pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
pulumi_vault/gcp/auth_backend.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,31 +21,31 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class AuthBackendArgs:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
client_email: Optional[pulumi.Input[
|
26
|
-
client_id: Optional[pulumi.Input[
|
27
|
-
credentials: Optional[pulumi.Input[
|
24
|
+
client_email: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
28
27
|
custom_endpoint: Optional[pulumi.Input['AuthBackendCustomEndpointArgs']] = None,
|
29
|
-
description: Optional[pulumi.Input[
|
30
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
31
|
-
disable_remount: Optional[pulumi.Input[
|
32
|
-
identity_token_audience: Optional[pulumi.Input[
|
33
|
-
identity_token_key: Optional[pulumi.Input[
|
34
|
-
identity_token_ttl: Optional[pulumi.Input[
|
35
|
-
local: Optional[pulumi.Input[
|
36
|
-
namespace: Optional[pulumi.Input[
|
37
|
-
path: Optional[pulumi.Input[
|
38
|
-
private_key_id: Optional[pulumi.Input[
|
39
|
-
project_id: Optional[pulumi.Input[
|
40
|
-
rotation_period: Optional[pulumi.Input[
|
41
|
-
rotation_schedule: Optional[pulumi.Input[
|
42
|
-
rotation_window: Optional[pulumi.Input[
|
43
|
-
service_account_email: Optional[pulumi.Input[
|
28
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
30
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
33
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
34
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
36
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
37
|
+
private_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
38
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
39
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
40
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
41
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
42
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
44
43
|
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
|
45
44
|
"""
|
46
45
|
The set of arguments for constructing a AuthBackend resource.
|
47
|
-
:param pulumi.Input[
|
48
|
-
:param pulumi.Input[
|
49
|
-
:param pulumi.Input[
|
46
|
+
:param pulumi.Input[_builtins.str] client_email: The clients email associated with the credentials
|
47
|
+
:param pulumi.Input[_builtins.str] client_id: The Client ID of the credentials
|
48
|
+
:param pulumi.Input[_builtins.str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
50
49
|
:param pulumi.Input['AuthBackendCustomEndpointArgs'] custom_endpoint: Specifies overrides to
|
51
50
|
[service endpoints](https://cloud.google.com/apis/design/glossary#api_service_endpoint)
|
52
51
|
used when making API requests. This allows specific requests made during authentication
|
@@ -54,32 +53,32 @@ class AuthBackendArgs:
|
|
54
53
|
environments. Requires Vault 1.11+.
|
55
54
|
|
56
55
|
Overrides are set at the subdomain level using the following keys:
|
57
|
-
:param pulumi.Input[
|
58
|
-
:param pulumi.Input[
|
59
|
-
:param pulumi.Input[
|
56
|
+
:param pulumi.Input[_builtins.str] description: A description of the auth method.
|
57
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
58
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
60
59
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
61
|
-
:param pulumi.Input[
|
60
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
|
62
61
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
63
62
|
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
64
|
-
:param pulumi.Input[
|
63
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
|
65
64
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
66
|
-
:param pulumi.Input[
|
67
|
-
:param pulumi.Input[
|
68
|
-
:param pulumi.Input[
|
65
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
|
66
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
|
67
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
69
68
|
The value should not contain leading or trailing forward slashes.
|
70
69
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
71
70
|
*Available only for Vault Enterprise*.
|
72
|
-
:param pulumi.Input[
|
73
|
-
:param pulumi.Input[
|
74
|
-
:param pulumi.Input[
|
75
|
-
:param pulumi.Input[
|
71
|
+
:param pulumi.Input[_builtins.str] path: The path to mount the auth method — this defaults to 'gcp'.
|
72
|
+
:param pulumi.Input[_builtins.str] private_key_id: The ID of the private key from the credentials
|
73
|
+
:param pulumi.Input[_builtins.str] project_id: The GCP Project ID
|
74
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
76
75
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
77
|
-
:param pulumi.Input[
|
76
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
78
77
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
79
|
-
:param pulumi.Input[
|
78
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
80
79
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
81
80
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
82
|
-
:param pulumi.Input[
|
81
|
+
:param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
83
82
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
84
83
|
:param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
85
84
|
|
@@ -126,43 +125,43 @@ class AuthBackendArgs:
|
|
126
125
|
if tune is not None:
|
127
126
|
pulumi.set(__self__, "tune", tune)
|
128
127
|
|
129
|
-
@property
|
128
|
+
@_builtins.property
|
130
129
|
@pulumi.getter(name="clientEmail")
|
131
|
-
def client_email(self) -> Optional[pulumi.Input[
|
130
|
+
def client_email(self) -> Optional[pulumi.Input[_builtins.str]]:
|
132
131
|
"""
|
133
132
|
The clients email associated with the credentials
|
134
133
|
"""
|
135
134
|
return pulumi.get(self, "client_email")
|
136
135
|
|
137
136
|
@client_email.setter
|
138
|
-
def client_email(self, value: Optional[pulumi.Input[
|
137
|
+
def client_email(self, value: Optional[pulumi.Input[_builtins.str]]):
|
139
138
|
pulumi.set(self, "client_email", value)
|
140
139
|
|
141
|
-
@property
|
140
|
+
@_builtins.property
|
142
141
|
@pulumi.getter(name="clientId")
|
143
|
-
def client_id(self) -> Optional[pulumi.Input[
|
142
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
144
143
|
"""
|
145
144
|
The Client ID of the credentials
|
146
145
|
"""
|
147
146
|
return pulumi.get(self, "client_id")
|
148
147
|
|
149
148
|
@client_id.setter
|
150
|
-
def client_id(self, value: Optional[pulumi.Input[
|
149
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
151
150
|
pulumi.set(self, "client_id", value)
|
152
151
|
|
153
|
-
@property
|
152
|
+
@_builtins.property
|
154
153
|
@pulumi.getter
|
155
|
-
def credentials(self) -> Optional[pulumi.Input[
|
154
|
+
def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
|
156
155
|
"""
|
157
156
|
A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
158
157
|
"""
|
159
158
|
return pulumi.get(self, "credentials")
|
160
159
|
|
161
160
|
@credentials.setter
|
162
|
-
def credentials(self, value: Optional[pulumi.Input[
|
161
|
+
def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
|
163
162
|
pulumi.set(self, "credentials", value)
|
164
163
|
|
165
|
-
@property
|
164
|
+
@_builtins.property
|
166
165
|
@pulumi.getter(name="customEndpoint")
|
167
166
|
def custom_endpoint(self) -> Optional[pulumi.Input['AuthBackendCustomEndpointArgs']]:
|
168
167
|
"""
|
@@ -180,33 +179,33 @@ class AuthBackendArgs:
|
|
180
179
|
def custom_endpoint(self, value: Optional[pulumi.Input['AuthBackendCustomEndpointArgs']]):
|
181
180
|
pulumi.set(self, "custom_endpoint", value)
|
182
181
|
|
183
|
-
@property
|
182
|
+
@_builtins.property
|
184
183
|
@pulumi.getter
|
185
|
-
def description(self) -> Optional[pulumi.Input[
|
184
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
186
185
|
"""
|
187
186
|
A description of the auth method.
|
188
187
|
"""
|
189
188
|
return pulumi.get(self, "description")
|
190
189
|
|
191
190
|
@description.setter
|
192
|
-
def description(self, value: Optional[pulumi.Input[
|
191
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
193
192
|
pulumi.set(self, "description", value)
|
194
193
|
|
195
|
-
@property
|
194
|
+
@_builtins.property
|
196
195
|
@pulumi.getter(name="disableAutomatedRotation")
|
197
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
196
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
198
197
|
"""
|
199
198
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
200
199
|
"""
|
201
200
|
return pulumi.get(self, "disable_automated_rotation")
|
202
201
|
|
203
202
|
@disable_automated_rotation.setter
|
204
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
203
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
205
204
|
pulumi.set(self, "disable_automated_rotation", value)
|
206
205
|
|
207
|
-
@property
|
206
|
+
@_builtins.property
|
208
207
|
@pulumi.getter(name="disableRemount")
|
209
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
208
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
210
209
|
"""
|
211
210
|
If set, opts out of mount migration on path updates.
|
212
211
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -214,12 +213,12 @@ class AuthBackendArgs:
|
|
214
213
|
return pulumi.get(self, "disable_remount")
|
215
214
|
|
216
215
|
@disable_remount.setter
|
217
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
216
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
218
217
|
pulumi.set(self, "disable_remount", value)
|
219
218
|
|
220
|
-
@property
|
219
|
+
@_builtins.property
|
221
220
|
@pulumi.getter(name="identityTokenAudience")
|
222
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[
|
221
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
223
222
|
"""
|
224
223
|
The audience claim value for plugin identity
|
225
224
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
@@ -228,12 +227,12 @@ class AuthBackendArgs:
|
|
228
227
|
return pulumi.get(self, "identity_token_audience")
|
229
228
|
|
230
229
|
@identity_token_audience.setter
|
231
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[
|
230
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
232
231
|
pulumi.set(self, "identity_token_audience", value)
|
233
232
|
|
234
|
-
@property
|
233
|
+
@_builtins.property
|
235
234
|
@pulumi.getter(name="identityTokenKey")
|
236
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
235
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
237
236
|
"""
|
238
237
|
The key to use for signing plugin identity
|
239
238
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -241,36 +240,36 @@ class AuthBackendArgs:
|
|
241
240
|
return pulumi.get(self, "identity_token_key")
|
242
241
|
|
243
242
|
@identity_token_key.setter
|
244
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
243
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
245
244
|
pulumi.set(self, "identity_token_key", value)
|
246
245
|
|
247
|
-
@property
|
246
|
+
@_builtins.property
|
248
247
|
@pulumi.getter(name="identityTokenTtl")
|
249
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[
|
248
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
250
249
|
"""
|
251
250
|
The TTL of generated tokens.
|
252
251
|
"""
|
253
252
|
return pulumi.get(self, "identity_token_ttl")
|
254
253
|
|
255
254
|
@identity_token_ttl.setter
|
256
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[
|
255
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
257
256
|
pulumi.set(self, "identity_token_ttl", value)
|
258
257
|
|
259
|
-
@property
|
258
|
+
@_builtins.property
|
260
259
|
@pulumi.getter
|
261
|
-
def local(self) -> Optional[pulumi.Input[
|
260
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
262
261
|
"""
|
263
262
|
Specifies if the auth method is local only.
|
264
263
|
"""
|
265
264
|
return pulumi.get(self, "local")
|
266
265
|
|
267
266
|
@local.setter
|
268
|
-
def local(self, value: Optional[pulumi.Input[
|
267
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
269
268
|
pulumi.set(self, "local", value)
|
270
269
|
|
271
|
-
@property
|
270
|
+
@_builtins.property
|
272
271
|
@pulumi.getter
|
273
|
-
def namespace(self) -> Optional[pulumi.Input[
|
272
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
274
273
|
"""
|
275
274
|
The namespace to provision the resource in.
|
276
275
|
The value should not contain leading or trailing forward slashes.
|
@@ -280,48 +279,48 @@ class AuthBackendArgs:
|
|
280
279
|
return pulumi.get(self, "namespace")
|
281
280
|
|
282
281
|
@namespace.setter
|
283
|
-
def namespace(self, value: Optional[pulumi.Input[
|
282
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
284
283
|
pulumi.set(self, "namespace", value)
|
285
284
|
|
286
|
-
@property
|
285
|
+
@_builtins.property
|
287
286
|
@pulumi.getter
|
288
|
-
def path(self) -> Optional[pulumi.Input[
|
287
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
289
288
|
"""
|
290
289
|
The path to mount the auth method — this defaults to 'gcp'.
|
291
290
|
"""
|
292
291
|
return pulumi.get(self, "path")
|
293
292
|
|
294
293
|
@path.setter
|
295
|
-
def path(self, value: Optional[pulumi.Input[
|
294
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
296
295
|
pulumi.set(self, "path", value)
|
297
296
|
|
298
|
-
@property
|
297
|
+
@_builtins.property
|
299
298
|
@pulumi.getter(name="privateKeyId")
|
300
|
-
def private_key_id(self) -> Optional[pulumi.Input[
|
299
|
+
def private_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
301
300
|
"""
|
302
301
|
The ID of the private key from the credentials
|
303
302
|
"""
|
304
303
|
return pulumi.get(self, "private_key_id")
|
305
304
|
|
306
305
|
@private_key_id.setter
|
307
|
-
def private_key_id(self, value: Optional[pulumi.Input[
|
306
|
+
def private_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
308
307
|
pulumi.set(self, "private_key_id", value)
|
309
308
|
|
310
|
-
@property
|
309
|
+
@_builtins.property
|
311
310
|
@pulumi.getter(name="projectId")
|
312
|
-
def project_id(self) -> Optional[pulumi.Input[
|
311
|
+
def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
313
312
|
"""
|
314
313
|
The GCP Project ID
|
315
314
|
"""
|
316
315
|
return pulumi.get(self, "project_id")
|
317
316
|
|
318
317
|
@project_id.setter
|
319
|
-
def project_id(self, value: Optional[pulumi.Input[
|
318
|
+
def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
320
319
|
pulumi.set(self, "project_id", value)
|
321
320
|
|
322
|
-
@property
|
321
|
+
@_builtins.property
|
323
322
|
@pulumi.getter(name="rotationPeriod")
|
324
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
323
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
325
324
|
"""
|
326
325
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
327
326
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -329,12 +328,12 @@ class AuthBackendArgs:
|
|
329
328
|
return pulumi.get(self, "rotation_period")
|
330
329
|
|
331
330
|
@rotation_period.setter
|
332
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
331
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
333
332
|
pulumi.set(self, "rotation_period", value)
|
334
333
|
|
335
|
-
@property
|
334
|
+
@_builtins.property
|
336
335
|
@pulumi.getter(name="rotationSchedule")
|
337
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
336
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
338
337
|
"""
|
339
338
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
340
339
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -342,12 +341,12 @@ class AuthBackendArgs:
|
|
342
341
|
return pulumi.get(self, "rotation_schedule")
|
343
342
|
|
344
343
|
@rotation_schedule.setter
|
345
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
344
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
346
345
|
pulumi.set(self, "rotation_schedule", value)
|
347
346
|
|
348
|
-
@property
|
347
|
+
@_builtins.property
|
349
348
|
@pulumi.getter(name="rotationWindow")
|
350
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
349
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
351
350
|
"""
|
352
351
|
The maximum amount of time in seconds allowed to complete
|
353
352
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -356,12 +355,12 @@ class AuthBackendArgs:
|
|
356
355
|
return pulumi.get(self, "rotation_window")
|
357
356
|
|
358
357
|
@rotation_window.setter
|
359
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
358
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
360
359
|
pulumi.set(self, "rotation_window", value)
|
361
360
|
|
362
|
-
@property
|
361
|
+
@_builtins.property
|
363
362
|
@pulumi.getter(name="serviceAccountEmail")
|
364
|
-
def service_account_email(self) -> Optional[pulumi.Input[
|
363
|
+
def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
|
365
364
|
"""
|
366
365
|
Service Account to impersonate for plugin workload identity federation.
|
367
366
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -369,10 +368,10 @@ class AuthBackendArgs:
|
|
369
368
|
return pulumi.get(self, "service_account_email")
|
370
369
|
|
371
370
|
@service_account_email.setter
|
372
|
-
def service_account_email(self, value: Optional[pulumi.Input[
|
371
|
+
def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
|
373
372
|
pulumi.set(self, "service_account_email", value)
|
374
373
|
|
375
|
-
@property
|
374
|
+
@_builtins.property
|
376
375
|
@pulumi.getter
|
377
376
|
def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
|
378
377
|
"""
|
@@ -390,33 +389,33 @@ class AuthBackendArgs:
|
|
390
389
|
@pulumi.input_type
|
391
390
|
class _AuthBackendState:
|
392
391
|
def __init__(__self__, *,
|
393
|
-
accessor: Optional[pulumi.Input[
|
394
|
-
client_email: Optional[pulumi.Input[
|
395
|
-
client_id: Optional[pulumi.Input[
|
396
|
-
credentials: Optional[pulumi.Input[
|
392
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
393
|
+
client_email: Optional[pulumi.Input[_builtins.str]] = None,
|
394
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
395
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
397
396
|
custom_endpoint: Optional[pulumi.Input['AuthBackendCustomEndpointArgs']] = None,
|
398
|
-
description: Optional[pulumi.Input[
|
399
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
400
|
-
disable_remount: Optional[pulumi.Input[
|
401
|
-
identity_token_audience: Optional[pulumi.Input[
|
402
|
-
identity_token_key: Optional[pulumi.Input[
|
403
|
-
identity_token_ttl: Optional[pulumi.Input[
|
404
|
-
local: Optional[pulumi.Input[
|
405
|
-
namespace: Optional[pulumi.Input[
|
406
|
-
path: Optional[pulumi.Input[
|
407
|
-
private_key_id: Optional[pulumi.Input[
|
408
|
-
project_id: Optional[pulumi.Input[
|
409
|
-
rotation_period: Optional[pulumi.Input[
|
410
|
-
rotation_schedule: Optional[pulumi.Input[
|
411
|
-
rotation_window: Optional[pulumi.Input[
|
412
|
-
service_account_email: Optional[pulumi.Input[
|
397
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
398
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
399
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
400
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
401
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
402
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
403
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
404
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
405
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
406
|
+
private_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
407
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
408
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
409
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
410
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
411
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
413
412
|
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
|
414
413
|
"""
|
415
414
|
Input properties used for looking up and filtering AuthBackend resources.
|
416
|
-
:param pulumi.Input[
|
417
|
-
:param pulumi.Input[
|
418
|
-
:param pulumi.Input[
|
419
|
-
:param pulumi.Input[
|
415
|
+
:param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
416
|
+
:param pulumi.Input[_builtins.str] client_email: The clients email associated with the credentials
|
417
|
+
:param pulumi.Input[_builtins.str] client_id: The Client ID of the credentials
|
418
|
+
:param pulumi.Input[_builtins.str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
420
419
|
:param pulumi.Input['AuthBackendCustomEndpointArgs'] custom_endpoint: Specifies overrides to
|
421
420
|
[service endpoints](https://cloud.google.com/apis/design/glossary#api_service_endpoint)
|
422
421
|
used when making API requests. This allows specific requests made during authentication
|
@@ -424,32 +423,32 @@ class _AuthBackendState:
|
|
424
423
|
environments. Requires Vault 1.11+.
|
425
424
|
|
426
425
|
Overrides are set at the subdomain level using the following keys:
|
427
|
-
:param pulumi.Input[
|
428
|
-
:param pulumi.Input[
|
429
|
-
:param pulumi.Input[
|
426
|
+
:param pulumi.Input[_builtins.str] description: A description of the auth method.
|
427
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
428
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
430
429
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
431
|
-
:param pulumi.Input[
|
430
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
|
432
431
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
433
432
|
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
434
|
-
:param pulumi.Input[
|
433
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
|
435
434
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
436
|
-
:param pulumi.Input[
|
437
|
-
:param pulumi.Input[
|
438
|
-
:param pulumi.Input[
|
435
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
|
436
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
|
437
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
439
438
|
The value should not contain leading or trailing forward slashes.
|
440
439
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
441
440
|
*Available only for Vault Enterprise*.
|
442
|
-
:param pulumi.Input[
|
443
|
-
:param pulumi.Input[
|
444
|
-
:param pulumi.Input[
|
445
|
-
:param pulumi.Input[
|
441
|
+
:param pulumi.Input[_builtins.str] path: The path to mount the auth method — this defaults to 'gcp'.
|
442
|
+
:param pulumi.Input[_builtins.str] private_key_id: The ID of the private key from the credentials
|
443
|
+
:param pulumi.Input[_builtins.str] project_id: The GCP Project ID
|
444
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
446
445
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
447
|
-
:param pulumi.Input[
|
446
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
448
447
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
449
|
-
:param pulumi.Input[
|
448
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
450
449
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
451
450
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
452
|
-
:param pulumi.Input[
|
451
|
+
:param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
453
452
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
454
453
|
:param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
455
454
|
|
@@ -498,55 +497,55 @@ class _AuthBackendState:
|
|
498
497
|
if tune is not None:
|
499
498
|
pulumi.set(__self__, "tune", tune)
|
500
499
|
|
501
|
-
@property
|
500
|
+
@_builtins.property
|
502
501
|
@pulumi.getter
|
503
|
-
def accessor(self) -> Optional[pulumi.Input[
|
502
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
504
503
|
"""
|
505
504
|
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
506
505
|
"""
|
507
506
|
return pulumi.get(self, "accessor")
|
508
507
|
|
509
508
|
@accessor.setter
|
510
|
-
def accessor(self, value: Optional[pulumi.Input[
|
509
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
511
510
|
pulumi.set(self, "accessor", value)
|
512
511
|
|
513
|
-
@property
|
512
|
+
@_builtins.property
|
514
513
|
@pulumi.getter(name="clientEmail")
|
515
|
-
def client_email(self) -> Optional[pulumi.Input[
|
514
|
+
def client_email(self) -> Optional[pulumi.Input[_builtins.str]]:
|
516
515
|
"""
|
517
516
|
The clients email associated with the credentials
|
518
517
|
"""
|
519
518
|
return pulumi.get(self, "client_email")
|
520
519
|
|
521
520
|
@client_email.setter
|
522
|
-
def client_email(self, value: Optional[pulumi.Input[
|
521
|
+
def client_email(self, value: Optional[pulumi.Input[_builtins.str]]):
|
523
522
|
pulumi.set(self, "client_email", value)
|
524
523
|
|
525
|
-
@property
|
524
|
+
@_builtins.property
|
526
525
|
@pulumi.getter(name="clientId")
|
527
|
-
def client_id(self) -> Optional[pulumi.Input[
|
526
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
528
527
|
"""
|
529
528
|
The Client ID of the credentials
|
530
529
|
"""
|
531
530
|
return pulumi.get(self, "client_id")
|
532
531
|
|
533
532
|
@client_id.setter
|
534
|
-
def client_id(self, value: Optional[pulumi.Input[
|
533
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
535
534
|
pulumi.set(self, "client_id", value)
|
536
535
|
|
537
|
-
@property
|
536
|
+
@_builtins.property
|
538
537
|
@pulumi.getter
|
539
|
-
def credentials(self) -> Optional[pulumi.Input[
|
538
|
+
def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
|
540
539
|
"""
|
541
540
|
A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
542
541
|
"""
|
543
542
|
return pulumi.get(self, "credentials")
|
544
543
|
|
545
544
|
@credentials.setter
|
546
|
-
def credentials(self, value: Optional[pulumi.Input[
|
545
|
+
def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
|
547
546
|
pulumi.set(self, "credentials", value)
|
548
547
|
|
549
|
-
@property
|
548
|
+
@_builtins.property
|
550
549
|
@pulumi.getter(name="customEndpoint")
|
551
550
|
def custom_endpoint(self) -> Optional[pulumi.Input['AuthBackendCustomEndpointArgs']]:
|
552
551
|
"""
|
@@ -564,33 +563,33 @@ class _AuthBackendState:
|
|
564
563
|
def custom_endpoint(self, value: Optional[pulumi.Input['AuthBackendCustomEndpointArgs']]):
|
565
564
|
pulumi.set(self, "custom_endpoint", value)
|
566
565
|
|
567
|
-
@property
|
566
|
+
@_builtins.property
|
568
567
|
@pulumi.getter
|
569
|
-
def description(self) -> Optional[pulumi.Input[
|
568
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
570
569
|
"""
|
571
570
|
A description of the auth method.
|
572
571
|
"""
|
573
572
|
return pulumi.get(self, "description")
|
574
573
|
|
575
574
|
@description.setter
|
576
|
-
def description(self, value: Optional[pulumi.Input[
|
575
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
577
576
|
pulumi.set(self, "description", value)
|
578
577
|
|
579
|
-
@property
|
578
|
+
@_builtins.property
|
580
579
|
@pulumi.getter(name="disableAutomatedRotation")
|
581
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
580
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
582
581
|
"""
|
583
582
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
584
583
|
"""
|
585
584
|
return pulumi.get(self, "disable_automated_rotation")
|
586
585
|
|
587
586
|
@disable_automated_rotation.setter
|
588
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
587
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
589
588
|
pulumi.set(self, "disable_automated_rotation", value)
|
590
589
|
|
591
|
-
@property
|
590
|
+
@_builtins.property
|
592
591
|
@pulumi.getter(name="disableRemount")
|
593
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
592
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
594
593
|
"""
|
595
594
|
If set, opts out of mount migration on path updates.
|
596
595
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -598,12 +597,12 @@ class _AuthBackendState:
|
|
598
597
|
return pulumi.get(self, "disable_remount")
|
599
598
|
|
600
599
|
@disable_remount.setter
|
601
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
600
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
602
601
|
pulumi.set(self, "disable_remount", value)
|
603
602
|
|
604
|
-
@property
|
603
|
+
@_builtins.property
|
605
604
|
@pulumi.getter(name="identityTokenAudience")
|
606
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[
|
605
|
+
def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
607
606
|
"""
|
608
607
|
The audience claim value for plugin identity
|
609
608
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
@@ -612,12 +611,12 @@ class _AuthBackendState:
|
|
612
611
|
return pulumi.get(self, "identity_token_audience")
|
613
612
|
|
614
613
|
@identity_token_audience.setter
|
615
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[
|
614
|
+
def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
616
615
|
pulumi.set(self, "identity_token_audience", value)
|
617
616
|
|
618
|
-
@property
|
617
|
+
@_builtins.property
|
619
618
|
@pulumi.getter(name="identityTokenKey")
|
620
|
-
def identity_token_key(self) -> Optional[pulumi.Input[
|
619
|
+
def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
621
620
|
"""
|
622
621
|
The key to use for signing plugin identity
|
623
622
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -625,36 +624,36 @@ class _AuthBackendState:
|
|
625
624
|
return pulumi.get(self, "identity_token_key")
|
626
625
|
|
627
626
|
@identity_token_key.setter
|
628
|
-
def identity_token_key(self, value: Optional[pulumi.Input[
|
627
|
+
def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
629
628
|
pulumi.set(self, "identity_token_key", value)
|
630
629
|
|
631
|
-
@property
|
630
|
+
@_builtins.property
|
632
631
|
@pulumi.getter(name="identityTokenTtl")
|
633
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[
|
632
|
+
def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
634
633
|
"""
|
635
634
|
The TTL of generated tokens.
|
636
635
|
"""
|
637
636
|
return pulumi.get(self, "identity_token_ttl")
|
638
637
|
|
639
638
|
@identity_token_ttl.setter
|
640
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[
|
639
|
+
def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
641
640
|
pulumi.set(self, "identity_token_ttl", value)
|
642
641
|
|
643
|
-
@property
|
642
|
+
@_builtins.property
|
644
643
|
@pulumi.getter
|
645
|
-
def local(self) -> Optional[pulumi.Input[
|
644
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
646
645
|
"""
|
647
646
|
Specifies if the auth method is local only.
|
648
647
|
"""
|
649
648
|
return pulumi.get(self, "local")
|
650
649
|
|
651
650
|
@local.setter
|
652
|
-
def local(self, value: Optional[pulumi.Input[
|
651
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
653
652
|
pulumi.set(self, "local", value)
|
654
653
|
|
655
|
-
@property
|
654
|
+
@_builtins.property
|
656
655
|
@pulumi.getter
|
657
|
-
def namespace(self) -> Optional[pulumi.Input[
|
656
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
658
657
|
"""
|
659
658
|
The namespace to provision the resource in.
|
660
659
|
The value should not contain leading or trailing forward slashes.
|
@@ -664,48 +663,48 @@ class _AuthBackendState:
|
|
664
663
|
return pulumi.get(self, "namespace")
|
665
664
|
|
666
665
|
@namespace.setter
|
667
|
-
def namespace(self, value: Optional[pulumi.Input[
|
666
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
668
667
|
pulumi.set(self, "namespace", value)
|
669
668
|
|
670
|
-
@property
|
669
|
+
@_builtins.property
|
671
670
|
@pulumi.getter
|
672
|
-
def path(self) -> Optional[pulumi.Input[
|
671
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
673
672
|
"""
|
674
673
|
The path to mount the auth method — this defaults to 'gcp'.
|
675
674
|
"""
|
676
675
|
return pulumi.get(self, "path")
|
677
676
|
|
678
677
|
@path.setter
|
679
|
-
def path(self, value: Optional[pulumi.Input[
|
678
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
680
679
|
pulumi.set(self, "path", value)
|
681
680
|
|
682
|
-
@property
|
681
|
+
@_builtins.property
|
683
682
|
@pulumi.getter(name="privateKeyId")
|
684
|
-
def private_key_id(self) -> Optional[pulumi.Input[
|
683
|
+
def private_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
685
684
|
"""
|
686
685
|
The ID of the private key from the credentials
|
687
686
|
"""
|
688
687
|
return pulumi.get(self, "private_key_id")
|
689
688
|
|
690
689
|
@private_key_id.setter
|
691
|
-
def private_key_id(self, value: Optional[pulumi.Input[
|
690
|
+
def private_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
692
691
|
pulumi.set(self, "private_key_id", value)
|
693
692
|
|
694
|
-
@property
|
693
|
+
@_builtins.property
|
695
694
|
@pulumi.getter(name="projectId")
|
696
|
-
def project_id(self) -> Optional[pulumi.Input[
|
695
|
+
def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
697
696
|
"""
|
698
697
|
The GCP Project ID
|
699
698
|
"""
|
700
699
|
return pulumi.get(self, "project_id")
|
701
700
|
|
702
701
|
@project_id.setter
|
703
|
-
def project_id(self, value: Optional[pulumi.Input[
|
702
|
+
def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
704
703
|
pulumi.set(self, "project_id", value)
|
705
704
|
|
706
|
-
@property
|
705
|
+
@_builtins.property
|
707
706
|
@pulumi.getter(name="rotationPeriod")
|
708
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
707
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
709
708
|
"""
|
710
709
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
711
710
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -713,12 +712,12 @@ class _AuthBackendState:
|
|
713
712
|
return pulumi.get(self, "rotation_period")
|
714
713
|
|
715
714
|
@rotation_period.setter
|
716
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
715
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
717
716
|
pulumi.set(self, "rotation_period", value)
|
718
717
|
|
719
|
-
@property
|
718
|
+
@_builtins.property
|
720
719
|
@pulumi.getter(name="rotationSchedule")
|
721
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
720
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
722
721
|
"""
|
723
722
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
724
723
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -726,12 +725,12 @@ class _AuthBackendState:
|
|
726
725
|
return pulumi.get(self, "rotation_schedule")
|
727
726
|
|
728
727
|
@rotation_schedule.setter
|
729
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
728
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
730
729
|
pulumi.set(self, "rotation_schedule", value)
|
731
730
|
|
732
|
-
@property
|
731
|
+
@_builtins.property
|
733
732
|
@pulumi.getter(name="rotationWindow")
|
734
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
733
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
735
734
|
"""
|
736
735
|
The maximum amount of time in seconds allowed to complete
|
737
736
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -740,12 +739,12 @@ class _AuthBackendState:
|
|
740
739
|
return pulumi.get(self, "rotation_window")
|
741
740
|
|
742
741
|
@rotation_window.setter
|
743
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
742
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
744
743
|
pulumi.set(self, "rotation_window", value)
|
745
744
|
|
746
|
-
@property
|
745
|
+
@_builtins.property
|
747
746
|
@pulumi.getter(name="serviceAccountEmail")
|
748
|
-
def service_account_email(self) -> Optional[pulumi.Input[
|
747
|
+
def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
|
749
748
|
"""
|
750
749
|
Service Account to impersonate for plugin workload identity federation.
|
751
750
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
@@ -753,10 +752,10 @@ class _AuthBackendState:
|
|
753
752
|
return pulumi.get(self, "service_account_email")
|
754
753
|
|
755
754
|
@service_account_email.setter
|
756
|
-
def service_account_email(self, value: Optional[pulumi.Input[
|
755
|
+
def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
|
757
756
|
pulumi.set(self, "service_account_email", value)
|
758
757
|
|
759
|
-
@property
|
758
|
+
@_builtins.property
|
760
759
|
@pulumi.getter
|
761
760
|
def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
|
762
761
|
"""
|
@@ -777,25 +776,25 @@ class AuthBackend(pulumi.CustomResource):
|
|
777
776
|
def __init__(__self__,
|
778
777
|
resource_name: str,
|
779
778
|
opts: Optional[pulumi.ResourceOptions] = None,
|
780
|
-
client_email: Optional[pulumi.Input[
|
781
|
-
client_id: Optional[pulumi.Input[
|
782
|
-
credentials: Optional[pulumi.Input[
|
779
|
+
client_email: Optional[pulumi.Input[_builtins.str]] = None,
|
780
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
781
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
783
782
|
custom_endpoint: Optional[pulumi.Input[Union['AuthBackendCustomEndpointArgs', 'AuthBackendCustomEndpointArgsDict']]] = None,
|
784
|
-
description: Optional[pulumi.Input[
|
785
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
786
|
-
disable_remount: Optional[pulumi.Input[
|
787
|
-
identity_token_audience: Optional[pulumi.Input[
|
788
|
-
identity_token_key: Optional[pulumi.Input[
|
789
|
-
identity_token_ttl: Optional[pulumi.Input[
|
790
|
-
local: Optional[pulumi.Input[
|
791
|
-
namespace: Optional[pulumi.Input[
|
792
|
-
path: Optional[pulumi.Input[
|
793
|
-
private_key_id: Optional[pulumi.Input[
|
794
|
-
project_id: Optional[pulumi.Input[
|
795
|
-
rotation_period: Optional[pulumi.Input[
|
796
|
-
rotation_schedule: Optional[pulumi.Input[
|
797
|
-
rotation_window: Optional[pulumi.Input[
|
798
|
-
service_account_email: Optional[pulumi.Input[
|
783
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
784
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
785
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
786
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
787
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
788
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
789
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
790
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
791
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
792
|
+
private_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
793
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
794
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
795
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
796
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
797
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
799
798
|
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
800
799
|
__props__=None):
|
801
800
|
"""
|
@@ -827,9 +826,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
827
826
|
|
828
827
|
:param str resource_name: The name of the resource.
|
829
828
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
830
|
-
:param pulumi.Input[
|
831
|
-
:param pulumi.Input[
|
832
|
-
:param pulumi.Input[
|
829
|
+
:param pulumi.Input[_builtins.str] client_email: The clients email associated with the credentials
|
830
|
+
:param pulumi.Input[_builtins.str] client_id: The Client ID of the credentials
|
831
|
+
:param pulumi.Input[_builtins.str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
833
832
|
:param pulumi.Input[Union['AuthBackendCustomEndpointArgs', 'AuthBackendCustomEndpointArgsDict']] custom_endpoint: Specifies overrides to
|
834
833
|
[service endpoints](https://cloud.google.com/apis/design/glossary#api_service_endpoint)
|
835
834
|
used when making API requests. This allows specific requests made during authentication
|
@@ -837,32 +836,32 @@ class AuthBackend(pulumi.CustomResource):
|
|
837
836
|
environments. Requires Vault 1.11+.
|
838
837
|
|
839
838
|
Overrides are set at the subdomain level using the following keys:
|
840
|
-
:param pulumi.Input[
|
841
|
-
:param pulumi.Input[
|
842
|
-
:param pulumi.Input[
|
839
|
+
:param pulumi.Input[_builtins.str] description: A description of the auth method.
|
840
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
841
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
843
842
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
844
|
-
:param pulumi.Input[
|
843
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
|
845
844
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
846
845
|
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
847
|
-
:param pulumi.Input[
|
846
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
|
848
847
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
849
|
-
:param pulumi.Input[
|
850
|
-
:param pulumi.Input[
|
851
|
-
:param pulumi.Input[
|
848
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
|
849
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
|
850
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
852
851
|
The value should not contain leading or trailing forward slashes.
|
853
852
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
854
853
|
*Available only for Vault Enterprise*.
|
855
|
-
:param pulumi.Input[
|
856
|
-
:param pulumi.Input[
|
857
|
-
:param pulumi.Input[
|
858
|
-
:param pulumi.Input[
|
854
|
+
:param pulumi.Input[_builtins.str] path: The path to mount the auth method — this defaults to 'gcp'.
|
855
|
+
:param pulumi.Input[_builtins.str] private_key_id: The ID of the private key from the credentials
|
856
|
+
:param pulumi.Input[_builtins.str] project_id: The GCP Project ID
|
857
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
859
858
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
860
|
-
:param pulumi.Input[
|
859
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
861
860
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
862
|
-
:param pulumi.Input[
|
861
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
863
862
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
864
863
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
865
|
-
:param pulumi.Input[
|
864
|
+
:param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
866
865
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
867
866
|
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
868
867
|
|
@@ -916,25 +915,25 @@ class AuthBackend(pulumi.CustomResource):
|
|
916
915
|
def _internal_init(__self__,
|
917
916
|
resource_name: str,
|
918
917
|
opts: Optional[pulumi.ResourceOptions] = None,
|
919
|
-
client_email: Optional[pulumi.Input[
|
920
|
-
client_id: Optional[pulumi.Input[
|
921
|
-
credentials: Optional[pulumi.Input[
|
918
|
+
client_email: Optional[pulumi.Input[_builtins.str]] = None,
|
919
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
920
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
922
921
|
custom_endpoint: Optional[pulumi.Input[Union['AuthBackendCustomEndpointArgs', 'AuthBackendCustomEndpointArgsDict']]] = None,
|
923
|
-
description: Optional[pulumi.Input[
|
924
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
925
|
-
disable_remount: Optional[pulumi.Input[
|
926
|
-
identity_token_audience: Optional[pulumi.Input[
|
927
|
-
identity_token_key: Optional[pulumi.Input[
|
928
|
-
identity_token_ttl: Optional[pulumi.Input[
|
929
|
-
local: Optional[pulumi.Input[
|
930
|
-
namespace: Optional[pulumi.Input[
|
931
|
-
path: Optional[pulumi.Input[
|
932
|
-
private_key_id: Optional[pulumi.Input[
|
933
|
-
project_id: Optional[pulumi.Input[
|
934
|
-
rotation_period: Optional[pulumi.Input[
|
935
|
-
rotation_schedule: Optional[pulumi.Input[
|
936
|
-
rotation_window: Optional[pulumi.Input[
|
937
|
-
service_account_email: Optional[pulumi.Input[
|
922
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
923
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
924
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
925
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
926
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
927
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
928
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
929
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
930
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
931
|
+
private_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
932
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
933
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
934
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
935
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
936
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
938
937
|
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
939
938
|
__props__=None):
|
940
939
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -978,26 +977,26 @@ class AuthBackend(pulumi.CustomResource):
|
|
978
977
|
def get(resource_name: str,
|
979
978
|
id: pulumi.Input[str],
|
980
979
|
opts: Optional[pulumi.ResourceOptions] = None,
|
981
|
-
accessor: Optional[pulumi.Input[
|
982
|
-
client_email: Optional[pulumi.Input[
|
983
|
-
client_id: Optional[pulumi.Input[
|
984
|
-
credentials: Optional[pulumi.Input[
|
980
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
981
|
+
client_email: Optional[pulumi.Input[_builtins.str]] = None,
|
982
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
983
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
985
984
|
custom_endpoint: Optional[pulumi.Input[Union['AuthBackendCustomEndpointArgs', 'AuthBackendCustomEndpointArgsDict']]] = None,
|
986
|
-
description: Optional[pulumi.Input[
|
987
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
988
|
-
disable_remount: Optional[pulumi.Input[
|
989
|
-
identity_token_audience: Optional[pulumi.Input[
|
990
|
-
identity_token_key: Optional[pulumi.Input[
|
991
|
-
identity_token_ttl: Optional[pulumi.Input[
|
992
|
-
local: Optional[pulumi.Input[
|
993
|
-
namespace: Optional[pulumi.Input[
|
994
|
-
path: Optional[pulumi.Input[
|
995
|
-
private_key_id: Optional[pulumi.Input[
|
996
|
-
project_id: Optional[pulumi.Input[
|
997
|
-
rotation_period: Optional[pulumi.Input[
|
998
|
-
rotation_schedule: Optional[pulumi.Input[
|
999
|
-
rotation_window: Optional[pulumi.Input[
|
1000
|
-
service_account_email: Optional[pulumi.Input[
|
985
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
986
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
987
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
988
|
+
identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
|
989
|
+
identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
|
990
|
+
identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
991
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
992
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
993
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
994
|
+
private_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
995
|
+
project_id: Optional[pulumi.Input[_builtins.str]] = None,
|
996
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
997
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
998
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
999
|
+
service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
|
1001
1000
|
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
|
1002
1001
|
"""
|
1003
1002
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
@@ -1006,10 +1005,10 @@ class AuthBackend(pulumi.CustomResource):
|
|
1006
1005
|
:param str resource_name: The unique name of the resulting resource.
|
1007
1006
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1008
1007
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1009
|
-
:param pulumi.Input[
|
1010
|
-
:param pulumi.Input[
|
1011
|
-
:param pulumi.Input[
|
1012
|
-
:param pulumi.Input[
|
1008
|
+
:param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
1009
|
+
:param pulumi.Input[_builtins.str] client_email: The clients email associated with the credentials
|
1010
|
+
:param pulumi.Input[_builtins.str] client_id: The Client ID of the credentials
|
1011
|
+
:param pulumi.Input[_builtins.str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
1013
1012
|
:param pulumi.Input[Union['AuthBackendCustomEndpointArgs', 'AuthBackendCustomEndpointArgsDict']] custom_endpoint: Specifies overrides to
|
1014
1013
|
[service endpoints](https://cloud.google.com/apis/design/glossary#api_service_endpoint)
|
1015
1014
|
used when making API requests. This allows specific requests made during authentication
|
@@ -1017,32 +1016,32 @@ class AuthBackend(pulumi.CustomResource):
|
|
1017
1016
|
environments. Requires Vault 1.11+.
|
1018
1017
|
|
1019
1018
|
Overrides are set at the subdomain level using the following keys:
|
1020
|
-
:param pulumi.Input[
|
1021
|
-
:param pulumi.Input[
|
1022
|
-
:param pulumi.Input[
|
1019
|
+
:param pulumi.Input[_builtins.str] description: A description of the auth method.
|
1020
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1021
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
1023
1022
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1024
|
-
:param pulumi.Input[
|
1023
|
+
:param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
|
1025
1024
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
1026
1025
|
Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
1027
|
-
:param pulumi.Input[
|
1026
|
+
:param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
|
1028
1027
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
1029
|
-
:param pulumi.Input[
|
1030
|
-
:param pulumi.Input[
|
1031
|
-
:param pulumi.Input[
|
1028
|
+
:param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
|
1029
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
|
1030
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1032
1031
|
The value should not contain leading or trailing forward slashes.
|
1033
1032
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1034
1033
|
*Available only for Vault Enterprise*.
|
1035
|
-
:param pulumi.Input[
|
1036
|
-
:param pulumi.Input[
|
1037
|
-
:param pulumi.Input[
|
1038
|
-
:param pulumi.Input[
|
1034
|
+
:param pulumi.Input[_builtins.str] path: The path to mount the auth method — this defaults to 'gcp'.
|
1035
|
+
:param pulumi.Input[_builtins.str] private_key_id: The ID of the private key from the credentials
|
1036
|
+
:param pulumi.Input[_builtins.str] project_id: The GCP Project ID
|
1037
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1039
1038
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1040
|
-
:param pulumi.Input[
|
1039
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1041
1040
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1042
|
-
:param pulumi.Input[
|
1041
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1043
1042
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1044
1043
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1045
|
-
:param pulumi.Input[
|
1044
|
+
:param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
|
1046
1045
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
1047
1046
|
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
1048
1047
|
|
@@ -1075,39 +1074,39 @@ class AuthBackend(pulumi.CustomResource):
|
|
1075
1074
|
__props__.__dict__["tune"] = tune
|
1076
1075
|
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
1077
1076
|
|
1078
|
-
@property
|
1077
|
+
@_builtins.property
|
1079
1078
|
@pulumi.getter
|
1080
|
-
def accessor(self) -> pulumi.Output[
|
1079
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1081
1080
|
"""
|
1082
1081
|
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
1083
1082
|
"""
|
1084
1083
|
return pulumi.get(self, "accessor")
|
1085
1084
|
|
1086
|
-
@property
|
1085
|
+
@_builtins.property
|
1087
1086
|
@pulumi.getter(name="clientEmail")
|
1088
|
-
def client_email(self) -> pulumi.Output[
|
1087
|
+
def client_email(self) -> pulumi.Output[_builtins.str]:
|
1089
1088
|
"""
|
1090
1089
|
The clients email associated with the credentials
|
1091
1090
|
"""
|
1092
1091
|
return pulumi.get(self, "client_email")
|
1093
1092
|
|
1094
|
-
@property
|
1093
|
+
@_builtins.property
|
1095
1094
|
@pulumi.getter(name="clientId")
|
1096
|
-
def client_id(self) -> pulumi.Output[
|
1095
|
+
def client_id(self) -> pulumi.Output[_builtins.str]:
|
1097
1096
|
"""
|
1098
1097
|
The Client ID of the credentials
|
1099
1098
|
"""
|
1100
1099
|
return pulumi.get(self, "client_id")
|
1101
1100
|
|
1102
|
-
@property
|
1101
|
+
@_builtins.property
|
1103
1102
|
@pulumi.getter
|
1104
|
-
def credentials(self) -> pulumi.Output[Optional[
|
1103
|
+
def credentials(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1105
1104
|
"""
|
1106
1105
|
A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
1107
1106
|
"""
|
1108
1107
|
return pulumi.get(self, "credentials")
|
1109
1108
|
|
1110
|
-
@property
|
1109
|
+
@_builtins.property
|
1111
1110
|
@pulumi.getter(name="customEndpoint")
|
1112
1111
|
def custom_endpoint(self) -> pulumi.Output[Optional['outputs.AuthBackendCustomEndpoint']]:
|
1113
1112
|
"""
|
@@ -1121,34 +1120,34 @@ class AuthBackend(pulumi.CustomResource):
|
|
1121
1120
|
"""
|
1122
1121
|
return pulumi.get(self, "custom_endpoint")
|
1123
1122
|
|
1124
|
-
@property
|
1123
|
+
@_builtins.property
|
1125
1124
|
@pulumi.getter
|
1126
|
-
def description(self) -> pulumi.Output[Optional[
|
1125
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1127
1126
|
"""
|
1128
1127
|
A description of the auth method.
|
1129
1128
|
"""
|
1130
1129
|
return pulumi.get(self, "description")
|
1131
1130
|
|
1132
|
-
@property
|
1131
|
+
@_builtins.property
|
1133
1132
|
@pulumi.getter(name="disableAutomatedRotation")
|
1134
|
-
def disable_automated_rotation(self) -> pulumi.Output[Optional[
|
1133
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1135
1134
|
"""
|
1136
1135
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1137
1136
|
"""
|
1138
1137
|
return pulumi.get(self, "disable_automated_rotation")
|
1139
1138
|
|
1140
|
-
@property
|
1139
|
+
@_builtins.property
|
1141
1140
|
@pulumi.getter(name="disableRemount")
|
1142
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1141
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1143
1142
|
"""
|
1144
1143
|
If set, opts out of mount migration on path updates.
|
1145
1144
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1146
1145
|
"""
|
1147
1146
|
return pulumi.get(self, "disable_remount")
|
1148
1147
|
|
1149
|
-
@property
|
1148
|
+
@_builtins.property
|
1150
1149
|
@pulumi.getter(name="identityTokenAudience")
|
1151
|
-
def identity_token_audience(self) -> pulumi.Output[Optional[
|
1150
|
+
def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1152
1151
|
"""
|
1153
1152
|
The audience claim value for plugin identity
|
1154
1153
|
tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
|
@@ -1156,34 +1155,34 @@ class AuthBackend(pulumi.CustomResource):
|
|
1156
1155
|
"""
|
1157
1156
|
return pulumi.get(self, "identity_token_audience")
|
1158
1157
|
|
1159
|
-
@property
|
1158
|
+
@_builtins.property
|
1160
1159
|
@pulumi.getter(name="identityTokenKey")
|
1161
|
-
def identity_token_key(self) -> pulumi.Output[Optional[
|
1160
|
+
def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1162
1161
|
"""
|
1163
1162
|
The key to use for signing plugin identity
|
1164
1163
|
tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
1165
1164
|
"""
|
1166
1165
|
return pulumi.get(self, "identity_token_key")
|
1167
1166
|
|
1168
|
-
@property
|
1167
|
+
@_builtins.property
|
1169
1168
|
@pulumi.getter(name="identityTokenTtl")
|
1170
|
-
def identity_token_ttl(self) -> pulumi.Output[Optional[
|
1169
|
+
def identity_token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1171
1170
|
"""
|
1172
1171
|
The TTL of generated tokens.
|
1173
1172
|
"""
|
1174
1173
|
return pulumi.get(self, "identity_token_ttl")
|
1175
1174
|
|
1176
|
-
@property
|
1175
|
+
@_builtins.property
|
1177
1176
|
@pulumi.getter
|
1178
|
-
def local(self) -> pulumi.Output[Optional[
|
1177
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1179
1178
|
"""
|
1180
1179
|
Specifies if the auth method is local only.
|
1181
1180
|
"""
|
1182
1181
|
return pulumi.get(self, "local")
|
1183
1182
|
|
1184
|
-
@property
|
1183
|
+
@_builtins.property
|
1185
1184
|
@pulumi.getter
|
1186
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1185
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1187
1186
|
"""
|
1188
1187
|
The namespace to provision the resource in.
|
1189
1188
|
The value should not contain leading or trailing forward slashes.
|
@@ -1192,51 +1191,51 @@ class AuthBackend(pulumi.CustomResource):
|
|
1192
1191
|
"""
|
1193
1192
|
return pulumi.get(self, "namespace")
|
1194
1193
|
|
1195
|
-
@property
|
1194
|
+
@_builtins.property
|
1196
1195
|
@pulumi.getter
|
1197
|
-
def path(self) -> pulumi.Output[Optional[
|
1196
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1198
1197
|
"""
|
1199
1198
|
The path to mount the auth method — this defaults to 'gcp'.
|
1200
1199
|
"""
|
1201
1200
|
return pulumi.get(self, "path")
|
1202
1201
|
|
1203
|
-
@property
|
1202
|
+
@_builtins.property
|
1204
1203
|
@pulumi.getter(name="privateKeyId")
|
1205
|
-
def private_key_id(self) -> pulumi.Output[
|
1204
|
+
def private_key_id(self) -> pulumi.Output[_builtins.str]:
|
1206
1205
|
"""
|
1207
1206
|
The ID of the private key from the credentials
|
1208
1207
|
"""
|
1209
1208
|
return pulumi.get(self, "private_key_id")
|
1210
1209
|
|
1211
|
-
@property
|
1210
|
+
@_builtins.property
|
1212
1211
|
@pulumi.getter(name="projectId")
|
1213
|
-
def project_id(self) -> pulumi.Output[
|
1212
|
+
def project_id(self) -> pulumi.Output[_builtins.str]:
|
1214
1213
|
"""
|
1215
1214
|
The GCP Project ID
|
1216
1215
|
"""
|
1217
1216
|
return pulumi.get(self, "project_id")
|
1218
1217
|
|
1219
|
-
@property
|
1218
|
+
@_builtins.property
|
1220
1219
|
@pulumi.getter(name="rotationPeriod")
|
1221
|
-
def rotation_period(self) -> pulumi.Output[Optional[
|
1220
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1222
1221
|
"""
|
1223
1222
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
1224
1223
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1225
1224
|
"""
|
1226
1225
|
return pulumi.get(self, "rotation_period")
|
1227
1226
|
|
1228
|
-
@property
|
1227
|
+
@_builtins.property
|
1229
1228
|
@pulumi.getter(name="rotationSchedule")
|
1230
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[
|
1229
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1231
1230
|
"""
|
1232
1231
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1233
1232
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1234
1233
|
"""
|
1235
1234
|
return pulumi.get(self, "rotation_schedule")
|
1236
1235
|
|
1237
|
-
@property
|
1236
|
+
@_builtins.property
|
1238
1237
|
@pulumi.getter(name="rotationWindow")
|
1239
|
-
def rotation_window(self) -> pulumi.Output[Optional[
|
1238
|
+
def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1240
1239
|
"""
|
1241
1240
|
The maximum amount of time in seconds allowed to complete
|
1242
1241
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -1244,16 +1243,16 @@ class AuthBackend(pulumi.CustomResource):
|
|
1244
1243
|
"""
|
1245
1244
|
return pulumi.get(self, "rotation_window")
|
1246
1245
|
|
1247
|
-
@property
|
1246
|
+
@_builtins.property
|
1248
1247
|
@pulumi.getter(name="serviceAccountEmail")
|
1249
|
-
def service_account_email(self) -> pulumi.Output[Optional[
|
1248
|
+
def service_account_email(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1250
1249
|
"""
|
1251
1250
|
Service Account to impersonate for plugin workload identity federation.
|
1252
1251
|
Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
|
1253
1252
|
"""
|
1254
1253
|
return pulumi.get(self, "service_account_email")
|
1255
1254
|
|
1256
|
-
@property
|
1255
|
+
@_builtins.property
|
1257
1256
|
@pulumi.getter
|
1258
1257
|
def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
|
1259
1258
|
"""
|