pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,2701 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+
17
+ __all__ = [
18
+ 'AuthBackendTuneArgs',
19
+ 'AuthBackendTuneArgsDict',
20
+ 'OciAuthBackendTuneArgs',
21
+ 'OciAuthBackendTuneArgsDict',
22
+ 'ProviderAuthLoginArgs',
23
+ 'ProviderAuthLoginArgsDict',
24
+ 'ProviderAuthLoginAwsArgs',
25
+ 'ProviderAuthLoginAwsArgsDict',
26
+ 'ProviderAuthLoginAzureArgs',
27
+ 'ProviderAuthLoginAzureArgsDict',
28
+ 'ProviderAuthLoginCertArgs',
29
+ 'ProviderAuthLoginCertArgsDict',
30
+ 'ProviderAuthLoginGcpArgs',
31
+ 'ProviderAuthLoginGcpArgsDict',
32
+ 'ProviderAuthLoginJwtArgs',
33
+ 'ProviderAuthLoginJwtArgsDict',
34
+ 'ProviderAuthLoginKerberosArgs',
35
+ 'ProviderAuthLoginKerberosArgsDict',
36
+ 'ProviderAuthLoginOciArgs',
37
+ 'ProviderAuthLoginOciArgsDict',
38
+ 'ProviderAuthLoginOidcArgs',
39
+ 'ProviderAuthLoginOidcArgsDict',
40
+ 'ProviderAuthLoginRadiusArgs',
41
+ 'ProviderAuthLoginRadiusArgsDict',
42
+ 'ProviderAuthLoginTokenFileArgs',
43
+ 'ProviderAuthLoginTokenFileArgsDict',
44
+ 'ProviderAuthLoginUserpassArgs',
45
+ 'ProviderAuthLoginUserpassArgsDict',
46
+ 'ProviderClientAuthArgs',
47
+ 'ProviderClientAuthArgsDict',
48
+ 'ProviderHeaderArgs',
49
+ 'ProviderHeaderArgsDict',
50
+ 'GetPolicyDocumentRuleArgs',
51
+ 'GetPolicyDocumentRuleArgsDict',
52
+ 'GetPolicyDocumentRuleAllowedParameterArgs',
53
+ 'GetPolicyDocumentRuleAllowedParameterArgsDict',
54
+ 'GetPolicyDocumentRuleDeniedParameterArgs',
55
+ 'GetPolicyDocumentRuleDeniedParameterArgsDict',
56
+ ]
57
+
58
+ MYPY = False
59
+
60
+ if not MYPY:
61
+ class AuthBackendTuneArgsDict(TypedDict):
62
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
63
+ """
64
+ List of headers to whitelist and allowing
65
+ a plugin to include them in the response.
66
+ """
67
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
68
+ """
69
+ Specifies the list of keys that will
70
+ not be HMAC'd by audit devices in the request data object.
71
+ """
72
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
73
+ """
74
+ Specifies the list of keys that will
75
+ not be HMAC'd by audit devices in the response data object.
76
+ """
77
+ default_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
78
+ """
79
+ Specifies the default time-to-live.
80
+ If set, this overrides the global default.
81
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
82
+ """
83
+ listing_visibility: NotRequired[pulumi.Input[_builtins.str]]
84
+ """
85
+ Specifies whether to show this mount in
86
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
87
+ """
88
+ max_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
89
+ """
90
+ Specifies the maximum time-to-live.
91
+ If set, this overrides the global default.
92
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
93
+ """
94
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
95
+ """
96
+ List of headers to whitelist and
97
+ pass from the request to the backend.
98
+ """
99
+ token_type: NotRequired[pulumi.Input[_builtins.str]]
100
+ """
101
+ Specifies the type of tokens that should be returned by
102
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
103
+ """
104
+ elif False:
105
+ AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
106
+
107
+ @pulumi.input_type
108
+ class AuthBackendTuneArgs:
109
+ def __init__(__self__, *,
110
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
111
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
112
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
113
+ default_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
114
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
115
+ max_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
116
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
117
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
118
+ """
119
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
120
+ a plugin to include them in the response.
121
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
122
+ not be HMAC'd by audit devices in the request data object.
123
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
124
+ not be HMAC'd by audit devices in the response data object.
125
+ :param pulumi.Input[_builtins.str] default_lease_ttl: Specifies the default time-to-live.
126
+ If set, this overrides the global default.
127
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
128
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in
129
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
130
+ :param pulumi.Input[_builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
131
+ If set, this overrides the global default.
132
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
133
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to whitelist and
134
+ pass from the request to the backend.
135
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
136
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
137
+ """
138
+ if allowed_response_headers is not None:
139
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
140
+ if audit_non_hmac_request_keys is not None:
141
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
142
+ if audit_non_hmac_response_keys is not None:
143
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
144
+ if default_lease_ttl is not None:
145
+ pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
146
+ if listing_visibility is not None:
147
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
148
+ if max_lease_ttl is not None:
149
+ pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
150
+ if passthrough_request_headers is not None:
151
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
152
+ if token_type is not None:
153
+ pulumi.set(__self__, "token_type", token_type)
154
+
155
+ @_builtins.property
156
+ @pulumi.getter(name="allowedResponseHeaders")
157
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
158
+ """
159
+ List of headers to whitelist and allowing
160
+ a plugin to include them in the response.
161
+ """
162
+ return pulumi.get(self, "allowed_response_headers")
163
+
164
+ @allowed_response_headers.setter
165
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
166
+ pulumi.set(self, "allowed_response_headers", value)
167
+
168
+ @_builtins.property
169
+ @pulumi.getter(name="auditNonHmacRequestKeys")
170
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
171
+ """
172
+ Specifies the list of keys that will
173
+ not be HMAC'd by audit devices in the request data object.
174
+ """
175
+ return pulumi.get(self, "audit_non_hmac_request_keys")
176
+
177
+ @audit_non_hmac_request_keys.setter
178
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
179
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
180
+
181
+ @_builtins.property
182
+ @pulumi.getter(name="auditNonHmacResponseKeys")
183
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
184
+ """
185
+ Specifies the list of keys that will
186
+ not be HMAC'd by audit devices in the response data object.
187
+ """
188
+ return pulumi.get(self, "audit_non_hmac_response_keys")
189
+
190
+ @audit_non_hmac_response_keys.setter
191
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
192
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
193
+
194
+ @_builtins.property
195
+ @pulumi.getter(name="defaultLeaseTtl")
196
+ def default_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
197
+ """
198
+ Specifies the default time-to-live.
199
+ If set, this overrides the global default.
200
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
201
+ """
202
+ return pulumi.get(self, "default_lease_ttl")
203
+
204
+ @default_lease_ttl.setter
205
+ def default_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
206
+ pulumi.set(self, "default_lease_ttl", value)
207
+
208
+ @_builtins.property
209
+ @pulumi.getter(name="listingVisibility")
210
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
211
+ """
212
+ Specifies whether to show this mount in
213
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
214
+ """
215
+ return pulumi.get(self, "listing_visibility")
216
+
217
+ @listing_visibility.setter
218
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
219
+ pulumi.set(self, "listing_visibility", value)
220
+
221
+ @_builtins.property
222
+ @pulumi.getter(name="maxLeaseTtl")
223
+ def max_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
224
+ """
225
+ Specifies the maximum time-to-live.
226
+ If set, this overrides the global default.
227
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
228
+ """
229
+ return pulumi.get(self, "max_lease_ttl")
230
+
231
+ @max_lease_ttl.setter
232
+ def max_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
233
+ pulumi.set(self, "max_lease_ttl", value)
234
+
235
+ @_builtins.property
236
+ @pulumi.getter(name="passthroughRequestHeaders")
237
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
238
+ """
239
+ List of headers to whitelist and
240
+ pass from the request to the backend.
241
+ """
242
+ return pulumi.get(self, "passthrough_request_headers")
243
+
244
+ @passthrough_request_headers.setter
245
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
246
+ pulumi.set(self, "passthrough_request_headers", value)
247
+
248
+ @_builtins.property
249
+ @pulumi.getter(name="tokenType")
250
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
251
+ """
252
+ Specifies the type of tokens that should be returned by
253
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
254
+ """
255
+ return pulumi.get(self, "token_type")
256
+
257
+ @token_type.setter
258
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
259
+ pulumi.set(self, "token_type", value)
260
+
261
+
262
+ if not MYPY:
263
+ class OciAuthBackendTuneArgsDict(TypedDict):
264
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
265
+ """
266
+ List of headers to whitelist and allowing
267
+ a plugin to include them in the response.
268
+ """
269
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
270
+ """
271
+ Specifies the list of keys that will
272
+ not be HMAC'd by audit devices in the request data object.
273
+ """
274
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
275
+ """
276
+ Specifies the list of keys that will
277
+ not be HMAC'd by audit devices in the response data object.
278
+ """
279
+ default_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
280
+ """
281
+ Specifies the default time-to-live.
282
+ If set, this overrides the global default.
283
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
284
+ """
285
+ listing_visibility: NotRequired[pulumi.Input[_builtins.str]]
286
+ """
287
+ Specifies whether to show this mount in
288
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
289
+ """
290
+ max_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
291
+ """
292
+ Specifies the maximum time-to-live.
293
+ If set, this overrides the global default.
294
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
295
+ """
296
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
297
+ """
298
+ List of headers to whitelist and
299
+ pass from the request to the backend.
300
+ """
301
+ token_type: NotRequired[pulumi.Input[_builtins.str]]
302
+ """
303
+ Specifies the type of tokens that should be returned by the mount.
304
+ """
305
+ elif False:
306
+ OciAuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
307
+
308
+ @pulumi.input_type
309
+ class OciAuthBackendTuneArgs:
310
+ def __init__(__self__, *,
311
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
312
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
313
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
314
+ default_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
315
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
316
+ max_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
317
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
318
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
319
+ """
320
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
321
+ a plugin to include them in the response.
322
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
323
+ not be HMAC'd by audit devices in the request data object.
324
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
325
+ not be HMAC'd by audit devices in the response data object.
326
+ :param pulumi.Input[_builtins.str] default_lease_ttl: Specifies the default time-to-live.
327
+ If set, this overrides the global default.
328
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
329
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in
330
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
331
+ :param pulumi.Input[_builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
332
+ If set, this overrides the global default.
333
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
334
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to whitelist and
335
+ pass from the request to the backend.
336
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by the mount.
337
+ """
338
+ if allowed_response_headers is not None:
339
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
340
+ if audit_non_hmac_request_keys is not None:
341
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
342
+ if audit_non_hmac_response_keys is not None:
343
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
344
+ if default_lease_ttl is not None:
345
+ pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
346
+ if listing_visibility is not None:
347
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
348
+ if max_lease_ttl is not None:
349
+ pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
350
+ if passthrough_request_headers is not None:
351
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
352
+ if token_type is not None:
353
+ pulumi.set(__self__, "token_type", token_type)
354
+
355
+ @_builtins.property
356
+ @pulumi.getter(name="allowedResponseHeaders")
357
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
358
+ """
359
+ List of headers to whitelist and allowing
360
+ a plugin to include them in the response.
361
+ """
362
+ return pulumi.get(self, "allowed_response_headers")
363
+
364
+ @allowed_response_headers.setter
365
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
366
+ pulumi.set(self, "allowed_response_headers", value)
367
+
368
+ @_builtins.property
369
+ @pulumi.getter(name="auditNonHmacRequestKeys")
370
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
371
+ """
372
+ Specifies the list of keys that will
373
+ not be HMAC'd by audit devices in the request data object.
374
+ """
375
+ return pulumi.get(self, "audit_non_hmac_request_keys")
376
+
377
+ @audit_non_hmac_request_keys.setter
378
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
379
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
380
+
381
+ @_builtins.property
382
+ @pulumi.getter(name="auditNonHmacResponseKeys")
383
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
384
+ """
385
+ Specifies the list of keys that will
386
+ not be HMAC'd by audit devices in the response data object.
387
+ """
388
+ return pulumi.get(self, "audit_non_hmac_response_keys")
389
+
390
+ @audit_non_hmac_response_keys.setter
391
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
392
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
393
+
394
+ @_builtins.property
395
+ @pulumi.getter(name="defaultLeaseTtl")
396
+ def default_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
397
+ """
398
+ Specifies the default time-to-live.
399
+ If set, this overrides the global default.
400
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
401
+ """
402
+ return pulumi.get(self, "default_lease_ttl")
403
+
404
+ @default_lease_ttl.setter
405
+ def default_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
406
+ pulumi.set(self, "default_lease_ttl", value)
407
+
408
+ @_builtins.property
409
+ @pulumi.getter(name="listingVisibility")
410
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
411
+ """
412
+ Specifies whether to show this mount in
413
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
414
+ """
415
+ return pulumi.get(self, "listing_visibility")
416
+
417
+ @listing_visibility.setter
418
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
419
+ pulumi.set(self, "listing_visibility", value)
420
+
421
+ @_builtins.property
422
+ @pulumi.getter(name="maxLeaseTtl")
423
+ def max_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
424
+ """
425
+ Specifies the maximum time-to-live.
426
+ If set, this overrides the global default.
427
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
428
+ """
429
+ return pulumi.get(self, "max_lease_ttl")
430
+
431
+ @max_lease_ttl.setter
432
+ def max_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
433
+ pulumi.set(self, "max_lease_ttl", value)
434
+
435
+ @_builtins.property
436
+ @pulumi.getter(name="passthroughRequestHeaders")
437
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
438
+ """
439
+ List of headers to whitelist and
440
+ pass from the request to the backend.
441
+ """
442
+ return pulumi.get(self, "passthrough_request_headers")
443
+
444
+ @passthrough_request_headers.setter
445
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
446
+ pulumi.set(self, "passthrough_request_headers", value)
447
+
448
+ @_builtins.property
449
+ @pulumi.getter(name="tokenType")
450
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
451
+ """
452
+ Specifies the type of tokens that should be returned by the mount.
453
+ """
454
+ return pulumi.get(self, "token_type")
455
+
456
+ @token_type.setter
457
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
458
+ pulumi.set(self, "token_type", value)
459
+
460
+
461
+ if not MYPY:
462
+ class ProviderAuthLoginArgsDict(TypedDict):
463
+ path: pulumi.Input[_builtins.str]
464
+ method: NotRequired[pulumi.Input[_builtins.str]]
465
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
466
+ """
467
+ The authentication engine's namespace. Conflicts with use_root_namespace
468
+ """
469
+ parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
470
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
471
+ """
472
+ Authenticate to the root Vault namespace. Conflicts with namespace
473
+ """
474
+ elif False:
475
+ ProviderAuthLoginArgsDict: TypeAlias = Mapping[str, Any]
476
+
477
+ @pulumi.input_type
478
+ class ProviderAuthLoginArgs:
479
+ def __init__(__self__, *,
480
+ path: pulumi.Input[_builtins.str],
481
+ method: Optional[pulumi.Input[_builtins.str]] = None,
482
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
483
+ parameters: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
484
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
485
+ """
486
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
487
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
488
+ """
489
+ pulumi.set(__self__, "path", path)
490
+ if method is not None:
491
+ pulumi.set(__self__, "method", method)
492
+ if namespace is not None:
493
+ pulumi.set(__self__, "namespace", namespace)
494
+ if parameters is not None:
495
+ pulumi.set(__self__, "parameters", parameters)
496
+ if use_root_namespace is not None:
497
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
498
+
499
+ @_builtins.property
500
+ @pulumi.getter
501
+ def path(self) -> pulumi.Input[_builtins.str]:
502
+ return pulumi.get(self, "path")
503
+
504
+ @path.setter
505
+ def path(self, value: pulumi.Input[_builtins.str]):
506
+ pulumi.set(self, "path", value)
507
+
508
+ @_builtins.property
509
+ @pulumi.getter
510
+ def method(self) -> Optional[pulumi.Input[_builtins.str]]:
511
+ return pulumi.get(self, "method")
512
+
513
+ @method.setter
514
+ def method(self, value: Optional[pulumi.Input[_builtins.str]]):
515
+ pulumi.set(self, "method", value)
516
+
517
+ @_builtins.property
518
+ @pulumi.getter
519
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
520
+ """
521
+ The authentication engine's namespace. Conflicts with use_root_namespace
522
+ """
523
+ return pulumi.get(self, "namespace")
524
+
525
+ @namespace.setter
526
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
527
+ pulumi.set(self, "namespace", value)
528
+
529
+ @_builtins.property
530
+ @pulumi.getter
531
+ def parameters(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
532
+ return pulumi.get(self, "parameters")
533
+
534
+ @parameters.setter
535
+ def parameters(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
536
+ pulumi.set(self, "parameters", value)
537
+
538
+ @_builtins.property
539
+ @pulumi.getter(name="useRootNamespace")
540
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
541
+ """
542
+ Authenticate to the root Vault namespace. Conflicts with namespace
543
+ """
544
+ return pulumi.get(self, "use_root_namespace")
545
+
546
+ @use_root_namespace.setter
547
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
548
+ pulumi.set(self, "use_root_namespace", value)
549
+
550
+
551
+ if not MYPY:
552
+ class ProviderAuthLoginAwsArgsDict(TypedDict):
553
+ role: pulumi.Input[_builtins.str]
554
+ """
555
+ The Vault role to use when logging into Vault.
556
+ """
557
+ aws_access_key_id: NotRequired[pulumi.Input[_builtins.str]]
558
+ """
559
+ The AWS access key ID.
560
+ """
561
+ aws_iam_endpoint: NotRequired[pulumi.Input[_builtins.str]]
562
+ """
563
+ The IAM endpoint URL.
564
+ """
565
+ aws_profile: NotRequired[pulumi.Input[_builtins.str]]
566
+ """
567
+ The name of the AWS profile.
568
+ """
569
+ aws_region: NotRequired[pulumi.Input[_builtins.str]]
570
+ """
571
+ The AWS region.
572
+ """
573
+ aws_role_arn: NotRequired[pulumi.Input[_builtins.str]]
574
+ """
575
+ The ARN of the AWS Role to assume.Used during STS AssumeRole
576
+ """
577
+ aws_role_session_name: NotRequired[pulumi.Input[_builtins.str]]
578
+ """
579
+ Specifies the name to attach to the AWS role session. Used during STS AssumeRole
580
+ """
581
+ aws_secret_access_key: NotRequired[pulumi.Input[_builtins.str]]
582
+ """
583
+ The AWS secret access key.
584
+ """
585
+ aws_session_token: NotRequired[pulumi.Input[_builtins.str]]
586
+ """
587
+ The AWS session token.
588
+ """
589
+ aws_shared_credentials_file: NotRequired[pulumi.Input[_builtins.str]]
590
+ """
591
+ Path to the AWS shared credentials file.
592
+ """
593
+ aws_sts_endpoint: NotRequired[pulumi.Input[_builtins.str]]
594
+ """
595
+ The STS endpoint URL.
596
+ """
597
+ aws_web_identity_token_file: NotRequired[pulumi.Input[_builtins.str]]
598
+ """
599
+ Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
600
+ """
601
+ header_value: NotRequired[pulumi.Input[_builtins.str]]
602
+ """
603
+ The Vault header value to include in the STS signing request.
604
+ """
605
+ mount: NotRequired[pulumi.Input[_builtins.str]]
606
+ """
607
+ The path where the authentication engine is mounted.
608
+ """
609
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
610
+ """
611
+ The authentication engine's namespace. Conflicts with use_root_namespace
612
+ """
613
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
614
+ """
615
+ Authenticate to the root Vault namespace. Conflicts with namespace
616
+ """
617
+ elif False:
618
+ ProviderAuthLoginAwsArgsDict: TypeAlias = Mapping[str, Any]
619
+
620
+ @pulumi.input_type
621
+ class ProviderAuthLoginAwsArgs:
622
+ def __init__(__self__, *,
623
+ role: pulumi.Input[_builtins.str],
624
+ aws_access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
625
+ aws_iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
626
+ aws_profile: Optional[pulumi.Input[_builtins.str]] = None,
627
+ aws_region: Optional[pulumi.Input[_builtins.str]] = None,
628
+ aws_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
629
+ aws_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
630
+ aws_secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
631
+ aws_session_token: Optional[pulumi.Input[_builtins.str]] = None,
632
+ aws_shared_credentials_file: Optional[pulumi.Input[_builtins.str]] = None,
633
+ aws_sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
634
+ aws_web_identity_token_file: Optional[pulumi.Input[_builtins.str]] = None,
635
+ header_value: Optional[pulumi.Input[_builtins.str]] = None,
636
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
637
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
638
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
639
+ """
640
+ :param pulumi.Input[_builtins.str] role: The Vault role to use when logging into Vault.
641
+ :param pulumi.Input[_builtins.str] aws_access_key_id: The AWS access key ID.
642
+ :param pulumi.Input[_builtins.str] aws_iam_endpoint: The IAM endpoint URL.
643
+ :param pulumi.Input[_builtins.str] aws_profile: The name of the AWS profile.
644
+ :param pulumi.Input[_builtins.str] aws_region: The AWS region.
645
+ :param pulumi.Input[_builtins.str] aws_role_arn: The ARN of the AWS Role to assume.Used during STS AssumeRole
646
+ :param pulumi.Input[_builtins.str] aws_role_session_name: Specifies the name to attach to the AWS role session. Used during STS AssumeRole
647
+ :param pulumi.Input[_builtins.str] aws_secret_access_key: The AWS secret access key.
648
+ :param pulumi.Input[_builtins.str] aws_session_token: The AWS session token.
649
+ :param pulumi.Input[_builtins.str] aws_shared_credentials_file: Path to the AWS shared credentials file.
650
+ :param pulumi.Input[_builtins.str] aws_sts_endpoint: The STS endpoint URL.
651
+ :param pulumi.Input[_builtins.str] aws_web_identity_token_file: Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
652
+ :param pulumi.Input[_builtins.str] header_value: The Vault header value to include in the STS signing request.
653
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
654
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
655
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
656
+ """
657
+ pulumi.set(__self__, "role", role)
658
+ if aws_access_key_id is not None:
659
+ pulumi.set(__self__, "aws_access_key_id", aws_access_key_id)
660
+ if aws_iam_endpoint is not None:
661
+ pulumi.set(__self__, "aws_iam_endpoint", aws_iam_endpoint)
662
+ if aws_profile is not None:
663
+ pulumi.set(__self__, "aws_profile", aws_profile)
664
+ if aws_region is not None:
665
+ pulumi.set(__self__, "aws_region", aws_region)
666
+ if aws_role_arn is not None:
667
+ pulumi.set(__self__, "aws_role_arn", aws_role_arn)
668
+ if aws_role_session_name is not None:
669
+ pulumi.set(__self__, "aws_role_session_name", aws_role_session_name)
670
+ if aws_secret_access_key is not None:
671
+ pulumi.set(__self__, "aws_secret_access_key", aws_secret_access_key)
672
+ if aws_session_token is not None:
673
+ pulumi.set(__self__, "aws_session_token", aws_session_token)
674
+ if aws_shared_credentials_file is not None:
675
+ pulumi.set(__self__, "aws_shared_credentials_file", aws_shared_credentials_file)
676
+ if aws_sts_endpoint is not None:
677
+ pulumi.set(__self__, "aws_sts_endpoint", aws_sts_endpoint)
678
+ if aws_web_identity_token_file is not None:
679
+ pulumi.set(__self__, "aws_web_identity_token_file", aws_web_identity_token_file)
680
+ if header_value is not None:
681
+ pulumi.set(__self__, "header_value", header_value)
682
+ if mount is not None:
683
+ pulumi.set(__self__, "mount", mount)
684
+ if namespace is not None:
685
+ pulumi.set(__self__, "namespace", namespace)
686
+ if use_root_namespace is not None:
687
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
688
+
689
+ @_builtins.property
690
+ @pulumi.getter
691
+ def role(self) -> pulumi.Input[_builtins.str]:
692
+ """
693
+ The Vault role to use when logging into Vault.
694
+ """
695
+ return pulumi.get(self, "role")
696
+
697
+ @role.setter
698
+ def role(self, value: pulumi.Input[_builtins.str]):
699
+ pulumi.set(self, "role", value)
700
+
701
+ @_builtins.property
702
+ @pulumi.getter(name="awsAccessKeyId")
703
+ def aws_access_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
704
+ """
705
+ The AWS access key ID.
706
+ """
707
+ return pulumi.get(self, "aws_access_key_id")
708
+
709
+ @aws_access_key_id.setter
710
+ def aws_access_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
711
+ pulumi.set(self, "aws_access_key_id", value)
712
+
713
+ @_builtins.property
714
+ @pulumi.getter(name="awsIamEndpoint")
715
+ def aws_iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
716
+ """
717
+ The IAM endpoint URL.
718
+ """
719
+ return pulumi.get(self, "aws_iam_endpoint")
720
+
721
+ @aws_iam_endpoint.setter
722
+ def aws_iam_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
723
+ pulumi.set(self, "aws_iam_endpoint", value)
724
+
725
+ @_builtins.property
726
+ @pulumi.getter(name="awsProfile")
727
+ def aws_profile(self) -> Optional[pulumi.Input[_builtins.str]]:
728
+ """
729
+ The name of the AWS profile.
730
+ """
731
+ return pulumi.get(self, "aws_profile")
732
+
733
+ @aws_profile.setter
734
+ def aws_profile(self, value: Optional[pulumi.Input[_builtins.str]]):
735
+ pulumi.set(self, "aws_profile", value)
736
+
737
+ @_builtins.property
738
+ @pulumi.getter(name="awsRegion")
739
+ def aws_region(self) -> Optional[pulumi.Input[_builtins.str]]:
740
+ """
741
+ The AWS region.
742
+ """
743
+ return pulumi.get(self, "aws_region")
744
+
745
+ @aws_region.setter
746
+ def aws_region(self, value: Optional[pulumi.Input[_builtins.str]]):
747
+ pulumi.set(self, "aws_region", value)
748
+
749
+ @_builtins.property
750
+ @pulumi.getter(name="awsRoleArn")
751
+ def aws_role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
752
+ """
753
+ The ARN of the AWS Role to assume.Used during STS AssumeRole
754
+ """
755
+ return pulumi.get(self, "aws_role_arn")
756
+
757
+ @aws_role_arn.setter
758
+ def aws_role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
759
+ pulumi.set(self, "aws_role_arn", value)
760
+
761
+ @_builtins.property
762
+ @pulumi.getter(name="awsRoleSessionName")
763
+ def aws_role_session_name(self) -> Optional[pulumi.Input[_builtins.str]]:
764
+ """
765
+ Specifies the name to attach to the AWS role session. Used during STS AssumeRole
766
+ """
767
+ return pulumi.get(self, "aws_role_session_name")
768
+
769
+ @aws_role_session_name.setter
770
+ def aws_role_session_name(self, value: Optional[pulumi.Input[_builtins.str]]):
771
+ pulumi.set(self, "aws_role_session_name", value)
772
+
773
+ @_builtins.property
774
+ @pulumi.getter(name="awsSecretAccessKey")
775
+ def aws_secret_access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
776
+ """
777
+ The AWS secret access key.
778
+ """
779
+ return pulumi.get(self, "aws_secret_access_key")
780
+
781
+ @aws_secret_access_key.setter
782
+ def aws_secret_access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
783
+ pulumi.set(self, "aws_secret_access_key", value)
784
+
785
+ @_builtins.property
786
+ @pulumi.getter(name="awsSessionToken")
787
+ def aws_session_token(self) -> Optional[pulumi.Input[_builtins.str]]:
788
+ """
789
+ The AWS session token.
790
+ """
791
+ return pulumi.get(self, "aws_session_token")
792
+
793
+ @aws_session_token.setter
794
+ def aws_session_token(self, value: Optional[pulumi.Input[_builtins.str]]):
795
+ pulumi.set(self, "aws_session_token", value)
796
+
797
+ @_builtins.property
798
+ @pulumi.getter(name="awsSharedCredentialsFile")
799
+ def aws_shared_credentials_file(self) -> Optional[pulumi.Input[_builtins.str]]:
800
+ """
801
+ Path to the AWS shared credentials file.
802
+ """
803
+ return pulumi.get(self, "aws_shared_credentials_file")
804
+
805
+ @aws_shared_credentials_file.setter
806
+ def aws_shared_credentials_file(self, value: Optional[pulumi.Input[_builtins.str]]):
807
+ pulumi.set(self, "aws_shared_credentials_file", value)
808
+
809
+ @_builtins.property
810
+ @pulumi.getter(name="awsStsEndpoint")
811
+ def aws_sts_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
812
+ """
813
+ The STS endpoint URL.
814
+ """
815
+ return pulumi.get(self, "aws_sts_endpoint")
816
+
817
+ @aws_sts_endpoint.setter
818
+ def aws_sts_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
819
+ pulumi.set(self, "aws_sts_endpoint", value)
820
+
821
+ @_builtins.property
822
+ @pulumi.getter(name="awsWebIdentityTokenFile")
823
+ def aws_web_identity_token_file(self) -> Optional[pulumi.Input[_builtins.str]]:
824
+ """
825
+ Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
826
+ """
827
+ return pulumi.get(self, "aws_web_identity_token_file")
828
+
829
+ @aws_web_identity_token_file.setter
830
+ def aws_web_identity_token_file(self, value: Optional[pulumi.Input[_builtins.str]]):
831
+ pulumi.set(self, "aws_web_identity_token_file", value)
832
+
833
+ @_builtins.property
834
+ @pulumi.getter(name="headerValue")
835
+ def header_value(self) -> Optional[pulumi.Input[_builtins.str]]:
836
+ """
837
+ The Vault header value to include in the STS signing request.
838
+ """
839
+ return pulumi.get(self, "header_value")
840
+
841
+ @header_value.setter
842
+ def header_value(self, value: Optional[pulumi.Input[_builtins.str]]):
843
+ pulumi.set(self, "header_value", value)
844
+
845
+ @_builtins.property
846
+ @pulumi.getter
847
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
848
+ """
849
+ The path where the authentication engine is mounted.
850
+ """
851
+ return pulumi.get(self, "mount")
852
+
853
+ @mount.setter
854
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
855
+ pulumi.set(self, "mount", value)
856
+
857
+ @_builtins.property
858
+ @pulumi.getter
859
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
860
+ """
861
+ The authentication engine's namespace. Conflicts with use_root_namespace
862
+ """
863
+ return pulumi.get(self, "namespace")
864
+
865
+ @namespace.setter
866
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
867
+ pulumi.set(self, "namespace", value)
868
+
869
+ @_builtins.property
870
+ @pulumi.getter(name="useRootNamespace")
871
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
872
+ """
873
+ Authenticate to the root Vault namespace. Conflicts with namespace
874
+ """
875
+ return pulumi.get(self, "use_root_namespace")
876
+
877
+ @use_root_namespace.setter
878
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
879
+ pulumi.set(self, "use_root_namespace", value)
880
+
881
+
882
+ if not MYPY:
883
+ class ProviderAuthLoginAzureArgsDict(TypedDict):
884
+ resource_group_name: pulumi.Input[_builtins.str]
885
+ """
886
+ The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
887
+ """
888
+ role: pulumi.Input[_builtins.str]
889
+ """
890
+ Name of the login role.
891
+ """
892
+ subscription_id: pulumi.Input[_builtins.str]
893
+ """
894
+ The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
895
+ """
896
+ client_id: NotRequired[pulumi.Input[_builtins.str]]
897
+ """
898
+ The identity's client ID.
899
+ """
900
+ jwt: NotRequired[pulumi.Input[_builtins.str]]
901
+ """
902
+ A signed JSON Web Token. If not specified on will be created automatically
903
+ """
904
+ mount: NotRequired[pulumi.Input[_builtins.str]]
905
+ """
906
+ The path where the authentication engine is mounted.
907
+ """
908
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
909
+ """
910
+ The authentication engine's namespace. Conflicts with use_root_namespace
911
+ """
912
+ scope: NotRequired[pulumi.Input[_builtins.str]]
913
+ """
914
+ The scopes to include in the token request.
915
+ """
916
+ tenant_id: NotRequired[pulumi.Input[_builtins.str]]
917
+ """
918
+ Provides the tenant ID to use in a multi-tenant authentication scenario.
919
+ """
920
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
921
+ """
922
+ Authenticate to the root Vault namespace. Conflicts with namespace
923
+ """
924
+ vm_name: NotRequired[pulumi.Input[_builtins.str]]
925
+ """
926
+ The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
927
+ """
928
+ vmss_name: NotRequired[pulumi.Input[_builtins.str]]
929
+ """
930
+ The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
931
+ """
932
+ elif False:
933
+ ProviderAuthLoginAzureArgsDict: TypeAlias = Mapping[str, Any]
934
+
935
+ @pulumi.input_type
936
+ class ProviderAuthLoginAzureArgs:
937
+ def __init__(__self__, *,
938
+ resource_group_name: pulumi.Input[_builtins.str],
939
+ role: pulumi.Input[_builtins.str],
940
+ subscription_id: pulumi.Input[_builtins.str],
941
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
942
+ jwt: Optional[pulumi.Input[_builtins.str]] = None,
943
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
944
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
945
+ scope: Optional[pulumi.Input[_builtins.str]] = None,
946
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
947
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
948
+ vm_name: Optional[pulumi.Input[_builtins.str]] = None,
949
+ vmss_name: Optional[pulumi.Input[_builtins.str]] = None):
950
+ """
951
+ :param pulumi.Input[_builtins.str] resource_group_name: The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
952
+ :param pulumi.Input[_builtins.str] role: Name of the login role.
953
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
954
+ :param pulumi.Input[_builtins.str] client_id: The identity's client ID.
955
+ :param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token. If not specified on will be created automatically
956
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
957
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
958
+ :param pulumi.Input[_builtins.str] scope: The scopes to include in the token request.
959
+ :param pulumi.Input[_builtins.str] tenant_id: Provides the tenant ID to use in a multi-tenant authentication scenario.
960
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
961
+ :param pulumi.Input[_builtins.str] vm_name: The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
962
+ :param pulumi.Input[_builtins.str] vmss_name: The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
963
+ """
964
+ pulumi.set(__self__, "resource_group_name", resource_group_name)
965
+ pulumi.set(__self__, "role", role)
966
+ pulumi.set(__self__, "subscription_id", subscription_id)
967
+ if client_id is not None:
968
+ pulumi.set(__self__, "client_id", client_id)
969
+ if jwt is not None:
970
+ pulumi.set(__self__, "jwt", jwt)
971
+ if mount is not None:
972
+ pulumi.set(__self__, "mount", mount)
973
+ if namespace is not None:
974
+ pulumi.set(__self__, "namespace", namespace)
975
+ if scope is not None:
976
+ pulumi.set(__self__, "scope", scope)
977
+ if tenant_id is not None:
978
+ pulumi.set(__self__, "tenant_id", tenant_id)
979
+ if use_root_namespace is not None:
980
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
981
+ if vm_name is not None:
982
+ pulumi.set(__self__, "vm_name", vm_name)
983
+ if vmss_name is not None:
984
+ pulumi.set(__self__, "vmss_name", vmss_name)
985
+
986
+ @_builtins.property
987
+ @pulumi.getter(name="resourceGroupName")
988
+ def resource_group_name(self) -> pulumi.Input[_builtins.str]:
989
+ """
990
+ The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
991
+ """
992
+ return pulumi.get(self, "resource_group_name")
993
+
994
+ @resource_group_name.setter
995
+ def resource_group_name(self, value: pulumi.Input[_builtins.str]):
996
+ pulumi.set(self, "resource_group_name", value)
997
+
998
+ @_builtins.property
999
+ @pulumi.getter
1000
+ def role(self) -> pulumi.Input[_builtins.str]:
1001
+ """
1002
+ Name of the login role.
1003
+ """
1004
+ return pulumi.get(self, "role")
1005
+
1006
+ @role.setter
1007
+ def role(self, value: pulumi.Input[_builtins.str]):
1008
+ pulumi.set(self, "role", value)
1009
+
1010
+ @_builtins.property
1011
+ @pulumi.getter(name="subscriptionId")
1012
+ def subscription_id(self) -> pulumi.Input[_builtins.str]:
1013
+ """
1014
+ The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
1015
+ """
1016
+ return pulumi.get(self, "subscription_id")
1017
+
1018
+ @subscription_id.setter
1019
+ def subscription_id(self, value: pulumi.Input[_builtins.str]):
1020
+ pulumi.set(self, "subscription_id", value)
1021
+
1022
+ @_builtins.property
1023
+ @pulumi.getter(name="clientId")
1024
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
1025
+ """
1026
+ The identity's client ID.
1027
+ """
1028
+ return pulumi.get(self, "client_id")
1029
+
1030
+ @client_id.setter
1031
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
1032
+ pulumi.set(self, "client_id", value)
1033
+
1034
+ @_builtins.property
1035
+ @pulumi.getter
1036
+ def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
1037
+ """
1038
+ A signed JSON Web Token. If not specified on will be created automatically
1039
+ """
1040
+ return pulumi.get(self, "jwt")
1041
+
1042
+ @jwt.setter
1043
+ def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
1044
+ pulumi.set(self, "jwt", value)
1045
+
1046
+ @_builtins.property
1047
+ @pulumi.getter
1048
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1049
+ """
1050
+ The path where the authentication engine is mounted.
1051
+ """
1052
+ return pulumi.get(self, "mount")
1053
+
1054
+ @mount.setter
1055
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1056
+ pulumi.set(self, "mount", value)
1057
+
1058
+ @_builtins.property
1059
+ @pulumi.getter
1060
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1061
+ """
1062
+ The authentication engine's namespace. Conflicts with use_root_namespace
1063
+ """
1064
+ return pulumi.get(self, "namespace")
1065
+
1066
+ @namespace.setter
1067
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1068
+ pulumi.set(self, "namespace", value)
1069
+
1070
+ @_builtins.property
1071
+ @pulumi.getter
1072
+ def scope(self) -> Optional[pulumi.Input[_builtins.str]]:
1073
+ """
1074
+ The scopes to include in the token request.
1075
+ """
1076
+ return pulumi.get(self, "scope")
1077
+
1078
+ @scope.setter
1079
+ def scope(self, value: Optional[pulumi.Input[_builtins.str]]):
1080
+ pulumi.set(self, "scope", value)
1081
+
1082
+ @_builtins.property
1083
+ @pulumi.getter(name="tenantId")
1084
+ def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
1085
+ """
1086
+ Provides the tenant ID to use in a multi-tenant authentication scenario.
1087
+ """
1088
+ return pulumi.get(self, "tenant_id")
1089
+
1090
+ @tenant_id.setter
1091
+ def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
1092
+ pulumi.set(self, "tenant_id", value)
1093
+
1094
+ @_builtins.property
1095
+ @pulumi.getter(name="useRootNamespace")
1096
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1097
+ """
1098
+ Authenticate to the root Vault namespace. Conflicts with namespace
1099
+ """
1100
+ return pulumi.get(self, "use_root_namespace")
1101
+
1102
+ @use_root_namespace.setter
1103
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1104
+ pulumi.set(self, "use_root_namespace", value)
1105
+
1106
+ @_builtins.property
1107
+ @pulumi.getter(name="vmName")
1108
+ def vm_name(self) -> Optional[pulumi.Input[_builtins.str]]:
1109
+ """
1110
+ The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
1111
+ """
1112
+ return pulumi.get(self, "vm_name")
1113
+
1114
+ @vm_name.setter
1115
+ def vm_name(self, value: Optional[pulumi.Input[_builtins.str]]):
1116
+ pulumi.set(self, "vm_name", value)
1117
+
1118
+ @_builtins.property
1119
+ @pulumi.getter(name="vmssName")
1120
+ def vmss_name(self) -> Optional[pulumi.Input[_builtins.str]]:
1121
+ """
1122
+ The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
1123
+ """
1124
+ return pulumi.get(self, "vmss_name")
1125
+
1126
+ @vmss_name.setter
1127
+ def vmss_name(self, value: Optional[pulumi.Input[_builtins.str]]):
1128
+ pulumi.set(self, "vmss_name", value)
1129
+
1130
+
1131
+ if not MYPY:
1132
+ class ProviderAuthLoginCertArgsDict(TypedDict):
1133
+ cert_file: pulumi.Input[_builtins.str]
1134
+ """
1135
+ Path to a file containing the client certificate.
1136
+ """
1137
+ key_file: pulumi.Input[_builtins.str]
1138
+ """
1139
+ Path to a file containing the private key that the certificate was issued for.
1140
+ """
1141
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1142
+ """
1143
+ The path where the authentication engine is mounted.
1144
+ """
1145
+ name: NotRequired[pulumi.Input[_builtins.str]]
1146
+ """
1147
+ Name of the certificate's role
1148
+ """
1149
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1150
+ """
1151
+ The authentication engine's namespace. Conflicts with use_root_namespace
1152
+ """
1153
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1154
+ """
1155
+ Authenticate to the root Vault namespace. Conflicts with namespace
1156
+ """
1157
+ elif False:
1158
+ ProviderAuthLoginCertArgsDict: TypeAlias = Mapping[str, Any]
1159
+
1160
+ @pulumi.input_type
1161
+ class ProviderAuthLoginCertArgs:
1162
+ def __init__(__self__, *,
1163
+ cert_file: pulumi.Input[_builtins.str],
1164
+ key_file: pulumi.Input[_builtins.str],
1165
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
1166
+ name: Optional[pulumi.Input[_builtins.str]] = None,
1167
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1168
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
1169
+ """
1170
+ :param pulumi.Input[_builtins.str] cert_file: Path to a file containing the client certificate.
1171
+ :param pulumi.Input[_builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
1172
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
1173
+ :param pulumi.Input[_builtins.str] name: Name of the certificate's role
1174
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1175
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1176
+ """
1177
+ pulumi.set(__self__, "cert_file", cert_file)
1178
+ pulumi.set(__self__, "key_file", key_file)
1179
+ if mount is not None:
1180
+ pulumi.set(__self__, "mount", mount)
1181
+ if name is not None:
1182
+ pulumi.set(__self__, "name", name)
1183
+ if namespace is not None:
1184
+ pulumi.set(__self__, "namespace", namespace)
1185
+ if use_root_namespace is not None:
1186
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1187
+
1188
+ @_builtins.property
1189
+ @pulumi.getter(name="certFile")
1190
+ def cert_file(self) -> pulumi.Input[_builtins.str]:
1191
+ """
1192
+ Path to a file containing the client certificate.
1193
+ """
1194
+ return pulumi.get(self, "cert_file")
1195
+
1196
+ @cert_file.setter
1197
+ def cert_file(self, value: pulumi.Input[_builtins.str]):
1198
+ pulumi.set(self, "cert_file", value)
1199
+
1200
+ @_builtins.property
1201
+ @pulumi.getter(name="keyFile")
1202
+ def key_file(self) -> pulumi.Input[_builtins.str]:
1203
+ """
1204
+ Path to a file containing the private key that the certificate was issued for.
1205
+ """
1206
+ return pulumi.get(self, "key_file")
1207
+
1208
+ @key_file.setter
1209
+ def key_file(self, value: pulumi.Input[_builtins.str]):
1210
+ pulumi.set(self, "key_file", value)
1211
+
1212
+ @_builtins.property
1213
+ @pulumi.getter
1214
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1215
+ """
1216
+ The path where the authentication engine is mounted.
1217
+ """
1218
+ return pulumi.get(self, "mount")
1219
+
1220
+ @mount.setter
1221
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1222
+ pulumi.set(self, "mount", value)
1223
+
1224
+ @_builtins.property
1225
+ @pulumi.getter
1226
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
1227
+ """
1228
+ Name of the certificate's role
1229
+ """
1230
+ return pulumi.get(self, "name")
1231
+
1232
+ @name.setter
1233
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
1234
+ pulumi.set(self, "name", value)
1235
+
1236
+ @_builtins.property
1237
+ @pulumi.getter
1238
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1239
+ """
1240
+ The authentication engine's namespace. Conflicts with use_root_namespace
1241
+ """
1242
+ return pulumi.get(self, "namespace")
1243
+
1244
+ @namespace.setter
1245
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1246
+ pulumi.set(self, "namespace", value)
1247
+
1248
+ @_builtins.property
1249
+ @pulumi.getter(name="useRootNamespace")
1250
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1251
+ """
1252
+ Authenticate to the root Vault namespace. Conflicts with namespace
1253
+ """
1254
+ return pulumi.get(self, "use_root_namespace")
1255
+
1256
+ @use_root_namespace.setter
1257
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1258
+ pulumi.set(self, "use_root_namespace", value)
1259
+
1260
+
1261
+ if not MYPY:
1262
+ class ProviderAuthLoginGcpArgsDict(TypedDict):
1263
+ role: pulumi.Input[_builtins.str]
1264
+ """
1265
+ Name of the login role.
1266
+ """
1267
+ credentials: NotRequired[pulumi.Input[_builtins.str]]
1268
+ """
1269
+ Path to the Google Cloud credentials file.
1270
+ """
1271
+ jwt: NotRequired[pulumi.Input[_builtins.str]]
1272
+ """
1273
+ A signed JSON Web Token.
1274
+ """
1275
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1276
+ """
1277
+ The path where the authentication engine is mounted.
1278
+ """
1279
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1280
+ """
1281
+ The authentication engine's namespace. Conflicts with use_root_namespace
1282
+ """
1283
+ service_account: NotRequired[pulumi.Input[_builtins.str]]
1284
+ """
1285
+ IAM service account.
1286
+ """
1287
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1288
+ """
1289
+ Authenticate to the root Vault namespace. Conflicts with namespace
1290
+ """
1291
+ elif False:
1292
+ ProviderAuthLoginGcpArgsDict: TypeAlias = Mapping[str, Any]
1293
+
1294
+ @pulumi.input_type
1295
+ class ProviderAuthLoginGcpArgs:
1296
+ def __init__(__self__, *,
1297
+ role: pulumi.Input[_builtins.str],
1298
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
1299
+ jwt: Optional[pulumi.Input[_builtins.str]] = None,
1300
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
1301
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1302
+ service_account: Optional[pulumi.Input[_builtins.str]] = None,
1303
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
1304
+ """
1305
+ :param pulumi.Input[_builtins.str] role: Name of the login role.
1306
+ :param pulumi.Input[_builtins.str] credentials: Path to the Google Cloud credentials file.
1307
+ :param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token.
1308
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
1309
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1310
+ :param pulumi.Input[_builtins.str] service_account: IAM service account.
1311
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1312
+ """
1313
+ pulumi.set(__self__, "role", role)
1314
+ if credentials is not None:
1315
+ pulumi.set(__self__, "credentials", credentials)
1316
+ if jwt is not None:
1317
+ pulumi.set(__self__, "jwt", jwt)
1318
+ if mount is not None:
1319
+ pulumi.set(__self__, "mount", mount)
1320
+ if namespace is not None:
1321
+ pulumi.set(__self__, "namespace", namespace)
1322
+ if service_account is not None:
1323
+ pulumi.set(__self__, "service_account", service_account)
1324
+ if use_root_namespace is not None:
1325
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1326
+
1327
+ @_builtins.property
1328
+ @pulumi.getter
1329
+ def role(self) -> pulumi.Input[_builtins.str]:
1330
+ """
1331
+ Name of the login role.
1332
+ """
1333
+ return pulumi.get(self, "role")
1334
+
1335
+ @role.setter
1336
+ def role(self, value: pulumi.Input[_builtins.str]):
1337
+ pulumi.set(self, "role", value)
1338
+
1339
+ @_builtins.property
1340
+ @pulumi.getter
1341
+ def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
1342
+ """
1343
+ Path to the Google Cloud credentials file.
1344
+ """
1345
+ return pulumi.get(self, "credentials")
1346
+
1347
+ @credentials.setter
1348
+ def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
1349
+ pulumi.set(self, "credentials", value)
1350
+
1351
+ @_builtins.property
1352
+ @pulumi.getter
1353
+ def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
1354
+ """
1355
+ A signed JSON Web Token.
1356
+ """
1357
+ return pulumi.get(self, "jwt")
1358
+
1359
+ @jwt.setter
1360
+ def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
1361
+ pulumi.set(self, "jwt", value)
1362
+
1363
+ @_builtins.property
1364
+ @pulumi.getter
1365
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1366
+ """
1367
+ The path where the authentication engine is mounted.
1368
+ """
1369
+ return pulumi.get(self, "mount")
1370
+
1371
+ @mount.setter
1372
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1373
+ pulumi.set(self, "mount", value)
1374
+
1375
+ @_builtins.property
1376
+ @pulumi.getter
1377
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1378
+ """
1379
+ The authentication engine's namespace. Conflicts with use_root_namespace
1380
+ """
1381
+ return pulumi.get(self, "namespace")
1382
+
1383
+ @namespace.setter
1384
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1385
+ pulumi.set(self, "namespace", value)
1386
+
1387
+ @_builtins.property
1388
+ @pulumi.getter(name="serviceAccount")
1389
+ def service_account(self) -> Optional[pulumi.Input[_builtins.str]]:
1390
+ """
1391
+ IAM service account.
1392
+ """
1393
+ return pulumi.get(self, "service_account")
1394
+
1395
+ @service_account.setter
1396
+ def service_account(self, value: Optional[pulumi.Input[_builtins.str]]):
1397
+ pulumi.set(self, "service_account", value)
1398
+
1399
+ @_builtins.property
1400
+ @pulumi.getter(name="useRootNamespace")
1401
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1402
+ """
1403
+ Authenticate to the root Vault namespace. Conflicts with namespace
1404
+ """
1405
+ return pulumi.get(self, "use_root_namespace")
1406
+
1407
+ @use_root_namespace.setter
1408
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1409
+ pulumi.set(self, "use_root_namespace", value)
1410
+
1411
+
1412
+ if not MYPY:
1413
+ class ProviderAuthLoginJwtArgsDict(TypedDict):
1414
+ role: pulumi.Input[_builtins.str]
1415
+ """
1416
+ Name of the login role.
1417
+ """
1418
+ jwt: NotRequired[pulumi.Input[_builtins.str]]
1419
+ """
1420
+ A signed JSON Web Token.
1421
+ """
1422
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1423
+ """
1424
+ The path where the authentication engine is mounted.
1425
+ """
1426
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1427
+ """
1428
+ The authentication engine's namespace. Conflicts with use_root_namespace
1429
+ """
1430
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1431
+ """
1432
+ Authenticate to the root Vault namespace. Conflicts with namespace
1433
+ """
1434
+ elif False:
1435
+ ProviderAuthLoginJwtArgsDict: TypeAlias = Mapping[str, Any]
1436
+
1437
+ @pulumi.input_type
1438
+ class ProviderAuthLoginJwtArgs:
1439
+ def __init__(__self__, *,
1440
+ role: pulumi.Input[_builtins.str],
1441
+ jwt: Optional[pulumi.Input[_builtins.str]] = None,
1442
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
1443
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1444
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
1445
+ """
1446
+ :param pulumi.Input[_builtins.str] role: Name of the login role.
1447
+ :param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token.
1448
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
1449
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1450
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1451
+ """
1452
+ pulumi.set(__self__, "role", role)
1453
+ if jwt is not None:
1454
+ pulumi.set(__self__, "jwt", jwt)
1455
+ if mount is not None:
1456
+ pulumi.set(__self__, "mount", mount)
1457
+ if namespace is not None:
1458
+ pulumi.set(__self__, "namespace", namespace)
1459
+ if use_root_namespace is not None:
1460
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1461
+
1462
+ @_builtins.property
1463
+ @pulumi.getter
1464
+ def role(self) -> pulumi.Input[_builtins.str]:
1465
+ """
1466
+ Name of the login role.
1467
+ """
1468
+ return pulumi.get(self, "role")
1469
+
1470
+ @role.setter
1471
+ def role(self, value: pulumi.Input[_builtins.str]):
1472
+ pulumi.set(self, "role", value)
1473
+
1474
+ @_builtins.property
1475
+ @pulumi.getter
1476
+ def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
1477
+ """
1478
+ A signed JSON Web Token.
1479
+ """
1480
+ return pulumi.get(self, "jwt")
1481
+
1482
+ @jwt.setter
1483
+ def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
1484
+ pulumi.set(self, "jwt", value)
1485
+
1486
+ @_builtins.property
1487
+ @pulumi.getter
1488
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1489
+ """
1490
+ The path where the authentication engine is mounted.
1491
+ """
1492
+ return pulumi.get(self, "mount")
1493
+
1494
+ @mount.setter
1495
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1496
+ pulumi.set(self, "mount", value)
1497
+
1498
+ @_builtins.property
1499
+ @pulumi.getter
1500
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1501
+ """
1502
+ The authentication engine's namespace. Conflicts with use_root_namespace
1503
+ """
1504
+ return pulumi.get(self, "namespace")
1505
+
1506
+ @namespace.setter
1507
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1508
+ pulumi.set(self, "namespace", value)
1509
+
1510
+ @_builtins.property
1511
+ @pulumi.getter(name="useRootNamespace")
1512
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1513
+ """
1514
+ Authenticate to the root Vault namespace. Conflicts with namespace
1515
+ """
1516
+ return pulumi.get(self, "use_root_namespace")
1517
+
1518
+ @use_root_namespace.setter
1519
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1520
+ pulumi.set(self, "use_root_namespace", value)
1521
+
1522
+
1523
+ if not MYPY:
1524
+ class ProviderAuthLoginKerberosArgsDict(TypedDict):
1525
+ disable_fast_negotiation: NotRequired[pulumi.Input[_builtins.bool]]
1526
+ """
1527
+ Disable the Kerberos FAST negotiation.
1528
+ """
1529
+ keytab_path: NotRequired[pulumi.Input[_builtins.str]]
1530
+ """
1531
+ The Kerberos keytab file containing the entry of the login entity.
1532
+ """
1533
+ krb5conf_path: NotRequired[pulumi.Input[_builtins.str]]
1534
+ """
1535
+ A valid Kerberos configuration file e.g. /etc/krb5.conf.
1536
+ """
1537
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1538
+ """
1539
+ The path where the authentication engine is mounted.
1540
+ """
1541
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1542
+ """
1543
+ The authentication engine's namespace. Conflicts with use_root_namespace
1544
+ """
1545
+ realm: NotRequired[pulumi.Input[_builtins.str]]
1546
+ """
1547
+ The Kerberos server's authoritative authentication domain
1548
+ """
1549
+ remove_instance_name: NotRequired[pulumi.Input[_builtins.bool]]
1550
+ """
1551
+ Strip the host from the username found in the keytab.
1552
+ """
1553
+ service: NotRequired[pulumi.Input[_builtins.str]]
1554
+ """
1555
+ The service principle name.
1556
+ """
1557
+ token: NotRequired[pulumi.Input[_builtins.str]]
1558
+ """
1559
+ Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
1560
+ """
1561
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1562
+ """
1563
+ Authenticate to the root Vault namespace. Conflicts with namespace
1564
+ """
1565
+ username: NotRequired[pulumi.Input[_builtins.str]]
1566
+ """
1567
+ The username to login into Kerberos with.
1568
+ """
1569
+ elif False:
1570
+ ProviderAuthLoginKerberosArgsDict: TypeAlias = Mapping[str, Any]
1571
+
1572
+ @pulumi.input_type
1573
+ class ProviderAuthLoginKerberosArgs:
1574
+ def __init__(__self__, *,
1575
+ disable_fast_negotiation: Optional[pulumi.Input[_builtins.bool]] = None,
1576
+ keytab_path: Optional[pulumi.Input[_builtins.str]] = None,
1577
+ krb5conf_path: Optional[pulumi.Input[_builtins.str]] = None,
1578
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
1579
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1580
+ realm: Optional[pulumi.Input[_builtins.str]] = None,
1581
+ remove_instance_name: Optional[pulumi.Input[_builtins.bool]] = None,
1582
+ service: Optional[pulumi.Input[_builtins.str]] = None,
1583
+ token: Optional[pulumi.Input[_builtins.str]] = None,
1584
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
1585
+ username: Optional[pulumi.Input[_builtins.str]] = None):
1586
+ """
1587
+ :param pulumi.Input[_builtins.bool] disable_fast_negotiation: Disable the Kerberos FAST negotiation.
1588
+ :param pulumi.Input[_builtins.str] keytab_path: The Kerberos keytab file containing the entry of the login entity.
1589
+ :param pulumi.Input[_builtins.str] krb5conf_path: A valid Kerberos configuration file e.g. /etc/krb5.conf.
1590
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
1591
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1592
+ :param pulumi.Input[_builtins.str] realm: The Kerberos server's authoritative authentication domain
1593
+ :param pulumi.Input[_builtins.bool] remove_instance_name: Strip the host from the username found in the keytab.
1594
+ :param pulumi.Input[_builtins.str] service: The service principle name.
1595
+ :param pulumi.Input[_builtins.str] token: Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
1596
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1597
+ :param pulumi.Input[_builtins.str] username: The username to login into Kerberos with.
1598
+ """
1599
+ if disable_fast_negotiation is not None:
1600
+ pulumi.set(__self__, "disable_fast_negotiation", disable_fast_negotiation)
1601
+ if keytab_path is not None:
1602
+ pulumi.set(__self__, "keytab_path", keytab_path)
1603
+ if krb5conf_path is not None:
1604
+ pulumi.set(__self__, "krb5conf_path", krb5conf_path)
1605
+ if mount is not None:
1606
+ pulumi.set(__self__, "mount", mount)
1607
+ if namespace is not None:
1608
+ pulumi.set(__self__, "namespace", namespace)
1609
+ if realm is not None:
1610
+ pulumi.set(__self__, "realm", realm)
1611
+ if remove_instance_name is not None:
1612
+ pulumi.set(__self__, "remove_instance_name", remove_instance_name)
1613
+ if service is not None:
1614
+ pulumi.set(__self__, "service", service)
1615
+ if token is not None:
1616
+ pulumi.set(__self__, "token", token)
1617
+ if use_root_namespace is not None:
1618
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1619
+ if username is not None:
1620
+ pulumi.set(__self__, "username", username)
1621
+
1622
+ @_builtins.property
1623
+ @pulumi.getter(name="disableFastNegotiation")
1624
+ def disable_fast_negotiation(self) -> Optional[pulumi.Input[_builtins.bool]]:
1625
+ """
1626
+ Disable the Kerberos FAST negotiation.
1627
+ """
1628
+ return pulumi.get(self, "disable_fast_negotiation")
1629
+
1630
+ @disable_fast_negotiation.setter
1631
+ def disable_fast_negotiation(self, value: Optional[pulumi.Input[_builtins.bool]]):
1632
+ pulumi.set(self, "disable_fast_negotiation", value)
1633
+
1634
+ @_builtins.property
1635
+ @pulumi.getter(name="keytabPath")
1636
+ def keytab_path(self) -> Optional[pulumi.Input[_builtins.str]]:
1637
+ """
1638
+ The Kerberos keytab file containing the entry of the login entity.
1639
+ """
1640
+ return pulumi.get(self, "keytab_path")
1641
+
1642
+ @keytab_path.setter
1643
+ def keytab_path(self, value: Optional[pulumi.Input[_builtins.str]]):
1644
+ pulumi.set(self, "keytab_path", value)
1645
+
1646
+ @_builtins.property
1647
+ @pulumi.getter(name="krb5confPath")
1648
+ def krb5conf_path(self) -> Optional[pulumi.Input[_builtins.str]]:
1649
+ """
1650
+ A valid Kerberos configuration file e.g. /etc/krb5.conf.
1651
+ """
1652
+ return pulumi.get(self, "krb5conf_path")
1653
+
1654
+ @krb5conf_path.setter
1655
+ def krb5conf_path(self, value: Optional[pulumi.Input[_builtins.str]]):
1656
+ pulumi.set(self, "krb5conf_path", value)
1657
+
1658
+ @_builtins.property
1659
+ @pulumi.getter
1660
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1661
+ """
1662
+ The path where the authentication engine is mounted.
1663
+ """
1664
+ return pulumi.get(self, "mount")
1665
+
1666
+ @mount.setter
1667
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1668
+ pulumi.set(self, "mount", value)
1669
+
1670
+ @_builtins.property
1671
+ @pulumi.getter
1672
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1673
+ """
1674
+ The authentication engine's namespace. Conflicts with use_root_namespace
1675
+ """
1676
+ return pulumi.get(self, "namespace")
1677
+
1678
+ @namespace.setter
1679
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1680
+ pulumi.set(self, "namespace", value)
1681
+
1682
+ @_builtins.property
1683
+ @pulumi.getter
1684
+ def realm(self) -> Optional[pulumi.Input[_builtins.str]]:
1685
+ """
1686
+ The Kerberos server's authoritative authentication domain
1687
+ """
1688
+ return pulumi.get(self, "realm")
1689
+
1690
+ @realm.setter
1691
+ def realm(self, value: Optional[pulumi.Input[_builtins.str]]):
1692
+ pulumi.set(self, "realm", value)
1693
+
1694
+ @_builtins.property
1695
+ @pulumi.getter(name="removeInstanceName")
1696
+ def remove_instance_name(self) -> Optional[pulumi.Input[_builtins.bool]]:
1697
+ """
1698
+ Strip the host from the username found in the keytab.
1699
+ """
1700
+ return pulumi.get(self, "remove_instance_name")
1701
+
1702
+ @remove_instance_name.setter
1703
+ def remove_instance_name(self, value: Optional[pulumi.Input[_builtins.bool]]):
1704
+ pulumi.set(self, "remove_instance_name", value)
1705
+
1706
+ @_builtins.property
1707
+ @pulumi.getter
1708
+ def service(self) -> Optional[pulumi.Input[_builtins.str]]:
1709
+ """
1710
+ The service principle name.
1711
+ """
1712
+ return pulumi.get(self, "service")
1713
+
1714
+ @service.setter
1715
+ def service(self, value: Optional[pulumi.Input[_builtins.str]]):
1716
+ pulumi.set(self, "service", value)
1717
+
1718
+ @_builtins.property
1719
+ @pulumi.getter
1720
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
1721
+ """
1722
+ Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
1723
+ """
1724
+ return pulumi.get(self, "token")
1725
+
1726
+ @token.setter
1727
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
1728
+ pulumi.set(self, "token", value)
1729
+
1730
+ @_builtins.property
1731
+ @pulumi.getter(name="useRootNamespace")
1732
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1733
+ """
1734
+ Authenticate to the root Vault namespace. Conflicts with namespace
1735
+ """
1736
+ return pulumi.get(self, "use_root_namespace")
1737
+
1738
+ @use_root_namespace.setter
1739
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1740
+ pulumi.set(self, "use_root_namespace", value)
1741
+
1742
+ @_builtins.property
1743
+ @pulumi.getter
1744
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
1745
+ """
1746
+ The username to login into Kerberos with.
1747
+ """
1748
+ return pulumi.get(self, "username")
1749
+
1750
+ @username.setter
1751
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
1752
+ pulumi.set(self, "username", value)
1753
+
1754
+
1755
+ if not MYPY:
1756
+ class ProviderAuthLoginOciArgsDict(TypedDict):
1757
+ auth_type: pulumi.Input[_builtins.str]
1758
+ """
1759
+ Authentication type to use when getting OCI credentials.
1760
+ """
1761
+ role: pulumi.Input[_builtins.str]
1762
+ """
1763
+ Name of the login role.
1764
+ """
1765
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1766
+ """
1767
+ The path where the authentication engine is mounted.
1768
+ """
1769
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1770
+ """
1771
+ The authentication engine's namespace. Conflicts with use_root_namespace
1772
+ """
1773
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1774
+ """
1775
+ Authenticate to the root Vault namespace. Conflicts with namespace
1776
+ """
1777
+ elif False:
1778
+ ProviderAuthLoginOciArgsDict: TypeAlias = Mapping[str, Any]
1779
+
1780
+ @pulumi.input_type
1781
+ class ProviderAuthLoginOciArgs:
1782
+ def __init__(__self__, *,
1783
+ auth_type: pulumi.Input[_builtins.str],
1784
+ role: pulumi.Input[_builtins.str],
1785
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
1786
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1787
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
1788
+ """
1789
+ :param pulumi.Input[_builtins.str] auth_type: Authentication type to use when getting OCI credentials.
1790
+ :param pulumi.Input[_builtins.str] role: Name of the login role.
1791
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
1792
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1793
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1794
+ """
1795
+ pulumi.set(__self__, "auth_type", auth_type)
1796
+ pulumi.set(__self__, "role", role)
1797
+ if mount is not None:
1798
+ pulumi.set(__self__, "mount", mount)
1799
+ if namespace is not None:
1800
+ pulumi.set(__self__, "namespace", namespace)
1801
+ if use_root_namespace is not None:
1802
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1803
+
1804
+ @_builtins.property
1805
+ @pulumi.getter(name="authType")
1806
+ def auth_type(self) -> pulumi.Input[_builtins.str]:
1807
+ """
1808
+ Authentication type to use when getting OCI credentials.
1809
+ """
1810
+ return pulumi.get(self, "auth_type")
1811
+
1812
+ @auth_type.setter
1813
+ def auth_type(self, value: pulumi.Input[_builtins.str]):
1814
+ pulumi.set(self, "auth_type", value)
1815
+
1816
+ @_builtins.property
1817
+ @pulumi.getter
1818
+ def role(self) -> pulumi.Input[_builtins.str]:
1819
+ """
1820
+ Name of the login role.
1821
+ """
1822
+ return pulumi.get(self, "role")
1823
+
1824
+ @role.setter
1825
+ def role(self, value: pulumi.Input[_builtins.str]):
1826
+ pulumi.set(self, "role", value)
1827
+
1828
+ @_builtins.property
1829
+ @pulumi.getter
1830
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1831
+ """
1832
+ The path where the authentication engine is mounted.
1833
+ """
1834
+ return pulumi.get(self, "mount")
1835
+
1836
+ @mount.setter
1837
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1838
+ pulumi.set(self, "mount", value)
1839
+
1840
+ @_builtins.property
1841
+ @pulumi.getter
1842
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1843
+ """
1844
+ The authentication engine's namespace. Conflicts with use_root_namespace
1845
+ """
1846
+ return pulumi.get(self, "namespace")
1847
+
1848
+ @namespace.setter
1849
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1850
+ pulumi.set(self, "namespace", value)
1851
+
1852
+ @_builtins.property
1853
+ @pulumi.getter(name="useRootNamespace")
1854
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1855
+ """
1856
+ Authenticate to the root Vault namespace. Conflicts with namespace
1857
+ """
1858
+ return pulumi.get(self, "use_root_namespace")
1859
+
1860
+ @use_root_namespace.setter
1861
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1862
+ pulumi.set(self, "use_root_namespace", value)
1863
+
1864
+
1865
+ if not MYPY:
1866
+ class ProviderAuthLoginOidcArgsDict(TypedDict):
1867
+ role: pulumi.Input[_builtins.str]
1868
+ """
1869
+ Name of the login role.
1870
+ """
1871
+ callback_address: NotRequired[pulumi.Input[_builtins.str]]
1872
+ """
1873
+ The callback address. Must be a valid URI without the path.
1874
+ """
1875
+ callback_listener_address: NotRequired[pulumi.Input[_builtins.str]]
1876
+ """
1877
+ The callback listener's address. Must be a valid URI without the path.
1878
+ """
1879
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1880
+ """
1881
+ The path where the authentication engine is mounted.
1882
+ """
1883
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1884
+ """
1885
+ The authentication engine's namespace. Conflicts with use_root_namespace
1886
+ """
1887
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1888
+ """
1889
+ Authenticate to the root Vault namespace. Conflicts with namespace
1890
+ """
1891
+ elif False:
1892
+ ProviderAuthLoginOidcArgsDict: TypeAlias = Mapping[str, Any]
1893
+
1894
+ @pulumi.input_type
1895
+ class ProviderAuthLoginOidcArgs:
1896
+ def __init__(__self__, *,
1897
+ role: pulumi.Input[_builtins.str],
1898
+ callback_address: Optional[pulumi.Input[_builtins.str]] = None,
1899
+ callback_listener_address: Optional[pulumi.Input[_builtins.str]] = None,
1900
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
1901
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1902
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
1903
+ """
1904
+ :param pulumi.Input[_builtins.str] role: Name of the login role.
1905
+ :param pulumi.Input[_builtins.str] callback_address: The callback address. Must be a valid URI without the path.
1906
+ :param pulumi.Input[_builtins.str] callback_listener_address: The callback listener's address. Must be a valid URI without the path.
1907
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
1908
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1909
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1910
+ """
1911
+ pulumi.set(__self__, "role", role)
1912
+ if callback_address is not None:
1913
+ pulumi.set(__self__, "callback_address", callback_address)
1914
+ if callback_listener_address is not None:
1915
+ pulumi.set(__self__, "callback_listener_address", callback_listener_address)
1916
+ if mount is not None:
1917
+ pulumi.set(__self__, "mount", mount)
1918
+ if namespace is not None:
1919
+ pulumi.set(__self__, "namespace", namespace)
1920
+ if use_root_namespace is not None:
1921
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1922
+
1923
+ @_builtins.property
1924
+ @pulumi.getter
1925
+ def role(self) -> pulumi.Input[_builtins.str]:
1926
+ """
1927
+ Name of the login role.
1928
+ """
1929
+ return pulumi.get(self, "role")
1930
+
1931
+ @role.setter
1932
+ def role(self, value: pulumi.Input[_builtins.str]):
1933
+ pulumi.set(self, "role", value)
1934
+
1935
+ @_builtins.property
1936
+ @pulumi.getter(name="callbackAddress")
1937
+ def callback_address(self) -> Optional[pulumi.Input[_builtins.str]]:
1938
+ """
1939
+ The callback address. Must be a valid URI without the path.
1940
+ """
1941
+ return pulumi.get(self, "callback_address")
1942
+
1943
+ @callback_address.setter
1944
+ def callback_address(self, value: Optional[pulumi.Input[_builtins.str]]):
1945
+ pulumi.set(self, "callback_address", value)
1946
+
1947
+ @_builtins.property
1948
+ @pulumi.getter(name="callbackListenerAddress")
1949
+ def callback_listener_address(self) -> Optional[pulumi.Input[_builtins.str]]:
1950
+ """
1951
+ The callback listener's address. Must be a valid URI without the path.
1952
+ """
1953
+ return pulumi.get(self, "callback_listener_address")
1954
+
1955
+ @callback_listener_address.setter
1956
+ def callback_listener_address(self, value: Optional[pulumi.Input[_builtins.str]]):
1957
+ pulumi.set(self, "callback_listener_address", value)
1958
+
1959
+ @_builtins.property
1960
+ @pulumi.getter
1961
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1962
+ """
1963
+ The path where the authentication engine is mounted.
1964
+ """
1965
+ return pulumi.get(self, "mount")
1966
+
1967
+ @mount.setter
1968
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1969
+ pulumi.set(self, "mount", value)
1970
+
1971
+ @_builtins.property
1972
+ @pulumi.getter
1973
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1974
+ """
1975
+ The authentication engine's namespace. Conflicts with use_root_namespace
1976
+ """
1977
+ return pulumi.get(self, "namespace")
1978
+
1979
+ @namespace.setter
1980
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1981
+ pulumi.set(self, "namespace", value)
1982
+
1983
+ @_builtins.property
1984
+ @pulumi.getter(name="useRootNamespace")
1985
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1986
+ """
1987
+ Authenticate to the root Vault namespace. Conflicts with namespace
1988
+ """
1989
+ return pulumi.get(self, "use_root_namespace")
1990
+
1991
+ @use_root_namespace.setter
1992
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1993
+ pulumi.set(self, "use_root_namespace", value)
1994
+
1995
+
1996
+ if not MYPY:
1997
+ class ProviderAuthLoginRadiusArgsDict(TypedDict):
1998
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1999
+ """
2000
+ The path where the authentication engine is mounted.
2001
+ """
2002
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
2003
+ """
2004
+ The authentication engine's namespace. Conflicts with use_root_namespace
2005
+ """
2006
+ password: NotRequired[pulumi.Input[_builtins.str]]
2007
+ """
2008
+ The Radius password for username.
2009
+ """
2010
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
2011
+ """
2012
+ Authenticate to the root Vault namespace. Conflicts with namespace
2013
+ """
2014
+ username: NotRequired[pulumi.Input[_builtins.str]]
2015
+ """
2016
+ The Radius username.
2017
+ """
2018
+ elif False:
2019
+ ProviderAuthLoginRadiusArgsDict: TypeAlias = Mapping[str, Any]
2020
+
2021
+ @pulumi.input_type
2022
+ class ProviderAuthLoginRadiusArgs:
2023
+ def __init__(__self__, *,
2024
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
2025
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
2026
+ password: Optional[pulumi.Input[_builtins.str]] = None,
2027
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
2028
+ username: Optional[pulumi.Input[_builtins.str]] = None):
2029
+ """
2030
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
2031
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
2032
+ :param pulumi.Input[_builtins.str] password: The Radius password for username.
2033
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
2034
+ :param pulumi.Input[_builtins.str] username: The Radius username.
2035
+ """
2036
+ if mount is not None:
2037
+ pulumi.set(__self__, "mount", mount)
2038
+ if namespace is not None:
2039
+ pulumi.set(__self__, "namespace", namespace)
2040
+ if password is not None:
2041
+ pulumi.set(__self__, "password", password)
2042
+ if use_root_namespace is not None:
2043
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
2044
+ if username is not None:
2045
+ pulumi.set(__self__, "username", username)
2046
+
2047
+ @_builtins.property
2048
+ @pulumi.getter
2049
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
2050
+ """
2051
+ The path where the authentication engine is mounted.
2052
+ """
2053
+ return pulumi.get(self, "mount")
2054
+
2055
+ @mount.setter
2056
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
2057
+ pulumi.set(self, "mount", value)
2058
+
2059
+ @_builtins.property
2060
+ @pulumi.getter
2061
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
2062
+ """
2063
+ The authentication engine's namespace. Conflicts with use_root_namespace
2064
+ """
2065
+ return pulumi.get(self, "namespace")
2066
+
2067
+ @namespace.setter
2068
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
2069
+ pulumi.set(self, "namespace", value)
2070
+
2071
+ @_builtins.property
2072
+ @pulumi.getter
2073
+ def password(self) -> Optional[pulumi.Input[_builtins.str]]:
2074
+ """
2075
+ The Radius password for username.
2076
+ """
2077
+ return pulumi.get(self, "password")
2078
+
2079
+ @password.setter
2080
+ def password(self, value: Optional[pulumi.Input[_builtins.str]]):
2081
+ pulumi.set(self, "password", value)
2082
+
2083
+ @_builtins.property
2084
+ @pulumi.getter(name="useRootNamespace")
2085
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
2086
+ """
2087
+ Authenticate to the root Vault namespace. Conflicts with namespace
2088
+ """
2089
+ return pulumi.get(self, "use_root_namespace")
2090
+
2091
+ @use_root_namespace.setter
2092
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
2093
+ pulumi.set(self, "use_root_namespace", value)
2094
+
2095
+ @_builtins.property
2096
+ @pulumi.getter
2097
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
2098
+ """
2099
+ The Radius username.
2100
+ """
2101
+ return pulumi.get(self, "username")
2102
+
2103
+ @username.setter
2104
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
2105
+ pulumi.set(self, "username", value)
2106
+
2107
+
2108
+ if not MYPY:
2109
+ class ProviderAuthLoginTokenFileArgsDict(TypedDict):
2110
+ filename: NotRequired[pulumi.Input[_builtins.str]]
2111
+ """
2112
+ The name of a file containing a single line that is a valid Vault token
2113
+ """
2114
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
2115
+ """
2116
+ The authentication engine's namespace. Conflicts with use_root_namespace
2117
+ """
2118
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
2119
+ """
2120
+ Authenticate to the root Vault namespace. Conflicts with namespace
2121
+ """
2122
+ elif False:
2123
+ ProviderAuthLoginTokenFileArgsDict: TypeAlias = Mapping[str, Any]
2124
+
2125
+ @pulumi.input_type
2126
+ class ProviderAuthLoginTokenFileArgs:
2127
+ def __init__(__self__, *,
2128
+ filename: Optional[pulumi.Input[_builtins.str]] = None,
2129
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
2130
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
2131
+ """
2132
+ :param pulumi.Input[_builtins.str] filename: The name of a file containing a single line that is a valid Vault token
2133
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
2134
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
2135
+ """
2136
+ if filename is not None:
2137
+ pulumi.set(__self__, "filename", filename)
2138
+ if namespace is not None:
2139
+ pulumi.set(__self__, "namespace", namespace)
2140
+ if use_root_namespace is not None:
2141
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
2142
+
2143
+ @_builtins.property
2144
+ @pulumi.getter
2145
+ def filename(self) -> Optional[pulumi.Input[_builtins.str]]:
2146
+ """
2147
+ The name of a file containing a single line that is a valid Vault token
2148
+ """
2149
+ return pulumi.get(self, "filename")
2150
+
2151
+ @filename.setter
2152
+ def filename(self, value: Optional[pulumi.Input[_builtins.str]]):
2153
+ pulumi.set(self, "filename", value)
2154
+
2155
+ @_builtins.property
2156
+ @pulumi.getter
2157
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
2158
+ """
2159
+ The authentication engine's namespace. Conflicts with use_root_namespace
2160
+ """
2161
+ return pulumi.get(self, "namespace")
2162
+
2163
+ @namespace.setter
2164
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
2165
+ pulumi.set(self, "namespace", value)
2166
+
2167
+ @_builtins.property
2168
+ @pulumi.getter(name="useRootNamespace")
2169
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
2170
+ """
2171
+ Authenticate to the root Vault namespace. Conflicts with namespace
2172
+ """
2173
+ return pulumi.get(self, "use_root_namespace")
2174
+
2175
+ @use_root_namespace.setter
2176
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
2177
+ pulumi.set(self, "use_root_namespace", value)
2178
+
2179
+
2180
+ if not MYPY:
2181
+ class ProviderAuthLoginUserpassArgsDict(TypedDict):
2182
+ mount: NotRequired[pulumi.Input[_builtins.str]]
2183
+ """
2184
+ The path where the authentication engine is mounted.
2185
+ """
2186
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
2187
+ """
2188
+ The authentication engine's namespace. Conflicts with use_root_namespace
2189
+ """
2190
+ password: NotRequired[pulumi.Input[_builtins.str]]
2191
+ """
2192
+ Login with password
2193
+ """
2194
+ password_file: NotRequired[pulumi.Input[_builtins.str]]
2195
+ """
2196
+ Login with password from a file
2197
+ """
2198
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
2199
+ """
2200
+ Authenticate to the root Vault namespace. Conflicts with namespace
2201
+ """
2202
+ username: NotRequired[pulumi.Input[_builtins.str]]
2203
+ """
2204
+ Login with username
2205
+ """
2206
+ elif False:
2207
+ ProviderAuthLoginUserpassArgsDict: TypeAlias = Mapping[str, Any]
2208
+
2209
+ @pulumi.input_type
2210
+ class ProviderAuthLoginUserpassArgs:
2211
+ def __init__(__self__, *,
2212
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
2213
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
2214
+ password: Optional[pulumi.Input[_builtins.str]] = None,
2215
+ password_file: Optional[pulumi.Input[_builtins.str]] = None,
2216
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
2217
+ username: Optional[pulumi.Input[_builtins.str]] = None):
2218
+ """
2219
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
2220
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
2221
+ :param pulumi.Input[_builtins.str] password: Login with password
2222
+ :param pulumi.Input[_builtins.str] password_file: Login with password from a file
2223
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
2224
+ :param pulumi.Input[_builtins.str] username: Login with username
2225
+ """
2226
+ if mount is not None:
2227
+ pulumi.set(__self__, "mount", mount)
2228
+ if namespace is not None:
2229
+ pulumi.set(__self__, "namespace", namespace)
2230
+ if password is not None:
2231
+ pulumi.set(__self__, "password", password)
2232
+ if password_file is not None:
2233
+ pulumi.set(__self__, "password_file", password_file)
2234
+ if use_root_namespace is not None:
2235
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
2236
+ if username is not None:
2237
+ pulumi.set(__self__, "username", username)
2238
+
2239
+ @_builtins.property
2240
+ @pulumi.getter
2241
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
2242
+ """
2243
+ The path where the authentication engine is mounted.
2244
+ """
2245
+ return pulumi.get(self, "mount")
2246
+
2247
+ @mount.setter
2248
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
2249
+ pulumi.set(self, "mount", value)
2250
+
2251
+ @_builtins.property
2252
+ @pulumi.getter
2253
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
2254
+ """
2255
+ The authentication engine's namespace. Conflicts with use_root_namespace
2256
+ """
2257
+ return pulumi.get(self, "namespace")
2258
+
2259
+ @namespace.setter
2260
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
2261
+ pulumi.set(self, "namespace", value)
2262
+
2263
+ @_builtins.property
2264
+ @pulumi.getter
2265
+ def password(self) -> Optional[pulumi.Input[_builtins.str]]:
2266
+ """
2267
+ Login with password
2268
+ """
2269
+ return pulumi.get(self, "password")
2270
+
2271
+ @password.setter
2272
+ def password(self, value: Optional[pulumi.Input[_builtins.str]]):
2273
+ pulumi.set(self, "password", value)
2274
+
2275
+ @_builtins.property
2276
+ @pulumi.getter(name="passwordFile")
2277
+ def password_file(self) -> Optional[pulumi.Input[_builtins.str]]:
2278
+ """
2279
+ Login with password from a file
2280
+ """
2281
+ return pulumi.get(self, "password_file")
2282
+
2283
+ @password_file.setter
2284
+ def password_file(self, value: Optional[pulumi.Input[_builtins.str]]):
2285
+ pulumi.set(self, "password_file", value)
2286
+
2287
+ @_builtins.property
2288
+ @pulumi.getter(name="useRootNamespace")
2289
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
2290
+ """
2291
+ Authenticate to the root Vault namespace. Conflicts with namespace
2292
+ """
2293
+ return pulumi.get(self, "use_root_namespace")
2294
+
2295
+ @use_root_namespace.setter
2296
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
2297
+ pulumi.set(self, "use_root_namespace", value)
2298
+
2299
+ @_builtins.property
2300
+ @pulumi.getter
2301
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
2302
+ """
2303
+ Login with username
2304
+ """
2305
+ return pulumi.get(self, "username")
2306
+
2307
+ @username.setter
2308
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
2309
+ pulumi.set(self, "username", value)
2310
+
2311
+
2312
+ if not MYPY:
2313
+ class ProviderClientAuthArgsDict(TypedDict):
2314
+ cert_file: pulumi.Input[_builtins.str]
2315
+ """
2316
+ Path to a file containing the client certificate.
2317
+ """
2318
+ key_file: pulumi.Input[_builtins.str]
2319
+ """
2320
+ Path to a file containing the private key that the certificate was issued for.
2321
+ """
2322
+ elif False:
2323
+ ProviderClientAuthArgsDict: TypeAlias = Mapping[str, Any]
2324
+
2325
+ @pulumi.input_type
2326
+ class ProviderClientAuthArgs:
2327
+ def __init__(__self__, *,
2328
+ cert_file: pulumi.Input[_builtins.str],
2329
+ key_file: pulumi.Input[_builtins.str]):
2330
+ """
2331
+ :param pulumi.Input[_builtins.str] cert_file: Path to a file containing the client certificate.
2332
+ :param pulumi.Input[_builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
2333
+ """
2334
+ pulumi.set(__self__, "cert_file", cert_file)
2335
+ pulumi.set(__self__, "key_file", key_file)
2336
+
2337
+ @_builtins.property
2338
+ @pulumi.getter(name="certFile")
2339
+ def cert_file(self) -> pulumi.Input[_builtins.str]:
2340
+ """
2341
+ Path to a file containing the client certificate.
2342
+ """
2343
+ return pulumi.get(self, "cert_file")
2344
+
2345
+ @cert_file.setter
2346
+ def cert_file(self, value: pulumi.Input[_builtins.str]):
2347
+ pulumi.set(self, "cert_file", value)
2348
+
2349
+ @_builtins.property
2350
+ @pulumi.getter(name="keyFile")
2351
+ def key_file(self) -> pulumi.Input[_builtins.str]:
2352
+ """
2353
+ Path to a file containing the private key that the certificate was issued for.
2354
+ """
2355
+ return pulumi.get(self, "key_file")
2356
+
2357
+ @key_file.setter
2358
+ def key_file(self, value: pulumi.Input[_builtins.str]):
2359
+ pulumi.set(self, "key_file", value)
2360
+
2361
+
2362
+ if not MYPY:
2363
+ class ProviderHeaderArgsDict(TypedDict):
2364
+ name: pulumi.Input[_builtins.str]
2365
+ """
2366
+ The header name
2367
+ """
2368
+ value: pulumi.Input[_builtins.str]
2369
+ """
2370
+ The header value
2371
+ """
2372
+ elif False:
2373
+ ProviderHeaderArgsDict: TypeAlias = Mapping[str, Any]
2374
+
2375
+ @pulumi.input_type
2376
+ class ProviderHeaderArgs:
2377
+ def __init__(__self__, *,
2378
+ name: pulumi.Input[_builtins.str],
2379
+ value: pulumi.Input[_builtins.str]):
2380
+ """
2381
+ :param pulumi.Input[_builtins.str] name: The header name
2382
+ :param pulumi.Input[_builtins.str] value: The header value
2383
+ """
2384
+ pulumi.set(__self__, "name", name)
2385
+ pulumi.set(__self__, "value", value)
2386
+
2387
+ @_builtins.property
2388
+ @pulumi.getter
2389
+ def name(self) -> pulumi.Input[_builtins.str]:
2390
+ """
2391
+ The header name
2392
+ """
2393
+ return pulumi.get(self, "name")
2394
+
2395
+ @name.setter
2396
+ def name(self, value: pulumi.Input[_builtins.str]):
2397
+ pulumi.set(self, "name", value)
2398
+
2399
+ @_builtins.property
2400
+ @pulumi.getter
2401
+ def value(self) -> pulumi.Input[_builtins.str]:
2402
+ """
2403
+ The header value
2404
+ """
2405
+ return pulumi.get(self, "value")
2406
+
2407
+ @value.setter
2408
+ def value(self, value: pulumi.Input[_builtins.str]):
2409
+ pulumi.set(self, "value", value)
2410
+
2411
+
2412
+ if not MYPY:
2413
+ class GetPolicyDocumentRuleArgsDict(TypedDict):
2414
+ capabilities: Sequence[_builtins.str]
2415
+ """
2416
+ A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
2417
+ """
2418
+ path: _builtins.str
2419
+ """
2420
+ A path in Vault that this rule applies to.
2421
+ """
2422
+ allowed_parameters: NotRequired[Sequence['GetPolicyDocumentRuleAllowedParameterArgsDict']]
2423
+ """
2424
+ Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
2425
+ """
2426
+ denied_parameters: NotRequired[Sequence['GetPolicyDocumentRuleDeniedParameterArgsDict']]
2427
+ """
2428
+ Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
2429
+ """
2430
+ description: NotRequired[_builtins.str]
2431
+ """
2432
+ Description of the rule. Will be added as a comment to rendered rule.
2433
+ """
2434
+ max_wrapping_ttl: NotRequired[_builtins.str]
2435
+ """
2436
+ The maximum allowed TTL that clients can specify for a wrapped response.
2437
+ """
2438
+ min_wrapping_ttl: NotRequired[_builtins.str]
2439
+ """
2440
+ The minimum allowed TTL that clients can specify for a wrapped response.
2441
+ """
2442
+ required_parameters: NotRequired[Sequence[_builtins.str]]
2443
+ """
2444
+ A list of parameters that must be specified.
2445
+ """
2446
+ subscribe_event_types: NotRequired[Sequence[_builtins.str]]
2447
+ """
2448
+ A list of event types to subscribe to when using `subscribe` capability.
2449
+ """
2450
+ elif False:
2451
+ GetPolicyDocumentRuleArgsDict: TypeAlias = Mapping[str, Any]
2452
+
2453
+ @pulumi.input_type
2454
+ class GetPolicyDocumentRuleArgs:
2455
+ def __init__(__self__, *,
2456
+ capabilities: Sequence[_builtins.str],
2457
+ path: _builtins.str,
2458
+ allowed_parameters: Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']] = None,
2459
+ denied_parameters: Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']] = None,
2460
+ description: Optional[_builtins.str] = None,
2461
+ max_wrapping_ttl: Optional[_builtins.str] = None,
2462
+ min_wrapping_ttl: Optional[_builtins.str] = None,
2463
+ required_parameters: Optional[Sequence[_builtins.str]] = None,
2464
+ subscribe_event_types: Optional[Sequence[_builtins.str]] = None):
2465
+ """
2466
+ :param Sequence[_builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
2467
+ :param _builtins.str path: A path in Vault that this rule applies to.
2468
+ :param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
2469
+ :param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
2470
+ :param _builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
2471
+ :param _builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
2472
+ :param _builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
2473
+ :param Sequence[_builtins.str] required_parameters: A list of parameters that must be specified.
2474
+ :param Sequence[_builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
2475
+ """
2476
+ pulumi.set(__self__, "capabilities", capabilities)
2477
+ pulumi.set(__self__, "path", path)
2478
+ if allowed_parameters is not None:
2479
+ pulumi.set(__self__, "allowed_parameters", allowed_parameters)
2480
+ if denied_parameters is not None:
2481
+ pulumi.set(__self__, "denied_parameters", denied_parameters)
2482
+ if description is not None:
2483
+ pulumi.set(__self__, "description", description)
2484
+ if max_wrapping_ttl is not None:
2485
+ pulumi.set(__self__, "max_wrapping_ttl", max_wrapping_ttl)
2486
+ if min_wrapping_ttl is not None:
2487
+ pulumi.set(__self__, "min_wrapping_ttl", min_wrapping_ttl)
2488
+ if required_parameters is not None:
2489
+ pulumi.set(__self__, "required_parameters", required_parameters)
2490
+ if subscribe_event_types is not None:
2491
+ pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
2492
+
2493
+ @_builtins.property
2494
+ @pulumi.getter
2495
+ def capabilities(self) -> Sequence[_builtins.str]:
2496
+ """
2497
+ A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
2498
+ """
2499
+ return pulumi.get(self, "capabilities")
2500
+
2501
+ @capabilities.setter
2502
+ def capabilities(self, value: Sequence[_builtins.str]):
2503
+ pulumi.set(self, "capabilities", value)
2504
+
2505
+ @_builtins.property
2506
+ @pulumi.getter
2507
+ def path(self) -> _builtins.str:
2508
+ """
2509
+ A path in Vault that this rule applies to.
2510
+ """
2511
+ return pulumi.get(self, "path")
2512
+
2513
+ @path.setter
2514
+ def path(self, value: _builtins.str):
2515
+ pulumi.set(self, "path", value)
2516
+
2517
+ @_builtins.property
2518
+ @pulumi.getter(name="allowedParameters")
2519
+ def allowed_parameters(self) -> Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']]:
2520
+ """
2521
+ Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
2522
+ """
2523
+ return pulumi.get(self, "allowed_parameters")
2524
+
2525
+ @allowed_parameters.setter
2526
+ def allowed_parameters(self, value: Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']]):
2527
+ pulumi.set(self, "allowed_parameters", value)
2528
+
2529
+ @_builtins.property
2530
+ @pulumi.getter(name="deniedParameters")
2531
+ def denied_parameters(self) -> Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']]:
2532
+ """
2533
+ Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
2534
+ """
2535
+ return pulumi.get(self, "denied_parameters")
2536
+
2537
+ @denied_parameters.setter
2538
+ def denied_parameters(self, value: Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']]):
2539
+ pulumi.set(self, "denied_parameters", value)
2540
+
2541
+ @_builtins.property
2542
+ @pulumi.getter
2543
+ def description(self) -> Optional[_builtins.str]:
2544
+ """
2545
+ Description of the rule. Will be added as a comment to rendered rule.
2546
+ """
2547
+ return pulumi.get(self, "description")
2548
+
2549
+ @description.setter
2550
+ def description(self, value: Optional[_builtins.str]):
2551
+ pulumi.set(self, "description", value)
2552
+
2553
+ @_builtins.property
2554
+ @pulumi.getter(name="maxWrappingTtl")
2555
+ def max_wrapping_ttl(self) -> Optional[_builtins.str]:
2556
+ """
2557
+ The maximum allowed TTL that clients can specify for a wrapped response.
2558
+ """
2559
+ return pulumi.get(self, "max_wrapping_ttl")
2560
+
2561
+ @max_wrapping_ttl.setter
2562
+ def max_wrapping_ttl(self, value: Optional[_builtins.str]):
2563
+ pulumi.set(self, "max_wrapping_ttl", value)
2564
+
2565
+ @_builtins.property
2566
+ @pulumi.getter(name="minWrappingTtl")
2567
+ def min_wrapping_ttl(self) -> Optional[_builtins.str]:
2568
+ """
2569
+ The minimum allowed TTL that clients can specify for a wrapped response.
2570
+ """
2571
+ return pulumi.get(self, "min_wrapping_ttl")
2572
+
2573
+ @min_wrapping_ttl.setter
2574
+ def min_wrapping_ttl(self, value: Optional[_builtins.str]):
2575
+ pulumi.set(self, "min_wrapping_ttl", value)
2576
+
2577
+ @_builtins.property
2578
+ @pulumi.getter(name="requiredParameters")
2579
+ def required_parameters(self) -> Optional[Sequence[_builtins.str]]:
2580
+ """
2581
+ A list of parameters that must be specified.
2582
+ """
2583
+ return pulumi.get(self, "required_parameters")
2584
+
2585
+ @required_parameters.setter
2586
+ def required_parameters(self, value: Optional[Sequence[_builtins.str]]):
2587
+ pulumi.set(self, "required_parameters", value)
2588
+
2589
+ @_builtins.property
2590
+ @pulumi.getter(name="subscribeEventTypes")
2591
+ def subscribe_event_types(self) -> Optional[Sequence[_builtins.str]]:
2592
+ """
2593
+ A list of event types to subscribe to when using `subscribe` capability.
2594
+ """
2595
+ return pulumi.get(self, "subscribe_event_types")
2596
+
2597
+ @subscribe_event_types.setter
2598
+ def subscribe_event_types(self, value: Optional[Sequence[_builtins.str]]):
2599
+ pulumi.set(self, "subscribe_event_types", value)
2600
+
2601
+
2602
+ if not MYPY:
2603
+ class GetPolicyDocumentRuleAllowedParameterArgsDict(TypedDict):
2604
+ key: _builtins.str
2605
+ """
2606
+ Name of permitted key.
2607
+ """
2608
+ values: Sequence[_builtins.str]
2609
+ """
2610
+ A list of values what are permitted by policy rule.
2611
+ """
2612
+ elif False:
2613
+ GetPolicyDocumentRuleAllowedParameterArgsDict: TypeAlias = Mapping[str, Any]
2614
+
2615
+ @pulumi.input_type
2616
+ class GetPolicyDocumentRuleAllowedParameterArgs:
2617
+ def __init__(__self__, *,
2618
+ key: _builtins.str,
2619
+ values: Sequence[_builtins.str]):
2620
+ """
2621
+ :param _builtins.str key: Name of permitted key.
2622
+ :param Sequence[_builtins.str] values: A list of values what are permitted by policy rule.
2623
+ """
2624
+ pulumi.set(__self__, "key", key)
2625
+ pulumi.set(__self__, "values", values)
2626
+
2627
+ @_builtins.property
2628
+ @pulumi.getter
2629
+ def key(self) -> _builtins.str:
2630
+ """
2631
+ Name of permitted key.
2632
+ """
2633
+ return pulumi.get(self, "key")
2634
+
2635
+ @key.setter
2636
+ def key(self, value: _builtins.str):
2637
+ pulumi.set(self, "key", value)
2638
+
2639
+ @_builtins.property
2640
+ @pulumi.getter
2641
+ def values(self) -> Sequence[_builtins.str]:
2642
+ """
2643
+ A list of values what are permitted by policy rule.
2644
+ """
2645
+ return pulumi.get(self, "values")
2646
+
2647
+ @values.setter
2648
+ def values(self, value: Sequence[_builtins.str]):
2649
+ pulumi.set(self, "values", value)
2650
+
2651
+
2652
+ if not MYPY:
2653
+ class GetPolicyDocumentRuleDeniedParameterArgsDict(TypedDict):
2654
+ key: _builtins.str
2655
+ """
2656
+ Name of denied key.
2657
+ """
2658
+ values: Sequence[_builtins.str]
2659
+ """
2660
+ A list of values what are denied by policy rule.
2661
+ """
2662
+ elif False:
2663
+ GetPolicyDocumentRuleDeniedParameterArgsDict: TypeAlias = Mapping[str, Any]
2664
+
2665
+ @pulumi.input_type
2666
+ class GetPolicyDocumentRuleDeniedParameterArgs:
2667
+ def __init__(__self__, *,
2668
+ key: _builtins.str,
2669
+ values: Sequence[_builtins.str]):
2670
+ """
2671
+ :param _builtins.str key: Name of denied key.
2672
+ :param Sequence[_builtins.str] values: A list of values what are denied by policy rule.
2673
+ """
2674
+ pulumi.set(__self__, "key", key)
2675
+ pulumi.set(__self__, "values", values)
2676
+
2677
+ @_builtins.property
2678
+ @pulumi.getter
2679
+ def key(self) -> _builtins.str:
2680
+ """
2681
+ Name of denied key.
2682
+ """
2683
+ return pulumi.get(self, "key")
2684
+
2685
+ @key.setter
2686
+ def key(self, value: _builtins.str):
2687
+ pulumi.set(self, "key", value)
2688
+
2689
+ @_builtins.property
2690
+ @pulumi.getter
2691
+ def values(self) -> Sequence[_builtins.str]:
2692
+ """
2693
+ A list of values what are denied by policy rule.
2694
+ """
2695
+ return pulumi.get(self, "values")
2696
+
2697
+ @values.setter
2698
+ def values(self, value: Sequence[_builtins.str]):
2699
+ pulumi.set(self, "values", value)
2700
+
2701
+