pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
pulumi_vault/_inputs.py
ADDED
|
@@ -0,0 +1,2701 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from . import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'AuthBackendTuneArgs',
|
|
19
|
+
'AuthBackendTuneArgsDict',
|
|
20
|
+
'OciAuthBackendTuneArgs',
|
|
21
|
+
'OciAuthBackendTuneArgsDict',
|
|
22
|
+
'ProviderAuthLoginArgs',
|
|
23
|
+
'ProviderAuthLoginArgsDict',
|
|
24
|
+
'ProviderAuthLoginAwsArgs',
|
|
25
|
+
'ProviderAuthLoginAwsArgsDict',
|
|
26
|
+
'ProviderAuthLoginAzureArgs',
|
|
27
|
+
'ProviderAuthLoginAzureArgsDict',
|
|
28
|
+
'ProviderAuthLoginCertArgs',
|
|
29
|
+
'ProviderAuthLoginCertArgsDict',
|
|
30
|
+
'ProviderAuthLoginGcpArgs',
|
|
31
|
+
'ProviderAuthLoginGcpArgsDict',
|
|
32
|
+
'ProviderAuthLoginJwtArgs',
|
|
33
|
+
'ProviderAuthLoginJwtArgsDict',
|
|
34
|
+
'ProviderAuthLoginKerberosArgs',
|
|
35
|
+
'ProviderAuthLoginKerberosArgsDict',
|
|
36
|
+
'ProviderAuthLoginOciArgs',
|
|
37
|
+
'ProviderAuthLoginOciArgsDict',
|
|
38
|
+
'ProviderAuthLoginOidcArgs',
|
|
39
|
+
'ProviderAuthLoginOidcArgsDict',
|
|
40
|
+
'ProviderAuthLoginRadiusArgs',
|
|
41
|
+
'ProviderAuthLoginRadiusArgsDict',
|
|
42
|
+
'ProviderAuthLoginTokenFileArgs',
|
|
43
|
+
'ProviderAuthLoginTokenFileArgsDict',
|
|
44
|
+
'ProviderAuthLoginUserpassArgs',
|
|
45
|
+
'ProviderAuthLoginUserpassArgsDict',
|
|
46
|
+
'ProviderClientAuthArgs',
|
|
47
|
+
'ProviderClientAuthArgsDict',
|
|
48
|
+
'ProviderHeaderArgs',
|
|
49
|
+
'ProviderHeaderArgsDict',
|
|
50
|
+
'GetPolicyDocumentRuleArgs',
|
|
51
|
+
'GetPolicyDocumentRuleArgsDict',
|
|
52
|
+
'GetPolicyDocumentRuleAllowedParameterArgs',
|
|
53
|
+
'GetPolicyDocumentRuleAllowedParameterArgsDict',
|
|
54
|
+
'GetPolicyDocumentRuleDeniedParameterArgs',
|
|
55
|
+
'GetPolicyDocumentRuleDeniedParameterArgsDict',
|
|
56
|
+
]
|
|
57
|
+
|
|
58
|
+
MYPY = False
|
|
59
|
+
|
|
60
|
+
if not MYPY:
|
|
61
|
+
class AuthBackendTuneArgsDict(TypedDict):
|
|
62
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
|
63
|
+
"""
|
|
64
|
+
List of headers to whitelist and allowing
|
|
65
|
+
a plugin to include them in the response.
|
|
66
|
+
"""
|
|
67
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
|
68
|
+
"""
|
|
69
|
+
Specifies the list of keys that will
|
|
70
|
+
not be HMAC'd by audit devices in the request data object.
|
|
71
|
+
"""
|
|
72
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
|
73
|
+
"""
|
|
74
|
+
Specifies the list of keys that will
|
|
75
|
+
not be HMAC'd by audit devices in the response data object.
|
|
76
|
+
"""
|
|
77
|
+
default_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
|
78
|
+
"""
|
|
79
|
+
Specifies the default time-to-live.
|
|
80
|
+
If set, this overrides the global default.
|
|
81
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
|
82
|
+
"""
|
|
83
|
+
listing_visibility: NotRequired[pulumi.Input[_builtins.str]]
|
|
84
|
+
"""
|
|
85
|
+
Specifies whether to show this mount in
|
|
86
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
|
87
|
+
"""
|
|
88
|
+
max_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
|
89
|
+
"""
|
|
90
|
+
Specifies the maximum time-to-live.
|
|
91
|
+
If set, this overrides the global default.
|
|
92
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
|
93
|
+
"""
|
|
94
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
|
95
|
+
"""
|
|
96
|
+
List of headers to whitelist and
|
|
97
|
+
pass from the request to the backend.
|
|
98
|
+
"""
|
|
99
|
+
token_type: NotRequired[pulumi.Input[_builtins.str]]
|
|
100
|
+
"""
|
|
101
|
+
Specifies the type of tokens that should be returned by
|
|
102
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
|
103
|
+
"""
|
|
104
|
+
elif False:
|
|
105
|
+
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
|
106
|
+
|
|
107
|
+
@pulumi.input_type
|
|
108
|
+
class AuthBackendTuneArgs:
|
|
109
|
+
def __init__(__self__, *,
|
|
110
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
111
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
112
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
113
|
+
default_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
114
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
|
115
|
+
max_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
116
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
117
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
|
118
|
+
"""
|
|
119
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
|
|
120
|
+
a plugin to include them in the response.
|
|
121
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
|
|
122
|
+
not be HMAC'd by audit devices in the request data object.
|
|
123
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
|
|
124
|
+
not be HMAC'd by audit devices in the response data object.
|
|
125
|
+
:param pulumi.Input[_builtins.str] default_lease_ttl: Specifies the default time-to-live.
|
|
126
|
+
If set, this overrides the global default.
|
|
127
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
|
128
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in
|
|
129
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
|
130
|
+
:param pulumi.Input[_builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
|
|
131
|
+
If set, this overrides the global default.
|
|
132
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
|
133
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to whitelist and
|
|
134
|
+
pass from the request to the backend.
|
|
135
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
|
136
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
|
137
|
+
"""
|
|
138
|
+
if allowed_response_headers is not None:
|
|
139
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
|
140
|
+
if audit_non_hmac_request_keys is not None:
|
|
141
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
|
142
|
+
if audit_non_hmac_response_keys is not None:
|
|
143
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
|
144
|
+
if default_lease_ttl is not None:
|
|
145
|
+
pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
|
|
146
|
+
if listing_visibility is not None:
|
|
147
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
|
148
|
+
if max_lease_ttl is not None:
|
|
149
|
+
pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
|
|
150
|
+
if passthrough_request_headers is not None:
|
|
151
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
|
152
|
+
if token_type is not None:
|
|
153
|
+
pulumi.set(__self__, "token_type", token_type)
|
|
154
|
+
|
|
155
|
+
@_builtins.property
|
|
156
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
|
157
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
158
|
+
"""
|
|
159
|
+
List of headers to whitelist and allowing
|
|
160
|
+
a plugin to include them in the response.
|
|
161
|
+
"""
|
|
162
|
+
return pulumi.get(self, "allowed_response_headers")
|
|
163
|
+
|
|
164
|
+
@allowed_response_headers.setter
|
|
165
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
166
|
+
pulumi.set(self, "allowed_response_headers", value)
|
|
167
|
+
|
|
168
|
+
@_builtins.property
|
|
169
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
|
170
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
171
|
+
"""
|
|
172
|
+
Specifies the list of keys that will
|
|
173
|
+
not be HMAC'd by audit devices in the request data object.
|
|
174
|
+
"""
|
|
175
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
|
176
|
+
|
|
177
|
+
@audit_non_hmac_request_keys.setter
|
|
178
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
179
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
|
180
|
+
|
|
181
|
+
@_builtins.property
|
|
182
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
|
183
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
184
|
+
"""
|
|
185
|
+
Specifies the list of keys that will
|
|
186
|
+
not be HMAC'd by audit devices in the response data object.
|
|
187
|
+
"""
|
|
188
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
|
189
|
+
|
|
190
|
+
@audit_non_hmac_response_keys.setter
|
|
191
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
192
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
|
193
|
+
|
|
194
|
+
@_builtins.property
|
|
195
|
+
@pulumi.getter(name="defaultLeaseTtl")
|
|
196
|
+
def default_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
197
|
+
"""
|
|
198
|
+
Specifies the default time-to-live.
|
|
199
|
+
If set, this overrides the global default.
|
|
200
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
|
201
|
+
"""
|
|
202
|
+
return pulumi.get(self, "default_lease_ttl")
|
|
203
|
+
|
|
204
|
+
@default_lease_ttl.setter
|
|
205
|
+
def default_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
206
|
+
pulumi.set(self, "default_lease_ttl", value)
|
|
207
|
+
|
|
208
|
+
@_builtins.property
|
|
209
|
+
@pulumi.getter(name="listingVisibility")
|
|
210
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
211
|
+
"""
|
|
212
|
+
Specifies whether to show this mount in
|
|
213
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
|
214
|
+
"""
|
|
215
|
+
return pulumi.get(self, "listing_visibility")
|
|
216
|
+
|
|
217
|
+
@listing_visibility.setter
|
|
218
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
219
|
+
pulumi.set(self, "listing_visibility", value)
|
|
220
|
+
|
|
221
|
+
@_builtins.property
|
|
222
|
+
@pulumi.getter(name="maxLeaseTtl")
|
|
223
|
+
def max_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
224
|
+
"""
|
|
225
|
+
Specifies the maximum time-to-live.
|
|
226
|
+
If set, this overrides the global default.
|
|
227
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
|
228
|
+
"""
|
|
229
|
+
return pulumi.get(self, "max_lease_ttl")
|
|
230
|
+
|
|
231
|
+
@max_lease_ttl.setter
|
|
232
|
+
def max_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
233
|
+
pulumi.set(self, "max_lease_ttl", value)
|
|
234
|
+
|
|
235
|
+
@_builtins.property
|
|
236
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
|
237
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
238
|
+
"""
|
|
239
|
+
List of headers to whitelist and
|
|
240
|
+
pass from the request to the backend.
|
|
241
|
+
"""
|
|
242
|
+
return pulumi.get(self, "passthrough_request_headers")
|
|
243
|
+
|
|
244
|
+
@passthrough_request_headers.setter
|
|
245
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
246
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
|
247
|
+
|
|
248
|
+
@_builtins.property
|
|
249
|
+
@pulumi.getter(name="tokenType")
|
|
250
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
251
|
+
"""
|
|
252
|
+
Specifies the type of tokens that should be returned by
|
|
253
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
|
254
|
+
"""
|
|
255
|
+
return pulumi.get(self, "token_type")
|
|
256
|
+
|
|
257
|
+
@token_type.setter
|
|
258
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
259
|
+
pulumi.set(self, "token_type", value)
|
|
260
|
+
|
|
261
|
+
|
|
262
|
+
if not MYPY:
|
|
263
|
+
class OciAuthBackendTuneArgsDict(TypedDict):
|
|
264
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
|
265
|
+
"""
|
|
266
|
+
List of headers to whitelist and allowing
|
|
267
|
+
a plugin to include them in the response.
|
|
268
|
+
"""
|
|
269
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
|
270
|
+
"""
|
|
271
|
+
Specifies the list of keys that will
|
|
272
|
+
not be HMAC'd by audit devices in the request data object.
|
|
273
|
+
"""
|
|
274
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
|
275
|
+
"""
|
|
276
|
+
Specifies the list of keys that will
|
|
277
|
+
not be HMAC'd by audit devices in the response data object.
|
|
278
|
+
"""
|
|
279
|
+
default_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
|
280
|
+
"""
|
|
281
|
+
Specifies the default time-to-live.
|
|
282
|
+
If set, this overrides the global default.
|
|
283
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
|
284
|
+
"""
|
|
285
|
+
listing_visibility: NotRequired[pulumi.Input[_builtins.str]]
|
|
286
|
+
"""
|
|
287
|
+
Specifies whether to show this mount in
|
|
288
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
|
289
|
+
"""
|
|
290
|
+
max_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
|
|
291
|
+
"""
|
|
292
|
+
Specifies the maximum time-to-live.
|
|
293
|
+
If set, this overrides the global default.
|
|
294
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
|
295
|
+
"""
|
|
296
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
|
|
297
|
+
"""
|
|
298
|
+
List of headers to whitelist and
|
|
299
|
+
pass from the request to the backend.
|
|
300
|
+
"""
|
|
301
|
+
token_type: NotRequired[pulumi.Input[_builtins.str]]
|
|
302
|
+
"""
|
|
303
|
+
Specifies the type of tokens that should be returned by the mount.
|
|
304
|
+
"""
|
|
305
|
+
elif False:
|
|
306
|
+
OciAuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
|
307
|
+
|
|
308
|
+
@pulumi.input_type
|
|
309
|
+
class OciAuthBackendTuneArgs:
|
|
310
|
+
def __init__(__self__, *,
|
|
311
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
312
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
313
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
314
|
+
default_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
315
|
+
listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
|
|
316
|
+
max_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
317
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
318
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
|
319
|
+
"""
|
|
320
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
|
|
321
|
+
a plugin to include them in the response.
|
|
322
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
|
|
323
|
+
not be HMAC'd by audit devices in the request data object.
|
|
324
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
|
|
325
|
+
not be HMAC'd by audit devices in the response data object.
|
|
326
|
+
:param pulumi.Input[_builtins.str] default_lease_ttl: Specifies the default time-to-live.
|
|
327
|
+
If set, this overrides the global default.
|
|
328
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
|
329
|
+
:param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in
|
|
330
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
|
331
|
+
:param pulumi.Input[_builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
|
|
332
|
+
If set, this overrides the global default.
|
|
333
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
|
334
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to whitelist and
|
|
335
|
+
pass from the request to the backend.
|
|
336
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by the mount.
|
|
337
|
+
"""
|
|
338
|
+
if allowed_response_headers is not None:
|
|
339
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
|
340
|
+
if audit_non_hmac_request_keys is not None:
|
|
341
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
|
342
|
+
if audit_non_hmac_response_keys is not None:
|
|
343
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
|
344
|
+
if default_lease_ttl is not None:
|
|
345
|
+
pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
|
|
346
|
+
if listing_visibility is not None:
|
|
347
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
|
348
|
+
if max_lease_ttl is not None:
|
|
349
|
+
pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
|
|
350
|
+
if passthrough_request_headers is not None:
|
|
351
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
|
352
|
+
if token_type is not None:
|
|
353
|
+
pulumi.set(__self__, "token_type", token_type)
|
|
354
|
+
|
|
355
|
+
@_builtins.property
|
|
356
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
|
357
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
358
|
+
"""
|
|
359
|
+
List of headers to whitelist and allowing
|
|
360
|
+
a plugin to include them in the response.
|
|
361
|
+
"""
|
|
362
|
+
return pulumi.get(self, "allowed_response_headers")
|
|
363
|
+
|
|
364
|
+
@allowed_response_headers.setter
|
|
365
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
366
|
+
pulumi.set(self, "allowed_response_headers", value)
|
|
367
|
+
|
|
368
|
+
@_builtins.property
|
|
369
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
|
370
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
371
|
+
"""
|
|
372
|
+
Specifies the list of keys that will
|
|
373
|
+
not be HMAC'd by audit devices in the request data object.
|
|
374
|
+
"""
|
|
375
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
|
376
|
+
|
|
377
|
+
@audit_non_hmac_request_keys.setter
|
|
378
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
379
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
|
380
|
+
|
|
381
|
+
@_builtins.property
|
|
382
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
|
383
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
384
|
+
"""
|
|
385
|
+
Specifies the list of keys that will
|
|
386
|
+
not be HMAC'd by audit devices in the response data object.
|
|
387
|
+
"""
|
|
388
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
|
389
|
+
|
|
390
|
+
@audit_non_hmac_response_keys.setter
|
|
391
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
392
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
|
393
|
+
|
|
394
|
+
@_builtins.property
|
|
395
|
+
@pulumi.getter(name="defaultLeaseTtl")
|
|
396
|
+
def default_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
397
|
+
"""
|
|
398
|
+
Specifies the default time-to-live.
|
|
399
|
+
If set, this overrides the global default.
|
|
400
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
|
401
|
+
"""
|
|
402
|
+
return pulumi.get(self, "default_lease_ttl")
|
|
403
|
+
|
|
404
|
+
@default_lease_ttl.setter
|
|
405
|
+
def default_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
406
|
+
pulumi.set(self, "default_lease_ttl", value)
|
|
407
|
+
|
|
408
|
+
@_builtins.property
|
|
409
|
+
@pulumi.getter(name="listingVisibility")
|
|
410
|
+
def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
411
|
+
"""
|
|
412
|
+
Specifies whether to show this mount in
|
|
413
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
|
414
|
+
"""
|
|
415
|
+
return pulumi.get(self, "listing_visibility")
|
|
416
|
+
|
|
417
|
+
@listing_visibility.setter
|
|
418
|
+
def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
419
|
+
pulumi.set(self, "listing_visibility", value)
|
|
420
|
+
|
|
421
|
+
@_builtins.property
|
|
422
|
+
@pulumi.getter(name="maxLeaseTtl")
|
|
423
|
+
def max_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
424
|
+
"""
|
|
425
|
+
Specifies the maximum time-to-live.
|
|
426
|
+
If set, this overrides the global default.
|
|
427
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
|
428
|
+
"""
|
|
429
|
+
return pulumi.get(self, "max_lease_ttl")
|
|
430
|
+
|
|
431
|
+
@max_lease_ttl.setter
|
|
432
|
+
def max_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
433
|
+
pulumi.set(self, "max_lease_ttl", value)
|
|
434
|
+
|
|
435
|
+
@_builtins.property
|
|
436
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
|
437
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
438
|
+
"""
|
|
439
|
+
List of headers to whitelist and
|
|
440
|
+
pass from the request to the backend.
|
|
441
|
+
"""
|
|
442
|
+
return pulumi.get(self, "passthrough_request_headers")
|
|
443
|
+
|
|
444
|
+
@passthrough_request_headers.setter
|
|
445
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
446
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
|
447
|
+
|
|
448
|
+
@_builtins.property
|
|
449
|
+
@pulumi.getter(name="tokenType")
|
|
450
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
451
|
+
"""
|
|
452
|
+
Specifies the type of tokens that should be returned by the mount.
|
|
453
|
+
"""
|
|
454
|
+
return pulumi.get(self, "token_type")
|
|
455
|
+
|
|
456
|
+
@token_type.setter
|
|
457
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
458
|
+
pulumi.set(self, "token_type", value)
|
|
459
|
+
|
|
460
|
+
|
|
461
|
+
if not MYPY:
|
|
462
|
+
class ProviderAuthLoginArgsDict(TypedDict):
|
|
463
|
+
path: pulumi.Input[_builtins.str]
|
|
464
|
+
method: NotRequired[pulumi.Input[_builtins.str]]
|
|
465
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
|
466
|
+
"""
|
|
467
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
468
|
+
"""
|
|
469
|
+
parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
|
470
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
|
471
|
+
"""
|
|
472
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
473
|
+
"""
|
|
474
|
+
elif False:
|
|
475
|
+
ProviderAuthLoginArgsDict: TypeAlias = Mapping[str, Any]
|
|
476
|
+
|
|
477
|
+
@pulumi.input_type
|
|
478
|
+
class ProviderAuthLoginArgs:
|
|
479
|
+
def __init__(__self__, *,
|
|
480
|
+
path: pulumi.Input[_builtins.str],
|
|
481
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
482
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
483
|
+
parameters: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
484
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
485
|
+
"""
|
|
486
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
487
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
488
|
+
"""
|
|
489
|
+
pulumi.set(__self__, "path", path)
|
|
490
|
+
if method is not None:
|
|
491
|
+
pulumi.set(__self__, "method", method)
|
|
492
|
+
if namespace is not None:
|
|
493
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
494
|
+
if parameters is not None:
|
|
495
|
+
pulumi.set(__self__, "parameters", parameters)
|
|
496
|
+
if use_root_namespace is not None:
|
|
497
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
498
|
+
|
|
499
|
+
@_builtins.property
|
|
500
|
+
@pulumi.getter
|
|
501
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
|
502
|
+
return pulumi.get(self, "path")
|
|
503
|
+
|
|
504
|
+
@path.setter
|
|
505
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
|
506
|
+
pulumi.set(self, "path", value)
|
|
507
|
+
|
|
508
|
+
@_builtins.property
|
|
509
|
+
@pulumi.getter
|
|
510
|
+
def method(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
511
|
+
return pulumi.get(self, "method")
|
|
512
|
+
|
|
513
|
+
@method.setter
|
|
514
|
+
def method(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
515
|
+
pulumi.set(self, "method", value)
|
|
516
|
+
|
|
517
|
+
@_builtins.property
|
|
518
|
+
@pulumi.getter
|
|
519
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
520
|
+
"""
|
|
521
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
522
|
+
"""
|
|
523
|
+
return pulumi.get(self, "namespace")
|
|
524
|
+
|
|
525
|
+
@namespace.setter
|
|
526
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
527
|
+
pulumi.set(self, "namespace", value)
|
|
528
|
+
|
|
529
|
+
@_builtins.property
|
|
530
|
+
@pulumi.getter
|
|
531
|
+
def parameters(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
532
|
+
return pulumi.get(self, "parameters")
|
|
533
|
+
|
|
534
|
+
@parameters.setter
|
|
535
|
+
def parameters(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
536
|
+
pulumi.set(self, "parameters", value)
|
|
537
|
+
|
|
538
|
+
@_builtins.property
|
|
539
|
+
@pulumi.getter(name="useRootNamespace")
|
|
540
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
541
|
+
"""
|
|
542
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
543
|
+
"""
|
|
544
|
+
return pulumi.get(self, "use_root_namespace")
|
|
545
|
+
|
|
546
|
+
@use_root_namespace.setter
|
|
547
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
548
|
+
pulumi.set(self, "use_root_namespace", value)
|
|
549
|
+
|
|
550
|
+
|
|
551
|
+
if not MYPY:
|
|
552
|
+
class ProviderAuthLoginAwsArgsDict(TypedDict):
|
|
553
|
+
role: pulumi.Input[_builtins.str]
|
|
554
|
+
"""
|
|
555
|
+
The Vault role to use when logging into Vault.
|
|
556
|
+
"""
|
|
557
|
+
aws_access_key_id: NotRequired[pulumi.Input[_builtins.str]]
|
|
558
|
+
"""
|
|
559
|
+
The AWS access key ID.
|
|
560
|
+
"""
|
|
561
|
+
aws_iam_endpoint: NotRequired[pulumi.Input[_builtins.str]]
|
|
562
|
+
"""
|
|
563
|
+
The IAM endpoint URL.
|
|
564
|
+
"""
|
|
565
|
+
aws_profile: NotRequired[pulumi.Input[_builtins.str]]
|
|
566
|
+
"""
|
|
567
|
+
The name of the AWS profile.
|
|
568
|
+
"""
|
|
569
|
+
aws_region: NotRequired[pulumi.Input[_builtins.str]]
|
|
570
|
+
"""
|
|
571
|
+
The AWS region.
|
|
572
|
+
"""
|
|
573
|
+
aws_role_arn: NotRequired[pulumi.Input[_builtins.str]]
|
|
574
|
+
"""
|
|
575
|
+
The ARN of the AWS Role to assume.Used during STS AssumeRole
|
|
576
|
+
"""
|
|
577
|
+
aws_role_session_name: NotRequired[pulumi.Input[_builtins.str]]
|
|
578
|
+
"""
|
|
579
|
+
Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
|
580
|
+
"""
|
|
581
|
+
aws_secret_access_key: NotRequired[pulumi.Input[_builtins.str]]
|
|
582
|
+
"""
|
|
583
|
+
The AWS secret access key.
|
|
584
|
+
"""
|
|
585
|
+
aws_session_token: NotRequired[pulumi.Input[_builtins.str]]
|
|
586
|
+
"""
|
|
587
|
+
The AWS session token.
|
|
588
|
+
"""
|
|
589
|
+
aws_shared_credentials_file: NotRequired[pulumi.Input[_builtins.str]]
|
|
590
|
+
"""
|
|
591
|
+
Path to the AWS shared credentials file.
|
|
592
|
+
"""
|
|
593
|
+
aws_sts_endpoint: NotRequired[pulumi.Input[_builtins.str]]
|
|
594
|
+
"""
|
|
595
|
+
The STS endpoint URL.
|
|
596
|
+
"""
|
|
597
|
+
aws_web_identity_token_file: NotRequired[pulumi.Input[_builtins.str]]
|
|
598
|
+
"""
|
|
599
|
+
Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
|
600
|
+
"""
|
|
601
|
+
header_value: NotRequired[pulumi.Input[_builtins.str]]
|
|
602
|
+
"""
|
|
603
|
+
The Vault header value to include in the STS signing request.
|
|
604
|
+
"""
|
|
605
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
|
606
|
+
"""
|
|
607
|
+
The path where the authentication engine is mounted.
|
|
608
|
+
"""
|
|
609
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
|
610
|
+
"""
|
|
611
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
612
|
+
"""
|
|
613
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
|
614
|
+
"""
|
|
615
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
616
|
+
"""
|
|
617
|
+
elif False:
|
|
618
|
+
ProviderAuthLoginAwsArgsDict: TypeAlias = Mapping[str, Any]
|
|
619
|
+
|
|
620
|
+
@pulumi.input_type
|
|
621
|
+
class ProviderAuthLoginAwsArgs:
|
|
622
|
+
def __init__(__self__, *,
|
|
623
|
+
role: pulumi.Input[_builtins.str],
|
|
624
|
+
aws_access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
625
|
+
aws_iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
|
626
|
+
aws_profile: Optional[pulumi.Input[_builtins.str]] = None,
|
|
627
|
+
aws_region: Optional[pulumi.Input[_builtins.str]] = None,
|
|
628
|
+
aws_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
|
629
|
+
aws_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
630
|
+
aws_secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
|
631
|
+
aws_session_token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
632
|
+
aws_shared_credentials_file: Optional[pulumi.Input[_builtins.str]] = None,
|
|
633
|
+
aws_sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
|
|
634
|
+
aws_web_identity_token_file: Optional[pulumi.Input[_builtins.str]] = None,
|
|
635
|
+
header_value: Optional[pulumi.Input[_builtins.str]] = None,
|
|
636
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
|
637
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
638
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
639
|
+
"""
|
|
640
|
+
:param pulumi.Input[_builtins.str] role: The Vault role to use when logging into Vault.
|
|
641
|
+
:param pulumi.Input[_builtins.str] aws_access_key_id: The AWS access key ID.
|
|
642
|
+
:param pulumi.Input[_builtins.str] aws_iam_endpoint: The IAM endpoint URL.
|
|
643
|
+
:param pulumi.Input[_builtins.str] aws_profile: The name of the AWS profile.
|
|
644
|
+
:param pulumi.Input[_builtins.str] aws_region: The AWS region.
|
|
645
|
+
:param pulumi.Input[_builtins.str] aws_role_arn: The ARN of the AWS Role to assume.Used during STS AssumeRole
|
|
646
|
+
:param pulumi.Input[_builtins.str] aws_role_session_name: Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
|
647
|
+
:param pulumi.Input[_builtins.str] aws_secret_access_key: The AWS secret access key.
|
|
648
|
+
:param pulumi.Input[_builtins.str] aws_session_token: The AWS session token.
|
|
649
|
+
:param pulumi.Input[_builtins.str] aws_shared_credentials_file: Path to the AWS shared credentials file.
|
|
650
|
+
:param pulumi.Input[_builtins.str] aws_sts_endpoint: The STS endpoint URL.
|
|
651
|
+
:param pulumi.Input[_builtins.str] aws_web_identity_token_file: Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
|
652
|
+
:param pulumi.Input[_builtins.str] header_value: The Vault header value to include in the STS signing request.
|
|
653
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
|
654
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
655
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
656
|
+
"""
|
|
657
|
+
pulumi.set(__self__, "role", role)
|
|
658
|
+
if aws_access_key_id is not None:
|
|
659
|
+
pulumi.set(__self__, "aws_access_key_id", aws_access_key_id)
|
|
660
|
+
if aws_iam_endpoint is not None:
|
|
661
|
+
pulumi.set(__self__, "aws_iam_endpoint", aws_iam_endpoint)
|
|
662
|
+
if aws_profile is not None:
|
|
663
|
+
pulumi.set(__self__, "aws_profile", aws_profile)
|
|
664
|
+
if aws_region is not None:
|
|
665
|
+
pulumi.set(__self__, "aws_region", aws_region)
|
|
666
|
+
if aws_role_arn is not None:
|
|
667
|
+
pulumi.set(__self__, "aws_role_arn", aws_role_arn)
|
|
668
|
+
if aws_role_session_name is not None:
|
|
669
|
+
pulumi.set(__self__, "aws_role_session_name", aws_role_session_name)
|
|
670
|
+
if aws_secret_access_key is not None:
|
|
671
|
+
pulumi.set(__self__, "aws_secret_access_key", aws_secret_access_key)
|
|
672
|
+
if aws_session_token is not None:
|
|
673
|
+
pulumi.set(__self__, "aws_session_token", aws_session_token)
|
|
674
|
+
if aws_shared_credentials_file is not None:
|
|
675
|
+
pulumi.set(__self__, "aws_shared_credentials_file", aws_shared_credentials_file)
|
|
676
|
+
if aws_sts_endpoint is not None:
|
|
677
|
+
pulumi.set(__self__, "aws_sts_endpoint", aws_sts_endpoint)
|
|
678
|
+
if aws_web_identity_token_file is not None:
|
|
679
|
+
pulumi.set(__self__, "aws_web_identity_token_file", aws_web_identity_token_file)
|
|
680
|
+
if header_value is not None:
|
|
681
|
+
pulumi.set(__self__, "header_value", header_value)
|
|
682
|
+
if mount is not None:
|
|
683
|
+
pulumi.set(__self__, "mount", mount)
|
|
684
|
+
if namespace is not None:
|
|
685
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
686
|
+
if use_root_namespace is not None:
|
|
687
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
688
|
+
|
|
689
|
+
@_builtins.property
|
|
690
|
+
@pulumi.getter
|
|
691
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
|
692
|
+
"""
|
|
693
|
+
The Vault role to use when logging into Vault.
|
|
694
|
+
"""
|
|
695
|
+
return pulumi.get(self, "role")
|
|
696
|
+
|
|
697
|
+
@role.setter
|
|
698
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
|
699
|
+
pulumi.set(self, "role", value)
|
|
700
|
+
|
|
701
|
+
@_builtins.property
|
|
702
|
+
@pulumi.getter(name="awsAccessKeyId")
|
|
703
|
+
def aws_access_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
704
|
+
"""
|
|
705
|
+
The AWS access key ID.
|
|
706
|
+
"""
|
|
707
|
+
return pulumi.get(self, "aws_access_key_id")
|
|
708
|
+
|
|
709
|
+
@aws_access_key_id.setter
|
|
710
|
+
def aws_access_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
711
|
+
pulumi.set(self, "aws_access_key_id", value)
|
|
712
|
+
|
|
713
|
+
@_builtins.property
|
|
714
|
+
@pulumi.getter(name="awsIamEndpoint")
|
|
715
|
+
def aws_iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
716
|
+
"""
|
|
717
|
+
The IAM endpoint URL.
|
|
718
|
+
"""
|
|
719
|
+
return pulumi.get(self, "aws_iam_endpoint")
|
|
720
|
+
|
|
721
|
+
@aws_iam_endpoint.setter
|
|
722
|
+
def aws_iam_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
723
|
+
pulumi.set(self, "aws_iam_endpoint", value)
|
|
724
|
+
|
|
725
|
+
@_builtins.property
|
|
726
|
+
@pulumi.getter(name="awsProfile")
|
|
727
|
+
def aws_profile(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
728
|
+
"""
|
|
729
|
+
The name of the AWS profile.
|
|
730
|
+
"""
|
|
731
|
+
return pulumi.get(self, "aws_profile")
|
|
732
|
+
|
|
733
|
+
@aws_profile.setter
|
|
734
|
+
def aws_profile(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
735
|
+
pulumi.set(self, "aws_profile", value)
|
|
736
|
+
|
|
737
|
+
@_builtins.property
|
|
738
|
+
@pulumi.getter(name="awsRegion")
|
|
739
|
+
def aws_region(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
740
|
+
"""
|
|
741
|
+
The AWS region.
|
|
742
|
+
"""
|
|
743
|
+
return pulumi.get(self, "aws_region")
|
|
744
|
+
|
|
745
|
+
@aws_region.setter
|
|
746
|
+
def aws_region(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
747
|
+
pulumi.set(self, "aws_region", value)
|
|
748
|
+
|
|
749
|
+
@_builtins.property
|
|
750
|
+
@pulumi.getter(name="awsRoleArn")
|
|
751
|
+
def aws_role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
752
|
+
"""
|
|
753
|
+
The ARN of the AWS Role to assume.Used during STS AssumeRole
|
|
754
|
+
"""
|
|
755
|
+
return pulumi.get(self, "aws_role_arn")
|
|
756
|
+
|
|
757
|
+
@aws_role_arn.setter
|
|
758
|
+
def aws_role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
759
|
+
pulumi.set(self, "aws_role_arn", value)
|
|
760
|
+
|
|
761
|
+
@_builtins.property
|
|
762
|
+
@pulumi.getter(name="awsRoleSessionName")
|
|
763
|
+
def aws_role_session_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
764
|
+
"""
|
|
765
|
+
Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
|
766
|
+
"""
|
|
767
|
+
return pulumi.get(self, "aws_role_session_name")
|
|
768
|
+
|
|
769
|
+
@aws_role_session_name.setter
|
|
770
|
+
def aws_role_session_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
771
|
+
pulumi.set(self, "aws_role_session_name", value)
|
|
772
|
+
|
|
773
|
+
@_builtins.property
|
|
774
|
+
@pulumi.getter(name="awsSecretAccessKey")
|
|
775
|
+
def aws_secret_access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
776
|
+
"""
|
|
777
|
+
The AWS secret access key.
|
|
778
|
+
"""
|
|
779
|
+
return pulumi.get(self, "aws_secret_access_key")
|
|
780
|
+
|
|
781
|
+
@aws_secret_access_key.setter
|
|
782
|
+
def aws_secret_access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
783
|
+
pulumi.set(self, "aws_secret_access_key", value)
|
|
784
|
+
|
|
785
|
+
@_builtins.property
|
|
786
|
+
@pulumi.getter(name="awsSessionToken")
|
|
787
|
+
def aws_session_token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
788
|
+
"""
|
|
789
|
+
The AWS session token.
|
|
790
|
+
"""
|
|
791
|
+
return pulumi.get(self, "aws_session_token")
|
|
792
|
+
|
|
793
|
+
@aws_session_token.setter
|
|
794
|
+
def aws_session_token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
795
|
+
pulumi.set(self, "aws_session_token", value)
|
|
796
|
+
|
|
797
|
+
@_builtins.property
|
|
798
|
+
@pulumi.getter(name="awsSharedCredentialsFile")
|
|
799
|
+
def aws_shared_credentials_file(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
800
|
+
"""
|
|
801
|
+
Path to the AWS shared credentials file.
|
|
802
|
+
"""
|
|
803
|
+
return pulumi.get(self, "aws_shared_credentials_file")
|
|
804
|
+
|
|
805
|
+
@aws_shared_credentials_file.setter
|
|
806
|
+
def aws_shared_credentials_file(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
807
|
+
pulumi.set(self, "aws_shared_credentials_file", value)
|
|
808
|
+
|
|
809
|
+
@_builtins.property
|
|
810
|
+
@pulumi.getter(name="awsStsEndpoint")
|
|
811
|
+
def aws_sts_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
812
|
+
"""
|
|
813
|
+
The STS endpoint URL.
|
|
814
|
+
"""
|
|
815
|
+
return pulumi.get(self, "aws_sts_endpoint")
|
|
816
|
+
|
|
817
|
+
@aws_sts_endpoint.setter
|
|
818
|
+
def aws_sts_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
819
|
+
pulumi.set(self, "aws_sts_endpoint", value)
|
|
820
|
+
|
|
821
|
+
@_builtins.property
|
|
822
|
+
@pulumi.getter(name="awsWebIdentityTokenFile")
|
|
823
|
+
def aws_web_identity_token_file(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
824
|
+
"""
|
|
825
|
+
Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
|
826
|
+
"""
|
|
827
|
+
return pulumi.get(self, "aws_web_identity_token_file")
|
|
828
|
+
|
|
829
|
+
@aws_web_identity_token_file.setter
|
|
830
|
+
def aws_web_identity_token_file(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
831
|
+
pulumi.set(self, "aws_web_identity_token_file", value)
|
|
832
|
+
|
|
833
|
+
@_builtins.property
|
|
834
|
+
@pulumi.getter(name="headerValue")
|
|
835
|
+
def header_value(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
836
|
+
"""
|
|
837
|
+
The Vault header value to include in the STS signing request.
|
|
838
|
+
"""
|
|
839
|
+
return pulumi.get(self, "header_value")
|
|
840
|
+
|
|
841
|
+
@header_value.setter
|
|
842
|
+
def header_value(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
843
|
+
pulumi.set(self, "header_value", value)
|
|
844
|
+
|
|
845
|
+
@_builtins.property
|
|
846
|
+
@pulumi.getter
|
|
847
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
848
|
+
"""
|
|
849
|
+
The path where the authentication engine is mounted.
|
|
850
|
+
"""
|
|
851
|
+
return pulumi.get(self, "mount")
|
|
852
|
+
|
|
853
|
+
@mount.setter
|
|
854
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
855
|
+
pulumi.set(self, "mount", value)
|
|
856
|
+
|
|
857
|
+
@_builtins.property
|
|
858
|
+
@pulumi.getter
|
|
859
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
860
|
+
"""
|
|
861
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
862
|
+
"""
|
|
863
|
+
return pulumi.get(self, "namespace")
|
|
864
|
+
|
|
865
|
+
@namespace.setter
|
|
866
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
867
|
+
pulumi.set(self, "namespace", value)
|
|
868
|
+
|
|
869
|
+
@_builtins.property
|
|
870
|
+
@pulumi.getter(name="useRootNamespace")
|
|
871
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
872
|
+
"""
|
|
873
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
874
|
+
"""
|
|
875
|
+
return pulumi.get(self, "use_root_namespace")
|
|
876
|
+
|
|
877
|
+
@use_root_namespace.setter
|
|
878
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
879
|
+
pulumi.set(self, "use_root_namespace", value)
|
|
880
|
+
|
|
881
|
+
|
|
882
|
+
if not MYPY:
|
|
883
|
+
class ProviderAuthLoginAzureArgsDict(TypedDict):
|
|
884
|
+
resource_group_name: pulumi.Input[_builtins.str]
|
|
885
|
+
"""
|
|
886
|
+
The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
887
|
+
"""
|
|
888
|
+
role: pulumi.Input[_builtins.str]
|
|
889
|
+
"""
|
|
890
|
+
Name of the login role.
|
|
891
|
+
"""
|
|
892
|
+
subscription_id: pulumi.Input[_builtins.str]
|
|
893
|
+
"""
|
|
894
|
+
The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
895
|
+
"""
|
|
896
|
+
client_id: NotRequired[pulumi.Input[_builtins.str]]
|
|
897
|
+
"""
|
|
898
|
+
The identity's client ID.
|
|
899
|
+
"""
|
|
900
|
+
jwt: NotRequired[pulumi.Input[_builtins.str]]
|
|
901
|
+
"""
|
|
902
|
+
A signed JSON Web Token. If not specified on will be created automatically
|
|
903
|
+
"""
|
|
904
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
|
905
|
+
"""
|
|
906
|
+
The path where the authentication engine is mounted.
|
|
907
|
+
"""
|
|
908
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
|
909
|
+
"""
|
|
910
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
911
|
+
"""
|
|
912
|
+
scope: NotRequired[pulumi.Input[_builtins.str]]
|
|
913
|
+
"""
|
|
914
|
+
The scopes to include in the token request.
|
|
915
|
+
"""
|
|
916
|
+
tenant_id: NotRequired[pulumi.Input[_builtins.str]]
|
|
917
|
+
"""
|
|
918
|
+
Provides the tenant ID to use in a multi-tenant authentication scenario.
|
|
919
|
+
"""
|
|
920
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
|
921
|
+
"""
|
|
922
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
923
|
+
"""
|
|
924
|
+
vm_name: NotRequired[pulumi.Input[_builtins.str]]
|
|
925
|
+
"""
|
|
926
|
+
The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
927
|
+
"""
|
|
928
|
+
vmss_name: NotRequired[pulumi.Input[_builtins.str]]
|
|
929
|
+
"""
|
|
930
|
+
The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
931
|
+
"""
|
|
932
|
+
elif False:
|
|
933
|
+
ProviderAuthLoginAzureArgsDict: TypeAlias = Mapping[str, Any]
|
|
934
|
+
|
|
935
|
+
@pulumi.input_type
|
|
936
|
+
class ProviderAuthLoginAzureArgs:
|
|
937
|
+
def __init__(__self__, *,
|
|
938
|
+
resource_group_name: pulumi.Input[_builtins.str],
|
|
939
|
+
role: pulumi.Input[_builtins.str],
|
|
940
|
+
subscription_id: pulumi.Input[_builtins.str],
|
|
941
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
942
|
+
jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
|
943
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
|
944
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
945
|
+
scope: Optional[pulumi.Input[_builtins.str]] = None,
|
|
946
|
+
tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
947
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
948
|
+
vm_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
949
|
+
vmss_name: Optional[pulumi.Input[_builtins.str]] = None):
|
|
950
|
+
"""
|
|
951
|
+
:param pulumi.Input[_builtins.str] resource_group_name: The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
952
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
|
953
|
+
:param pulumi.Input[_builtins.str] subscription_id: The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
954
|
+
:param pulumi.Input[_builtins.str] client_id: The identity's client ID.
|
|
955
|
+
:param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token. If not specified on will be created automatically
|
|
956
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
|
957
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
958
|
+
:param pulumi.Input[_builtins.str] scope: The scopes to include in the token request.
|
|
959
|
+
:param pulumi.Input[_builtins.str] tenant_id: Provides the tenant ID to use in a multi-tenant authentication scenario.
|
|
960
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
961
|
+
:param pulumi.Input[_builtins.str] vm_name: The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
962
|
+
:param pulumi.Input[_builtins.str] vmss_name: The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
963
|
+
"""
|
|
964
|
+
pulumi.set(__self__, "resource_group_name", resource_group_name)
|
|
965
|
+
pulumi.set(__self__, "role", role)
|
|
966
|
+
pulumi.set(__self__, "subscription_id", subscription_id)
|
|
967
|
+
if client_id is not None:
|
|
968
|
+
pulumi.set(__self__, "client_id", client_id)
|
|
969
|
+
if jwt is not None:
|
|
970
|
+
pulumi.set(__self__, "jwt", jwt)
|
|
971
|
+
if mount is not None:
|
|
972
|
+
pulumi.set(__self__, "mount", mount)
|
|
973
|
+
if namespace is not None:
|
|
974
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
975
|
+
if scope is not None:
|
|
976
|
+
pulumi.set(__self__, "scope", scope)
|
|
977
|
+
if tenant_id is not None:
|
|
978
|
+
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
979
|
+
if use_root_namespace is not None:
|
|
980
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
981
|
+
if vm_name is not None:
|
|
982
|
+
pulumi.set(__self__, "vm_name", vm_name)
|
|
983
|
+
if vmss_name is not None:
|
|
984
|
+
pulumi.set(__self__, "vmss_name", vmss_name)
|
|
985
|
+
|
|
986
|
+
@_builtins.property
|
|
987
|
+
@pulumi.getter(name="resourceGroupName")
|
|
988
|
+
def resource_group_name(self) -> pulumi.Input[_builtins.str]:
|
|
989
|
+
"""
|
|
990
|
+
The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
991
|
+
"""
|
|
992
|
+
return pulumi.get(self, "resource_group_name")
|
|
993
|
+
|
|
994
|
+
@resource_group_name.setter
|
|
995
|
+
def resource_group_name(self, value: pulumi.Input[_builtins.str]):
|
|
996
|
+
pulumi.set(self, "resource_group_name", value)
|
|
997
|
+
|
|
998
|
+
@_builtins.property
|
|
999
|
+
@pulumi.getter
|
|
1000
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
|
1001
|
+
"""
|
|
1002
|
+
Name of the login role.
|
|
1003
|
+
"""
|
|
1004
|
+
return pulumi.get(self, "role")
|
|
1005
|
+
|
|
1006
|
+
@role.setter
|
|
1007
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
|
1008
|
+
pulumi.set(self, "role", value)
|
|
1009
|
+
|
|
1010
|
+
@_builtins.property
|
|
1011
|
+
@pulumi.getter(name="subscriptionId")
|
|
1012
|
+
def subscription_id(self) -> pulumi.Input[_builtins.str]:
|
|
1013
|
+
"""
|
|
1014
|
+
The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
1015
|
+
"""
|
|
1016
|
+
return pulumi.get(self, "subscription_id")
|
|
1017
|
+
|
|
1018
|
+
@subscription_id.setter
|
|
1019
|
+
def subscription_id(self, value: pulumi.Input[_builtins.str]):
|
|
1020
|
+
pulumi.set(self, "subscription_id", value)
|
|
1021
|
+
|
|
1022
|
+
@_builtins.property
|
|
1023
|
+
@pulumi.getter(name="clientId")
|
|
1024
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1025
|
+
"""
|
|
1026
|
+
The identity's client ID.
|
|
1027
|
+
"""
|
|
1028
|
+
return pulumi.get(self, "client_id")
|
|
1029
|
+
|
|
1030
|
+
@client_id.setter
|
|
1031
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1032
|
+
pulumi.set(self, "client_id", value)
|
|
1033
|
+
|
|
1034
|
+
@_builtins.property
|
|
1035
|
+
@pulumi.getter
|
|
1036
|
+
def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1037
|
+
"""
|
|
1038
|
+
A signed JSON Web Token. If not specified on will be created automatically
|
|
1039
|
+
"""
|
|
1040
|
+
return pulumi.get(self, "jwt")
|
|
1041
|
+
|
|
1042
|
+
@jwt.setter
|
|
1043
|
+
def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1044
|
+
pulumi.set(self, "jwt", value)
|
|
1045
|
+
|
|
1046
|
+
@_builtins.property
|
|
1047
|
+
@pulumi.getter
|
|
1048
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1049
|
+
"""
|
|
1050
|
+
The path where the authentication engine is mounted.
|
|
1051
|
+
"""
|
|
1052
|
+
return pulumi.get(self, "mount")
|
|
1053
|
+
|
|
1054
|
+
@mount.setter
|
|
1055
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1056
|
+
pulumi.set(self, "mount", value)
|
|
1057
|
+
|
|
1058
|
+
@_builtins.property
|
|
1059
|
+
@pulumi.getter
|
|
1060
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1061
|
+
"""
|
|
1062
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1063
|
+
"""
|
|
1064
|
+
return pulumi.get(self, "namespace")
|
|
1065
|
+
|
|
1066
|
+
@namespace.setter
|
|
1067
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1068
|
+
pulumi.set(self, "namespace", value)
|
|
1069
|
+
|
|
1070
|
+
@_builtins.property
|
|
1071
|
+
@pulumi.getter
|
|
1072
|
+
def scope(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1073
|
+
"""
|
|
1074
|
+
The scopes to include in the token request.
|
|
1075
|
+
"""
|
|
1076
|
+
return pulumi.get(self, "scope")
|
|
1077
|
+
|
|
1078
|
+
@scope.setter
|
|
1079
|
+
def scope(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1080
|
+
pulumi.set(self, "scope", value)
|
|
1081
|
+
|
|
1082
|
+
@_builtins.property
|
|
1083
|
+
@pulumi.getter(name="tenantId")
|
|
1084
|
+
def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1085
|
+
"""
|
|
1086
|
+
Provides the tenant ID to use in a multi-tenant authentication scenario.
|
|
1087
|
+
"""
|
|
1088
|
+
return pulumi.get(self, "tenant_id")
|
|
1089
|
+
|
|
1090
|
+
@tenant_id.setter
|
|
1091
|
+
def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1092
|
+
pulumi.set(self, "tenant_id", value)
|
|
1093
|
+
|
|
1094
|
+
@_builtins.property
|
|
1095
|
+
@pulumi.getter(name="useRootNamespace")
|
|
1096
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1097
|
+
"""
|
|
1098
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1099
|
+
"""
|
|
1100
|
+
return pulumi.get(self, "use_root_namespace")
|
|
1101
|
+
|
|
1102
|
+
@use_root_namespace.setter
|
|
1103
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1104
|
+
pulumi.set(self, "use_root_namespace", value)
|
|
1105
|
+
|
|
1106
|
+
@_builtins.property
|
|
1107
|
+
@pulumi.getter(name="vmName")
|
|
1108
|
+
def vm_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1109
|
+
"""
|
|
1110
|
+
The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
1111
|
+
"""
|
|
1112
|
+
return pulumi.get(self, "vm_name")
|
|
1113
|
+
|
|
1114
|
+
@vm_name.setter
|
|
1115
|
+
def vm_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1116
|
+
pulumi.set(self, "vm_name", value)
|
|
1117
|
+
|
|
1118
|
+
@_builtins.property
|
|
1119
|
+
@pulumi.getter(name="vmssName")
|
|
1120
|
+
def vmss_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1121
|
+
"""
|
|
1122
|
+
The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
1123
|
+
"""
|
|
1124
|
+
return pulumi.get(self, "vmss_name")
|
|
1125
|
+
|
|
1126
|
+
@vmss_name.setter
|
|
1127
|
+
def vmss_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1128
|
+
pulumi.set(self, "vmss_name", value)
|
|
1129
|
+
|
|
1130
|
+
|
|
1131
|
+
if not MYPY:
|
|
1132
|
+
class ProviderAuthLoginCertArgsDict(TypedDict):
|
|
1133
|
+
cert_file: pulumi.Input[_builtins.str]
|
|
1134
|
+
"""
|
|
1135
|
+
Path to a file containing the client certificate.
|
|
1136
|
+
"""
|
|
1137
|
+
key_file: pulumi.Input[_builtins.str]
|
|
1138
|
+
"""
|
|
1139
|
+
Path to a file containing the private key that the certificate was issued for.
|
|
1140
|
+
"""
|
|
1141
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
|
1142
|
+
"""
|
|
1143
|
+
The path where the authentication engine is mounted.
|
|
1144
|
+
"""
|
|
1145
|
+
name: NotRequired[pulumi.Input[_builtins.str]]
|
|
1146
|
+
"""
|
|
1147
|
+
Name of the certificate's role
|
|
1148
|
+
"""
|
|
1149
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
|
1150
|
+
"""
|
|
1151
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1152
|
+
"""
|
|
1153
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
|
1154
|
+
"""
|
|
1155
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1156
|
+
"""
|
|
1157
|
+
elif False:
|
|
1158
|
+
ProviderAuthLoginCertArgsDict: TypeAlias = Mapping[str, Any]
|
|
1159
|
+
|
|
1160
|
+
@pulumi.input_type
|
|
1161
|
+
class ProviderAuthLoginCertArgs:
|
|
1162
|
+
def __init__(__self__, *,
|
|
1163
|
+
cert_file: pulumi.Input[_builtins.str],
|
|
1164
|
+
key_file: pulumi.Input[_builtins.str],
|
|
1165
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1166
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1167
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1168
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
1169
|
+
"""
|
|
1170
|
+
:param pulumi.Input[_builtins.str] cert_file: Path to a file containing the client certificate.
|
|
1171
|
+
:param pulumi.Input[_builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
|
|
1172
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
|
1173
|
+
:param pulumi.Input[_builtins.str] name: Name of the certificate's role
|
|
1174
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1175
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1176
|
+
"""
|
|
1177
|
+
pulumi.set(__self__, "cert_file", cert_file)
|
|
1178
|
+
pulumi.set(__self__, "key_file", key_file)
|
|
1179
|
+
if mount is not None:
|
|
1180
|
+
pulumi.set(__self__, "mount", mount)
|
|
1181
|
+
if name is not None:
|
|
1182
|
+
pulumi.set(__self__, "name", name)
|
|
1183
|
+
if namespace is not None:
|
|
1184
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
1185
|
+
if use_root_namespace is not None:
|
|
1186
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
1187
|
+
|
|
1188
|
+
@_builtins.property
|
|
1189
|
+
@pulumi.getter(name="certFile")
|
|
1190
|
+
def cert_file(self) -> pulumi.Input[_builtins.str]:
|
|
1191
|
+
"""
|
|
1192
|
+
Path to a file containing the client certificate.
|
|
1193
|
+
"""
|
|
1194
|
+
return pulumi.get(self, "cert_file")
|
|
1195
|
+
|
|
1196
|
+
@cert_file.setter
|
|
1197
|
+
def cert_file(self, value: pulumi.Input[_builtins.str]):
|
|
1198
|
+
pulumi.set(self, "cert_file", value)
|
|
1199
|
+
|
|
1200
|
+
@_builtins.property
|
|
1201
|
+
@pulumi.getter(name="keyFile")
|
|
1202
|
+
def key_file(self) -> pulumi.Input[_builtins.str]:
|
|
1203
|
+
"""
|
|
1204
|
+
Path to a file containing the private key that the certificate was issued for.
|
|
1205
|
+
"""
|
|
1206
|
+
return pulumi.get(self, "key_file")
|
|
1207
|
+
|
|
1208
|
+
@key_file.setter
|
|
1209
|
+
def key_file(self, value: pulumi.Input[_builtins.str]):
|
|
1210
|
+
pulumi.set(self, "key_file", value)
|
|
1211
|
+
|
|
1212
|
+
@_builtins.property
|
|
1213
|
+
@pulumi.getter
|
|
1214
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1215
|
+
"""
|
|
1216
|
+
The path where the authentication engine is mounted.
|
|
1217
|
+
"""
|
|
1218
|
+
return pulumi.get(self, "mount")
|
|
1219
|
+
|
|
1220
|
+
@mount.setter
|
|
1221
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1222
|
+
pulumi.set(self, "mount", value)
|
|
1223
|
+
|
|
1224
|
+
@_builtins.property
|
|
1225
|
+
@pulumi.getter
|
|
1226
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1227
|
+
"""
|
|
1228
|
+
Name of the certificate's role
|
|
1229
|
+
"""
|
|
1230
|
+
return pulumi.get(self, "name")
|
|
1231
|
+
|
|
1232
|
+
@name.setter
|
|
1233
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1234
|
+
pulumi.set(self, "name", value)
|
|
1235
|
+
|
|
1236
|
+
@_builtins.property
|
|
1237
|
+
@pulumi.getter
|
|
1238
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1239
|
+
"""
|
|
1240
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1241
|
+
"""
|
|
1242
|
+
return pulumi.get(self, "namespace")
|
|
1243
|
+
|
|
1244
|
+
@namespace.setter
|
|
1245
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1246
|
+
pulumi.set(self, "namespace", value)
|
|
1247
|
+
|
|
1248
|
+
@_builtins.property
|
|
1249
|
+
@pulumi.getter(name="useRootNamespace")
|
|
1250
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1251
|
+
"""
|
|
1252
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1253
|
+
"""
|
|
1254
|
+
return pulumi.get(self, "use_root_namespace")
|
|
1255
|
+
|
|
1256
|
+
@use_root_namespace.setter
|
|
1257
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1258
|
+
pulumi.set(self, "use_root_namespace", value)
|
|
1259
|
+
|
|
1260
|
+
|
|
1261
|
+
if not MYPY:
|
|
1262
|
+
class ProviderAuthLoginGcpArgsDict(TypedDict):
|
|
1263
|
+
role: pulumi.Input[_builtins.str]
|
|
1264
|
+
"""
|
|
1265
|
+
Name of the login role.
|
|
1266
|
+
"""
|
|
1267
|
+
credentials: NotRequired[pulumi.Input[_builtins.str]]
|
|
1268
|
+
"""
|
|
1269
|
+
Path to the Google Cloud credentials file.
|
|
1270
|
+
"""
|
|
1271
|
+
jwt: NotRequired[pulumi.Input[_builtins.str]]
|
|
1272
|
+
"""
|
|
1273
|
+
A signed JSON Web Token.
|
|
1274
|
+
"""
|
|
1275
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
|
1276
|
+
"""
|
|
1277
|
+
The path where the authentication engine is mounted.
|
|
1278
|
+
"""
|
|
1279
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
|
1280
|
+
"""
|
|
1281
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1282
|
+
"""
|
|
1283
|
+
service_account: NotRequired[pulumi.Input[_builtins.str]]
|
|
1284
|
+
"""
|
|
1285
|
+
IAM service account.
|
|
1286
|
+
"""
|
|
1287
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
|
1288
|
+
"""
|
|
1289
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1290
|
+
"""
|
|
1291
|
+
elif False:
|
|
1292
|
+
ProviderAuthLoginGcpArgsDict: TypeAlias = Mapping[str, Any]
|
|
1293
|
+
|
|
1294
|
+
@pulumi.input_type
|
|
1295
|
+
class ProviderAuthLoginGcpArgs:
|
|
1296
|
+
def __init__(__self__, *,
|
|
1297
|
+
role: pulumi.Input[_builtins.str],
|
|
1298
|
+
credentials: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1299
|
+
jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1300
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1301
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1302
|
+
service_account: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1303
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
1304
|
+
"""
|
|
1305
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
|
1306
|
+
:param pulumi.Input[_builtins.str] credentials: Path to the Google Cloud credentials file.
|
|
1307
|
+
:param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token.
|
|
1308
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
|
1309
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1310
|
+
:param pulumi.Input[_builtins.str] service_account: IAM service account.
|
|
1311
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1312
|
+
"""
|
|
1313
|
+
pulumi.set(__self__, "role", role)
|
|
1314
|
+
if credentials is not None:
|
|
1315
|
+
pulumi.set(__self__, "credentials", credentials)
|
|
1316
|
+
if jwt is not None:
|
|
1317
|
+
pulumi.set(__self__, "jwt", jwt)
|
|
1318
|
+
if mount is not None:
|
|
1319
|
+
pulumi.set(__self__, "mount", mount)
|
|
1320
|
+
if namespace is not None:
|
|
1321
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
1322
|
+
if service_account is not None:
|
|
1323
|
+
pulumi.set(__self__, "service_account", service_account)
|
|
1324
|
+
if use_root_namespace is not None:
|
|
1325
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
1326
|
+
|
|
1327
|
+
@_builtins.property
|
|
1328
|
+
@pulumi.getter
|
|
1329
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
|
1330
|
+
"""
|
|
1331
|
+
Name of the login role.
|
|
1332
|
+
"""
|
|
1333
|
+
return pulumi.get(self, "role")
|
|
1334
|
+
|
|
1335
|
+
@role.setter
|
|
1336
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
|
1337
|
+
pulumi.set(self, "role", value)
|
|
1338
|
+
|
|
1339
|
+
@_builtins.property
|
|
1340
|
+
@pulumi.getter
|
|
1341
|
+
def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1342
|
+
"""
|
|
1343
|
+
Path to the Google Cloud credentials file.
|
|
1344
|
+
"""
|
|
1345
|
+
return pulumi.get(self, "credentials")
|
|
1346
|
+
|
|
1347
|
+
@credentials.setter
|
|
1348
|
+
def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1349
|
+
pulumi.set(self, "credentials", value)
|
|
1350
|
+
|
|
1351
|
+
@_builtins.property
|
|
1352
|
+
@pulumi.getter
|
|
1353
|
+
def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1354
|
+
"""
|
|
1355
|
+
A signed JSON Web Token.
|
|
1356
|
+
"""
|
|
1357
|
+
return pulumi.get(self, "jwt")
|
|
1358
|
+
|
|
1359
|
+
@jwt.setter
|
|
1360
|
+
def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1361
|
+
pulumi.set(self, "jwt", value)
|
|
1362
|
+
|
|
1363
|
+
@_builtins.property
|
|
1364
|
+
@pulumi.getter
|
|
1365
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1366
|
+
"""
|
|
1367
|
+
The path where the authentication engine is mounted.
|
|
1368
|
+
"""
|
|
1369
|
+
return pulumi.get(self, "mount")
|
|
1370
|
+
|
|
1371
|
+
@mount.setter
|
|
1372
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1373
|
+
pulumi.set(self, "mount", value)
|
|
1374
|
+
|
|
1375
|
+
@_builtins.property
|
|
1376
|
+
@pulumi.getter
|
|
1377
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1378
|
+
"""
|
|
1379
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1380
|
+
"""
|
|
1381
|
+
return pulumi.get(self, "namespace")
|
|
1382
|
+
|
|
1383
|
+
@namespace.setter
|
|
1384
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1385
|
+
pulumi.set(self, "namespace", value)
|
|
1386
|
+
|
|
1387
|
+
@_builtins.property
|
|
1388
|
+
@pulumi.getter(name="serviceAccount")
|
|
1389
|
+
def service_account(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1390
|
+
"""
|
|
1391
|
+
IAM service account.
|
|
1392
|
+
"""
|
|
1393
|
+
return pulumi.get(self, "service_account")
|
|
1394
|
+
|
|
1395
|
+
@service_account.setter
|
|
1396
|
+
def service_account(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1397
|
+
pulumi.set(self, "service_account", value)
|
|
1398
|
+
|
|
1399
|
+
@_builtins.property
|
|
1400
|
+
@pulumi.getter(name="useRootNamespace")
|
|
1401
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1402
|
+
"""
|
|
1403
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1404
|
+
"""
|
|
1405
|
+
return pulumi.get(self, "use_root_namespace")
|
|
1406
|
+
|
|
1407
|
+
@use_root_namespace.setter
|
|
1408
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1409
|
+
pulumi.set(self, "use_root_namespace", value)
|
|
1410
|
+
|
|
1411
|
+
|
|
1412
|
+
if not MYPY:
|
|
1413
|
+
class ProviderAuthLoginJwtArgsDict(TypedDict):
|
|
1414
|
+
role: pulumi.Input[_builtins.str]
|
|
1415
|
+
"""
|
|
1416
|
+
Name of the login role.
|
|
1417
|
+
"""
|
|
1418
|
+
jwt: NotRequired[pulumi.Input[_builtins.str]]
|
|
1419
|
+
"""
|
|
1420
|
+
A signed JSON Web Token.
|
|
1421
|
+
"""
|
|
1422
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
|
1423
|
+
"""
|
|
1424
|
+
The path where the authentication engine is mounted.
|
|
1425
|
+
"""
|
|
1426
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
|
1427
|
+
"""
|
|
1428
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1429
|
+
"""
|
|
1430
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
|
1431
|
+
"""
|
|
1432
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1433
|
+
"""
|
|
1434
|
+
elif False:
|
|
1435
|
+
ProviderAuthLoginJwtArgsDict: TypeAlias = Mapping[str, Any]
|
|
1436
|
+
|
|
1437
|
+
@pulumi.input_type
|
|
1438
|
+
class ProviderAuthLoginJwtArgs:
|
|
1439
|
+
def __init__(__self__, *,
|
|
1440
|
+
role: pulumi.Input[_builtins.str],
|
|
1441
|
+
jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1442
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1443
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1444
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
1445
|
+
"""
|
|
1446
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
|
1447
|
+
:param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token.
|
|
1448
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
|
1449
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1450
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1451
|
+
"""
|
|
1452
|
+
pulumi.set(__self__, "role", role)
|
|
1453
|
+
if jwt is not None:
|
|
1454
|
+
pulumi.set(__self__, "jwt", jwt)
|
|
1455
|
+
if mount is not None:
|
|
1456
|
+
pulumi.set(__self__, "mount", mount)
|
|
1457
|
+
if namespace is not None:
|
|
1458
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
1459
|
+
if use_root_namespace is not None:
|
|
1460
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
1461
|
+
|
|
1462
|
+
@_builtins.property
|
|
1463
|
+
@pulumi.getter
|
|
1464
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
|
1465
|
+
"""
|
|
1466
|
+
Name of the login role.
|
|
1467
|
+
"""
|
|
1468
|
+
return pulumi.get(self, "role")
|
|
1469
|
+
|
|
1470
|
+
@role.setter
|
|
1471
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
|
1472
|
+
pulumi.set(self, "role", value)
|
|
1473
|
+
|
|
1474
|
+
@_builtins.property
|
|
1475
|
+
@pulumi.getter
|
|
1476
|
+
def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1477
|
+
"""
|
|
1478
|
+
A signed JSON Web Token.
|
|
1479
|
+
"""
|
|
1480
|
+
return pulumi.get(self, "jwt")
|
|
1481
|
+
|
|
1482
|
+
@jwt.setter
|
|
1483
|
+
def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1484
|
+
pulumi.set(self, "jwt", value)
|
|
1485
|
+
|
|
1486
|
+
@_builtins.property
|
|
1487
|
+
@pulumi.getter
|
|
1488
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1489
|
+
"""
|
|
1490
|
+
The path where the authentication engine is mounted.
|
|
1491
|
+
"""
|
|
1492
|
+
return pulumi.get(self, "mount")
|
|
1493
|
+
|
|
1494
|
+
@mount.setter
|
|
1495
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1496
|
+
pulumi.set(self, "mount", value)
|
|
1497
|
+
|
|
1498
|
+
@_builtins.property
|
|
1499
|
+
@pulumi.getter
|
|
1500
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1501
|
+
"""
|
|
1502
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1503
|
+
"""
|
|
1504
|
+
return pulumi.get(self, "namespace")
|
|
1505
|
+
|
|
1506
|
+
@namespace.setter
|
|
1507
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1508
|
+
pulumi.set(self, "namespace", value)
|
|
1509
|
+
|
|
1510
|
+
@_builtins.property
|
|
1511
|
+
@pulumi.getter(name="useRootNamespace")
|
|
1512
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1513
|
+
"""
|
|
1514
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1515
|
+
"""
|
|
1516
|
+
return pulumi.get(self, "use_root_namespace")
|
|
1517
|
+
|
|
1518
|
+
@use_root_namespace.setter
|
|
1519
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1520
|
+
pulumi.set(self, "use_root_namespace", value)
|
|
1521
|
+
|
|
1522
|
+
|
|
1523
|
+
if not MYPY:
|
|
1524
|
+
class ProviderAuthLoginKerberosArgsDict(TypedDict):
|
|
1525
|
+
disable_fast_negotiation: NotRequired[pulumi.Input[_builtins.bool]]
|
|
1526
|
+
"""
|
|
1527
|
+
Disable the Kerberos FAST negotiation.
|
|
1528
|
+
"""
|
|
1529
|
+
keytab_path: NotRequired[pulumi.Input[_builtins.str]]
|
|
1530
|
+
"""
|
|
1531
|
+
The Kerberos keytab file containing the entry of the login entity.
|
|
1532
|
+
"""
|
|
1533
|
+
krb5conf_path: NotRequired[pulumi.Input[_builtins.str]]
|
|
1534
|
+
"""
|
|
1535
|
+
A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
|
1536
|
+
"""
|
|
1537
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
|
1538
|
+
"""
|
|
1539
|
+
The path where the authentication engine is mounted.
|
|
1540
|
+
"""
|
|
1541
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
|
1542
|
+
"""
|
|
1543
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1544
|
+
"""
|
|
1545
|
+
realm: NotRequired[pulumi.Input[_builtins.str]]
|
|
1546
|
+
"""
|
|
1547
|
+
The Kerberos server's authoritative authentication domain
|
|
1548
|
+
"""
|
|
1549
|
+
remove_instance_name: NotRequired[pulumi.Input[_builtins.bool]]
|
|
1550
|
+
"""
|
|
1551
|
+
Strip the host from the username found in the keytab.
|
|
1552
|
+
"""
|
|
1553
|
+
service: NotRequired[pulumi.Input[_builtins.str]]
|
|
1554
|
+
"""
|
|
1555
|
+
The service principle name.
|
|
1556
|
+
"""
|
|
1557
|
+
token: NotRequired[pulumi.Input[_builtins.str]]
|
|
1558
|
+
"""
|
|
1559
|
+
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
|
1560
|
+
"""
|
|
1561
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
|
1562
|
+
"""
|
|
1563
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1564
|
+
"""
|
|
1565
|
+
username: NotRequired[pulumi.Input[_builtins.str]]
|
|
1566
|
+
"""
|
|
1567
|
+
The username to login into Kerberos with.
|
|
1568
|
+
"""
|
|
1569
|
+
elif False:
|
|
1570
|
+
ProviderAuthLoginKerberosArgsDict: TypeAlias = Mapping[str, Any]
|
|
1571
|
+
|
|
1572
|
+
@pulumi.input_type
|
|
1573
|
+
class ProviderAuthLoginKerberosArgs:
|
|
1574
|
+
def __init__(__self__, *,
|
|
1575
|
+
disable_fast_negotiation: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1576
|
+
keytab_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1577
|
+
krb5conf_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1578
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1579
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1580
|
+
realm: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1581
|
+
remove_instance_name: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1582
|
+
service: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1583
|
+
token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1584
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
1585
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
|
1586
|
+
"""
|
|
1587
|
+
:param pulumi.Input[_builtins.bool] disable_fast_negotiation: Disable the Kerberos FAST negotiation.
|
|
1588
|
+
:param pulumi.Input[_builtins.str] keytab_path: The Kerberos keytab file containing the entry of the login entity.
|
|
1589
|
+
:param pulumi.Input[_builtins.str] krb5conf_path: A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
|
1590
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
|
1591
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1592
|
+
:param pulumi.Input[_builtins.str] realm: The Kerberos server's authoritative authentication domain
|
|
1593
|
+
:param pulumi.Input[_builtins.bool] remove_instance_name: Strip the host from the username found in the keytab.
|
|
1594
|
+
:param pulumi.Input[_builtins.str] service: The service principle name.
|
|
1595
|
+
:param pulumi.Input[_builtins.str] token: Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
|
1596
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1597
|
+
:param pulumi.Input[_builtins.str] username: The username to login into Kerberos with.
|
|
1598
|
+
"""
|
|
1599
|
+
if disable_fast_negotiation is not None:
|
|
1600
|
+
pulumi.set(__self__, "disable_fast_negotiation", disable_fast_negotiation)
|
|
1601
|
+
if keytab_path is not None:
|
|
1602
|
+
pulumi.set(__self__, "keytab_path", keytab_path)
|
|
1603
|
+
if krb5conf_path is not None:
|
|
1604
|
+
pulumi.set(__self__, "krb5conf_path", krb5conf_path)
|
|
1605
|
+
if mount is not None:
|
|
1606
|
+
pulumi.set(__self__, "mount", mount)
|
|
1607
|
+
if namespace is not None:
|
|
1608
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
1609
|
+
if realm is not None:
|
|
1610
|
+
pulumi.set(__self__, "realm", realm)
|
|
1611
|
+
if remove_instance_name is not None:
|
|
1612
|
+
pulumi.set(__self__, "remove_instance_name", remove_instance_name)
|
|
1613
|
+
if service is not None:
|
|
1614
|
+
pulumi.set(__self__, "service", service)
|
|
1615
|
+
if token is not None:
|
|
1616
|
+
pulumi.set(__self__, "token", token)
|
|
1617
|
+
if use_root_namespace is not None:
|
|
1618
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
1619
|
+
if username is not None:
|
|
1620
|
+
pulumi.set(__self__, "username", username)
|
|
1621
|
+
|
|
1622
|
+
@_builtins.property
|
|
1623
|
+
@pulumi.getter(name="disableFastNegotiation")
|
|
1624
|
+
def disable_fast_negotiation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1625
|
+
"""
|
|
1626
|
+
Disable the Kerberos FAST negotiation.
|
|
1627
|
+
"""
|
|
1628
|
+
return pulumi.get(self, "disable_fast_negotiation")
|
|
1629
|
+
|
|
1630
|
+
@disable_fast_negotiation.setter
|
|
1631
|
+
def disable_fast_negotiation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1632
|
+
pulumi.set(self, "disable_fast_negotiation", value)
|
|
1633
|
+
|
|
1634
|
+
@_builtins.property
|
|
1635
|
+
@pulumi.getter(name="keytabPath")
|
|
1636
|
+
def keytab_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1637
|
+
"""
|
|
1638
|
+
The Kerberos keytab file containing the entry of the login entity.
|
|
1639
|
+
"""
|
|
1640
|
+
return pulumi.get(self, "keytab_path")
|
|
1641
|
+
|
|
1642
|
+
@keytab_path.setter
|
|
1643
|
+
def keytab_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1644
|
+
pulumi.set(self, "keytab_path", value)
|
|
1645
|
+
|
|
1646
|
+
@_builtins.property
|
|
1647
|
+
@pulumi.getter(name="krb5confPath")
|
|
1648
|
+
def krb5conf_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1649
|
+
"""
|
|
1650
|
+
A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
|
1651
|
+
"""
|
|
1652
|
+
return pulumi.get(self, "krb5conf_path")
|
|
1653
|
+
|
|
1654
|
+
@krb5conf_path.setter
|
|
1655
|
+
def krb5conf_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1656
|
+
pulumi.set(self, "krb5conf_path", value)
|
|
1657
|
+
|
|
1658
|
+
@_builtins.property
|
|
1659
|
+
@pulumi.getter
|
|
1660
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1661
|
+
"""
|
|
1662
|
+
The path where the authentication engine is mounted.
|
|
1663
|
+
"""
|
|
1664
|
+
return pulumi.get(self, "mount")
|
|
1665
|
+
|
|
1666
|
+
@mount.setter
|
|
1667
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1668
|
+
pulumi.set(self, "mount", value)
|
|
1669
|
+
|
|
1670
|
+
@_builtins.property
|
|
1671
|
+
@pulumi.getter
|
|
1672
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1673
|
+
"""
|
|
1674
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1675
|
+
"""
|
|
1676
|
+
return pulumi.get(self, "namespace")
|
|
1677
|
+
|
|
1678
|
+
@namespace.setter
|
|
1679
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1680
|
+
pulumi.set(self, "namespace", value)
|
|
1681
|
+
|
|
1682
|
+
@_builtins.property
|
|
1683
|
+
@pulumi.getter
|
|
1684
|
+
def realm(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1685
|
+
"""
|
|
1686
|
+
The Kerberos server's authoritative authentication domain
|
|
1687
|
+
"""
|
|
1688
|
+
return pulumi.get(self, "realm")
|
|
1689
|
+
|
|
1690
|
+
@realm.setter
|
|
1691
|
+
def realm(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1692
|
+
pulumi.set(self, "realm", value)
|
|
1693
|
+
|
|
1694
|
+
@_builtins.property
|
|
1695
|
+
@pulumi.getter(name="removeInstanceName")
|
|
1696
|
+
def remove_instance_name(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1697
|
+
"""
|
|
1698
|
+
Strip the host from the username found in the keytab.
|
|
1699
|
+
"""
|
|
1700
|
+
return pulumi.get(self, "remove_instance_name")
|
|
1701
|
+
|
|
1702
|
+
@remove_instance_name.setter
|
|
1703
|
+
def remove_instance_name(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1704
|
+
pulumi.set(self, "remove_instance_name", value)
|
|
1705
|
+
|
|
1706
|
+
@_builtins.property
|
|
1707
|
+
@pulumi.getter
|
|
1708
|
+
def service(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1709
|
+
"""
|
|
1710
|
+
The service principle name.
|
|
1711
|
+
"""
|
|
1712
|
+
return pulumi.get(self, "service")
|
|
1713
|
+
|
|
1714
|
+
@service.setter
|
|
1715
|
+
def service(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1716
|
+
pulumi.set(self, "service", value)
|
|
1717
|
+
|
|
1718
|
+
@_builtins.property
|
|
1719
|
+
@pulumi.getter
|
|
1720
|
+
def token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1721
|
+
"""
|
|
1722
|
+
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
|
1723
|
+
"""
|
|
1724
|
+
return pulumi.get(self, "token")
|
|
1725
|
+
|
|
1726
|
+
@token.setter
|
|
1727
|
+
def token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1728
|
+
pulumi.set(self, "token", value)
|
|
1729
|
+
|
|
1730
|
+
@_builtins.property
|
|
1731
|
+
@pulumi.getter(name="useRootNamespace")
|
|
1732
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1733
|
+
"""
|
|
1734
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1735
|
+
"""
|
|
1736
|
+
return pulumi.get(self, "use_root_namespace")
|
|
1737
|
+
|
|
1738
|
+
@use_root_namespace.setter
|
|
1739
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1740
|
+
pulumi.set(self, "use_root_namespace", value)
|
|
1741
|
+
|
|
1742
|
+
@_builtins.property
|
|
1743
|
+
@pulumi.getter
|
|
1744
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1745
|
+
"""
|
|
1746
|
+
The username to login into Kerberos with.
|
|
1747
|
+
"""
|
|
1748
|
+
return pulumi.get(self, "username")
|
|
1749
|
+
|
|
1750
|
+
@username.setter
|
|
1751
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1752
|
+
pulumi.set(self, "username", value)
|
|
1753
|
+
|
|
1754
|
+
|
|
1755
|
+
if not MYPY:
|
|
1756
|
+
class ProviderAuthLoginOciArgsDict(TypedDict):
|
|
1757
|
+
auth_type: pulumi.Input[_builtins.str]
|
|
1758
|
+
"""
|
|
1759
|
+
Authentication type to use when getting OCI credentials.
|
|
1760
|
+
"""
|
|
1761
|
+
role: pulumi.Input[_builtins.str]
|
|
1762
|
+
"""
|
|
1763
|
+
Name of the login role.
|
|
1764
|
+
"""
|
|
1765
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
|
1766
|
+
"""
|
|
1767
|
+
The path where the authentication engine is mounted.
|
|
1768
|
+
"""
|
|
1769
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
|
1770
|
+
"""
|
|
1771
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1772
|
+
"""
|
|
1773
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
|
1774
|
+
"""
|
|
1775
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1776
|
+
"""
|
|
1777
|
+
elif False:
|
|
1778
|
+
ProviderAuthLoginOciArgsDict: TypeAlias = Mapping[str, Any]
|
|
1779
|
+
|
|
1780
|
+
@pulumi.input_type
|
|
1781
|
+
class ProviderAuthLoginOciArgs:
|
|
1782
|
+
def __init__(__self__, *,
|
|
1783
|
+
auth_type: pulumi.Input[_builtins.str],
|
|
1784
|
+
role: pulumi.Input[_builtins.str],
|
|
1785
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1786
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1787
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
1788
|
+
"""
|
|
1789
|
+
:param pulumi.Input[_builtins.str] auth_type: Authentication type to use when getting OCI credentials.
|
|
1790
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
|
1791
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
|
1792
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1793
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1794
|
+
"""
|
|
1795
|
+
pulumi.set(__self__, "auth_type", auth_type)
|
|
1796
|
+
pulumi.set(__self__, "role", role)
|
|
1797
|
+
if mount is not None:
|
|
1798
|
+
pulumi.set(__self__, "mount", mount)
|
|
1799
|
+
if namespace is not None:
|
|
1800
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
1801
|
+
if use_root_namespace is not None:
|
|
1802
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
1803
|
+
|
|
1804
|
+
@_builtins.property
|
|
1805
|
+
@pulumi.getter(name="authType")
|
|
1806
|
+
def auth_type(self) -> pulumi.Input[_builtins.str]:
|
|
1807
|
+
"""
|
|
1808
|
+
Authentication type to use when getting OCI credentials.
|
|
1809
|
+
"""
|
|
1810
|
+
return pulumi.get(self, "auth_type")
|
|
1811
|
+
|
|
1812
|
+
@auth_type.setter
|
|
1813
|
+
def auth_type(self, value: pulumi.Input[_builtins.str]):
|
|
1814
|
+
pulumi.set(self, "auth_type", value)
|
|
1815
|
+
|
|
1816
|
+
@_builtins.property
|
|
1817
|
+
@pulumi.getter
|
|
1818
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
|
1819
|
+
"""
|
|
1820
|
+
Name of the login role.
|
|
1821
|
+
"""
|
|
1822
|
+
return pulumi.get(self, "role")
|
|
1823
|
+
|
|
1824
|
+
@role.setter
|
|
1825
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
|
1826
|
+
pulumi.set(self, "role", value)
|
|
1827
|
+
|
|
1828
|
+
@_builtins.property
|
|
1829
|
+
@pulumi.getter
|
|
1830
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1831
|
+
"""
|
|
1832
|
+
The path where the authentication engine is mounted.
|
|
1833
|
+
"""
|
|
1834
|
+
return pulumi.get(self, "mount")
|
|
1835
|
+
|
|
1836
|
+
@mount.setter
|
|
1837
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1838
|
+
pulumi.set(self, "mount", value)
|
|
1839
|
+
|
|
1840
|
+
@_builtins.property
|
|
1841
|
+
@pulumi.getter
|
|
1842
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1843
|
+
"""
|
|
1844
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1845
|
+
"""
|
|
1846
|
+
return pulumi.get(self, "namespace")
|
|
1847
|
+
|
|
1848
|
+
@namespace.setter
|
|
1849
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1850
|
+
pulumi.set(self, "namespace", value)
|
|
1851
|
+
|
|
1852
|
+
@_builtins.property
|
|
1853
|
+
@pulumi.getter(name="useRootNamespace")
|
|
1854
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1855
|
+
"""
|
|
1856
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1857
|
+
"""
|
|
1858
|
+
return pulumi.get(self, "use_root_namespace")
|
|
1859
|
+
|
|
1860
|
+
@use_root_namespace.setter
|
|
1861
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1862
|
+
pulumi.set(self, "use_root_namespace", value)
|
|
1863
|
+
|
|
1864
|
+
|
|
1865
|
+
if not MYPY:
|
|
1866
|
+
class ProviderAuthLoginOidcArgsDict(TypedDict):
|
|
1867
|
+
role: pulumi.Input[_builtins.str]
|
|
1868
|
+
"""
|
|
1869
|
+
Name of the login role.
|
|
1870
|
+
"""
|
|
1871
|
+
callback_address: NotRequired[pulumi.Input[_builtins.str]]
|
|
1872
|
+
"""
|
|
1873
|
+
The callback address. Must be a valid URI without the path.
|
|
1874
|
+
"""
|
|
1875
|
+
callback_listener_address: NotRequired[pulumi.Input[_builtins.str]]
|
|
1876
|
+
"""
|
|
1877
|
+
The callback listener's address. Must be a valid URI without the path.
|
|
1878
|
+
"""
|
|
1879
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
|
1880
|
+
"""
|
|
1881
|
+
The path where the authentication engine is mounted.
|
|
1882
|
+
"""
|
|
1883
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
|
1884
|
+
"""
|
|
1885
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1886
|
+
"""
|
|
1887
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
|
1888
|
+
"""
|
|
1889
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1890
|
+
"""
|
|
1891
|
+
elif False:
|
|
1892
|
+
ProviderAuthLoginOidcArgsDict: TypeAlias = Mapping[str, Any]
|
|
1893
|
+
|
|
1894
|
+
@pulumi.input_type
|
|
1895
|
+
class ProviderAuthLoginOidcArgs:
|
|
1896
|
+
def __init__(__self__, *,
|
|
1897
|
+
role: pulumi.Input[_builtins.str],
|
|
1898
|
+
callback_address: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1899
|
+
callback_listener_address: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1900
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1901
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
1902
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
1903
|
+
"""
|
|
1904
|
+
:param pulumi.Input[_builtins.str] role: Name of the login role.
|
|
1905
|
+
:param pulumi.Input[_builtins.str] callback_address: The callback address. Must be a valid URI without the path.
|
|
1906
|
+
:param pulumi.Input[_builtins.str] callback_listener_address: The callback listener's address. Must be a valid URI without the path.
|
|
1907
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
|
1908
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1909
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1910
|
+
"""
|
|
1911
|
+
pulumi.set(__self__, "role", role)
|
|
1912
|
+
if callback_address is not None:
|
|
1913
|
+
pulumi.set(__self__, "callback_address", callback_address)
|
|
1914
|
+
if callback_listener_address is not None:
|
|
1915
|
+
pulumi.set(__self__, "callback_listener_address", callback_listener_address)
|
|
1916
|
+
if mount is not None:
|
|
1917
|
+
pulumi.set(__self__, "mount", mount)
|
|
1918
|
+
if namespace is not None:
|
|
1919
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
1920
|
+
if use_root_namespace is not None:
|
|
1921
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
1922
|
+
|
|
1923
|
+
@_builtins.property
|
|
1924
|
+
@pulumi.getter
|
|
1925
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
|
1926
|
+
"""
|
|
1927
|
+
Name of the login role.
|
|
1928
|
+
"""
|
|
1929
|
+
return pulumi.get(self, "role")
|
|
1930
|
+
|
|
1931
|
+
@role.setter
|
|
1932
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
|
1933
|
+
pulumi.set(self, "role", value)
|
|
1934
|
+
|
|
1935
|
+
@_builtins.property
|
|
1936
|
+
@pulumi.getter(name="callbackAddress")
|
|
1937
|
+
def callback_address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1938
|
+
"""
|
|
1939
|
+
The callback address. Must be a valid URI without the path.
|
|
1940
|
+
"""
|
|
1941
|
+
return pulumi.get(self, "callback_address")
|
|
1942
|
+
|
|
1943
|
+
@callback_address.setter
|
|
1944
|
+
def callback_address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1945
|
+
pulumi.set(self, "callback_address", value)
|
|
1946
|
+
|
|
1947
|
+
@_builtins.property
|
|
1948
|
+
@pulumi.getter(name="callbackListenerAddress")
|
|
1949
|
+
def callback_listener_address(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1950
|
+
"""
|
|
1951
|
+
The callback listener's address. Must be a valid URI without the path.
|
|
1952
|
+
"""
|
|
1953
|
+
return pulumi.get(self, "callback_listener_address")
|
|
1954
|
+
|
|
1955
|
+
@callback_listener_address.setter
|
|
1956
|
+
def callback_listener_address(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1957
|
+
pulumi.set(self, "callback_listener_address", value)
|
|
1958
|
+
|
|
1959
|
+
@_builtins.property
|
|
1960
|
+
@pulumi.getter
|
|
1961
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1962
|
+
"""
|
|
1963
|
+
The path where the authentication engine is mounted.
|
|
1964
|
+
"""
|
|
1965
|
+
return pulumi.get(self, "mount")
|
|
1966
|
+
|
|
1967
|
+
@mount.setter
|
|
1968
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1969
|
+
pulumi.set(self, "mount", value)
|
|
1970
|
+
|
|
1971
|
+
@_builtins.property
|
|
1972
|
+
@pulumi.getter
|
|
1973
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
1974
|
+
"""
|
|
1975
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1976
|
+
"""
|
|
1977
|
+
return pulumi.get(self, "namespace")
|
|
1978
|
+
|
|
1979
|
+
@namespace.setter
|
|
1980
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
1981
|
+
pulumi.set(self, "namespace", value)
|
|
1982
|
+
|
|
1983
|
+
@_builtins.property
|
|
1984
|
+
@pulumi.getter(name="useRootNamespace")
|
|
1985
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
1986
|
+
"""
|
|
1987
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1988
|
+
"""
|
|
1989
|
+
return pulumi.get(self, "use_root_namespace")
|
|
1990
|
+
|
|
1991
|
+
@use_root_namespace.setter
|
|
1992
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
1993
|
+
pulumi.set(self, "use_root_namespace", value)
|
|
1994
|
+
|
|
1995
|
+
|
|
1996
|
+
if not MYPY:
|
|
1997
|
+
class ProviderAuthLoginRadiusArgsDict(TypedDict):
|
|
1998
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
|
1999
|
+
"""
|
|
2000
|
+
The path where the authentication engine is mounted.
|
|
2001
|
+
"""
|
|
2002
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
|
2003
|
+
"""
|
|
2004
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
2005
|
+
"""
|
|
2006
|
+
password: NotRequired[pulumi.Input[_builtins.str]]
|
|
2007
|
+
"""
|
|
2008
|
+
The Radius password for username.
|
|
2009
|
+
"""
|
|
2010
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
|
2011
|
+
"""
|
|
2012
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
2013
|
+
"""
|
|
2014
|
+
username: NotRequired[pulumi.Input[_builtins.str]]
|
|
2015
|
+
"""
|
|
2016
|
+
The Radius username.
|
|
2017
|
+
"""
|
|
2018
|
+
elif False:
|
|
2019
|
+
ProviderAuthLoginRadiusArgsDict: TypeAlias = Mapping[str, Any]
|
|
2020
|
+
|
|
2021
|
+
@pulumi.input_type
|
|
2022
|
+
class ProviderAuthLoginRadiusArgs:
|
|
2023
|
+
def __init__(__self__, *,
|
|
2024
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2025
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2026
|
+
password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2027
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2028
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
|
2029
|
+
"""
|
|
2030
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
|
2031
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
2032
|
+
:param pulumi.Input[_builtins.str] password: The Radius password for username.
|
|
2033
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
2034
|
+
:param pulumi.Input[_builtins.str] username: The Radius username.
|
|
2035
|
+
"""
|
|
2036
|
+
if mount is not None:
|
|
2037
|
+
pulumi.set(__self__, "mount", mount)
|
|
2038
|
+
if namespace is not None:
|
|
2039
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
2040
|
+
if password is not None:
|
|
2041
|
+
pulumi.set(__self__, "password", password)
|
|
2042
|
+
if use_root_namespace is not None:
|
|
2043
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
2044
|
+
if username is not None:
|
|
2045
|
+
pulumi.set(__self__, "username", username)
|
|
2046
|
+
|
|
2047
|
+
@_builtins.property
|
|
2048
|
+
@pulumi.getter
|
|
2049
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
2050
|
+
"""
|
|
2051
|
+
The path where the authentication engine is mounted.
|
|
2052
|
+
"""
|
|
2053
|
+
return pulumi.get(self, "mount")
|
|
2054
|
+
|
|
2055
|
+
@mount.setter
|
|
2056
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
2057
|
+
pulumi.set(self, "mount", value)
|
|
2058
|
+
|
|
2059
|
+
@_builtins.property
|
|
2060
|
+
@pulumi.getter
|
|
2061
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
2062
|
+
"""
|
|
2063
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
2064
|
+
"""
|
|
2065
|
+
return pulumi.get(self, "namespace")
|
|
2066
|
+
|
|
2067
|
+
@namespace.setter
|
|
2068
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
2069
|
+
pulumi.set(self, "namespace", value)
|
|
2070
|
+
|
|
2071
|
+
@_builtins.property
|
|
2072
|
+
@pulumi.getter
|
|
2073
|
+
def password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
2074
|
+
"""
|
|
2075
|
+
The Radius password for username.
|
|
2076
|
+
"""
|
|
2077
|
+
return pulumi.get(self, "password")
|
|
2078
|
+
|
|
2079
|
+
@password.setter
|
|
2080
|
+
def password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
2081
|
+
pulumi.set(self, "password", value)
|
|
2082
|
+
|
|
2083
|
+
@_builtins.property
|
|
2084
|
+
@pulumi.getter(name="useRootNamespace")
|
|
2085
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
2086
|
+
"""
|
|
2087
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
2088
|
+
"""
|
|
2089
|
+
return pulumi.get(self, "use_root_namespace")
|
|
2090
|
+
|
|
2091
|
+
@use_root_namespace.setter
|
|
2092
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
2093
|
+
pulumi.set(self, "use_root_namespace", value)
|
|
2094
|
+
|
|
2095
|
+
@_builtins.property
|
|
2096
|
+
@pulumi.getter
|
|
2097
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
2098
|
+
"""
|
|
2099
|
+
The Radius username.
|
|
2100
|
+
"""
|
|
2101
|
+
return pulumi.get(self, "username")
|
|
2102
|
+
|
|
2103
|
+
@username.setter
|
|
2104
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
2105
|
+
pulumi.set(self, "username", value)
|
|
2106
|
+
|
|
2107
|
+
|
|
2108
|
+
if not MYPY:
|
|
2109
|
+
class ProviderAuthLoginTokenFileArgsDict(TypedDict):
|
|
2110
|
+
filename: NotRequired[pulumi.Input[_builtins.str]]
|
|
2111
|
+
"""
|
|
2112
|
+
The name of a file containing a single line that is a valid Vault token
|
|
2113
|
+
"""
|
|
2114
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
|
2115
|
+
"""
|
|
2116
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
2117
|
+
"""
|
|
2118
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
|
2119
|
+
"""
|
|
2120
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
2121
|
+
"""
|
|
2122
|
+
elif False:
|
|
2123
|
+
ProviderAuthLoginTokenFileArgsDict: TypeAlias = Mapping[str, Any]
|
|
2124
|
+
|
|
2125
|
+
@pulumi.input_type
|
|
2126
|
+
class ProviderAuthLoginTokenFileArgs:
|
|
2127
|
+
def __init__(__self__, *,
|
|
2128
|
+
filename: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2129
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2130
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
2131
|
+
"""
|
|
2132
|
+
:param pulumi.Input[_builtins.str] filename: The name of a file containing a single line that is a valid Vault token
|
|
2133
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
2134
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
2135
|
+
"""
|
|
2136
|
+
if filename is not None:
|
|
2137
|
+
pulumi.set(__self__, "filename", filename)
|
|
2138
|
+
if namespace is not None:
|
|
2139
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
2140
|
+
if use_root_namespace is not None:
|
|
2141
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
2142
|
+
|
|
2143
|
+
@_builtins.property
|
|
2144
|
+
@pulumi.getter
|
|
2145
|
+
def filename(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
2146
|
+
"""
|
|
2147
|
+
The name of a file containing a single line that is a valid Vault token
|
|
2148
|
+
"""
|
|
2149
|
+
return pulumi.get(self, "filename")
|
|
2150
|
+
|
|
2151
|
+
@filename.setter
|
|
2152
|
+
def filename(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
2153
|
+
pulumi.set(self, "filename", value)
|
|
2154
|
+
|
|
2155
|
+
@_builtins.property
|
|
2156
|
+
@pulumi.getter
|
|
2157
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
2158
|
+
"""
|
|
2159
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
2160
|
+
"""
|
|
2161
|
+
return pulumi.get(self, "namespace")
|
|
2162
|
+
|
|
2163
|
+
@namespace.setter
|
|
2164
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
2165
|
+
pulumi.set(self, "namespace", value)
|
|
2166
|
+
|
|
2167
|
+
@_builtins.property
|
|
2168
|
+
@pulumi.getter(name="useRootNamespace")
|
|
2169
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
2170
|
+
"""
|
|
2171
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
2172
|
+
"""
|
|
2173
|
+
return pulumi.get(self, "use_root_namespace")
|
|
2174
|
+
|
|
2175
|
+
@use_root_namespace.setter
|
|
2176
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
2177
|
+
pulumi.set(self, "use_root_namespace", value)
|
|
2178
|
+
|
|
2179
|
+
|
|
2180
|
+
if not MYPY:
|
|
2181
|
+
class ProviderAuthLoginUserpassArgsDict(TypedDict):
|
|
2182
|
+
mount: NotRequired[pulumi.Input[_builtins.str]]
|
|
2183
|
+
"""
|
|
2184
|
+
The path where the authentication engine is mounted.
|
|
2185
|
+
"""
|
|
2186
|
+
namespace: NotRequired[pulumi.Input[_builtins.str]]
|
|
2187
|
+
"""
|
|
2188
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
2189
|
+
"""
|
|
2190
|
+
password: NotRequired[pulumi.Input[_builtins.str]]
|
|
2191
|
+
"""
|
|
2192
|
+
Login with password
|
|
2193
|
+
"""
|
|
2194
|
+
password_file: NotRequired[pulumi.Input[_builtins.str]]
|
|
2195
|
+
"""
|
|
2196
|
+
Login with password from a file
|
|
2197
|
+
"""
|
|
2198
|
+
use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
|
|
2199
|
+
"""
|
|
2200
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
2201
|
+
"""
|
|
2202
|
+
username: NotRequired[pulumi.Input[_builtins.str]]
|
|
2203
|
+
"""
|
|
2204
|
+
Login with username
|
|
2205
|
+
"""
|
|
2206
|
+
elif False:
|
|
2207
|
+
ProviderAuthLoginUserpassArgsDict: TypeAlias = Mapping[str, Any]
|
|
2208
|
+
|
|
2209
|
+
@pulumi.input_type
|
|
2210
|
+
class ProviderAuthLoginUserpassArgs:
|
|
2211
|
+
def __init__(__self__, *,
|
|
2212
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2213
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2214
|
+
password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2215
|
+
password_file: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2216
|
+
use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2217
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
|
2218
|
+
"""
|
|
2219
|
+
:param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
|
|
2220
|
+
:param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
2221
|
+
:param pulumi.Input[_builtins.str] password: Login with password
|
|
2222
|
+
:param pulumi.Input[_builtins.str] password_file: Login with password from a file
|
|
2223
|
+
:param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
2224
|
+
:param pulumi.Input[_builtins.str] username: Login with username
|
|
2225
|
+
"""
|
|
2226
|
+
if mount is not None:
|
|
2227
|
+
pulumi.set(__self__, "mount", mount)
|
|
2228
|
+
if namespace is not None:
|
|
2229
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
2230
|
+
if password is not None:
|
|
2231
|
+
pulumi.set(__self__, "password", password)
|
|
2232
|
+
if password_file is not None:
|
|
2233
|
+
pulumi.set(__self__, "password_file", password_file)
|
|
2234
|
+
if use_root_namespace is not None:
|
|
2235
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
2236
|
+
if username is not None:
|
|
2237
|
+
pulumi.set(__self__, "username", username)
|
|
2238
|
+
|
|
2239
|
+
@_builtins.property
|
|
2240
|
+
@pulumi.getter
|
|
2241
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
2242
|
+
"""
|
|
2243
|
+
The path where the authentication engine is mounted.
|
|
2244
|
+
"""
|
|
2245
|
+
return pulumi.get(self, "mount")
|
|
2246
|
+
|
|
2247
|
+
@mount.setter
|
|
2248
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
2249
|
+
pulumi.set(self, "mount", value)
|
|
2250
|
+
|
|
2251
|
+
@_builtins.property
|
|
2252
|
+
@pulumi.getter
|
|
2253
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
2254
|
+
"""
|
|
2255
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
2256
|
+
"""
|
|
2257
|
+
return pulumi.get(self, "namespace")
|
|
2258
|
+
|
|
2259
|
+
@namespace.setter
|
|
2260
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
2261
|
+
pulumi.set(self, "namespace", value)
|
|
2262
|
+
|
|
2263
|
+
@_builtins.property
|
|
2264
|
+
@pulumi.getter
|
|
2265
|
+
def password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
2266
|
+
"""
|
|
2267
|
+
Login with password
|
|
2268
|
+
"""
|
|
2269
|
+
return pulumi.get(self, "password")
|
|
2270
|
+
|
|
2271
|
+
@password.setter
|
|
2272
|
+
def password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
2273
|
+
pulumi.set(self, "password", value)
|
|
2274
|
+
|
|
2275
|
+
@_builtins.property
|
|
2276
|
+
@pulumi.getter(name="passwordFile")
|
|
2277
|
+
def password_file(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
2278
|
+
"""
|
|
2279
|
+
Login with password from a file
|
|
2280
|
+
"""
|
|
2281
|
+
return pulumi.get(self, "password_file")
|
|
2282
|
+
|
|
2283
|
+
@password_file.setter
|
|
2284
|
+
def password_file(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
2285
|
+
pulumi.set(self, "password_file", value)
|
|
2286
|
+
|
|
2287
|
+
@_builtins.property
|
|
2288
|
+
@pulumi.getter(name="useRootNamespace")
|
|
2289
|
+
def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
2290
|
+
"""
|
|
2291
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
2292
|
+
"""
|
|
2293
|
+
return pulumi.get(self, "use_root_namespace")
|
|
2294
|
+
|
|
2295
|
+
@use_root_namespace.setter
|
|
2296
|
+
def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
2297
|
+
pulumi.set(self, "use_root_namespace", value)
|
|
2298
|
+
|
|
2299
|
+
@_builtins.property
|
|
2300
|
+
@pulumi.getter
|
|
2301
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
2302
|
+
"""
|
|
2303
|
+
Login with username
|
|
2304
|
+
"""
|
|
2305
|
+
return pulumi.get(self, "username")
|
|
2306
|
+
|
|
2307
|
+
@username.setter
|
|
2308
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
2309
|
+
pulumi.set(self, "username", value)
|
|
2310
|
+
|
|
2311
|
+
|
|
2312
|
+
if not MYPY:
|
|
2313
|
+
class ProviderClientAuthArgsDict(TypedDict):
|
|
2314
|
+
cert_file: pulumi.Input[_builtins.str]
|
|
2315
|
+
"""
|
|
2316
|
+
Path to a file containing the client certificate.
|
|
2317
|
+
"""
|
|
2318
|
+
key_file: pulumi.Input[_builtins.str]
|
|
2319
|
+
"""
|
|
2320
|
+
Path to a file containing the private key that the certificate was issued for.
|
|
2321
|
+
"""
|
|
2322
|
+
elif False:
|
|
2323
|
+
ProviderClientAuthArgsDict: TypeAlias = Mapping[str, Any]
|
|
2324
|
+
|
|
2325
|
+
@pulumi.input_type
|
|
2326
|
+
class ProviderClientAuthArgs:
|
|
2327
|
+
def __init__(__self__, *,
|
|
2328
|
+
cert_file: pulumi.Input[_builtins.str],
|
|
2329
|
+
key_file: pulumi.Input[_builtins.str]):
|
|
2330
|
+
"""
|
|
2331
|
+
:param pulumi.Input[_builtins.str] cert_file: Path to a file containing the client certificate.
|
|
2332
|
+
:param pulumi.Input[_builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
|
|
2333
|
+
"""
|
|
2334
|
+
pulumi.set(__self__, "cert_file", cert_file)
|
|
2335
|
+
pulumi.set(__self__, "key_file", key_file)
|
|
2336
|
+
|
|
2337
|
+
@_builtins.property
|
|
2338
|
+
@pulumi.getter(name="certFile")
|
|
2339
|
+
def cert_file(self) -> pulumi.Input[_builtins.str]:
|
|
2340
|
+
"""
|
|
2341
|
+
Path to a file containing the client certificate.
|
|
2342
|
+
"""
|
|
2343
|
+
return pulumi.get(self, "cert_file")
|
|
2344
|
+
|
|
2345
|
+
@cert_file.setter
|
|
2346
|
+
def cert_file(self, value: pulumi.Input[_builtins.str]):
|
|
2347
|
+
pulumi.set(self, "cert_file", value)
|
|
2348
|
+
|
|
2349
|
+
@_builtins.property
|
|
2350
|
+
@pulumi.getter(name="keyFile")
|
|
2351
|
+
def key_file(self) -> pulumi.Input[_builtins.str]:
|
|
2352
|
+
"""
|
|
2353
|
+
Path to a file containing the private key that the certificate was issued for.
|
|
2354
|
+
"""
|
|
2355
|
+
return pulumi.get(self, "key_file")
|
|
2356
|
+
|
|
2357
|
+
@key_file.setter
|
|
2358
|
+
def key_file(self, value: pulumi.Input[_builtins.str]):
|
|
2359
|
+
pulumi.set(self, "key_file", value)
|
|
2360
|
+
|
|
2361
|
+
|
|
2362
|
+
if not MYPY:
|
|
2363
|
+
class ProviderHeaderArgsDict(TypedDict):
|
|
2364
|
+
name: pulumi.Input[_builtins.str]
|
|
2365
|
+
"""
|
|
2366
|
+
The header name
|
|
2367
|
+
"""
|
|
2368
|
+
value: pulumi.Input[_builtins.str]
|
|
2369
|
+
"""
|
|
2370
|
+
The header value
|
|
2371
|
+
"""
|
|
2372
|
+
elif False:
|
|
2373
|
+
ProviderHeaderArgsDict: TypeAlias = Mapping[str, Any]
|
|
2374
|
+
|
|
2375
|
+
@pulumi.input_type
|
|
2376
|
+
class ProviderHeaderArgs:
|
|
2377
|
+
def __init__(__self__, *,
|
|
2378
|
+
name: pulumi.Input[_builtins.str],
|
|
2379
|
+
value: pulumi.Input[_builtins.str]):
|
|
2380
|
+
"""
|
|
2381
|
+
:param pulumi.Input[_builtins.str] name: The header name
|
|
2382
|
+
:param pulumi.Input[_builtins.str] value: The header value
|
|
2383
|
+
"""
|
|
2384
|
+
pulumi.set(__self__, "name", name)
|
|
2385
|
+
pulumi.set(__self__, "value", value)
|
|
2386
|
+
|
|
2387
|
+
@_builtins.property
|
|
2388
|
+
@pulumi.getter
|
|
2389
|
+
def name(self) -> pulumi.Input[_builtins.str]:
|
|
2390
|
+
"""
|
|
2391
|
+
The header name
|
|
2392
|
+
"""
|
|
2393
|
+
return pulumi.get(self, "name")
|
|
2394
|
+
|
|
2395
|
+
@name.setter
|
|
2396
|
+
def name(self, value: pulumi.Input[_builtins.str]):
|
|
2397
|
+
pulumi.set(self, "name", value)
|
|
2398
|
+
|
|
2399
|
+
@_builtins.property
|
|
2400
|
+
@pulumi.getter
|
|
2401
|
+
def value(self) -> pulumi.Input[_builtins.str]:
|
|
2402
|
+
"""
|
|
2403
|
+
The header value
|
|
2404
|
+
"""
|
|
2405
|
+
return pulumi.get(self, "value")
|
|
2406
|
+
|
|
2407
|
+
@value.setter
|
|
2408
|
+
def value(self, value: pulumi.Input[_builtins.str]):
|
|
2409
|
+
pulumi.set(self, "value", value)
|
|
2410
|
+
|
|
2411
|
+
|
|
2412
|
+
if not MYPY:
|
|
2413
|
+
class GetPolicyDocumentRuleArgsDict(TypedDict):
|
|
2414
|
+
capabilities: Sequence[_builtins.str]
|
|
2415
|
+
"""
|
|
2416
|
+
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
|
2417
|
+
"""
|
|
2418
|
+
path: _builtins.str
|
|
2419
|
+
"""
|
|
2420
|
+
A path in Vault that this rule applies to.
|
|
2421
|
+
"""
|
|
2422
|
+
allowed_parameters: NotRequired[Sequence['GetPolicyDocumentRuleAllowedParameterArgsDict']]
|
|
2423
|
+
"""
|
|
2424
|
+
Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
|
2425
|
+
"""
|
|
2426
|
+
denied_parameters: NotRequired[Sequence['GetPolicyDocumentRuleDeniedParameterArgsDict']]
|
|
2427
|
+
"""
|
|
2428
|
+
Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
|
2429
|
+
"""
|
|
2430
|
+
description: NotRequired[_builtins.str]
|
|
2431
|
+
"""
|
|
2432
|
+
Description of the rule. Will be added as a comment to rendered rule.
|
|
2433
|
+
"""
|
|
2434
|
+
max_wrapping_ttl: NotRequired[_builtins.str]
|
|
2435
|
+
"""
|
|
2436
|
+
The maximum allowed TTL that clients can specify for a wrapped response.
|
|
2437
|
+
"""
|
|
2438
|
+
min_wrapping_ttl: NotRequired[_builtins.str]
|
|
2439
|
+
"""
|
|
2440
|
+
The minimum allowed TTL that clients can specify for a wrapped response.
|
|
2441
|
+
"""
|
|
2442
|
+
required_parameters: NotRequired[Sequence[_builtins.str]]
|
|
2443
|
+
"""
|
|
2444
|
+
A list of parameters that must be specified.
|
|
2445
|
+
"""
|
|
2446
|
+
subscribe_event_types: NotRequired[Sequence[_builtins.str]]
|
|
2447
|
+
"""
|
|
2448
|
+
A list of event types to subscribe to when using `subscribe` capability.
|
|
2449
|
+
"""
|
|
2450
|
+
elif False:
|
|
2451
|
+
GetPolicyDocumentRuleArgsDict: TypeAlias = Mapping[str, Any]
|
|
2452
|
+
|
|
2453
|
+
@pulumi.input_type
|
|
2454
|
+
class GetPolicyDocumentRuleArgs:
|
|
2455
|
+
def __init__(__self__, *,
|
|
2456
|
+
capabilities: Sequence[_builtins.str],
|
|
2457
|
+
path: _builtins.str,
|
|
2458
|
+
allowed_parameters: Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']] = None,
|
|
2459
|
+
denied_parameters: Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']] = None,
|
|
2460
|
+
description: Optional[_builtins.str] = None,
|
|
2461
|
+
max_wrapping_ttl: Optional[_builtins.str] = None,
|
|
2462
|
+
min_wrapping_ttl: Optional[_builtins.str] = None,
|
|
2463
|
+
required_parameters: Optional[Sequence[_builtins.str]] = None,
|
|
2464
|
+
subscribe_event_types: Optional[Sequence[_builtins.str]] = None):
|
|
2465
|
+
"""
|
|
2466
|
+
:param Sequence[_builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
|
2467
|
+
:param _builtins.str path: A path in Vault that this rule applies to.
|
|
2468
|
+
:param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
|
2469
|
+
:param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
|
2470
|
+
:param _builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
|
|
2471
|
+
:param _builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
|
|
2472
|
+
:param _builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
|
|
2473
|
+
:param Sequence[_builtins.str] required_parameters: A list of parameters that must be specified.
|
|
2474
|
+
:param Sequence[_builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
|
|
2475
|
+
"""
|
|
2476
|
+
pulumi.set(__self__, "capabilities", capabilities)
|
|
2477
|
+
pulumi.set(__self__, "path", path)
|
|
2478
|
+
if allowed_parameters is not None:
|
|
2479
|
+
pulumi.set(__self__, "allowed_parameters", allowed_parameters)
|
|
2480
|
+
if denied_parameters is not None:
|
|
2481
|
+
pulumi.set(__self__, "denied_parameters", denied_parameters)
|
|
2482
|
+
if description is not None:
|
|
2483
|
+
pulumi.set(__self__, "description", description)
|
|
2484
|
+
if max_wrapping_ttl is not None:
|
|
2485
|
+
pulumi.set(__self__, "max_wrapping_ttl", max_wrapping_ttl)
|
|
2486
|
+
if min_wrapping_ttl is not None:
|
|
2487
|
+
pulumi.set(__self__, "min_wrapping_ttl", min_wrapping_ttl)
|
|
2488
|
+
if required_parameters is not None:
|
|
2489
|
+
pulumi.set(__self__, "required_parameters", required_parameters)
|
|
2490
|
+
if subscribe_event_types is not None:
|
|
2491
|
+
pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
|
|
2492
|
+
|
|
2493
|
+
@_builtins.property
|
|
2494
|
+
@pulumi.getter
|
|
2495
|
+
def capabilities(self) -> Sequence[_builtins.str]:
|
|
2496
|
+
"""
|
|
2497
|
+
A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
|
2498
|
+
"""
|
|
2499
|
+
return pulumi.get(self, "capabilities")
|
|
2500
|
+
|
|
2501
|
+
@capabilities.setter
|
|
2502
|
+
def capabilities(self, value: Sequence[_builtins.str]):
|
|
2503
|
+
pulumi.set(self, "capabilities", value)
|
|
2504
|
+
|
|
2505
|
+
@_builtins.property
|
|
2506
|
+
@pulumi.getter
|
|
2507
|
+
def path(self) -> _builtins.str:
|
|
2508
|
+
"""
|
|
2509
|
+
A path in Vault that this rule applies to.
|
|
2510
|
+
"""
|
|
2511
|
+
return pulumi.get(self, "path")
|
|
2512
|
+
|
|
2513
|
+
@path.setter
|
|
2514
|
+
def path(self, value: _builtins.str):
|
|
2515
|
+
pulumi.set(self, "path", value)
|
|
2516
|
+
|
|
2517
|
+
@_builtins.property
|
|
2518
|
+
@pulumi.getter(name="allowedParameters")
|
|
2519
|
+
def allowed_parameters(self) -> Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']]:
|
|
2520
|
+
"""
|
|
2521
|
+
Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
|
2522
|
+
"""
|
|
2523
|
+
return pulumi.get(self, "allowed_parameters")
|
|
2524
|
+
|
|
2525
|
+
@allowed_parameters.setter
|
|
2526
|
+
def allowed_parameters(self, value: Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']]):
|
|
2527
|
+
pulumi.set(self, "allowed_parameters", value)
|
|
2528
|
+
|
|
2529
|
+
@_builtins.property
|
|
2530
|
+
@pulumi.getter(name="deniedParameters")
|
|
2531
|
+
def denied_parameters(self) -> Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']]:
|
|
2532
|
+
"""
|
|
2533
|
+
Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
|
|
2534
|
+
"""
|
|
2535
|
+
return pulumi.get(self, "denied_parameters")
|
|
2536
|
+
|
|
2537
|
+
@denied_parameters.setter
|
|
2538
|
+
def denied_parameters(self, value: Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']]):
|
|
2539
|
+
pulumi.set(self, "denied_parameters", value)
|
|
2540
|
+
|
|
2541
|
+
@_builtins.property
|
|
2542
|
+
@pulumi.getter
|
|
2543
|
+
def description(self) -> Optional[_builtins.str]:
|
|
2544
|
+
"""
|
|
2545
|
+
Description of the rule. Will be added as a comment to rendered rule.
|
|
2546
|
+
"""
|
|
2547
|
+
return pulumi.get(self, "description")
|
|
2548
|
+
|
|
2549
|
+
@description.setter
|
|
2550
|
+
def description(self, value: Optional[_builtins.str]):
|
|
2551
|
+
pulumi.set(self, "description", value)
|
|
2552
|
+
|
|
2553
|
+
@_builtins.property
|
|
2554
|
+
@pulumi.getter(name="maxWrappingTtl")
|
|
2555
|
+
def max_wrapping_ttl(self) -> Optional[_builtins.str]:
|
|
2556
|
+
"""
|
|
2557
|
+
The maximum allowed TTL that clients can specify for a wrapped response.
|
|
2558
|
+
"""
|
|
2559
|
+
return pulumi.get(self, "max_wrapping_ttl")
|
|
2560
|
+
|
|
2561
|
+
@max_wrapping_ttl.setter
|
|
2562
|
+
def max_wrapping_ttl(self, value: Optional[_builtins.str]):
|
|
2563
|
+
pulumi.set(self, "max_wrapping_ttl", value)
|
|
2564
|
+
|
|
2565
|
+
@_builtins.property
|
|
2566
|
+
@pulumi.getter(name="minWrappingTtl")
|
|
2567
|
+
def min_wrapping_ttl(self) -> Optional[_builtins.str]:
|
|
2568
|
+
"""
|
|
2569
|
+
The minimum allowed TTL that clients can specify for a wrapped response.
|
|
2570
|
+
"""
|
|
2571
|
+
return pulumi.get(self, "min_wrapping_ttl")
|
|
2572
|
+
|
|
2573
|
+
@min_wrapping_ttl.setter
|
|
2574
|
+
def min_wrapping_ttl(self, value: Optional[_builtins.str]):
|
|
2575
|
+
pulumi.set(self, "min_wrapping_ttl", value)
|
|
2576
|
+
|
|
2577
|
+
@_builtins.property
|
|
2578
|
+
@pulumi.getter(name="requiredParameters")
|
|
2579
|
+
def required_parameters(self) -> Optional[Sequence[_builtins.str]]:
|
|
2580
|
+
"""
|
|
2581
|
+
A list of parameters that must be specified.
|
|
2582
|
+
"""
|
|
2583
|
+
return pulumi.get(self, "required_parameters")
|
|
2584
|
+
|
|
2585
|
+
@required_parameters.setter
|
|
2586
|
+
def required_parameters(self, value: Optional[Sequence[_builtins.str]]):
|
|
2587
|
+
pulumi.set(self, "required_parameters", value)
|
|
2588
|
+
|
|
2589
|
+
@_builtins.property
|
|
2590
|
+
@pulumi.getter(name="subscribeEventTypes")
|
|
2591
|
+
def subscribe_event_types(self) -> Optional[Sequence[_builtins.str]]:
|
|
2592
|
+
"""
|
|
2593
|
+
A list of event types to subscribe to when using `subscribe` capability.
|
|
2594
|
+
"""
|
|
2595
|
+
return pulumi.get(self, "subscribe_event_types")
|
|
2596
|
+
|
|
2597
|
+
@subscribe_event_types.setter
|
|
2598
|
+
def subscribe_event_types(self, value: Optional[Sequence[_builtins.str]]):
|
|
2599
|
+
pulumi.set(self, "subscribe_event_types", value)
|
|
2600
|
+
|
|
2601
|
+
|
|
2602
|
+
if not MYPY:
|
|
2603
|
+
class GetPolicyDocumentRuleAllowedParameterArgsDict(TypedDict):
|
|
2604
|
+
key: _builtins.str
|
|
2605
|
+
"""
|
|
2606
|
+
Name of permitted key.
|
|
2607
|
+
"""
|
|
2608
|
+
values: Sequence[_builtins.str]
|
|
2609
|
+
"""
|
|
2610
|
+
A list of values what are permitted by policy rule.
|
|
2611
|
+
"""
|
|
2612
|
+
elif False:
|
|
2613
|
+
GetPolicyDocumentRuleAllowedParameterArgsDict: TypeAlias = Mapping[str, Any]
|
|
2614
|
+
|
|
2615
|
+
@pulumi.input_type
|
|
2616
|
+
class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
2617
|
+
def __init__(__self__, *,
|
|
2618
|
+
key: _builtins.str,
|
|
2619
|
+
values: Sequence[_builtins.str]):
|
|
2620
|
+
"""
|
|
2621
|
+
:param _builtins.str key: Name of permitted key.
|
|
2622
|
+
:param Sequence[_builtins.str] values: A list of values what are permitted by policy rule.
|
|
2623
|
+
"""
|
|
2624
|
+
pulumi.set(__self__, "key", key)
|
|
2625
|
+
pulumi.set(__self__, "values", values)
|
|
2626
|
+
|
|
2627
|
+
@_builtins.property
|
|
2628
|
+
@pulumi.getter
|
|
2629
|
+
def key(self) -> _builtins.str:
|
|
2630
|
+
"""
|
|
2631
|
+
Name of permitted key.
|
|
2632
|
+
"""
|
|
2633
|
+
return pulumi.get(self, "key")
|
|
2634
|
+
|
|
2635
|
+
@key.setter
|
|
2636
|
+
def key(self, value: _builtins.str):
|
|
2637
|
+
pulumi.set(self, "key", value)
|
|
2638
|
+
|
|
2639
|
+
@_builtins.property
|
|
2640
|
+
@pulumi.getter
|
|
2641
|
+
def values(self) -> Sequence[_builtins.str]:
|
|
2642
|
+
"""
|
|
2643
|
+
A list of values what are permitted by policy rule.
|
|
2644
|
+
"""
|
|
2645
|
+
return pulumi.get(self, "values")
|
|
2646
|
+
|
|
2647
|
+
@values.setter
|
|
2648
|
+
def values(self, value: Sequence[_builtins.str]):
|
|
2649
|
+
pulumi.set(self, "values", value)
|
|
2650
|
+
|
|
2651
|
+
|
|
2652
|
+
if not MYPY:
|
|
2653
|
+
class GetPolicyDocumentRuleDeniedParameterArgsDict(TypedDict):
|
|
2654
|
+
key: _builtins.str
|
|
2655
|
+
"""
|
|
2656
|
+
Name of denied key.
|
|
2657
|
+
"""
|
|
2658
|
+
values: Sequence[_builtins.str]
|
|
2659
|
+
"""
|
|
2660
|
+
A list of values what are denied by policy rule.
|
|
2661
|
+
"""
|
|
2662
|
+
elif False:
|
|
2663
|
+
GetPolicyDocumentRuleDeniedParameterArgsDict: TypeAlias = Mapping[str, Any]
|
|
2664
|
+
|
|
2665
|
+
@pulumi.input_type
|
|
2666
|
+
class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
2667
|
+
def __init__(__self__, *,
|
|
2668
|
+
key: _builtins.str,
|
|
2669
|
+
values: Sequence[_builtins.str]):
|
|
2670
|
+
"""
|
|
2671
|
+
:param _builtins.str key: Name of denied key.
|
|
2672
|
+
:param Sequence[_builtins.str] values: A list of values what are denied by policy rule.
|
|
2673
|
+
"""
|
|
2674
|
+
pulumi.set(__self__, "key", key)
|
|
2675
|
+
pulumi.set(__self__, "values", values)
|
|
2676
|
+
|
|
2677
|
+
@_builtins.property
|
|
2678
|
+
@pulumi.getter
|
|
2679
|
+
def key(self) -> _builtins.str:
|
|
2680
|
+
"""
|
|
2681
|
+
Name of denied key.
|
|
2682
|
+
"""
|
|
2683
|
+
return pulumi.get(self, "key")
|
|
2684
|
+
|
|
2685
|
+
@key.setter
|
|
2686
|
+
def key(self, value: _builtins.str):
|
|
2687
|
+
pulumi.set(self, "key", value)
|
|
2688
|
+
|
|
2689
|
+
@_builtins.property
|
|
2690
|
+
@pulumi.getter
|
|
2691
|
+
def values(self) -> Sequence[_builtins.str]:
|
|
2692
|
+
"""
|
|
2693
|
+
A list of values what are denied by policy rule.
|
|
2694
|
+
"""
|
|
2695
|
+
return pulumi.get(self, "values")
|
|
2696
|
+
|
|
2697
|
+
@values.setter
|
|
2698
|
+
def values(self, value: Sequence[_builtins.str]):
|
|
2699
|
+
pulumi.set(self, "values", value)
|
|
2700
|
+
|
|
2701
|
+
|