|
584
784
|
|
585
|
-
@property
|
785
|
+
@_builtins.property
|
586
786
|
@pulumi.getter(name="awsSessionToken")
|
587
|
-
def aws_session_token(self) -> Optional[pulumi.Input[
|
787
|
+
def aws_session_token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
588
788
|
"""
|
589
789
|
The AWS session token.
|
590
790
|
"""
|
591
791
|
return pulumi.get(self, "aws_session_token")
|
592
792
|
|
593
793
|
@aws_session_token.setter
|
594
|
-
def aws_session_token(self, value: Optional[pulumi.Input[
|
794
|
+
def aws_session_token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
595
795
|
pulumi.set(self, "aws_session_token", value)
|
596
796
|
|
597
|
-
@property
|
797
|
+
@_builtins.property
|
598
798
|
@pulumi.getter(name="awsSharedCredentialsFile")
|
599
|
-
def aws_shared_credentials_file(self) -> Optional[pulumi.Input[
|
799
|
+
def aws_shared_credentials_file(self) -> Optional[pulumi.Input[_builtins.str]]:
|
600
800
|
"""
|
601
801
|
Path to the AWS shared credentials file.
|
602
802
|
"""
|
603
803
|
return pulumi.get(self, "aws_shared_credentials_file")
|
604
804
|
|
605
805
|
@aws_shared_credentials_file.setter
|
606
|
-
def aws_shared_credentials_file(self, value: Optional[pulumi.Input[
|
806
|
+
def aws_shared_credentials_file(self, value: Optional[pulumi.Input[_builtins.str]]):
|
607
807
|
pulumi.set(self, "aws_shared_credentials_file", value)
|
608
808
|
|
609
|
-
@property
|
809
|
+
@_builtins.property
|
610
810
|
@pulumi.getter(name="awsStsEndpoint")
|
611
|
-
def aws_sts_endpoint(self) -> Optional[pulumi.Input[
|
811
|
+
def aws_sts_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
|
612
812
|
"""
|
613
813
|
The STS endpoint URL.
|
614
814
|
"""
|
615
815
|
return pulumi.get(self, "aws_sts_endpoint")
|
616
816
|
|
617
817
|
@aws_sts_endpoint.setter
|
618
|
-
def aws_sts_endpoint(self, value: Optional[pulumi.Input[
|
818
|
+
def aws_sts_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
|
619
819
|
pulumi.set(self, "aws_sts_endpoint", value)
|
620
820
|
|
621
|
-
@property
|
821
|
+
@_builtins.property
|
622
822
|
@pulumi.getter(name="awsWebIdentityTokenFile")
|
623
|
-
def aws_web_identity_token_file(self) -> Optional[pulumi.Input[
|
823
|
+
def aws_web_identity_token_file(self) -> Optional[pulumi.Input[_builtins.str]]:
|
624
824
|
"""
|
625
825
|
Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
626
826
|
"""
|
627
827
|
return pulumi.get(self, "aws_web_identity_token_file")
|
628
828
|
|
629
829
|
@aws_web_identity_token_file.setter
|
630
|
-
def aws_web_identity_token_file(self, value: Optional[pulumi.Input[
|
830
|
+
def aws_web_identity_token_file(self, value: Optional[pulumi.Input[_builtins.str]]):
|
631
831
|
pulumi.set(self, "aws_web_identity_token_file", value)
|
632
832
|
|
633
|
-
@property
|
833
|
+
@_builtins.property
|
634
834
|
@pulumi.getter(name="headerValue")
|
635
|
-
def header_value(self) -> Optional[pulumi.Input[
|
835
|
+
def header_value(self) -> Optional[pulumi.Input[_builtins.str]]:
|
636
836
|
"""
|
637
837
|
The Vault header value to include in the STS signing request.
|
638
838
|
"""
|
639
839
|
return pulumi.get(self, "header_value")
|
640
840
|
|
641
841
|
@header_value.setter
|
642
|
-
def header_value(self, value: Optional[pulumi.Input[
|
842
|
+
def header_value(self, value: Optional[pulumi.Input[_builtins.str]]):
|
643
843
|
pulumi.set(self, "header_value", value)
|
644
844
|
|
645
|
-
@property
|
845
|
+
@_builtins.property
|
646
846
|
@pulumi.getter
|
647
|
-
def mount(self) -> Optional[pulumi.Input[
|
847
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
648
848
|
"""
|
649
849
|
The path where the authentication engine is mounted.
|
650
850
|
"""
|
651
851
|
return pulumi.get(self, "mount")
|
652
852
|
|
653
853
|
@mount.setter
|
654
|
-
def mount(self, value: Optional[pulumi.Input[
|
854
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
655
855
|
pulumi.set(self, "mount", value)
|
656
856
|
|
657
|
-
@property
|
857
|
+
@_builtins.property
|
658
858
|
@pulumi.getter
|
659
|
-
def namespace(self) -> Optional[pulumi.Input[
|
859
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
660
860
|
"""
|
661
861
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
662
862
|
"""
|
663
863
|
return pulumi.get(self, "namespace")
|
664
864
|
|
665
865
|
@namespace.setter
|
666
|
-
def namespace(self, value: Optional[pulumi.Input[
|
866
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
667
867
|
pulumi.set(self, "namespace", value)
|
668
868
|
|
669
|
-
@property
|
869
|
+
@_builtins.property
|
670
870
|
@pulumi.getter(name="useRootNamespace")
|
671
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
871
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
672
872
|
"""
|
673
873
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
674
874
|
"""
|
675
875
|
return pulumi.get(self, "use_root_namespace")
|
676
876
|
|
677
877
|
@use_root_namespace.setter
|
678
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
878
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
679
879
|
pulumi.set(self, "use_root_namespace", value)
|
680
880
|
|
681
881
|
|
682
882
|
if not MYPY:
|
683
883
|
class ProviderAuthLoginAzureArgsDict(TypedDict):
|
684
|
-
resource_group_name: pulumi.Input[
|
884
|
+
resource_group_name: pulumi.Input[_builtins.str]
|
685
885
|
"""
|
686
886
|
The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
687
887
|
"""
|
688
|
-
role: pulumi.Input[
|
888
|
+
role: pulumi.Input[_builtins.str]
|
689
889
|
"""
|
690
890
|
Name of the login role.
|
691
891
|
"""
|
692
|
-
subscription_id: pulumi.Input[
|
892
|
+
subscription_id: pulumi.Input[_builtins.str]
|
693
893
|
"""
|
694
894
|
The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
695
895
|
"""
|
696
|
-
client_id: NotRequired[pulumi.Input[
|
896
|
+
client_id: NotRequired[pulumi.Input[_builtins.str]]
|
697
897
|
"""
|
698
898
|
The identity's client ID.
|
699
899
|
"""
|
700
|
-
jwt: NotRequired[pulumi.Input[
|
900
|
+
jwt: NotRequired[pulumi.Input[_builtins.str]]
|
701
901
|
"""
|
702
902
|
A signed JSON Web Token. If not specified on will be created automatically
|
703
903
|
"""
|
704
|
-
mount: NotRequired[pulumi.Input[
|
904
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
705
905
|
"""
|
706
906
|
The path where the authentication engine is mounted.
|
707
907
|
"""
|
708
|
-
namespace: NotRequired[pulumi.Input[
|
908
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
709
909
|
"""
|
710
910
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
711
911
|
"""
|
712
|
-
scope: NotRequired[pulumi.Input[
|
912
|
+
scope: NotRequired[pulumi.Input[_builtins.str]]
|
713
913
|
"""
|
714
914
|
The scopes to include in the token request.
|
715
915
|
"""
|
716
|
-
tenant_id: NotRequired[pulumi.Input[
|
916
|
+
tenant_id: NotRequired[pulumi.Input[_builtins.str]]
|
717
917
|
"""
|
718
918
|
Provides the tenant ID to use in a multi-tenant authentication scenario.
|
719
919
|
"""
|
720
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
920
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
721
921
|
"""
|
722
922
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
723
923
|
"""
|
724
|
-
vm_name: NotRequired[pulumi.Input[
|
924
|
+
vm_name: NotRequired[pulumi.Input[_builtins.str]]
|
725
925
|
"""
|
726
926
|
The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
727
927
|
"""
|
728
|
-
vmss_name: NotRequired[pulumi.Input[
|
928
|
+
vmss_name: NotRequired[pulumi.Input[_builtins.str]]
|
729
929
|
"""
|
730
930
|
The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
731
931
|
"""
|
@@ -735,31 +935,31 @@ elif False:
|
|
735
935
|
@pulumi.input_type
|
736
936
|
class ProviderAuthLoginAzureArgs:
|
737
937
|
def __init__(__self__, *,
|
738
|
-
resource_group_name: pulumi.Input[
|
739
|
-
role: pulumi.Input[
|
740
|
-
subscription_id: pulumi.Input[
|
741
|
-
client_id: Optional[pulumi.Input[
|
742
|
-
jwt: Optional[pulumi.Input[
|
743
|
-
mount: Optional[pulumi.Input[
|
744
|
-
namespace: Optional[pulumi.Input[
|
745
|
-
scope: Optional[pulumi.Input[
|
746
|
-
tenant_id: Optional[pulumi.Input[
|
747
|
-
use_root_namespace: Optional[pulumi.Input[
|
748
|
-
vm_name: Optional[pulumi.Input[
|
749
|
-
vmss_name: Optional[pulumi.Input[
|
750
|
-
"""
|
751
|
-
:param pulumi.Input[
|
752
|
-
:param pulumi.Input[
|
753
|
-
:param pulumi.Input[
|
754
|
-
:param pulumi.Input[
|
755
|
-
:param pulumi.Input[
|
756
|
-
:param pulumi.Input[
|
757
|
-
:param pulumi.Input[
|
758
|
-
:param pulumi.Input[
|
759
|
-
:param pulumi.Input[
|
760
|
-
:param pulumi.Input[
|
761
|
-
:param pulumi.Input[
|
762
|
-
:param pulumi.Input[
|
938
|
+
resource_group_name: pulumi.Input[_builtins.str],
|
939
|
+
role: pulumi.Input[_builtins.str],
|
940
|
+
subscription_id: pulumi.Input[_builtins.str],
|
941
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
942
|
+
jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
943
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
944
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
945
|
+
scope: Optional[pulumi.Input[_builtins.str]] = None,
|
946
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
|
947
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
|
948
|
+
vm_name: Optional[pulumi.Input[_builtins.str]] = None,
|
949
|
+
vmss_name: Optional[pulumi.Input[_builtins.str]] = None):
|
950
|
+
"""
|
951
|
+
:param pulumi.Input[_builtins.str] resource_group_name: The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
952
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
953
|
+
:param pulumi.Input[_builtins.str] subscription_id: The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
954
|
+
:param pulumi.Input[_builtins.str] client_id: The identity's client ID.
|
955
|
+
:param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token. If not specified on will be created automatically
|
956
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
957
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
958
|
+
:param pulumi.Input[_builtins.str] scope: The scopes to include in the token request.
|
959
|
+
:param pulumi.Input[_builtins.str] tenant_id: Provides the tenant ID to use in a multi-tenant authentication scenario.
|
960
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
961
|
+
:param pulumi.Input[_builtins.str] vm_name: The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
962
|
+
:param pulumi.Input[_builtins.str] vmss_name: The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
763
963
|
"""
|
764
964
|
pulumi.set(__self__, "resource_group_name", resource_group_name)
|
765
965
|
pulumi.set(__self__, "role", role)
|
@@ -783,174 +983,174 @@ class ProviderAuthLoginAzureArgs:
|
|
783
983
|
if vmss_name is not None:
|
784
984
|
pulumi.set(__self__, "vmss_name", vmss_name)
|
785
985
|
|
786
|
-
@property
|
986
|
+
@_builtins.property
|
787
987
|
@pulumi.getter(name="resourceGroupName")
|
788
|
-
def resource_group_name(self) -> pulumi.Input[
|
988
|
+
def resource_group_name(self) -> pulumi.Input[_builtins.str]:
|
789
989
|
"""
|
790
990
|
The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
791
991
|
"""
|
792
992
|
return pulumi.get(self, "resource_group_name")
|
793
993
|
|
794
994
|
@resource_group_name.setter
|
795
|
-
def resource_group_name(self, value: pulumi.Input[
|
995
|
+
def resource_group_name(self, value: pulumi.Input[_builtins.str]):
|
796
996
|
pulumi.set(self, "resource_group_name", value)
|
797
997
|
|
798
|
-
@property
|
998
|
+
@_builtins.property
|
799
999
|
@pulumi.getter
|
800
|
-
def role(self) -> pulumi.Input[
|
1000
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
801
1001
|
"""
|
802
1002
|
Name of the login role.
|
803
1003
|
"""
|
804
1004
|
return pulumi.get(self, "role")
|
805
1005
|
|
806
1006
|
@role.setter
|
807
|
-
def role(self, value: pulumi.Input[
|
1007
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
808
1008
|
pulumi.set(self, "role", value)
|
809
1009
|
|
810
|
-
@property
|
1010
|
+
@_builtins.property
|
811
1011
|
@pulumi.getter(name="subscriptionId")
|
812
|
-
def subscription_id(self) -> pulumi.Input[
|
1012
|
+
def subscription_id(self) -> pulumi.Input[_builtins.str]:
|
813
1013
|
"""
|
814
1014
|
The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
815
1015
|
"""
|
816
1016
|
return pulumi.get(self, "subscription_id")
|
817
1017
|
|
818
1018
|
@subscription_id.setter
|
819
|
-
def subscription_id(self, value: pulumi.Input[
|
1019
|
+
def subscription_id(self, value: pulumi.Input[_builtins.str]):
|
820
1020
|
pulumi.set(self, "subscription_id", value)
|
821
1021
|
|
822
|
-
@property
|
1022
|
+
@_builtins.property
|
823
1023
|
@pulumi.getter(name="clientId")
|
824
|
-
def client_id(self) -> Optional[pulumi.Input[
|
1024
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
825
1025
|
"""
|
826
1026
|
The identity's client ID.
|
827
1027
|
"""
|
828
1028
|
return pulumi.get(self, "client_id")
|
829
1029
|
|
830
1030
|
@client_id.setter
|
831
|
-
def client_id(self, value: Optional[pulumi.Input[
|
1031
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
832
1032
|
pulumi.set(self, "client_id", value)
|
833
1033
|
|
834
|
-
@property
|
1034
|
+
@_builtins.property
|
835
1035
|
@pulumi.getter
|
836
|
-
def jwt(self) -> Optional[pulumi.Input[
|
1036
|
+
def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
837
1037
|
"""
|
838
1038
|
A signed JSON Web Token. If not specified on will be created automatically
|
839
1039
|
"""
|
840
1040
|
return pulumi.get(self, "jwt")
|
841
1041
|
|
842
1042
|
@jwt.setter
|
843
|
-
def jwt(self, value: Optional[pulumi.Input[
|
1043
|
+
def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
844
1044
|
pulumi.set(self, "jwt", value)
|
845
1045
|
|
846
|
-
@property
|
1046
|
+
@_builtins.property
|
847
1047
|
@pulumi.getter
|
848
|
-
def mount(self) -> Optional[pulumi.Input[
|
1048
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
849
1049
|
"""
|
850
1050
|
The path where the authentication engine is mounted.
|
851
1051
|
"""
|
852
1052
|
return pulumi.get(self, "mount")
|
853
1053
|
|
854
1054
|
@mount.setter
|
855
|
-
def mount(self, value: Optional[pulumi.Input[
|
1055
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
856
1056
|
pulumi.set(self, "mount", value)
|
857
1057
|
|
858
|
-
@property
|
1058
|
+
@_builtins.property
|
859
1059
|
@pulumi.getter
|
860
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1060
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
861
1061
|
"""
|
862
1062
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
863
1063
|
"""
|
864
1064
|
return pulumi.get(self, "namespace")
|
865
1065
|
|
866
1066
|
@namespace.setter
|
867
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1067
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
868
1068
|
pulumi.set(self, "namespace", value)
|
869
1069
|
|
870
|
-
@property
|
1070
|
+
@_builtins.property
|
871
1071
|
@pulumi.getter
|
872
|
-
def scope(self) -> Optional[pulumi.Input[
|
1072
|
+
def scope(self) -> Optional[pulumi.Input[_builtins.str]]:
|
873
1073
|
"""
|
874
1074
|
The scopes to include in the token request.
|
875
1075
|
"""
|
876
1076
|
return pulumi.get(self, "scope")
|
877
1077
|
|
878
1078
|
@scope.setter
|
879
|
-
def scope(self, value: Optional[pulumi.Input[
|
1079
|
+
def scope(self, value: Optional[pulumi.Input[_builtins.str]]):
|
880
1080
|
pulumi.set(self, "scope", value)
|
881
1081
|
|
882
|
-
@property
|
1082
|
+
@_builtins.property
|
883
1083
|
@pulumi.getter(name="tenantId")
|
884
|
-
def tenant_id(self) -> Optional[pulumi.Input[
|
1084
|
+
def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
885
1085
|
"""
|
886
1086
|
Provides the tenant ID to use in a multi-tenant authentication scenario.
|
887
1087
|
"""
|
888
1088
|
return pulumi.get(self, "tenant_id")
|
889
1089
|
|
890
1090
|
@tenant_id.setter
|
891
|
-
def tenant_id(self, value: Optional[pulumi.Input[
|
1091
|
+
def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
892
1092
|
pulumi.set(self, "tenant_id", value)
|
893
1093
|
|
894
|
-
@property
|
1094
|
+
@_builtins.property
|
895
1095
|
@pulumi.getter(name="useRootNamespace")
|
896
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1096
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
897
1097
|
"""
|
898
1098
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
899
1099
|
"""
|
900
1100
|
return pulumi.get(self, "use_root_namespace")
|
901
1101
|
|
902
1102
|
@use_root_namespace.setter
|
903
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1103
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
904
1104
|
pulumi.set(self, "use_root_namespace", value)
|
905
1105
|
|
906
|
-
@property
|
1106
|
+
@_builtins.property
|
907
1107
|
@pulumi.getter(name="vmName")
|
908
|
-
def vm_name(self) -> Optional[pulumi.Input[
|
1108
|
+
def vm_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
909
1109
|
"""
|
910
1110
|
The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
911
1111
|
"""
|
912
1112
|
return pulumi.get(self, "vm_name")
|
913
1113
|
|
914
1114
|
@vm_name.setter
|
915
|
-
def vm_name(self, value: Optional[pulumi.Input[
|
1115
|
+
def vm_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
916
1116
|
pulumi.set(self, "vm_name", value)
|
917
1117
|
|
918
|
-
@property
|
1118
|
+
@_builtins.property
|
919
1119
|
@pulumi.getter(name="vmssName")
|
920
|
-
def vmss_name(self) -> Optional[pulumi.Input[
|
1120
|
+
def vmss_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
921
1121
|
"""
|
922
1122
|
The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
923
1123
|
"""
|
924
1124
|
return pulumi.get(self, "vmss_name")
|
925
1125
|
|
926
1126
|
@vmss_name.setter
|
927
|
-
def vmss_name(self, value: Optional[pulumi.Input[
|
1127
|
+
def vmss_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
928
1128
|
pulumi.set(self, "vmss_name", value)
|
929
1129
|
|
930
1130
|
|
931
1131
|
if not MYPY:
|
932
1132
|
class ProviderAuthLoginCertArgsDict(TypedDict):
|
933
|
-
cert_file: pulumi.Input[
|
1133
|
+
cert_file: pulumi.Input[_builtins.str]
|
934
1134
|
"""
|
935
1135
|
Path to a file containing the client certificate.
|
936
1136
|
"""
|
937
|
-
key_file: pulumi.Input[
|
1137
|
+
key_file: pulumi.Input[_builtins.str]
|
938
1138
|
"""
|
939
1139
|
Path to a file containing the private key that the certificate was issued for.
|
940
1140
|
"""
|
941
|
-
mount: NotRequired[pulumi.Input[
|
1141
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
942
1142
|
"""
|
943
1143
|
The path where the authentication engine is mounted.
|
944
1144
|
"""
|
945
|
-
name: NotRequired[pulumi.Input[
|
1145
|
+
name: NotRequired[pulumi.Input[_builtins.str]]
|
946
1146
|
"""
|
947
1147
|
Name of the certificate's role
|
948
1148
|
"""
|
949
|
-
namespace: NotRequired[pulumi.Input[
|
1149
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
950
1150
|
"""
|
951
1151
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
952
1152
|
"""
|
953
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1153
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
954
1154
|
"""
|
955
1155
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
956
1156
|
"""
|
@@ -960,19 +1160,19 @@ elif False:
|
|
960
1160
|
@pulumi.input_type
|
961
1161
|
class ProviderAuthLoginCertArgs:
|
962
1162
|
def __init__(__self__, *,
|
963
|
-
cert_file: pulumi.Input[
|
964
|
-
key_file: pulumi.Input[
|
965
|
-
mount: Optional[pulumi.Input[
|
966
|
-
name: Optional[pulumi.Input[
|
967
|
-
namespace: Optional[pulumi.Input[
|
968
|
-
use_root_namespace: Optional[pulumi.Input[
|
969
|
-
"""
|
970
|
-
:param pulumi.Input[
|
971
|
-
:param pulumi.Input[
|
972
|
-
:param pulumi.Input[
|
973
|
-
:param pulumi.Input[
|
974
|
-
:param pulumi.Input[
|
975
|
-
:param pulumi.Input[
|
1163
|
+
cert_file: pulumi.Input[_builtins.str],
|
1164
|
+
key_file: pulumi.Input[_builtins.str],
|
1165
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
1166
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
1167
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1168
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
1169
|
+
"""
|
1170
|
+
:param pulumi.Input[_builtins.str] cert_file: Path to a file containing the client certificate.
|
1171
|
+
:param pulumi.Input[_builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
|
1172
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
1173
|
+
:param pulumi.Input[_builtins.str] name: Name of the certificate's role
|
1174
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1175
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
976
1176
|
"""
|
977
1177
|
pulumi.set(__self__, "cert_file", cert_file)
|
978
1178
|
pulumi.set(__self__, "key_file", key_file)
|
@@ -985,106 +1185,106 @@ class ProviderAuthLoginCertArgs:
|
|
985
1185
|
if use_root_namespace is not None:
|
986
1186
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
987
1187
|
|
988
|
-
@property
|
1188
|
+
@_builtins.property
|
989
1189
|
@pulumi.getter(name="certFile")
|
990
|
-
def cert_file(self) -> pulumi.Input[
|
1190
|
+
def cert_file(self) -> pulumi.Input[_builtins.str]:
|
991
1191
|
"""
|
992
1192
|
Path to a file containing the client certificate.
|
993
1193
|
"""
|
994
1194
|
return pulumi.get(self, "cert_file")
|
995
1195
|
|
996
1196
|
@cert_file.setter
|
997
|
-
def cert_file(self, value: pulumi.Input[
|
1197
|
+
def cert_file(self, value: pulumi.Input[_builtins.str]):
|
998
1198
|
pulumi.set(self, "cert_file", value)
|
999
1199
|
|
1000
|
-
@property
|
1200
|
+
@_builtins.property
|
1001
1201
|
@pulumi.getter(name="keyFile")
|
1002
|
-
def key_file(self) -> pulumi.Input[
|
1202
|
+
def key_file(self) -> pulumi.Input[_builtins.str]:
|
1003
1203
|
"""
|
1004
1204
|
Path to a file containing the private key that the certificate was issued for.
|
1005
1205
|
"""
|
1006
1206
|
return pulumi.get(self, "key_file")
|
1007
1207
|
|
1008
1208
|
@key_file.setter
|
1009
|
-
def key_file(self, value: pulumi.Input[
|
1209
|
+
def key_file(self, value: pulumi.Input[_builtins.str]):
|
1010
1210
|
pulumi.set(self, "key_file", value)
|
1011
1211
|
|
1012
|
-
@property
|
1212
|
+
@_builtins.property
|
1013
1213
|
@pulumi.getter
|
1014
|
-
def mount(self) -> Optional[pulumi.Input[
|
1214
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1015
1215
|
"""
|
1016
1216
|
The path where the authentication engine is mounted.
|
1017
1217
|
"""
|
1018
1218
|
return pulumi.get(self, "mount")
|
1019
1219
|
|
1020
1220
|
@mount.setter
|
1021
|
-
def mount(self, value: Optional[pulumi.Input[
|
1221
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1022
1222
|
pulumi.set(self, "mount", value)
|
1023
1223
|
|
1024
|
-
@property
|
1224
|
+
@_builtins.property
|
1025
1225
|
@pulumi.getter
|
1026
|
-
def name(self) -> Optional[pulumi.Input[
|
1226
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1027
1227
|
"""
|
1028
1228
|
Name of the certificate's role
|
1029
1229
|
"""
|
1030
1230
|
return pulumi.get(self, "name")
|
1031
1231
|
|
1032
1232
|
@name.setter
|
1033
|
-
def name(self, value: Optional[pulumi.Input[
|
1233
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1034
1234
|
pulumi.set(self, "name", value)
|
1035
1235
|
|
1036
|
-
@property
|
1236
|
+
@_builtins.property
|
1037
1237
|
@pulumi.getter
|
1038
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1238
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1039
1239
|
"""
|
1040
1240
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1041
1241
|
"""
|
1042
1242
|
return pulumi.get(self, "namespace")
|
1043
1243
|
|
1044
1244
|
@namespace.setter
|
1045
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1245
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1046
1246
|
pulumi.set(self, "namespace", value)
|
1047
1247
|
|
1048
|
-
@property
|
1248
|
+
@_builtins.property
|
1049
1249
|
@pulumi.getter(name="useRootNamespace")
|
1050
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1250
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1051
1251
|
"""
|
1052
1252
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1053
1253
|
"""
|
1054
1254
|
return pulumi.get(self, "use_root_namespace")
|
1055
1255
|
|
1056
1256
|
@use_root_namespace.setter
|
1057
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1257
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1058
1258
|
pulumi.set(self, "use_root_namespace", value)
|
1059
1259
|
|
1060
1260
|
|
1061
1261
|
if not MYPY:
|
1062
1262
|
class ProviderAuthLoginGcpArgsDict(TypedDict):
|
1063
|
-
role: pulumi.Input[
|
1263
|
+
role: pulumi.Input[_builtins.str]
|
1064
1264
|
"""
|
1065
1265
|
Name of the login role.
|
1066
1266
|
"""
|
1067
|
-
credentials: NotRequired[pulumi.Input[
|
1267
|
+
credentials: NotRequired[pulumi.Input[_builtins.str]]
|
1068
1268
|
"""
|
1069
1269
|
Path to the Google Cloud credentials file.
|
1070
1270
|
"""
|
1071
|
-
jwt: NotRequired[pulumi.Input[
|
1271
|
+
jwt: NotRequired[pulumi.Input[_builtins.str]]
|
1072
1272
|
"""
|
1073
1273
|
A signed JSON Web Token.
|
1074
1274
|
"""
|
1075
|
-
mount: NotRequired[pulumi.Input[
|
1275
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1076
1276
|
"""
|
1077
1277
|
The path where the authentication engine is mounted.
|
1078
1278
|
"""
|
1079
|
-
namespace: NotRequired[pulumi.Input[
|
1279
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1080
1280
|
"""
|
1081
1281
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1082
1282
|
"""
|
1083
|
-
service_account: NotRequired[pulumi.Input[
|
1283
|
+
service_account: NotRequired[pulumi.Input[_builtins.str]]
|
1084
1284
|
"""
|
1085
1285
|
IAM service account.
|
1086
1286
|
"""
|
1087
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1287
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1088
1288
|
"""
|
1089
1289
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1090
1290
|
"""
|
@@ -1094,21 +1294,21 @@ elif False:
|
|
1094
1294
|
@pulumi.input_type
|
1095
1295
|
class ProviderAuthLoginGcpArgs:
|
1096
1296
|
def __init__(__self__, *,
|
1097
|
-
role: pulumi.Input[
|
1098
|
-
credentials: Optional[pulumi.Input[
|
1099
|
-
jwt: Optional[pulumi.Input[
|
1100
|
-
mount: Optional[pulumi.Input[
|
1101
|
-
namespace: Optional[pulumi.Input[
|
1102
|
-
service_account: Optional[pulumi.Input[
|
1103
|
-
use_root_namespace: Optional[pulumi.Input[
|
1104
|
-
"""
|
1105
|
-
:param pulumi.Input[
|
1106
|
-
:param pulumi.Input[
|
1107
|
-
:param pulumi.Input[
|
1108
|
-
:param pulumi.Input[
|
1109
|
-
:param pulumi.Input[
|
1110
|
-
:param pulumi.Input[
|
1111
|
-
:param pulumi.Input[
|
1297
|
+
role: pulumi.Input[_builtins.str],
|
1298
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
1299
|
+
jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
1300
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
1301
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1302
|
+
service_account: Optional[pulumi.Input[_builtins.str]] = None,
|
1303
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
1304
|
+
"""
|
1305
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
1306
|
+
:param pulumi.Input[_builtins.str] credentials: Path to the Google Cloud credentials file.
|
1307
|
+
:param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token.
|
1308
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
1309
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1310
|
+
:param pulumi.Input[_builtins.str] service_account: IAM service account.
|
1311
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1112
1312
|
"""
|
1113
1313
|
pulumi.set(__self__, "role", role)
|
1114
1314
|
if credentials is not None:
|
@@ -1124,110 +1324,110 @@ class ProviderAuthLoginGcpArgs:
|
|
1124
1324
|
if use_root_namespace is not None:
|
1125
1325
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
1126
1326
|
|
1127
|
-
@property
|
1327
|
+
@_builtins.property
|
1128
1328
|
@pulumi.getter
|
1129
|
-
def role(self) -> pulumi.Input[
|
1329
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
1130
1330
|
"""
|
1131
1331
|
Name of the login role.
|
1132
1332
|
"""
|
1133
1333
|
return pulumi.get(self, "role")
|
1134
1334
|
|
1135
1335
|
@role.setter
|
1136
|
-
def role(self, value: pulumi.Input[
|
1336
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
1137
1337
|
pulumi.set(self, "role", value)
|
1138
1338
|
|
1139
|
-
@property
|
1339
|
+
@_builtins.property
|
1140
1340
|
@pulumi.getter
|
1141
|
-
def credentials(self) -> Optional[pulumi.Input[
|
1341
|
+
def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1142
1342
|
"""
|
1143
1343
|
Path to the Google Cloud credentials file.
|
1144
1344
|
"""
|
1145
1345
|
return pulumi.get(self, "credentials")
|
1146
1346
|
|
1147
1347
|
@credentials.setter
|
1148
|
-
def credentials(self, value: Optional[pulumi.Input[
|
1348
|
+
def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1149
1349
|
pulumi.set(self, "credentials", value)
|
1150
1350
|
|
1151
|
-
@property
|
1351
|
+
@_builtins.property
|
1152
1352
|
@pulumi.getter
|
1153
|
-
def jwt(self) -> Optional[pulumi.Input[
|
1353
|
+
def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1154
1354
|
"""
|
1155
1355
|
A signed JSON Web Token.
|
1156
1356
|
"""
|
1157
1357
|
return pulumi.get(self, "jwt")
|
1158
1358
|
|
1159
1359
|
@jwt.setter
|
1160
|
-
def jwt(self, value: Optional[pulumi.Input[
|
1360
|
+
def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1161
1361
|
pulumi.set(self, "jwt", value)
|
1162
1362
|
|
1163
|
-
@property
|
1363
|
+
@_builtins.property
|
1164
1364
|
@pulumi.getter
|
1165
|
-
def mount(self) -> Optional[pulumi.Input[
|
1365
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1166
1366
|
"""
|
1167
1367
|
The path where the authentication engine is mounted.
|
1168
1368
|
"""
|
1169
1369
|
return pulumi.get(self, "mount")
|
1170
1370
|
|
1171
1371
|
@mount.setter
|
1172
|
-
def mount(self, value: Optional[pulumi.Input[
|
1372
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1173
1373
|
pulumi.set(self, "mount", value)
|
1174
1374
|
|
1175
|
-
@property
|
1375
|
+
@_builtins.property
|
1176
1376
|
@pulumi.getter
|
1177
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1377
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1178
1378
|
"""
|
1179
1379
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1180
1380
|
"""
|
1181
1381
|
return pulumi.get(self, "namespace")
|
1182
1382
|
|
1183
1383
|
@namespace.setter
|
1184
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1384
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1185
1385
|
pulumi.set(self, "namespace", value)
|
1186
1386
|
|
1187
|
-
@property
|
1387
|
+
@_builtins.property
|
1188
1388
|
@pulumi.getter(name="serviceAccount")
|
1189
|
-
def service_account(self) -> Optional[pulumi.Input[
|
1389
|
+
def service_account(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1190
1390
|
"""
|
1191
1391
|
IAM service account.
|
1192
1392
|
"""
|
1193
1393
|
return pulumi.get(self, "service_account")
|
1194
1394
|
|
1195
1395
|
@service_account.setter
|
1196
|
-
def service_account(self, value: Optional[pulumi.Input[
|
1396
|
+
def service_account(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1197
1397
|
pulumi.set(self, "service_account", value)
|
1198
1398
|
|
1199
|
-
@property
|
1399
|
+
@_builtins.property
|
1200
1400
|
@pulumi.getter(name="useRootNamespace")
|
1201
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1401
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1202
1402
|
"""
|
1203
1403
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1204
1404
|
"""
|
1205
1405
|
return pulumi.get(self, "use_root_namespace")
|
1206
1406
|
|
1207
1407
|
@use_root_namespace.setter
|
1208
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1408
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1209
1409
|
pulumi.set(self, "use_root_namespace", value)
|
1210
1410
|
|
1211
1411
|
|
1212
1412
|
if not MYPY:
|
1213
1413
|
class ProviderAuthLoginJwtArgsDict(TypedDict):
|
1214
|
-
role: pulumi.Input[
|
1414
|
+
role: pulumi.Input[_builtins.str]
|
1215
1415
|
"""
|
1216
1416
|
Name of the login role.
|
1217
1417
|
"""
|
1218
|
-
jwt: NotRequired[pulumi.Input[
|
1418
|
+
jwt: NotRequired[pulumi.Input[_builtins.str]]
|
1219
1419
|
"""
|
1220
1420
|
A signed JSON Web Token.
|
1221
1421
|
"""
|
1222
|
-
mount: NotRequired[pulumi.Input[
|
1422
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1223
1423
|
"""
|
1224
1424
|
The path where the authentication engine is mounted.
|
1225
1425
|
"""
|
1226
|
-
namespace: NotRequired[pulumi.Input[
|
1426
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1227
1427
|
"""
|
1228
1428
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1229
1429
|
"""
|
1230
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1430
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1231
1431
|
"""
|
1232
1432
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1233
1433
|
"""
|
@@ -1237,17 +1437,17 @@ elif False:
|
|
1237
1437
|
@pulumi.input_type
|
1238
1438
|
class ProviderAuthLoginJwtArgs:
|
1239
1439
|
def __init__(__self__, *,
|
1240
|
-
role: pulumi.Input[
|
1241
|
-
jwt: Optional[pulumi.Input[
|
1242
|
-
mount: Optional[pulumi.Input[
|
1243
|
-
namespace: Optional[pulumi.Input[
|
1244
|
-
use_root_namespace: Optional[pulumi.Input[
|
1245
|
-
"""
|
1246
|
-
:param pulumi.Input[
|
1247
|
-
:param pulumi.Input[
|
1248
|
-
:param pulumi.Input[
|
1249
|
-
:param pulumi.Input[
|
1250
|
-
:param pulumi.Input[
|
1440
|
+
role: pulumi.Input[_builtins.str],
|
1441
|
+
jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
1442
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
1443
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1444
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
1445
|
+
"""
|
1446
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
1447
|
+
:param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token.
|
1448
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
1449
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1450
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1251
1451
|
"""
|
1252
1452
|
pulumi.set(__self__, "role", role)
|
1253
1453
|
if jwt is not None:
|
@@ -1259,110 +1459,110 @@ class ProviderAuthLoginJwtArgs:
|
|
1259
1459
|
if use_root_namespace is not None:
|
1260
1460
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
1261
1461
|
|
1262
|
-
@property
|
1462
|
+
@_builtins.property
|
1263
1463
|
@pulumi.getter
|
1264
|
-
def role(self) -> pulumi.Input[
|
1464
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
1265
1465
|
"""
|
1266
1466
|
Name of the login role.
|
1267
1467
|
"""
|
1268
1468
|
return pulumi.get(self, "role")
|
1269
1469
|
|
1270
1470
|
@role.setter
|
1271
|
-
def role(self, value: pulumi.Input[
|
1471
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
1272
1472
|
pulumi.set(self, "role", value)
|
1273
1473
|
|
1274
|
-
@property
|
1474
|
+
@_builtins.property
|
1275
1475
|
@pulumi.getter
|
1276
|
-
def jwt(self) -> Optional[pulumi.Input[
|
1476
|
+
def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1277
1477
|
"""
|
1278
1478
|
A signed JSON Web Token.
|
1279
1479
|
"""
|
1280
1480
|
return pulumi.get(self, "jwt")
|
1281
1481
|
|
1282
1482
|
@jwt.setter
|
1283
|
-
def jwt(self, value: Optional[pulumi.Input[
|
1483
|
+
def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1284
1484
|
pulumi.set(self, "jwt", value)
|
1285
1485
|
|
1286
|
-
@property
|
1486
|
+
@_builtins.property
|
1287
1487
|
@pulumi.getter
|
1288
|
-
def mount(self) -> Optional[pulumi.Input[
|
1488
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1289
1489
|
"""
|
1290
1490
|
The path where the authentication engine is mounted.
|
1291
1491
|
"""
|
1292
1492
|
return pulumi.get(self, "mount")
|
1293
1493
|
|
1294
1494
|
@mount.setter
|
1295
|
-
def mount(self, value: Optional[pulumi.Input[
|
1495
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1296
1496
|
pulumi.set(self, "mount", value)
|
1297
1497
|
|
1298
|
-
@property
|
1498
|
+
@_builtins.property
|
1299
1499
|
@pulumi.getter
|
1300
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1500
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1301
1501
|
"""
|
1302
1502
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1303
1503
|
"""
|
1304
1504
|
return pulumi.get(self, "namespace")
|
1305
1505
|
|
1306
1506
|
@namespace.setter
|
1307
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1507
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1308
1508
|
pulumi.set(self, "namespace", value)
|
1309
1509
|
|
1310
|
-
@property
|
1510
|
+
@_builtins.property
|
1311
1511
|
@pulumi.getter(name="useRootNamespace")
|
1312
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1512
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1313
1513
|
"""
|
1314
1514
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1315
1515
|
"""
|
1316
1516
|
return pulumi.get(self, "use_root_namespace")
|
1317
1517
|
|
1318
1518
|
@use_root_namespace.setter
|
1319
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1519
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1320
1520
|
pulumi.set(self, "use_root_namespace", value)
|
1321
1521
|
|
1322
1522
|
|
1323
1523
|
if not MYPY:
|
1324
1524
|
class ProviderAuthLoginKerberosArgsDict(TypedDict):
|
1325
|
-
disable_fast_negotiation: NotRequired[pulumi.Input[
|
1525
|
+
disable_fast_negotiation: NotRequired[pulumi.Input[_builtins.bool]]
|
1326
1526
|
"""
|
1327
1527
|
Disable the Kerberos FAST negotiation.
|
1328
1528
|
"""
|
1329
|
-
keytab_path: NotRequired[pulumi.Input[
|
1529
|
+
keytab_path: NotRequired[pulumi.Input[_builtins.str]]
|
1330
1530
|
"""
|
1331
1531
|
The Kerberos keytab file containing the entry of the login entity.
|
1332
1532
|
"""
|
1333
|
-
krb5conf_path: NotRequired[pulumi.Input[
|
1533
|
+
krb5conf_path: NotRequired[pulumi.Input[_builtins.str]]
|
1334
1534
|
"""
|
1335
1535
|
A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
1336
1536
|
"""
|
1337
|
-
mount: NotRequired[pulumi.Input[
|
1537
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1338
1538
|
"""
|
1339
1539
|
The path where the authentication engine is mounted.
|
1340
1540
|
"""
|
1341
|
-
namespace: NotRequired[pulumi.Input[
|
1541
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1342
1542
|
"""
|
1343
1543
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1344
1544
|
"""
|
1345
|
-
realm: NotRequired[pulumi.Input[
|
1545
|
+
realm: NotRequired[pulumi.Input[_builtins.str]]
|
1346
1546
|
"""
|
1347
1547
|
The Kerberos server's authoritative authentication domain
|
1348
1548
|
"""
|
1349
|
-
remove_instance_name: NotRequired[pulumi.Input[
|
1549
|
+
remove_instance_name: NotRequired[pulumi.Input[_builtins.bool]]
|
1350
1550
|
"""
|
1351
1551
|
Strip the host from the username found in the keytab.
|
1352
1552
|
"""
|
1353
|
-
service: NotRequired[pulumi.Input[
|
1553
|
+
service: NotRequired[pulumi.Input[_builtins.str]]
|
1354
1554
|
"""
|
1355
1555
|
The service principle name.
|
1356
1556
|
"""
|
1357
|
-
token: NotRequired[pulumi.Input[
|
1557
|
+
token: NotRequired[pulumi.Input[_builtins.str]]
|
1358
1558
|
"""
|
1359
1559
|
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
1360
1560
|
"""
|
1361
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1561
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1362
1562
|
"""
|
1363
1563
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1364
1564
|
"""
|
1365
|
-
username: NotRequired[pulumi.Input[
|
1565
|
+
username: NotRequired[pulumi.Input[_builtins.str]]
|
1366
1566
|
"""
|
1367
1567
|
The username to login into Kerberos with.
|
1368
1568
|
"""
|
@@ -1372,29 +1572,29 @@ elif False:
|
|
1372
1572
|
@pulumi.input_type
|
1373
1573
|
class ProviderAuthLoginKerberosArgs:
|
1374
1574
|
def __init__(__self__, *,
|
1375
|
-
disable_fast_negotiation: Optional[pulumi.Input[
|
1376
|
-
keytab_path: Optional[pulumi.Input[
|
1377
|
-
krb5conf_path: Optional[pulumi.Input[
|
1378
|
-
mount: Optional[pulumi.Input[
|
1379
|
-
namespace: Optional[pulumi.Input[
|
1380
|
-
realm: Optional[pulumi.Input[
|
1381
|
-
remove_instance_name: Optional[pulumi.Input[
|
1382
|
-
service: Optional[pulumi.Input[
|
1383
|
-
token: Optional[pulumi.Input[
|
1384
|
-
use_root_namespace: Optional[pulumi.Input[
|
1385
|
-
username: Optional[pulumi.Input[
|
1386
|
-
"""
|
1387
|
-
:param pulumi.Input[
|
1388
|
-
:param pulumi.Input[
|
1389
|
-
:param pulumi.Input[
|
1390
|
-
:param pulumi.Input[
|
1391
|
-
:param pulumi.Input[
|
1392
|
-
:param pulumi.Input[
|
1393
|
-
:param pulumi.Input[
|
1394
|
-
:param pulumi.Input[
|
1395
|
-
:param pulumi.Input[
|
1396
|
-
:param pulumi.Input[
|
1397
|
-
:param pulumi.Input[
|
1575
|
+
disable_fast_negotiation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1576
|
+
keytab_path: Optional[pulumi.Input[_builtins.str]] = None,
|
1577
|
+
krb5conf_path: Optional[pulumi.Input[_builtins.str]] = None,
|
1578
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
1579
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1580
|
+
realm: Optional[pulumi.Input[_builtins.str]] = None,
|
1581
|
+
remove_instance_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
1582
|
+
service: Optional[pulumi.Input[_builtins.str]] = None,
|
1583
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
1584
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
|
1585
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
1586
|
+
"""
|
1587
|
+
:param pulumi.Input[_builtins.bool] disable_fast_negotiation: Disable the Kerberos FAST negotiation.
|
1588
|
+
:param pulumi.Input[_builtins.str] keytab_path: The Kerberos keytab file containing the entry of the login entity.
|
1589
|
+
:param pulumi.Input[_builtins.str] krb5conf_path: A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
1590
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
1591
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1592
|
+
:param pulumi.Input[_builtins.str] realm: The Kerberos server's authoritative authentication domain
|
1593
|
+
:param pulumi.Input[_builtins.bool] remove_instance_name: Strip the host from the username found in the keytab.
|
1594
|
+
:param pulumi.Input[_builtins.str] service: The service principle name.
|
1595
|
+
:param pulumi.Input[_builtins.str] token: Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
1596
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1597
|
+
:param pulumi.Input[_builtins.str] username: The username to login into Kerberos with.
|
1398
1598
|
"""
|
1399
1599
|
if disable_fast_negotiation is not None:
|
1400
1600
|
pulumi.set(__self__, "disable_fast_negotiation", disable_fast_negotiation)
|
@@ -1419,158 +1619,158 @@ class ProviderAuthLoginKerberosArgs:
|
|
1419
1619
|
if username is not None:
|
1420
1620
|
pulumi.set(__self__, "username", username)
|
1421
1621
|
|
1422
|
-
@property
|
1622
|
+
@_builtins.property
|
1423
1623
|
@pulumi.getter(name="disableFastNegotiation")
|
1424
|
-
def disable_fast_negotiation(self) -> Optional[pulumi.Input[
|
1624
|
+
def disable_fast_negotiation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1425
1625
|
"""
|
1426
1626
|
Disable the Kerberos FAST negotiation.
|
1427
1627
|
"""
|
1428
1628
|
return pulumi.get(self, "disable_fast_negotiation")
|
1429
1629
|
|
1430
1630
|
@disable_fast_negotiation.setter
|
1431
|
-
def disable_fast_negotiation(self, value: Optional[pulumi.Input[
|
1631
|
+
def disable_fast_negotiation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1432
1632
|
pulumi.set(self, "disable_fast_negotiation", value)
|
1433
1633
|
|
1434
|
-
@property
|
1634
|
+
@_builtins.property
|
1435
1635
|
@pulumi.getter(name="keytabPath")
|
1436
|
-
def keytab_path(self) -> Optional[pulumi.Input[
|
1636
|
+
def keytab_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1437
1637
|
"""
|
1438
1638
|
The Kerberos keytab file containing the entry of the login entity.
|
1439
1639
|
"""
|
1440
1640
|
return pulumi.get(self, "keytab_path")
|
1441
1641
|
|
1442
1642
|
@keytab_path.setter
|
1443
|
-
def keytab_path(self, value: Optional[pulumi.Input[
|
1643
|
+
def keytab_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1444
1644
|
pulumi.set(self, "keytab_path", value)
|
1445
1645
|
|
1446
|
-
@property
|
1646
|
+
@_builtins.property
|
1447
1647
|
@pulumi.getter(name="krb5confPath")
|
1448
|
-
def krb5conf_path(self) -> Optional[pulumi.Input[
|
1648
|
+
def krb5conf_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1449
1649
|
"""
|
1450
1650
|
A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
1451
1651
|
"""
|
1452
1652
|
return pulumi.get(self, "krb5conf_path")
|
1453
1653
|
|
1454
1654
|
@krb5conf_path.setter
|
1455
|
-
def krb5conf_path(self, value: Optional[pulumi.Input[
|
1655
|
+
def krb5conf_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1456
1656
|
pulumi.set(self, "krb5conf_path", value)
|
1457
1657
|
|
1458
|
-
@property
|
1658
|
+
@_builtins.property
|
1459
1659
|
@pulumi.getter
|
1460
|
-
def mount(self) -> Optional[pulumi.Input[
|
1660
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1461
1661
|
"""
|
1462
1662
|
The path where the authentication engine is mounted.
|
1463
1663
|
"""
|
1464
1664
|
return pulumi.get(self, "mount")
|
1465
1665
|
|
1466
1666
|
@mount.setter
|
1467
|
-
def mount(self, value: Optional[pulumi.Input[
|
1667
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1468
1668
|
pulumi.set(self, "mount", value)
|
1469
1669
|
|
1470
|
-
@property
|
1670
|
+
@_builtins.property
|
1471
1671
|
@pulumi.getter
|
1472
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1672
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1473
1673
|
"""
|
1474
1674
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1475
1675
|
"""
|
1476
1676
|
return pulumi.get(self, "namespace")
|
1477
1677
|
|
1478
1678
|
@namespace.setter
|
1479
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1679
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1480
1680
|
pulumi.set(self, "namespace", value)
|
1481
1681
|
|
1482
|
-
@property
|
1682
|
+
@_builtins.property
|
1483
1683
|
@pulumi.getter
|
1484
|
-
def realm(self) -> Optional[pulumi.Input[
|
1684
|
+
def realm(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1485
1685
|
"""
|
1486
1686
|
The Kerberos server's authoritative authentication domain
|
1487
1687
|
"""
|
1488
1688
|
return pulumi.get(self, "realm")
|
1489
1689
|
|
1490
1690
|
@realm.setter
|
1491
|
-
def realm(self, value: Optional[pulumi.Input[
|
1691
|
+
def realm(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1492
1692
|
pulumi.set(self, "realm", value)
|
1493
1693
|
|
1494
|
-
@property
|
1694
|
+
@_builtins.property
|
1495
1695
|
@pulumi.getter(name="removeInstanceName")
|
1496
|
-
def remove_instance_name(self) -> Optional[pulumi.Input[
|
1696
|
+
def remove_instance_name(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1497
1697
|
"""
|
1498
1698
|
Strip the host from the username found in the keytab.
|
1499
1699
|
"""
|
1500
1700
|
return pulumi.get(self, "remove_instance_name")
|
1501
1701
|
|
1502
1702
|
@remove_instance_name.setter
|
1503
|
-
def remove_instance_name(self, value: Optional[pulumi.Input[
|
1703
|
+
def remove_instance_name(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1504
1704
|
pulumi.set(self, "remove_instance_name", value)
|
1505
1705
|
|
1506
|
-
@property
|
1706
|
+
@_builtins.property
|
1507
1707
|
@pulumi.getter
|
1508
|
-
def service(self) -> Optional[pulumi.Input[
|
1708
|
+
def service(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1509
1709
|
"""
|
1510
1710
|
The service principle name.
|
1511
1711
|
"""
|
1512
1712
|
return pulumi.get(self, "service")
|
1513
1713
|
|
1514
1714
|
@service.setter
|
1515
|
-
def service(self, value: Optional[pulumi.Input[
|
1715
|
+
def service(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1516
1716
|
pulumi.set(self, "service", value)
|
1517
1717
|
|
1518
|
-
@property
|
1718
|
+
@_builtins.property
|
1519
1719
|
@pulumi.getter
|
1520
|
-
def token(self) -> Optional[pulumi.Input[
|
1720
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1521
1721
|
"""
|
1522
1722
|
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
1523
1723
|
"""
|
1524
1724
|
return pulumi.get(self, "token")
|
1525
1725
|
|
1526
1726
|
@token.setter
|
1527
|
-
def token(self, value: Optional[pulumi.Input[
|
1727
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1528
1728
|
pulumi.set(self, "token", value)
|
1529
1729
|
|
1530
|
-
@property
|
1730
|
+
@_builtins.property
|
1531
1731
|
@pulumi.getter(name="useRootNamespace")
|
1532
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1732
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1533
1733
|
"""
|
1534
1734
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1535
1735
|
"""
|
1536
1736
|
return pulumi.get(self, "use_root_namespace")
|
1537
1737
|
|
1538
1738
|
@use_root_namespace.setter
|
1539
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1739
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1540
1740
|
pulumi.set(self, "use_root_namespace", value)
|
1541
1741
|
|
1542
|
-
@property
|
1742
|
+
@_builtins.property
|
1543
1743
|
@pulumi.getter
|
1544
|
-
def username(self) -> Optional[pulumi.Input[
|
1744
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1545
1745
|
"""
|
1546
1746
|
The username to login into Kerberos with.
|
1547
1747
|
"""
|
1548
1748
|
return pulumi.get(self, "username")
|
1549
1749
|
|
1550
1750
|
@username.setter
|
1551
|
-
def username(self, value: Optional[pulumi.Input[
|
1751
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1552
1752
|
pulumi.set(self, "username", value)
|
1553
1753
|
|
1554
1754
|
|
1555
1755
|
if not MYPY:
|
1556
1756
|
class ProviderAuthLoginOciArgsDict(TypedDict):
|
1557
|
-
auth_type: pulumi.Input[
|
1757
|
+
auth_type: pulumi.Input[_builtins.str]
|
1558
1758
|
"""
|
1559
1759
|
Authentication type to use when getting OCI credentials.
|
1560
1760
|
"""
|
1561
|
-
role: pulumi.Input[
|
1761
|
+
role: pulumi.Input[_builtins.str]
|
1562
1762
|
"""
|
1563
1763
|
Name of the login role.
|
1564
1764
|
"""
|
1565
|
-
mount: NotRequired[pulumi.Input[
|
1765
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1566
1766
|
"""
|
1567
1767
|
The path where the authentication engine is mounted.
|
1568
1768
|
"""
|
1569
|
-
namespace: NotRequired[pulumi.Input[
|
1769
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1570
1770
|
"""
|
1571
1771
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1572
1772
|
"""
|
1573
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1773
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1574
1774
|
"""
|
1575
1775
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1576
1776
|
"""
|
@@ -1580,17 +1780,17 @@ elif False:
|
|
1580
1780
|
@pulumi.input_type
|
1581
1781
|
class ProviderAuthLoginOciArgs:
|
1582
1782
|
def __init__(__self__, *,
|
1583
|
-
auth_type: pulumi.Input[
|
1584
|
-
role: pulumi.Input[
|
1585
|
-
mount: Optional[pulumi.Input[
|
1586
|
-
namespace: Optional[pulumi.Input[
|
1587
|
-
use_root_namespace: Optional[pulumi.Input[
|
1588
|
-
"""
|
1589
|
-
:param pulumi.Input[
|
1590
|
-
:param pulumi.Input[
|
1591
|
-
:param pulumi.Input[
|
1592
|
-
:param pulumi.Input[
|
1593
|
-
:param pulumi.Input[
|
1783
|
+
auth_type: pulumi.Input[_builtins.str],
|
1784
|
+
role: pulumi.Input[_builtins.str],
|
1785
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
1786
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1787
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
1788
|
+
"""
|
1789
|
+
:param pulumi.Input[_builtins.str] auth_type: Authentication type to use when getting OCI credentials.
|
1790
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
1791
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
1792
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1793
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1594
1794
|
"""
|
1595
1795
|
pulumi.set(__self__, "auth_type", auth_type)
|
1596
1796
|
pulumi.set(__self__, "role", role)
|
@@ -1601,90 +1801,90 @@ class ProviderAuthLoginOciArgs:
|
|
1601
1801
|
if use_root_namespace is not None:
|
1602
1802
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
1603
1803
|
|
1604
|
-
@property
|
1804
|
+
@_builtins.property
|
1605
1805
|
@pulumi.getter(name="authType")
|
1606
|
-
def auth_type(self) -> pulumi.Input[
|
1806
|
+
def auth_type(self) -> pulumi.Input[_builtins.str]:
|
1607
1807
|
"""
|
1608
1808
|
Authentication type to use when getting OCI credentials.
|
1609
1809
|
"""
|
1610
1810
|
return pulumi.get(self, "auth_type")
|
1611
1811
|
|
1612
1812
|
@auth_type.setter
|
1613
|
-
def auth_type(self, value: pulumi.Input[
|
1813
|
+
def auth_type(self, value: pulumi.Input[_builtins.str]):
|
1614
1814
|
pulumi.set(self, "auth_type", value)
|
1615
1815
|
|
1616
|
-
@property
|
1816
|
+
@_builtins.property
|
1617
1817
|
@pulumi.getter
|
1618
|
-
def role(self) -> pulumi.Input[
|
1818
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
1619
1819
|
"""
|
1620
1820
|
Name of the login role.
|
1621
1821
|
"""
|
1622
1822
|
return pulumi.get(self, "role")
|
1623
1823
|
|
1624
1824
|
@role.setter
|
1625
|
-
def role(self, value: pulumi.Input[
|
1825
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
1626
1826
|
pulumi.set(self, "role", value)
|
1627
1827
|
|
1628
|
-
@property
|
1828
|
+
@_builtins.property
|
1629
1829
|
@pulumi.getter
|
1630
|
-
def mount(self) -> Optional[pulumi.Input[
|
1830
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1631
1831
|
"""
|
1632
1832
|
The path where the authentication engine is mounted.
|
1633
1833
|
"""
|
1634
1834
|
return pulumi.get(self, "mount")
|
1635
1835
|
|
1636
1836
|
@mount.setter
|
1637
|
-
def mount(self, value: Optional[pulumi.Input[
|
1837
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1638
1838
|
pulumi.set(self, "mount", value)
|
1639
1839
|
|
1640
|
-
@property
|
1840
|
+
@_builtins.property
|
1641
1841
|
@pulumi.getter
|
1642
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1842
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1643
1843
|
"""
|
1644
1844
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1645
1845
|
"""
|
1646
1846
|
return pulumi.get(self, "namespace")
|
1647
1847
|
|
1648
1848
|
@namespace.setter
|
1649
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1849
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1650
1850
|
pulumi.set(self, "namespace", value)
|
1651
1851
|
|
1652
|
-
@property
|
1852
|
+
@_builtins.property
|
1653
1853
|
@pulumi.getter(name="useRootNamespace")
|
1654
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1854
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1655
1855
|
"""
|
1656
1856
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1657
1857
|
"""
|
1658
1858
|
return pulumi.get(self, "use_root_namespace")
|
1659
1859
|
|
1660
1860
|
@use_root_namespace.setter
|
1661
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1861
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1662
1862
|
pulumi.set(self, "use_root_namespace", value)
|
1663
1863
|
|
1664
1864
|
|
1665
1865
|
if not MYPY:
|
1666
1866
|
class ProviderAuthLoginOidcArgsDict(TypedDict):
|
1667
|
-
role: pulumi.Input[
|
1867
|
+
role: pulumi.Input[_builtins.str]
|
1668
1868
|
"""
|
1669
1869
|
Name of the login role.
|
1670
1870
|
"""
|
1671
|
-
callback_address: NotRequired[pulumi.Input[
|
1871
|
+
callback_address: NotRequired[pulumi.Input[_builtins.str]]
|
1672
1872
|
"""
|
1673
1873
|
The callback address. Must be a valid URI without the path.
|
1674
1874
|
"""
|
1675
|
-
callback_listener_address: NotRequired[pulumi.Input[
|
1875
|
+
callback_listener_address: NotRequired[pulumi.Input[_builtins.str]]
|
1676
1876
|
"""
|
1677
1877
|
The callback listener's address. Must be a valid URI without the path.
|
1678
1878
|
"""
|
1679
|
-
mount: NotRequired[pulumi.Input[
|
1879
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1680
1880
|
"""
|
1681
1881
|
The path where the authentication engine is mounted.
|
1682
1882
|
"""
|
1683
|
-
namespace: NotRequired[pulumi.Input[
|
1883
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1684
1884
|
"""
|
1685
1885
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1686
1886
|
"""
|
1687
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1887
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1688
1888
|
"""
|
1689
1889
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1690
1890
|
"""
|
@@ -1694,19 +1894,19 @@ elif False:
|
|
1694
1894
|
@pulumi.input_type
|
1695
1895
|
class ProviderAuthLoginOidcArgs:
|
1696
1896
|
def __init__(__self__, *,
|
1697
|
-
role: pulumi.Input[
|
1698
|
-
callback_address: Optional[pulumi.Input[
|
1699
|
-
callback_listener_address: Optional[pulumi.Input[
|
1700
|
-
mount: Optional[pulumi.Input[
|
1701
|
-
namespace: Optional[pulumi.Input[
|
1702
|
-
use_root_namespace: Optional[pulumi.Input[
|
1703
|
-
"""
|
1704
|
-
:param pulumi.Input[
|
1705
|
-
:param pulumi.Input[
|
1706
|
-
:param pulumi.Input[
|
1707
|
-
:param pulumi.Input[
|
1708
|
-
:param pulumi.Input[
|
1709
|
-
:param pulumi.Input[
|
1897
|
+
role: pulumi.Input[_builtins.str],
|
1898
|
+
callback_address: Optional[pulumi.Input[_builtins.str]] = None,
|
1899
|
+
callback_listener_address: Optional[pulumi.Input[_builtins.str]] = None,
|
1900
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
1901
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1902
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
1903
|
+
"""
|
1904
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
1905
|
+
:param pulumi.Input[_builtins.str] callback_address: The callback address. Must be a valid URI without the path.
|
1906
|
+
:param pulumi.Input[_builtins.str] callback_listener_address: The callback listener's address. Must be a valid URI without the path.
|
1907
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
1908
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1909
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1710
1910
|
"""
|
1711
1911
|
pulumi.set(__self__, "role", role)
|
1712
1912
|
if callback_address is not None:
|
@@ -1720,98 +1920,98 @@ class ProviderAuthLoginOidcArgs:
|
|
1720
1920
|
if use_root_namespace is not None:
|
1721
1921
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
1722
1922
|
|
1723
|
-
@property
|
1923
|
+
@_builtins.property
|
1724
1924
|
@pulumi.getter
|
1725
|
-
def role(self) -> pulumi.Input[
|
1925
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
1726
1926
|
"""
|
1727
1927
|
Name of the login role.
|
1728
1928
|
"""
|
1729
1929
|
return pulumi.get(self, "role")
|
1730
1930
|
|
1731
1931
|
@role.setter
|
1732
|
-
def role(self, value: pulumi.Input[
|
1932
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
1733
1933
|
pulumi.set(self, "role", value)
|
1734
1934
|
|
1735
|
-
@property
|
1935
|
+
@_builtins.property
|
1736
1936
|
@pulumi.getter(name="callbackAddress")
|
1737
|
-
def callback_address(self) -> Optional[pulumi.Input[
|
1937
|
+
def callback_address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1738
1938
|
"""
|
1739
1939
|
The callback address. Must be a valid URI without the path.
|
1740
1940
|
"""
|
1741
1941
|
return pulumi.get(self, "callback_address")
|
1742
1942
|
|
1743
1943
|
@callback_address.setter
|
1744
|
-
def callback_address(self, value: Optional[pulumi.Input[
|
1944
|
+
def callback_address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1745
1945
|
pulumi.set(self, "callback_address", value)
|
1746
1946
|
|
1747
|
-
@property
|
1947
|
+
@_builtins.property
|
1748
1948
|
@pulumi.getter(name="callbackListenerAddress")
|
1749
|
-
def callback_listener_address(self) -> Optional[pulumi.Input[
|
1949
|
+
def callback_listener_address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1750
1950
|
"""
|
1751
1951
|
The callback listener's address. Must be a valid URI without the path.
|
1752
1952
|
"""
|
1753
1953
|
return pulumi.get(self, "callback_listener_address")
|
1754
1954
|
|
1755
1955
|
@callback_listener_address.setter
|
1756
|
-
def callback_listener_address(self, value: Optional[pulumi.Input[
|
1956
|
+
def callback_listener_address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1757
1957
|
pulumi.set(self, "callback_listener_address", value)
|
1758
1958
|
|
1759
|
-
@property
|
1959
|
+
@_builtins.property
|
1760
1960
|
@pulumi.getter
|
1761
|
-
def mount(self) -> Optional[pulumi.Input[
|
1961
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1762
1962
|
"""
|
1763
1963
|
The path where the authentication engine is mounted.
|
1764
1964
|
"""
|
1765
1965
|
return pulumi.get(self, "mount")
|
1766
1966
|
|
1767
1967
|
@mount.setter
|
1768
|
-
def mount(self, value: Optional[pulumi.Input[
|
1968
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1769
1969
|
pulumi.set(self, "mount", value)
|
1770
1970
|
|
1771
|
-
@property
|
1971
|
+
@_builtins.property
|
1772
1972
|
@pulumi.getter
|
1773
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1973
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1774
1974
|
"""
|
1775
1975
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1776
1976
|
"""
|
1777
1977
|
return pulumi.get(self, "namespace")
|
1778
1978
|
|
1779
1979
|
@namespace.setter
|
1780
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1980
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1781
1981
|
pulumi.set(self, "namespace", value)
|
1782
1982
|
|
1783
|
-
@property
|
1983
|
+
@_builtins.property
|
1784
1984
|
@pulumi.getter(name="useRootNamespace")
|
1785
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1985
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1786
1986
|
"""
|
1787
1987
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1788
1988
|
"""
|
1789
1989
|
return pulumi.get(self, "use_root_namespace")
|
1790
1990
|
|
1791
1991
|
@use_root_namespace.setter
|
1792
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1992
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1793
1993
|
pulumi.set(self, "use_root_namespace", value)
|
1794
1994
|
|
1795
1995
|
|
1796
1996
|
if not MYPY:
|
1797
1997
|
class ProviderAuthLoginRadiusArgsDict(TypedDict):
|
1798
|
-
mount: NotRequired[pulumi.Input[
|
1998
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1799
1999
|
"""
|
1800
2000
|
The path where the authentication engine is mounted.
|
1801
2001
|
"""
|
1802
|
-
namespace: NotRequired[pulumi.Input[
|
2002
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1803
2003
|
"""
|
1804
2004
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1805
2005
|
"""
|
1806
|
-
password: NotRequired[pulumi.Input[
|
2006
|
+
password: NotRequired[pulumi.Input[_builtins.str]]
|
1807
2007
|
"""
|
1808
2008
|
The Radius password for username.
|
1809
2009
|
"""
|
1810
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
2010
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1811
2011
|
"""
|
1812
2012
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1813
2013
|
"""
|
1814
|
-
username: NotRequired[pulumi.Input[
|
2014
|
+
username: NotRequired[pulumi.Input[_builtins.str]]
|
1815
2015
|
"""
|
1816
2016
|
The Radius username.
|
1817
2017
|
"""
|
@@ -1821,17 +2021,17 @@ elif False:
|
|
1821
2021
|
@pulumi.input_type
|
1822
2022
|
class ProviderAuthLoginRadiusArgs:
|
1823
2023
|
def __init__(__self__, *,
|
1824
|
-
mount: Optional[pulumi.Input[
|
1825
|
-
namespace: Optional[pulumi.Input[
|
1826
|
-
password: Optional[pulumi.Input[
|
1827
|
-
use_root_namespace: Optional[pulumi.Input[
|
1828
|
-
username: Optional[pulumi.Input[
|
1829
|
-
"""
|
1830
|
-
:param pulumi.Input[
|
1831
|
-
:param pulumi.Input[
|
1832
|
-
:param pulumi.Input[
|
1833
|
-
:param pulumi.Input[
|
1834
|
-
:param pulumi.Input[
|
2024
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
2025
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
2026
|
+
password: Optional[pulumi.Input[_builtins.str]] = None,
|
2027
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
|
2028
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
2029
|
+
"""
|
2030
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
2031
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
2032
|
+
:param pulumi.Input[_builtins.str] password: The Radius password for username.
|
2033
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
2034
|
+
:param pulumi.Input[_builtins.str] username: The Radius username.
|
1835
2035
|
"""
|
1836
2036
|
if mount is not None:
|
1837
2037
|
pulumi.set(__self__, "mount", mount)
|
@@ -1844,78 +2044,78 @@ class ProviderAuthLoginRadiusArgs:
|
|
1844
2044
|
if username is not None:
|
1845
2045
|
pulumi.set(__self__, "username", username)
|
1846
2046
|
|
1847
|
-
@property
|
2047
|
+
@_builtins.property
|
1848
2048
|
@pulumi.getter
|
1849
|
-
def mount(self) -> Optional[pulumi.Input[
|
2049
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1850
2050
|
"""
|
1851
2051
|
The path where the authentication engine is mounted.
|
1852
2052
|
"""
|
1853
2053
|
return pulumi.get(self, "mount")
|
1854
2054
|
|
1855
2055
|
@mount.setter
|
1856
|
-
def mount(self, value: Optional[pulumi.Input[
|
2056
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1857
2057
|
pulumi.set(self, "mount", value)
|
1858
2058
|
|
1859
|
-
@property
|
2059
|
+
@_builtins.property
|
1860
2060
|
@pulumi.getter
|
1861
|
-
def namespace(self) -> Optional[pulumi.Input[
|
2061
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1862
2062
|
"""
|
1863
2063
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1864
2064
|
"""
|
1865
2065
|
return pulumi.get(self, "namespace")
|
1866
2066
|
|
1867
2067
|
@namespace.setter
|
1868
|
-
def namespace(self, value: Optional[pulumi.Input[
|
2068
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1869
2069
|
pulumi.set(self, "namespace", value)
|
1870
2070
|
|
1871
|
-
@property
|
2071
|
+
@_builtins.property
|
1872
2072
|
@pulumi.getter
|
1873
|
-
def password(self) -> Optional[pulumi.Input[
|
2073
|
+
def password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1874
2074
|
"""
|
1875
2075
|
The Radius password for username.
|
1876
2076
|
"""
|
1877
2077
|
return pulumi.get(self, "password")
|
1878
2078
|
|
1879
2079
|
@password.setter
|
1880
|
-
def password(self, value: Optional[pulumi.Input[
|
2080
|
+
def password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1881
2081
|
pulumi.set(self, "password", value)
|
1882
2082
|
|
1883
|
-
@property
|
2083
|
+
@_builtins.property
|
1884
2084
|
@pulumi.getter(name="useRootNamespace")
|
1885
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
2085
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1886
2086
|
"""
|
1887
2087
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1888
2088
|
"""
|
1889
2089
|
return pulumi.get(self, "use_root_namespace")
|
1890
2090
|
|
1891
2091
|
@use_root_namespace.setter
|
1892
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
2092
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1893
2093
|
pulumi.set(self, "use_root_namespace", value)
|
1894
2094
|
|
1895
|
-
@property
|
2095
|
+
@_builtins.property
|
1896
2096
|
@pulumi.getter
|
1897
|
-
def username(self) -> Optional[pulumi.Input[
|
2097
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1898
2098
|
"""
|
1899
2099
|
The Radius username.
|
1900
2100
|
"""
|
1901
2101
|
return pulumi.get(self, "username")
|
1902
2102
|
|
1903
2103
|
@username.setter
|
1904
|
-
def username(self, value: Optional[pulumi.Input[
|
2104
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1905
2105
|
pulumi.set(self, "username", value)
|
1906
2106
|
|
1907
2107
|
|
1908
2108
|
if not MYPY:
|
1909
2109
|
class ProviderAuthLoginTokenFileArgsDict(TypedDict):
|
1910
|
-
filename: NotRequired[pulumi.Input[
|
2110
|
+
filename: NotRequired[pulumi.Input[_builtins.str]]
|
1911
2111
|
"""
|
1912
2112
|
The name of a file containing a single line that is a valid Vault token
|
1913
2113
|
"""
|
1914
|
-
namespace: NotRequired[pulumi.Input[
|
2114
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1915
2115
|
"""
|
1916
2116
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1917
2117
|
"""
|
1918
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
2118
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1919
2119
|
"""
|
1920
2120
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1921
2121
|
"""
|
@@ -1925,13 +2125,13 @@ elif False:
|
|
1925
2125
|
@pulumi.input_type
|
1926
2126
|
class ProviderAuthLoginTokenFileArgs:
|
1927
2127
|
def __init__(__self__, *,
|
1928
|
-
filename: Optional[pulumi.Input[
|
1929
|
-
namespace: Optional[pulumi.Input[
|
1930
|
-
use_root_namespace: Optional[pulumi.Input[
|
2128
|
+
filename: Optional[pulumi.Input[_builtins.str]] = None,
|
2129
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
2130
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
1931
2131
|
"""
|
1932
|
-
:param pulumi.Input[
|
1933
|
-
:param pulumi.Input[
|
1934
|
-
:param pulumi.Input[
|
2132
|
+
:param pulumi.Input[_builtins.str] filename: The name of a file containing a single line that is a valid Vault token
|
2133
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
2134
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1935
2135
|
"""
|
1936
2136
|
if filename is not None:
|
1937
2137
|
pulumi.set(__self__, "filename", filename)
|
@@ -1940,66 +2140,66 @@ class ProviderAuthLoginTokenFileArgs:
|
|
1940
2140
|
if use_root_namespace is not None:
|
1941
2141
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
1942
2142
|
|
1943
|
-
@property
|
2143
|
+
@_builtins.property
|
1944
2144
|
@pulumi.getter
|
1945
|
-
def filename(self) -> Optional[pulumi.Input[
|
2145
|
+
def filename(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1946
2146
|
"""
|
1947
2147
|
The name of a file containing a single line that is a valid Vault token
|
1948
2148
|
"""
|
1949
2149
|
return pulumi.get(self, "filename")
|
1950
2150
|
|
1951
2151
|
@filename.setter
|
1952
|
-
def filename(self, value: Optional[pulumi.Input[
|
2152
|
+
def filename(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1953
2153
|
pulumi.set(self, "filename", value)
|
1954
2154
|
|
1955
|
-
@property
|
2155
|
+
@_builtins.property
|
1956
2156
|
@pulumi.getter
|
1957
|
-
def namespace(self) -> Optional[pulumi.Input[
|
2157
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1958
2158
|
"""
|
1959
2159
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1960
2160
|
"""
|
1961
2161
|
return pulumi.get(self, "namespace")
|
1962
2162
|
|
1963
2163
|
@namespace.setter
|
1964
|
-
def namespace(self, value: Optional[pulumi.Input[
|
2164
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1965
2165
|
pulumi.set(self, "namespace", value)
|
1966
2166
|
|
1967
|
-
@property
|
2167
|
+
@_builtins.property
|
1968
2168
|
@pulumi.getter(name="useRootNamespace")
|
1969
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
2169
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1970
2170
|
"""
|
1971
2171
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1972
2172
|
"""
|
1973
2173
|
return pulumi.get(self, "use_root_namespace")
|
1974
2174
|
|
1975
2175
|
@use_root_namespace.setter
|
1976
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
2176
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1977
2177
|
pulumi.set(self, "use_root_namespace", value)
|
1978
2178
|
|
1979
2179
|
|
1980
2180
|
if not MYPY:
|
1981
2181
|
class ProviderAuthLoginUserpassArgsDict(TypedDict):
|
1982
|
-
mount: NotRequired[pulumi.Input[
|
2182
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1983
2183
|
"""
|
1984
2184
|
The path where the authentication engine is mounted.
|
1985
2185
|
"""
|
1986
|
-
namespace: NotRequired[pulumi.Input[
|
2186
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1987
2187
|
"""
|
1988
2188
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1989
2189
|
"""
|
1990
|
-
password: NotRequired[pulumi.Input[
|
2190
|
+
password: NotRequired[pulumi.Input[_builtins.str]]
|
1991
2191
|
"""
|
1992
2192
|
Login with password
|
1993
2193
|
"""
|
1994
|
-
password_file: NotRequired[pulumi.Input[
|
2194
|
+
password_file: NotRequired[pulumi.Input[_builtins.str]]
|
1995
2195
|
"""
|
1996
2196
|
Login with password from a file
|
1997
2197
|
"""
|
1998
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
2198
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1999
2199
|
"""
|
2000
2200
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
2001
2201
|
"""
|
2002
|
-
username: NotRequired[pulumi.Input[
|
2202
|
+
username: NotRequired[pulumi.Input[_builtins.str]]
|
2003
2203
|
"""
|
2004
2204
|
Login with username
|
2005
2205
|
"""
|
@@ -2009,19 +2209,19 @@ elif False:
|
|
2009
2209
|
@pulumi.input_type
|
2010
2210
|
class ProviderAuthLoginUserpassArgs:
|
2011
2211
|
def __init__(__self__, *,
|
2012
|
-
mount: Optional[pulumi.Input[
|
2013
|
-
namespace: Optional[pulumi.Input[
|
2014
|
-
password: Optional[pulumi.Input[
|
2015
|
-
password_file: Optional[pulumi.Input[
|
2016
|
-
use_root_namespace: Optional[pulumi.Input[
|
2017
|
-
username: Optional[pulumi.Input[
|
2018
|
-
"""
|
2019
|
-
:param pulumi.Input[
|
2020
|
-
:param pulumi.Input[
|
2021
|
-
:param pulumi.Input[
|
2022
|
-
:param pulumi.Input[
|
2023
|
-
:param pulumi.Input[
|
2024
|
-
:param pulumi.Input[
|
2212
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
2213
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
2214
|
+
password: Optional[pulumi.Input[_builtins.str]] = None,
|
2215
|
+
password_file: Optional[pulumi.Input[_builtins.str]] = None,
|
2216
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
|
2217
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
2218
|
+
"""
|
2219
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
2220
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
2221
|
+
:param pulumi.Input[_builtins.str] password: Login with password
|
2222
|
+
:param pulumi.Input[_builtins.str] password_file: Login with password from a file
|
2223
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
2224
|
+
:param pulumi.Input[_builtins.str] username: Login with username
|
2025
2225
|
"""
|
2026
2226
|
if mount is not None:
|
2027
2227
|
pulumi.set(__self__, "mount", mount)
|
@@ -2036,86 +2236,86 @@ class ProviderAuthLoginUserpassArgs:
|
|
2036
2236
|
if username is not None:
|
2037
2237
|
pulumi.set(__self__, "username", username)
|
2038
2238
|
|
2039
|
-
@property
|
2239
|
+
@_builtins.property
|
2040
2240
|
@pulumi.getter
|
2041
|
-
def mount(self) -> Optional[pulumi.Input[
|
2241
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
2042
2242
|
"""
|
2043
2243
|
The path where the authentication engine is mounted.
|
2044
2244
|
"""
|
2045
2245
|
return pulumi.get(self, "mount")
|
2046
2246
|
|
2047
2247
|
@mount.setter
|
2048
|
-
def mount(self, value: Optional[pulumi.Input[
|
2248
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
2049
2249
|
pulumi.set(self, "mount", value)
|
2050
2250
|
|
2051
|
-
@property
|
2251
|
+
@_builtins.property
|
2052
2252
|
@pulumi.getter
|
2053
|
-
def namespace(self) -> Optional[pulumi.Input[
|
2253
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
2054
2254
|
"""
|
2055
2255
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
2056
2256
|
"""
|
2057
2257
|
return pulumi.get(self, "namespace")
|
2058
2258
|
|
2059
2259
|
@namespace.setter
|
2060
|
-
def namespace(self, value: Optional[pulumi.Input[
|
2260
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
2061
2261
|
pulumi.set(self, "namespace", value)
|
2062
2262
|
|
2063
|
-
@property
|
2263
|
+
@_builtins.property
|
2064
2264
|
@pulumi.getter
|
2065
|
-
def password(self) -> Optional[pulumi.Input[
|
2265
|
+
def password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
2066
2266
|
"""
|
2067
2267
|
Login with password
|
2068
2268
|
"""
|
2069
2269
|
return pulumi.get(self, "password")
|
2070
2270
|
|
2071
2271
|
@password.setter
|
2072
|
-
def password(self, value: Optional[pulumi.Input[
|
2272
|
+
def password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
2073
2273
|
pulumi.set(self, "password", value)
|
2074
2274
|
|
2075
|
-
@property
|
2275
|
+
@_builtins.property
|
2076
2276
|
@pulumi.getter(name="passwordFile")
|
2077
|
-
def password_file(self) -> Optional[pulumi.Input[
|
2277
|
+
def password_file(self) -> Optional[pulumi.Input[_builtins.str]]:
|
2078
2278
|
"""
|
2079
2279
|
Login with password from a file
|
2080
2280
|
"""
|
2081
2281
|
return pulumi.get(self, "password_file")
|
2082
2282
|
|
2083
2283
|
@password_file.setter
|
2084
|
-
def password_file(self, value: Optional[pulumi.Input[
|
2284
|
+
def password_file(self, value: Optional[pulumi.Input[_builtins.str]]):
|
2085
2285
|
pulumi.set(self, "password_file", value)
|
2086
2286
|
|
2087
|
-
@property
|
2287
|
+
@_builtins.property
|
2088
2288
|
@pulumi.getter(name="useRootNamespace")
|
2089
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
2289
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
2090
2290
|
"""
|
2091
2291
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
2092
2292
|
"""
|
2093
2293
|
return pulumi.get(self, "use_root_namespace")
|
2094
2294
|
|
2095
2295
|
@use_root_namespace.setter
|
2096
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
2296
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
2097
2297
|
pulumi.set(self, "use_root_namespace", value)
|
2098
2298
|
|
2099
|
-
@property
|
2299
|
+
@_builtins.property
|
2100
2300
|
@pulumi.getter
|
2101
|
-
def username(self) -> Optional[pulumi.Input[
|
2301
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
2102
2302
|
"""
|
2103
2303
|
Login with username
|
2104
2304
|
"""
|
2105
2305
|
return pulumi.get(self, "username")
|
2106
2306
|
|
2107
2307
|
@username.setter
|
2108
|
-
def username(self, value: Optional[pulumi.Input[
|
2308
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
2109
2309
|
pulumi.set(self, "username", value)
|
2110
2310
|
|
2111
2311
|
|
2112
2312
|
if not MYPY:
|
2113
2313
|
class ProviderClientAuthArgsDict(TypedDict):
|
2114
|
-
cert_file: pulumi.Input[
|
2314
|
+
cert_file: pulumi.Input[_builtins.str]
|
2115
2315
|
"""
|
2116
2316
|
Path to a file containing the client certificate.
|
2117
2317
|
"""
|
2118
|
-
key_file: pulumi.Input[
|
2318
|
+
key_file: pulumi.Input[_builtins.str]
|
2119
2319
|
"""
|
2120
2320
|
Path to a file containing the private key that the certificate was issued for.
|
2121
2321
|
"""
|
@@ -2125,47 +2325,47 @@ elif False:
|
|
2125
2325
|
@pulumi.input_type
|
2126
2326
|
class ProviderClientAuthArgs:
|
2127
2327
|
def __init__(__self__, *,
|
2128
|
-
cert_file: pulumi.Input[
|
2129
|
-
key_file: pulumi.Input[
|
2328
|
+
cert_file: pulumi.Input[_builtins.str],
|
2329
|
+
key_file: pulumi.Input[_builtins.str]):
|
2130
2330
|
"""
|
2131
|
-
:param pulumi.Input[
|
2132
|
-
:param pulumi.Input[
|
2331
|
+
:param pulumi.Input[_builtins.str] cert_file: Path to a file containing the client certificate.
|
2332
|
+
:param pulumi.Input[_builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
|
2133
2333
|
"""
|
2134
2334
|
pulumi.set(__self__, "cert_file", cert_file)
|
2135
2335
|
pulumi.set(__self__, "key_file", key_file)
|
2136
2336
|
|
2137
|
-
@property
|
2337
|
+
@_builtins.property
|
2138
2338
|
@pulumi.getter(name="certFile")
|
2139
|
-
def cert_file(self) -> pulumi.Input[
|
2339
|
+
def cert_file(self) -> pulumi.Input[_builtins.str]:
|
2140
2340
|
"""
|
2141
2341
|
Path to a file containing the client certificate.
|
2142
2342
|
"""
|
2143
2343
|
return pulumi.get(self, "cert_file")
|
2144
2344
|
|
2145
2345
|
@cert_file.setter
|
2146
|
-
def cert_file(self, value: pulumi.Input[
|
2346
|
+
def cert_file(self, value: pulumi.Input[_builtins.str]):
|
2147
2347
|
pulumi.set(self, "cert_file", value)
|
2148
2348
|
|
2149
|
-
@property
|
2349
|
+
@_builtins.property
|
2150
2350
|
@pulumi.getter(name="keyFile")
|
2151
|
-
def key_file(self) -> pulumi.Input[
|
2351
|
+
def key_file(self) -> pulumi.Input[_builtins.str]:
|
2152
2352
|
"""
|
2153
2353
|
Path to a file containing the private key that the certificate was issued for.
|
2154
2354
|
"""
|
2155
2355
|
return pulumi.get(self, "key_file")
|
2156
2356
|
|
2157
2357
|
@key_file.setter
|
2158
|
-
def key_file(self, value: pulumi.Input[
|
2358
|
+
def key_file(self, value: pulumi.Input[_builtins.str]):
|
2159
2359
|
pulumi.set(self, "key_file", value)
|
2160
2360
|
|
2161
2361
|
|
2162
2362
|
if not MYPY:
|
2163
2363
|
class ProviderHeaderArgsDict(TypedDict):
|
2164
|
-
name: pulumi.Input[
|
2364
|
+
name: pulumi.Input[_builtins.str]
|
2165
2365
|
"""
|
2166
2366
|
The header name
|
2167
2367
|
"""
|
2168
|
-
value: pulumi.Input[
|
2368
|
+
value: pulumi.Input[_builtins.str]
|
2169
2369
|
"""
|
2170
2370
|
The header value
|
2171
2371
|
"""
|
@@ -2175,47 +2375,47 @@ elif False:
|
|
2175
2375
|
@pulumi.input_type
|
2176
2376
|
class ProviderHeaderArgs:
|
2177
2377
|
def __init__(__self__, *,
|
2178
|
-
name: pulumi.Input[
|
2179
|
-
value: pulumi.Input[
|
2378
|
+
name: pulumi.Input[_builtins.str],
|
2379
|
+
value: pulumi.Input[_builtins.str]):
|
2180
2380
|
"""
|
2181
|
-
:param pulumi.Input[
|
2182
|
-
:param pulumi.Input[
|
2381
|
+
:param pulumi.Input[_builtins.str] name: The header name
|
2382
|
+
:param pulumi.Input[_builtins.str] value: The header value
|
2183
2383
|
"""
|
2184
2384
|
pulumi.set(__self__, "name", name)
|
2185
2385
|
pulumi.set(__self__, "value", value)
|
2186
2386
|
|
2187
|
-
@property
|
2387
|
+
@_builtins.property
|
2188
2388
|
@pulumi.getter
|
2189
|
-
def name(self) -> pulumi.Input[
|
2389
|
+
def name(self) -> pulumi.Input[_builtins.str]:
|
2190
2390
|
"""
|
2191
2391
|
The header name
|
2192
2392
|
"""
|
2193
2393
|
return pulumi.get(self, "name")
|
2194
2394
|
|
2195
2395
|
@name.setter
|
2196
|
-
def name(self, value: pulumi.Input[
|
2396
|
+
def name(self, value: pulumi.Input[_builtins.str]):
|
2197
2397
|
pulumi.set(self, "name", value)
|
2198
2398
|
|
2199
|
-
@property
|
2399
|
+
@_builtins.property
|
2200
2400
|
@pulumi.getter
|
2201
|
-
def value(self) -> pulumi.Input[
|
2401
|
+
def value(self) -> pulumi.Input[_builtins.str]:
|
2202
2402
|
"""
|
2203
2403
|
The header value
|
2204
2404
|
"""
|
2205
2405
|
return pulumi.get(self, "value")
|
2206
2406
|
|
2207
2407
|
@value.setter
|
2208
|
-
def value(self, value: pulumi.Input[
|
2408
|
+
def value(self, value: pulumi.Input[_builtins.str]):
|
2209
2409
|
pulumi.set(self, "value", value)
|
2210
2410
|
|
2211
2411
|
|
2212
2412
|
if not MYPY:
|
2213
2413
|
class GetPolicyDocumentRuleArgsDict(TypedDict):
|
2214
|
-
capabilities: Sequence[
|
2414
|
+
capabilities: Sequence[_builtins.str]
|
2215
2415
|
"""
|
2216
2416
|
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
2217
2417
|
"""
|
2218
|
-
path:
|
2418
|
+
path: _builtins.str
|
2219
2419
|
"""
|
2220
2420
|
A path in Vault that this rule applies to.
|
2221
2421
|
"""
|
@@ -2227,23 +2427,23 @@ if not MYPY:
|
|
2227
2427
|
"""
|
2228
2428
|
Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
2229
2429
|
"""
|
2230
|
-
description: NotRequired[
|
2430
|
+
description: NotRequired[_builtins.str]
|
2231
2431
|
"""
|
2232
2432
|
Description of the rule. Will be added as a comment to rendered rule.
|
2233
2433
|
"""
|
2234
|
-
max_wrapping_ttl: NotRequired[
|
2434
|
+
max_wrapping_ttl: NotRequired[_builtins.str]
|
2235
2435
|
"""
|
2236
2436
|
The maximum allowed TTL that clients can specify for a wrapped response.
|
2237
2437
|
"""
|
2238
|
-
min_wrapping_ttl: NotRequired[
|
2438
|
+
min_wrapping_ttl: NotRequired[_builtins.str]
|
2239
2439
|
"""
|
2240
2440
|
The minimum allowed TTL that clients can specify for a wrapped response.
|
2241
2441
|
"""
|
2242
|
-
required_parameters: NotRequired[Sequence[
|
2442
|
+
required_parameters: NotRequired[Sequence[_builtins.str]]
|
2243
2443
|
"""
|
2244
2444
|
A list of parameters that must be specified.
|
2245
2445
|
"""
|
2246
|
-
subscribe_event_types: NotRequired[Sequence[
|
2446
|
+
subscribe_event_types: NotRequired[Sequence[_builtins.str]]
|
2247
2447
|
"""
|
2248
2448
|
A list of event types to subscribe to when using `subscribe` capability.
|
2249
2449
|
"""
|
@@ -2253,25 +2453,25 @@ elif False:
|
|
2253
2453
|
@pulumi.input_type
|
2254
2454
|
class GetPolicyDocumentRuleArgs:
|
2255
2455
|
def __init__(__self__, *,
|
2256
|
-
capabilities: Sequence[
|
2257
|
-
path:
|
2456
|
+
capabilities: Sequence[_builtins.str],
|
2457
|
+
path: _builtins.str,
|
2258
2458
|
allowed_parameters: Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']] = None,
|
2259
2459
|
denied_parameters: Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']] = None,
|
2260
|
-
description: Optional[
|
2261
|
-
max_wrapping_ttl: Optional[
|
2262
|
-
min_wrapping_ttl: Optional[
|
2263
|
-
required_parameters: Optional[Sequence[
|
2264
|
-
subscribe_event_types: Optional[Sequence[
|
2265
|
-
"""
|
2266
|
-
:param Sequence[
|
2267
|
-
:param
|
2460
|
+
description: Optional[_builtins.str] = None,
|
2461
|
+
max_wrapping_ttl: Optional[_builtins.str] = None,
|
2462
|
+
min_wrapping_ttl: Optional[_builtins.str] = None,
|
2463
|
+
required_parameters: Optional[Sequence[_builtins.str]] = None,
|
2464
|
+
subscribe_event_types: Optional[Sequence[_builtins.str]] = None):
|
2465
|
+
"""
|
2466
|
+
:param Sequence[_builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
2467
|
+
:param _builtins.str path: A path in Vault that this rule applies to.
|
2268
2468
|
:param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
2269
2469
|
:param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
2270
|
-
:param
|
2271
|
-
:param
|
2272
|
-
:param
|
2273
|
-
:param Sequence[
|
2274
|
-
:param Sequence[
|
2470
|
+
:param _builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
|
2471
|
+
:param _builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
2472
|
+
:param _builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
2473
|
+
:param Sequence[_builtins.str] required_parameters: A list of parameters that must be specified.
|
2474
|
+
:param Sequence[_builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
|
2275
2475
|
"""
|
2276
2476
|
pulumi.set(__self__, "capabilities", capabilities)
|
2277
2477
|
pulumi.set(__self__, "path", path)
|
@@ -2290,31 +2490,31 @@ class GetPolicyDocumentRuleArgs:
|
|
2290
2490
|
if subscribe_event_types is not None:
|
2291
2491
|
pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
|
2292
2492
|
|
2293
|
-
@property
|
2493
|
+
@_builtins.property
|
2294
2494
|
@pulumi.getter
|
2295
|
-
def capabilities(self) -> Sequence[
|
2495
|
+
def capabilities(self) -> Sequence[_builtins.str]:
|
2296
2496
|
"""
|
2297
2497
|
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
2298
2498
|
"""
|
2299
2499
|
return pulumi.get(self, "capabilities")
|
2300
2500
|
|
2301
2501
|
@capabilities.setter
|
2302
|
-
def capabilities(self, value: Sequence[
|
2502
|
+
def capabilities(self, value: Sequence[_builtins.str]):
|
2303
2503
|
pulumi.set(self, "capabilities", value)
|
2304
2504
|
|
2305
|
-
@property
|
2505
|
+
@_builtins.property
|
2306
2506
|
@pulumi.getter
|
2307
|
-
def path(self) ->
|
2507
|
+
def path(self) -> _builtins.str:
|
2308
2508
|
"""
|
2309
2509
|
A path in Vault that this rule applies to.
|
2310
2510
|
"""
|
2311
2511
|
return pulumi.get(self, "path")
|
2312
2512
|
|
2313
2513
|
@path.setter
|
2314
|
-
def path(self, value:
|
2514
|
+
def path(self, value: _builtins.str):
|
2315
2515
|
pulumi.set(self, "path", value)
|
2316
2516
|
|
2317
|
-
@property
|
2517
|
+
@_builtins.property
|
2318
2518
|
@pulumi.getter(name="allowedParameters")
|
2319
2519
|
def allowed_parameters(self) -> Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']]:
|
2320
2520
|
"""
|
@@ -2326,7 +2526,7 @@ class GetPolicyDocumentRuleArgs:
|
|
2326
2526
|
def allowed_parameters(self, value: Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']]):
|
2327
2527
|
pulumi.set(self, "allowed_parameters", value)
|
2328
2528
|
|
2329
|
-
@property
|
2529
|
+
@_builtins.property
|
2330
2530
|
@pulumi.getter(name="deniedParameters")
|
2331
2531
|
def denied_parameters(self) -> Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']]:
|
2332
2532
|
"""
|
@@ -2338,74 +2538,74 @@ class GetPolicyDocumentRuleArgs:
|
|
2338
2538
|
def denied_parameters(self, value: Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']]):
|
2339
2539
|
pulumi.set(self, "denied_parameters", value)
|
2340
2540
|
|
2341
|
-
@property
|
2541
|
+
@_builtins.property
|
2342
2542
|
@pulumi.getter
|
2343
|
-
def description(self) -> Optional[
|
2543
|
+
def description(self) -> Optional[_builtins.str]:
|
2344
2544
|
"""
|
2345
2545
|
Description of the rule. Will be added as a comment to rendered rule.
|
2346
2546
|
"""
|
2347
2547
|
return pulumi.get(self, "description")
|
2348
2548
|
|
2349
2549
|
@description.setter
|
2350
|
-
def description(self, value: Optional[
|
2550
|
+
def description(self, value: Optional[_builtins.str]):
|
2351
2551
|
pulumi.set(self, "description", value)
|
2352
2552
|
|
2353
|
-
@property
|
2553
|
+
@_builtins.property
|
2354
2554
|
@pulumi.getter(name="maxWrappingTtl")
|
2355
|
-
def max_wrapping_ttl(self) -> Optional[
|
2555
|
+
def max_wrapping_ttl(self) -> Optional[_builtins.str]:
|
2356
2556
|
"""
|
2357
2557
|
The maximum allowed TTL that clients can specify for a wrapped response.
|
2358
2558
|
"""
|
2359
2559
|
return pulumi.get(self, "max_wrapping_ttl")
|
2360
2560
|
|
2361
2561
|
@max_wrapping_ttl.setter
|
2362
|
-
def max_wrapping_ttl(self, value: Optional[
|
2562
|
+
def max_wrapping_ttl(self, value: Optional[_builtins.str]):
|
2363
2563
|
pulumi.set(self, "max_wrapping_ttl", value)
|
2364
2564
|
|
2365
|
-
@property
|
2565
|
+
@_builtins.property
|
2366
2566
|
@pulumi.getter(name="minWrappingTtl")
|
2367
|
-
def min_wrapping_ttl(self) -> Optional[
|
2567
|
+
def min_wrapping_ttl(self) -> Optional[_builtins.str]:
|
2368
2568
|
"""
|
2369
2569
|
The minimum allowed TTL that clients can specify for a wrapped response.
|
2370
2570
|
"""
|
2371
2571
|
return pulumi.get(self, "min_wrapping_ttl")
|
2372
2572
|
|
2373
2573
|
@min_wrapping_ttl.setter
|
2374
|
-
def min_wrapping_ttl(self, value: Optional[
|
2574
|
+
def min_wrapping_ttl(self, value: Optional[_builtins.str]):
|
2375
2575
|
pulumi.set(self, "min_wrapping_ttl", value)
|
2376
2576
|
|
2377
|
-
@property
|
2577
|
+
@_builtins.property
|
2378
2578
|
@pulumi.getter(name="requiredParameters")
|
2379
|
-
def required_parameters(self) -> Optional[Sequence[
|
2579
|
+
def required_parameters(self) -> Optional[Sequence[_builtins.str]]:
|
2380
2580
|
"""
|
2381
2581
|
A list of parameters that must be specified.
|
2382
2582
|
"""
|
2383
2583
|
return pulumi.get(self, "required_parameters")
|
2384
2584
|
|
2385
2585
|
@required_parameters.setter
|
2386
|
-
def required_parameters(self, value: Optional[Sequence[
|
2586
|
+
def required_parameters(self, value: Optional[Sequence[_builtins.str]]):
|
2387
2587
|
pulumi.set(self, "required_parameters", value)
|
2388
2588
|
|
2389
|
-
@property
|
2589
|
+
@_builtins.property
|
2390
2590
|
@pulumi.getter(name="subscribeEventTypes")
|
2391
|
-
def subscribe_event_types(self) -> Optional[Sequence[
|
2591
|
+
def subscribe_event_types(self) -> Optional[Sequence[_builtins.str]]:
|
2392
2592
|
"""
|
2393
2593
|
A list of event types to subscribe to when using `subscribe` capability.
|
2394
2594
|
"""
|
2395
2595
|
return pulumi.get(self, "subscribe_event_types")
|
2396
2596
|
|
2397
2597
|
@subscribe_event_types.setter
|
2398
|
-
def subscribe_event_types(self, value: Optional[Sequence[
|
2598
|
+
def subscribe_event_types(self, value: Optional[Sequence[_builtins.str]]):
|
2399
2599
|
pulumi.set(self, "subscribe_event_types", value)
|
2400
2600
|
|
2401
2601
|
|
2402
2602
|
if not MYPY:
|
2403
2603
|
class GetPolicyDocumentRuleAllowedParameterArgsDict(TypedDict):
|
2404
|
-
key:
|
2604
|
+
key: _builtins.str
|
2405
2605
|
"""
|
2406
2606
|
Name of permitted key.
|
2407
2607
|
"""
|
2408
|
-
values: Sequence[
|
2608
|
+
values: Sequence[_builtins.str]
|
2409
2609
|
"""
|
2410
2610
|
A list of values what are permitted by policy rule.
|
2411
2611
|
"""
|
@@ -2415,47 +2615,47 @@ elif False:
|
|
2415
2615
|
@pulumi.input_type
|
2416
2616
|
class GetPolicyDocumentRuleAllowedParameterArgs:
|
2417
2617
|
def __init__(__self__, *,
|
2418
|
-
key:
|
2419
|
-
values: Sequence[
|
2618
|
+
key: _builtins.str,
|
2619
|
+
values: Sequence[_builtins.str]):
|
2420
2620
|
"""
|
2421
|
-
:param
|
2422
|
-
:param Sequence[
|
2621
|
+
:param _builtins.str key: Name of permitted key.
|
2622
|
+
:param Sequence[_builtins.str] values: A list of values what are permitted by policy rule.
|
2423
2623
|
"""
|
2424
2624
|
pulumi.set(__self__, "key", key)
|
2425
2625
|
pulumi.set(__self__, "values", values)
|
2426
2626
|
|
2427
|
-
@property
|
2627
|
+
@_builtins.property
|
2428
2628
|
@pulumi.getter
|
2429
|
-
def key(self) ->
|
2629
|
+
def key(self) -> _builtins.str:
|
2430
2630
|
"""
|
2431
2631
|
Name of permitted key.
|
2432
2632
|
"""
|
2433
2633
|
return pulumi.get(self, "key")
|
2434
2634
|
|
2435
2635
|
@key.setter
|
2436
|
-
def key(self, value:
|
2636
|
+
def key(self, value: _builtins.str):
|
2437
2637
|
pulumi.set(self, "key", value)
|
2438
2638
|
|
2439
|
-
@property
|
2639
|
+
@_builtins.property
|
2440
2640
|
@pulumi.getter
|
2441
|
-
def values(self) -> Sequence[
|
2641
|
+
def values(self) -> Sequence[_builtins.str]:
|
2442
2642
|
"""
|
2443
2643
|
A list of values what are permitted by policy rule.
|
2444
2644
|
"""
|
2445
2645
|
return pulumi.get(self, "values")
|
2446
2646
|
|
2447
2647
|
@values.setter
|
2448
|
-
def values(self, value: Sequence[
|
2648
|
+
def values(self, value: Sequence[_builtins.str]):
|
2449
2649
|
pulumi.set(self, "values", value)
|
2450
2650
|
|
2451
2651
|
|
2452
2652
|
if not MYPY:
|
2453
2653
|
class GetPolicyDocumentRuleDeniedParameterArgsDict(TypedDict):
|
2454
|
-
key:
|
2654
|
+
key: _builtins.str
|
2455
2655
|
"""
|
2456
2656
|
Name of denied key.
|
2457
2657
|
"""
|
2458
|
-
values: Sequence[
|
2658
|
+
values: Sequence[_builtins.str]
|
2459
2659
|
"""
|
2460
2660
|
A list of values what are denied by policy rule.
|
2461
2661
|
"""
|
@@ -2465,37 +2665,37 @@ elif False:
|
|
2465
2665
|
@pulumi.input_type
|
2466
2666
|
class GetPolicyDocumentRuleDeniedParameterArgs:
|
2467
2667
|
def __init__(__self__, *,
|
2468
|
-
key:
|
2469
|
-
values: Sequence[
|
2668
|
+
key: _builtins.str,
|
2669
|
+
values: Sequence[_builtins.str]):
|
2470
2670
|
"""
|
2471
|
-
:param
|
2472
|
-
:param Sequence[
|
2671
|
+
:param _builtins.str key: Name of denied key.
|
2672
|
+
:param Sequence[_builtins.str] values: A list of values what are denied by policy rule.
|
2473
2673
|
"""
|
2474
2674
|
pulumi.set(__self__, "key", key)
|
2475
2675
|
pulumi.set(__self__, "values", values)
|
2476
2676
|
|
2477
|
-
@property
|
2677
|
+
@_builtins.property
|
2478
2678
|
@pulumi.getter
|
2479
|
-
def key(self) ->
|
2679
|
+
def key(self) -> _builtins.str:
|
2480
2680
|
"""
|
2481
2681
|
Name of denied key.
|
2482
2682
|
"""
|
2483
2683
|
return pulumi.get(self, "key")
|
2484
2684
|
|
2485
2685
|
@key.setter
|
2486
|
-
def key(self, value:
|
2686
|
+
def key(self, value: _builtins.str):
|
2487
2687
|
pulumi.set(self, "key", value)
|
2488
2688
|
|
2489
|
-
@property
|
2689
|
+
@_builtins.property
|
2490
2690
|
@pulumi.getter
|
2491
|
-
def values(self) -> Sequence[
|
2691
|
+
def values(self) -> Sequence[_builtins.str]:
|
2492
2692
|
"""
|
2493
2693
|
A list of values what are denied by policy rule.
|
2494
2694
|
"""
|
2495
2695
|
return pulumi.get(self, "values")
|
2496
2696
|
|
2497
2697
|
@values.setter
|
2498
|
-
def values(self, value: Sequence[
|
2698
|
+
def values(self, value: Sequence[_builtins.str]):
|
2499
2699
|
pulumi.set(self, "values", value)
|
2500
2700
|
|
2501
2701
|
|