pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,494 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendConfigIdentityArgs', 'AuthBackendConfigIdentity']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendConfigIdentityArgs:
21
+ def __init__(__self__, *,
22
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
23
+ ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
24
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
26
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
28
+ """
29
+ The set of arguments for constructing a AuthBackendConfigIdentity resource.
30
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
31
+ mounted at. Defaults to `aws`.
32
+ :param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
33
+ `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
34
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
35
+ added to both audit logs, and on the `ec2_alias`
36
+ :param pulumi.Input[_builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
37
+ `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
38
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
39
+ added to both audit logs, and on the `iam_alias`
40
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
41
+ The value should not contain leading or trailing forward slashes.
42
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
43
+ *Available only for Vault Enterprise*.
44
+ """
45
+ if backend is not None:
46
+ pulumi.set(__self__, "backend", backend)
47
+ if ec2_alias is not None:
48
+ pulumi.set(__self__, "ec2_alias", ec2_alias)
49
+ if ec2_metadatas is not None:
50
+ pulumi.set(__self__, "ec2_metadatas", ec2_metadatas)
51
+ if iam_alias is not None:
52
+ pulumi.set(__self__, "iam_alias", iam_alias)
53
+ if iam_metadatas is not None:
54
+ pulumi.set(__self__, "iam_metadatas", iam_metadatas)
55
+ if namespace is not None:
56
+ pulumi.set(__self__, "namespace", namespace)
57
+
58
+ @_builtins.property
59
+ @pulumi.getter
60
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
61
+ """
62
+ The path the AWS auth backend being configured was
63
+ mounted at. Defaults to `aws`.
64
+ """
65
+ return pulumi.get(self, "backend")
66
+
67
+ @backend.setter
68
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
69
+ pulumi.set(self, "backend", value)
70
+
71
+ @_builtins.property
72
+ @pulumi.getter(name="ec2Alias")
73
+ def ec2_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
74
+ """
75
+ How to generate the identity alias when using the ec2 auth method. Valid choices are
76
+ `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
77
+ """
78
+ return pulumi.get(self, "ec2_alias")
79
+
80
+ @ec2_alias.setter
81
+ def ec2_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
82
+ pulumi.set(self, "ec2_alias", value)
83
+
84
+ @_builtins.property
85
+ @pulumi.getter(name="ec2Metadatas")
86
+ def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
87
+ """
88
+ The metadata to include on the token returned by the `login` endpoint. This metadata will be
89
+ added to both audit logs, and on the `ec2_alias`
90
+ """
91
+ return pulumi.get(self, "ec2_metadatas")
92
+
93
+ @ec2_metadatas.setter
94
+ def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
95
+ pulumi.set(self, "ec2_metadatas", value)
96
+
97
+ @_builtins.property
98
+ @pulumi.getter(name="iamAlias")
99
+ def iam_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
100
+ """
101
+ How to generate the identity alias when using the iam auth method. Valid choices are
102
+ `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
103
+ """
104
+ return pulumi.get(self, "iam_alias")
105
+
106
+ @iam_alias.setter
107
+ def iam_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
108
+ pulumi.set(self, "iam_alias", value)
109
+
110
+ @_builtins.property
111
+ @pulumi.getter(name="iamMetadatas")
112
+ def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
113
+ """
114
+ The metadata to include on the token returned by the `login` endpoint. This metadata will be
115
+ added to both audit logs, and on the `iam_alias`
116
+ """
117
+ return pulumi.get(self, "iam_metadatas")
118
+
119
+ @iam_metadatas.setter
120
+ def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
121
+ pulumi.set(self, "iam_metadatas", value)
122
+
123
+ @_builtins.property
124
+ @pulumi.getter
125
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
126
+ """
127
+ The namespace to provision the resource in.
128
+ The value should not contain leading or trailing forward slashes.
129
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
130
+ *Available only for Vault Enterprise*.
131
+ """
132
+ return pulumi.get(self, "namespace")
133
+
134
+ @namespace.setter
135
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
136
+ pulumi.set(self, "namespace", value)
137
+
138
+
139
+ @pulumi.input_type
140
+ class _AuthBackendConfigIdentityState:
141
+ def __init__(__self__, *,
142
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
143
+ ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
144
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
145
+ iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
146
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
147
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
148
+ """
149
+ Input properties used for looking up and filtering AuthBackendConfigIdentity resources.
150
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
151
+ mounted at. Defaults to `aws`.
152
+ :param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
153
+ `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
154
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
155
+ added to both audit logs, and on the `ec2_alias`
156
+ :param pulumi.Input[_builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
157
+ `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
158
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
159
+ added to both audit logs, and on the `iam_alias`
160
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
161
+ The value should not contain leading or trailing forward slashes.
162
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
163
+ *Available only for Vault Enterprise*.
164
+ """
165
+ if backend is not None:
166
+ pulumi.set(__self__, "backend", backend)
167
+ if ec2_alias is not None:
168
+ pulumi.set(__self__, "ec2_alias", ec2_alias)
169
+ if ec2_metadatas is not None:
170
+ pulumi.set(__self__, "ec2_metadatas", ec2_metadatas)
171
+ if iam_alias is not None:
172
+ pulumi.set(__self__, "iam_alias", iam_alias)
173
+ if iam_metadatas is not None:
174
+ pulumi.set(__self__, "iam_metadatas", iam_metadatas)
175
+ if namespace is not None:
176
+ pulumi.set(__self__, "namespace", namespace)
177
+
178
+ @_builtins.property
179
+ @pulumi.getter
180
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
181
+ """
182
+ The path the AWS auth backend being configured was
183
+ mounted at. Defaults to `aws`.
184
+ """
185
+ return pulumi.get(self, "backend")
186
+
187
+ @backend.setter
188
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
189
+ pulumi.set(self, "backend", value)
190
+
191
+ @_builtins.property
192
+ @pulumi.getter(name="ec2Alias")
193
+ def ec2_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
194
+ """
195
+ How to generate the identity alias when using the ec2 auth method. Valid choices are
196
+ `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
197
+ """
198
+ return pulumi.get(self, "ec2_alias")
199
+
200
+ @ec2_alias.setter
201
+ def ec2_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
202
+ pulumi.set(self, "ec2_alias", value)
203
+
204
+ @_builtins.property
205
+ @pulumi.getter(name="ec2Metadatas")
206
+ def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
207
+ """
208
+ The metadata to include on the token returned by the `login` endpoint. This metadata will be
209
+ added to both audit logs, and on the `ec2_alias`
210
+ """
211
+ return pulumi.get(self, "ec2_metadatas")
212
+
213
+ @ec2_metadatas.setter
214
+ def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
215
+ pulumi.set(self, "ec2_metadatas", value)
216
+
217
+ @_builtins.property
218
+ @pulumi.getter(name="iamAlias")
219
+ def iam_alias(self) -> Optional[pulumi.Input[_builtins.str]]:
220
+ """
221
+ How to generate the identity alias when using the iam auth method. Valid choices are
222
+ `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
223
+ """
224
+ return pulumi.get(self, "iam_alias")
225
+
226
+ @iam_alias.setter
227
+ def iam_alias(self, value: Optional[pulumi.Input[_builtins.str]]):
228
+ pulumi.set(self, "iam_alias", value)
229
+
230
+ @_builtins.property
231
+ @pulumi.getter(name="iamMetadatas")
232
+ def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
233
+ """
234
+ The metadata to include on the token returned by the `login` endpoint. This metadata will be
235
+ added to both audit logs, and on the `iam_alias`
236
+ """
237
+ return pulumi.get(self, "iam_metadatas")
238
+
239
+ @iam_metadatas.setter
240
+ def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
241
+ pulumi.set(self, "iam_metadatas", value)
242
+
243
+ @_builtins.property
244
+ @pulumi.getter
245
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
246
+ """
247
+ The namespace to provision the resource in.
248
+ The value should not contain leading or trailing forward slashes.
249
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
250
+ *Available only for Vault Enterprise*.
251
+ """
252
+ return pulumi.get(self, "namespace")
253
+
254
+ @namespace.setter
255
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
256
+ pulumi.set(self, "namespace", value)
257
+
258
+
259
+ @pulumi.type_token("vault:aws/authBackendConfigIdentity:AuthBackendConfigIdentity")
260
+ class AuthBackendConfigIdentity(pulumi.CustomResource):
261
+ @overload
262
+ def __init__(__self__,
263
+ resource_name: str,
264
+ opts: Optional[pulumi.ResourceOptions] = None,
265
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
266
+ ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
267
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
268
+ iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
269
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
270
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
271
+ __props__=None):
272
+ """
273
+ Manages an AWS auth backend identity configuration in a Vault server. This configuration defines how Vault interacts
274
+ with the identity store. See the [Vault documentation](https://www.vaultproject.io/docs/auth/aws.html) for more
275
+ information.
276
+
277
+ ## Example Usage
278
+
279
+ ```python
280
+ import pulumi
281
+ import pulumi_vault as vault
282
+
283
+ aws = vault.AuthBackend("aws", type="aws")
284
+ example = vault.aws.AuthBackendConfigIdentity("example",
285
+ backend=aws.path,
286
+ iam_alias="full_arn",
287
+ iam_metadatas=[
288
+ "canonical_arn",
289
+ "account_id",
290
+ ])
291
+ ```
292
+
293
+ ## Import
294
+
295
+ AWS auth backend identity config can be imported using `auth/`, the `backend` path, and `/config/identity` e.g.
296
+
297
+ ```sh
298
+ $ pulumi import vault:aws/authBackendConfigIdentity:AuthBackendConfigIdentity example auth/aws/config/identity
299
+ ```
300
+
301
+ :param str resource_name: The name of the resource.
302
+ :param pulumi.ResourceOptions opts: Options for the resource.
303
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
304
+ mounted at. Defaults to `aws`.
305
+ :param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
306
+ `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
307
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
308
+ added to both audit logs, and on the `ec2_alias`
309
+ :param pulumi.Input[_builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
310
+ `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
311
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
312
+ added to both audit logs, and on the `iam_alias`
313
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
314
+ The value should not contain leading or trailing forward slashes.
315
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
316
+ *Available only for Vault Enterprise*.
317
+ """
318
+ ...
319
+ @overload
320
+ def __init__(__self__,
321
+ resource_name: str,
322
+ args: Optional[AuthBackendConfigIdentityArgs] = None,
323
+ opts: Optional[pulumi.ResourceOptions] = None):
324
+ """
325
+ Manages an AWS auth backend identity configuration in a Vault server. This configuration defines how Vault interacts
326
+ with the identity store. See the [Vault documentation](https://www.vaultproject.io/docs/auth/aws.html) for more
327
+ information.
328
+
329
+ ## Example Usage
330
+
331
+ ```python
332
+ import pulumi
333
+ import pulumi_vault as vault
334
+
335
+ aws = vault.AuthBackend("aws", type="aws")
336
+ example = vault.aws.AuthBackendConfigIdentity("example",
337
+ backend=aws.path,
338
+ iam_alias="full_arn",
339
+ iam_metadatas=[
340
+ "canonical_arn",
341
+ "account_id",
342
+ ])
343
+ ```
344
+
345
+ ## Import
346
+
347
+ AWS auth backend identity config can be imported using `auth/`, the `backend` path, and `/config/identity` e.g.
348
+
349
+ ```sh
350
+ $ pulumi import vault:aws/authBackendConfigIdentity:AuthBackendConfigIdentity example auth/aws/config/identity
351
+ ```
352
+
353
+ :param str resource_name: The name of the resource.
354
+ :param AuthBackendConfigIdentityArgs args: The arguments to use to populate this resource's properties.
355
+ :param pulumi.ResourceOptions opts: Options for the resource.
356
+ """
357
+ ...
358
+ def __init__(__self__, resource_name: str, *args, **kwargs):
359
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendConfigIdentityArgs, pulumi.ResourceOptions, *args, **kwargs)
360
+ if resource_args is not None:
361
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
362
+ else:
363
+ __self__._internal_init(resource_name, *args, **kwargs)
364
+
365
+ def _internal_init(__self__,
366
+ resource_name: str,
367
+ opts: Optional[pulumi.ResourceOptions] = None,
368
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
369
+ ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
370
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
371
+ iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
372
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
373
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
374
+ __props__=None):
375
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
376
+ if not isinstance(opts, pulumi.ResourceOptions):
377
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
378
+ if opts.id is None:
379
+ if __props__ is not None:
380
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
381
+ __props__ = AuthBackendConfigIdentityArgs.__new__(AuthBackendConfigIdentityArgs)
382
+
383
+ __props__.__dict__["backend"] = backend
384
+ __props__.__dict__["ec2_alias"] = ec2_alias
385
+ __props__.__dict__["ec2_metadatas"] = ec2_metadatas
386
+ __props__.__dict__["iam_alias"] = iam_alias
387
+ __props__.__dict__["iam_metadatas"] = iam_metadatas
388
+ __props__.__dict__["namespace"] = namespace
389
+ super(AuthBackendConfigIdentity, __self__).__init__(
390
+ 'vault:aws/authBackendConfigIdentity:AuthBackendConfigIdentity',
391
+ resource_name,
392
+ __props__,
393
+ opts)
394
+
395
+ @staticmethod
396
+ def get(resource_name: str,
397
+ id: pulumi.Input[str],
398
+ opts: Optional[pulumi.ResourceOptions] = None,
399
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
400
+ ec2_alias: Optional[pulumi.Input[_builtins.str]] = None,
401
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
402
+ iam_alias: Optional[pulumi.Input[_builtins.str]] = None,
403
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
404
+ namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendConfigIdentity':
405
+ """
406
+ Get an existing AuthBackendConfigIdentity resource's state with the given name, id, and optional extra
407
+ properties used to qualify the lookup.
408
+
409
+ :param str resource_name: The unique name of the resulting resource.
410
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
411
+ :param pulumi.ResourceOptions opts: Options for the resource.
412
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
413
+ mounted at. Defaults to `aws`.
414
+ :param pulumi.Input[_builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
415
+ `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
416
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
417
+ added to both audit logs, and on the `ec2_alias`
418
+ :param pulumi.Input[_builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
419
+ `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
420
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
421
+ added to both audit logs, and on the `iam_alias`
422
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
423
+ The value should not contain leading or trailing forward slashes.
424
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
425
+ *Available only for Vault Enterprise*.
426
+ """
427
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
428
+
429
+ __props__ = _AuthBackendConfigIdentityState.__new__(_AuthBackendConfigIdentityState)
430
+
431
+ __props__.__dict__["backend"] = backend
432
+ __props__.__dict__["ec2_alias"] = ec2_alias
433
+ __props__.__dict__["ec2_metadatas"] = ec2_metadatas
434
+ __props__.__dict__["iam_alias"] = iam_alias
435
+ __props__.__dict__["iam_metadatas"] = iam_metadatas
436
+ __props__.__dict__["namespace"] = namespace
437
+ return AuthBackendConfigIdentity(resource_name, opts=opts, __props__=__props__)
438
+
439
+ @_builtins.property
440
+ @pulumi.getter
441
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
442
+ """
443
+ The path the AWS auth backend being configured was
444
+ mounted at. Defaults to `aws`.
445
+ """
446
+ return pulumi.get(self, "backend")
447
+
448
+ @_builtins.property
449
+ @pulumi.getter(name="ec2Alias")
450
+ def ec2_alias(self) -> pulumi.Output[Optional[_builtins.str]]:
451
+ """
452
+ How to generate the identity alias when using the ec2 auth method. Valid choices are
453
+ `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
454
+ """
455
+ return pulumi.get(self, "ec2_alias")
456
+
457
+ @_builtins.property
458
+ @pulumi.getter(name="ec2Metadatas")
459
+ def ec2_metadatas(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
460
+ """
461
+ The metadata to include on the token returned by the `login` endpoint. This metadata will be
462
+ added to both audit logs, and on the `ec2_alias`
463
+ """
464
+ return pulumi.get(self, "ec2_metadatas")
465
+
466
+ @_builtins.property
467
+ @pulumi.getter(name="iamAlias")
468
+ def iam_alias(self) -> pulumi.Output[Optional[_builtins.str]]:
469
+ """
470
+ How to generate the identity alias when using the iam auth method. Valid choices are
471
+ `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
472
+ """
473
+ return pulumi.get(self, "iam_alias")
474
+
475
+ @_builtins.property
476
+ @pulumi.getter(name="iamMetadatas")
477
+ def iam_metadatas(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
478
+ """
479
+ The metadata to include on the token returned by the `login` endpoint. This metadata will be
480
+ added to both audit logs, and on the `iam_alias`
481
+ """
482
+ return pulumi.get(self, "iam_metadatas")
483
+
484
+ @_builtins.property
485
+ @pulumi.getter
486
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
487
+ """
488
+ The namespace to provision the resource in.
489
+ The value should not contain leading or trailing forward slashes.
490
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
491
+ *Available only for Vault Enterprise*.
492
+ """
493
+ return pulumi.get(self, "namespace")
494
+