pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
pulumi_vault/_inputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -58,44 +57,44 @@ MYPY = False
|
|
58
57
|
|
59
58
|
if not MYPY:
|
60
59
|
class AuthBackendTuneArgsDict(TypedDict):
|
61
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
60
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
62
61
|
"""
|
63
62
|
List of headers to whitelist and allowing
|
64
63
|
a plugin to include them in the response.
|
65
64
|
"""
|
66
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
65
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
67
66
|
"""
|
68
67
|
Specifies the list of keys that will
|
69
68
|
not be HMAC'd by audit devices in the request data object.
|
70
69
|
"""
|
71
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
70
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
72
71
|
"""
|
73
72
|
Specifies the list of keys that will
|
74
73
|
not be HMAC'd by audit devices in the response data object.
|
75
74
|
"""
|
76
|
-
default_lease_ttl: NotRequired[pulumi.Input[
|
75
|
+
default_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
77
76
|
"""
|
78
77
|
Specifies the default time-to-live.
|
79
78
|
If set, this overrides the global default.
|
80
79
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
81
80
|
"""
|
82
|
-
listing_visibility: NotRequired[pulumi.Input[
|
81
|
+
listing_visibility: NotRequired[pulumi.Input[_builtins.str]]
|
83
82
|
"""
|
84
83
|
Specifies whether to show this mount in
|
85
84
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
86
85
|
"""
|
87
|
-
max_lease_ttl: NotRequired[pulumi.Input[
|
86
|
+
max_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
88
87
|
"""
|
89
88
|
Specifies the maximum time-to-live.
|
90
89
|
If set, this overrides the global default.
|
91
90
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
92
91
|
"""
|
93
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[
|
92
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
94
93
|
"""
|
95
94
|
List of headers to whitelist and
|
96
95
|
pass from the request to the backend.
|
97
96
|
"""
|
98
|
-
token_type: NotRequired[pulumi.Input[
|
97
|
+
token_type: NotRequired[pulumi.Input[_builtins.str]]
|
99
98
|
"""
|
100
99
|
Specifies the type of tokens that should be returned by
|
101
100
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -106,32 +105,32 @@ elif False:
|
|
106
105
|
@pulumi.input_type
|
107
106
|
class AuthBackendTuneArgs:
|
108
107
|
def __init__(__self__, *,
|
109
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
110
|
-
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
111
|
-
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
112
|
-
default_lease_ttl: Optional[pulumi.Input[
|
113
|
-
listing_visibility: Optional[pulumi.Input[
|
114
|
-
max_lease_ttl: Optional[pulumi.Input[
|
115
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[
|
116
|
-
token_type: Optional[pulumi.Input[
|
117
|
-
"""
|
118
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
108
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
109
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
110
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
111
|
+
default_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
112
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
113
|
+
max_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
114
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
115
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
116
|
+
"""
|
117
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
|
119
118
|
a plugin to include them in the response.
|
120
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
119
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
|
121
120
|
not be HMAC'd by audit devices in the request data object.
|
122
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
121
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
|
123
122
|
not be HMAC'd by audit devices in the response data object.
|
124
|
-
:param pulumi.Input[
|
123
|
+
:param pulumi.Input[_builtins.str] default_lease_ttl: Specifies the default time-to-live.
|
125
124
|
If set, this overrides the global default.
|
126
125
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
127
|
-
:param pulumi.Input[
|
126
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in
|
128
127
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
129
|
-
:param pulumi.Input[
|
128
|
+
:param pulumi.Input[_builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
|
130
129
|
If set, this overrides the global default.
|
131
130
|
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
132
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
131
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to whitelist and
|
133
132
|
pass from the request to the backend.
|
134
|
-
:param pulumi.Input[
|
133
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
135
134
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
136
135
|
"""
|
137
136
|
if allowed_response_headers is not None:
|
@@ -151,9 +150,9 @@ class AuthBackendTuneArgs:
|
|
151
150
|
if token_type is not None:
|
152
151
|
pulumi.set(__self__, "token_type", token_type)
|
153
152
|
|
154
|
-
@property
|
153
|
+
@_builtins.property
|
155
154
|
@pulumi.getter(name="allowedResponseHeaders")
|
156
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
155
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
157
156
|
"""
|
158
157
|
List of headers to whitelist and allowing
|
159
158
|
a plugin to include them in the response.
|
@@ -161,12 +160,12 @@ class AuthBackendTuneArgs:
|
|
161
160
|
return pulumi.get(self, "allowed_response_headers")
|
162
161
|
|
163
162
|
@allowed_response_headers.setter
|
164
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
163
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
165
164
|
pulumi.set(self, "allowed_response_headers", value)
|
166
165
|
|
167
|
-
@property
|
166
|
+
@_builtins.property
|
168
167
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
169
|
-
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
168
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
170
169
|
"""
|
171
170
|
Specifies the list of keys that will
|
172
171
|
not be HMAC'd by audit devices in the request data object.
|
@@ -174,12 +173,12 @@ class AuthBackendTuneArgs:
|
|
174
173
|
return pulumi.get(self, "audit_non_hmac_request_keys")
|
175
174
|
|
176
175
|
@audit_non_hmac_request_keys.setter
|
177
|
-
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
176
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
178
177
|
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
179
178
|
|
180
|
-
@property
|
179
|
+
@_builtins.property
|
181
180
|
@pulumi.getter(name="auditNonHmacResponseKeys")
|
182
|
-
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
181
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
183
182
|
"""
|
184
183
|
Specifies the list of keys that will
|
185
184
|
not be HMAC'd by audit devices in the response data object.
|
@@ -187,12 +186,12 @@ class AuthBackendTuneArgs:
|
|
187
186
|
return pulumi.get(self, "audit_non_hmac_response_keys")
|
188
187
|
|
189
188
|
@audit_non_hmac_response_keys.setter
|
190
|
-
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
189
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
191
190
|
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
192
191
|
|
193
|
-
@property
|
192
|
+
@_builtins.property
|
194
193
|
@pulumi.getter(name="defaultLeaseTtl")
|
195
|
-
def default_lease_ttl(self) -> Optional[pulumi.Input[
|
194
|
+
def default_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
196
195
|
"""
|
197
196
|
Specifies the default time-to-live.
|
198
197
|
If set, this overrides the global default.
|
@@ -201,12 +200,12 @@ class AuthBackendTuneArgs:
|
|
201
200
|
return pulumi.get(self, "default_lease_ttl")
|
202
201
|
|
203
202
|
@default_lease_ttl.setter
|
204
|
-
def default_lease_ttl(self, value: Optional[pulumi.Input[
|
203
|
+
def default_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
205
204
|
pulumi.set(self, "default_lease_ttl", value)
|
206
205
|
|
207
|
-
@property
|
206
|
+
@_builtins.property
|
208
207
|
@pulumi.getter(name="listingVisibility")
|
209
|
-
def listing_visibility(self) -> Optional[pulumi.Input[
|
208
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
210
209
|
"""
|
211
210
|
Specifies whether to show this mount in
|
212
211
|
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
@@ -214,12 +213,12 @@ class AuthBackendTuneArgs:
|
|
214
213
|
return pulumi.get(self, "listing_visibility")
|
215
214
|
|
216
215
|
@listing_visibility.setter
|
217
|
-
def listing_visibility(self, value: Optional[pulumi.Input[
|
216
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
218
217
|
pulumi.set(self, "listing_visibility", value)
|
219
218
|
|
220
|
-
@property
|
219
|
+
@_builtins.property
|
221
220
|
@pulumi.getter(name="maxLeaseTtl")
|
222
|
-
def max_lease_ttl(self) -> Optional[pulumi.Input[
|
221
|
+
def max_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
223
222
|
"""
|
224
223
|
Specifies the maximum time-to-live.
|
225
224
|
If set, this overrides the global default.
|
@@ -228,12 +227,12 @@ class AuthBackendTuneArgs:
|
|
228
227
|
return pulumi.get(self, "max_lease_ttl")
|
229
228
|
|
230
229
|
@max_lease_ttl.setter
|
231
|
-
def max_lease_ttl(self, value: Optional[pulumi.Input[
|
230
|
+
def max_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
232
231
|
pulumi.set(self, "max_lease_ttl", value)
|
233
232
|
|
234
|
-
@property
|
233
|
+
@_builtins.property
|
235
234
|
@pulumi.getter(name="passthroughRequestHeaders")
|
236
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
235
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
237
236
|
"""
|
238
237
|
List of headers to whitelist and
|
239
238
|
pass from the request to the backend.
|
@@ -241,12 +240,12 @@ class AuthBackendTuneArgs:
|
|
241
240
|
return pulumi.get(self, "passthrough_request_headers")
|
242
241
|
|
243
242
|
@passthrough_request_headers.setter
|
244
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
243
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
245
244
|
pulumi.set(self, "passthrough_request_headers", value)
|
246
245
|
|
247
|
-
@property
|
246
|
+
@_builtins.property
|
248
247
|
@pulumi.getter(name="tokenType")
|
249
|
-
def token_type(self) -> Optional[pulumi.Input[
|
248
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
250
249
|
"""
|
251
250
|
Specifies the type of tokens that should be returned by
|
252
251
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -254,20 +253,20 @@ class AuthBackendTuneArgs:
|
|
254
253
|
return pulumi.get(self, "token_type")
|
255
254
|
|
256
255
|
@token_type.setter
|
257
|
-
def token_type(self, value: Optional[pulumi.Input[
|
256
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
258
257
|
pulumi.set(self, "token_type", value)
|
259
258
|
|
260
259
|
|
261
260
|
if not MYPY:
|
262
261
|
class ProviderAuthLoginArgsDict(TypedDict):
|
263
|
-
path: pulumi.Input[
|
264
|
-
method: NotRequired[pulumi.Input[
|
265
|
-
namespace: NotRequired[pulumi.Input[
|
262
|
+
path: pulumi.Input[_builtins.str]
|
263
|
+
method: NotRequired[pulumi.Input[_builtins.str]]
|
264
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
266
265
|
"""
|
267
266
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
268
267
|
"""
|
269
|
-
parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
270
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
268
|
+
parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
269
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
271
270
|
"""
|
272
271
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
273
272
|
"""
|
@@ -277,14 +276,14 @@ elif False:
|
|
277
276
|
@pulumi.input_type
|
278
277
|
class ProviderAuthLoginArgs:
|
279
278
|
def __init__(__self__, *,
|
280
|
-
path: pulumi.Input[
|
281
|
-
method: Optional[pulumi.Input[
|
282
|
-
namespace: Optional[pulumi.Input[
|
283
|
-
parameters: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
284
|
-
use_root_namespace: Optional[pulumi.Input[
|
279
|
+
path: pulumi.Input[_builtins.str],
|
280
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
281
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
282
|
+
parameters: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
283
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
285
284
|
"""
|
286
|
-
:param pulumi.Input[
|
287
|
-
:param pulumi.Input[
|
285
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
286
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
288
287
|
"""
|
289
288
|
pulumi.set(__self__, "path", path)
|
290
289
|
if method is not None:
|
@@ -296,121 +295,121 @@ class ProviderAuthLoginArgs:
|
|
296
295
|
if use_root_namespace is not None:
|
297
296
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
298
297
|
|
299
|
-
@property
|
298
|
+
@_builtins.property
|
300
299
|
@pulumi.getter
|
301
|
-
def path(self) -> pulumi.Input[
|
300
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
302
301
|
return pulumi.get(self, "path")
|
303
302
|
|
304
303
|
@path.setter
|
305
|
-
def path(self, value: pulumi.Input[
|
304
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
306
305
|
pulumi.set(self, "path", value)
|
307
306
|
|
308
|
-
@property
|
307
|
+
@_builtins.property
|
309
308
|
@pulumi.getter
|
310
|
-
def method(self) -> Optional[pulumi.Input[
|
309
|
+
def method(self) -> Optional[pulumi.Input[_builtins.str]]:
|
311
310
|
return pulumi.get(self, "method")
|
312
311
|
|
313
312
|
@method.setter
|
314
|
-
def method(self, value: Optional[pulumi.Input[
|
313
|
+
def method(self, value: Optional[pulumi.Input[_builtins.str]]):
|
315
314
|
pulumi.set(self, "method", value)
|
316
315
|
|
317
|
-
@property
|
316
|
+
@_builtins.property
|
318
317
|
@pulumi.getter
|
319
|
-
def namespace(self) -> Optional[pulumi.Input[
|
318
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
320
319
|
"""
|
321
320
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
322
321
|
"""
|
323
322
|
return pulumi.get(self, "namespace")
|
324
323
|
|
325
324
|
@namespace.setter
|
326
|
-
def namespace(self, value: Optional[pulumi.Input[
|
325
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
327
326
|
pulumi.set(self, "namespace", value)
|
328
327
|
|
329
|
-
@property
|
328
|
+
@_builtins.property
|
330
329
|
@pulumi.getter
|
331
|
-
def parameters(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
330
|
+
def parameters(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
332
331
|
return pulumi.get(self, "parameters")
|
333
332
|
|
334
333
|
@parameters.setter
|
335
|
-
def parameters(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
334
|
+
def parameters(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
336
335
|
pulumi.set(self, "parameters", value)
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter(name="useRootNamespace")
|
340
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
339
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
341
340
|
"""
|
342
341
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
343
342
|
"""
|
344
343
|
return pulumi.get(self, "use_root_namespace")
|
345
344
|
|
346
345
|
@use_root_namespace.setter
|
347
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
346
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
348
347
|
pulumi.set(self, "use_root_namespace", value)
|
349
348
|
|
350
349
|
|
351
350
|
if not MYPY:
|
352
351
|
class ProviderAuthLoginAwsArgsDict(TypedDict):
|
353
|
-
role: pulumi.Input[
|
352
|
+
role: pulumi.Input[_builtins.str]
|
354
353
|
"""
|
355
354
|
The Vault role to use when logging into Vault.
|
356
355
|
"""
|
357
|
-
aws_access_key_id: NotRequired[pulumi.Input[
|
356
|
+
aws_access_key_id: NotRequired[pulumi.Input[_builtins.str]]
|
358
357
|
"""
|
359
358
|
The AWS access key ID.
|
360
359
|
"""
|
361
|
-
aws_iam_endpoint: NotRequired[pulumi.Input[
|
360
|
+
aws_iam_endpoint: NotRequired[pulumi.Input[_builtins.str]]
|
362
361
|
"""
|
363
362
|
The IAM endpoint URL.
|
364
363
|
"""
|
365
|
-
aws_profile: NotRequired[pulumi.Input[
|
364
|
+
aws_profile: NotRequired[pulumi.Input[_builtins.str]]
|
366
365
|
"""
|
367
366
|
The name of the AWS profile.
|
368
367
|
"""
|
369
|
-
aws_region: NotRequired[pulumi.Input[
|
368
|
+
aws_region: NotRequired[pulumi.Input[_builtins.str]]
|
370
369
|
"""
|
371
370
|
The AWS region.
|
372
371
|
"""
|
373
|
-
aws_role_arn: NotRequired[pulumi.Input[
|
372
|
+
aws_role_arn: NotRequired[pulumi.Input[_builtins.str]]
|
374
373
|
"""
|
375
374
|
The ARN of the AWS Role to assume.Used during STS AssumeRole
|
376
375
|
"""
|
377
|
-
aws_role_session_name: NotRequired[pulumi.Input[
|
376
|
+
aws_role_session_name: NotRequired[pulumi.Input[_builtins.str]]
|
378
377
|
"""
|
379
378
|
Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
380
379
|
"""
|
381
|
-
aws_secret_access_key: NotRequired[pulumi.Input[
|
380
|
+
aws_secret_access_key: NotRequired[pulumi.Input[_builtins.str]]
|
382
381
|
"""
|
383
382
|
The AWS secret access key.
|
384
383
|
"""
|
385
|
-
aws_session_token: NotRequired[pulumi.Input[
|
384
|
+
aws_session_token: NotRequired[pulumi.Input[_builtins.str]]
|
386
385
|
"""
|
387
386
|
The AWS session token.
|
388
387
|
"""
|
389
|
-
aws_shared_credentials_file: NotRequired[pulumi.Input[
|
388
|
+
aws_shared_credentials_file: NotRequired[pulumi.Input[_builtins.str]]
|
390
389
|
"""
|
391
390
|
Path to the AWS shared credentials file.
|
392
391
|
"""
|
393
|
-
aws_sts_endpoint: NotRequired[pulumi.Input[
|
392
|
+
aws_sts_endpoint: NotRequired[pulumi.Input[_builtins.str]]
|
394
393
|
"""
|
395
394
|
The STS endpoint URL.
|
396
395
|
"""
|
397
|
-
aws_web_identity_token_file: NotRequired[pulumi.Input[
|
396
|
+
aws_web_identity_token_file: NotRequired[pulumi.Input[_builtins.str]]
|
398
397
|
"""
|
399
398
|
Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
400
399
|
"""
|
401
|
-
header_value: NotRequired[pulumi.Input[
|
400
|
+
header_value: NotRequired[pulumi.Input[_builtins.str]]
|
402
401
|
"""
|
403
402
|
The Vault header value to include in the STS signing request.
|
404
403
|
"""
|
405
|
-
mount: NotRequired[pulumi.Input[
|
404
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
406
405
|
"""
|
407
406
|
The path where the authentication engine is mounted.
|
408
407
|
"""
|
409
|
-
namespace: NotRequired[pulumi.Input[
|
408
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
410
409
|
"""
|
411
410
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
412
411
|
"""
|
413
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
412
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
414
413
|
"""
|
415
414
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
416
415
|
"""
|
@@ -420,39 +419,39 @@ elif False:
|
|
420
419
|
@pulumi.input_type
|
421
420
|
class ProviderAuthLoginAwsArgs:
|
422
421
|
def __init__(__self__, *,
|
423
|
-
role: pulumi.Input[
|
424
|
-
aws_access_key_id: Optional[pulumi.Input[
|
425
|
-
aws_iam_endpoint: Optional[pulumi.Input[
|
426
|
-
aws_profile: Optional[pulumi.Input[
|
427
|
-
aws_region: Optional[pulumi.Input[
|
428
|
-
aws_role_arn: Optional[pulumi.Input[
|
429
|
-
aws_role_session_name: Optional[pulumi.Input[
|
430
|
-
aws_secret_access_key: Optional[pulumi.Input[
|
431
|
-
aws_session_token: Optional[pulumi.Input[
|
432
|
-
aws_shared_credentials_file: Optional[pulumi.Input[
|
433
|
-
aws_sts_endpoint: Optional[pulumi.Input[
|
434
|
-
aws_web_identity_token_file: Optional[pulumi.Input[
|
435
|
-
header_value: Optional[pulumi.Input[
|
436
|
-
mount: Optional[pulumi.Input[
|
437
|
-
namespace: Optional[pulumi.Input[
|
438
|
-
use_root_namespace: Optional[pulumi.Input[
|
439
|
-
"""
|
440
|
-
:param pulumi.Input[
|
441
|
-
:param pulumi.Input[
|
442
|
-
:param pulumi.Input[
|
443
|
-
:param pulumi.Input[
|
444
|
-
:param pulumi.Input[
|
445
|
-
:param pulumi.Input[
|
446
|
-
:param pulumi.Input[
|
447
|
-
:param pulumi.Input[
|
448
|
-
:param pulumi.Input[
|
449
|
-
:param pulumi.Input[
|
450
|
-
:param pulumi.Input[
|
451
|
-
:param pulumi.Input[
|
452
|
-
:param pulumi.Input[
|
453
|
-
:param pulumi.Input[
|
454
|
-
:param pulumi.Input[
|
455
|
-
:param pulumi.Input[
|
422
|
+
role: pulumi.Input[_builtins.str],
|
423
|
+
aws_access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
424
|
+
aws_iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
425
|
+
aws_profile: Optional[pulumi.Input[_builtins.str]] = None,
|
426
|
+
aws_region: Optional[pulumi.Input[_builtins.str]] = None,
|
427
|
+
aws_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
428
|
+
aws_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
|
429
|
+
aws_secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
430
|
+
aws_session_token: Optional[pulumi.Input[_builtins.str]] = None,
|
431
|
+
aws_shared_credentials_file: Optional[pulumi.Input[_builtins.str]] = None,
|
432
|
+
aws_sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
433
|
+
aws_web_identity_token_file: Optional[pulumi.Input[_builtins.str]] = None,
|
434
|
+
header_value: Optional[pulumi.Input[_builtins.str]] = None,
|
435
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
436
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
437
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
438
|
+
"""
|
439
|
+
:param pulumi.Input[_builtins.str] role: The Vault role to use when logging into Vault.
|
440
|
+
:param pulumi.Input[_builtins.str] aws_access_key_id: The AWS access key ID.
|
441
|
+
:param pulumi.Input[_builtins.str] aws_iam_endpoint: The IAM endpoint URL.
|
442
|
+
:param pulumi.Input[_builtins.str] aws_profile: The name of the AWS profile.
|
443
|
+
:param pulumi.Input[_builtins.str] aws_region: The AWS region.
|
444
|
+
:param pulumi.Input[_builtins.str] aws_role_arn: The ARN of the AWS Role to assume.Used during STS AssumeRole
|
445
|
+
:param pulumi.Input[_builtins.str] aws_role_session_name: Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
446
|
+
:param pulumi.Input[_builtins.str] aws_secret_access_key: The AWS secret access key.
|
447
|
+
:param pulumi.Input[_builtins.str] aws_session_token: The AWS session token.
|
448
|
+
:param pulumi.Input[_builtins.str] aws_shared_credentials_file: Path to the AWS shared credentials file.
|
449
|
+
:param pulumi.Input[_builtins.str] aws_sts_endpoint: The STS endpoint URL.
|
450
|
+
:param pulumi.Input[_builtins.str] aws_web_identity_token_file: Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
451
|
+
:param pulumi.Input[_builtins.str] header_value: The Vault header value to include in the STS signing request.
|
452
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
453
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
454
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
456
455
|
"""
|
457
456
|
pulumi.set(__self__, "role", role)
|
458
457
|
if aws_access_key_id is not None:
|
@@ -486,246 +485,246 @@ class ProviderAuthLoginAwsArgs:
|
|
486
485
|
if use_root_namespace is not None:
|
487
486
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
488
487
|
|
489
|
-
@property
|
488
|
+
@_builtins.property
|
490
489
|
@pulumi.getter
|
491
|
-
def role(self) -> pulumi.Input[
|
490
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
492
491
|
"""
|
493
492
|
The Vault role to use when logging into Vault.
|
494
493
|
"""
|
495
494
|
return pulumi.get(self, "role")
|
496
495
|
|
497
496
|
@role.setter
|
498
|
-
def role(self, value: pulumi.Input[
|
497
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
499
498
|
pulumi.set(self, "role", value)
|
500
499
|
|
501
|
-
@property
|
500
|
+
@_builtins.property
|
502
501
|
@pulumi.getter(name="awsAccessKeyId")
|
503
|
-
def aws_access_key_id(self) -> Optional[pulumi.Input[
|
502
|
+
def aws_access_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
504
503
|
"""
|
505
504
|
The AWS access key ID.
|
506
505
|
"""
|
507
506
|
return pulumi.get(self, "aws_access_key_id")
|
508
507
|
|
509
508
|
@aws_access_key_id.setter
|
510
|
-
def aws_access_key_id(self, value: Optional[pulumi.Input[
|
509
|
+
def aws_access_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
511
510
|
pulumi.set(self, "aws_access_key_id", value)
|
512
511
|
|
513
|
-
@property
|
512
|
+
@_builtins.property
|
514
513
|
@pulumi.getter(name="awsIamEndpoint")
|
515
|
-
def aws_iam_endpoint(self) -> Optional[pulumi.Input[
|
514
|
+
def aws_iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
|
516
515
|
"""
|
517
516
|
The IAM endpoint URL.
|
518
517
|
"""
|
519
518
|
return pulumi.get(self, "aws_iam_endpoint")
|
520
519
|
|
521
520
|
@aws_iam_endpoint.setter
|
522
|
-
def aws_iam_endpoint(self, value: Optional[pulumi.Input[
|
521
|
+
def aws_iam_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
|
523
522
|
pulumi.set(self, "aws_iam_endpoint", value)
|
524
523
|
|
525
|
-
@property
|
524
|
+
@_builtins.property
|
526
525
|
@pulumi.getter(name="awsProfile")
|
527
|
-
def aws_profile(self) -> Optional[pulumi.Input[
|
526
|
+
def aws_profile(self) -> Optional[pulumi.Input[_builtins.str]]:
|
528
527
|
"""
|
529
528
|
The name of the AWS profile.
|
530
529
|
"""
|
531
530
|
return pulumi.get(self, "aws_profile")
|
532
531
|
|
533
532
|
@aws_profile.setter
|
534
|
-
def aws_profile(self, value: Optional[pulumi.Input[
|
533
|
+
def aws_profile(self, value: Optional[pulumi.Input[_builtins.str]]):
|
535
534
|
pulumi.set(self, "aws_profile", value)
|
536
535
|
|
537
|
-
@property
|
536
|
+
@_builtins.property
|
538
537
|
@pulumi.getter(name="awsRegion")
|
539
|
-
def aws_region(self) -> Optional[pulumi.Input[
|
538
|
+
def aws_region(self) -> Optional[pulumi.Input[_builtins.str]]:
|
540
539
|
"""
|
541
540
|
The AWS region.
|
542
541
|
"""
|
543
542
|
return pulumi.get(self, "aws_region")
|
544
543
|
|
545
544
|
@aws_region.setter
|
546
|
-
def aws_region(self, value: Optional[pulumi.Input[
|
545
|
+
def aws_region(self, value: Optional[pulumi.Input[_builtins.str]]):
|
547
546
|
pulumi.set(self, "aws_region", value)
|
548
547
|
|
549
|
-
@property
|
548
|
+
@_builtins.property
|
550
549
|
@pulumi.getter(name="awsRoleArn")
|
551
|
-
def aws_role_arn(self) -> Optional[pulumi.Input[
|
550
|
+
def aws_role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
552
551
|
"""
|
553
552
|
The ARN of the AWS Role to assume.Used during STS AssumeRole
|
554
553
|
"""
|
555
554
|
return pulumi.get(self, "aws_role_arn")
|
556
555
|
|
557
556
|
@aws_role_arn.setter
|
558
|
-
def aws_role_arn(self, value: Optional[pulumi.Input[
|
557
|
+
def aws_role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
559
558
|
pulumi.set(self, "aws_role_arn", value)
|
560
559
|
|
561
|
-
@property
|
560
|
+
@_builtins.property
|
562
561
|
@pulumi.getter(name="awsRoleSessionName")
|
563
|
-
def aws_role_session_name(self) -> Optional[pulumi.Input[
|
562
|
+
def aws_role_session_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
564
563
|
"""
|
565
564
|
Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
566
565
|
"""
|
567
566
|
return pulumi.get(self, "aws_role_session_name")
|
568
567
|
|
569
568
|
@aws_role_session_name.setter
|
570
|
-
def aws_role_session_name(self, value: Optional[pulumi.Input[
|
569
|
+
def aws_role_session_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
571
570
|
pulumi.set(self, "aws_role_session_name", value)
|
572
571
|
|
573
|
-
@property
|
572
|
+
@_builtins.property
|
574
573
|
@pulumi.getter(name="awsSecretAccessKey")
|
575
|
-
def aws_secret_access_key(self) -> Optional[pulumi.Input[
|
574
|
+
def aws_secret_access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
576
575
|
"""
|
577
576
|
The AWS secret access key.
|
578
577
|
"""
|
579
578
|
return pulumi.get(self, "aws_secret_access_key")
|
580
579
|
|
581
580
|
@aws_secret_access_key.setter
|
582
|
-
def aws_secret_access_key(self, value: Optional[pulumi.Input[
|
581
|
+
def aws_secret_access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
583
582
|
pulumi.set(self, "aws_secret_access_key", value)
|
584
583
|
|
585
|
-
@property
|
584
|
+
@_builtins.property
|
586
585
|
@pulumi.getter(name="awsSessionToken")
|
587
|
-
def aws_session_token(self) -> Optional[pulumi.Input[
|
586
|
+
def aws_session_token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
588
587
|
"""
|
589
588
|
The AWS session token.
|
590
589
|
"""
|
591
590
|
return pulumi.get(self, "aws_session_token")
|
592
591
|
|
593
592
|
@aws_session_token.setter
|
594
|
-
def aws_session_token(self, value: Optional[pulumi.Input[
|
593
|
+
def aws_session_token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
595
594
|
pulumi.set(self, "aws_session_token", value)
|
596
595
|
|
597
|
-
@property
|
596
|
+
@_builtins.property
|
598
597
|
@pulumi.getter(name="awsSharedCredentialsFile")
|
599
|
-
def aws_shared_credentials_file(self) -> Optional[pulumi.Input[
|
598
|
+
def aws_shared_credentials_file(self) -> Optional[pulumi.Input[_builtins.str]]:
|
600
599
|
"""
|
601
600
|
Path to the AWS shared credentials file.
|
602
601
|
"""
|
603
602
|
return pulumi.get(self, "aws_shared_credentials_file")
|
604
603
|
|
605
604
|
@aws_shared_credentials_file.setter
|
606
|
-
def aws_shared_credentials_file(self, value: Optional[pulumi.Input[
|
605
|
+
def aws_shared_credentials_file(self, value: Optional[pulumi.Input[_builtins.str]]):
|
607
606
|
pulumi.set(self, "aws_shared_credentials_file", value)
|
608
607
|
|
609
|
-
@property
|
608
|
+
@_builtins.property
|
610
609
|
@pulumi.getter(name="awsStsEndpoint")
|
611
|
-
def aws_sts_endpoint(self) -> Optional[pulumi.Input[
|
610
|
+
def aws_sts_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
|
612
611
|
"""
|
613
612
|
The STS endpoint URL.
|
614
613
|
"""
|
615
614
|
return pulumi.get(self, "aws_sts_endpoint")
|
616
615
|
|
617
616
|
@aws_sts_endpoint.setter
|
618
|
-
def aws_sts_endpoint(self, value: Optional[pulumi.Input[
|
617
|
+
def aws_sts_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
|
619
618
|
pulumi.set(self, "aws_sts_endpoint", value)
|
620
619
|
|
621
|
-
@property
|
620
|
+
@_builtins.property
|
622
621
|
@pulumi.getter(name="awsWebIdentityTokenFile")
|
623
|
-
def aws_web_identity_token_file(self) -> Optional[pulumi.Input[
|
622
|
+
def aws_web_identity_token_file(self) -> Optional[pulumi.Input[_builtins.str]]:
|
624
623
|
"""
|
625
624
|
Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
626
625
|
"""
|
627
626
|
return pulumi.get(self, "aws_web_identity_token_file")
|
628
627
|
|
629
628
|
@aws_web_identity_token_file.setter
|
630
|
-
def aws_web_identity_token_file(self, value: Optional[pulumi.Input[
|
629
|
+
def aws_web_identity_token_file(self, value: Optional[pulumi.Input[_builtins.str]]):
|
631
630
|
pulumi.set(self, "aws_web_identity_token_file", value)
|
632
631
|
|
633
|
-
@property
|
632
|
+
@_builtins.property
|
634
633
|
@pulumi.getter(name="headerValue")
|
635
|
-
def header_value(self) -> Optional[pulumi.Input[
|
634
|
+
def header_value(self) -> Optional[pulumi.Input[_builtins.str]]:
|
636
635
|
"""
|
637
636
|
The Vault header value to include in the STS signing request.
|
638
637
|
"""
|
639
638
|
return pulumi.get(self, "header_value")
|
640
639
|
|
641
640
|
@header_value.setter
|
642
|
-
def header_value(self, value: Optional[pulumi.Input[
|
641
|
+
def header_value(self, value: Optional[pulumi.Input[_builtins.str]]):
|
643
642
|
pulumi.set(self, "header_value", value)
|
644
643
|
|
645
|
-
@property
|
644
|
+
@_builtins.property
|
646
645
|
@pulumi.getter
|
647
|
-
def mount(self) -> Optional[pulumi.Input[
|
646
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
648
647
|
"""
|
649
648
|
The path where the authentication engine is mounted.
|
650
649
|
"""
|
651
650
|
return pulumi.get(self, "mount")
|
652
651
|
|
653
652
|
@mount.setter
|
654
|
-
def mount(self, value: Optional[pulumi.Input[
|
653
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
655
654
|
pulumi.set(self, "mount", value)
|
656
655
|
|
657
|
-
@property
|
656
|
+
@_builtins.property
|
658
657
|
@pulumi.getter
|
659
|
-
def namespace(self) -> Optional[pulumi.Input[
|
658
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
660
659
|
"""
|
661
660
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
662
661
|
"""
|
663
662
|
return pulumi.get(self, "namespace")
|
664
663
|
|
665
664
|
@namespace.setter
|
666
|
-
def namespace(self, value: Optional[pulumi.Input[
|
665
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
667
666
|
pulumi.set(self, "namespace", value)
|
668
667
|
|
669
|
-
@property
|
668
|
+
@_builtins.property
|
670
669
|
@pulumi.getter(name="useRootNamespace")
|
671
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
670
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
672
671
|
"""
|
673
672
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
674
673
|
"""
|
675
674
|
return pulumi.get(self, "use_root_namespace")
|
676
675
|
|
677
676
|
@use_root_namespace.setter
|
678
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
677
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
679
678
|
pulumi.set(self, "use_root_namespace", value)
|
680
679
|
|
681
680
|
|
682
681
|
if not MYPY:
|
683
682
|
class ProviderAuthLoginAzureArgsDict(TypedDict):
|
684
|
-
resource_group_name: pulumi.Input[
|
683
|
+
resource_group_name: pulumi.Input[_builtins.str]
|
685
684
|
"""
|
686
685
|
The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
687
686
|
"""
|
688
|
-
role: pulumi.Input[
|
687
|
+
role: pulumi.Input[_builtins.str]
|
689
688
|
"""
|
690
689
|
Name of the login role.
|
691
690
|
"""
|
692
|
-
subscription_id: pulumi.Input[
|
691
|
+
subscription_id: pulumi.Input[_builtins.str]
|
693
692
|
"""
|
694
693
|
The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
695
694
|
"""
|
696
|
-
client_id: NotRequired[pulumi.Input[
|
695
|
+
client_id: NotRequired[pulumi.Input[_builtins.str]]
|
697
696
|
"""
|
698
697
|
The identity's client ID.
|
699
698
|
"""
|
700
|
-
jwt: NotRequired[pulumi.Input[
|
699
|
+
jwt: NotRequired[pulumi.Input[_builtins.str]]
|
701
700
|
"""
|
702
701
|
A signed JSON Web Token. If not specified on will be created automatically
|
703
702
|
"""
|
704
|
-
mount: NotRequired[pulumi.Input[
|
703
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
705
704
|
"""
|
706
705
|
The path where the authentication engine is mounted.
|
707
706
|
"""
|
708
|
-
namespace: NotRequired[pulumi.Input[
|
707
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
709
708
|
"""
|
710
709
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
711
710
|
"""
|
712
|
-
scope: NotRequired[pulumi.Input[
|
711
|
+
scope: NotRequired[pulumi.Input[_builtins.str]]
|
713
712
|
"""
|
714
713
|
The scopes to include in the token request.
|
715
714
|
"""
|
716
|
-
tenant_id: NotRequired[pulumi.Input[
|
715
|
+
tenant_id: NotRequired[pulumi.Input[_builtins.str]]
|
717
716
|
"""
|
718
717
|
Provides the tenant ID to use in a multi-tenant authentication scenario.
|
719
718
|
"""
|
720
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
719
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
721
720
|
"""
|
722
721
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
723
722
|
"""
|
724
|
-
vm_name: NotRequired[pulumi.Input[
|
723
|
+
vm_name: NotRequired[pulumi.Input[_builtins.str]]
|
725
724
|
"""
|
726
725
|
The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
727
726
|
"""
|
728
|
-
vmss_name: NotRequired[pulumi.Input[
|
727
|
+
vmss_name: NotRequired[pulumi.Input[_builtins.str]]
|
729
728
|
"""
|
730
729
|
The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
731
730
|
"""
|
@@ -735,31 +734,31 @@ elif False:
|
|
735
734
|
@pulumi.input_type
|
736
735
|
class ProviderAuthLoginAzureArgs:
|
737
736
|
def __init__(__self__, *,
|
738
|
-
resource_group_name: pulumi.Input[
|
739
|
-
role: pulumi.Input[
|
740
|
-
subscription_id: pulumi.Input[
|
741
|
-
client_id: Optional[pulumi.Input[
|
742
|
-
jwt: Optional[pulumi.Input[
|
743
|
-
mount: Optional[pulumi.Input[
|
744
|
-
namespace: Optional[pulumi.Input[
|
745
|
-
scope: Optional[pulumi.Input[
|
746
|
-
tenant_id: Optional[pulumi.Input[
|
747
|
-
use_root_namespace: Optional[pulumi.Input[
|
748
|
-
vm_name: Optional[pulumi.Input[
|
749
|
-
vmss_name: Optional[pulumi.Input[
|
750
|
-
"""
|
751
|
-
:param pulumi.Input[
|
752
|
-
:param pulumi.Input[
|
753
|
-
:param pulumi.Input[
|
754
|
-
:param pulumi.Input[
|
755
|
-
:param pulumi.Input[
|
756
|
-
:param pulumi.Input[
|
757
|
-
:param pulumi.Input[
|
758
|
-
:param pulumi.Input[
|
759
|
-
:param pulumi.Input[
|
760
|
-
:param pulumi.Input[
|
761
|
-
:param pulumi.Input[
|
762
|
-
:param pulumi.Input[
|
737
|
+
resource_group_name: pulumi.Input[_builtins.str],
|
738
|
+
role: pulumi.Input[_builtins.str],
|
739
|
+
subscription_id: pulumi.Input[_builtins.str],
|
740
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
741
|
+
jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
742
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
743
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
744
|
+
scope: Optional[pulumi.Input[_builtins.str]] = None,
|
745
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
|
746
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
|
747
|
+
vm_name: Optional[pulumi.Input[_builtins.str]] = None,
|
748
|
+
vmss_name: Optional[pulumi.Input[_builtins.str]] = None):
|
749
|
+
"""
|
750
|
+
:param pulumi.Input[_builtins.str] resource_group_name: The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
751
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
752
|
+
:param pulumi.Input[_builtins.str] subscription_id: The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
753
|
+
:param pulumi.Input[_builtins.str] client_id: The identity's client ID.
|
754
|
+
:param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token. If not specified on will be created automatically
|
755
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
756
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
757
|
+
:param pulumi.Input[_builtins.str] scope: The scopes to include in the token request.
|
758
|
+
:param pulumi.Input[_builtins.str] tenant_id: Provides the tenant ID to use in a multi-tenant authentication scenario.
|
759
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
760
|
+
:param pulumi.Input[_builtins.str] vm_name: The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
761
|
+
:param pulumi.Input[_builtins.str] vmss_name: The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
763
762
|
"""
|
764
763
|
pulumi.set(__self__, "resource_group_name", resource_group_name)
|
765
764
|
pulumi.set(__self__, "role", role)
|
@@ -783,174 +782,174 @@ class ProviderAuthLoginAzureArgs:
|
|
783
782
|
if vmss_name is not None:
|
784
783
|
pulumi.set(__self__, "vmss_name", vmss_name)
|
785
784
|
|
786
|
-
@property
|
785
|
+
@_builtins.property
|
787
786
|
@pulumi.getter(name="resourceGroupName")
|
788
|
-
def resource_group_name(self) -> pulumi.Input[
|
787
|
+
def resource_group_name(self) -> pulumi.Input[_builtins.str]:
|
789
788
|
"""
|
790
789
|
The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
791
790
|
"""
|
792
791
|
return pulumi.get(self, "resource_group_name")
|
793
792
|
|
794
793
|
@resource_group_name.setter
|
795
|
-
def resource_group_name(self, value: pulumi.Input[
|
794
|
+
def resource_group_name(self, value: pulumi.Input[_builtins.str]):
|
796
795
|
pulumi.set(self, "resource_group_name", value)
|
797
796
|
|
798
|
-
@property
|
797
|
+
@_builtins.property
|
799
798
|
@pulumi.getter
|
800
|
-
def role(self) -> pulumi.Input[
|
799
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
801
800
|
"""
|
802
801
|
Name of the login role.
|
803
802
|
"""
|
804
803
|
return pulumi.get(self, "role")
|
805
804
|
|
806
805
|
@role.setter
|
807
|
-
def role(self, value: pulumi.Input[
|
806
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
808
807
|
pulumi.set(self, "role", value)
|
809
808
|
|
810
|
-
@property
|
809
|
+
@_builtins.property
|
811
810
|
@pulumi.getter(name="subscriptionId")
|
812
|
-
def subscription_id(self) -> pulumi.Input[
|
811
|
+
def subscription_id(self) -> pulumi.Input[_builtins.str]:
|
813
812
|
"""
|
814
813
|
The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
815
814
|
"""
|
816
815
|
return pulumi.get(self, "subscription_id")
|
817
816
|
|
818
817
|
@subscription_id.setter
|
819
|
-
def subscription_id(self, value: pulumi.Input[
|
818
|
+
def subscription_id(self, value: pulumi.Input[_builtins.str]):
|
820
819
|
pulumi.set(self, "subscription_id", value)
|
821
820
|
|
822
|
-
@property
|
821
|
+
@_builtins.property
|
823
822
|
@pulumi.getter(name="clientId")
|
824
|
-
def client_id(self) -> Optional[pulumi.Input[
|
823
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
825
824
|
"""
|
826
825
|
The identity's client ID.
|
827
826
|
"""
|
828
827
|
return pulumi.get(self, "client_id")
|
829
828
|
|
830
829
|
@client_id.setter
|
831
|
-
def client_id(self, value: Optional[pulumi.Input[
|
830
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
832
831
|
pulumi.set(self, "client_id", value)
|
833
832
|
|
834
|
-
@property
|
833
|
+
@_builtins.property
|
835
834
|
@pulumi.getter
|
836
|
-
def jwt(self) -> Optional[pulumi.Input[
|
835
|
+
def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
837
836
|
"""
|
838
837
|
A signed JSON Web Token. If not specified on will be created automatically
|
839
838
|
"""
|
840
839
|
return pulumi.get(self, "jwt")
|
841
840
|
|
842
841
|
@jwt.setter
|
843
|
-
def jwt(self, value: Optional[pulumi.Input[
|
842
|
+
def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
844
843
|
pulumi.set(self, "jwt", value)
|
845
844
|
|
846
|
-
@property
|
845
|
+
@_builtins.property
|
847
846
|
@pulumi.getter
|
848
|
-
def mount(self) -> Optional[pulumi.Input[
|
847
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
849
848
|
"""
|
850
849
|
The path where the authentication engine is mounted.
|
851
850
|
"""
|
852
851
|
return pulumi.get(self, "mount")
|
853
852
|
|
854
853
|
@mount.setter
|
855
|
-
def mount(self, value: Optional[pulumi.Input[
|
854
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
856
855
|
pulumi.set(self, "mount", value)
|
857
856
|
|
858
|
-
@property
|
857
|
+
@_builtins.property
|
859
858
|
@pulumi.getter
|
860
|
-
def namespace(self) -> Optional[pulumi.Input[
|
859
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
861
860
|
"""
|
862
861
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
863
862
|
"""
|
864
863
|
return pulumi.get(self, "namespace")
|
865
864
|
|
866
865
|
@namespace.setter
|
867
|
-
def namespace(self, value: Optional[pulumi.Input[
|
866
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
868
867
|
pulumi.set(self, "namespace", value)
|
869
868
|
|
870
|
-
@property
|
869
|
+
@_builtins.property
|
871
870
|
@pulumi.getter
|
872
|
-
def scope(self) -> Optional[pulumi.Input[
|
871
|
+
def scope(self) -> Optional[pulumi.Input[_builtins.str]]:
|
873
872
|
"""
|
874
873
|
The scopes to include in the token request.
|
875
874
|
"""
|
876
875
|
return pulumi.get(self, "scope")
|
877
876
|
|
878
877
|
@scope.setter
|
879
|
-
def scope(self, value: Optional[pulumi.Input[
|
878
|
+
def scope(self, value: Optional[pulumi.Input[_builtins.str]]):
|
880
879
|
pulumi.set(self, "scope", value)
|
881
880
|
|
882
|
-
@property
|
881
|
+
@_builtins.property
|
883
882
|
@pulumi.getter(name="tenantId")
|
884
|
-
def tenant_id(self) -> Optional[pulumi.Input[
|
883
|
+
def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
885
884
|
"""
|
886
885
|
Provides the tenant ID to use in a multi-tenant authentication scenario.
|
887
886
|
"""
|
888
887
|
return pulumi.get(self, "tenant_id")
|
889
888
|
|
890
889
|
@tenant_id.setter
|
891
|
-
def tenant_id(self, value: Optional[pulumi.Input[
|
890
|
+
def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
892
891
|
pulumi.set(self, "tenant_id", value)
|
893
892
|
|
894
|
-
@property
|
893
|
+
@_builtins.property
|
895
894
|
@pulumi.getter(name="useRootNamespace")
|
896
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
895
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
897
896
|
"""
|
898
897
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
899
898
|
"""
|
900
899
|
return pulumi.get(self, "use_root_namespace")
|
901
900
|
|
902
901
|
@use_root_namespace.setter
|
903
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
902
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
904
903
|
pulumi.set(self, "use_root_namespace", value)
|
905
904
|
|
906
|
-
@property
|
905
|
+
@_builtins.property
|
907
906
|
@pulumi.getter(name="vmName")
|
908
|
-
def vm_name(self) -> Optional[pulumi.Input[
|
907
|
+
def vm_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
909
908
|
"""
|
910
909
|
The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
911
910
|
"""
|
912
911
|
return pulumi.get(self, "vm_name")
|
913
912
|
|
914
913
|
@vm_name.setter
|
915
|
-
def vm_name(self, value: Optional[pulumi.Input[
|
914
|
+
def vm_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
916
915
|
pulumi.set(self, "vm_name", value)
|
917
916
|
|
918
|
-
@property
|
917
|
+
@_builtins.property
|
919
918
|
@pulumi.getter(name="vmssName")
|
920
|
-
def vmss_name(self) -> Optional[pulumi.Input[
|
919
|
+
def vmss_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
921
920
|
"""
|
922
921
|
The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
923
922
|
"""
|
924
923
|
return pulumi.get(self, "vmss_name")
|
925
924
|
|
926
925
|
@vmss_name.setter
|
927
|
-
def vmss_name(self, value: Optional[pulumi.Input[
|
926
|
+
def vmss_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
928
927
|
pulumi.set(self, "vmss_name", value)
|
929
928
|
|
930
929
|
|
931
930
|
if not MYPY:
|
932
931
|
class ProviderAuthLoginCertArgsDict(TypedDict):
|
933
|
-
cert_file: pulumi.Input[
|
932
|
+
cert_file: pulumi.Input[_builtins.str]
|
934
933
|
"""
|
935
934
|
Path to a file containing the client certificate.
|
936
935
|
"""
|
937
|
-
key_file: pulumi.Input[
|
936
|
+
key_file: pulumi.Input[_builtins.str]
|
938
937
|
"""
|
939
938
|
Path to a file containing the private key that the certificate was issued for.
|
940
939
|
"""
|
941
|
-
mount: NotRequired[pulumi.Input[
|
940
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
942
941
|
"""
|
943
942
|
The path where the authentication engine is mounted.
|
944
943
|
"""
|
945
|
-
name: NotRequired[pulumi.Input[
|
944
|
+
name: NotRequired[pulumi.Input[_builtins.str]]
|
946
945
|
"""
|
947
946
|
Name of the certificate's role
|
948
947
|
"""
|
949
|
-
namespace: NotRequired[pulumi.Input[
|
948
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
950
949
|
"""
|
951
950
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
952
951
|
"""
|
953
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
952
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
954
953
|
"""
|
955
954
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
956
955
|
"""
|
@@ -960,19 +959,19 @@ elif False:
|
|
960
959
|
@pulumi.input_type
|
961
960
|
class ProviderAuthLoginCertArgs:
|
962
961
|
def __init__(__self__, *,
|
963
|
-
cert_file: pulumi.Input[
|
964
|
-
key_file: pulumi.Input[
|
965
|
-
mount: Optional[pulumi.Input[
|
966
|
-
name: Optional[pulumi.Input[
|
967
|
-
namespace: Optional[pulumi.Input[
|
968
|
-
use_root_namespace: Optional[pulumi.Input[
|
969
|
-
"""
|
970
|
-
:param pulumi.Input[
|
971
|
-
:param pulumi.Input[
|
972
|
-
:param pulumi.Input[
|
973
|
-
:param pulumi.Input[
|
974
|
-
:param pulumi.Input[
|
975
|
-
:param pulumi.Input[
|
962
|
+
cert_file: pulumi.Input[_builtins.str],
|
963
|
+
key_file: pulumi.Input[_builtins.str],
|
964
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
965
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
966
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
967
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
968
|
+
"""
|
969
|
+
:param pulumi.Input[_builtins.str] cert_file: Path to a file containing the client certificate.
|
970
|
+
:param pulumi.Input[_builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
|
971
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
972
|
+
:param pulumi.Input[_builtins.str] name: Name of the certificate's role
|
973
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
974
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
976
975
|
"""
|
977
976
|
pulumi.set(__self__, "cert_file", cert_file)
|
978
977
|
pulumi.set(__self__, "key_file", key_file)
|
@@ -985,106 +984,106 @@ class ProviderAuthLoginCertArgs:
|
|
985
984
|
if use_root_namespace is not None:
|
986
985
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
987
986
|
|
988
|
-
@property
|
987
|
+
@_builtins.property
|
989
988
|
@pulumi.getter(name="certFile")
|
990
|
-
def cert_file(self) -> pulumi.Input[
|
989
|
+
def cert_file(self) -> pulumi.Input[_builtins.str]:
|
991
990
|
"""
|
992
991
|
Path to a file containing the client certificate.
|
993
992
|
"""
|
994
993
|
return pulumi.get(self, "cert_file")
|
995
994
|
|
996
995
|
@cert_file.setter
|
997
|
-
def cert_file(self, value: pulumi.Input[
|
996
|
+
def cert_file(self, value: pulumi.Input[_builtins.str]):
|
998
997
|
pulumi.set(self, "cert_file", value)
|
999
998
|
|
1000
|
-
@property
|
999
|
+
@_builtins.property
|
1001
1000
|
@pulumi.getter(name="keyFile")
|
1002
|
-
def key_file(self) -> pulumi.Input[
|
1001
|
+
def key_file(self) -> pulumi.Input[_builtins.str]:
|
1003
1002
|
"""
|
1004
1003
|
Path to a file containing the private key that the certificate was issued for.
|
1005
1004
|
"""
|
1006
1005
|
return pulumi.get(self, "key_file")
|
1007
1006
|
|
1008
1007
|
@key_file.setter
|
1009
|
-
def key_file(self, value: pulumi.Input[
|
1008
|
+
def key_file(self, value: pulumi.Input[_builtins.str]):
|
1010
1009
|
pulumi.set(self, "key_file", value)
|
1011
1010
|
|
1012
|
-
@property
|
1011
|
+
@_builtins.property
|
1013
1012
|
@pulumi.getter
|
1014
|
-
def mount(self) -> Optional[pulumi.Input[
|
1013
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1015
1014
|
"""
|
1016
1015
|
The path where the authentication engine is mounted.
|
1017
1016
|
"""
|
1018
1017
|
return pulumi.get(self, "mount")
|
1019
1018
|
|
1020
1019
|
@mount.setter
|
1021
|
-
def mount(self, value: Optional[pulumi.Input[
|
1020
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1022
1021
|
pulumi.set(self, "mount", value)
|
1023
1022
|
|
1024
|
-
@property
|
1023
|
+
@_builtins.property
|
1025
1024
|
@pulumi.getter
|
1026
|
-
def name(self) -> Optional[pulumi.Input[
|
1025
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1027
1026
|
"""
|
1028
1027
|
Name of the certificate's role
|
1029
1028
|
"""
|
1030
1029
|
return pulumi.get(self, "name")
|
1031
1030
|
|
1032
1031
|
@name.setter
|
1033
|
-
def name(self, value: Optional[pulumi.Input[
|
1032
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1034
1033
|
pulumi.set(self, "name", value)
|
1035
1034
|
|
1036
|
-
@property
|
1035
|
+
@_builtins.property
|
1037
1036
|
@pulumi.getter
|
1038
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1037
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1039
1038
|
"""
|
1040
1039
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1041
1040
|
"""
|
1042
1041
|
return pulumi.get(self, "namespace")
|
1043
1042
|
|
1044
1043
|
@namespace.setter
|
1045
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1044
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1046
1045
|
pulumi.set(self, "namespace", value)
|
1047
1046
|
|
1048
|
-
@property
|
1047
|
+
@_builtins.property
|
1049
1048
|
@pulumi.getter(name="useRootNamespace")
|
1050
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1049
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1051
1050
|
"""
|
1052
1051
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1053
1052
|
"""
|
1054
1053
|
return pulumi.get(self, "use_root_namespace")
|
1055
1054
|
|
1056
1055
|
@use_root_namespace.setter
|
1057
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1056
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1058
1057
|
pulumi.set(self, "use_root_namespace", value)
|
1059
1058
|
|
1060
1059
|
|
1061
1060
|
if not MYPY:
|
1062
1061
|
class ProviderAuthLoginGcpArgsDict(TypedDict):
|
1063
|
-
role: pulumi.Input[
|
1062
|
+
role: pulumi.Input[_builtins.str]
|
1064
1063
|
"""
|
1065
1064
|
Name of the login role.
|
1066
1065
|
"""
|
1067
|
-
credentials: NotRequired[pulumi.Input[
|
1066
|
+
credentials: NotRequired[pulumi.Input[_builtins.str]]
|
1068
1067
|
"""
|
1069
1068
|
Path to the Google Cloud credentials file.
|
1070
1069
|
"""
|
1071
|
-
jwt: NotRequired[pulumi.Input[
|
1070
|
+
jwt: NotRequired[pulumi.Input[_builtins.str]]
|
1072
1071
|
"""
|
1073
1072
|
A signed JSON Web Token.
|
1074
1073
|
"""
|
1075
|
-
mount: NotRequired[pulumi.Input[
|
1074
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1076
1075
|
"""
|
1077
1076
|
The path where the authentication engine is mounted.
|
1078
1077
|
"""
|
1079
|
-
namespace: NotRequired[pulumi.Input[
|
1078
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1080
1079
|
"""
|
1081
1080
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1082
1081
|
"""
|
1083
|
-
service_account: NotRequired[pulumi.Input[
|
1082
|
+
service_account: NotRequired[pulumi.Input[_builtins.str]]
|
1084
1083
|
"""
|
1085
1084
|
IAM service account.
|
1086
1085
|
"""
|
1087
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1086
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1088
1087
|
"""
|
1089
1088
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1090
1089
|
"""
|
@@ -1094,21 +1093,21 @@ elif False:
|
|
1094
1093
|
@pulumi.input_type
|
1095
1094
|
class ProviderAuthLoginGcpArgs:
|
1096
1095
|
def __init__(__self__, *,
|
1097
|
-
role: pulumi.Input[
|
1098
|
-
credentials: Optional[pulumi.Input[
|
1099
|
-
jwt: Optional[pulumi.Input[
|
1100
|
-
mount: Optional[pulumi.Input[
|
1101
|
-
namespace: Optional[pulumi.Input[
|
1102
|
-
service_account: Optional[pulumi.Input[
|
1103
|
-
use_root_namespace: Optional[pulumi.Input[
|
1104
|
-
"""
|
1105
|
-
:param pulumi.Input[
|
1106
|
-
:param pulumi.Input[
|
1107
|
-
:param pulumi.Input[
|
1108
|
-
:param pulumi.Input[
|
1109
|
-
:param pulumi.Input[
|
1110
|
-
:param pulumi.Input[
|
1111
|
-
:param pulumi.Input[
|
1096
|
+
role: pulumi.Input[_builtins.str],
|
1097
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
1098
|
+
jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
1099
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
1100
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1101
|
+
service_account: Optional[pulumi.Input[_builtins.str]] = None,
|
1102
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
1103
|
+
"""
|
1104
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
1105
|
+
:param pulumi.Input[_builtins.str] credentials: Path to the Google Cloud credentials file.
|
1106
|
+
:param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token.
|
1107
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
1108
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1109
|
+
:param pulumi.Input[_builtins.str] service_account: IAM service account.
|
1110
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1112
1111
|
"""
|
1113
1112
|
pulumi.set(__self__, "role", role)
|
1114
1113
|
if credentials is not None:
|
@@ -1124,110 +1123,110 @@ class ProviderAuthLoginGcpArgs:
|
|
1124
1123
|
if use_root_namespace is not None:
|
1125
1124
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
1126
1125
|
|
1127
|
-
@property
|
1126
|
+
@_builtins.property
|
1128
1127
|
@pulumi.getter
|
1129
|
-
def role(self) -> pulumi.Input[
|
1128
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
1130
1129
|
"""
|
1131
1130
|
Name of the login role.
|
1132
1131
|
"""
|
1133
1132
|
return pulumi.get(self, "role")
|
1134
1133
|
|
1135
1134
|
@role.setter
|
1136
|
-
def role(self, value: pulumi.Input[
|
1135
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
1137
1136
|
pulumi.set(self, "role", value)
|
1138
1137
|
|
1139
|
-
@property
|
1138
|
+
@_builtins.property
|
1140
1139
|
@pulumi.getter
|
1141
|
-
def credentials(self) -> Optional[pulumi.Input[
|
1140
|
+
def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1142
1141
|
"""
|
1143
1142
|
Path to the Google Cloud credentials file.
|
1144
1143
|
"""
|
1145
1144
|
return pulumi.get(self, "credentials")
|
1146
1145
|
|
1147
1146
|
@credentials.setter
|
1148
|
-
def credentials(self, value: Optional[pulumi.Input[
|
1147
|
+
def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1149
1148
|
pulumi.set(self, "credentials", value)
|
1150
1149
|
|
1151
|
-
@property
|
1150
|
+
@_builtins.property
|
1152
1151
|
@pulumi.getter
|
1153
|
-
def jwt(self) -> Optional[pulumi.Input[
|
1152
|
+
def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1154
1153
|
"""
|
1155
1154
|
A signed JSON Web Token.
|
1156
1155
|
"""
|
1157
1156
|
return pulumi.get(self, "jwt")
|
1158
1157
|
|
1159
1158
|
@jwt.setter
|
1160
|
-
def jwt(self, value: Optional[pulumi.Input[
|
1159
|
+
def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1161
1160
|
pulumi.set(self, "jwt", value)
|
1162
1161
|
|
1163
|
-
@property
|
1162
|
+
@_builtins.property
|
1164
1163
|
@pulumi.getter
|
1165
|
-
def mount(self) -> Optional[pulumi.Input[
|
1164
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1166
1165
|
"""
|
1167
1166
|
The path where the authentication engine is mounted.
|
1168
1167
|
"""
|
1169
1168
|
return pulumi.get(self, "mount")
|
1170
1169
|
|
1171
1170
|
@mount.setter
|
1172
|
-
def mount(self, value: Optional[pulumi.Input[
|
1171
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1173
1172
|
pulumi.set(self, "mount", value)
|
1174
1173
|
|
1175
|
-
@property
|
1174
|
+
@_builtins.property
|
1176
1175
|
@pulumi.getter
|
1177
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1176
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1178
1177
|
"""
|
1179
1178
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1180
1179
|
"""
|
1181
1180
|
return pulumi.get(self, "namespace")
|
1182
1181
|
|
1183
1182
|
@namespace.setter
|
1184
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1183
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1185
1184
|
pulumi.set(self, "namespace", value)
|
1186
1185
|
|
1187
|
-
@property
|
1186
|
+
@_builtins.property
|
1188
1187
|
@pulumi.getter(name="serviceAccount")
|
1189
|
-
def service_account(self) -> Optional[pulumi.Input[
|
1188
|
+
def service_account(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1190
1189
|
"""
|
1191
1190
|
IAM service account.
|
1192
1191
|
"""
|
1193
1192
|
return pulumi.get(self, "service_account")
|
1194
1193
|
|
1195
1194
|
@service_account.setter
|
1196
|
-
def service_account(self, value: Optional[pulumi.Input[
|
1195
|
+
def service_account(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1197
1196
|
pulumi.set(self, "service_account", value)
|
1198
1197
|
|
1199
|
-
@property
|
1198
|
+
@_builtins.property
|
1200
1199
|
@pulumi.getter(name="useRootNamespace")
|
1201
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1200
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1202
1201
|
"""
|
1203
1202
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1204
1203
|
"""
|
1205
1204
|
return pulumi.get(self, "use_root_namespace")
|
1206
1205
|
|
1207
1206
|
@use_root_namespace.setter
|
1208
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1207
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1209
1208
|
pulumi.set(self, "use_root_namespace", value)
|
1210
1209
|
|
1211
1210
|
|
1212
1211
|
if not MYPY:
|
1213
1212
|
class ProviderAuthLoginJwtArgsDict(TypedDict):
|
1214
|
-
role: pulumi.Input[
|
1213
|
+
role: pulumi.Input[_builtins.str]
|
1215
1214
|
"""
|
1216
1215
|
Name of the login role.
|
1217
1216
|
"""
|
1218
|
-
jwt: NotRequired[pulumi.Input[
|
1217
|
+
jwt: NotRequired[pulumi.Input[_builtins.str]]
|
1219
1218
|
"""
|
1220
1219
|
A signed JSON Web Token.
|
1221
1220
|
"""
|
1222
|
-
mount: NotRequired[pulumi.Input[
|
1221
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1223
1222
|
"""
|
1224
1223
|
The path where the authentication engine is mounted.
|
1225
1224
|
"""
|
1226
|
-
namespace: NotRequired[pulumi.Input[
|
1225
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1227
1226
|
"""
|
1228
1227
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1229
1228
|
"""
|
1230
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1229
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1231
1230
|
"""
|
1232
1231
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1233
1232
|
"""
|
@@ -1237,17 +1236,17 @@ elif False:
|
|
1237
1236
|
@pulumi.input_type
|
1238
1237
|
class ProviderAuthLoginJwtArgs:
|
1239
1238
|
def __init__(__self__, *,
|
1240
|
-
role: pulumi.Input[
|
1241
|
-
jwt: Optional[pulumi.Input[
|
1242
|
-
mount: Optional[pulumi.Input[
|
1243
|
-
namespace: Optional[pulumi.Input[
|
1244
|
-
use_root_namespace: Optional[pulumi.Input[
|
1245
|
-
"""
|
1246
|
-
:param pulumi.Input[
|
1247
|
-
:param pulumi.Input[
|
1248
|
-
:param pulumi.Input[
|
1249
|
-
:param pulumi.Input[
|
1250
|
-
:param pulumi.Input[
|
1239
|
+
role: pulumi.Input[_builtins.str],
|
1240
|
+
jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
1241
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
1242
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1243
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
1244
|
+
"""
|
1245
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
1246
|
+
:param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token.
|
1247
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
1248
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1249
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1251
1250
|
"""
|
1252
1251
|
pulumi.set(__self__, "role", role)
|
1253
1252
|
if jwt is not None:
|
@@ -1259,110 +1258,110 @@ class ProviderAuthLoginJwtArgs:
|
|
1259
1258
|
if use_root_namespace is not None:
|
1260
1259
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
1261
1260
|
|
1262
|
-
@property
|
1261
|
+
@_builtins.property
|
1263
1262
|
@pulumi.getter
|
1264
|
-
def role(self) -> pulumi.Input[
|
1263
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
1265
1264
|
"""
|
1266
1265
|
Name of the login role.
|
1267
1266
|
"""
|
1268
1267
|
return pulumi.get(self, "role")
|
1269
1268
|
|
1270
1269
|
@role.setter
|
1271
|
-
def role(self, value: pulumi.Input[
|
1270
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
1272
1271
|
pulumi.set(self, "role", value)
|
1273
1272
|
|
1274
|
-
@property
|
1273
|
+
@_builtins.property
|
1275
1274
|
@pulumi.getter
|
1276
|
-
def jwt(self) -> Optional[pulumi.Input[
|
1275
|
+
def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1277
1276
|
"""
|
1278
1277
|
A signed JSON Web Token.
|
1279
1278
|
"""
|
1280
1279
|
return pulumi.get(self, "jwt")
|
1281
1280
|
|
1282
1281
|
@jwt.setter
|
1283
|
-
def jwt(self, value: Optional[pulumi.Input[
|
1282
|
+
def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1284
1283
|
pulumi.set(self, "jwt", value)
|
1285
1284
|
|
1286
|
-
@property
|
1285
|
+
@_builtins.property
|
1287
1286
|
@pulumi.getter
|
1288
|
-
def mount(self) -> Optional[pulumi.Input[
|
1287
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1289
1288
|
"""
|
1290
1289
|
The path where the authentication engine is mounted.
|
1291
1290
|
"""
|
1292
1291
|
return pulumi.get(self, "mount")
|
1293
1292
|
|
1294
1293
|
@mount.setter
|
1295
|
-
def mount(self, value: Optional[pulumi.Input[
|
1294
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1296
1295
|
pulumi.set(self, "mount", value)
|
1297
1296
|
|
1298
|
-
@property
|
1297
|
+
@_builtins.property
|
1299
1298
|
@pulumi.getter
|
1300
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1299
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1301
1300
|
"""
|
1302
1301
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1303
1302
|
"""
|
1304
1303
|
return pulumi.get(self, "namespace")
|
1305
1304
|
|
1306
1305
|
@namespace.setter
|
1307
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1306
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1308
1307
|
pulumi.set(self, "namespace", value)
|
1309
1308
|
|
1310
|
-
@property
|
1309
|
+
@_builtins.property
|
1311
1310
|
@pulumi.getter(name="useRootNamespace")
|
1312
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1311
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1313
1312
|
"""
|
1314
1313
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1315
1314
|
"""
|
1316
1315
|
return pulumi.get(self, "use_root_namespace")
|
1317
1316
|
|
1318
1317
|
@use_root_namespace.setter
|
1319
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1318
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1320
1319
|
pulumi.set(self, "use_root_namespace", value)
|
1321
1320
|
|
1322
1321
|
|
1323
1322
|
if not MYPY:
|
1324
1323
|
class ProviderAuthLoginKerberosArgsDict(TypedDict):
|
1325
|
-
disable_fast_negotiation: NotRequired[pulumi.Input[
|
1324
|
+
disable_fast_negotiation: NotRequired[pulumi.Input[_builtins.bool]]
|
1326
1325
|
"""
|
1327
1326
|
Disable the Kerberos FAST negotiation.
|
1328
1327
|
"""
|
1329
|
-
keytab_path: NotRequired[pulumi.Input[
|
1328
|
+
keytab_path: NotRequired[pulumi.Input[_builtins.str]]
|
1330
1329
|
"""
|
1331
1330
|
The Kerberos keytab file containing the entry of the login entity.
|
1332
1331
|
"""
|
1333
|
-
krb5conf_path: NotRequired[pulumi.Input[
|
1332
|
+
krb5conf_path: NotRequired[pulumi.Input[_builtins.str]]
|
1334
1333
|
"""
|
1335
1334
|
A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
1336
1335
|
"""
|
1337
|
-
mount: NotRequired[pulumi.Input[
|
1336
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1338
1337
|
"""
|
1339
1338
|
The path where the authentication engine is mounted.
|
1340
1339
|
"""
|
1341
|
-
namespace: NotRequired[pulumi.Input[
|
1340
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1342
1341
|
"""
|
1343
1342
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1344
1343
|
"""
|
1345
|
-
realm: NotRequired[pulumi.Input[
|
1344
|
+
realm: NotRequired[pulumi.Input[_builtins.str]]
|
1346
1345
|
"""
|
1347
1346
|
The Kerberos server's authoritative authentication domain
|
1348
1347
|
"""
|
1349
|
-
remove_instance_name: NotRequired[pulumi.Input[
|
1348
|
+
remove_instance_name: NotRequired[pulumi.Input[_builtins.bool]]
|
1350
1349
|
"""
|
1351
1350
|
Strip the host from the username found in the keytab.
|
1352
1351
|
"""
|
1353
|
-
service: NotRequired[pulumi.Input[
|
1352
|
+
service: NotRequired[pulumi.Input[_builtins.str]]
|
1354
1353
|
"""
|
1355
1354
|
The service principle name.
|
1356
1355
|
"""
|
1357
|
-
token: NotRequired[pulumi.Input[
|
1356
|
+
token: NotRequired[pulumi.Input[_builtins.str]]
|
1358
1357
|
"""
|
1359
1358
|
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
1360
1359
|
"""
|
1361
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1360
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1362
1361
|
"""
|
1363
1362
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1364
1363
|
"""
|
1365
|
-
username: NotRequired[pulumi.Input[
|
1364
|
+
username: NotRequired[pulumi.Input[_builtins.str]]
|
1366
1365
|
"""
|
1367
1366
|
The username to login into Kerberos with.
|
1368
1367
|
"""
|
@@ -1372,29 +1371,29 @@ elif False:
|
|
1372
1371
|
@pulumi.input_type
|
1373
1372
|
class ProviderAuthLoginKerberosArgs:
|
1374
1373
|
def __init__(__self__, *,
|
1375
|
-
disable_fast_negotiation: Optional[pulumi.Input[
|
1376
|
-
keytab_path: Optional[pulumi.Input[
|
1377
|
-
krb5conf_path: Optional[pulumi.Input[
|
1378
|
-
mount: Optional[pulumi.Input[
|
1379
|
-
namespace: Optional[pulumi.Input[
|
1380
|
-
realm: Optional[pulumi.Input[
|
1381
|
-
remove_instance_name: Optional[pulumi.Input[
|
1382
|
-
service: Optional[pulumi.Input[
|
1383
|
-
token: Optional[pulumi.Input[
|
1384
|
-
use_root_namespace: Optional[pulumi.Input[
|
1385
|
-
username: Optional[pulumi.Input[
|
1386
|
-
"""
|
1387
|
-
:param pulumi.Input[
|
1388
|
-
:param pulumi.Input[
|
1389
|
-
:param pulumi.Input[
|
1390
|
-
:param pulumi.Input[
|
1391
|
-
:param pulumi.Input[
|
1392
|
-
:param pulumi.Input[
|
1393
|
-
:param pulumi.Input[
|
1394
|
-
:param pulumi.Input[
|
1395
|
-
:param pulumi.Input[
|
1396
|
-
:param pulumi.Input[
|
1397
|
-
:param pulumi.Input[
|
1374
|
+
disable_fast_negotiation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1375
|
+
keytab_path: Optional[pulumi.Input[_builtins.str]] = None,
|
1376
|
+
krb5conf_path: Optional[pulumi.Input[_builtins.str]] = None,
|
1377
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
1378
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1379
|
+
realm: Optional[pulumi.Input[_builtins.str]] = None,
|
1380
|
+
remove_instance_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
1381
|
+
service: Optional[pulumi.Input[_builtins.str]] = None,
|
1382
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
1383
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
|
1384
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
1385
|
+
"""
|
1386
|
+
:param pulumi.Input[_builtins.bool] disable_fast_negotiation: Disable the Kerberos FAST negotiation.
|
1387
|
+
:param pulumi.Input[_builtins.str] keytab_path: The Kerberos keytab file containing the entry of the login entity.
|
1388
|
+
:param pulumi.Input[_builtins.str] krb5conf_path: A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
1389
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
1390
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1391
|
+
:param pulumi.Input[_builtins.str] realm: The Kerberos server's authoritative authentication domain
|
1392
|
+
:param pulumi.Input[_builtins.bool] remove_instance_name: Strip the host from the username found in the keytab.
|
1393
|
+
:param pulumi.Input[_builtins.str] service: The service principle name.
|
1394
|
+
:param pulumi.Input[_builtins.str] token: Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
1395
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1396
|
+
:param pulumi.Input[_builtins.str] username: The username to login into Kerberos with.
|
1398
1397
|
"""
|
1399
1398
|
if disable_fast_negotiation is not None:
|
1400
1399
|
pulumi.set(__self__, "disable_fast_negotiation", disable_fast_negotiation)
|
@@ -1419,158 +1418,158 @@ class ProviderAuthLoginKerberosArgs:
|
|
1419
1418
|
if username is not None:
|
1420
1419
|
pulumi.set(__self__, "username", username)
|
1421
1420
|
|
1422
|
-
@property
|
1421
|
+
@_builtins.property
|
1423
1422
|
@pulumi.getter(name="disableFastNegotiation")
|
1424
|
-
def disable_fast_negotiation(self) -> Optional[pulumi.Input[
|
1423
|
+
def disable_fast_negotiation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1425
1424
|
"""
|
1426
1425
|
Disable the Kerberos FAST negotiation.
|
1427
1426
|
"""
|
1428
1427
|
return pulumi.get(self, "disable_fast_negotiation")
|
1429
1428
|
|
1430
1429
|
@disable_fast_negotiation.setter
|
1431
|
-
def disable_fast_negotiation(self, value: Optional[pulumi.Input[
|
1430
|
+
def disable_fast_negotiation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1432
1431
|
pulumi.set(self, "disable_fast_negotiation", value)
|
1433
1432
|
|
1434
|
-
@property
|
1433
|
+
@_builtins.property
|
1435
1434
|
@pulumi.getter(name="keytabPath")
|
1436
|
-
def keytab_path(self) -> Optional[pulumi.Input[
|
1435
|
+
def keytab_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1437
1436
|
"""
|
1438
1437
|
The Kerberos keytab file containing the entry of the login entity.
|
1439
1438
|
"""
|
1440
1439
|
return pulumi.get(self, "keytab_path")
|
1441
1440
|
|
1442
1441
|
@keytab_path.setter
|
1443
|
-
def keytab_path(self, value: Optional[pulumi.Input[
|
1442
|
+
def keytab_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1444
1443
|
pulumi.set(self, "keytab_path", value)
|
1445
1444
|
|
1446
|
-
@property
|
1445
|
+
@_builtins.property
|
1447
1446
|
@pulumi.getter(name="krb5confPath")
|
1448
|
-
def krb5conf_path(self) -> Optional[pulumi.Input[
|
1447
|
+
def krb5conf_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1449
1448
|
"""
|
1450
1449
|
A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
1451
1450
|
"""
|
1452
1451
|
return pulumi.get(self, "krb5conf_path")
|
1453
1452
|
|
1454
1453
|
@krb5conf_path.setter
|
1455
|
-
def krb5conf_path(self, value: Optional[pulumi.Input[
|
1454
|
+
def krb5conf_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1456
1455
|
pulumi.set(self, "krb5conf_path", value)
|
1457
1456
|
|
1458
|
-
@property
|
1457
|
+
@_builtins.property
|
1459
1458
|
@pulumi.getter
|
1460
|
-
def mount(self) -> Optional[pulumi.Input[
|
1459
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1461
1460
|
"""
|
1462
1461
|
The path where the authentication engine is mounted.
|
1463
1462
|
"""
|
1464
1463
|
return pulumi.get(self, "mount")
|
1465
1464
|
|
1466
1465
|
@mount.setter
|
1467
|
-
def mount(self, value: Optional[pulumi.Input[
|
1466
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1468
1467
|
pulumi.set(self, "mount", value)
|
1469
1468
|
|
1470
|
-
@property
|
1469
|
+
@_builtins.property
|
1471
1470
|
@pulumi.getter
|
1472
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1471
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1473
1472
|
"""
|
1474
1473
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1475
1474
|
"""
|
1476
1475
|
return pulumi.get(self, "namespace")
|
1477
1476
|
|
1478
1477
|
@namespace.setter
|
1479
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1478
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1480
1479
|
pulumi.set(self, "namespace", value)
|
1481
1480
|
|
1482
|
-
@property
|
1481
|
+
@_builtins.property
|
1483
1482
|
@pulumi.getter
|
1484
|
-
def realm(self) -> Optional[pulumi.Input[
|
1483
|
+
def realm(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1485
1484
|
"""
|
1486
1485
|
The Kerberos server's authoritative authentication domain
|
1487
1486
|
"""
|
1488
1487
|
return pulumi.get(self, "realm")
|
1489
1488
|
|
1490
1489
|
@realm.setter
|
1491
|
-
def realm(self, value: Optional[pulumi.Input[
|
1490
|
+
def realm(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1492
1491
|
pulumi.set(self, "realm", value)
|
1493
1492
|
|
1494
|
-
@property
|
1493
|
+
@_builtins.property
|
1495
1494
|
@pulumi.getter(name="removeInstanceName")
|
1496
|
-
def remove_instance_name(self) -> Optional[pulumi.Input[
|
1495
|
+
def remove_instance_name(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1497
1496
|
"""
|
1498
1497
|
Strip the host from the username found in the keytab.
|
1499
1498
|
"""
|
1500
1499
|
return pulumi.get(self, "remove_instance_name")
|
1501
1500
|
|
1502
1501
|
@remove_instance_name.setter
|
1503
|
-
def remove_instance_name(self, value: Optional[pulumi.Input[
|
1502
|
+
def remove_instance_name(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1504
1503
|
pulumi.set(self, "remove_instance_name", value)
|
1505
1504
|
|
1506
|
-
@property
|
1505
|
+
@_builtins.property
|
1507
1506
|
@pulumi.getter
|
1508
|
-
def service(self) -> Optional[pulumi.Input[
|
1507
|
+
def service(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1509
1508
|
"""
|
1510
1509
|
The service principle name.
|
1511
1510
|
"""
|
1512
1511
|
return pulumi.get(self, "service")
|
1513
1512
|
|
1514
1513
|
@service.setter
|
1515
|
-
def service(self, value: Optional[pulumi.Input[
|
1514
|
+
def service(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1516
1515
|
pulumi.set(self, "service", value)
|
1517
1516
|
|
1518
|
-
@property
|
1517
|
+
@_builtins.property
|
1519
1518
|
@pulumi.getter
|
1520
|
-
def token(self) -> Optional[pulumi.Input[
|
1519
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1521
1520
|
"""
|
1522
1521
|
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
1523
1522
|
"""
|
1524
1523
|
return pulumi.get(self, "token")
|
1525
1524
|
|
1526
1525
|
@token.setter
|
1527
|
-
def token(self, value: Optional[pulumi.Input[
|
1526
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1528
1527
|
pulumi.set(self, "token", value)
|
1529
1528
|
|
1530
|
-
@property
|
1529
|
+
@_builtins.property
|
1531
1530
|
@pulumi.getter(name="useRootNamespace")
|
1532
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1531
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1533
1532
|
"""
|
1534
1533
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1535
1534
|
"""
|
1536
1535
|
return pulumi.get(self, "use_root_namespace")
|
1537
1536
|
|
1538
1537
|
@use_root_namespace.setter
|
1539
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1538
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1540
1539
|
pulumi.set(self, "use_root_namespace", value)
|
1541
1540
|
|
1542
|
-
@property
|
1541
|
+
@_builtins.property
|
1543
1542
|
@pulumi.getter
|
1544
|
-
def username(self) -> Optional[pulumi.Input[
|
1543
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1545
1544
|
"""
|
1546
1545
|
The username to login into Kerberos with.
|
1547
1546
|
"""
|
1548
1547
|
return pulumi.get(self, "username")
|
1549
1548
|
|
1550
1549
|
@username.setter
|
1551
|
-
def username(self, value: Optional[pulumi.Input[
|
1550
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1552
1551
|
pulumi.set(self, "username", value)
|
1553
1552
|
|
1554
1553
|
|
1555
1554
|
if not MYPY:
|
1556
1555
|
class ProviderAuthLoginOciArgsDict(TypedDict):
|
1557
|
-
auth_type: pulumi.Input[
|
1556
|
+
auth_type: pulumi.Input[_builtins.str]
|
1558
1557
|
"""
|
1559
1558
|
Authentication type to use when getting OCI credentials.
|
1560
1559
|
"""
|
1561
|
-
role: pulumi.Input[
|
1560
|
+
role: pulumi.Input[_builtins.str]
|
1562
1561
|
"""
|
1563
1562
|
Name of the login role.
|
1564
1563
|
"""
|
1565
|
-
mount: NotRequired[pulumi.Input[
|
1564
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1566
1565
|
"""
|
1567
1566
|
The path where the authentication engine is mounted.
|
1568
1567
|
"""
|
1569
|
-
namespace: NotRequired[pulumi.Input[
|
1568
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1570
1569
|
"""
|
1571
1570
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1572
1571
|
"""
|
1573
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1572
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1574
1573
|
"""
|
1575
1574
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1576
1575
|
"""
|
@@ -1580,17 +1579,17 @@ elif False:
|
|
1580
1579
|
@pulumi.input_type
|
1581
1580
|
class ProviderAuthLoginOciArgs:
|
1582
1581
|
def __init__(__self__, *,
|
1583
|
-
auth_type: pulumi.Input[
|
1584
|
-
role: pulumi.Input[
|
1585
|
-
mount: Optional[pulumi.Input[
|
1586
|
-
namespace: Optional[pulumi.Input[
|
1587
|
-
use_root_namespace: Optional[pulumi.Input[
|
1588
|
-
"""
|
1589
|
-
:param pulumi.Input[
|
1590
|
-
:param pulumi.Input[
|
1591
|
-
:param pulumi.Input[
|
1592
|
-
:param pulumi.Input[
|
1593
|
-
:param pulumi.Input[
|
1582
|
+
auth_type: pulumi.Input[_builtins.str],
|
1583
|
+
role: pulumi.Input[_builtins.str],
|
1584
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
1585
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1586
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
1587
|
+
"""
|
1588
|
+
:param pulumi.Input[_builtins.str] auth_type: Authentication type to use when getting OCI credentials.
|
1589
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
1590
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
1591
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1592
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1594
1593
|
"""
|
1595
1594
|
pulumi.set(__self__, "auth_type", auth_type)
|
1596
1595
|
pulumi.set(__self__, "role", role)
|
@@ -1601,90 +1600,90 @@ class ProviderAuthLoginOciArgs:
|
|
1601
1600
|
if use_root_namespace is not None:
|
1602
1601
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
1603
1602
|
|
1604
|
-
@property
|
1603
|
+
@_builtins.property
|
1605
1604
|
@pulumi.getter(name="authType")
|
1606
|
-
def auth_type(self) -> pulumi.Input[
|
1605
|
+
def auth_type(self) -> pulumi.Input[_builtins.str]:
|
1607
1606
|
"""
|
1608
1607
|
Authentication type to use when getting OCI credentials.
|
1609
1608
|
"""
|
1610
1609
|
return pulumi.get(self, "auth_type")
|
1611
1610
|
|
1612
1611
|
@auth_type.setter
|
1613
|
-
def auth_type(self, value: pulumi.Input[
|
1612
|
+
def auth_type(self, value: pulumi.Input[_builtins.str]):
|
1614
1613
|
pulumi.set(self, "auth_type", value)
|
1615
1614
|
|
1616
|
-
@property
|
1615
|
+
@_builtins.property
|
1617
1616
|
@pulumi.getter
|
1618
|
-
def role(self) -> pulumi.Input[
|
1617
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
1619
1618
|
"""
|
1620
1619
|
Name of the login role.
|
1621
1620
|
"""
|
1622
1621
|
return pulumi.get(self, "role")
|
1623
1622
|
|
1624
1623
|
@role.setter
|
1625
|
-
def role(self, value: pulumi.Input[
|
1624
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
1626
1625
|
pulumi.set(self, "role", value)
|
1627
1626
|
|
1628
|
-
@property
|
1627
|
+
@_builtins.property
|
1629
1628
|
@pulumi.getter
|
1630
|
-
def mount(self) -> Optional[pulumi.Input[
|
1629
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1631
1630
|
"""
|
1632
1631
|
The path where the authentication engine is mounted.
|
1633
1632
|
"""
|
1634
1633
|
return pulumi.get(self, "mount")
|
1635
1634
|
|
1636
1635
|
@mount.setter
|
1637
|
-
def mount(self, value: Optional[pulumi.Input[
|
1636
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1638
1637
|
pulumi.set(self, "mount", value)
|
1639
1638
|
|
1640
|
-
@property
|
1639
|
+
@_builtins.property
|
1641
1640
|
@pulumi.getter
|
1642
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1641
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1643
1642
|
"""
|
1644
1643
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1645
1644
|
"""
|
1646
1645
|
return pulumi.get(self, "namespace")
|
1647
1646
|
|
1648
1647
|
@namespace.setter
|
1649
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1648
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1650
1649
|
pulumi.set(self, "namespace", value)
|
1651
1650
|
|
1652
|
-
@property
|
1651
|
+
@_builtins.property
|
1653
1652
|
@pulumi.getter(name="useRootNamespace")
|
1654
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1653
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1655
1654
|
"""
|
1656
1655
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1657
1656
|
"""
|
1658
1657
|
return pulumi.get(self, "use_root_namespace")
|
1659
1658
|
|
1660
1659
|
@use_root_namespace.setter
|
1661
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1660
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1662
1661
|
pulumi.set(self, "use_root_namespace", value)
|
1663
1662
|
|
1664
1663
|
|
1665
1664
|
if not MYPY:
|
1666
1665
|
class ProviderAuthLoginOidcArgsDict(TypedDict):
|
1667
|
-
role: pulumi.Input[
|
1666
|
+
role: pulumi.Input[_builtins.str]
|
1668
1667
|
"""
|
1669
1668
|
Name of the login role.
|
1670
1669
|
"""
|
1671
|
-
callback_address: NotRequired[pulumi.Input[
|
1670
|
+
callback_address: NotRequired[pulumi.Input[_builtins.str]]
|
1672
1671
|
"""
|
1673
1672
|
The callback address. Must be a valid URI without the path.
|
1674
1673
|
"""
|
1675
|
-
callback_listener_address: NotRequired[pulumi.Input[
|
1674
|
+
callback_listener_address: NotRequired[pulumi.Input[_builtins.str]]
|
1676
1675
|
"""
|
1677
1676
|
The callback listener's address. Must be a valid URI without the path.
|
1678
1677
|
"""
|
1679
|
-
mount: NotRequired[pulumi.Input[
|
1678
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1680
1679
|
"""
|
1681
1680
|
The path where the authentication engine is mounted.
|
1682
1681
|
"""
|
1683
|
-
namespace: NotRequired[pulumi.Input[
|
1682
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1684
1683
|
"""
|
1685
1684
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1686
1685
|
"""
|
1687
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1686
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1688
1687
|
"""
|
1689
1688
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1690
1689
|
"""
|
@@ -1694,19 +1693,19 @@ elif False:
|
|
1694
1693
|
@pulumi.input_type
|
1695
1694
|
class ProviderAuthLoginOidcArgs:
|
1696
1695
|
def __init__(__self__, *,
|
1697
|
-
role: pulumi.Input[
|
1698
|
-
callback_address: Optional[pulumi.Input[
|
1699
|
-
callback_listener_address: Optional[pulumi.Input[
|
1700
|
-
mount: Optional[pulumi.Input[
|
1701
|
-
namespace: Optional[pulumi.Input[
|
1702
|
-
use_root_namespace: Optional[pulumi.Input[
|
1703
|
-
"""
|
1704
|
-
:param pulumi.Input[
|
1705
|
-
:param pulumi.Input[
|
1706
|
-
:param pulumi.Input[
|
1707
|
-
:param pulumi.Input[
|
1708
|
-
:param pulumi.Input[
|
1709
|
-
:param pulumi.Input[
|
1696
|
+
role: pulumi.Input[_builtins.str],
|
1697
|
+
callback_address: Optional[pulumi.Input[_builtins.str]] = None,
|
1698
|
+
callback_listener_address: Optional[pulumi.Input[_builtins.str]] = None,
|
1699
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
1700
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1701
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
1702
|
+
"""
|
1703
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
1704
|
+
:param pulumi.Input[_builtins.str] callback_address: The callback address. Must be a valid URI without the path.
|
1705
|
+
:param pulumi.Input[_builtins.str] callback_listener_address: The callback listener's address. Must be a valid URI without the path.
|
1706
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
1707
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1708
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1710
1709
|
"""
|
1711
1710
|
pulumi.set(__self__, "role", role)
|
1712
1711
|
if callback_address is not None:
|
@@ -1720,98 +1719,98 @@ class ProviderAuthLoginOidcArgs:
|
|
1720
1719
|
if use_root_namespace is not None:
|
1721
1720
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
1722
1721
|
|
1723
|
-
@property
|
1722
|
+
@_builtins.property
|
1724
1723
|
@pulumi.getter
|
1725
|
-
def role(self) -> pulumi.Input[
|
1724
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
1726
1725
|
"""
|
1727
1726
|
Name of the login role.
|
1728
1727
|
"""
|
1729
1728
|
return pulumi.get(self, "role")
|
1730
1729
|
|
1731
1730
|
@role.setter
|
1732
|
-
def role(self, value: pulumi.Input[
|
1731
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
1733
1732
|
pulumi.set(self, "role", value)
|
1734
1733
|
|
1735
|
-
@property
|
1734
|
+
@_builtins.property
|
1736
1735
|
@pulumi.getter(name="callbackAddress")
|
1737
|
-
def callback_address(self) -> Optional[pulumi.Input[
|
1736
|
+
def callback_address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1738
1737
|
"""
|
1739
1738
|
The callback address. Must be a valid URI without the path.
|
1740
1739
|
"""
|
1741
1740
|
return pulumi.get(self, "callback_address")
|
1742
1741
|
|
1743
1742
|
@callback_address.setter
|
1744
|
-
def callback_address(self, value: Optional[pulumi.Input[
|
1743
|
+
def callback_address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1745
1744
|
pulumi.set(self, "callback_address", value)
|
1746
1745
|
|
1747
|
-
@property
|
1746
|
+
@_builtins.property
|
1748
1747
|
@pulumi.getter(name="callbackListenerAddress")
|
1749
|
-
def callback_listener_address(self) -> Optional[pulumi.Input[
|
1748
|
+
def callback_listener_address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1750
1749
|
"""
|
1751
1750
|
The callback listener's address. Must be a valid URI without the path.
|
1752
1751
|
"""
|
1753
1752
|
return pulumi.get(self, "callback_listener_address")
|
1754
1753
|
|
1755
1754
|
@callback_listener_address.setter
|
1756
|
-
def callback_listener_address(self, value: Optional[pulumi.Input[
|
1755
|
+
def callback_listener_address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1757
1756
|
pulumi.set(self, "callback_listener_address", value)
|
1758
1757
|
|
1759
|
-
@property
|
1758
|
+
@_builtins.property
|
1760
1759
|
@pulumi.getter
|
1761
|
-
def mount(self) -> Optional[pulumi.Input[
|
1760
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1762
1761
|
"""
|
1763
1762
|
The path where the authentication engine is mounted.
|
1764
1763
|
"""
|
1765
1764
|
return pulumi.get(self, "mount")
|
1766
1765
|
|
1767
1766
|
@mount.setter
|
1768
|
-
def mount(self, value: Optional[pulumi.Input[
|
1767
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1769
1768
|
pulumi.set(self, "mount", value)
|
1770
1769
|
|
1771
|
-
@property
|
1770
|
+
@_builtins.property
|
1772
1771
|
@pulumi.getter
|
1773
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1772
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1774
1773
|
"""
|
1775
1774
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1776
1775
|
"""
|
1777
1776
|
return pulumi.get(self, "namespace")
|
1778
1777
|
|
1779
1778
|
@namespace.setter
|
1780
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1779
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1781
1780
|
pulumi.set(self, "namespace", value)
|
1782
1781
|
|
1783
|
-
@property
|
1782
|
+
@_builtins.property
|
1784
1783
|
@pulumi.getter(name="useRootNamespace")
|
1785
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1784
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1786
1785
|
"""
|
1787
1786
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1788
1787
|
"""
|
1789
1788
|
return pulumi.get(self, "use_root_namespace")
|
1790
1789
|
|
1791
1790
|
@use_root_namespace.setter
|
1792
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1791
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1793
1792
|
pulumi.set(self, "use_root_namespace", value)
|
1794
1793
|
|
1795
1794
|
|
1796
1795
|
if not MYPY:
|
1797
1796
|
class ProviderAuthLoginRadiusArgsDict(TypedDict):
|
1798
|
-
mount: NotRequired[pulumi.Input[
|
1797
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1799
1798
|
"""
|
1800
1799
|
The path where the authentication engine is mounted.
|
1801
1800
|
"""
|
1802
|
-
namespace: NotRequired[pulumi.Input[
|
1801
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1803
1802
|
"""
|
1804
1803
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1805
1804
|
"""
|
1806
|
-
password: NotRequired[pulumi.Input[
|
1805
|
+
password: NotRequired[pulumi.Input[_builtins.str]]
|
1807
1806
|
"""
|
1808
1807
|
The Radius password for username.
|
1809
1808
|
"""
|
1810
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1809
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1811
1810
|
"""
|
1812
1811
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1813
1812
|
"""
|
1814
|
-
username: NotRequired[pulumi.Input[
|
1813
|
+
username: NotRequired[pulumi.Input[_builtins.str]]
|
1815
1814
|
"""
|
1816
1815
|
The Radius username.
|
1817
1816
|
"""
|
@@ -1821,17 +1820,17 @@ elif False:
|
|
1821
1820
|
@pulumi.input_type
|
1822
1821
|
class ProviderAuthLoginRadiusArgs:
|
1823
1822
|
def __init__(__self__, *,
|
1824
|
-
mount: Optional[pulumi.Input[
|
1825
|
-
namespace: Optional[pulumi.Input[
|
1826
|
-
password: Optional[pulumi.Input[
|
1827
|
-
use_root_namespace: Optional[pulumi.Input[
|
1828
|
-
username: Optional[pulumi.Input[
|
1829
|
-
"""
|
1830
|
-
:param pulumi.Input[
|
1831
|
-
:param pulumi.Input[
|
1832
|
-
:param pulumi.Input[
|
1833
|
-
:param pulumi.Input[
|
1834
|
-
:param pulumi.Input[
|
1823
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
1824
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1825
|
+
password: Optional[pulumi.Input[_builtins.str]] = None,
|
1826
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
|
1827
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
1828
|
+
"""
|
1829
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
1830
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1831
|
+
:param pulumi.Input[_builtins.str] password: The Radius password for username.
|
1832
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1833
|
+
:param pulumi.Input[_builtins.str] username: The Radius username.
|
1835
1834
|
"""
|
1836
1835
|
if mount is not None:
|
1837
1836
|
pulumi.set(__self__, "mount", mount)
|
@@ -1844,78 +1843,78 @@ class ProviderAuthLoginRadiusArgs:
|
|
1844
1843
|
if username is not None:
|
1845
1844
|
pulumi.set(__self__, "username", username)
|
1846
1845
|
|
1847
|
-
@property
|
1846
|
+
@_builtins.property
|
1848
1847
|
@pulumi.getter
|
1849
|
-
def mount(self) -> Optional[pulumi.Input[
|
1848
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1850
1849
|
"""
|
1851
1850
|
The path where the authentication engine is mounted.
|
1852
1851
|
"""
|
1853
1852
|
return pulumi.get(self, "mount")
|
1854
1853
|
|
1855
1854
|
@mount.setter
|
1856
|
-
def mount(self, value: Optional[pulumi.Input[
|
1855
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1857
1856
|
pulumi.set(self, "mount", value)
|
1858
1857
|
|
1859
|
-
@property
|
1858
|
+
@_builtins.property
|
1860
1859
|
@pulumi.getter
|
1861
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1860
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1862
1861
|
"""
|
1863
1862
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1864
1863
|
"""
|
1865
1864
|
return pulumi.get(self, "namespace")
|
1866
1865
|
|
1867
1866
|
@namespace.setter
|
1868
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1867
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1869
1868
|
pulumi.set(self, "namespace", value)
|
1870
1869
|
|
1871
|
-
@property
|
1870
|
+
@_builtins.property
|
1872
1871
|
@pulumi.getter
|
1873
|
-
def password(self) -> Optional[pulumi.Input[
|
1872
|
+
def password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1874
1873
|
"""
|
1875
1874
|
The Radius password for username.
|
1876
1875
|
"""
|
1877
1876
|
return pulumi.get(self, "password")
|
1878
1877
|
|
1879
1878
|
@password.setter
|
1880
|
-
def password(self, value: Optional[pulumi.Input[
|
1879
|
+
def password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1881
1880
|
pulumi.set(self, "password", value)
|
1882
1881
|
|
1883
|
-
@property
|
1882
|
+
@_builtins.property
|
1884
1883
|
@pulumi.getter(name="useRootNamespace")
|
1885
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1884
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1886
1885
|
"""
|
1887
1886
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1888
1887
|
"""
|
1889
1888
|
return pulumi.get(self, "use_root_namespace")
|
1890
1889
|
|
1891
1890
|
@use_root_namespace.setter
|
1892
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1891
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1893
1892
|
pulumi.set(self, "use_root_namespace", value)
|
1894
1893
|
|
1895
|
-
@property
|
1894
|
+
@_builtins.property
|
1896
1895
|
@pulumi.getter
|
1897
|
-
def username(self) -> Optional[pulumi.Input[
|
1896
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1898
1897
|
"""
|
1899
1898
|
The Radius username.
|
1900
1899
|
"""
|
1901
1900
|
return pulumi.get(self, "username")
|
1902
1901
|
|
1903
1902
|
@username.setter
|
1904
|
-
def username(self, value: Optional[pulumi.Input[
|
1903
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1905
1904
|
pulumi.set(self, "username", value)
|
1906
1905
|
|
1907
1906
|
|
1908
1907
|
if not MYPY:
|
1909
1908
|
class ProviderAuthLoginTokenFileArgsDict(TypedDict):
|
1910
|
-
filename: NotRequired[pulumi.Input[
|
1909
|
+
filename: NotRequired[pulumi.Input[_builtins.str]]
|
1911
1910
|
"""
|
1912
1911
|
The name of a file containing a single line that is a valid Vault token
|
1913
1912
|
"""
|
1914
|
-
namespace: NotRequired[pulumi.Input[
|
1913
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1915
1914
|
"""
|
1916
1915
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1917
1916
|
"""
|
1918
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1917
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1919
1918
|
"""
|
1920
1919
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1921
1920
|
"""
|
@@ -1925,13 +1924,13 @@ elif False:
|
|
1925
1924
|
@pulumi.input_type
|
1926
1925
|
class ProviderAuthLoginTokenFileArgs:
|
1927
1926
|
def __init__(__self__, *,
|
1928
|
-
filename: Optional[pulumi.Input[
|
1929
|
-
namespace: Optional[pulumi.Input[
|
1930
|
-
use_root_namespace: Optional[pulumi.Input[
|
1927
|
+
filename: Optional[pulumi.Input[_builtins.str]] = None,
|
1928
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1929
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
1931
1930
|
"""
|
1932
|
-
:param pulumi.Input[
|
1933
|
-
:param pulumi.Input[
|
1934
|
-
:param pulumi.Input[
|
1931
|
+
:param pulumi.Input[_builtins.str] filename: The name of a file containing a single line that is a valid Vault token
|
1932
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
1933
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
1935
1934
|
"""
|
1936
1935
|
if filename is not None:
|
1937
1936
|
pulumi.set(__self__, "filename", filename)
|
@@ -1940,66 +1939,66 @@ class ProviderAuthLoginTokenFileArgs:
|
|
1940
1939
|
if use_root_namespace is not None:
|
1941
1940
|
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
1942
1941
|
|
1943
|
-
@property
|
1942
|
+
@_builtins.property
|
1944
1943
|
@pulumi.getter
|
1945
|
-
def filename(self) -> Optional[pulumi.Input[
|
1944
|
+
def filename(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1946
1945
|
"""
|
1947
1946
|
The name of a file containing a single line that is a valid Vault token
|
1948
1947
|
"""
|
1949
1948
|
return pulumi.get(self, "filename")
|
1950
1949
|
|
1951
1950
|
@filename.setter
|
1952
|
-
def filename(self, value: Optional[pulumi.Input[
|
1951
|
+
def filename(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1953
1952
|
pulumi.set(self, "filename", value)
|
1954
1953
|
|
1955
|
-
@property
|
1954
|
+
@_builtins.property
|
1956
1955
|
@pulumi.getter
|
1957
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1956
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1958
1957
|
"""
|
1959
1958
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1960
1959
|
"""
|
1961
1960
|
return pulumi.get(self, "namespace")
|
1962
1961
|
|
1963
1962
|
@namespace.setter
|
1964
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1963
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1965
1964
|
pulumi.set(self, "namespace", value)
|
1966
1965
|
|
1967
|
-
@property
|
1966
|
+
@_builtins.property
|
1968
1967
|
@pulumi.getter(name="useRootNamespace")
|
1969
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
1968
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1970
1969
|
"""
|
1971
1970
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
1972
1971
|
"""
|
1973
1972
|
return pulumi.get(self, "use_root_namespace")
|
1974
1973
|
|
1975
1974
|
@use_root_namespace.setter
|
1976
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
1975
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1977
1976
|
pulumi.set(self, "use_root_namespace", value)
|
1978
1977
|
|
1979
1978
|
|
1980
1979
|
if not MYPY:
|
1981
1980
|
class ProviderAuthLoginUserpassArgsDict(TypedDict):
|
1982
|
-
mount: NotRequired[pulumi.Input[
|
1981
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
1983
1982
|
"""
|
1984
1983
|
The path where the authentication engine is mounted.
|
1985
1984
|
"""
|
1986
|
-
namespace: NotRequired[pulumi.Input[
|
1985
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
1987
1986
|
"""
|
1988
1987
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
1989
1988
|
"""
|
1990
|
-
password: NotRequired[pulumi.Input[
|
1989
|
+
password: NotRequired[pulumi.Input[_builtins.str]]
|
1991
1990
|
"""
|
1992
1991
|
Login with password
|
1993
1992
|
"""
|
1994
|
-
password_file: NotRequired[pulumi.Input[
|
1993
|
+
password_file: NotRequired[pulumi.Input[_builtins.str]]
|
1995
1994
|
"""
|
1996
1995
|
Login with password from a file
|
1997
1996
|
"""
|
1998
|
-
use_root_namespace: NotRequired[pulumi.Input[
|
1997
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
1999
1998
|
"""
|
2000
1999
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
2001
2000
|
"""
|
2002
|
-
username: NotRequired[pulumi.Input[
|
2001
|
+
username: NotRequired[pulumi.Input[_builtins.str]]
|
2003
2002
|
"""
|
2004
2003
|
Login with username
|
2005
2004
|
"""
|
@@ -2009,19 +2008,19 @@ elif False:
|
|
2009
2008
|
@pulumi.input_type
|
2010
2009
|
class ProviderAuthLoginUserpassArgs:
|
2011
2010
|
def __init__(__self__, *,
|
2012
|
-
mount: Optional[pulumi.Input[
|
2013
|
-
namespace: Optional[pulumi.Input[
|
2014
|
-
password: Optional[pulumi.Input[
|
2015
|
-
password_file: Optional[pulumi.Input[
|
2016
|
-
use_root_namespace: Optional[pulumi.Input[
|
2017
|
-
username: Optional[pulumi.Input[
|
2018
|
-
"""
|
2019
|
-
:param pulumi.Input[
|
2020
|
-
:param pulumi.Input[
|
2021
|
-
:param pulumi.Input[
|
2022
|
-
:param pulumi.Input[
|
2023
|
-
:param pulumi.Input[
|
2024
|
-
:param pulumi.Input[
|
2011
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
2012
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
2013
|
+
password: Optional[pulumi.Input[_builtins.str]] = None,
|
2014
|
+
password_file: Optional[pulumi.Input[_builtins.str]] = None,
|
2015
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
|
2016
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
2017
|
+
"""
|
2018
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
2019
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
2020
|
+
:param pulumi.Input[_builtins.str] password: Login with password
|
2021
|
+
:param pulumi.Input[_builtins.str] password_file: Login with password from a file
|
2022
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
2023
|
+
:param pulumi.Input[_builtins.str] username: Login with username
|
2025
2024
|
"""
|
2026
2025
|
if mount is not None:
|
2027
2026
|
pulumi.set(__self__, "mount", mount)
|
@@ -2036,86 +2035,86 @@ class ProviderAuthLoginUserpassArgs:
|
|
2036
2035
|
if username is not None:
|
2037
2036
|
pulumi.set(__self__, "username", username)
|
2038
2037
|
|
2039
|
-
@property
|
2038
|
+
@_builtins.property
|
2040
2039
|
@pulumi.getter
|
2041
|
-
def mount(self) -> Optional[pulumi.Input[
|
2040
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
2042
2041
|
"""
|
2043
2042
|
The path where the authentication engine is mounted.
|
2044
2043
|
"""
|
2045
2044
|
return pulumi.get(self, "mount")
|
2046
2045
|
|
2047
2046
|
@mount.setter
|
2048
|
-
def mount(self, value: Optional[pulumi.Input[
|
2047
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
2049
2048
|
pulumi.set(self, "mount", value)
|
2050
2049
|
|
2051
|
-
@property
|
2050
|
+
@_builtins.property
|
2052
2051
|
@pulumi.getter
|
2053
|
-
def namespace(self) -> Optional[pulumi.Input[
|
2052
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
2054
2053
|
"""
|
2055
2054
|
The authentication engine's namespace. Conflicts with use_root_namespace
|
2056
2055
|
"""
|
2057
2056
|
return pulumi.get(self, "namespace")
|
2058
2057
|
|
2059
2058
|
@namespace.setter
|
2060
|
-
def namespace(self, value: Optional[pulumi.Input[
|
2059
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
2061
2060
|
pulumi.set(self, "namespace", value)
|
2062
2061
|
|
2063
|
-
@property
|
2062
|
+
@_builtins.property
|
2064
2063
|
@pulumi.getter
|
2065
|
-
def password(self) -> Optional[pulumi.Input[
|
2064
|
+
def password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
2066
2065
|
"""
|
2067
2066
|
Login with password
|
2068
2067
|
"""
|
2069
2068
|
return pulumi.get(self, "password")
|
2070
2069
|
|
2071
2070
|
@password.setter
|
2072
|
-
def password(self, value: Optional[pulumi.Input[
|
2071
|
+
def password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
2073
2072
|
pulumi.set(self, "password", value)
|
2074
2073
|
|
2075
|
-
@property
|
2074
|
+
@_builtins.property
|
2076
2075
|
@pulumi.getter(name="passwordFile")
|
2077
|
-
def password_file(self) -> Optional[pulumi.Input[
|
2076
|
+
def password_file(self) -> Optional[pulumi.Input[_builtins.str]]:
|
2078
2077
|
"""
|
2079
2078
|
Login with password from a file
|
2080
2079
|
"""
|
2081
2080
|
return pulumi.get(self, "password_file")
|
2082
2081
|
|
2083
2082
|
@password_file.setter
|
2084
|
-
def password_file(self, value: Optional[pulumi.Input[
|
2083
|
+
def password_file(self, value: Optional[pulumi.Input[_builtins.str]]):
|
2085
2084
|
pulumi.set(self, "password_file", value)
|
2086
2085
|
|
2087
|
-
@property
|
2086
|
+
@_builtins.property
|
2088
2087
|
@pulumi.getter(name="useRootNamespace")
|
2089
|
-
def use_root_namespace(self) -> Optional[pulumi.Input[
|
2088
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
2090
2089
|
"""
|
2091
2090
|
Authenticate to the root Vault namespace. Conflicts with namespace
|
2092
2091
|
"""
|
2093
2092
|
return pulumi.get(self, "use_root_namespace")
|
2094
2093
|
|
2095
2094
|
@use_root_namespace.setter
|
2096
|
-
def use_root_namespace(self, value: Optional[pulumi.Input[
|
2095
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
2097
2096
|
pulumi.set(self, "use_root_namespace", value)
|
2098
2097
|
|
2099
|
-
@property
|
2098
|
+
@_builtins.property
|
2100
2099
|
@pulumi.getter
|
2101
|
-
def username(self) -> Optional[pulumi.Input[
|
2100
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
2102
2101
|
"""
|
2103
2102
|
Login with username
|
2104
2103
|
"""
|
2105
2104
|
return pulumi.get(self, "username")
|
2106
2105
|
|
2107
2106
|
@username.setter
|
2108
|
-
def username(self, value: Optional[pulumi.Input[
|
2107
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
2109
2108
|
pulumi.set(self, "username", value)
|
2110
2109
|
|
2111
2110
|
|
2112
2111
|
if not MYPY:
|
2113
2112
|
class ProviderClientAuthArgsDict(TypedDict):
|
2114
|
-
cert_file: pulumi.Input[
|
2113
|
+
cert_file: pulumi.Input[_builtins.str]
|
2115
2114
|
"""
|
2116
2115
|
Path to a file containing the client certificate.
|
2117
2116
|
"""
|
2118
|
-
key_file: pulumi.Input[
|
2117
|
+
key_file: pulumi.Input[_builtins.str]
|
2119
2118
|
"""
|
2120
2119
|
Path to a file containing the private key that the certificate was issued for.
|
2121
2120
|
"""
|
@@ -2125,47 +2124,47 @@ elif False:
|
|
2125
2124
|
@pulumi.input_type
|
2126
2125
|
class ProviderClientAuthArgs:
|
2127
2126
|
def __init__(__self__, *,
|
2128
|
-
cert_file: pulumi.Input[
|
2129
|
-
key_file: pulumi.Input[
|
2127
|
+
cert_file: pulumi.Input[_builtins.str],
|
2128
|
+
key_file: pulumi.Input[_builtins.str]):
|
2130
2129
|
"""
|
2131
|
-
:param pulumi.Input[
|
2132
|
-
:param pulumi.Input[
|
2130
|
+
:param pulumi.Input[_builtins.str] cert_file: Path to a file containing the client certificate.
|
2131
|
+
:param pulumi.Input[_builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
|
2133
2132
|
"""
|
2134
2133
|
pulumi.set(__self__, "cert_file", cert_file)
|
2135
2134
|
pulumi.set(__self__, "key_file", key_file)
|
2136
2135
|
|
2137
|
-
@property
|
2136
|
+
@_builtins.property
|
2138
2137
|
@pulumi.getter(name="certFile")
|
2139
|
-
def cert_file(self) -> pulumi.Input[
|
2138
|
+
def cert_file(self) -> pulumi.Input[_builtins.str]:
|
2140
2139
|
"""
|
2141
2140
|
Path to a file containing the client certificate.
|
2142
2141
|
"""
|
2143
2142
|
return pulumi.get(self, "cert_file")
|
2144
2143
|
|
2145
2144
|
@cert_file.setter
|
2146
|
-
def cert_file(self, value: pulumi.Input[
|
2145
|
+
def cert_file(self, value: pulumi.Input[_builtins.str]):
|
2147
2146
|
pulumi.set(self, "cert_file", value)
|
2148
2147
|
|
2149
|
-
@property
|
2148
|
+
@_builtins.property
|
2150
2149
|
@pulumi.getter(name="keyFile")
|
2151
|
-
def key_file(self) -> pulumi.Input[
|
2150
|
+
def key_file(self) -> pulumi.Input[_builtins.str]:
|
2152
2151
|
"""
|
2153
2152
|
Path to a file containing the private key that the certificate was issued for.
|
2154
2153
|
"""
|
2155
2154
|
return pulumi.get(self, "key_file")
|
2156
2155
|
|
2157
2156
|
@key_file.setter
|
2158
|
-
def key_file(self, value: pulumi.Input[
|
2157
|
+
def key_file(self, value: pulumi.Input[_builtins.str]):
|
2159
2158
|
pulumi.set(self, "key_file", value)
|
2160
2159
|
|
2161
2160
|
|
2162
2161
|
if not MYPY:
|
2163
2162
|
class ProviderHeaderArgsDict(TypedDict):
|
2164
|
-
name: pulumi.Input[
|
2163
|
+
name: pulumi.Input[_builtins.str]
|
2165
2164
|
"""
|
2166
2165
|
The header name
|
2167
2166
|
"""
|
2168
|
-
value: pulumi.Input[
|
2167
|
+
value: pulumi.Input[_builtins.str]
|
2169
2168
|
"""
|
2170
2169
|
The header value
|
2171
2170
|
"""
|
@@ -2175,47 +2174,47 @@ elif False:
|
|
2175
2174
|
@pulumi.input_type
|
2176
2175
|
class ProviderHeaderArgs:
|
2177
2176
|
def __init__(__self__, *,
|
2178
|
-
name: pulumi.Input[
|
2179
|
-
value: pulumi.Input[
|
2177
|
+
name: pulumi.Input[_builtins.str],
|
2178
|
+
value: pulumi.Input[_builtins.str]):
|
2180
2179
|
"""
|
2181
|
-
:param pulumi.Input[
|
2182
|
-
:param pulumi.Input[
|
2180
|
+
:param pulumi.Input[_builtins.str] name: The header name
|
2181
|
+
:param pulumi.Input[_builtins.str] value: The header value
|
2183
2182
|
"""
|
2184
2183
|
pulumi.set(__self__, "name", name)
|
2185
2184
|
pulumi.set(__self__, "value", value)
|
2186
2185
|
|
2187
|
-
@property
|
2186
|
+
@_builtins.property
|
2188
2187
|
@pulumi.getter
|
2189
|
-
def name(self) -> pulumi.Input[
|
2188
|
+
def name(self) -> pulumi.Input[_builtins.str]:
|
2190
2189
|
"""
|
2191
2190
|
The header name
|
2192
2191
|
"""
|
2193
2192
|
return pulumi.get(self, "name")
|
2194
2193
|
|
2195
2194
|
@name.setter
|
2196
|
-
def name(self, value: pulumi.Input[
|
2195
|
+
def name(self, value: pulumi.Input[_builtins.str]):
|
2197
2196
|
pulumi.set(self, "name", value)
|
2198
2197
|
|
2199
|
-
@property
|
2198
|
+
@_builtins.property
|
2200
2199
|
@pulumi.getter
|
2201
|
-
def value(self) -> pulumi.Input[
|
2200
|
+
def value(self) -> pulumi.Input[_builtins.str]:
|
2202
2201
|
"""
|
2203
2202
|
The header value
|
2204
2203
|
"""
|
2205
2204
|
return pulumi.get(self, "value")
|
2206
2205
|
|
2207
2206
|
@value.setter
|
2208
|
-
def value(self, value: pulumi.Input[
|
2207
|
+
def value(self, value: pulumi.Input[_builtins.str]):
|
2209
2208
|
pulumi.set(self, "value", value)
|
2210
2209
|
|
2211
2210
|
|
2212
2211
|
if not MYPY:
|
2213
2212
|
class GetPolicyDocumentRuleArgsDict(TypedDict):
|
2214
|
-
capabilities: Sequence[
|
2213
|
+
capabilities: Sequence[_builtins.str]
|
2215
2214
|
"""
|
2216
2215
|
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
2217
2216
|
"""
|
2218
|
-
path:
|
2217
|
+
path: _builtins.str
|
2219
2218
|
"""
|
2220
2219
|
A path in Vault that this rule applies to.
|
2221
2220
|
"""
|
@@ -2227,23 +2226,23 @@ if not MYPY:
|
|
2227
2226
|
"""
|
2228
2227
|
Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
2229
2228
|
"""
|
2230
|
-
description: NotRequired[
|
2229
|
+
description: NotRequired[_builtins.str]
|
2231
2230
|
"""
|
2232
2231
|
Description of the rule. Will be added as a comment to rendered rule.
|
2233
2232
|
"""
|
2234
|
-
max_wrapping_ttl: NotRequired[
|
2233
|
+
max_wrapping_ttl: NotRequired[_builtins.str]
|
2235
2234
|
"""
|
2236
2235
|
The maximum allowed TTL that clients can specify for a wrapped response.
|
2237
2236
|
"""
|
2238
|
-
min_wrapping_ttl: NotRequired[
|
2237
|
+
min_wrapping_ttl: NotRequired[_builtins.str]
|
2239
2238
|
"""
|
2240
2239
|
The minimum allowed TTL that clients can specify for a wrapped response.
|
2241
2240
|
"""
|
2242
|
-
required_parameters: NotRequired[Sequence[
|
2241
|
+
required_parameters: NotRequired[Sequence[_builtins.str]]
|
2243
2242
|
"""
|
2244
2243
|
A list of parameters that must be specified.
|
2245
2244
|
"""
|
2246
|
-
subscribe_event_types: NotRequired[Sequence[
|
2245
|
+
subscribe_event_types: NotRequired[Sequence[_builtins.str]]
|
2247
2246
|
"""
|
2248
2247
|
A list of event types to subscribe to when using `subscribe` capability.
|
2249
2248
|
"""
|
@@ -2253,25 +2252,25 @@ elif False:
|
|
2253
2252
|
@pulumi.input_type
|
2254
2253
|
class GetPolicyDocumentRuleArgs:
|
2255
2254
|
def __init__(__self__, *,
|
2256
|
-
capabilities: Sequence[
|
2257
|
-
path:
|
2255
|
+
capabilities: Sequence[_builtins.str],
|
2256
|
+
path: _builtins.str,
|
2258
2257
|
allowed_parameters: Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']] = None,
|
2259
2258
|
denied_parameters: Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']] = None,
|
2260
|
-
description: Optional[
|
2261
|
-
max_wrapping_ttl: Optional[
|
2262
|
-
min_wrapping_ttl: Optional[
|
2263
|
-
required_parameters: Optional[Sequence[
|
2264
|
-
subscribe_event_types: Optional[Sequence[
|
2265
|
-
"""
|
2266
|
-
:param Sequence[
|
2267
|
-
:param
|
2259
|
+
description: Optional[_builtins.str] = None,
|
2260
|
+
max_wrapping_ttl: Optional[_builtins.str] = None,
|
2261
|
+
min_wrapping_ttl: Optional[_builtins.str] = None,
|
2262
|
+
required_parameters: Optional[Sequence[_builtins.str]] = None,
|
2263
|
+
subscribe_event_types: Optional[Sequence[_builtins.str]] = None):
|
2264
|
+
"""
|
2265
|
+
:param Sequence[_builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
2266
|
+
:param _builtins.str path: A path in Vault that this rule applies to.
|
2268
2267
|
:param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
2269
2268
|
:param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
2270
|
-
:param
|
2271
|
-
:param
|
2272
|
-
:param
|
2273
|
-
:param Sequence[
|
2274
|
-
:param Sequence[
|
2269
|
+
:param _builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
|
2270
|
+
:param _builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
2271
|
+
:param _builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
2272
|
+
:param Sequence[_builtins.str] required_parameters: A list of parameters that must be specified.
|
2273
|
+
:param Sequence[_builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
|
2275
2274
|
"""
|
2276
2275
|
pulumi.set(__self__, "capabilities", capabilities)
|
2277
2276
|
pulumi.set(__self__, "path", path)
|
@@ -2290,31 +2289,31 @@ class GetPolicyDocumentRuleArgs:
|
|
2290
2289
|
if subscribe_event_types is not None:
|
2291
2290
|
pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
|
2292
2291
|
|
2293
|
-
@property
|
2292
|
+
@_builtins.property
|
2294
2293
|
@pulumi.getter
|
2295
|
-
def capabilities(self) -> Sequence[
|
2294
|
+
def capabilities(self) -> Sequence[_builtins.str]:
|
2296
2295
|
"""
|
2297
2296
|
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
2298
2297
|
"""
|
2299
2298
|
return pulumi.get(self, "capabilities")
|
2300
2299
|
|
2301
2300
|
@capabilities.setter
|
2302
|
-
def capabilities(self, value: Sequence[
|
2301
|
+
def capabilities(self, value: Sequence[_builtins.str]):
|
2303
2302
|
pulumi.set(self, "capabilities", value)
|
2304
2303
|
|
2305
|
-
@property
|
2304
|
+
@_builtins.property
|
2306
2305
|
@pulumi.getter
|
2307
|
-
def path(self) ->
|
2306
|
+
def path(self) -> _builtins.str:
|
2308
2307
|
"""
|
2309
2308
|
A path in Vault that this rule applies to.
|
2310
2309
|
"""
|
2311
2310
|
return pulumi.get(self, "path")
|
2312
2311
|
|
2313
2312
|
@path.setter
|
2314
|
-
def path(self, value:
|
2313
|
+
def path(self, value: _builtins.str):
|
2315
2314
|
pulumi.set(self, "path", value)
|
2316
2315
|
|
2317
|
-
@property
|
2316
|
+
@_builtins.property
|
2318
2317
|
@pulumi.getter(name="allowedParameters")
|
2319
2318
|
def allowed_parameters(self) -> Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']]:
|
2320
2319
|
"""
|
@@ -2326,7 +2325,7 @@ class GetPolicyDocumentRuleArgs:
|
|
2326
2325
|
def allowed_parameters(self, value: Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']]):
|
2327
2326
|
pulumi.set(self, "allowed_parameters", value)
|
2328
2327
|
|
2329
|
-
@property
|
2328
|
+
@_builtins.property
|
2330
2329
|
@pulumi.getter(name="deniedParameters")
|
2331
2330
|
def denied_parameters(self) -> Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']]:
|
2332
2331
|
"""
|
@@ -2338,74 +2337,74 @@ class GetPolicyDocumentRuleArgs:
|
|
2338
2337
|
def denied_parameters(self, value: Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']]):
|
2339
2338
|
pulumi.set(self, "denied_parameters", value)
|
2340
2339
|
|
2341
|
-
@property
|
2340
|
+
@_builtins.property
|
2342
2341
|
@pulumi.getter
|
2343
|
-
def description(self) -> Optional[
|
2342
|
+
def description(self) -> Optional[_builtins.str]:
|
2344
2343
|
"""
|
2345
2344
|
Description of the rule. Will be added as a comment to rendered rule.
|
2346
2345
|
"""
|
2347
2346
|
return pulumi.get(self, "description")
|
2348
2347
|
|
2349
2348
|
@description.setter
|
2350
|
-
def description(self, value: Optional[
|
2349
|
+
def description(self, value: Optional[_builtins.str]):
|
2351
2350
|
pulumi.set(self, "description", value)
|
2352
2351
|
|
2353
|
-
@property
|
2352
|
+
@_builtins.property
|
2354
2353
|
@pulumi.getter(name="maxWrappingTtl")
|
2355
|
-
def max_wrapping_ttl(self) -> Optional[
|
2354
|
+
def max_wrapping_ttl(self) -> Optional[_builtins.str]:
|
2356
2355
|
"""
|
2357
2356
|
The maximum allowed TTL that clients can specify for a wrapped response.
|
2358
2357
|
"""
|
2359
2358
|
return pulumi.get(self, "max_wrapping_ttl")
|
2360
2359
|
|
2361
2360
|
@max_wrapping_ttl.setter
|
2362
|
-
def max_wrapping_ttl(self, value: Optional[
|
2361
|
+
def max_wrapping_ttl(self, value: Optional[_builtins.str]):
|
2363
2362
|
pulumi.set(self, "max_wrapping_ttl", value)
|
2364
2363
|
|
2365
|
-
@property
|
2364
|
+
@_builtins.property
|
2366
2365
|
@pulumi.getter(name="minWrappingTtl")
|
2367
|
-
def min_wrapping_ttl(self) -> Optional[
|
2366
|
+
def min_wrapping_ttl(self) -> Optional[_builtins.str]:
|
2368
2367
|
"""
|
2369
2368
|
The minimum allowed TTL that clients can specify for a wrapped response.
|
2370
2369
|
"""
|
2371
2370
|
return pulumi.get(self, "min_wrapping_ttl")
|
2372
2371
|
|
2373
2372
|
@min_wrapping_ttl.setter
|
2374
|
-
def min_wrapping_ttl(self, value: Optional[
|
2373
|
+
def min_wrapping_ttl(self, value: Optional[_builtins.str]):
|
2375
2374
|
pulumi.set(self, "min_wrapping_ttl", value)
|
2376
2375
|
|
2377
|
-
@property
|
2376
|
+
@_builtins.property
|
2378
2377
|
@pulumi.getter(name="requiredParameters")
|
2379
|
-
def required_parameters(self) -> Optional[Sequence[
|
2378
|
+
def required_parameters(self) -> Optional[Sequence[_builtins.str]]:
|
2380
2379
|
"""
|
2381
2380
|
A list of parameters that must be specified.
|
2382
2381
|
"""
|
2383
2382
|
return pulumi.get(self, "required_parameters")
|
2384
2383
|
|
2385
2384
|
@required_parameters.setter
|
2386
|
-
def required_parameters(self, value: Optional[Sequence[
|
2385
|
+
def required_parameters(self, value: Optional[Sequence[_builtins.str]]):
|
2387
2386
|
pulumi.set(self, "required_parameters", value)
|
2388
2387
|
|
2389
|
-
@property
|
2388
|
+
@_builtins.property
|
2390
2389
|
@pulumi.getter(name="subscribeEventTypes")
|
2391
|
-
def subscribe_event_types(self) -> Optional[Sequence[
|
2390
|
+
def subscribe_event_types(self) -> Optional[Sequence[_builtins.str]]:
|
2392
2391
|
"""
|
2393
2392
|
A list of event types to subscribe to when using `subscribe` capability.
|
2394
2393
|
"""
|
2395
2394
|
return pulumi.get(self, "subscribe_event_types")
|
2396
2395
|
|
2397
2396
|
@subscribe_event_types.setter
|
2398
|
-
def subscribe_event_types(self, value: Optional[Sequence[
|
2397
|
+
def subscribe_event_types(self, value: Optional[Sequence[_builtins.str]]):
|
2399
2398
|
pulumi.set(self, "subscribe_event_types", value)
|
2400
2399
|
|
2401
2400
|
|
2402
2401
|
if not MYPY:
|
2403
2402
|
class GetPolicyDocumentRuleAllowedParameterArgsDict(TypedDict):
|
2404
|
-
key:
|
2403
|
+
key: _builtins.str
|
2405
2404
|
"""
|
2406
2405
|
Name of permitted key.
|
2407
2406
|
"""
|
2408
|
-
values: Sequence[
|
2407
|
+
values: Sequence[_builtins.str]
|
2409
2408
|
"""
|
2410
2409
|
A list of values what are permitted by policy rule.
|
2411
2410
|
"""
|
@@ -2415,47 +2414,47 @@ elif False:
|
|
2415
2414
|
@pulumi.input_type
|
2416
2415
|
class GetPolicyDocumentRuleAllowedParameterArgs:
|
2417
2416
|
def __init__(__self__, *,
|
2418
|
-
key:
|
2419
|
-
values: Sequence[
|
2417
|
+
key: _builtins.str,
|
2418
|
+
values: Sequence[_builtins.str]):
|
2420
2419
|
"""
|
2421
|
-
:param
|
2422
|
-
:param Sequence[
|
2420
|
+
:param _builtins.str key: Name of permitted key.
|
2421
|
+
:param Sequence[_builtins.str] values: A list of values what are permitted by policy rule.
|
2423
2422
|
"""
|
2424
2423
|
pulumi.set(__self__, "key", key)
|
2425
2424
|
pulumi.set(__self__, "values", values)
|
2426
2425
|
|
2427
|
-
@property
|
2426
|
+
@_builtins.property
|
2428
2427
|
@pulumi.getter
|
2429
|
-
def key(self) ->
|
2428
|
+
def key(self) -> _builtins.str:
|
2430
2429
|
"""
|
2431
2430
|
Name of permitted key.
|
2432
2431
|
"""
|
2433
2432
|
return pulumi.get(self, "key")
|
2434
2433
|
|
2435
2434
|
@key.setter
|
2436
|
-
def key(self, value:
|
2435
|
+
def key(self, value: _builtins.str):
|
2437
2436
|
pulumi.set(self, "key", value)
|
2438
2437
|
|
2439
|
-
@property
|
2438
|
+
@_builtins.property
|
2440
2439
|
@pulumi.getter
|
2441
|
-
def values(self) -> Sequence[
|
2440
|
+
def values(self) -> Sequence[_builtins.str]:
|
2442
2441
|
"""
|
2443
2442
|
A list of values what are permitted by policy rule.
|
2444
2443
|
"""
|
2445
2444
|
return pulumi.get(self, "values")
|
2446
2445
|
|
2447
2446
|
@values.setter
|
2448
|
-
def values(self, value: Sequence[
|
2447
|
+
def values(self, value: Sequence[_builtins.str]):
|
2449
2448
|
pulumi.set(self, "values", value)
|
2450
2449
|
|
2451
2450
|
|
2452
2451
|
if not MYPY:
|
2453
2452
|
class GetPolicyDocumentRuleDeniedParameterArgsDict(TypedDict):
|
2454
|
-
key:
|
2453
|
+
key: _builtins.str
|
2455
2454
|
"""
|
2456
2455
|
Name of denied key.
|
2457
2456
|
"""
|
2458
|
-
values: Sequence[
|
2457
|
+
values: Sequence[_builtins.str]
|
2459
2458
|
"""
|
2460
2459
|
A list of values what are denied by policy rule.
|
2461
2460
|
"""
|
@@ -2465,37 +2464,37 @@ elif False:
|
|
2465
2464
|
@pulumi.input_type
|
2466
2465
|
class GetPolicyDocumentRuleDeniedParameterArgs:
|
2467
2466
|
def __init__(__self__, *,
|
2468
|
-
key:
|
2469
|
-
values: Sequence[
|
2467
|
+
key: _builtins.str,
|
2468
|
+
values: Sequence[_builtins.str]):
|
2470
2469
|
"""
|
2471
|
-
:param
|
2472
|
-
:param Sequence[
|
2470
|
+
:param _builtins.str key: Name of denied key.
|
2471
|
+
:param Sequence[_builtins.str] values: A list of values what are denied by policy rule.
|
2473
2472
|
"""
|
2474
2473
|
pulumi.set(__self__, "key", key)
|
2475
2474
|
pulumi.set(__self__, "values", values)
|
2476
2475
|
|
2477
|
-
@property
|
2476
|
+
@_builtins.property
|
2478
2477
|
@pulumi.getter
|
2479
|
-
def key(self) ->
|
2478
|
+
def key(self) -> _builtins.str:
|
2480
2479
|
"""
|
2481
2480
|
Name of denied key.
|
2482
2481
|
"""
|
2483
2482
|
return pulumi.get(self, "key")
|
2484
2483
|
|
2485
2484
|
@key.setter
|
2486
|
-
def key(self, value:
|
2485
|
+
def key(self, value: _builtins.str):
|
2487
2486
|
pulumi.set(self, "key", value)
|
2488
2487
|
|
2489
|
-
@property
|
2488
|
+
@_builtins.property
|
2490
2489
|
@pulumi.getter
|
2491
|
-
def values(self) -> Sequence[
|
2490
|
+
def values(self) -> Sequence[_builtins.str]:
|
2492
2491
|
"""
|
2493
2492
|
A list of values what are denied by policy rule.
|
2494
2493
|
"""
|
2495
2494
|
return pulumi.get(self, "values")
|
2496
2495
|
|
2497
2496
|
@values.setter
|
2498
|
-
def values(self, value: Sequence[
|
2497
|
+
def values(self, value: Sequence[_builtins.str]):
|
2499
2498
|
pulumi.set(self, "values", value)
|
2500
2499
|
|
2501
2500
|
|