pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
pulumi_vault/provider.py
ADDED
|
@@ -0,0 +1,781 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from . import _utilities
|
|
16
|
+
from ._inputs import *
|
|
17
|
+
|
|
18
|
+
__all__ = ['ProviderArgs', 'Provider']
|
|
19
|
+
|
|
20
|
+
@pulumi.input_type
|
|
21
|
+
class ProviderArgs:
|
|
22
|
+
def __init__(__self__, *,
|
|
23
|
+
add_address_to_env: Optional[pulumi.Input[_builtins.str]] = None,
|
|
24
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
|
25
|
+
auth_login: Optional[pulumi.Input['ProviderAuthLoginArgs']] = None,
|
|
26
|
+
auth_login_aws: Optional[pulumi.Input['ProviderAuthLoginAwsArgs']] = None,
|
|
27
|
+
auth_login_azure: Optional[pulumi.Input['ProviderAuthLoginAzureArgs']] = None,
|
|
28
|
+
auth_login_cert: Optional[pulumi.Input['ProviderAuthLoginCertArgs']] = None,
|
|
29
|
+
auth_login_gcp: Optional[pulumi.Input['ProviderAuthLoginGcpArgs']] = None,
|
|
30
|
+
auth_login_jwt: Optional[pulumi.Input['ProviderAuthLoginJwtArgs']] = None,
|
|
31
|
+
auth_login_kerberos: Optional[pulumi.Input['ProviderAuthLoginKerberosArgs']] = None,
|
|
32
|
+
auth_login_oci: Optional[pulumi.Input['ProviderAuthLoginOciArgs']] = None,
|
|
33
|
+
auth_login_oidc: Optional[pulumi.Input['ProviderAuthLoginOidcArgs']] = None,
|
|
34
|
+
auth_login_radius: Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']] = None,
|
|
35
|
+
auth_login_token_file: Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']] = None,
|
|
36
|
+
auth_login_userpass: Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']] = None,
|
|
37
|
+
ca_cert_dir: Optional[pulumi.Input[_builtins.str]] = None,
|
|
38
|
+
ca_cert_file: Optional[pulumi.Input[_builtins.str]] = None,
|
|
39
|
+
client_auth: Optional[pulumi.Input['ProviderClientAuthArgs']] = None,
|
|
40
|
+
headers: Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]] = None,
|
|
41
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
42
|
+
max_retries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
43
|
+
max_retries_ccc: Optional[pulumi.Input[_builtins.int]] = None,
|
|
44
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
45
|
+
set_namespace_from_token: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
46
|
+
skip_child_token: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
47
|
+
skip_get_vault_version: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
48
|
+
skip_tls_verify: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
49
|
+
tls_server_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
50
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
51
|
+
token_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
52
|
+
vault_version_override: Optional[pulumi.Input[_builtins.str]] = None):
|
|
53
|
+
"""
|
|
54
|
+
The set of arguments for constructing a Provider resource.
|
|
55
|
+
:param pulumi.Input[_builtins.str] address: URL of the root of the target Vault server.
|
|
56
|
+
:param pulumi.Input['ProviderAuthLoginArgs'] auth_login: Login to vault with an existing auth method using auth/<mount>/login
|
|
57
|
+
:param pulumi.Input['ProviderAuthLoginAwsArgs'] auth_login_aws: Login to vault using the AWS method
|
|
58
|
+
:param pulumi.Input['ProviderAuthLoginAzureArgs'] auth_login_azure: Login to vault using the azure method
|
|
59
|
+
:param pulumi.Input['ProviderAuthLoginCertArgs'] auth_login_cert: Login to vault using the cert method
|
|
60
|
+
:param pulumi.Input['ProviderAuthLoginGcpArgs'] auth_login_gcp: Login to vault using the gcp method
|
|
61
|
+
:param pulumi.Input['ProviderAuthLoginJwtArgs'] auth_login_jwt: Login to vault using the jwt method
|
|
62
|
+
:param pulumi.Input['ProviderAuthLoginKerberosArgs'] auth_login_kerberos: Login to vault using the kerberos method
|
|
63
|
+
:param pulumi.Input['ProviderAuthLoginOciArgs'] auth_login_oci: Login to vault using the OCI method
|
|
64
|
+
:param pulumi.Input['ProviderAuthLoginOidcArgs'] auth_login_oidc: Login to vault using the oidc method
|
|
65
|
+
:param pulumi.Input['ProviderAuthLoginRadiusArgs'] auth_login_radius: Login to vault using the radius method
|
|
66
|
+
:param pulumi.Input['ProviderAuthLoginTokenFileArgs'] auth_login_token_file: Login to vault using
|
|
67
|
+
:param pulumi.Input['ProviderAuthLoginUserpassArgs'] auth_login_userpass: Login to vault using the userpass method
|
|
68
|
+
:param pulumi.Input[_builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
|
|
69
|
+
:param pulumi.Input[_builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
|
|
70
|
+
:param pulumi.Input['ProviderClientAuthArgs'] client_auth: Client authentication credentials.
|
|
71
|
+
:param pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]] headers: The headers to send with each Vault request.
|
|
72
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
|
|
73
|
+
:param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
|
|
74
|
+
:param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
|
|
75
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
|
|
76
|
+
:param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
|
|
77
|
+
:param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
|
|
78
|
+
:param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
|
|
79
|
+
:param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
|
|
80
|
+
:param pulumi.Input[_builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
|
|
81
|
+
:param pulumi.Input[_builtins.str] token: Token to use to authenticate to Vault.
|
|
82
|
+
:param pulumi.Input[_builtins.str] token_name: Token name to use for creating the Vault child token.
|
|
83
|
+
:param pulumi.Input[_builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
|
|
84
|
+
"""
|
|
85
|
+
if add_address_to_env is not None:
|
|
86
|
+
pulumi.set(__self__, "add_address_to_env", add_address_to_env)
|
|
87
|
+
if address is not None:
|
|
88
|
+
pulumi.set(__self__, "address", address)
|
|
89
|
+
if auth_login is not None:
|
|
90
|
+
pulumi.set(__self__, "auth_login", auth_login)
|
|
91
|
+
if auth_login_aws is not None:
|
|
92
|
+
pulumi.set(__self__, "auth_login_aws", auth_login_aws)
|
|
93
|
+
if auth_login_azure is not None:
|
|
94
|
+
pulumi.set(__self__, "auth_login_azure", auth_login_azure)
|
|
95
|
+
if auth_login_cert is not None:
|
|
96
|
+
pulumi.set(__self__, "auth_login_cert", auth_login_cert)
|
|
97
|
+
if auth_login_gcp is not None:
|
|
98
|
+
pulumi.set(__self__, "auth_login_gcp", auth_login_gcp)
|
|
99
|
+
if auth_login_jwt is not None:
|
|
100
|
+
pulumi.set(__self__, "auth_login_jwt", auth_login_jwt)
|
|
101
|
+
if auth_login_kerberos is not None:
|
|
102
|
+
pulumi.set(__self__, "auth_login_kerberos", auth_login_kerberos)
|
|
103
|
+
if auth_login_oci is not None:
|
|
104
|
+
pulumi.set(__self__, "auth_login_oci", auth_login_oci)
|
|
105
|
+
if auth_login_oidc is not None:
|
|
106
|
+
pulumi.set(__self__, "auth_login_oidc", auth_login_oidc)
|
|
107
|
+
if auth_login_radius is not None:
|
|
108
|
+
pulumi.set(__self__, "auth_login_radius", auth_login_radius)
|
|
109
|
+
if auth_login_token_file is not None:
|
|
110
|
+
pulumi.set(__self__, "auth_login_token_file", auth_login_token_file)
|
|
111
|
+
if auth_login_userpass is not None:
|
|
112
|
+
pulumi.set(__self__, "auth_login_userpass", auth_login_userpass)
|
|
113
|
+
if ca_cert_dir is not None:
|
|
114
|
+
pulumi.set(__self__, "ca_cert_dir", ca_cert_dir)
|
|
115
|
+
if ca_cert_file is not None:
|
|
116
|
+
pulumi.set(__self__, "ca_cert_file", ca_cert_file)
|
|
117
|
+
if client_auth is not None:
|
|
118
|
+
pulumi.set(__self__, "client_auth", client_auth)
|
|
119
|
+
if headers is not None:
|
|
120
|
+
pulumi.set(__self__, "headers", headers)
|
|
121
|
+
if max_lease_ttl_seconds is None:
|
|
122
|
+
max_lease_ttl_seconds = (_utilities.get_env_int('TERRAFORM_VAULT_MAX_TTL') or 1200)
|
|
123
|
+
if max_lease_ttl_seconds is not None:
|
|
124
|
+
pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
|
|
125
|
+
if max_retries is None:
|
|
126
|
+
max_retries = (_utilities.get_env_int('VAULT_MAX_RETRIES') or 2)
|
|
127
|
+
if max_retries is not None:
|
|
128
|
+
pulumi.set(__self__, "max_retries", max_retries)
|
|
129
|
+
if max_retries_ccc is not None:
|
|
130
|
+
pulumi.set(__self__, "max_retries_ccc", max_retries_ccc)
|
|
131
|
+
if namespace is not None:
|
|
132
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
133
|
+
if set_namespace_from_token is not None:
|
|
134
|
+
pulumi.set(__self__, "set_namespace_from_token", set_namespace_from_token)
|
|
135
|
+
if skip_child_token is not None:
|
|
136
|
+
pulumi.set(__self__, "skip_child_token", skip_child_token)
|
|
137
|
+
if skip_get_vault_version is not None:
|
|
138
|
+
pulumi.set(__self__, "skip_get_vault_version", skip_get_vault_version)
|
|
139
|
+
if skip_tls_verify is None:
|
|
140
|
+
skip_tls_verify = _utilities.get_env_bool('VAULT_SKIP_VERIFY')
|
|
141
|
+
if skip_tls_verify is not None:
|
|
142
|
+
pulumi.set(__self__, "skip_tls_verify", skip_tls_verify)
|
|
143
|
+
if tls_server_name is not None:
|
|
144
|
+
pulumi.set(__self__, "tls_server_name", tls_server_name)
|
|
145
|
+
if token is not None:
|
|
146
|
+
pulumi.set(__self__, "token", token)
|
|
147
|
+
if token_name is not None:
|
|
148
|
+
pulumi.set(__self__, "token_name", token_name)
|
|
149
|
+
if vault_version_override is not None:
|
|
150
|
+
pulumi.set(__self__, "vault_version_override", vault_version_override)
|
|
151
|
+
|
|
152
|
+
@_builtins.property
|
|
153
|
+
@pulumi.getter(name="addAddressToEnv")
|
|
154
|
+
def add_address_to_env(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
155
|
+
return pulumi.get(self, "add_address_to_env")
|
|
156
|
+
|
|
157
|
+
@add_address_to_env.setter
|
|
158
|
+
def add_address_to_env(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
159
|
+
pulumi.set(self, "add_address_to_env", value)
|
|
160
|
+
|
|
161
|
+
@_builtins.property
|
|
162
|
+
@pulumi.getter
|
|
163
|
+
def address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
164
|
+
"""
|
|
165
|
+
URL of the root of the target Vault server.
|
|
166
|
+
"""
|
|
167
|
+
return pulumi.get(self, "address")
|
|
168
|
+
|
|
169
|
+
@address.setter
|
|
170
|
+
def address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
171
|
+
pulumi.set(self, "address", value)
|
|
172
|
+
|
|
173
|
+
@_builtins.property
|
|
174
|
+
@pulumi.getter(name="authLogin")
|
|
175
|
+
def auth_login(self) -> Optional[pulumi.Input['ProviderAuthLoginArgs']]:
|
|
176
|
+
"""
|
|
177
|
+
Login to vault with an existing auth method using auth/<mount>/login
|
|
178
|
+
"""
|
|
179
|
+
return pulumi.get(self, "auth_login")
|
|
180
|
+
|
|
181
|
+
@auth_login.setter
|
|
182
|
+
def auth_login(self, value: Optional[pulumi.Input['ProviderAuthLoginArgs']]):
|
|
183
|
+
pulumi.set(self, "auth_login", value)
|
|
184
|
+
|
|
185
|
+
@_builtins.property
|
|
186
|
+
@pulumi.getter(name="authLoginAws")
|
|
187
|
+
def auth_login_aws(self) -> Optional[pulumi.Input['ProviderAuthLoginAwsArgs']]:
|
|
188
|
+
"""
|
|
189
|
+
Login to vault using the AWS method
|
|
190
|
+
"""
|
|
191
|
+
return pulumi.get(self, "auth_login_aws")
|
|
192
|
+
|
|
193
|
+
@auth_login_aws.setter
|
|
194
|
+
def auth_login_aws(self, value: Optional[pulumi.Input['ProviderAuthLoginAwsArgs']]):
|
|
195
|
+
pulumi.set(self, "auth_login_aws", value)
|
|
196
|
+
|
|
197
|
+
@_builtins.property
|
|
198
|
+
@pulumi.getter(name="authLoginAzure")
|
|
199
|
+
def auth_login_azure(self) -> Optional[pulumi.Input['ProviderAuthLoginAzureArgs']]:
|
|
200
|
+
"""
|
|
201
|
+
Login to vault using the azure method
|
|
202
|
+
"""
|
|
203
|
+
return pulumi.get(self, "auth_login_azure")
|
|
204
|
+
|
|
205
|
+
@auth_login_azure.setter
|
|
206
|
+
def auth_login_azure(self, value: Optional[pulumi.Input['ProviderAuthLoginAzureArgs']]):
|
|
207
|
+
pulumi.set(self, "auth_login_azure", value)
|
|
208
|
+
|
|
209
|
+
@_builtins.property
|
|
210
|
+
@pulumi.getter(name="authLoginCert")
|
|
211
|
+
def auth_login_cert(self) -> Optional[pulumi.Input['ProviderAuthLoginCertArgs']]:
|
|
212
|
+
"""
|
|
213
|
+
Login to vault using the cert method
|
|
214
|
+
"""
|
|
215
|
+
return pulumi.get(self, "auth_login_cert")
|
|
216
|
+
|
|
217
|
+
@auth_login_cert.setter
|
|
218
|
+
def auth_login_cert(self, value: Optional[pulumi.Input['ProviderAuthLoginCertArgs']]):
|
|
219
|
+
pulumi.set(self, "auth_login_cert", value)
|
|
220
|
+
|
|
221
|
+
@_builtins.property
|
|
222
|
+
@pulumi.getter(name="authLoginGcp")
|
|
223
|
+
def auth_login_gcp(self) -> Optional[pulumi.Input['ProviderAuthLoginGcpArgs']]:
|
|
224
|
+
"""
|
|
225
|
+
Login to vault using the gcp method
|
|
226
|
+
"""
|
|
227
|
+
return pulumi.get(self, "auth_login_gcp")
|
|
228
|
+
|
|
229
|
+
@auth_login_gcp.setter
|
|
230
|
+
def auth_login_gcp(self, value: Optional[pulumi.Input['ProviderAuthLoginGcpArgs']]):
|
|
231
|
+
pulumi.set(self, "auth_login_gcp", value)
|
|
232
|
+
|
|
233
|
+
@_builtins.property
|
|
234
|
+
@pulumi.getter(name="authLoginJwt")
|
|
235
|
+
def auth_login_jwt(self) -> Optional[pulumi.Input['ProviderAuthLoginJwtArgs']]:
|
|
236
|
+
"""
|
|
237
|
+
Login to vault using the jwt method
|
|
238
|
+
"""
|
|
239
|
+
return pulumi.get(self, "auth_login_jwt")
|
|
240
|
+
|
|
241
|
+
@auth_login_jwt.setter
|
|
242
|
+
def auth_login_jwt(self, value: Optional[pulumi.Input['ProviderAuthLoginJwtArgs']]):
|
|
243
|
+
pulumi.set(self, "auth_login_jwt", value)
|
|
244
|
+
|
|
245
|
+
@_builtins.property
|
|
246
|
+
@pulumi.getter(name="authLoginKerberos")
|
|
247
|
+
def auth_login_kerberos(self) -> Optional[pulumi.Input['ProviderAuthLoginKerberosArgs']]:
|
|
248
|
+
"""
|
|
249
|
+
Login to vault using the kerberos method
|
|
250
|
+
"""
|
|
251
|
+
return pulumi.get(self, "auth_login_kerberos")
|
|
252
|
+
|
|
253
|
+
@auth_login_kerberos.setter
|
|
254
|
+
def auth_login_kerberos(self, value: Optional[pulumi.Input['ProviderAuthLoginKerberosArgs']]):
|
|
255
|
+
pulumi.set(self, "auth_login_kerberos", value)
|
|
256
|
+
|
|
257
|
+
@_builtins.property
|
|
258
|
+
@pulumi.getter(name="authLoginOci")
|
|
259
|
+
def auth_login_oci(self) -> Optional[pulumi.Input['ProviderAuthLoginOciArgs']]:
|
|
260
|
+
"""
|
|
261
|
+
Login to vault using the OCI method
|
|
262
|
+
"""
|
|
263
|
+
return pulumi.get(self, "auth_login_oci")
|
|
264
|
+
|
|
265
|
+
@auth_login_oci.setter
|
|
266
|
+
def auth_login_oci(self, value: Optional[pulumi.Input['ProviderAuthLoginOciArgs']]):
|
|
267
|
+
pulumi.set(self, "auth_login_oci", value)
|
|
268
|
+
|
|
269
|
+
@_builtins.property
|
|
270
|
+
@pulumi.getter(name="authLoginOidc")
|
|
271
|
+
def auth_login_oidc(self) -> Optional[pulumi.Input['ProviderAuthLoginOidcArgs']]:
|
|
272
|
+
"""
|
|
273
|
+
Login to vault using the oidc method
|
|
274
|
+
"""
|
|
275
|
+
return pulumi.get(self, "auth_login_oidc")
|
|
276
|
+
|
|
277
|
+
@auth_login_oidc.setter
|
|
278
|
+
def auth_login_oidc(self, value: Optional[pulumi.Input['ProviderAuthLoginOidcArgs']]):
|
|
279
|
+
pulumi.set(self, "auth_login_oidc", value)
|
|
280
|
+
|
|
281
|
+
@_builtins.property
|
|
282
|
+
@pulumi.getter(name="authLoginRadius")
|
|
283
|
+
def auth_login_radius(self) -> Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']]:
|
|
284
|
+
"""
|
|
285
|
+
Login to vault using the radius method
|
|
286
|
+
"""
|
|
287
|
+
return pulumi.get(self, "auth_login_radius")
|
|
288
|
+
|
|
289
|
+
@auth_login_radius.setter
|
|
290
|
+
def auth_login_radius(self, value: Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']]):
|
|
291
|
+
pulumi.set(self, "auth_login_radius", value)
|
|
292
|
+
|
|
293
|
+
@_builtins.property
|
|
294
|
+
@pulumi.getter(name="authLoginTokenFile")
|
|
295
|
+
def auth_login_token_file(self) -> Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']]:
|
|
296
|
+
"""
|
|
297
|
+
Login to vault using
|
|
298
|
+
"""
|
|
299
|
+
return pulumi.get(self, "auth_login_token_file")
|
|
300
|
+
|
|
301
|
+
@auth_login_token_file.setter
|
|
302
|
+
def auth_login_token_file(self, value: Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']]):
|
|
303
|
+
pulumi.set(self, "auth_login_token_file", value)
|
|
304
|
+
|
|
305
|
+
@_builtins.property
|
|
306
|
+
@pulumi.getter(name="authLoginUserpass")
|
|
307
|
+
def auth_login_userpass(self) -> Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']]:
|
|
308
|
+
"""
|
|
309
|
+
Login to vault using the userpass method
|
|
310
|
+
"""
|
|
311
|
+
return pulumi.get(self, "auth_login_userpass")
|
|
312
|
+
|
|
313
|
+
@auth_login_userpass.setter
|
|
314
|
+
def auth_login_userpass(self, value: Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']]):
|
|
315
|
+
pulumi.set(self, "auth_login_userpass", value)
|
|
316
|
+
|
|
317
|
+
@_builtins.property
|
|
318
|
+
@pulumi.getter(name="caCertDir")
|
|
319
|
+
def ca_cert_dir(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
320
|
+
"""
|
|
321
|
+
Path to directory containing CA certificate files to validate the server's certificate.
|
|
322
|
+
"""
|
|
323
|
+
return pulumi.get(self, "ca_cert_dir")
|
|
324
|
+
|
|
325
|
+
@ca_cert_dir.setter
|
|
326
|
+
def ca_cert_dir(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
327
|
+
pulumi.set(self, "ca_cert_dir", value)
|
|
328
|
+
|
|
329
|
+
@_builtins.property
|
|
330
|
+
@pulumi.getter(name="caCertFile")
|
|
331
|
+
def ca_cert_file(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
332
|
+
"""
|
|
333
|
+
Path to a CA certificate file to validate the server's certificate.
|
|
334
|
+
"""
|
|
335
|
+
return pulumi.get(self, "ca_cert_file")
|
|
336
|
+
|
|
337
|
+
@ca_cert_file.setter
|
|
338
|
+
def ca_cert_file(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
339
|
+
pulumi.set(self, "ca_cert_file", value)
|
|
340
|
+
|
|
341
|
+
@_builtins.property
|
|
342
|
+
@pulumi.getter(name="clientAuth")
|
|
343
|
+
def client_auth(self) -> Optional[pulumi.Input['ProviderClientAuthArgs']]:
|
|
344
|
+
"""
|
|
345
|
+
Client authentication credentials.
|
|
346
|
+
"""
|
|
347
|
+
return pulumi.get(self, "client_auth")
|
|
348
|
+
|
|
349
|
+
@client_auth.setter
|
|
350
|
+
def client_auth(self, value: Optional[pulumi.Input['ProviderClientAuthArgs']]):
|
|
351
|
+
pulumi.set(self, "client_auth", value)
|
|
352
|
+
|
|
353
|
+
@_builtins.property
|
|
354
|
+
@pulumi.getter
|
|
355
|
+
def headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]]:
|
|
356
|
+
"""
|
|
357
|
+
The headers to send with each Vault request.
|
|
358
|
+
"""
|
|
359
|
+
return pulumi.get(self, "headers")
|
|
360
|
+
|
|
361
|
+
@headers.setter
|
|
362
|
+
def headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]]):
|
|
363
|
+
pulumi.set(self, "headers", value)
|
|
364
|
+
|
|
365
|
+
@_builtins.property
|
|
366
|
+
@pulumi.getter(name="maxLeaseTtlSeconds")
|
|
367
|
+
def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
368
|
+
"""
|
|
369
|
+
Maximum TTL for secret leases requested by this provider.
|
|
370
|
+
"""
|
|
371
|
+
return pulumi.get(self, "max_lease_ttl_seconds")
|
|
372
|
+
|
|
373
|
+
@max_lease_ttl_seconds.setter
|
|
374
|
+
def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
375
|
+
pulumi.set(self, "max_lease_ttl_seconds", value)
|
|
376
|
+
|
|
377
|
+
@_builtins.property
|
|
378
|
+
@pulumi.getter(name="maxRetries")
|
|
379
|
+
def max_retries(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
380
|
+
"""
|
|
381
|
+
Maximum number of retries when a 5xx error code is encountered.
|
|
382
|
+
"""
|
|
383
|
+
return pulumi.get(self, "max_retries")
|
|
384
|
+
|
|
385
|
+
@max_retries.setter
|
|
386
|
+
def max_retries(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
387
|
+
pulumi.set(self, "max_retries", value)
|
|
388
|
+
|
|
389
|
+
@_builtins.property
|
|
390
|
+
@pulumi.getter(name="maxRetriesCcc")
|
|
391
|
+
def max_retries_ccc(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
392
|
+
"""
|
|
393
|
+
Maximum number of retries for Client Controlled Consistency related operations
|
|
394
|
+
"""
|
|
395
|
+
return pulumi.get(self, "max_retries_ccc")
|
|
396
|
+
|
|
397
|
+
@max_retries_ccc.setter
|
|
398
|
+
def max_retries_ccc(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
399
|
+
pulumi.set(self, "max_retries_ccc", value)
|
|
400
|
+
|
|
401
|
+
@_builtins.property
|
|
402
|
+
@pulumi.getter
|
|
403
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
404
|
+
"""
|
|
405
|
+
The namespace to use. Available only for Vault Enterprise.
|
|
406
|
+
"""
|
|
407
|
+
return pulumi.get(self, "namespace")
|
|
408
|
+
|
|
409
|
+
@namespace.setter
|
|
410
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
411
|
+
pulumi.set(self, "namespace", value)
|
|
412
|
+
|
|
413
|
+
@_builtins.property
|
|
414
|
+
@pulumi.getter(name="setNamespaceFromToken")
|
|
415
|
+
def set_namespace_from_token(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
416
|
+
"""
|
|
417
|
+
In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
|
|
418
|
+
"""
|
|
419
|
+
return pulumi.get(self, "set_namespace_from_token")
|
|
420
|
+
|
|
421
|
+
@set_namespace_from_token.setter
|
|
422
|
+
def set_namespace_from_token(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
423
|
+
pulumi.set(self, "set_namespace_from_token", value)
|
|
424
|
+
|
|
425
|
+
@_builtins.property
|
|
426
|
+
@pulumi.getter(name="skipChildToken")
|
|
427
|
+
def skip_child_token(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
428
|
+
"""
|
|
429
|
+
Set this to true to prevent the creation of ephemeral child token used by this provider.
|
|
430
|
+
"""
|
|
431
|
+
return pulumi.get(self, "skip_child_token")
|
|
432
|
+
|
|
433
|
+
@skip_child_token.setter
|
|
434
|
+
def skip_child_token(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
435
|
+
pulumi.set(self, "skip_child_token", value)
|
|
436
|
+
|
|
437
|
+
@_builtins.property
|
|
438
|
+
@pulumi.getter(name="skipGetVaultVersion")
|
|
439
|
+
def skip_get_vault_version(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
440
|
+
"""
|
|
441
|
+
Skip the dynamic fetching of the Vault server version.
|
|
442
|
+
"""
|
|
443
|
+
return pulumi.get(self, "skip_get_vault_version")
|
|
444
|
+
|
|
445
|
+
@skip_get_vault_version.setter
|
|
446
|
+
def skip_get_vault_version(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
447
|
+
pulumi.set(self, "skip_get_vault_version", value)
|
|
448
|
+
|
|
449
|
+
@_builtins.property
|
|
450
|
+
@pulumi.getter(name="skipTlsVerify")
|
|
451
|
+
def skip_tls_verify(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
452
|
+
"""
|
|
453
|
+
Set this to true only if the target Vault server is an insecure development instance.
|
|
454
|
+
"""
|
|
455
|
+
return pulumi.get(self, "skip_tls_verify")
|
|
456
|
+
|
|
457
|
+
@skip_tls_verify.setter
|
|
458
|
+
def skip_tls_verify(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
459
|
+
pulumi.set(self, "skip_tls_verify", value)
|
|
460
|
+
|
|
461
|
+
@_builtins.property
|
|
462
|
+
@pulumi.getter(name="tlsServerName")
|
|
463
|
+
def tls_server_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
464
|
+
"""
|
|
465
|
+
Name to use as the SNI host when connecting via TLS.
|
|
466
|
+
"""
|
|
467
|
+
return pulumi.get(self, "tls_server_name")
|
|
468
|
+
|
|
469
|
+
@tls_server_name.setter
|
|
470
|
+
def tls_server_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
471
|
+
pulumi.set(self, "tls_server_name", value)
|
|
472
|
+
|
|
473
|
+
@_builtins.property
|
|
474
|
+
@pulumi.getter
|
|
475
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
476
|
+
"""
|
|
477
|
+
Token to use to authenticate to Vault.
|
|
478
|
+
"""
|
|
479
|
+
return pulumi.get(self, "token")
|
|
480
|
+
|
|
481
|
+
@token.setter
|
|
482
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
483
|
+
pulumi.set(self, "token", value)
|
|
484
|
+
|
|
485
|
+
@_builtins.property
|
|
486
|
+
@pulumi.getter(name="tokenName")
|
|
487
|
+
def token_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
488
|
+
"""
|
|
489
|
+
Token name to use for creating the Vault child token.
|
|
490
|
+
"""
|
|
491
|
+
return pulumi.get(self, "token_name")
|
|
492
|
+
|
|
493
|
+
@token_name.setter
|
|
494
|
+
def token_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
495
|
+
pulumi.set(self, "token_name", value)
|
|
496
|
+
|
|
497
|
+
@_builtins.property
|
|
498
|
+
@pulumi.getter(name="vaultVersionOverride")
|
|
499
|
+
def vault_version_override(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
500
|
+
"""
|
|
501
|
+
Override the Vault server version, which is normally determined dynamically from the target Vault server
|
|
502
|
+
"""
|
|
503
|
+
return pulumi.get(self, "vault_version_override")
|
|
504
|
+
|
|
505
|
+
@vault_version_override.setter
|
|
506
|
+
def vault_version_override(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
507
|
+
pulumi.set(self, "vault_version_override", value)
|
|
508
|
+
|
|
509
|
+
|
|
510
|
+
@pulumi.type_token("pulumi:providers:vault")
|
|
511
|
+
class Provider(pulumi.ProviderResource):
|
|
512
|
+
@overload
|
|
513
|
+
def __init__(__self__,
|
|
514
|
+
resource_name: str,
|
|
515
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
516
|
+
add_address_to_env: Optional[pulumi.Input[_builtins.str]] = None,
|
|
517
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
|
518
|
+
auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
|
|
519
|
+
auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
|
|
520
|
+
auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
|
|
521
|
+
auth_login_cert: Optional[pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']]] = None,
|
|
522
|
+
auth_login_gcp: Optional[pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']]] = None,
|
|
523
|
+
auth_login_jwt: Optional[pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']]] = None,
|
|
524
|
+
auth_login_kerberos: Optional[pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']]] = None,
|
|
525
|
+
auth_login_oci: Optional[pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']]] = None,
|
|
526
|
+
auth_login_oidc: Optional[pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']]] = None,
|
|
527
|
+
auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
|
|
528
|
+
auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
|
|
529
|
+
auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
|
|
530
|
+
ca_cert_dir: Optional[pulumi.Input[_builtins.str]] = None,
|
|
531
|
+
ca_cert_file: Optional[pulumi.Input[_builtins.str]] = None,
|
|
532
|
+
client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
|
|
533
|
+
headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
|
|
534
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
535
|
+
max_retries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
536
|
+
max_retries_ccc: Optional[pulumi.Input[_builtins.int]] = None,
|
|
537
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
538
|
+
set_namespace_from_token: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
539
|
+
skip_child_token: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
540
|
+
skip_get_vault_version: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
541
|
+
skip_tls_verify: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
542
|
+
tls_server_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
543
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
544
|
+
token_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
545
|
+
vault_version_override: Optional[pulumi.Input[_builtins.str]] = None,
|
|
546
|
+
__props__=None):
|
|
547
|
+
"""
|
|
548
|
+
The provider type for the vault package. By default, resources use package-wide configuration
|
|
549
|
+
settings, however an explicit `Provider` instance may be created and passed during resource
|
|
550
|
+
construction to achieve fine-grained programmatic control over provider settings. See the
|
|
551
|
+
[documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information.
|
|
552
|
+
|
|
553
|
+
:param str resource_name: The name of the resource.
|
|
554
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
555
|
+
:param pulumi.Input[_builtins.str] address: URL of the root of the target Vault server.
|
|
556
|
+
:param pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']] auth_login: Login to vault with an existing auth method using auth/<mount>/login
|
|
557
|
+
:param pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']] auth_login_aws: Login to vault using the AWS method
|
|
558
|
+
:param pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']] auth_login_azure: Login to vault using the azure method
|
|
559
|
+
:param pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']] auth_login_cert: Login to vault using the cert method
|
|
560
|
+
:param pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']] auth_login_gcp: Login to vault using the gcp method
|
|
561
|
+
:param pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']] auth_login_jwt: Login to vault using the jwt method
|
|
562
|
+
:param pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']] auth_login_kerberos: Login to vault using the kerberos method
|
|
563
|
+
:param pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']] auth_login_oci: Login to vault using the OCI method
|
|
564
|
+
:param pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']] auth_login_oidc: Login to vault using the oidc method
|
|
565
|
+
:param pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']] auth_login_radius: Login to vault using the radius method
|
|
566
|
+
:param pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']] auth_login_token_file: Login to vault using
|
|
567
|
+
:param pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']] auth_login_userpass: Login to vault using the userpass method
|
|
568
|
+
:param pulumi.Input[_builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
|
|
569
|
+
:param pulumi.Input[_builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
|
|
570
|
+
:param pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']] client_auth: Client authentication credentials.
|
|
571
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]] headers: The headers to send with each Vault request.
|
|
572
|
+
:param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
|
|
573
|
+
:param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
|
|
574
|
+
:param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
|
|
575
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
|
|
576
|
+
:param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
|
|
577
|
+
:param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
|
|
578
|
+
:param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
|
|
579
|
+
:param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
|
|
580
|
+
:param pulumi.Input[_builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
|
|
581
|
+
:param pulumi.Input[_builtins.str] token: Token to use to authenticate to Vault.
|
|
582
|
+
:param pulumi.Input[_builtins.str] token_name: Token name to use for creating the Vault child token.
|
|
583
|
+
:param pulumi.Input[_builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
|
|
584
|
+
"""
|
|
585
|
+
...
|
|
586
|
+
@overload
|
|
587
|
+
def __init__(__self__,
|
|
588
|
+
resource_name: str,
|
|
589
|
+
args: Optional[ProviderArgs] = None,
|
|
590
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
591
|
+
"""
|
|
592
|
+
The provider type for the vault package. By default, resources use package-wide configuration
|
|
593
|
+
settings, however an explicit `Provider` instance may be created and passed during resource
|
|
594
|
+
construction to achieve fine-grained programmatic control over provider settings. See the
|
|
595
|
+
[documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information.
|
|
596
|
+
|
|
597
|
+
:param str resource_name: The name of the resource.
|
|
598
|
+
:param ProviderArgs args: The arguments to use to populate this resource's properties.
|
|
599
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
600
|
+
"""
|
|
601
|
+
...
|
|
602
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
603
|
+
resource_args, opts = _utilities.get_resource_args_opts(ProviderArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
604
|
+
if resource_args is not None:
|
|
605
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
606
|
+
else:
|
|
607
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
608
|
+
|
|
609
|
+
def _internal_init(__self__,
|
|
610
|
+
resource_name: str,
|
|
611
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
612
|
+
add_address_to_env: Optional[pulumi.Input[_builtins.str]] = None,
|
|
613
|
+
address: Optional[pulumi.Input[_builtins.str]] = None,
|
|
614
|
+
auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
|
|
615
|
+
auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
|
|
616
|
+
auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
|
|
617
|
+
auth_login_cert: Optional[pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']]] = None,
|
|
618
|
+
auth_login_gcp: Optional[pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']]] = None,
|
|
619
|
+
auth_login_jwt: Optional[pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']]] = None,
|
|
620
|
+
auth_login_kerberos: Optional[pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']]] = None,
|
|
621
|
+
auth_login_oci: Optional[pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']]] = None,
|
|
622
|
+
auth_login_oidc: Optional[pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']]] = None,
|
|
623
|
+
auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
|
|
624
|
+
auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
|
|
625
|
+
auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
|
|
626
|
+
ca_cert_dir: Optional[pulumi.Input[_builtins.str]] = None,
|
|
627
|
+
ca_cert_file: Optional[pulumi.Input[_builtins.str]] = None,
|
|
628
|
+
client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
|
|
629
|
+
headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
|
|
630
|
+
max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
|
|
631
|
+
max_retries: Optional[pulumi.Input[_builtins.int]] = None,
|
|
632
|
+
max_retries_ccc: Optional[pulumi.Input[_builtins.int]] = None,
|
|
633
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
634
|
+
set_namespace_from_token: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
635
|
+
skip_child_token: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
636
|
+
skip_get_vault_version: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
637
|
+
skip_tls_verify: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
638
|
+
tls_server_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
639
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
640
|
+
token_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
641
|
+
vault_version_override: Optional[pulumi.Input[_builtins.str]] = None,
|
|
642
|
+
__props__=None):
|
|
643
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
644
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
645
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
646
|
+
if opts.id is None:
|
|
647
|
+
if __props__ is not None:
|
|
648
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
649
|
+
__props__ = ProviderArgs.__new__(ProviderArgs)
|
|
650
|
+
|
|
651
|
+
__props__.__dict__["add_address_to_env"] = add_address_to_env
|
|
652
|
+
__props__.__dict__["address"] = address
|
|
653
|
+
__props__.__dict__["auth_login"] = pulumi.Output.from_input(auth_login).apply(pulumi.runtime.to_json) if auth_login is not None else None
|
|
654
|
+
__props__.__dict__["auth_login_aws"] = pulumi.Output.from_input(auth_login_aws).apply(pulumi.runtime.to_json) if auth_login_aws is not None else None
|
|
655
|
+
__props__.__dict__["auth_login_azure"] = pulumi.Output.from_input(auth_login_azure).apply(pulumi.runtime.to_json) if auth_login_azure is not None else None
|
|
656
|
+
__props__.__dict__["auth_login_cert"] = pulumi.Output.from_input(auth_login_cert).apply(pulumi.runtime.to_json) if auth_login_cert is not None else None
|
|
657
|
+
__props__.__dict__["auth_login_gcp"] = pulumi.Output.from_input(auth_login_gcp).apply(pulumi.runtime.to_json) if auth_login_gcp is not None else None
|
|
658
|
+
__props__.__dict__["auth_login_jwt"] = pulumi.Output.from_input(auth_login_jwt).apply(pulumi.runtime.to_json) if auth_login_jwt is not None else None
|
|
659
|
+
__props__.__dict__["auth_login_kerberos"] = pulumi.Output.from_input(auth_login_kerberos).apply(pulumi.runtime.to_json) if auth_login_kerberos is not None else None
|
|
660
|
+
__props__.__dict__["auth_login_oci"] = pulumi.Output.from_input(auth_login_oci).apply(pulumi.runtime.to_json) if auth_login_oci is not None else None
|
|
661
|
+
__props__.__dict__["auth_login_oidc"] = pulumi.Output.from_input(auth_login_oidc).apply(pulumi.runtime.to_json) if auth_login_oidc is not None else None
|
|
662
|
+
__props__.__dict__["auth_login_radius"] = pulumi.Output.from_input(auth_login_radius).apply(pulumi.runtime.to_json) if auth_login_radius is not None else None
|
|
663
|
+
__props__.__dict__["auth_login_token_file"] = pulumi.Output.from_input(auth_login_token_file).apply(pulumi.runtime.to_json) if auth_login_token_file is not None else None
|
|
664
|
+
__props__.__dict__["auth_login_userpass"] = pulumi.Output.from_input(auth_login_userpass).apply(pulumi.runtime.to_json) if auth_login_userpass is not None else None
|
|
665
|
+
__props__.__dict__["ca_cert_dir"] = ca_cert_dir
|
|
666
|
+
__props__.__dict__["ca_cert_file"] = ca_cert_file
|
|
667
|
+
__props__.__dict__["client_auth"] = pulumi.Output.from_input(client_auth).apply(pulumi.runtime.to_json) if client_auth is not None else None
|
|
668
|
+
__props__.__dict__["headers"] = pulumi.Output.from_input(headers).apply(pulumi.runtime.to_json) if headers is not None else None
|
|
669
|
+
if max_lease_ttl_seconds is None:
|
|
670
|
+
max_lease_ttl_seconds = (_utilities.get_env_int('TERRAFORM_VAULT_MAX_TTL') or 1200)
|
|
671
|
+
__props__.__dict__["max_lease_ttl_seconds"] = pulumi.Output.from_input(max_lease_ttl_seconds).apply(pulumi.runtime.to_json) if max_lease_ttl_seconds is not None else None
|
|
672
|
+
if max_retries is None:
|
|
673
|
+
max_retries = (_utilities.get_env_int('VAULT_MAX_RETRIES') or 2)
|
|
674
|
+
__props__.__dict__["max_retries"] = pulumi.Output.from_input(max_retries).apply(pulumi.runtime.to_json) if max_retries is not None else None
|
|
675
|
+
__props__.__dict__["max_retries_ccc"] = pulumi.Output.from_input(max_retries_ccc).apply(pulumi.runtime.to_json) if max_retries_ccc is not None else None
|
|
676
|
+
__props__.__dict__["namespace"] = namespace
|
|
677
|
+
__props__.__dict__["set_namespace_from_token"] = pulumi.Output.from_input(set_namespace_from_token).apply(pulumi.runtime.to_json) if set_namespace_from_token is not None else None
|
|
678
|
+
__props__.__dict__["skip_child_token"] = pulumi.Output.from_input(skip_child_token).apply(pulumi.runtime.to_json) if skip_child_token is not None else None
|
|
679
|
+
__props__.__dict__["skip_get_vault_version"] = pulumi.Output.from_input(skip_get_vault_version).apply(pulumi.runtime.to_json) if skip_get_vault_version is not None else None
|
|
680
|
+
if skip_tls_verify is None:
|
|
681
|
+
skip_tls_verify = _utilities.get_env_bool('VAULT_SKIP_VERIFY')
|
|
682
|
+
__props__.__dict__["skip_tls_verify"] = pulumi.Output.from_input(skip_tls_verify).apply(pulumi.runtime.to_json) if skip_tls_verify is not None else None
|
|
683
|
+
__props__.__dict__["tls_server_name"] = tls_server_name
|
|
684
|
+
__props__.__dict__["token"] = token
|
|
685
|
+
__props__.__dict__["token_name"] = token_name
|
|
686
|
+
__props__.__dict__["vault_version_override"] = vault_version_override
|
|
687
|
+
super(Provider, __self__).__init__(
|
|
688
|
+
'vault',
|
|
689
|
+
resource_name,
|
|
690
|
+
__props__,
|
|
691
|
+
opts)
|
|
692
|
+
|
|
693
|
+
@_builtins.property
|
|
694
|
+
@pulumi.getter(name="addAddressToEnv")
|
|
695
|
+
def add_address_to_env(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
696
|
+
return pulumi.get(self, "add_address_to_env")
|
|
697
|
+
|
|
698
|
+
@_builtins.property
|
|
699
|
+
@pulumi.getter
|
|
700
|
+
def address(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
701
|
+
"""
|
|
702
|
+
URL of the root of the target Vault server.
|
|
703
|
+
"""
|
|
704
|
+
return pulumi.get(self, "address")
|
|
705
|
+
|
|
706
|
+
@_builtins.property
|
|
707
|
+
@pulumi.getter(name="caCertDir")
|
|
708
|
+
def ca_cert_dir(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
709
|
+
"""
|
|
710
|
+
Path to directory containing CA certificate files to validate the server's certificate.
|
|
711
|
+
"""
|
|
712
|
+
return pulumi.get(self, "ca_cert_dir")
|
|
713
|
+
|
|
714
|
+
@_builtins.property
|
|
715
|
+
@pulumi.getter(name="caCertFile")
|
|
716
|
+
def ca_cert_file(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
717
|
+
"""
|
|
718
|
+
Path to a CA certificate file to validate the server's certificate.
|
|
719
|
+
"""
|
|
720
|
+
return pulumi.get(self, "ca_cert_file")
|
|
721
|
+
|
|
722
|
+
@_builtins.property
|
|
723
|
+
@pulumi.getter
|
|
724
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
725
|
+
"""
|
|
726
|
+
The namespace to use. Available only for Vault Enterprise.
|
|
727
|
+
"""
|
|
728
|
+
return pulumi.get(self, "namespace")
|
|
729
|
+
|
|
730
|
+
@_builtins.property
|
|
731
|
+
@pulumi.getter(name="tlsServerName")
|
|
732
|
+
def tls_server_name(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
733
|
+
"""
|
|
734
|
+
Name to use as the SNI host when connecting via TLS.
|
|
735
|
+
"""
|
|
736
|
+
return pulumi.get(self, "tls_server_name")
|
|
737
|
+
|
|
738
|
+
@_builtins.property
|
|
739
|
+
@pulumi.getter
|
|
740
|
+
def token(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
741
|
+
"""
|
|
742
|
+
Token to use to authenticate to Vault.
|
|
743
|
+
"""
|
|
744
|
+
return pulumi.get(self, "token")
|
|
745
|
+
|
|
746
|
+
@_builtins.property
|
|
747
|
+
@pulumi.getter(name="tokenName")
|
|
748
|
+
def token_name(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
749
|
+
"""
|
|
750
|
+
Token name to use for creating the Vault child token.
|
|
751
|
+
"""
|
|
752
|
+
return pulumi.get(self, "token_name")
|
|
753
|
+
|
|
754
|
+
@_builtins.property
|
|
755
|
+
@pulumi.getter(name="vaultVersionOverride")
|
|
756
|
+
def vault_version_override(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
757
|
+
"""
|
|
758
|
+
Override the Vault server version, which is normally determined dynamically from the target Vault server
|
|
759
|
+
"""
|
|
760
|
+
return pulumi.get(self, "vault_version_override")
|
|
761
|
+
|
|
762
|
+
@pulumi.output_type
|
|
763
|
+
class TerraformConfigResult:
|
|
764
|
+
def __init__(__self__, result=None):
|
|
765
|
+
if result and not isinstance(result, dict):
|
|
766
|
+
raise TypeError("Expected argument 'result' to be a dict")
|
|
767
|
+
pulumi.set(__self__, "result", result)
|
|
768
|
+
|
|
769
|
+
@_builtins.property
|
|
770
|
+
@pulumi.getter
|
|
771
|
+
def result(self) -> Mapping[str, Any]:
|
|
772
|
+
return pulumi.get(self, "result")
|
|
773
|
+
|
|
774
|
+
def terraform_config(__self__) -> pulumi.Output['Provider.TerraformConfigResult']:
|
|
775
|
+
"""
|
|
776
|
+
This function returns a Terraform config object with terraform-namecased keys,to be used with the Terraform Module Provider.
|
|
777
|
+
"""
|
|
778
|
+
__args__ = dict()
|
|
779
|
+
__args__['__self__'] = __self__
|
|
780
|
+
return pulumi.runtime.call('pulumi:providers:vault/terraformConfig', __args__, res=__self__, typ=Provider.TerraformConfigResult)
|
|
781
|
+
|