pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,39 +19,39 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
acs_urls: pulumi.Input[Sequence[pulumi.Input[
|
24
|
-
entity_id: pulumi.Input[
|
25
|
-
default_role: Optional[pulumi.Input[
|
26
|
-
disable_remount: Optional[pulumi.Input[
|
27
|
-
idp_cert: Optional[pulumi.Input[
|
28
|
-
idp_entity_id: Optional[pulumi.Input[
|
29
|
-
idp_metadata_url: Optional[pulumi.Input[
|
30
|
-
idp_sso_url: Optional[pulumi.Input[
|
31
|
-
namespace: Optional[pulumi.Input[
|
32
|
-
path: Optional[pulumi.Input[
|
33
|
-
verbose_logging: Optional[pulumi.Input[
|
22
|
+
acs_urls: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
23
|
+
entity_id: pulumi.Input[_builtins.str],
|
24
|
+
default_role: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
26
|
+
idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None):
|
34
33
|
"""
|
35
34
|
The set of arguments for constructing a AuthBackend resource.
|
36
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
35
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
|
37
36
|
that should receive a response from the identity provider.
|
38
|
-
:param pulumi.Input[
|
39
|
-
:param pulumi.Input[
|
40
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[_builtins.str] entity_id: The entity ID of the SAML authentication service provider.
|
38
|
+
:param pulumi.Input[_builtins.str] default_role: The role to use if no role is provided during login.
|
39
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
|
41
40
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
42
|
-
:param pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
|
43
42
|
with `idp_metadata_url`.
|
44
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
|
45
44
|
`idp_metadata_url`.
|
46
|
-
:param pulumi.Input[
|
47
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.str] idp_metadata_url: The metadata URL of the identity provider.
|
46
|
+
:param pulumi.Input[_builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
|
48
47
|
`idp_metadata_url`.
|
49
|
-
:param pulumi.Input[
|
48
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
50
49
|
The value should not contain leading or trailing forward slashes.
|
51
50
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
52
51
|
*Available only for Vault Enterprise*.
|
53
|
-
:param pulumi.Input[
|
52
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
54
53
|
if not specified.
|
55
|
-
:param pulumi.Input[
|
54
|
+
:param pulumi.Input[_builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
|
56
55
|
information during the SAML exchange according to the current logging level. Not
|
57
56
|
recommended for production.
|
58
57
|
"""
|
@@ -77,9 +76,9 @@ class AuthBackendArgs:
|
|
77
76
|
if verbose_logging is not None:
|
78
77
|
pulumi.set(__self__, "verbose_logging", verbose_logging)
|
79
78
|
|
80
|
-
@property
|
79
|
+
@_builtins.property
|
81
80
|
@pulumi.getter(name="acsUrls")
|
82
|
-
def acs_urls(self) -> pulumi.Input[Sequence[pulumi.Input[
|
81
|
+
def acs_urls(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
83
82
|
"""
|
84
83
|
The well-formatted URLs of your Assertion Consumer Service (ACS)
|
85
84
|
that should receive a response from the identity provider.
|
@@ -87,36 +86,36 @@ class AuthBackendArgs:
|
|
87
86
|
return pulumi.get(self, "acs_urls")
|
88
87
|
|
89
88
|
@acs_urls.setter
|
90
|
-
def acs_urls(self, value: pulumi.Input[Sequence[pulumi.Input[
|
89
|
+
def acs_urls(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
91
90
|
pulumi.set(self, "acs_urls", value)
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter(name="entityId")
|
95
|
-
def entity_id(self) -> pulumi.Input[
|
94
|
+
def entity_id(self) -> pulumi.Input[_builtins.str]:
|
96
95
|
"""
|
97
96
|
The entity ID of the SAML authentication service provider.
|
98
97
|
"""
|
99
98
|
return pulumi.get(self, "entity_id")
|
100
99
|
|
101
100
|
@entity_id.setter
|
102
|
-
def entity_id(self, value: pulumi.Input[
|
101
|
+
def entity_id(self, value: pulumi.Input[_builtins.str]):
|
103
102
|
pulumi.set(self, "entity_id", value)
|
104
103
|
|
105
|
-
@property
|
104
|
+
@_builtins.property
|
106
105
|
@pulumi.getter(name="defaultRole")
|
107
|
-
def default_role(self) -> Optional[pulumi.Input[
|
106
|
+
def default_role(self) -> Optional[pulumi.Input[_builtins.str]]:
|
108
107
|
"""
|
109
108
|
The role to use if no role is provided during login.
|
110
109
|
"""
|
111
110
|
return pulumi.get(self, "default_role")
|
112
111
|
|
113
112
|
@default_role.setter
|
114
|
-
def default_role(self, value: Optional[pulumi.Input[
|
113
|
+
def default_role(self, value: Optional[pulumi.Input[_builtins.str]]):
|
115
114
|
pulumi.set(self, "default_role", value)
|
116
115
|
|
117
|
-
@property
|
116
|
+
@_builtins.property
|
118
117
|
@pulumi.getter(name="disableRemount")
|
119
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
118
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
120
119
|
"""
|
121
120
|
If set to `true`, opts out of mount migration on path updates.
|
122
121
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -124,12 +123,12 @@ class AuthBackendArgs:
|
|
124
123
|
return pulumi.get(self, "disable_remount")
|
125
124
|
|
126
125
|
@disable_remount.setter
|
127
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
126
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
128
127
|
pulumi.set(self, "disable_remount", value)
|
129
128
|
|
130
|
-
@property
|
129
|
+
@_builtins.property
|
131
130
|
@pulumi.getter(name="idpCert")
|
132
|
-
def idp_cert(self) -> Optional[pulumi.Input[
|
131
|
+
def idp_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
133
132
|
"""
|
134
133
|
The PEM encoded certificate of the identity provider. Mutually exclusive
|
135
134
|
with `idp_metadata_url`.
|
@@ -137,12 +136,12 @@ class AuthBackendArgs:
|
|
137
136
|
return pulumi.get(self, "idp_cert")
|
138
137
|
|
139
138
|
@idp_cert.setter
|
140
|
-
def idp_cert(self, value: Optional[pulumi.Input[
|
139
|
+
def idp_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
141
140
|
pulumi.set(self, "idp_cert", value)
|
142
141
|
|
143
|
-
@property
|
142
|
+
@_builtins.property
|
144
143
|
@pulumi.getter(name="idpEntityId")
|
145
|
-
def idp_entity_id(self) -> Optional[pulumi.Input[
|
144
|
+
def idp_entity_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
146
145
|
"""
|
147
146
|
The entity ID of the identity provider. Mutually exclusive with
|
148
147
|
`idp_metadata_url`.
|
@@ -150,24 +149,24 @@ class AuthBackendArgs:
|
|
150
149
|
return pulumi.get(self, "idp_entity_id")
|
151
150
|
|
152
151
|
@idp_entity_id.setter
|
153
|
-
def idp_entity_id(self, value: Optional[pulumi.Input[
|
152
|
+
def idp_entity_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
154
153
|
pulumi.set(self, "idp_entity_id", value)
|
155
154
|
|
156
|
-
@property
|
155
|
+
@_builtins.property
|
157
156
|
@pulumi.getter(name="idpMetadataUrl")
|
158
|
-
def idp_metadata_url(self) -> Optional[pulumi.Input[
|
157
|
+
def idp_metadata_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
159
158
|
"""
|
160
159
|
The metadata URL of the identity provider.
|
161
160
|
"""
|
162
161
|
return pulumi.get(self, "idp_metadata_url")
|
163
162
|
|
164
163
|
@idp_metadata_url.setter
|
165
|
-
def idp_metadata_url(self, value: Optional[pulumi.Input[
|
164
|
+
def idp_metadata_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
166
165
|
pulumi.set(self, "idp_metadata_url", value)
|
167
166
|
|
168
|
-
@property
|
167
|
+
@_builtins.property
|
169
168
|
@pulumi.getter(name="idpSsoUrl")
|
170
|
-
def idp_sso_url(self) -> Optional[pulumi.Input[
|
169
|
+
def idp_sso_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
171
170
|
"""
|
172
171
|
The SSO URL of the identity provider. Mutually exclusive with
|
173
172
|
`idp_metadata_url`.
|
@@ -175,12 +174,12 @@ class AuthBackendArgs:
|
|
175
174
|
return pulumi.get(self, "idp_sso_url")
|
176
175
|
|
177
176
|
@idp_sso_url.setter
|
178
|
-
def idp_sso_url(self, value: Optional[pulumi.Input[
|
177
|
+
def idp_sso_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
179
178
|
pulumi.set(self, "idp_sso_url", value)
|
180
179
|
|
181
|
-
@property
|
180
|
+
@_builtins.property
|
182
181
|
@pulumi.getter
|
183
|
-
def namespace(self) -> Optional[pulumi.Input[
|
182
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
184
183
|
"""
|
185
184
|
The namespace to provision the resource in.
|
186
185
|
The value should not contain leading or trailing forward slashes.
|
@@ -190,12 +189,12 @@ class AuthBackendArgs:
|
|
190
189
|
return pulumi.get(self, "namespace")
|
191
190
|
|
192
191
|
@namespace.setter
|
193
|
-
def namespace(self, value: Optional[pulumi.Input[
|
192
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
194
193
|
pulumi.set(self, "namespace", value)
|
195
194
|
|
196
|
-
@property
|
195
|
+
@_builtins.property
|
197
196
|
@pulumi.getter
|
198
|
-
def path(self) -> Optional[pulumi.Input[
|
197
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
199
198
|
"""
|
200
199
|
Path where the auth backend will be mounted. Defaults to `auth/saml`
|
201
200
|
if not specified.
|
@@ -203,12 +202,12 @@ class AuthBackendArgs:
|
|
203
202
|
return pulumi.get(self, "path")
|
204
203
|
|
205
204
|
@path.setter
|
206
|
-
def path(self, value: Optional[pulumi.Input[
|
205
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
207
206
|
pulumi.set(self, "path", value)
|
208
207
|
|
209
|
-
@property
|
208
|
+
@_builtins.property
|
210
209
|
@pulumi.getter(name="verboseLogging")
|
211
|
-
def verbose_logging(self) -> Optional[pulumi.Input[
|
210
|
+
def verbose_logging(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
212
211
|
"""
|
213
212
|
If set to `true`, logs additional, potentially sensitive
|
214
213
|
information during the SAML exchange according to the current logging level. Not
|
@@ -217,46 +216,46 @@ class AuthBackendArgs:
|
|
217
216
|
return pulumi.get(self, "verbose_logging")
|
218
217
|
|
219
218
|
@verbose_logging.setter
|
220
|
-
def verbose_logging(self, value: Optional[pulumi.Input[
|
219
|
+
def verbose_logging(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
221
220
|
pulumi.set(self, "verbose_logging", value)
|
222
221
|
|
223
222
|
|
224
223
|
@pulumi.input_type
|
225
224
|
class _AuthBackendState:
|
226
225
|
def __init__(__self__, *,
|
227
|
-
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
228
|
-
default_role: Optional[pulumi.Input[
|
229
|
-
disable_remount: Optional[pulumi.Input[
|
230
|
-
entity_id: Optional[pulumi.Input[
|
231
|
-
idp_cert: Optional[pulumi.Input[
|
232
|
-
idp_entity_id: Optional[pulumi.Input[
|
233
|
-
idp_metadata_url: Optional[pulumi.Input[
|
234
|
-
idp_sso_url: Optional[pulumi.Input[
|
235
|
-
namespace: Optional[pulumi.Input[
|
236
|
-
path: Optional[pulumi.Input[
|
237
|
-
verbose_logging: Optional[pulumi.Input[
|
226
|
+
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
227
|
+
default_role: Optional[pulumi.Input[_builtins.str]] = None,
|
228
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
229
|
+
entity_id: Optional[pulumi.Input[_builtins.str]] = None,
|
230
|
+
idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
231
|
+
idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
|
232
|
+
idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
|
233
|
+
idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
|
234
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
235
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
236
|
+
verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None):
|
238
237
|
"""
|
239
238
|
Input properties used for looking up and filtering AuthBackend resources.
|
240
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
239
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
|
241
240
|
that should receive a response from the identity provider.
|
242
|
-
:param pulumi.Input[
|
243
|
-
:param pulumi.Input[
|
241
|
+
:param pulumi.Input[_builtins.str] default_role: The role to use if no role is provided during login.
|
242
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
|
244
243
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
245
|
-
:param pulumi.Input[
|
246
|
-
:param pulumi.Input[
|
244
|
+
:param pulumi.Input[_builtins.str] entity_id: The entity ID of the SAML authentication service provider.
|
245
|
+
:param pulumi.Input[_builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
|
247
246
|
with `idp_metadata_url`.
|
248
|
-
:param pulumi.Input[
|
247
|
+
:param pulumi.Input[_builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
|
249
248
|
`idp_metadata_url`.
|
250
|
-
:param pulumi.Input[
|
251
|
-
:param pulumi.Input[
|
249
|
+
:param pulumi.Input[_builtins.str] idp_metadata_url: The metadata URL of the identity provider.
|
250
|
+
:param pulumi.Input[_builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
|
252
251
|
`idp_metadata_url`.
|
253
|
-
:param pulumi.Input[
|
252
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
254
253
|
The value should not contain leading or trailing forward slashes.
|
255
254
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
256
255
|
*Available only for Vault Enterprise*.
|
257
|
-
:param pulumi.Input[
|
256
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
258
257
|
if not specified.
|
259
|
-
:param pulumi.Input[
|
258
|
+
:param pulumi.Input[_builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
|
260
259
|
information during the SAML exchange according to the current logging level. Not
|
261
260
|
recommended for production.
|
262
261
|
"""
|
@@ -283,9 +282,9 @@ class _AuthBackendState:
|
|
283
282
|
if verbose_logging is not None:
|
284
283
|
pulumi.set(__self__, "verbose_logging", verbose_logging)
|
285
284
|
|
286
|
-
@property
|
285
|
+
@_builtins.property
|
287
286
|
@pulumi.getter(name="acsUrls")
|
288
|
-
def acs_urls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
287
|
+
def acs_urls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
289
288
|
"""
|
290
289
|
The well-formatted URLs of your Assertion Consumer Service (ACS)
|
291
290
|
that should receive a response from the identity provider.
|
@@ -293,24 +292,24 @@ class _AuthBackendState:
|
|
293
292
|
return pulumi.get(self, "acs_urls")
|
294
293
|
|
295
294
|
@acs_urls.setter
|
296
|
-
def acs_urls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
295
|
+
def acs_urls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
297
296
|
pulumi.set(self, "acs_urls", value)
|
298
297
|
|
299
|
-
@property
|
298
|
+
@_builtins.property
|
300
299
|
@pulumi.getter(name="defaultRole")
|
301
|
-
def default_role(self) -> Optional[pulumi.Input[
|
300
|
+
def default_role(self) -> Optional[pulumi.Input[_builtins.str]]:
|
302
301
|
"""
|
303
302
|
The role to use if no role is provided during login.
|
304
303
|
"""
|
305
304
|
return pulumi.get(self, "default_role")
|
306
305
|
|
307
306
|
@default_role.setter
|
308
|
-
def default_role(self, value: Optional[pulumi.Input[
|
307
|
+
def default_role(self, value: Optional[pulumi.Input[_builtins.str]]):
|
309
308
|
pulumi.set(self, "default_role", value)
|
310
309
|
|
311
|
-
@property
|
310
|
+
@_builtins.property
|
312
311
|
@pulumi.getter(name="disableRemount")
|
313
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
312
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
314
313
|
"""
|
315
314
|
If set to `true`, opts out of mount migration on path updates.
|
316
315
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -318,24 +317,24 @@ class _AuthBackendState:
|
|
318
317
|
return pulumi.get(self, "disable_remount")
|
319
318
|
|
320
319
|
@disable_remount.setter
|
321
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
320
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
322
321
|
pulumi.set(self, "disable_remount", value)
|
323
322
|
|
324
|
-
@property
|
323
|
+
@_builtins.property
|
325
324
|
@pulumi.getter(name="entityId")
|
326
|
-
def entity_id(self) -> Optional[pulumi.Input[
|
325
|
+
def entity_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
327
326
|
"""
|
328
327
|
The entity ID of the SAML authentication service provider.
|
329
328
|
"""
|
330
329
|
return pulumi.get(self, "entity_id")
|
331
330
|
|
332
331
|
@entity_id.setter
|
333
|
-
def entity_id(self, value: Optional[pulumi.Input[
|
332
|
+
def entity_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
334
333
|
pulumi.set(self, "entity_id", value)
|
335
334
|
|
336
|
-
@property
|
335
|
+
@_builtins.property
|
337
336
|
@pulumi.getter(name="idpCert")
|
338
|
-
def idp_cert(self) -> Optional[pulumi.Input[
|
337
|
+
def idp_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
339
338
|
"""
|
340
339
|
The PEM encoded certificate of the identity provider. Mutually exclusive
|
341
340
|
with `idp_metadata_url`.
|
@@ -343,12 +342,12 @@ class _AuthBackendState:
|
|
343
342
|
return pulumi.get(self, "idp_cert")
|
344
343
|
|
345
344
|
@idp_cert.setter
|
346
|
-
def idp_cert(self, value: Optional[pulumi.Input[
|
345
|
+
def idp_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
347
346
|
pulumi.set(self, "idp_cert", value)
|
348
347
|
|
349
|
-
@property
|
348
|
+
@_builtins.property
|
350
349
|
@pulumi.getter(name="idpEntityId")
|
351
|
-
def idp_entity_id(self) -> Optional[pulumi.Input[
|
350
|
+
def idp_entity_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
352
351
|
"""
|
353
352
|
The entity ID of the identity provider. Mutually exclusive with
|
354
353
|
`idp_metadata_url`.
|
@@ -356,24 +355,24 @@ class _AuthBackendState:
|
|
356
355
|
return pulumi.get(self, "idp_entity_id")
|
357
356
|
|
358
357
|
@idp_entity_id.setter
|
359
|
-
def idp_entity_id(self, value: Optional[pulumi.Input[
|
358
|
+
def idp_entity_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
360
359
|
pulumi.set(self, "idp_entity_id", value)
|
361
360
|
|
362
|
-
@property
|
361
|
+
@_builtins.property
|
363
362
|
@pulumi.getter(name="idpMetadataUrl")
|
364
|
-
def idp_metadata_url(self) -> Optional[pulumi.Input[
|
363
|
+
def idp_metadata_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
365
364
|
"""
|
366
365
|
The metadata URL of the identity provider.
|
367
366
|
"""
|
368
367
|
return pulumi.get(self, "idp_metadata_url")
|
369
368
|
|
370
369
|
@idp_metadata_url.setter
|
371
|
-
def idp_metadata_url(self, value: Optional[pulumi.Input[
|
370
|
+
def idp_metadata_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
372
371
|
pulumi.set(self, "idp_metadata_url", value)
|
373
372
|
|
374
|
-
@property
|
373
|
+
@_builtins.property
|
375
374
|
@pulumi.getter(name="idpSsoUrl")
|
376
|
-
def idp_sso_url(self) -> Optional[pulumi.Input[
|
375
|
+
def idp_sso_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
377
376
|
"""
|
378
377
|
The SSO URL of the identity provider. Mutually exclusive with
|
379
378
|
`idp_metadata_url`.
|
@@ -381,12 +380,12 @@ class _AuthBackendState:
|
|
381
380
|
return pulumi.get(self, "idp_sso_url")
|
382
381
|
|
383
382
|
@idp_sso_url.setter
|
384
|
-
def idp_sso_url(self, value: Optional[pulumi.Input[
|
383
|
+
def idp_sso_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
385
384
|
pulumi.set(self, "idp_sso_url", value)
|
386
385
|
|
387
|
-
@property
|
386
|
+
@_builtins.property
|
388
387
|
@pulumi.getter
|
389
|
-
def namespace(self) -> Optional[pulumi.Input[
|
388
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
390
389
|
"""
|
391
390
|
The namespace to provision the resource in.
|
392
391
|
The value should not contain leading or trailing forward slashes.
|
@@ -396,12 +395,12 @@ class _AuthBackendState:
|
|
396
395
|
return pulumi.get(self, "namespace")
|
397
396
|
|
398
397
|
@namespace.setter
|
399
|
-
def namespace(self, value: Optional[pulumi.Input[
|
398
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
400
399
|
pulumi.set(self, "namespace", value)
|
401
400
|
|
402
|
-
@property
|
401
|
+
@_builtins.property
|
403
402
|
@pulumi.getter
|
404
|
-
def path(self) -> Optional[pulumi.Input[
|
403
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
405
404
|
"""
|
406
405
|
Path where the auth backend will be mounted. Defaults to `auth/saml`
|
407
406
|
if not specified.
|
@@ -409,12 +408,12 @@ class _AuthBackendState:
|
|
409
408
|
return pulumi.get(self, "path")
|
410
409
|
|
411
410
|
@path.setter
|
412
|
-
def path(self, value: Optional[pulumi.Input[
|
411
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
413
412
|
pulumi.set(self, "path", value)
|
414
413
|
|
415
|
-
@property
|
414
|
+
@_builtins.property
|
416
415
|
@pulumi.getter(name="verboseLogging")
|
417
|
-
def verbose_logging(self) -> Optional[pulumi.Input[
|
416
|
+
def verbose_logging(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
418
417
|
"""
|
419
418
|
If set to `true`, logs additional, potentially sensitive
|
420
419
|
information during the SAML exchange according to the current logging level. Not
|
@@ -423,7 +422,7 @@ class _AuthBackendState:
|
|
423
422
|
return pulumi.get(self, "verbose_logging")
|
424
423
|
|
425
424
|
@verbose_logging.setter
|
426
|
-
def verbose_logging(self, value: Optional[pulumi.Input[
|
425
|
+
def verbose_logging(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
427
426
|
pulumi.set(self, "verbose_logging", value)
|
428
427
|
|
429
428
|
|
@@ -433,17 +432,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
433
432
|
def __init__(__self__,
|
434
433
|
resource_name: str,
|
435
434
|
opts: Optional[pulumi.ResourceOptions] = None,
|
436
|
-
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
437
|
-
default_role: Optional[pulumi.Input[
|
438
|
-
disable_remount: Optional[pulumi.Input[
|
439
|
-
entity_id: Optional[pulumi.Input[
|
440
|
-
idp_cert: Optional[pulumi.Input[
|
441
|
-
idp_entity_id: Optional[pulumi.Input[
|
442
|
-
idp_metadata_url: Optional[pulumi.Input[
|
443
|
-
idp_sso_url: Optional[pulumi.Input[
|
444
|
-
namespace: Optional[pulumi.Input[
|
445
|
-
path: Optional[pulumi.Input[
|
446
|
-
verbose_logging: Optional[pulumi.Input[
|
435
|
+
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
436
|
+
default_role: Optional[pulumi.Input[_builtins.str]] = None,
|
437
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
438
|
+
entity_id: Optional[pulumi.Input[_builtins.str]] = None,
|
439
|
+
idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
440
|
+
idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
|
441
|
+
idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
|
442
|
+
idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
|
443
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
444
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
445
|
+
verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None,
|
447
446
|
__props__=None):
|
448
447
|
"""
|
449
448
|
Manages a SAML Auth mount in a Vault server. See the [Vault
|
@@ -474,26 +473,26 @@ class AuthBackend(pulumi.CustomResource):
|
|
474
473
|
|
475
474
|
:param str resource_name: The name of the resource.
|
476
475
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
477
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
476
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
|
478
477
|
that should receive a response from the identity provider.
|
479
|
-
:param pulumi.Input[
|
480
|
-
:param pulumi.Input[
|
478
|
+
:param pulumi.Input[_builtins.str] default_role: The role to use if no role is provided during login.
|
479
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
|
481
480
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
482
|
-
:param pulumi.Input[
|
483
|
-
:param pulumi.Input[
|
481
|
+
:param pulumi.Input[_builtins.str] entity_id: The entity ID of the SAML authentication service provider.
|
482
|
+
:param pulumi.Input[_builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
|
484
483
|
with `idp_metadata_url`.
|
485
|
-
:param pulumi.Input[
|
484
|
+
:param pulumi.Input[_builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
|
486
485
|
`idp_metadata_url`.
|
487
|
-
:param pulumi.Input[
|
488
|
-
:param pulumi.Input[
|
486
|
+
:param pulumi.Input[_builtins.str] idp_metadata_url: The metadata URL of the identity provider.
|
487
|
+
:param pulumi.Input[_builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
|
489
488
|
`idp_metadata_url`.
|
490
|
-
:param pulumi.Input[
|
489
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
491
490
|
The value should not contain leading or trailing forward slashes.
|
492
491
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
493
492
|
*Available only for Vault Enterprise*.
|
494
|
-
:param pulumi.Input[
|
493
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
495
494
|
if not specified.
|
496
|
-
:param pulumi.Input[
|
495
|
+
:param pulumi.Input[_builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
|
497
496
|
information during the SAML exchange according to the current logging level. Not
|
498
497
|
recommended for production.
|
499
498
|
"""
|
@@ -545,17 +544,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
545
544
|
def _internal_init(__self__,
|
546
545
|
resource_name: str,
|
547
546
|
opts: Optional[pulumi.ResourceOptions] = None,
|
548
|
-
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
549
|
-
default_role: Optional[pulumi.Input[
|
550
|
-
disable_remount: Optional[pulumi.Input[
|
551
|
-
entity_id: Optional[pulumi.Input[
|
552
|
-
idp_cert: Optional[pulumi.Input[
|
553
|
-
idp_entity_id: Optional[pulumi.Input[
|
554
|
-
idp_metadata_url: Optional[pulumi.Input[
|
555
|
-
idp_sso_url: Optional[pulumi.Input[
|
556
|
-
namespace: Optional[pulumi.Input[
|
557
|
-
path: Optional[pulumi.Input[
|
558
|
-
verbose_logging: Optional[pulumi.Input[
|
547
|
+
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
548
|
+
default_role: Optional[pulumi.Input[_builtins.str]] = None,
|
549
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
550
|
+
entity_id: Optional[pulumi.Input[_builtins.str]] = None,
|
551
|
+
idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
552
|
+
idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
|
553
|
+
idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
|
554
|
+
idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
|
555
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
556
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
557
|
+
verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None,
|
559
558
|
__props__=None):
|
560
559
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
561
560
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -590,17 +589,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
590
589
|
def get(resource_name: str,
|
591
590
|
id: pulumi.Input[str],
|
592
591
|
opts: Optional[pulumi.ResourceOptions] = None,
|
593
|
-
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[
|
594
|
-
default_role: Optional[pulumi.Input[
|
595
|
-
disable_remount: Optional[pulumi.Input[
|
596
|
-
entity_id: Optional[pulumi.Input[
|
597
|
-
idp_cert: Optional[pulumi.Input[
|
598
|
-
idp_entity_id: Optional[pulumi.Input[
|
599
|
-
idp_metadata_url: Optional[pulumi.Input[
|
600
|
-
idp_sso_url: Optional[pulumi.Input[
|
601
|
-
namespace: Optional[pulumi.Input[
|
602
|
-
path: Optional[pulumi.Input[
|
603
|
-
verbose_logging: Optional[pulumi.Input[
|
592
|
+
acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
593
|
+
default_role: Optional[pulumi.Input[_builtins.str]] = None,
|
594
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
595
|
+
entity_id: Optional[pulumi.Input[_builtins.str]] = None,
|
596
|
+
idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
597
|
+
idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
|
598
|
+
idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
|
599
|
+
idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
|
600
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
601
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
602
|
+
verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None) -> 'AuthBackend':
|
604
603
|
"""
|
605
604
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
606
605
|
properties used to qualify the lookup.
|
@@ -608,26 +607,26 @@ class AuthBackend(pulumi.CustomResource):
|
|
608
607
|
:param str resource_name: The unique name of the resulting resource.
|
609
608
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
610
609
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
611
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
610
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
|
612
611
|
that should receive a response from the identity provider.
|
613
|
-
:param pulumi.Input[
|
614
|
-
:param pulumi.Input[
|
612
|
+
:param pulumi.Input[_builtins.str] default_role: The role to use if no role is provided during login.
|
613
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
|
615
614
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
616
|
-
:param pulumi.Input[
|
617
|
-
:param pulumi.Input[
|
615
|
+
:param pulumi.Input[_builtins.str] entity_id: The entity ID of the SAML authentication service provider.
|
616
|
+
:param pulumi.Input[_builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
|
618
617
|
with `idp_metadata_url`.
|
619
|
-
:param pulumi.Input[
|
618
|
+
:param pulumi.Input[_builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
|
620
619
|
`idp_metadata_url`.
|
621
|
-
:param pulumi.Input[
|
622
|
-
:param pulumi.Input[
|
620
|
+
:param pulumi.Input[_builtins.str] idp_metadata_url: The metadata URL of the identity provider.
|
621
|
+
:param pulumi.Input[_builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
|
623
622
|
`idp_metadata_url`.
|
624
|
-
:param pulumi.Input[
|
623
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
625
624
|
The value should not contain leading or trailing forward slashes.
|
626
625
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
627
626
|
*Available only for Vault Enterprise*.
|
628
|
-
:param pulumi.Input[
|
627
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
629
628
|
if not specified.
|
630
|
-
:param pulumi.Input[
|
629
|
+
:param pulumi.Input[_builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
|
631
630
|
information during the SAML exchange according to the current logging level. Not
|
632
631
|
recommended for production.
|
633
632
|
"""
|
@@ -648,78 +647,78 @@ class AuthBackend(pulumi.CustomResource):
|
|
648
647
|
__props__.__dict__["verbose_logging"] = verbose_logging
|
649
648
|
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
650
649
|
|
651
|
-
@property
|
650
|
+
@_builtins.property
|
652
651
|
@pulumi.getter(name="acsUrls")
|
653
|
-
def acs_urls(self) -> pulumi.Output[Sequence[
|
652
|
+
def acs_urls(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
654
653
|
"""
|
655
654
|
The well-formatted URLs of your Assertion Consumer Service (ACS)
|
656
655
|
that should receive a response from the identity provider.
|
657
656
|
"""
|
658
657
|
return pulumi.get(self, "acs_urls")
|
659
658
|
|
660
|
-
@property
|
659
|
+
@_builtins.property
|
661
660
|
@pulumi.getter(name="defaultRole")
|
662
|
-
def default_role(self) -> pulumi.Output[Optional[
|
661
|
+
def default_role(self) -> pulumi.Output[Optional[_builtins.str]]:
|
663
662
|
"""
|
664
663
|
The role to use if no role is provided during login.
|
665
664
|
"""
|
666
665
|
return pulumi.get(self, "default_role")
|
667
666
|
|
668
|
-
@property
|
667
|
+
@_builtins.property
|
669
668
|
@pulumi.getter(name="disableRemount")
|
670
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
669
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
671
670
|
"""
|
672
671
|
If set to `true`, opts out of mount migration on path updates.
|
673
672
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
674
673
|
"""
|
675
674
|
return pulumi.get(self, "disable_remount")
|
676
675
|
|
677
|
-
@property
|
676
|
+
@_builtins.property
|
678
677
|
@pulumi.getter(name="entityId")
|
679
|
-
def entity_id(self) -> pulumi.Output[
|
678
|
+
def entity_id(self) -> pulumi.Output[_builtins.str]:
|
680
679
|
"""
|
681
680
|
The entity ID of the SAML authentication service provider.
|
682
681
|
"""
|
683
682
|
return pulumi.get(self, "entity_id")
|
684
683
|
|
685
|
-
@property
|
684
|
+
@_builtins.property
|
686
685
|
@pulumi.getter(name="idpCert")
|
687
|
-
def idp_cert(self) -> pulumi.Output[Optional[
|
686
|
+
def idp_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
|
688
687
|
"""
|
689
688
|
The PEM encoded certificate of the identity provider. Mutually exclusive
|
690
689
|
with `idp_metadata_url`.
|
691
690
|
"""
|
692
691
|
return pulumi.get(self, "idp_cert")
|
693
692
|
|
694
|
-
@property
|
693
|
+
@_builtins.property
|
695
694
|
@pulumi.getter(name="idpEntityId")
|
696
|
-
def idp_entity_id(self) -> pulumi.Output[Optional[
|
695
|
+
def idp_entity_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
697
696
|
"""
|
698
697
|
The entity ID of the identity provider. Mutually exclusive with
|
699
698
|
`idp_metadata_url`.
|
700
699
|
"""
|
701
700
|
return pulumi.get(self, "idp_entity_id")
|
702
701
|
|
703
|
-
@property
|
702
|
+
@_builtins.property
|
704
703
|
@pulumi.getter(name="idpMetadataUrl")
|
705
|
-
def idp_metadata_url(self) -> pulumi.Output[Optional[
|
704
|
+
def idp_metadata_url(self) -> pulumi.Output[Optional[_builtins.str]]:
|
706
705
|
"""
|
707
706
|
The metadata URL of the identity provider.
|
708
707
|
"""
|
709
708
|
return pulumi.get(self, "idp_metadata_url")
|
710
709
|
|
711
|
-
@property
|
710
|
+
@_builtins.property
|
712
711
|
@pulumi.getter(name="idpSsoUrl")
|
713
|
-
def idp_sso_url(self) -> pulumi.Output[Optional[
|
712
|
+
def idp_sso_url(self) -> pulumi.Output[Optional[_builtins.str]]:
|
714
713
|
"""
|
715
714
|
The SSO URL of the identity provider. Mutually exclusive with
|
716
715
|
`idp_metadata_url`.
|
717
716
|
"""
|
718
717
|
return pulumi.get(self, "idp_sso_url")
|
719
718
|
|
720
|
-
@property
|
719
|
+
@_builtins.property
|
721
720
|
@pulumi.getter
|
722
|
-
def namespace(self) -> pulumi.Output[Optional[
|
721
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
723
722
|
"""
|
724
723
|
The namespace to provision the resource in.
|
725
724
|
The value should not contain leading or trailing forward slashes.
|
@@ -728,18 +727,18 @@ class AuthBackend(pulumi.CustomResource):
|
|
728
727
|
"""
|
729
728
|
return pulumi.get(self, "namespace")
|
730
729
|
|
731
|
-
@property
|
730
|
+
@_builtins.property
|
732
731
|
@pulumi.getter
|
733
|
-
def path(self) -> pulumi.Output[Optional[
|
732
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
734
733
|
"""
|
735
734
|
Path where the auth backend will be mounted. Defaults to `auth/saml`
|
736
735
|
if not specified.
|
737
736
|
"""
|
738
737
|
return pulumi.get(self, "path")
|
739
738
|
|
740
|
-
@property
|
739
|
+
@_builtins.property
|
741
740
|
@pulumi.getter(name="verboseLogging")
|
742
|
-
def verbose_logging(self) -> pulumi.Output[
|
741
|
+
def verbose_logging(self) -> pulumi.Output[_builtins.bool]:
|
743
742
|
"""
|
744
743
|
If set to `true`, logs additional, potentially sensitive
|
745
744
|
information during the SAML exchange according to the current logging level. Not
|