pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,781 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+ from ._inputs import *
17
+
18
+ __all__ = ['ProviderArgs', 'Provider']
19
+
20
+ @pulumi.input_type
21
+ class ProviderArgs:
22
+ def __init__(__self__, *,
23
+ add_address_to_env: Optional[pulumi.Input[_builtins.str]] = None,
24
+ address: Optional[pulumi.Input[_builtins.str]] = None,
25
+ auth_login: Optional[pulumi.Input['ProviderAuthLoginArgs']] = None,
26
+ auth_login_aws: Optional[pulumi.Input['ProviderAuthLoginAwsArgs']] = None,
27
+ auth_login_azure: Optional[pulumi.Input['ProviderAuthLoginAzureArgs']] = None,
28
+ auth_login_cert: Optional[pulumi.Input['ProviderAuthLoginCertArgs']] = None,
29
+ auth_login_gcp: Optional[pulumi.Input['ProviderAuthLoginGcpArgs']] = None,
30
+ auth_login_jwt: Optional[pulumi.Input['ProviderAuthLoginJwtArgs']] = None,
31
+ auth_login_kerberos: Optional[pulumi.Input['ProviderAuthLoginKerberosArgs']] = None,
32
+ auth_login_oci: Optional[pulumi.Input['ProviderAuthLoginOciArgs']] = None,
33
+ auth_login_oidc: Optional[pulumi.Input['ProviderAuthLoginOidcArgs']] = None,
34
+ auth_login_radius: Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']] = None,
35
+ auth_login_token_file: Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']] = None,
36
+ auth_login_userpass: Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']] = None,
37
+ ca_cert_dir: Optional[pulumi.Input[_builtins.str]] = None,
38
+ ca_cert_file: Optional[pulumi.Input[_builtins.str]] = None,
39
+ client_auth: Optional[pulumi.Input['ProviderClientAuthArgs']] = None,
40
+ headers: Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]] = None,
41
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
42
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
43
+ max_retries_ccc: Optional[pulumi.Input[_builtins.int]] = None,
44
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
45
+ set_namespace_from_token: Optional[pulumi.Input[_builtins.bool]] = None,
46
+ skip_child_token: Optional[pulumi.Input[_builtins.bool]] = None,
47
+ skip_get_vault_version: Optional[pulumi.Input[_builtins.bool]] = None,
48
+ skip_tls_verify: Optional[pulumi.Input[_builtins.bool]] = None,
49
+ tls_server_name: Optional[pulumi.Input[_builtins.str]] = None,
50
+ token: Optional[pulumi.Input[_builtins.str]] = None,
51
+ token_name: Optional[pulumi.Input[_builtins.str]] = None,
52
+ vault_version_override: Optional[pulumi.Input[_builtins.str]] = None):
53
+ """
54
+ The set of arguments for constructing a Provider resource.
55
+ :param pulumi.Input[_builtins.str] address: URL of the root of the target Vault server.
56
+ :param pulumi.Input['ProviderAuthLoginArgs'] auth_login: Login to vault with an existing auth method using auth/<mount>/login
57
+ :param pulumi.Input['ProviderAuthLoginAwsArgs'] auth_login_aws: Login to vault using the AWS method
58
+ :param pulumi.Input['ProviderAuthLoginAzureArgs'] auth_login_azure: Login to vault using the azure method
59
+ :param pulumi.Input['ProviderAuthLoginCertArgs'] auth_login_cert: Login to vault using the cert method
60
+ :param pulumi.Input['ProviderAuthLoginGcpArgs'] auth_login_gcp: Login to vault using the gcp method
61
+ :param pulumi.Input['ProviderAuthLoginJwtArgs'] auth_login_jwt: Login to vault using the jwt method
62
+ :param pulumi.Input['ProviderAuthLoginKerberosArgs'] auth_login_kerberos: Login to vault using the kerberos method
63
+ :param pulumi.Input['ProviderAuthLoginOciArgs'] auth_login_oci: Login to vault using the OCI method
64
+ :param pulumi.Input['ProviderAuthLoginOidcArgs'] auth_login_oidc: Login to vault using the oidc method
65
+ :param pulumi.Input['ProviderAuthLoginRadiusArgs'] auth_login_radius: Login to vault using the radius method
66
+ :param pulumi.Input['ProviderAuthLoginTokenFileArgs'] auth_login_token_file: Login to vault using
67
+ :param pulumi.Input['ProviderAuthLoginUserpassArgs'] auth_login_userpass: Login to vault using the userpass method
68
+ :param pulumi.Input[_builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
69
+ :param pulumi.Input[_builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
70
+ :param pulumi.Input['ProviderClientAuthArgs'] client_auth: Client authentication credentials.
71
+ :param pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]] headers: The headers to send with each Vault request.
72
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
73
+ :param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
74
+ :param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
75
+ :param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
76
+ :param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
77
+ :param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
78
+ :param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
79
+ :param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
80
+ :param pulumi.Input[_builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
81
+ :param pulumi.Input[_builtins.str] token: Token to use to authenticate to Vault.
82
+ :param pulumi.Input[_builtins.str] token_name: Token name to use for creating the Vault child token.
83
+ :param pulumi.Input[_builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
84
+ """
85
+ if add_address_to_env is not None:
86
+ pulumi.set(__self__, "add_address_to_env", add_address_to_env)
87
+ if address is not None:
88
+ pulumi.set(__self__, "address", address)
89
+ if auth_login is not None:
90
+ pulumi.set(__self__, "auth_login", auth_login)
91
+ if auth_login_aws is not None:
92
+ pulumi.set(__self__, "auth_login_aws", auth_login_aws)
93
+ if auth_login_azure is not None:
94
+ pulumi.set(__self__, "auth_login_azure", auth_login_azure)
95
+ if auth_login_cert is not None:
96
+ pulumi.set(__self__, "auth_login_cert", auth_login_cert)
97
+ if auth_login_gcp is not None:
98
+ pulumi.set(__self__, "auth_login_gcp", auth_login_gcp)
99
+ if auth_login_jwt is not None:
100
+ pulumi.set(__self__, "auth_login_jwt", auth_login_jwt)
101
+ if auth_login_kerberos is not None:
102
+ pulumi.set(__self__, "auth_login_kerberos", auth_login_kerberos)
103
+ if auth_login_oci is not None:
104
+ pulumi.set(__self__, "auth_login_oci", auth_login_oci)
105
+ if auth_login_oidc is not None:
106
+ pulumi.set(__self__, "auth_login_oidc", auth_login_oidc)
107
+ if auth_login_radius is not None:
108
+ pulumi.set(__self__, "auth_login_radius", auth_login_radius)
109
+ if auth_login_token_file is not None:
110
+ pulumi.set(__self__, "auth_login_token_file", auth_login_token_file)
111
+ if auth_login_userpass is not None:
112
+ pulumi.set(__self__, "auth_login_userpass", auth_login_userpass)
113
+ if ca_cert_dir is not None:
114
+ pulumi.set(__self__, "ca_cert_dir", ca_cert_dir)
115
+ if ca_cert_file is not None:
116
+ pulumi.set(__self__, "ca_cert_file", ca_cert_file)
117
+ if client_auth is not None:
118
+ pulumi.set(__self__, "client_auth", client_auth)
119
+ if headers is not None:
120
+ pulumi.set(__self__, "headers", headers)
121
+ if max_lease_ttl_seconds is None:
122
+ max_lease_ttl_seconds = (_utilities.get_env_int('TERRAFORM_VAULT_MAX_TTL') or 1200)
123
+ if max_lease_ttl_seconds is not None:
124
+ pulumi.set(__self__, "max_lease_ttl_seconds", max_lease_ttl_seconds)
125
+ if max_retries is None:
126
+ max_retries = (_utilities.get_env_int('VAULT_MAX_RETRIES') or 2)
127
+ if max_retries is not None:
128
+ pulumi.set(__self__, "max_retries", max_retries)
129
+ if max_retries_ccc is not None:
130
+ pulumi.set(__self__, "max_retries_ccc", max_retries_ccc)
131
+ if namespace is not None:
132
+ pulumi.set(__self__, "namespace", namespace)
133
+ if set_namespace_from_token is not None:
134
+ pulumi.set(__self__, "set_namespace_from_token", set_namespace_from_token)
135
+ if skip_child_token is not None:
136
+ pulumi.set(__self__, "skip_child_token", skip_child_token)
137
+ if skip_get_vault_version is not None:
138
+ pulumi.set(__self__, "skip_get_vault_version", skip_get_vault_version)
139
+ if skip_tls_verify is None:
140
+ skip_tls_verify = _utilities.get_env_bool('VAULT_SKIP_VERIFY')
141
+ if skip_tls_verify is not None:
142
+ pulumi.set(__self__, "skip_tls_verify", skip_tls_verify)
143
+ if tls_server_name is not None:
144
+ pulumi.set(__self__, "tls_server_name", tls_server_name)
145
+ if token is not None:
146
+ pulumi.set(__self__, "token", token)
147
+ if token_name is not None:
148
+ pulumi.set(__self__, "token_name", token_name)
149
+ if vault_version_override is not None:
150
+ pulumi.set(__self__, "vault_version_override", vault_version_override)
151
+
152
+ @_builtins.property
153
+ @pulumi.getter(name="addAddressToEnv")
154
+ def add_address_to_env(self) -> Optional[pulumi.Input[_builtins.str]]:
155
+ return pulumi.get(self, "add_address_to_env")
156
+
157
+ @add_address_to_env.setter
158
+ def add_address_to_env(self, value: Optional[pulumi.Input[_builtins.str]]):
159
+ pulumi.set(self, "add_address_to_env", value)
160
+
161
+ @_builtins.property
162
+ @pulumi.getter
163
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
164
+ """
165
+ URL of the root of the target Vault server.
166
+ """
167
+ return pulumi.get(self, "address")
168
+
169
+ @address.setter
170
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
171
+ pulumi.set(self, "address", value)
172
+
173
+ @_builtins.property
174
+ @pulumi.getter(name="authLogin")
175
+ def auth_login(self) -> Optional[pulumi.Input['ProviderAuthLoginArgs']]:
176
+ """
177
+ Login to vault with an existing auth method using auth/<mount>/login
178
+ """
179
+ return pulumi.get(self, "auth_login")
180
+
181
+ @auth_login.setter
182
+ def auth_login(self, value: Optional[pulumi.Input['ProviderAuthLoginArgs']]):
183
+ pulumi.set(self, "auth_login", value)
184
+
185
+ @_builtins.property
186
+ @pulumi.getter(name="authLoginAws")
187
+ def auth_login_aws(self) -> Optional[pulumi.Input['ProviderAuthLoginAwsArgs']]:
188
+ """
189
+ Login to vault using the AWS method
190
+ """
191
+ return pulumi.get(self, "auth_login_aws")
192
+
193
+ @auth_login_aws.setter
194
+ def auth_login_aws(self, value: Optional[pulumi.Input['ProviderAuthLoginAwsArgs']]):
195
+ pulumi.set(self, "auth_login_aws", value)
196
+
197
+ @_builtins.property
198
+ @pulumi.getter(name="authLoginAzure")
199
+ def auth_login_azure(self) -> Optional[pulumi.Input['ProviderAuthLoginAzureArgs']]:
200
+ """
201
+ Login to vault using the azure method
202
+ """
203
+ return pulumi.get(self, "auth_login_azure")
204
+
205
+ @auth_login_azure.setter
206
+ def auth_login_azure(self, value: Optional[pulumi.Input['ProviderAuthLoginAzureArgs']]):
207
+ pulumi.set(self, "auth_login_azure", value)
208
+
209
+ @_builtins.property
210
+ @pulumi.getter(name="authLoginCert")
211
+ def auth_login_cert(self) -> Optional[pulumi.Input['ProviderAuthLoginCertArgs']]:
212
+ """
213
+ Login to vault using the cert method
214
+ """
215
+ return pulumi.get(self, "auth_login_cert")
216
+
217
+ @auth_login_cert.setter
218
+ def auth_login_cert(self, value: Optional[pulumi.Input['ProviderAuthLoginCertArgs']]):
219
+ pulumi.set(self, "auth_login_cert", value)
220
+
221
+ @_builtins.property
222
+ @pulumi.getter(name="authLoginGcp")
223
+ def auth_login_gcp(self) -> Optional[pulumi.Input['ProviderAuthLoginGcpArgs']]:
224
+ """
225
+ Login to vault using the gcp method
226
+ """
227
+ return pulumi.get(self, "auth_login_gcp")
228
+
229
+ @auth_login_gcp.setter
230
+ def auth_login_gcp(self, value: Optional[pulumi.Input['ProviderAuthLoginGcpArgs']]):
231
+ pulumi.set(self, "auth_login_gcp", value)
232
+
233
+ @_builtins.property
234
+ @pulumi.getter(name="authLoginJwt")
235
+ def auth_login_jwt(self) -> Optional[pulumi.Input['ProviderAuthLoginJwtArgs']]:
236
+ """
237
+ Login to vault using the jwt method
238
+ """
239
+ return pulumi.get(self, "auth_login_jwt")
240
+
241
+ @auth_login_jwt.setter
242
+ def auth_login_jwt(self, value: Optional[pulumi.Input['ProviderAuthLoginJwtArgs']]):
243
+ pulumi.set(self, "auth_login_jwt", value)
244
+
245
+ @_builtins.property
246
+ @pulumi.getter(name="authLoginKerberos")
247
+ def auth_login_kerberos(self) -> Optional[pulumi.Input['ProviderAuthLoginKerberosArgs']]:
248
+ """
249
+ Login to vault using the kerberos method
250
+ """
251
+ return pulumi.get(self, "auth_login_kerberos")
252
+
253
+ @auth_login_kerberos.setter
254
+ def auth_login_kerberos(self, value: Optional[pulumi.Input['ProviderAuthLoginKerberosArgs']]):
255
+ pulumi.set(self, "auth_login_kerberos", value)
256
+
257
+ @_builtins.property
258
+ @pulumi.getter(name="authLoginOci")
259
+ def auth_login_oci(self) -> Optional[pulumi.Input['ProviderAuthLoginOciArgs']]:
260
+ """
261
+ Login to vault using the OCI method
262
+ """
263
+ return pulumi.get(self, "auth_login_oci")
264
+
265
+ @auth_login_oci.setter
266
+ def auth_login_oci(self, value: Optional[pulumi.Input['ProviderAuthLoginOciArgs']]):
267
+ pulumi.set(self, "auth_login_oci", value)
268
+
269
+ @_builtins.property
270
+ @pulumi.getter(name="authLoginOidc")
271
+ def auth_login_oidc(self) -> Optional[pulumi.Input['ProviderAuthLoginOidcArgs']]:
272
+ """
273
+ Login to vault using the oidc method
274
+ """
275
+ return pulumi.get(self, "auth_login_oidc")
276
+
277
+ @auth_login_oidc.setter
278
+ def auth_login_oidc(self, value: Optional[pulumi.Input['ProviderAuthLoginOidcArgs']]):
279
+ pulumi.set(self, "auth_login_oidc", value)
280
+
281
+ @_builtins.property
282
+ @pulumi.getter(name="authLoginRadius")
283
+ def auth_login_radius(self) -> Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']]:
284
+ """
285
+ Login to vault using the radius method
286
+ """
287
+ return pulumi.get(self, "auth_login_radius")
288
+
289
+ @auth_login_radius.setter
290
+ def auth_login_radius(self, value: Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']]):
291
+ pulumi.set(self, "auth_login_radius", value)
292
+
293
+ @_builtins.property
294
+ @pulumi.getter(name="authLoginTokenFile")
295
+ def auth_login_token_file(self) -> Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']]:
296
+ """
297
+ Login to vault using
298
+ """
299
+ return pulumi.get(self, "auth_login_token_file")
300
+
301
+ @auth_login_token_file.setter
302
+ def auth_login_token_file(self, value: Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']]):
303
+ pulumi.set(self, "auth_login_token_file", value)
304
+
305
+ @_builtins.property
306
+ @pulumi.getter(name="authLoginUserpass")
307
+ def auth_login_userpass(self) -> Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']]:
308
+ """
309
+ Login to vault using the userpass method
310
+ """
311
+ return pulumi.get(self, "auth_login_userpass")
312
+
313
+ @auth_login_userpass.setter
314
+ def auth_login_userpass(self, value: Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']]):
315
+ pulumi.set(self, "auth_login_userpass", value)
316
+
317
+ @_builtins.property
318
+ @pulumi.getter(name="caCertDir")
319
+ def ca_cert_dir(self) -> Optional[pulumi.Input[_builtins.str]]:
320
+ """
321
+ Path to directory containing CA certificate files to validate the server's certificate.
322
+ """
323
+ return pulumi.get(self, "ca_cert_dir")
324
+
325
+ @ca_cert_dir.setter
326
+ def ca_cert_dir(self, value: Optional[pulumi.Input[_builtins.str]]):
327
+ pulumi.set(self, "ca_cert_dir", value)
328
+
329
+ @_builtins.property
330
+ @pulumi.getter(name="caCertFile")
331
+ def ca_cert_file(self) -> Optional[pulumi.Input[_builtins.str]]:
332
+ """
333
+ Path to a CA certificate file to validate the server's certificate.
334
+ """
335
+ return pulumi.get(self, "ca_cert_file")
336
+
337
+ @ca_cert_file.setter
338
+ def ca_cert_file(self, value: Optional[pulumi.Input[_builtins.str]]):
339
+ pulumi.set(self, "ca_cert_file", value)
340
+
341
+ @_builtins.property
342
+ @pulumi.getter(name="clientAuth")
343
+ def client_auth(self) -> Optional[pulumi.Input['ProviderClientAuthArgs']]:
344
+ """
345
+ Client authentication credentials.
346
+ """
347
+ return pulumi.get(self, "client_auth")
348
+
349
+ @client_auth.setter
350
+ def client_auth(self, value: Optional[pulumi.Input['ProviderClientAuthArgs']]):
351
+ pulumi.set(self, "client_auth", value)
352
+
353
+ @_builtins.property
354
+ @pulumi.getter
355
+ def headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]]:
356
+ """
357
+ The headers to send with each Vault request.
358
+ """
359
+ return pulumi.get(self, "headers")
360
+
361
+ @headers.setter
362
+ def headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]]):
363
+ pulumi.set(self, "headers", value)
364
+
365
+ @_builtins.property
366
+ @pulumi.getter(name="maxLeaseTtlSeconds")
367
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
368
+ """
369
+ Maximum TTL for secret leases requested by this provider.
370
+ """
371
+ return pulumi.get(self, "max_lease_ttl_seconds")
372
+
373
+ @max_lease_ttl_seconds.setter
374
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
375
+ pulumi.set(self, "max_lease_ttl_seconds", value)
376
+
377
+ @_builtins.property
378
+ @pulumi.getter(name="maxRetries")
379
+ def max_retries(self) -> Optional[pulumi.Input[_builtins.int]]:
380
+ """
381
+ Maximum number of retries when a 5xx error code is encountered.
382
+ """
383
+ return pulumi.get(self, "max_retries")
384
+
385
+ @max_retries.setter
386
+ def max_retries(self, value: Optional[pulumi.Input[_builtins.int]]):
387
+ pulumi.set(self, "max_retries", value)
388
+
389
+ @_builtins.property
390
+ @pulumi.getter(name="maxRetriesCcc")
391
+ def max_retries_ccc(self) -> Optional[pulumi.Input[_builtins.int]]:
392
+ """
393
+ Maximum number of retries for Client Controlled Consistency related operations
394
+ """
395
+ return pulumi.get(self, "max_retries_ccc")
396
+
397
+ @max_retries_ccc.setter
398
+ def max_retries_ccc(self, value: Optional[pulumi.Input[_builtins.int]]):
399
+ pulumi.set(self, "max_retries_ccc", value)
400
+
401
+ @_builtins.property
402
+ @pulumi.getter
403
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
404
+ """
405
+ The namespace to use. Available only for Vault Enterprise.
406
+ """
407
+ return pulumi.get(self, "namespace")
408
+
409
+ @namespace.setter
410
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
411
+ pulumi.set(self, "namespace", value)
412
+
413
+ @_builtins.property
414
+ @pulumi.getter(name="setNamespaceFromToken")
415
+ def set_namespace_from_token(self) -> Optional[pulumi.Input[_builtins.bool]]:
416
+ """
417
+ In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
418
+ """
419
+ return pulumi.get(self, "set_namespace_from_token")
420
+
421
+ @set_namespace_from_token.setter
422
+ def set_namespace_from_token(self, value: Optional[pulumi.Input[_builtins.bool]]):
423
+ pulumi.set(self, "set_namespace_from_token", value)
424
+
425
+ @_builtins.property
426
+ @pulumi.getter(name="skipChildToken")
427
+ def skip_child_token(self) -> Optional[pulumi.Input[_builtins.bool]]:
428
+ """
429
+ Set this to true to prevent the creation of ephemeral child token used by this provider.
430
+ """
431
+ return pulumi.get(self, "skip_child_token")
432
+
433
+ @skip_child_token.setter
434
+ def skip_child_token(self, value: Optional[pulumi.Input[_builtins.bool]]):
435
+ pulumi.set(self, "skip_child_token", value)
436
+
437
+ @_builtins.property
438
+ @pulumi.getter(name="skipGetVaultVersion")
439
+ def skip_get_vault_version(self) -> Optional[pulumi.Input[_builtins.bool]]:
440
+ """
441
+ Skip the dynamic fetching of the Vault server version.
442
+ """
443
+ return pulumi.get(self, "skip_get_vault_version")
444
+
445
+ @skip_get_vault_version.setter
446
+ def skip_get_vault_version(self, value: Optional[pulumi.Input[_builtins.bool]]):
447
+ pulumi.set(self, "skip_get_vault_version", value)
448
+
449
+ @_builtins.property
450
+ @pulumi.getter(name="skipTlsVerify")
451
+ def skip_tls_verify(self) -> Optional[pulumi.Input[_builtins.bool]]:
452
+ """
453
+ Set this to true only if the target Vault server is an insecure development instance.
454
+ """
455
+ return pulumi.get(self, "skip_tls_verify")
456
+
457
+ @skip_tls_verify.setter
458
+ def skip_tls_verify(self, value: Optional[pulumi.Input[_builtins.bool]]):
459
+ pulumi.set(self, "skip_tls_verify", value)
460
+
461
+ @_builtins.property
462
+ @pulumi.getter(name="tlsServerName")
463
+ def tls_server_name(self) -> Optional[pulumi.Input[_builtins.str]]:
464
+ """
465
+ Name to use as the SNI host when connecting via TLS.
466
+ """
467
+ return pulumi.get(self, "tls_server_name")
468
+
469
+ @tls_server_name.setter
470
+ def tls_server_name(self, value: Optional[pulumi.Input[_builtins.str]]):
471
+ pulumi.set(self, "tls_server_name", value)
472
+
473
+ @_builtins.property
474
+ @pulumi.getter
475
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
476
+ """
477
+ Token to use to authenticate to Vault.
478
+ """
479
+ return pulumi.get(self, "token")
480
+
481
+ @token.setter
482
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
483
+ pulumi.set(self, "token", value)
484
+
485
+ @_builtins.property
486
+ @pulumi.getter(name="tokenName")
487
+ def token_name(self) -> Optional[pulumi.Input[_builtins.str]]:
488
+ """
489
+ Token name to use for creating the Vault child token.
490
+ """
491
+ return pulumi.get(self, "token_name")
492
+
493
+ @token_name.setter
494
+ def token_name(self, value: Optional[pulumi.Input[_builtins.str]]):
495
+ pulumi.set(self, "token_name", value)
496
+
497
+ @_builtins.property
498
+ @pulumi.getter(name="vaultVersionOverride")
499
+ def vault_version_override(self) -> Optional[pulumi.Input[_builtins.str]]:
500
+ """
501
+ Override the Vault server version, which is normally determined dynamically from the target Vault server
502
+ """
503
+ return pulumi.get(self, "vault_version_override")
504
+
505
+ @vault_version_override.setter
506
+ def vault_version_override(self, value: Optional[pulumi.Input[_builtins.str]]):
507
+ pulumi.set(self, "vault_version_override", value)
508
+
509
+
510
+ @pulumi.type_token("pulumi:providers:vault")
511
+ class Provider(pulumi.ProviderResource):
512
+ @overload
513
+ def __init__(__self__,
514
+ resource_name: str,
515
+ opts: Optional[pulumi.ResourceOptions] = None,
516
+ add_address_to_env: Optional[pulumi.Input[_builtins.str]] = None,
517
+ address: Optional[pulumi.Input[_builtins.str]] = None,
518
+ auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
519
+ auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
520
+ auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
521
+ auth_login_cert: Optional[pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']]] = None,
522
+ auth_login_gcp: Optional[pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']]] = None,
523
+ auth_login_jwt: Optional[pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']]] = None,
524
+ auth_login_kerberos: Optional[pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']]] = None,
525
+ auth_login_oci: Optional[pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']]] = None,
526
+ auth_login_oidc: Optional[pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']]] = None,
527
+ auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
528
+ auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
529
+ auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
530
+ ca_cert_dir: Optional[pulumi.Input[_builtins.str]] = None,
531
+ ca_cert_file: Optional[pulumi.Input[_builtins.str]] = None,
532
+ client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
533
+ headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
534
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
535
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
536
+ max_retries_ccc: Optional[pulumi.Input[_builtins.int]] = None,
537
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
538
+ set_namespace_from_token: Optional[pulumi.Input[_builtins.bool]] = None,
539
+ skip_child_token: Optional[pulumi.Input[_builtins.bool]] = None,
540
+ skip_get_vault_version: Optional[pulumi.Input[_builtins.bool]] = None,
541
+ skip_tls_verify: Optional[pulumi.Input[_builtins.bool]] = None,
542
+ tls_server_name: Optional[pulumi.Input[_builtins.str]] = None,
543
+ token: Optional[pulumi.Input[_builtins.str]] = None,
544
+ token_name: Optional[pulumi.Input[_builtins.str]] = None,
545
+ vault_version_override: Optional[pulumi.Input[_builtins.str]] = None,
546
+ __props__=None):
547
+ """
548
+ The provider type for the vault package. By default, resources use package-wide configuration
549
+ settings, however an explicit `Provider` instance may be created and passed during resource
550
+ construction to achieve fine-grained programmatic control over provider settings. See the
551
+ [documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information.
552
+
553
+ :param str resource_name: The name of the resource.
554
+ :param pulumi.ResourceOptions opts: Options for the resource.
555
+ :param pulumi.Input[_builtins.str] address: URL of the root of the target Vault server.
556
+ :param pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']] auth_login: Login to vault with an existing auth method using auth/<mount>/login
557
+ :param pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']] auth_login_aws: Login to vault using the AWS method
558
+ :param pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']] auth_login_azure: Login to vault using the azure method
559
+ :param pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']] auth_login_cert: Login to vault using the cert method
560
+ :param pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']] auth_login_gcp: Login to vault using the gcp method
561
+ :param pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']] auth_login_jwt: Login to vault using the jwt method
562
+ :param pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']] auth_login_kerberos: Login to vault using the kerberos method
563
+ :param pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']] auth_login_oci: Login to vault using the OCI method
564
+ :param pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']] auth_login_oidc: Login to vault using the oidc method
565
+ :param pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']] auth_login_radius: Login to vault using the radius method
566
+ :param pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']] auth_login_token_file: Login to vault using
567
+ :param pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']] auth_login_userpass: Login to vault using the userpass method
568
+ :param pulumi.Input[_builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
569
+ :param pulumi.Input[_builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
570
+ :param pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']] client_auth: Client authentication credentials.
571
+ :param pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]] headers: The headers to send with each Vault request.
572
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
573
+ :param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
574
+ :param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
575
+ :param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
576
+ :param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
577
+ :param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
578
+ :param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
579
+ :param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
580
+ :param pulumi.Input[_builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
581
+ :param pulumi.Input[_builtins.str] token: Token to use to authenticate to Vault.
582
+ :param pulumi.Input[_builtins.str] token_name: Token name to use for creating the Vault child token.
583
+ :param pulumi.Input[_builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
584
+ """
585
+ ...
586
+ @overload
587
+ def __init__(__self__,
588
+ resource_name: str,
589
+ args: Optional[ProviderArgs] = None,
590
+ opts: Optional[pulumi.ResourceOptions] = None):
591
+ """
592
+ The provider type for the vault package. By default, resources use package-wide configuration
593
+ settings, however an explicit `Provider` instance may be created and passed during resource
594
+ construction to achieve fine-grained programmatic control over provider settings. See the
595
+ [documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information.
596
+
597
+ :param str resource_name: The name of the resource.
598
+ :param ProviderArgs args: The arguments to use to populate this resource's properties.
599
+ :param pulumi.ResourceOptions opts: Options for the resource.
600
+ """
601
+ ...
602
+ def __init__(__self__, resource_name: str, *args, **kwargs):
603
+ resource_args, opts = _utilities.get_resource_args_opts(ProviderArgs, pulumi.ResourceOptions, *args, **kwargs)
604
+ if resource_args is not None:
605
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
606
+ else:
607
+ __self__._internal_init(resource_name, *args, **kwargs)
608
+
609
+ def _internal_init(__self__,
610
+ resource_name: str,
611
+ opts: Optional[pulumi.ResourceOptions] = None,
612
+ add_address_to_env: Optional[pulumi.Input[_builtins.str]] = None,
613
+ address: Optional[pulumi.Input[_builtins.str]] = None,
614
+ auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
615
+ auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
616
+ auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
617
+ auth_login_cert: Optional[pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']]] = None,
618
+ auth_login_gcp: Optional[pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']]] = None,
619
+ auth_login_jwt: Optional[pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']]] = None,
620
+ auth_login_kerberos: Optional[pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']]] = None,
621
+ auth_login_oci: Optional[pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']]] = None,
622
+ auth_login_oidc: Optional[pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']]] = None,
623
+ auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
624
+ auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
625
+ auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
626
+ ca_cert_dir: Optional[pulumi.Input[_builtins.str]] = None,
627
+ ca_cert_file: Optional[pulumi.Input[_builtins.str]] = None,
628
+ client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
629
+ headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
630
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
631
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
632
+ max_retries_ccc: Optional[pulumi.Input[_builtins.int]] = None,
633
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
634
+ set_namespace_from_token: Optional[pulumi.Input[_builtins.bool]] = None,
635
+ skip_child_token: Optional[pulumi.Input[_builtins.bool]] = None,
636
+ skip_get_vault_version: Optional[pulumi.Input[_builtins.bool]] = None,
637
+ skip_tls_verify: Optional[pulumi.Input[_builtins.bool]] = None,
638
+ tls_server_name: Optional[pulumi.Input[_builtins.str]] = None,
639
+ token: Optional[pulumi.Input[_builtins.str]] = None,
640
+ token_name: Optional[pulumi.Input[_builtins.str]] = None,
641
+ vault_version_override: Optional[pulumi.Input[_builtins.str]] = None,
642
+ __props__=None):
643
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
644
+ if not isinstance(opts, pulumi.ResourceOptions):
645
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
646
+ if opts.id is None:
647
+ if __props__ is not None:
648
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
649
+ __props__ = ProviderArgs.__new__(ProviderArgs)
650
+
651
+ __props__.__dict__["add_address_to_env"] = add_address_to_env
652
+ __props__.__dict__["address"] = address
653
+ __props__.__dict__["auth_login"] = pulumi.Output.from_input(auth_login).apply(pulumi.runtime.to_json) if auth_login is not None else None
654
+ __props__.__dict__["auth_login_aws"] = pulumi.Output.from_input(auth_login_aws).apply(pulumi.runtime.to_json) if auth_login_aws is not None else None
655
+ __props__.__dict__["auth_login_azure"] = pulumi.Output.from_input(auth_login_azure).apply(pulumi.runtime.to_json) if auth_login_azure is not None else None
656
+ __props__.__dict__["auth_login_cert"] = pulumi.Output.from_input(auth_login_cert).apply(pulumi.runtime.to_json) if auth_login_cert is not None else None
657
+ __props__.__dict__["auth_login_gcp"] = pulumi.Output.from_input(auth_login_gcp).apply(pulumi.runtime.to_json) if auth_login_gcp is not None else None
658
+ __props__.__dict__["auth_login_jwt"] = pulumi.Output.from_input(auth_login_jwt).apply(pulumi.runtime.to_json) if auth_login_jwt is not None else None
659
+ __props__.__dict__["auth_login_kerberos"] = pulumi.Output.from_input(auth_login_kerberos).apply(pulumi.runtime.to_json) if auth_login_kerberos is not None else None
660
+ __props__.__dict__["auth_login_oci"] = pulumi.Output.from_input(auth_login_oci).apply(pulumi.runtime.to_json) if auth_login_oci is not None else None
661
+ __props__.__dict__["auth_login_oidc"] = pulumi.Output.from_input(auth_login_oidc).apply(pulumi.runtime.to_json) if auth_login_oidc is not None else None
662
+ __props__.__dict__["auth_login_radius"] = pulumi.Output.from_input(auth_login_radius).apply(pulumi.runtime.to_json) if auth_login_radius is not None else None
663
+ __props__.__dict__["auth_login_token_file"] = pulumi.Output.from_input(auth_login_token_file).apply(pulumi.runtime.to_json) if auth_login_token_file is not None else None
664
+ __props__.__dict__["auth_login_userpass"] = pulumi.Output.from_input(auth_login_userpass).apply(pulumi.runtime.to_json) if auth_login_userpass is not None else None
665
+ __props__.__dict__["ca_cert_dir"] = ca_cert_dir
666
+ __props__.__dict__["ca_cert_file"] = ca_cert_file
667
+ __props__.__dict__["client_auth"] = pulumi.Output.from_input(client_auth).apply(pulumi.runtime.to_json) if client_auth is not None else None
668
+ __props__.__dict__["headers"] = pulumi.Output.from_input(headers).apply(pulumi.runtime.to_json) if headers is not None else None
669
+ if max_lease_ttl_seconds is None:
670
+ max_lease_ttl_seconds = (_utilities.get_env_int('TERRAFORM_VAULT_MAX_TTL') or 1200)
671
+ __props__.__dict__["max_lease_ttl_seconds"] = pulumi.Output.from_input(max_lease_ttl_seconds).apply(pulumi.runtime.to_json) if max_lease_ttl_seconds is not None else None
672
+ if max_retries is None:
673
+ max_retries = (_utilities.get_env_int('VAULT_MAX_RETRIES') or 2)
674
+ __props__.__dict__["max_retries"] = pulumi.Output.from_input(max_retries).apply(pulumi.runtime.to_json) if max_retries is not None else None
675
+ __props__.__dict__["max_retries_ccc"] = pulumi.Output.from_input(max_retries_ccc).apply(pulumi.runtime.to_json) if max_retries_ccc is not None else None
676
+ __props__.__dict__["namespace"] = namespace
677
+ __props__.__dict__["set_namespace_from_token"] = pulumi.Output.from_input(set_namespace_from_token).apply(pulumi.runtime.to_json) if set_namespace_from_token is not None else None
678
+ __props__.__dict__["skip_child_token"] = pulumi.Output.from_input(skip_child_token).apply(pulumi.runtime.to_json) if skip_child_token is not None else None
679
+ __props__.__dict__["skip_get_vault_version"] = pulumi.Output.from_input(skip_get_vault_version).apply(pulumi.runtime.to_json) if skip_get_vault_version is not None else None
680
+ if skip_tls_verify is None:
681
+ skip_tls_verify = _utilities.get_env_bool('VAULT_SKIP_VERIFY')
682
+ __props__.__dict__["skip_tls_verify"] = pulumi.Output.from_input(skip_tls_verify).apply(pulumi.runtime.to_json) if skip_tls_verify is not None else None
683
+ __props__.__dict__["tls_server_name"] = tls_server_name
684
+ __props__.__dict__["token"] = token
685
+ __props__.__dict__["token_name"] = token_name
686
+ __props__.__dict__["vault_version_override"] = vault_version_override
687
+ super(Provider, __self__).__init__(
688
+ 'vault',
689
+ resource_name,
690
+ __props__,
691
+ opts)
692
+
693
+ @_builtins.property
694
+ @pulumi.getter(name="addAddressToEnv")
695
+ def add_address_to_env(self) -> pulumi.Output[Optional[_builtins.str]]:
696
+ return pulumi.get(self, "add_address_to_env")
697
+
698
+ @_builtins.property
699
+ @pulumi.getter
700
+ def address(self) -> pulumi.Output[Optional[_builtins.str]]:
701
+ """
702
+ URL of the root of the target Vault server.
703
+ """
704
+ return pulumi.get(self, "address")
705
+
706
+ @_builtins.property
707
+ @pulumi.getter(name="caCertDir")
708
+ def ca_cert_dir(self) -> pulumi.Output[Optional[_builtins.str]]:
709
+ """
710
+ Path to directory containing CA certificate files to validate the server's certificate.
711
+ """
712
+ return pulumi.get(self, "ca_cert_dir")
713
+
714
+ @_builtins.property
715
+ @pulumi.getter(name="caCertFile")
716
+ def ca_cert_file(self) -> pulumi.Output[Optional[_builtins.str]]:
717
+ """
718
+ Path to a CA certificate file to validate the server's certificate.
719
+ """
720
+ return pulumi.get(self, "ca_cert_file")
721
+
722
+ @_builtins.property
723
+ @pulumi.getter
724
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
725
+ """
726
+ The namespace to use. Available only for Vault Enterprise.
727
+ """
728
+ return pulumi.get(self, "namespace")
729
+
730
+ @_builtins.property
731
+ @pulumi.getter(name="tlsServerName")
732
+ def tls_server_name(self) -> pulumi.Output[Optional[_builtins.str]]:
733
+ """
734
+ Name to use as the SNI host when connecting via TLS.
735
+ """
736
+ return pulumi.get(self, "tls_server_name")
737
+
738
+ @_builtins.property
739
+ @pulumi.getter
740
+ def token(self) -> pulumi.Output[Optional[_builtins.str]]:
741
+ """
742
+ Token to use to authenticate to Vault.
743
+ """
744
+ return pulumi.get(self, "token")
745
+
746
+ @_builtins.property
747
+ @pulumi.getter(name="tokenName")
748
+ def token_name(self) -> pulumi.Output[Optional[_builtins.str]]:
749
+ """
750
+ Token name to use for creating the Vault child token.
751
+ """
752
+ return pulumi.get(self, "token_name")
753
+
754
+ @_builtins.property
755
+ @pulumi.getter(name="vaultVersionOverride")
756
+ def vault_version_override(self) -> pulumi.Output[Optional[_builtins.str]]:
757
+ """
758
+ Override the Vault server version, which is normally determined dynamically from the target Vault server
759
+ """
760
+ return pulumi.get(self, "vault_version_override")
761
+
762
+ @pulumi.output_type
763
+ class TerraformConfigResult:
764
+ def __init__(__self__, result=None):
765
+ if result and not isinstance(result, dict):
766
+ raise TypeError("Expected argument 'result' to be a dict")
767
+ pulumi.set(__self__, "result", result)
768
+
769
+ @_builtins.property
770
+ @pulumi.getter
771
+ def result(self) -> Mapping[str, Any]:
772
+ return pulumi.get(self, "result")
773
+
774
+ def terraform_config(__self__) -> pulumi.Output['Provider.TerraformConfigResult']:
775
+ """
776
+ This function returns a Terraform config object with terraform-namecased keys,to be used with the Terraform Module Provider.
777
+ """
778
+ __args__ = dict()
779
+ __args__['__self__'] = __self__
780
+ return pulumi.runtime.call('pulumi:providers:vault/terraformConfig', __args__, res=__self__, typ=Provider.TerraformConfigResult)
781
+