pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,1225 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'UiCustomMessageLink',
|
|
19
|
+
'AuthLogin',
|
|
20
|
+
'AuthLoginAws',
|
|
21
|
+
'AuthLoginAzure',
|
|
22
|
+
'AuthLoginCert',
|
|
23
|
+
'AuthLoginGcp',
|
|
24
|
+
'AuthLoginJwt',
|
|
25
|
+
'AuthLoginKerberos',
|
|
26
|
+
'AuthLoginOci',
|
|
27
|
+
'AuthLoginOidc',
|
|
28
|
+
'AuthLoginRadius',
|
|
29
|
+
'AuthLoginTokenFile',
|
|
30
|
+
'AuthLoginUserpass',
|
|
31
|
+
'ClientAuth',
|
|
32
|
+
'Headers',
|
|
33
|
+
]
|
|
34
|
+
|
|
35
|
+
@pulumi.output_type
|
|
36
|
+
class UiCustomMessageLink(dict):
|
|
37
|
+
def __init__(__self__, *,
|
|
38
|
+
href: _builtins.str,
|
|
39
|
+
title: _builtins.str):
|
|
40
|
+
"""
|
|
41
|
+
:param _builtins.str href: The URL of the hyperlink
|
|
42
|
+
:param _builtins.str title: The title of the hyperlink
|
|
43
|
+
"""
|
|
44
|
+
pulumi.set(__self__, "href", href)
|
|
45
|
+
pulumi.set(__self__, "title", title)
|
|
46
|
+
|
|
47
|
+
@_builtins.property
|
|
48
|
+
@pulumi.getter
|
|
49
|
+
def href(self) -> _builtins.str:
|
|
50
|
+
"""
|
|
51
|
+
The URL of the hyperlink
|
|
52
|
+
"""
|
|
53
|
+
return pulumi.get(self, "href")
|
|
54
|
+
|
|
55
|
+
@_builtins.property
|
|
56
|
+
@pulumi.getter
|
|
57
|
+
def title(self) -> _builtins.str:
|
|
58
|
+
"""
|
|
59
|
+
The title of the hyperlink
|
|
60
|
+
"""
|
|
61
|
+
return pulumi.get(self, "title")
|
|
62
|
+
|
|
63
|
+
|
|
64
|
+
@pulumi.output_type
|
|
65
|
+
class AuthLogin(dict):
|
|
66
|
+
def __init__(__self__, *,
|
|
67
|
+
path: _builtins.str,
|
|
68
|
+
method: Optional[_builtins.str] = None,
|
|
69
|
+
namespace: Optional[_builtins.str] = None,
|
|
70
|
+
parameters: Optional[Mapping[str, _builtins.str]] = None,
|
|
71
|
+
use_root_namespace: Optional[_builtins.bool] = None):
|
|
72
|
+
"""
|
|
73
|
+
:param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
74
|
+
:param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
75
|
+
"""
|
|
76
|
+
pulumi.set(__self__, "path", path)
|
|
77
|
+
if method is not None:
|
|
78
|
+
pulumi.set(__self__, "method", method)
|
|
79
|
+
if namespace is not None:
|
|
80
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
81
|
+
if parameters is not None:
|
|
82
|
+
pulumi.set(__self__, "parameters", parameters)
|
|
83
|
+
if use_root_namespace is not None:
|
|
84
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
85
|
+
|
|
86
|
+
@_builtins.property
|
|
87
|
+
@pulumi.getter
|
|
88
|
+
def path(self) -> _builtins.str:
|
|
89
|
+
return pulumi.get(self, "path")
|
|
90
|
+
|
|
91
|
+
@_builtins.property
|
|
92
|
+
@pulumi.getter
|
|
93
|
+
def method(self) -> Optional[_builtins.str]:
|
|
94
|
+
return pulumi.get(self, "method")
|
|
95
|
+
|
|
96
|
+
@_builtins.property
|
|
97
|
+
@pulumi.getter
|
|
98
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
99
|
+
"""
|
|
100
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
101
|
+
"""
|
|
102
|
+
return pulumi.get(self, "namespace")
|
|
103
|
+
|
|
104
|
+
@_builtins.property
|
|
105
|
+
@pulumi.getter
|
|
106
|
+
def parameters(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
107
|
+
return pulumi.get(self, "parameters")
|
|
108
|
+
|
|
109
|
+
@_builtins.property
|
|
110
|
+
@pulumi.getter(name="useRootNamespace")
|
|
111
|
+
def use_root_namespace(self) -> Optional[_builtins.bool]:
|
|
112
|
+
"""
|
|
113
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
114
|
+
"""
|
|
115
|
+
return pulumi.get(self, "use_root_namespace")
|
|
116
|
+
|
|
117
|
+
|
|
118
|
+
@pulumi.output_type
|
|
119
|
+
class AuthLoginAws(dict):
|
|
120
|
+
def __init__(__self__, *,
|
|
121
|
+
role: _builtins.str,
|
|
122
|
+
aws_access_key_id: Optional[_builtins.str] = None,
|
|
123
|
+
aws_iam_endpoint: Optional[_builtins.str] = None,
|
|
124
|
+
aws_profile: Optional[_builtins.str] = None,
|
|
125
|
+
aws_region: Optional[_builtins.str] = None,
|
|
126
|
+
aws_role_arn: Optional[_builtins.str] = None,
|
|
127
|
+
aws_role_session_name: Optional[_builtins.str] = None,
|
|
128
|
+
aws_secret_access_key: Optional[_builtins.str] = None,
|
|
129
|
+
aws_session_token: Optional[_builtins.str] = None,
|
|
130
|
+
aws_shared_credentials_file: Optional[_builtins.str] = None,
|
|
131
|
+
aws_sts_endpoint: Optional[_builtins.str] = None,
|
|
132
|
+
aws_web_identity_token_file: Optional[_builtins.str] = None,
|
|
133
|
+
header_value: Optional[_builtins.str] = None,
|
|
134
|
+
mount: Optional[_builtins.str] = None,
|
|
135
|
+
namespace: Optional[_builtins.str] = None,
|
|
136
|
+
use_root_namespace: Optional[_builtins.bool] = None):
|
|
137
|
+
"""
|
|
138
|
+
:param _builtins.str role: The Vault role to use when logging into Vault.
|
|
139
|
+
:param _builtins.str aws_access_key_id: The AWS access key ID.
|
|
140
|
+
:param _builtins.str aws_iam_endpoint: The IAM endpoint URL.
|
|
141
|
+
:param _builtins.str aws_profile: The name of the AWS profile.
|
|
142
|
+
:param _builtins.str aws_region: The AWS region.
|
|
143
|
+
:param _builtins.str aws_role_arn: The ARN of the AWS Role to assume.Used during STS AssumeRole
|
|
144
|
+
:param _builtins.str aws_role_session_name: Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
|
145
|
+
:param _builtins.str aws_secret_access_key: The AWS secret access key.
|
|
146
|
+
:param _builtins.str aws_session_token: The AWS session token.
|
|
147
|
+
:param _builtins.str aws_shared_credentials_file: Path to the AWS shared credentials file.
|
|
148
|
+
:param _builtins.str aws_sts_endpoint: The STS endpoint URL.
|
|
149
|
+
:param _builtins.str aws_web_identity_token_file: Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
|
150
|
+
:param _builtins.str header_value: The Vault header value to include in the STS signing request.
|
|
151
|
+
:param _builtins.str mount: The path where the authentication engine is mounted.
|
|
152
|
+
:param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
153
|
+
:param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
154
|
+
"""
|
|
155
|
+
pulumi.set(__self__, "role", role)
|
|
156
|
+
if aws_access_key_id is not None:
|
|
157
|
+
pulumi.set(__self__, "aws_access_key_id", aws_access_key_id)
|
|
158
|
+
if aws_iam_endpoint is not None:
|
|
159
|
+
pulumi.set(__self__, "aws_iam_endpoint", aws_iam_endpoint)
|
|
160
|
+
if aws_profile is not None:
|
|
161
|
+
pulumi.set(__self__, "aws_profile", aws_profile)
|
|
162
|
+
if aws_region is not None:
|
|
163
|
+
pulumi.set(__self__, "aws_region", aws_region)
|
|
164
|
+
if aws_role_arn is not None:
|
|
165
|
+
pulumi.set(__self__, "aws_role_arn", aws_role_arn)
|
|
166
|
+
if aws_role_session_name is not None:
|
|
167
|
+
pulumi.set(__self__, "aws_role_session_name", aws_role_session_name)
|
|
168
|
+
if aws_secret_access_key is not None:
|
|
169
|
+
pulumi.set(__self__, "aws_secret_access_key", aws_secret_access_key)
|
|
170
|
+
if aws_session_token is not None:
|
|
171
|
+
pulumi.set(__self__, "aws_session_token", aws_session_token)
|
|
172
|
+
if aws_shared_credentials_file is not None:
|
|
173
|
+
pulumi.set(__self__, "aws_shared_credentials_file", aws_shared_credentials_file)
|
|
174
|
+
if aws_sts_endpoint is not None:
|
|
175
|
+
pulumi.set(__self__, "aws_sts_endpoint", aws_sts_endpoint)
|
|
176
|
+
if aws_web_identity_token_file is not None:
|
|
177
|
+
pulumi.set(__self__, "aws_web_identity_token_file", aws_web_identity_token_file)
|
|
178
|
+
if header_value is not None:
|
|
179
|
+
pulumi.set(__self__, "header_value", header_value)
|
|
180
|
+
if mount is not None:
|
|
181
|
+
pulumi.set(__self__, "mount", mount)
|
|
182
|
+
if namespace is not None:
|
|
183
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
184
|
+
if use_root_namespace is not None:
|
|
185
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
186
|
+
|
|
187
|
+
@_builtins.property
|
|
188
|
+
@pulumi.getter
|
|
189
|
+
def role(self) -> _builtins.str:
|
|
190
|
+
"""
|
|
191
|
+
The Vault role to use when logging into Vault.
|
|
192
|
+
"""
|
|
193
|
+
return pulumi.get(self, "role")
|
|
194
|
+
|
|
195
|
+
@_builtins.property
|
|
196
|
+
@pulumi.getter(name="awsAccessKeyId")
|
|
197
|
+
def aws_access_key_id(self) -> Optional[_builtins.str]:
|
|
198
|
+
"""
|
|
199
|
+
The AWS access key ID.
|
|
200
|
+
"""
|
|
201
|
+
return pulumi.get(self, "aws_access_key_id")
|
|
202
|
+
|
|
203
|
+
@_builtins.property
|
|
204
|
+
@pulumi.getter(name="awsIamEndpoint")
|
|
205
|
+
def aws_iam_endpoint(self) -> Optional[_builtins.str]:
|
|
206
|
+
"""
|
|
207
|
+
The IAM endpoint URL.
|
|
208
|
+
"""
|
|
209
|
+
return pulumi.get(self, "aws_iam_endpoint")
|
|
210
|
+
|
|
211
|
+
@_builtins.property
|
|
212
|
+
@pulumi.getter(name="awsProfile")
|
|
213
|
+
def aws_profile(self) -> Optional[_builtins.str]:
|
|
214
|
+
"""
|
|
215
|
+
The name of the AWS profile.
|
|
216
|
+
"""
|
|
217
|
+
return pulumi.get(self, "aws_profile")
|
|
218
|
+
|
|
219
|
+
@_builtins.property
|
|
220
|
+
@pulumi.getter(name="awsRegion")
|
|
221
|
+
def aws_region(self) -> Optional[_builtins.str]:
|
|
222
|
+
"""
|
|
223
|
+
The AWS region.
|
|
224
|
+
"""
|
|
225
|
+
return pulumi.get(self, "aws_region")
|
|
226
|
+
|
|
227
|
+
@_builtins.property
|
|
228
|
+
@pulumi.getter(name="awsRoleArn")
|
|
229
|
+
def aws_role_arn(self) -> Optional[_builtins.str]:
|
|
230
|
+
"""
|
|
231
|
+
The ARN of the AWS Role to assume.Used during STS AssumeRole
|
|
232
|
+
"""
|
|
233
|
+
return pulumi.get(self, "aws_role_arn")
|
|
234
|
+
|
|
235
|
+
@_builtins.property
|
|
236
|
+
@pulumi.getter(name="awsRoleSessionName")
|
|
237
|
+
def aws_role_session_name(self) -> Optional[_builtins.str]:
|
|
238
|
+
"""
|
|
239
|
+
Specifies the name to attach to the AWS role session. Used during STS AssumeRole
|
|
240
|
+
"""
|
|
241
|
+
return pulumi.get(self, "aws_role_session_name")
|
|
242
|
+
|
|
243
|
+
@_builtins.property
|
|
244
|
+
@pulumi.getter(name="awsSecretAccessKey")
|
|
245
|
+
def aws_secret_access_key(self) -> Optional[_builtins.str]:
|
|
246
|
+
"""
|
|
247
|
+
The AWS secret access key.
|
|
248
|
+
"""
|
|
249
|
+
return pulumi.get(self, "aws_secret_access_key")
|
|
250
|
+
|
|
251
|
+
@_builtins.property
|
|
252
|
+
@pulumi.getter(name="awsSessionToken")
|
|
253
|
+
def aws_session_token(self) -> Optional[_builtins.str]:
|
|
254
|
+
"""
|
|
255
|
+
The AWS session token.
|
|
256
|
+
"""
|
|
257
|
+
return pulumi.get(self, "aws_session_token")
|
|
258
|
+
|
|
259
|
+
@_builtins.property
|
|
260
|
+
@pulumi.getter(name="awsSharedCredentialsFile")
|
|
261
|
+
def aws_shared_credentials_file(self) -> Optional[_builtins.str]:
|
|
262
|
+
"""
|
|
263
|
+
Path to the AWS shared credentials file.
|
|
264
|
+
"""
|
|
265
|
+
return pulumi.get(self, "aws_shared_credentials_file")
|
|
266
|
+
|
|
267
|
+
@_builtins.property
|
|
268
|
+
@pulumi.getter(name="awsStsEndpoint")
|
|
269
|
+
def aws_sts_endpoint(self) -> Optional[_builtins.str]:
|
|
270
|
+
"""
|
|
271
|
+
The STS endpoint URL.
|
|
272
|
+
"""
|
|
273
|
+
return pulumi.get(self, "aws_sts_endpoint")
|
|
274
|
+
|
|
275
|
+
@_builtins.property
|
|
276
|
+
@pulumi.getter(name="awsWebIdentityTokenFile")
|
|
277
|
+
def aws_web_identity_token_file(self) -> Optional[_builtins.str]:
|
|
278
|
+
"""
|
|
279
|
+
Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
|
|
280
|
+
"""
|
|
281
|
+
return pulumi.get(self, "aws_web_identity_token_file")
|
|
282
|
+
|
|
283
|
+
@_builtins.property
|
|
284
|
+
@pulumi.getter(name="headerValue")
|
|
285
|
+
def header_value(self) -> Optional[_builtins.str]:
|
|
286
|
+
"""
|
|
287
|
+
The Vault header value to include in the STS signing request.
|
|
288
|
+
"""
|
|
289
|
+
return pulumi.get(self, "header_value")
|
|
290
|
+
|
|
291
|
+
@_builtins.property
|
|
292
|
+
@pulumi.getter
|
|
293
|
+
def mount(self) -> Optional[_builtins.str]:
|
|
294
|
+
"""
|
|
295
|
+
The path where the authentication engine is mounted.
|
|
296
|
+
"""
|
|
297
|
+
return pulumi.get(self, "mount")
|
|
298
|
+
|
|
299
|
+
@_builtins.property
|
|
300
|
+
@pulumi.getter
|
|
301
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
302
|
+
"""
|
|
303
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
304
|
+
"""
|
|
305
|
+
return pulumi.get(self, "namespace")
|
|
306
|
+
|
|
307
|
+
@_builtins.property
|
|
308
|
+
@pulumi.getter(name="useRootNamespace")
|
|
309
|
+
def use_root_namespace(self) -> Optional[_builtins.bool]:
|
|
310
|
+
"""
|
|
311
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
312
|
+
"""
|
|
313
|
+
return pulumi.get(self, "use_root_namespace")
|
|
314
|
+
|
|
315
|
+
|
|
316
|
+
@pulumi.output_type
|
|
317
|
+
class AuthLoginAzure(dict):
|
|
318
|
+
def __init__(__self__, *,
|
|
319
|
+
resource_group_name: _builtins.str,
|
|
320
|
+
role: _builtins.str,
|
|
321
|
+
subscription_id: _builtins.str,
|
|
322
|
+
client_id: Optional[_builtins.str] = None,
|
|
323
|
+
jwt: Optional[_builtins.str] = None,
|
|
324
|
+
mount: Optional[_builtins.str] = None,
|
|
325
|
+
namespace: Optional[_builtins.str] = None,
|
|
326
|
+
scope: Optional[_builtins.str] = None,
|
|
327
|
+
tenant_id: Optional[_builtins.str] = None,
|
|
328
|
+
use_root_namespace: Optional[_builtins.bool] = None,
|
|
329
|
+
vm_name: Optional[_builtins.str] = None,
|
|
330
|
+
vmss_name: Optional[_builtins.str] = None):
|
|
331
|
+
"""
|
|
332
|
+
:param _builtins.str resource_group_name: The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
333
|
+
:param _builtins.str role: Name of the login role.
|
|
334
|
+
:param _builtins.str subscription_id: The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
335
|
+
:param _builtins.str client_id: The identity's client ID.
|
|
336
|
+
:param _builtins.str jwt: A signed JSON Web Token. If not specified on will be created automatically
|
|
337
|
+
:param _builtins.str mount: The path where the authentication engine is mounted.
|
|
338
|
+
:param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
339
|
+
:param _builtins.str scope: The scopes to include in the token request.
|
|
340
|
+
:param _builtins.str tenant_id: Provides the tenant ID to use in a multi-tenant authentication scenario.
|
|
341
|
+
:param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
342
|
+
:param _builtins.str vm_name: The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
343
|
+
:param _builtins.str vmss_name: The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
344
|
+
"""
|
|
345
|
+
pulumi.set(__self__, "resource_group_name", resource_group_name)
|
|
346
|
+
pulumi.set(__self__, "role", role)
|
|
347
|
+
pulumi.set(__self__, "subscription_id", subscription_id)
|
|
348
|
+
if client_id is not None:
|
|
349
|
+
pulumi.set(__self__, "client_id", client_id)
|
|
350
|
+
if jwt is not None:
|
|
351
|
+
pulumi.set(__self__, "jwt", jwt)
|
|
352
|
+
if mount is not None:
|
|
353
|
+
pulumi.set(__self__, "mount", mount)
|
|
354
|
+
if namespace is not None:
|
|
355
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
356
|
+
if scope is not None:
|
|
357
|
+
pulumi.set(__self__, "scope", scope)
|
|
358
|
+
if tenant_id is not None:
|
|
359
|
+
pulumi.set(__self__, "tenant_id", tenant_id)
|
|
360
|
+
if use_root_namespace is not None:
|
|
361
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
362
|
+
if vm_name is not None:
|
|
363
|
+
pulumi.set(__self__, "vm_name", vm_name)
|
|
364
|
+
if vmss_name is not None:
|
|
365
|
+
pulumi.set(__self__, "vmss_name", vmss_name)
|
|
366
|
+
|
|
367
|
+
@_builtins.property
|
|
368
|
+
@pulumi.getter(name="resourceGroupName")
|
|
369
|
+
def resource_group_name(self) -> _builtins.str:
|
|
370
|
+
"""
|
|
371
|
+
The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
372
|
+
"""
|
|
373
|
+
return pulumi.get(self, "resource_group_name")
|
|
374
|
+
|
|
375
|
+
@_builtins.property
|
|
376
|
+
@pulumi.getter
|
|
377
|
+
def role(self) -> _builtins.str:
|
|
378
|
+
"""
|
|
379
|
+
Name of the login role.
|
|
380
|
+
"""
|
|
381
|
+
return pulumi.get(self, "role")
|
|
382
|
+
|
|
383
|
+
@_builtins.property
|
|
384
|
+
@pulumi.getter(name="subscriptionId")
|
|
385
|
+
def subscription_id(self) -> _builtins.str:
|
|
386
|
+
"""
|
|
387
|
+
The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
388
|
+
"""
|
|
389
|
+
return pulumi.get(self, "subscription_id")
|
|
390
|
+
|
|
391
|
+
@_builtins.property
|
|
392
|
+
@pulumi.getter(name="clientId")
|
|
393
|
+
def client_id(self) -> Optional[_builtins.str]:
|
|
394
|
+
"""
|
|
395
|
+
The identity's client ID.
|
|
396
|
+
"""
|
|
397
|
+
return pulumi.get(self, "client_id")
|
|
398
|
+
|
|
399
|
+
@_builtins.property
|
|
400
|
+
@pulumi.getter
|
|
401
|
+
def jwt(self) -> Optional[_builtins.str]:
|
|
402
|
+
"""
|
|
403
|
+
A signed JSON Web Token. If not specified on will be created automatically
|
|
404
|
+
"""
|
|
405
|
+
return pulumi.get(self, "jwt")
|
|
406
|
+
|
|
407
|
+
@_builtins.property
|
|
408
|
+
@pulumi.getter
|
|
409
|
+
def mount(self) -> Optional[_builtins.str]:
|
|
410
|
+
"""
|
|
411
|
+
The path where the authentication engine is mounted.
|
|
412
|
+
"""
|
|
413
|
+
return pulumi.get(self, "mount")
|
|
414
|
+
|
|
415
|
+
@_builtins.property
|
|
416
|
+
@pulumi.getter
|
|
417
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
418
|
+
"""
|
|
419
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
420
|
+
"""
|
|
421
|
+
return pulumi.get(self, "namespace")
|
|
422
|
+
|
|
423
|
+
@_builtins.property
|
|
424
|
+
@pulumi.getter
|
|
425
|
+
def scope(self) -> Optional[_builtins.str]:
|
|
426
|
+
"""
|
|
427
|
+
The scopes to include in the token request.
|
|
428
|
+
"""
|
|
429
|
+
return pulumi.get(self, "scope")
|
|
430
|
+
|
|
431
|
+
@_builtins.property
|
|
432
|
+
@pulumi.getter(name="tenantId")
|
|
433
|
+
def tenant_id(self) -> Optional[_builtins.str]:
|
|
434
|
+
"""
|
|
435
|
+
Provides the tenant ID to use in a multi-tenant authentication scenario.
|
|
436
|
+
"""
|
|
437
|
+
return pulumi.get(self, "tenant_id")
|
|
438
|
+
|
|
439
|
+
@_builtins.property
|
|
440
|
+
@pulumi.getter(name="useRootNamespace")
|
|
441
|
+
def use_root_namespace(self) -> Optional[_builtins.bool]:
|
|
442
|
+
"""
|
|
443
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
444
|
+
"""
|
|
445
|
+
return pulumi.get(self, "use_root_namespace")
|
|
446
|
+
|
|
447
|
+
@_builtins.property
|
|
448
|
+
@pulumi.getter(name="vmName")
|
|
449
|
+
def vm_name(self) -> Optional[_builtins.str]:
|
|
450
|
+
"""
|
|
451
|
+
The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
452
|
+
"""
|
|
453
|
+
return pulumi.get(self, "vm_name")
|
|
454
|
+
|
|
455
|
+
@_builtins.property
|
|
456
|
+
@pulumi.getter(name="vmssName")
|
|
457
|
+
def vmss_name(self) -> Optional[_builtins.str]:
|
|
458
|
+
"""
|
|
459
|
+
The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
|
|
460
|
+
"""
|
|
461
|
+
return pulumi.get(self, "vmss_name")
|
|
462
|
+
|
|
463
|
+
|
|
464
|
+
@pulumi.output_type
|
|
465
|
+
class AuthLoginCert(dict):
|
|
466
|
+
def __init__(__self__, *,
|
|
467
|
+
cert_file: _builtins.str,
|
|
468
|
+
key_file: _builtins.str,
|
|
469
|
+
mount: Optional[_builtins.str] = None,
|
|
470
|
+
name: Optional[_builtins.str] = None,
|
|
471
|
+
namespace: Optional[_builtins.str] = None,
|
|
472
|
+
use_root_namespace: Optional[_builtins.bool] = None):
|
|
473
|
+
"""
|
|
474
|
+
:param _builtins.str cert_file: Path to a file containing the client certificate.
|
|
475
|
+
:param _builtins.str key_file: Path to a file containing the private key that the certificate was issued for.
|
|
476
|
+
:param _builtins.str mount: The path where the authentication engine is mounted.
|
|
477
|
+
:param _builtins.str name: Name of the certificate's role
|
|
478
|
+
:param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
479
|
+
:param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
480
|
+
"""
|
|
481
|
+
pulumi.set(__self__, "cert_file", cert_file)
|
|
482
|
+
pulumi.set(__self__, "key_file", key_file)
|
|
483
|
+
if mount is not None:
|
|
484
|
+
pulumi.set(__self__, "mount", mount)
|
|
485
|
+
if name is not None:
|
|
486
|
+
pulumi.set(__self__, "name", name)
|
|
487
|
+
if namespace is not None:
|
|
488
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
489
|
+
if use_root_namespace is not None:
|
|
490
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
491
|
+
|
|
492
|
+
@_builtins.property
|
|
493
|
+
@pulumi.getter(name="certFile")
|
|
494
|
+
def cert_file(self) -> _builtins.str:
|
|
495
|
+
"""
|
|
496
|
+
Path to a file containing the client certificate.
|
|
497
|
+
"""
|
|
498
|
+
return pulumi.get(self, "cert_file")
|
|
499
|
+
|
|
500
|
+
@_builtins.property
|
|
501
|
+
@pulumi.getter(name="keyFile")
|
|
502
|
+
def key_file(self) -> _builtins.str:
|
|
503
|
+
"""
|
|
504
|
+
Path to a file containing the private key that the certificate was issued for.
|
|
505
|
+
"""
|
|
506
|
+
return pulumi.get(self, "key_file")
|
|
507
|
+
|
|
508
|
+
@_builtins.property
|
|
509
|
+
@pulumi.getter
|
|
510
|
+
def mount(self) -> Optional[_builtins.str]:
|
|
511
|
+
"""
|
|
512
|
+
The path where the authentication engine is mounted.
|
|
513
|
+
"""
|
|
514
|
+
return pulumi.get(self, "mount")
|
|
515
|
+
|
|
516
|
+
@_builtins.property
|
|
517
|
+
@pulumi.getter
|
|
518
|
+
def name(self) -> Optional[_builtins.str]:
|
|
519
|
+
"""
|
|
520
|
+
Name of the certificate's role
|
|
521
|
+
"""
|
|
522
|
+
return pulumi.get(self, "name")
|
|
523
|
+
|
|
524
|
+
@_builtins.property
|
|
525
|
+
@pulumi.getter
|
|
526
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
527
|
+
"""
|
|
528
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
529
|
+
"""
|
|
530
|
+
return pulumi.get(self, "namespace")
|
|
531
|
+
|
|
532
|
+
@_builtins.property
|
|
533
|
+
@pulumi.getter(name="useRootNamespace")
|
|
534
|
+
def use_root_namespace(self) -> Optional[_builtins.bool]:
|
|
535
|
+
"""
|
|
536
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
537
|
+
"""
|
|
538
|
+
return pulumi.get(self, "use_root_namespace")
|
|
539
|
+
|
|
540
|
+
|
|
541
|
+
@pulumi.output_type
|
|
542
|
+
class AuthLoginGcp(dict):
|
|
543
|
+
def __init__(__self__, *,
|
|
544
|
+
role: _builtins.str,
|
|
545
|
+
credentials: Optional[_builtins.str] = None,
|
|
546
|
+
jwt: Optional[_builtins.str] = None,
|
|
547
|
+
mount: Optional[_builtins.str] = None,
|
|
548
|
+
namespace: Optional[_builtins.str] = None,
|
|
549
|
+
service_account: Optional[_builtins.str] = None,
|
|
550
|
+
use_root_namespace: Optional[_builtins.bool] = None):
|
|
551
|
+
"""
|
|
552
|
+
:param _builtins.str role: Name of the login role.
|
|
553
|
+
:param _builtins.str credentials: Path to the Google Cloud credentials file.
|
|
554
|
+
:param _builtins.str jwt: A signed JSON Web Token.
|
|
555
|
+
:param _builtins.str mount: The path where the authentication engine is mounted.
|
|
556
|
+
:param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
557
|
+
:param _builtins.str service_account: IAM service account.
|
|
558
|
+
:param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
559
|
+
"""
|
|
560
|
+
pulumi.set(__self__, "role", role)
|
|
561
|
+
if credentials is not None:
|
|
562
|
+
pulumi.set(__self__, "credentials", credentials)
|
|
563
|
+
if jwt is not None:
|
|
564
|
+
pulumi.set(__self__, "jwt", jwt)
|
|
565
|
+
if mount is not None:
|
|
566
|
+
pulumi.set(__self__, "mount", mount)
|
|
567
|
+
if namespace is not None:
|
|
568
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
569
|
+
if service_account is not None:
|
|
570
|
+
pulumi.set(__self__, "service_account", service_account)
|
|
571
|
+
if use_root_namespace is not None:
|
|
572
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
573
|
+
|
|
574
|
+
@_builtins.property
|
|
575
|
+
@pulumi.getter
|
|
576
|
+
def role(self) -> _builtins.str:
|
|
577
|
+
"""
|
|
578
|
+
Name of the login role.
|
|
579
|
+
"""
|
|
580
|
+
return pulumi.get(self, "role")
|
|
581
|
+
|
|
582
|
+
@_builtins.property
|
|
583
|
+
@pulumi.getter
|
|
584
|
+
def credentials(self) -> Optional[_builtins.str]:
|
|
585
|
+
"""
|
|
586
|
+
Path to the Google Cloud credentials file.
|
|
587
|
+
"""
|
|
588
|
+
return pulumi.get(self, "credentials")
|
|
589
|
+
|
|
590
|
+
@_builtins.property
|
|
591
|
+
@pulumi.getter
|
|
592
|
+
def jwt(self) -> Optional[_builtins.str]:
|
|
593
|
+
"""
|
|
594
|
+
A signed JSON Web Token.
|
|
595
|
+
"""
|
|
596
|
+
return pulumi.get(self, "jwt")
|
|
597
|
+
|
|
598
|
+
@_builtins.property
|
|
599
|
+
@pulumi.getter
|
|
600
|
+
def mount(self) -> Optional[_builtins.str]:
|
|
601
|
+
"""
|
|
602
|
+
The path where the authentication engine is mounted.
|
|
603
|
+
"""
|
|
604
|
+
return pulumi.get(self, "mount")
|
|
605
|
+
|
|
606
|
+
@_builtins.property
|
|
607
|
+
@pulumi.getter
|
|
608
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
609
|
+
"""
|
|
610
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
611
|
+
"""
|
|
612
|
+
return pulumi.get(self, "namespace")
|
|
613
|
+
|
|
614
|
+
@_builtins.property
|
|
615
|
+
@pulumi.getter(name="serviceAccount")
|
|
616
|
+
def service_account(self) -> Optional[_builtins.str]:
|
|
617
|
+
"""
|
|
618
|
+
IAM service account.
|
|
619
|
+
"""
|
|
620
|
+
return pulumi.get(self, "service_account")
|
|
621
|
+
|
|
622
|
+
@_builtins.property
|
|
623
|
+
@pulumi.getter(name="useRootNamespace")
|
|
624
|
+
def use_root_namespace(self) -> Optional[_builtins.bool]:
|
|
625
|
+
"""
|
|
626
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
627
|
+
"""
|
|
628
|
+
return pulumi.get(self, "use_root_namespace")
|
|
629
|
+
|
|
630
|
+
|
|
631
|
+
@pulumi.output_type
|
|
632
|
+
class AuthLoginJwt(dict):
|
|
633
|
+
def __init__(__self__, *,
|
|
634
|
+
role: _builtins.str,
|
|
635
|
+
jwt: Optional[_builtins.str] = None,
|
|
636
|
+
mount: Optional[_builtins.str] = None,
|
|
637
|
+
namespace: Optional[_builtins.str] = None,
|
|
638
|
+
use_root_namespace: Optional[_builtins.bool] = None):
|
|
639
|
+
"""
|
|
640
|
+
:param _builtins.str role: Name of the login role.
|
|
641
|
+
:param _builtins.str jwt: A signed JSON Web Token.
|
|
642
|
+
:param _builtins.str mount: The path where the authentication engine is mounted.
|
|
643
|
+
:param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
644
|
+
:param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
645
|
+
"""
|
|
646
|
+
pulumi.set(__self__, "role", role)
|
|
647
|
+
if jwt is not None:
|
|
648
|
+
pulumi.set(__self__, "jwt", jwt)
|
|
649
|
+
if mount is not None:
|
|
650
|
+
pulumi.set(__self__, "mount", mount)
|
|
651
|
+
if namespace is not None:
|
|
652
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
653
|
+
if use_root_namespace is not None:
|
|
654
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
655
|
+
|
|
656
|
+
@_builtins.property
|
|
657
|
+
@pulumi.getter
|
|
658
|
+
def role(self) -> _builtins.str:
|
|
659
|
+
"""
|
|
660
|
+
Name of the login role.
|
|
661
|
+
"""
|
|
662
|
+
return pulumi.get(self, "role")
|
|
663
|
+
|
|
664
|
+
@_builtins.property
|
|
665
|
+
@pulumi.getter
|
|
666
|
+
def jwt(self) -> Optional[_builtins.str]:
|
|
667
|
+
"""
|
|
668
|
+
A signed JSON Web Token.
|
|
669
|
+
"""
|
|
670
|
+
return pulumi.get(self, "jwt")
|
|
671
|
+
|
|
672
|
+
@_builtins.property
|
|
673
|
+
@pulumi.getter
|
|
674
|
+
def mount(self) -> Optional[_builtins.str]:
|
|
675
|
+
"""
|
|
676
|
+
The path where the authentication engine is mounted.
|
|
677
|
+
"""
|
|
678
|
+
return pulumi.get(self, "mount")
|
|
679
|
+
|
|
680
|
+
@_builtins.property
|
|
681
|
+
@pulumi.getter
|
|
682
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
683
|
+
"""
|
|
684
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
685
|
+
"""
|
|
686
|
+
return pulumi.get(self, "namespace")
|
|
687
|
+
|
|
688
|
+
@_builtins.property
|
|
689
|
+
@pulumi.getter(name="useRootNamespace")
|
|
690
|
+
def use_root_namespace(self) -> Optional[_builtins.bool]:
|
|
691
|
+
"""
|
|
692
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
693
|
+
"""
|
|
694
|
+
return pulumi.get(self, "use_root_namespace")
|
|
695
|
+
|
|
696
|
+
|
|
697
|
+
@pulumi.output_type
|
|
698
|
+
class AuthLoginKerberos(dict):
|
|
699
|
+
def __init__(__self__, *,
|
|
700
|
+
disable_fast_negotiation: Optional[_builtins.bool] = None,
|
|
701
|
+
keytab_path: Optional[_builtins.str] = None,
|
|
702
|
+
krb5conf_path: Optional[_builtins.str] = None,
|
|
703
|
+
mount: Optional[_builtins.str] = None,
|
|
704
|
+
namespace: Optional[_builtins.str] = None,
|
|
705
|
+
realm: Optional[_builtins.str] = None,
|
|
706
|
+
remove_instance_name: Optional[_builtins.bool] = None,
|
|
707
|
+
service: Optional[_builtins.str] = None,
|
|
708
|
+
token: Optional[_builtins.str] = None,
|
|
709
|
+
use_root_namespace: Optional[_builtins.bool] = None,
|
|
710
|
+
username: Optional[_builtins.str] = None):
|
|
711
|
+
"""
|
|
712
|
+
:param _builtins.bool disable_fast_negotiation: Disable the Kerberos FAST negotiation.
|
|
713
|
+
:param _builtins.str keytab_path: The Kerberos keytab file containing the entry of the login entity.
|
|
714
|
+
:param _builtins.str krb5conf_path: A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
|
715
|
+
:param _builtins.str mount: The path where the authentication engine is mounted.
|
|
716
|
+
:param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
717
|
+
:param _builtins.str realm: The Kerberos server's authoritative authentication domain
|
|
718
|
+
:param _builtins.bool remove_instance_name: Strip the host from the username found in the keytab.
|
|
719
|
+
:param _builtins.str service: The service principle name.
|
|
720
|
+
:param _builtins.str token: Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
|
721
|
+
:param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
722
|
+
:param _builtins.str username: The username to login into Kerberos with.
|
|
723
|
+
"""
|
|
724
|
+
if disable_fast_negotiation is not None:
|
|
725
|
+
pulumi.set(__self__, "disable_fast_negotiation", disable_fast_negotiation)
|
|
726
|
+
if keytab_path is not None:
|
|
727
|
+
pulumi.set(__self__, "keytab_path", keytab_path)
|
|
728
|
+
if krb5conf_path is not None:
|
|
729
|
+
pulumi.set(__self__, "krb5conf_path", krb5conf_path)
|
|
730
|
+
if mount is not None:
|
|
731
|
+
pulumi.set(__self__, "mount", mount)
|
|
732
|
+
if namespace is not None:
|
|
733
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
734
|
+
if realm is not None:
|
|
735
|
+
pulumi.set(__self__, "realm", realm)
|
|
736
|
+
if remove_instance_name is not None:
|
|
737
|
+
pulumi.set(__self__, "remove_instance_name", remove_instance_name)
|
|
738
|
+
if service is not None:
|
|
739
|
+
pulumi.set(__self__, "service", service)
|
|
740
|
+
if token is not None:
|
|
741
|
+
pulumi.set(__self__, "token", token)
|
|
742
|
+
if use_root_namespace is not None:
|
|
743
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
744
|
+
if username is not None:
|
|
745
|
+
pulumi.set(__self__, "username", username)
|
|
746
|
+
|
|
747
|
+
@_builtins.property
|
|
748
|
+
@pulumi.getter(name="disableFastNegotiation")
|
|
749
|
+
def disable_fast_negotiation(self) -> Optional[_builtins.bool]:
|
|
750
|
+
"""
|
|
751
|
+
Disable the Kerberos FAST negotiation.
|
|
752
|
+
"""
|
|
753
|
+
return pulumi.get(self, "disable_fast_negotiation")
|
|
754
|
+
|
|
755
|
+
@_builtins.property
|
|
756
|
+
@pulumi.getter(name="keytabPath")
|
|
757
|
+
def keytab_path(self) -> Optional[_builtins.str]:
|
|
758
|
+
"""
|
|
759
|
+
The Kerberos keytab file containing the entry of the login entity.
|
|
760
|
+
"""
|
|
761
|
+
return pulumi.get(self, "keytab_path")
|
|
762
|
+
|
|
763
|
+
@_builtins.property
|
|
764
|
+
@pulumi.getter(name="krb5confPath")
|
|
765
|
+
def krb5conf_path(self) -> Optional[_builtins.str]:
|
|
766
|
+
"""
|
|
767
|
+
A valid Kerberos configuration file e.g. /etc/krb5.conf.
|
|
768
|
+
"""
|
|
769
|
+
return pulumi.get(self, "krb5conf_path")
|
|
770
|
+
|
|
771
|
+
@_builtins.property
|
|
772
|
+
@pulumi.getter
|
|
773
|
+
def mount(self) -> Optional[_builtins.str]:
|
|
774
|
+
"""
|
|
775
|
+
The path where the authentication engine is mounted.
|
|
776
|
+
"""
|
|
777
|
+
return pulumi.get(self, "mount")
|
|
778
|
+
|
|
779
|
+
@_builtins.property
|
|
780
|
+
@pulumi.getter
|
|
781
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
782
|
+
"""
|
|
783
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
784
|
+
"""
|
|
785
|
+
return pulumi.get(self, "namespace")
|
|
786
|
+
|
|
787
|
+
@_builtins.property
|
|
788
|
+
@pulumi.getter
|
|
789
|
+
def realm(self) -> Optional[_builtins.str]:
|
|
790
|
+
"""
|
|
791
|
+
The Kerberos server's authoritative authentication domain
|
|
792
|
+
"""
|
|
793
|
+
return pulumi.get(self, "realm")
|
|
794
|
+
|
|
795
|
+
@_builtins.property
|
|
796
|
+
@pulumi.getter(name="removeInstanceName")
|
|
797
|
+
def remove_instance_name(self) -> Optional[_builtins.bool]:
|
|
798
|
+
"""
|
|
799
|
+
Strip the host from the username found in the keytab.
|
|
800
|
+
"""
|
|
801
|
+
return pulumi.get(self, "remove_instance_name")
|
|
802
|
+
|
|
803
|
+
@_builtins.property
|
|
804
|
+
@pulumi.getter
|
|
805
|
+
def service(self) -> Optional[_builtins.str]:
|
|
806
|
+
"""
|
|
807
|
+
The service principle name.
|
|
808
|
+
"""
|
|
809
|
+
return pulumi.get(self, "service")
|
|
810
|
+
|
|
811
|
+
@_builtins.property
|
|
812
|
+
@pulumi.getter
|
|
813
|
+
def token(self) -> Optional[_builtins.str]:
|
|
814
|
+
"""
|
|
815
|
+
Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
|
|
816
|
+
"""
|
|
817
|
+
return pulumi.get(self, "token")
|
|
818
|
+
|
|
819
|
+
@_builtins.property
|
|
820
|
+
@pulumi.getter(name="useRootNamespace")
|
|
821
|
+
def use_root_namespace(self) -> Optional[_builtins.bool]:
|
|
822
|
+
"""
|
|
823
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
824
|
+
"""
|
|
825
|
+
return pulumi.get(self, "use_root_namespace")
|
|
826
|
+
|
|
827
|
+
@_builtins.property
|
|
828
|
+
@pulumi.getter
|
|
829
|
+
def username(self) -> Optional[_builtins.str]:
|
|
830
|
+
"""
|
|
831
|
+
The username to login into Kerberos with.
|
|
832
|
+
"""
|
|
833
|
+
return pulumi.get(self, "username")
|
|
834
|
+
|
|
835
|
+
|
|
836
|
+
@pulumi.output_type
|
|
837
|
+
class AuthLoginOci(dict):
|
|
838
|
+
def __init__(__self__, *,
|
|
839
|
+
auth_type: _builtins.str,
|
|
840
|
+
role: _builtins.str,
|
|
841
|
+
mount: Optional[_builtins.str] = None,
|
|
842
|
+
namespace: Optional[_builtins.str] = None,
|
|
843
|
+
use_root_namespace: Optional[_builtins.bool] = None):
|
|
844
|
+
"""
|
|
845
|
+
:param _builtins.str auth_type: Authentication type to use when getting OCI credentials.
|
|
846
|
+
:param _builtins.str role: Name of the login role.
|
|
847
|
+
:param _builtins.str mount: The path where the authentication engine is mounted.
|
|
848
|
+
:param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
849
|
+
:param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
850
|
+
"""
|
|
851
|
+
pulumi.set(__self__, "auth_type", auth_type)
|
|
852
|
+
pulumi.set(__self__, "role", role)
|
|
853
|
+
if mount is not None:
|
|
854
|
+
pulumi.set(__self__, "mount", mount)
|
|
855
|
+
if namespace is not None:
|
|
856
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
857
|
+
if use_root_namespace is not None:
|
|
858
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
859
|
+
|
|
860
|
+
@_builtins.property
|
|
861
|
+
@pulumi.getter(name="authType")
|
|
862
|
+
def auth_type(self) -> _builtins.str:
|
|
863
|
+
"""
|
|
864
|
+
Authentication type to use when getting OCI credentials.
|
|
865
|
+
"""
|
|
866
|
+
return pulumi.get(self, "auth_type")
|
|
867
|
+
|
|
868
|
+
@_builtins.property
|
|
869
|
+
@pulumi.getter
|
|
870
|
+
def role(self) -> _builtins.str:
|
|
871
|
+
"""
|
|
872
|
+
Name of the login role.
|
|
873
|
+
"""
|
|
874
|
+
return pulumi.get(self, "role")
|
|
875
|
+
|
|
876
|
+
@_builtins.property
|
|
877
|
+
@pulumi.getter
|
|
878
|
+
def mount(self) -> Optional[_builtins.str]:
|
|
879
|
+
"""
|
|
880
|
+
The path where the authentication engine is mounted.
|
|
881
|
+
"""
|
|
882
|
+
return pulumi.get(self, "mount")
|
|
883
|
+
|
|
884
|
+
@_builtins.property
|
|
885
|
+
@pulumi.getter
|
|
886
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
887
|
+
"""
|
|
888
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
889
|
+
"""
|
|
890
|
+
return pulumi.get(self, "namespace")
|
|
891
|
+
|
|
892
|
+
@_builtins.property
|
|
893
|
+
@pulumi.getter(name="useRootNamespace")
|
|
894
|
+
def use_root_namespace(self) -> Optional[_builtins.bool]:
|
|
895
|
+
"""
|
|
896
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
897
|
+
"""
|
|
898
|
+
return pulumi.get(self, "use_root_namespace")
|
|
899
|
+
|
|
900
|
+
|
|
901
|
+
@pulumi.output_type
|
|
902
|
+
class AuthLoginOidc(dict):
|
|
903
|
+
def __init__(__self__, *,
|
|
904
|
+
role: _builtins.str,
|
|
905
|
+
callback_address: Optional[_builtins.str] = None,
|
|
906
|
+
callback_listener_address: Optional[_builtins.str] = None,
|
|
907
|
+
mount: Optional[_builtins.str] = None,
|
|
908
|
+
namespace: Optional[_builtins.str] = None,
|
|
909
|
+
use_root_namespace: Optional[_builtins.bool] = None):
|
|
910
|
+
"""
|
|
911
|
+
:param _builtins.str role: Name of the login role.
|
|
912
|
+
:param _builtins.str callback_address: The callback address. Must be a valid URI without the path.
|
|
913
|
+
:param _builtins.str callback_listener_address: The callback listener's address. Must be a valid URI without the path.
|
|
914
|
+
:param _builtins.str mount: The path where the authentication engine is mounted.
|
|
915
|
+
:param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
916
|
+
:param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
917
|
+
"""
|
|
918
|
+
pulumi.set(__self__, "role", role)
|
|
919
|
+
if callback_address is not None:
|
|
920
|
+
pulumi.set(__self__, "callback_address", callback_address)
|
|
921
|
+
if callback_listener_address is not None:
|
|
922
|
+
pulumi.set(__self__, "callback_listener_address", callback_listener_address)
|
|
923
|
+
if mount is not None:
|
|
924
|
+
pulumi.set(__self__, "mount", mount)
|
|
925
|
+
if namespace is not None:
|
|
926
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
927
|
+
if use_root_namespace is not None:
|
|
928
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
929
|
+
|
|
930
|
+
@_builtins.property
|
|
931
|
+
@pulumi.getter
|
|
932
|
+
def role(self) -> _builtins.str:
|
|
933
|
+
"""
|
|
934
|
+
Name of the login role.
|
|
935
|
+
"""
|
|
936
|
+
return pulumi.get(self, "role")
|
|
937
|
+
|
|
938
|
+
@_builtins.property
|
|
939
|
+
@pulumi.getter(name="callbackAddress")
|
|
940
|
+
def callback_address(self) -> Optional[_builtins.str]:
|
|
941
|
+
"""
|
|
942
|
+
The callback address. Must be a valid URI without the path.
|
|
943
|
+
"""
|
|
944
|
+
return pulumi.get(self, "callback_address")
|
|
945
|
+
|
|
946
|
+
@_builtins.property
|
|
947
|
+
@pulumi.getter(name="callbackListenerAddress")
|
|
948
|
+
def callback_listener_address(self) -> Optional[_builtins.str]:
|
|
949
|
+
"""
|
|
950
|
+
The callback listener's address. Must be a valid URI without the path.
|
|
951
|
+
"""
|
|
952
|
+
return pulumi.get(self, "callback_listener_address")
|
|
953
|
+
|
|
954
|
+
@_builtins.property
|
|
955
|
+
@pulumi.getter
|
|
956
|
+
def mount(self) -> Optional[_builtins.str]:
|
|
957
|
+
"""
|
|
958
|
+
The path where the authentication engine is mounted.
|
|
959
|
+
"""
|
|
960
|
+
return pulumi.get(self, "mount")
|
|
961
|
+
|
|
962
|
+
@_builtins.property
|
|
963
|
+
@pulumi.getter
|
|
964
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
965
|
+
"""
|
|
966
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
967
|
+
"""
|
|
968
|
+
return pulumi.get(self, "namespace")
|
|
969
|
+
|
|
970
|
+
@_builtins.property
|
|
971
|
+
@pulumi.getter(name="useRootNamespace")
|
|
972
|
+
def use_root_namespace(self) -> Optional[_builtins.bool]:
|
|
973
|
+
"""
|
|
974
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
975
|
+
"""
|
|
976
|
+
return pulumi.get(self, "use_root_namespace")
|
|
977
|
+
|
|
978
|
+
|
|
979
|
+
@pulumi.output_type
|
|
980
|
+
class AuthLoginRadius(dict):
|
|
981
|
+
def __init__(__self__, *,
|
|
982
|
+
mount: Optional[_builtins.str] = None,
|
|
983
|
+
namespace: Optional[_builtins.str] = None,
|
|
984
|
+
password: Optional[_builtins.str] = None,
|
|
985
|
+
use_root_namespace: Optional[_builtins.bool] = None,
|
|
986
|
+
username: Optional[_builtins.str] = None):
|
|
987
|
+
"""
|
|
988
|
+
:param _builtins.str mount: The path where the authentication engine is mounted.
|
|
989
|
+
:param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
990
|
+
:param _builtins.str password: The Radius password for username.
|
|
991
|
+
:param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
992
|
+
:param _builtins.str username: The Radius username.
|
|
993
|
+
"""
|
|
994
|
+
if mount is not None:
|
|
995
|
+
pulumi.set(__self__, "mount", mount)
|
|
996
|
+
if namespace is not None:
|
|
997
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
998
|
+
if password is not None:
|
|
999
|
+
pulumi.set(__self__, "password", password)
|
|
1000
|
+
if use_root_namespace is not None:
|
|
1001
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
1002
|
+
if username is not None:
|
|
1003
|
+
pulumi.set(__self__, "username", username)
|
|
1004
|
+
|
|
1005
|
+
@_builtins.property
|
|
1006
|
+
@pulumi.getter
|
|
1007
|
+
def mount(self) -> Optional[_builtins.str]:
|
|
1008
|
+
"""
|
|
1009
|
+
The path where the authentication engine is mounted.
|
|
1010
|
+
"""
|
|
1011
|
+
return pulumi.get(self, "mount")
|
|
1012
|
+
|
|
1013
|
+
@_builtins.property
|
|
1014
|
+
@pulumi.getter
|
|
1015
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
1016
|
+
"""
|
|
1017
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1018
|
+
"""
|
|
1019
|
+
return pulumi.get(self, "namespace")
|
|
1020
|
+
|
|
1021
|
+
@_builtins.property
|
|
1022
|
+
@pulumi.getter
|
|
1023
|
+
def password(self) -> Optional[_builtins.str]:
|
|
1024
|
+
"""
|
|
1025
|
+
The Radius password for username.
|
|
1026
|
+
"""
|
|
1027
|
+
return pulumi.get(self, "password")
|
|
1028
|
+
|
|
1029
|
+
@_builtins.property
|
|
1030
|
+
@pulumi.getter(name="useRootNamespace")
|
|
1031
|
+
def use_root_namespace(self) -> Optional[_builtins.bool]:
|
|
1032
|
+
"""
|
|
1033
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1034
|
+
"""
|
|
1035
|
+
return pulumi.get(self, "use_root_namespace")
|
|
1036
|
+
|
|
1037
|
+
@_builtins.property
|
|
1038
|
+
@pulumi.getter
|
|
1039
|
+
def username(self) -> Optional[_builtins.str]:
|
|
1040
|
+
"""
|
|
1041
|
+
The Radius username.
|
|
1042
|
+
"""
|
|
1043
|
+
return pulumi.get(self, "username")
|
|
1044
|
+
|
|
1045
|
+
|
|
1046
|
+
@pulumi.output_type
|
|
1047
|
+
class AuthLoginTokenFile(dict):
|
|
1048
|
+
def __init__(__self__, *,
|
|
1049
|
+
filename: Optional[_builtins.str] = None,
|
|
1050
|
+
namespace: Optional[_builtins.str] = None,
|
|
1051
|
+
use_root_namespace: Optional[_builtins.bool] = None):
|
|
1052
|
+
"""
|
|
1053
|
+
:param _builtins.str filename: The name of a file containing a single line that is a valid Vault token
|
|
1054
|
+
:param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1055
|
+
:param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1056
|
+
"""
|
|
1057
|
+
if filename is not None:
|
|
1058
|
+
pulumi.set(__self__, "filename", filename)
|
|
1059
|
+
if namespace is not None:
|
|
1060
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
1061
|
+
if use_root_namespace is not None:
|
|
1062
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
1063
|
+
|
|
1064
|
+
@_builtins.property
|
|
1065
|
+
@pulumi.getter
|
|
1066
|
+
def filename(self) -> Optional[_builtins.str]:
|
|
1067
|
+
"""
|
|
1068
|
+
The name of a file containing a single line that is a valid Vault token
|
|
1069
|
+
"""
|
|
1070
|
+
return pulumi.get(self, "filename")
|
|
1071
|
+
|
|
1072
|
+
@_builtins.property
|
|
1073
|
+
@pulumi.getter
|
|
1074
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
1075
|
+
"""
|
|
1076
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1077
|
+
"""
|
|
1078
|
+
return pulumi.get(self, "namespace")
|
|
1079
|
+
|
|
1080
|
+
@_builtins.property
|
|
1081
|
+
@pulumi.getter(name="useRootNamespace")
|
|
1082
|
+
def use_root_namespace(self) -> Optional[_builtins.bool]:
|
|
1083
|
+
"""
|
|
1084
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1085
|
+
"""
|
|
1086
|
+
return pulumi.get(self, "use_root_namespace")
|
|
1087
|
+
|
|
1088
|
+
|
|
1089
|
+
@pulumi.output_type
|
|
1090
|
+
class AuthLoginUserpass(dict):
|
|
1091
|
+
def __init__(__self__, *,
|
|
1092
|
+
mount: Optional[_builtins.str] = None,
|
|
1093
|
+
namespace: Optional[_builtins.str] = None,
|
|
1094
|
+
password: Optional[_builtins.str] = None,
|
|
1095
|
+
password_file: Optional[_builtins.str] = None,
|
|
1096
|
+
use_root_namespace: Optional[_builtins.bool] = None,
|
|
1097
|
+
username: Optional[_builtins.str] = None):
|
|
1098
|
+
"""
|
|
1099
|
+
:param _builtins.str mount: The path where the authentication engine is mounted.
|
|
1100
|
+
:param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1101
|
+
:param _builtins.str password: Login with password
|
|
1102
|
+
:param _builtins.str password_file: Login with password from a file
|
|
1103
|
+
:param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1104
|
+
:param _builtins.str username: Login with username
|
|
1105
|
+
"""
|
|
1106
|
+
if mount is not None:
|
|
1107
|
+
pulumi.set(__self__, "mount", mount)
|
|
1108
|
+
if namespace is not None:
|
|
1109
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
1110
|
+
if password is not None:
|
|
1111
|
+
pulumi.set(__self__, "password", password)
|
|
1112
|
+
if password_file is not None:
|
|
1113
|
+
pulumi.set(__self__, "password_file", password_file)
|
|
1114
|
+
if use_root_namespace is not None:
|
|
1115
|
+
pulumi.set(__self__, "use_root_namespace", use_root_namespace)
|
|
1116
|
+
if username is not None:
|
|
1117
|
+
pulumi.set(__self__, "username", username)
|
|
1118
|
+
|
|
1119
|
+
@_builtins.property
|
|
1120
|
+
@pulumi.getter
|
|
1121
|
+
def mount(self) -> Optional[_builtins.str]:
|
|
1122
|
+
"""
|
|
1123
|
+
The path where the authentication engine is mounted.
|
|
1124
|
+
"""
|
|
1125
|
+
return pulumi.get(self, "mount")
|
|
1126
|
+
|
|
1127
|
+
@_builtins.property
|
|
1128
|
+
@pulumi.getter
|
|
1129
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
1130
|
+
"""
|
|
1131
|
+
The authentication engine's namespace. Conflicts with use_root_namespace
|
|
1132
|
+
"""
|
|
1133
|
+
return pulumi.get(self, "namespace")
|
|
1134
|
+
|
|
1135
|
+
@_builtins.property
|
|
1136
|
+
@pulumi.getter
|
|
1137
|
+
def password(self) -> Optional[_builtins.str]:
|
|
1138
|
+
"""
|
|
1139
|
+
Login with password
|
|
1140
|
+
"""
|
|
1141
|
+
return pulumi.get(self, "password")
|
|
1142
|
+
|
|
1143
|
+
@_builtins.property
|
|
1144
|
+
@pulumi.getter(name="passwordFile")
|
|
1145
|
+
def password_file(self) -> Optional[_builtins.str]:
|
|
1146
|
+
"""
|
|
1147
|
+
Login with password from a file
|
|
1148
|
+
"""
|
|
1149
|
+
return pulumi.get(self, "password_file")
|
|
1150
|
+
|
|
1151
|
+
@_builtins.property
|
|
1152
|
+
@pulumi.getter(name="useRootNamespace")
|
|
1153
|
+
def use_root_namespace(self) -> Optional[_builtins.bool]:
|
|
1154
|
+
"""
|
|
1155
|
+
Authenticate to the root Vault namespace. Conflicts with namespace
|
|
1156
|
+
"""
|
|
1157
|
+
return pulumi.get(self, "use_root_namespace")
|
|
1158
|
+
|
|
1159
|
+
@_builtins.property
|
|
1160
|
+
@pulumi.getter
|
|
1161
|
+
def username(self) -> Optional[_builtins.str]:
|
|
1162
|
+
"""
|
|
1163
|
+
Login with username
|
|
1164
|
+
"""
|
|
1165
|
+
return pulumi.get(self, "username")
|
|
1166
|
+
|
|
1167
|
+
|
|
1168
|
+
@pulumi.output_type
|
|
1169
|
+
class ClientAuth(dict):
|
|
1170
|
+
def __init__(__self__, *,
|
|
1171
|
+
cert_file: _builtins.str,
|
|
1172
|
+
key_file: _builtins.str):
|
|
1173
|
+
"""
|
|
1174
|
+
:param _builtins.str cert_file: Path to a file containing the client certificate.
|
|
1175
|
+
:param _builtins.str key_file: Path to a file containing the private key that the certificate was issued for.
|
|
1176
|
+
"""
|
|
1177
|
+
pulumi.set(__self__, "cert_file", cert_file)
|
|
1178
|
+
pulumi.set(__self__, "key_file", key_file)
|
|
1179
|
+
|
|
1180
|
+
@_builtins.property
|
|
1181
|
+
@pulumi.getter(name="certFile")
|
|
1182
|
+
def cert_file(self) -> _builtins.str:
|
|
1183
|
+
"""
|
|
1184
|
+
Path to a file containing the client certificate.
|
|
1185
|
+
"""
|
|
1186
|
+
return pulumi.get(self, "cert_file")
|
|
1187
|
+
|
|
1188
|
+
@_builtins.property
|
|
1189
|
+
@pulumi.getter(name="keyFile")
|
|
1190
|
+
def key_file(self) -> _builtins.str:
|
|
1191
|
+
"""
|
|
1192
|
+
Path to a file containing the private key that the certificate was issued for.
|
|
1193
|
+
"""
|
|
1194
|
+
return pulumi.get(self, "key_file")
|
|
1195
|
+
|
|
1196
|
+
|
|
1197
|
+
@pulumi.output_type
|
|
1198
|
+
class Headers(dict):
|
|
1199
|
+
def __init__(__self__, *,
|
|
1200
|
+
name: _builtins.str,
|
|
1201
|
+
value: _builtins.str):
|
|
1202
|
+
"""
|
|
1203
|
+
:param _builtins.str name: The header name
|
|
1204
|
+
:param _builtins.str value: The header value
|
|
1205
|
+
"""
|
|
1206
|
+
pulumi.set(__self__, "name", name)
|
|
1207
|
+
pulumi.set(__self__, "value", value)
|
|
1208
|
+
|
|
1209
|
+
@_builtins.property
|
|
1210
|
+
@pulumi.getter
|
|
1211
|
+
def name(self) -> _builtins.str:
|
|
1212
|
+
"""
|
|
1213
|
+
The header name
|
|
1214
|
+
"""
|
|
1215
|
+
return pulumi.get(self, "name")
|
|
1216
|
+
|
|
1217
|
+
@_builtins.property
|
|
1218
|
+
@pulumi.getter
|
|
1219
|
+
def value(self) -> _builtins.str:
|
|
1220
|
+
"""
|
|
1221
|
+
The header value
|
|
1222
|
+
"""
|
|
1223
|
+
return pulumi.get(self, "value")
|
|
1224
|
+
|
|
1225
|
+
|