pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1225 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'UiCustomMessageLink',
19
+ 'AuthLogin',
20
+ 'AuthLoginAws',
21
+ 'AuthLoginAzure',
22
+ 'AuthLoginCert',
23
+ 'AuthLoginGcp',
24
+ 'AuthLoginJwt',
25
+ 'AuthLoginKerberos',
26
+ 'AuthLoginOci',
27
+ 'AuthLoginOidc',
28
+ 'AuthLoginRadius',
29
+ 'AuthLoginTokenFile',
30
+ 'AuthLoginUserpass',
31
+ 'ClientAuth',
32
+ 'Headers',
33
+ ]
34
+
35
+ @pulumi.output_type
36
+ class UiCustomMessageLink(dict):
37
+ def __init__(__self__, *,
38
+ href: _builtins.str,
39
+ title: _builtins.str):
40
+ """
41
+ :param _builtins.str href: The URL of the hyperlink
42
+ :param _builtins.str title: The title of the hyperlink
43
+ """
44
+ pulumi.set(__self__, "href", href)
45
+ pulumi.set(__self__, "title", title)
46
+
47
+ @_builtins.property
48
+ @pulumi.getter
49
+ def href(self) -> _builtins.str:
50
+ """
51
+ The URL of the hyperlink
52
+ """
53
+ return pulumi.get(self, "href")
54
+
55
+ @_builtins.property
56
+ @pulumi.getter
57
+ def title(self) -> _builtins.str:
58
+ """
59
+ The title of the hyperlink
60
+ """
61
+ return pulumi.get(self, "title")
62
+
63
+
64
+ @pulumi.output_type
65
+ class AuthLogin(dict):
66
+ def __init__(__self__, *,
67
+ path: _builtins.str,
68
+ method: Optional[_builtins.str] = None,
69
+ namespace: Optional[_builtins.str] = None,
70
+ parameters: Optional[Mapping[str, _builtins.str]] = None,
71
+ use_root_namespace: Optional[_builtins.bool] = None):
72
+ """
73
+ :param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
74
+ :param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
75
+ """
76
+ pulumi.set(__self__, "path", path)
77
+ if method is not None:
78
+ pulumi.set(__self__, "method", method)
79
+ if namespace is not None:
80
+ pulumi.set(__self__, "namespace", namespace)
81
+ if parameters is not None:
82
+ pulumi.set(__self__, "parameters", parameters)
83
+ if use_root_namespace is not None:
84
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
85
+
86
+ @_builtins.property
87
+ @pulumi.getter
88
+ def path(self) -> _builtins.str:
89
+ return pulumi.get(self, "path")
90
+
91
+ @_builtins.property
92
+ @pulumi.getter
93
+ def method(self) -> Optional[_builtins.str]:
94
+ return pulumi.get(self, "method")
95
+
96
+ @_builtins.property
97
+ @pulumi.getter
98
+ def namespace(self) -> Optional[_builtins.str]:
99
+ """
100
+ The authentication engine's namespace. Conflicts with use_root_namespace
101
+ """
102
+ return pulumi.get(self, "namespace")
103
+
104
+ @_builtins.property
105
+ @pulumi.getter
106
+ def parameters(self) -> Optional[Mapping[str, _builtins.str]]:
107
+ return pulumi.get(self, "parameters")
108
+
109
+ @_builtins.property
110
+ @pulumi.getter(name="useRootNamespace")
111
+ def use_root_namespace(self) -> Optional[_builtins.bool]:
112
+ """
113
+ Authenticate to the root Vault namespace. Conflicts with namespace
114
+ """
115
+ return pulumi.get(self, "use_root_namespace")
116
+
117
+
118
+ @pulumi.output_type
119
+ class AuthLoginAws(dict):
120
+ def __init__(__self__, *,
121
+ role: _builtins.str,
122
+ aws_access_key_id: Optional[_builtins.str] = None,
123
+ aws_iam_endpoint: Optional[_builtins.str] = None,
124
+ aws_profile: Optional[_builtins.str] = None,
125
+ aws_region: Optional[_builtins.str] = None,
126
+ aws_role_arn: Optional[_builtins.str] = None,
127
+ aws_role_session_name: Optional[_builtins.str] = None,
128
+ aws_secret_access_key: Optional[_builtins.str] = None,
129
+ aws_session_token: Optional[_builtins.str] = None,
130
+ aws_shared_credentials_file: Optional[_builtins.str] = None,
131
+ aws_sts_endpoint: Optional[_builtins.str] = None,
132
+ aws_web_identity_token_file: Optional[_builtins.str] = None,
133
+ header_value: Optional[_builtins.str] = None,
134
+ mount: Optional[_builtins.str] = None,
135
+ namespace: Optional[_builtins.str] = None,
136
+ use_root_namespace: Optional[_builtins.bool] = None):
137
+ """
138
+ :param _builtins.str role: The Vault role to use when logging into Vault.
139
+ :param _builtins.str aws_access_key_id: The AWS access key ID.
140
+ :param _builtins.str aws_iam_endpoint: The IAM endpoint URL.
141
+ :param _builtins.str aws_profile: The name of the AWS profile.
142
+ :param _builtins.str aws_region: The AWS region.
143
+ :param _builtins.str aws_role_arn: The ARN of the AWS Role to assume.Used during STS AssumeRole
144
+ :param _builtins.str aws_role_session_name: Specifies the name to attach to the AWS role session. Used during STS AssumeRole
145
+ :param _builtins.str aws_secret_access_key: The AWS secret access key.
146
+ :param _builtins.str aws_session_token: The AWS session token.
147
+ :param _builtins.str aws_shared_credentials_file: Path to the AWS shared credentials file.
148
+ :param _builtins.str aws_sts_endpoint: The STS endpoint URL.
149
+ :param _builtins.str aws_web_identity_token_file: Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
150
+ :param _builtins.str header_value: The Vault header value to include in the STS signing request.
151
+ :param _builtins.str mount: The path where the authentication engine is mounted.
152
+ :param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
153
+ :param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
154
+ """
155
+ pulumi.set(__self__, "role", role)
156
+ if aws_access_key_id is not None:
157
+ pulumi.set(__self__, "aws_access_key_id", aws_access_key_id)
158
+ if aws_iam_endpoint is not None:
159
+ pulumi.set(__self__, "aws_iam_endpoint", aws_iam_endpoint)
160
+ if aws_profile is not None:
161
+ pulumi.set(__self__, "aws_profile", aws_profile)
162
+ if aws_region is not None:
163
+ pulumi.set(__self__, "aws_region", aws_region)
164
+ if aws_role_arn is not None:
165
+ pulumi.set(__self__, "aws_role_arn", aws_role_arn)
166
+ if aws_role_session_name is not None:
167
+ pulumi.set(__self__, "aws_role_session_name", aws_role_session_name)
168
+ if aws_secret_access_key is not None:
169
+ pulumi.set(__self__, "aws_secret_access_key", aws_secret_access_key)
170
+ if aws_session_token is not None:
171
+ pulumi.set(__self__, "aws_session_token", aws_session_token)
172
+ if aws_shared_credentials_file is not None:
173
+ pulumi.set(__self__, "aws_shared_credentials_file", aws_shared_credentials_file)
174
+ if aws_sts_endpoint is not None:
175
+ pulumi.set(__self__, "aws_sts_endpoint", aws_sts_endpoint)
176
+ if aws_web_identity_token_file is not None:
177
+ pulumi.set(__self__, "aws_web_identity_token_file", aws_web_identity_token_file)
178
+ if header_value is not None:
179
+ pulumi.set(__self__, "header_value", header_value)
180
+ if mount is not None:
181
+ pulumi.set(__self__, "mount", mount)
182
+ if namespace is not None:
183
+ pulumi.set(__self__, "namespace", namespace)
184
+ if use_root_namespace is not None:
185
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
186
+
187
+ @_builtins.property
188
+ @pulumi.getter
189
+ def role(self) -> _builtins.str:
190
+ """
191
+ The Vault role to use when logging into Vault.
192
+ """
193
+ return pulumi.get(self, "role")
194
+
195
+ @_builtins.property
196
+ @pulumi.getter(name="awsAccessKeyId")
197
+ def aws_access_key_id(self) -> Optional[_builtins.str]:
198
+ """
199
+ The AWS access key ID.
200
+ """
201
+ return pulumi.get(self, "aws_access_key_id")
202
+
203
+ @_builtins.property
204
+ @pulumi.getter(name="awsIamEndpoint")
205
+ def aws_iam_endpoint(self) -> Optional[_builtins.str]:
206
+ """
207
+ The IAM endpoint URL.
208
+ """
209
+ return pulumi.get(self, "aws_iam_endpoint")
210
+
211
+ @_builtins.property
212
+ @pulumi.getter(name="awsProfile")
213
+ def aws_profile(self) -> Optional[_builtins.str]:
214
+ """
215
+ The name of the AWS profile.
216
+ """
217
+ return pulumi.get(self, "aws_profile")
218
+
219
+ @_builtins.property
220
+ @pulumi.getter(name="awsRegion")
221
+ def aws_region(self) -> Optional[_builtins.str]:
222
+ """
223
+ The AWS region.
224
+ """
225
+ return pulumi.get(self, "aws_region")
226
+
227
+ @_builtins.property
228
+ @pulumi.getter(name="awsRoleArn")
229
+ def aws_role_arn(self) -> Optional[_builtins.str]:
230
+ """
231
+ The ARN of the AWS Role to assume.Used during STS AssumeRole
232
+ """
233
+ return pulumi.get(self, "aws_role_arn")
234
+
235
+ @_builtins.property
236
+ @pulumi.getter(name="awsRoleSessionName")
237
+ def aws_role_session_name(self) -> Optional[_builtins.str]:
238
+ """
239
+ Specifies the name to attach to the AWS role session. Used during STS AssumeRole
240
+ """
241
+ return pulumi.get(self, "aws_role_session_name")
242
+
243
+ @_builtins.property
244
+ @pulumi.getter(name="awsSecretAccessKey")
245
+ def aws_secret_access_key(self) -> Optional[_builtins.str]:
246
+ """
247
+ The AWS secret access key.
248
+ """
249
+ return pulumi.get(self, "aws_secret_access_key")
250
+
251
+ @_builtins.property
252
+ @pulumi.getter(name="awsSessionToken")
253
+ def aws_session_token(self) -> Optional[_builtins.str]:
254
+ """
255
+ The AWS session token.
256
+ """
257
+ return pulumi.get(self, "aws_session_token")
258
+
259
+ @_builtins.property
260
+ @pulumi.getter(name="awsSharedCredentialsFile")
261
+ def aws_shared_credentials_file(self) -> Optional[_builtins.str]:
262
+ """
263
+ Path to the AWS shared credentials file.
264
+ """
265
+ return pulumi.get(self, "aws_shared_credentials_file")
266
+
267
+ @_builtins.property
268
+ @pulumi.getter(name="awsStsEndpoint")
269
+ def aws_sts_endpoint(self) -> Optional[_builtins.str]:
270
+ """
271
+ The STS endpoint URL.
272
+ """
273
+ return pulumi.get(self, "aws_sts_endpoint")
274
+
275
+ @_builtins.property
276
+ @pulumi.getter(name="awsWebIdentityTokenFile")
277
+ def aws_web_identity_token_file(self) -> Optional[_builtins.str]:
278
+ """
279
+ Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
280
+ """
281
+ return pulumi.get(self, "aws_web_identity_token_file")
282
+
283
+ @_builtins.property
284
+ @pulumi.getter(name="headerValue")
285
+ def header_value(self) -> Optional[_builtins.str]:
286
+ """
287
+ The Vault header value to include in the STS signing request.
288
+ """
289
+ return pulumi.get(self, "header_value")
290
+
291
+ @_builtins.property
292
+ @pulumi.getter
293
+ def mount(self) -> Optional[_builtins.str]:
294
+ """
295
+ The path where the authentication engine is mounted.
296
+ """
297
+ return pulumi.get(self, "mount")
298
+
299
+ @_builtins.property
300
+ @pulumi.getter
301
+ def namespace(self) -> Optional[_builtins.str]:
302
+ """
303
+ The authentication engine's namespace. Conflicts with use_root_namespace
304
+ """
305
+ return pulumi.get(self, "namespace")
306
+
307
+ @_builtins.property
308
+ @pulumi.getter(name="useRootNamespace")
309
+ def use_root_namespace(self) -> Optional[_builtins.bool]:
310
+ """
311
+ Authenticate to the root Vault namespace. Conflicts with namespace
312
+ """
313
+ return pulumi.get(self, "use_root_namespace")
314
+
315
+
316
+ @pulumi.output_type
317
+ class AuthLoginAzure(dict):
318
+ def __init__(__self__, *,
319
+ resource_group_name: _builtins.str,
320
+ role: _builtins.str,
321
+ subscription_id: _builtins.str,
322
+ client_id: Optional[_builtins.str] = None,
323
+ jwt: Optional[_builtins.str] = None,
324
+ mount: Optional[_builtins.str] = None,
325
+ namespace: Optional[_builtins.str] = None,
326
+ scope: Optional[_builtins.str] = None,
327
+ tenant_id: Optional[_builtins.str] = None,
328
+ use_root_namespace: Optional[_builtins.bool] = None,
329
+ vm_name: Optional[_builtins.str] = None,
330
+ vmss_name: Optional[_builtins.str] = None):
331
+ """
332
+ :param _builtins.str resource_group_name: The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
333
+ :param _builtins.str role: Name of the login role.
334
+ :param _builtins.str subscription_id: The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
335
+ :param _builtins.str client_id: The identity's client ID.
336
+ :param _builtins.str jwt: A signed JSON Web Token. If not specified on will be created automatically
337
+ :param _builtins.str mount: The path where the authentication engine is mounted.
338
+ :param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
339
+ :param _builtins.str scope: The scopes to include in the token request.
340
+ :param _builtins.str tenant_id: Provides the tenant ID to use in a multi-tenant authentication scenario.
341
+ :param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
342
+ :param _builtins.str vm_name: The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
343
+ :param _builtins.str vmss_name: The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
344
+ """
345
+ pulumi.set(__self__, "resource_group_name", resource_group_name)
346
+ pulumi.set(__self__, "role", role)
347
+ pulumi.set(__self__, "subscription_id", subscription_id)
348
+ if client_id is not None:
349
+ pulumi.set(__self__, "client_id", client_id)
350
+ if jwt is not None:
351
+ pulumi.set(__self__, "jwt", jwt)
352
+ if mount is not None:
353
+ pulumi.set(__self__, "mount", mount)
354
+ if namespace is not None:
355
+ pulumi.set(__self__, "namespace", namespace)
356
+ if scope is not None:
357
+ pulumi.set(__self__, "scope", scope)
358
+ if tenant_id is not None:
359
+ pulumi.set(__self__, "tenant_id", tenant_id)
360
+ if use_root_namespace is not None:
361
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
362
+ if vm_name is not None:
363
+ pulumi.set(__self__, "vm_name", vm_name)
364
+ if vmss_name is not None:
365
+ pulumi.set(__self__, "vmss_name", vmss_name)
366
+
367
+ @_builtins.property
368
+ @pulumi.getter(name="resourceGroupName")
369
+ def resource_group_name(self) -> _builtins.str:
370
+ """
371
+ The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
372
+ """
373
+ return pulumi.get(self, "resource_group_name")
374
+
375
+ @_builtins.property
376
+ @pulumi.getter
377
+ def role(self) -> _builtins.str:
378
+ """
379
+ Name of the login role.
380
+ """
381
+ return pulumi.get(self, "role")
382
+
383
+ @_builtins.property
384
+ @pulumi.getter(name="subscriptionId")
385
+ def subscription_id(self) -> _builtins.str:
386
+ """
387
+ The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
388
+ """
389
+ return pulumi.get(self, "subscription_id")
390
+
391
+ @_builtins.property
392
+ @pulumi.getter(name="clientId")
393
+ def client_id(self) -> Optional[_builtins.str]:
394
+ """
395
+ The identity's client ID.
396
+ """
397
+ return pulumi.get(self, "client_id")
398
+
399
+ @_builtins.property
400
+ @pulumi.getter
401
+ def jwt(self) -> Optional[_builtins.str]:
402
+ """
403
+ A signed JSON Web Token. If not specified on will be created automatically
404
+ """
405
+ return pulumi.get(self, "jwt")
406
+
407
+ @_builtins.property
408
+ @pulumi.getter
409
+ def mount(self) -> Optional[_builtins.str]:
410
+ """
411
+ The path where the authentication engine is mounted.
412
+ """
413
+ return pulumi.get(self, "mount")
414
+
415
+ @_builtins.property
416
+ @pulumi.getter
417
+ def namespace(self) -> Optional[_builtins.str]:
418
+ """
419
+ The authentication engine's namespace. Conflicts with use_root_namespace
420
+ """
421
+ return pulumi.get(self, "namespace")
422
+
423
+ @_builtins.property
424
+ @pulumi.getter
425
+ def scope(self) -> Optional[_builtins.str]:
426
+ """
427
+ The scopes to include in the token request.
428
+ """
429
+ return pulumi.get(self, "scope")
430
+
431
+ @_builtins.property
432
+ @pulumi.getter(name="tenantId")
433
+ def tenant_id(self) -> Optional[_builtins.str]:
434
+ """
435
+ Provides the tenant ID to use in a multi-tenant authentication scenario.
436
+ """
437
+ return pulumi.get(self, "tenant_id")
438
+
439
+ @_builtins.property
440
+ @pulumi.getter(name="useRootNamespace")
441
+ def use_root_namespace(self) -> Optional[_builtins.bool]:
442
+ """
443
+ Authenticate to the root Vault namespace. Conflicts with namespace
444
+ """
445
+ return pulumi.get(self, "use_root_namespace")
446
+
447
+ @_builtins.property
448
+ @pulumi.getter(name="vmName")
449
+ def vm_name(self) -> Optional[_builtins.str]:
450
+ """
451
+ The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
452
+ """
453
+ return pulumi.get(self, "vm_name")
454
+
455
+ @_builtins.property
456
+ @pulumi.getter(name="vmssName")
457
+ def vmss_name(self) -> Optional[_builtins.str]:
458
+ """
459
+ The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
460
+ """
461
+ return pulumi.get(self, "vmss_name")
462
+
463
+
464
+ @pulumi.output_type
465
+ class AuthLoginCert(dict):
466
+ def __init__(__self__, *,
467
+ cert_file: _builtins.str,
468
+ key_file: _builtins.str,
469
+ mount: Optional[_builtins.str] = None,
470
+ name: Optional[_builtins.str] = None,
471
+ namespace: Optional[_builtins.str] = None,
472
+ use_root_namespace: Optional[_builtins.bool] = None):
473
+ """
474
+ :param _builtins.str cert_file: Path to a file containing the client certificate.
475
+ :param _builtins.str key_file: Path to a file containing the private key that the certificate was issued for.
476
+ :param _builtins.str mount: The path where the authentication engine is mounted.
477
+ :param _builtins.str name: Name of the certificate's role
478
+ :param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
479
+ :param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
480
+ """
481
+ pulumi.set(__self__, "cert_file", cert_file)
482
+ pulumi.set(__self__, "key_file", key_file)
483
+ if mount is not None:
484
+ pulumi.set(__self__, "mount", mount)
485
+ if name is not None:
486
+ pulumi.set(__self__, "name", name)
487
+ if namespace is not None:
488
+ pulumi.set(__self__, "namespace", namespace)
489
+ if use_root_namespace is not None:
490
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
491
+
492
+ @_builtins.property
493
+ @pulumi.getter(name="certFile")
494
+ def cert_file(self) -> _builtins.str:
495
+ """
496
+ Path to a file containing the client certificate.
497
+ """
498
+ return pulumi.get(self, "cert_file")
499
+
500
+ @_builtins.property
501
+ @pulumi.getter(name="keyFile")
502
+ def key_file(self) -> _builtins.str:
503
+ """
504
+ Path to a file containing the private key that the certificate was issued for.
505
+ """
506
+ return pulumi.get(self, "key_file")
507
+
508
+ @_builtins.property
509
+ @pulumi.getter
510
+ def mount(self) -> Optional[_builtins.str]:
511
+ """
512
+ The path where the authentication engine is mounted.
513
+ """
514
+ return pulumi.get(self, "mount")
515
+
516
+ @_builtins.property
517
+ @pulumi.getter
518
+ def name(self) -> Optional[_builtins.str]:
519
+ """
520
+ Name of the certificate's role
521
+ """
522
+ return pulumi.get(self, "name")
523
+
524
+ @_builtins.property
525
+ @pulumi.getter
526
+ def namespace(self) -> Optional[_builtins.str]:
527
+ """
528
+ The authentication engine's namespace. Conflicts with use_root_namespace
529
+ """
530
+ return pulumi.get(self, "namespace")
531
+
532
+ @_builtins.property
533
+ @pulumi.getter(name="useRootNamespace")
534
+ def use_root_namespace(self) -> Optional[_builtins.bool]:
535
+ """
536
+ Authenticate to the root Vault namespace. Conflicts with namespace
537
+ """
538
+ return pulumi.get(self, "use_root_namespace")
539
+
540
+
541
+ @pulumi.output_type
542
+ class AuthLoginGcp(dict):
543
+ def __init__(__self__, *,
544
+ role: _builtins.str,
545
+ credentials: Optional[_builtins.str] = None,
546
+ jwt: Optional[_builtins.str] = None,
547
+ mount: Optional[_builtins.str] = None,
548
+ namespace: Optional[_builtins.str] = None,
549
+ service_account: Optional[_builtins.str] = None,
550
+ use_root_namespace: Optional[_builtins.bool] = None):
551
+ """
552
+ :param _builtins.str role: Name of the login role.
553
+ :param _builtins.str credentials: Path to the Google Cloud credentials file.
554
+ :param _builtins.str jwt: A signed JSON Web Token.
555
+ :param _builtins.str mount: The path where the authentication engine is mounted.
556
+ :param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
557
+ :param _builtins.str service_account: IAM service account.
558
+ :param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
559
+ """
560
+ pulumi.set(__self__, "role", role)
561
+ if credentials is not None:
562
+ pulumi.set(__self__, "credentials", credentials)
563
+ if jwt is not None:
564
+ pulumi.set(__self__, "jwt", jwt)
565
+ if mount is not None:
566
+ pulumi.set(__self__, "mount", mount)
567
+ if namespace is not None:
568
+ pulumi.set(__self__, "namespace", namespace)
569
+ if service_account is not None:
570
+ pulumi.set(__self__, "service_account", service_account)
571
+ if use_root_namespace is not None:
572
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
573
+
574
+ @_builtins.property
575
+ @pulumi.getter
576
+ def role(self) -> _builtins.str:
577
+ """
578
+ Name of the login role.
579
+ """
580
+ return pulumi.get(self, "role")
581
+
582
+ @_builtins.property
583
+ @pulumi.getter
584
+ def credentials(self) -> Optional[_builtins.str]:
585
+ """
586
+ Path to the Google Cloud credentials file.
587
+ """
588
+ return pulumi.get(self, "credentials")
589
+
590
+ @_builtins.property
591
+ @pulumi.getter
592
+ def jwt(self) -> Optional[_builtins.str]:
593
+ """
594
+ A signed JSON Web Token.
595
+ """
596
+ return pulumi.get(self, "jwt")
597
+
598
+ @_builtins.property
599
+ @pulumi.getter
600
+ def mount(self) -> Optional[_builtins.str]:
601
+ """
602
+ The path where the authentication engine is mounted.
603
+ """
604
+ return pulumi.get(self, "mount")
605
+
606
+ @_builtins.property
607
+ @pulumi.getter
608
+ def namespace(self) -> Optional[_builtins.str]:
609
+ """
610
+ The authentication engine's namespace. Conflicts with use_root_namespace
611
+ """
612
+ return pulumi.get(self, "namespace")
613
+
614
+ @_builtins.property
615
+ @pulumi.getter(name="serviceAccount")
616
+ def service_account(self) -> Optional[_builtins.str]:
617
+ """
618
+ IAM service account.
619
+ """
620
+ return pulumi.get(self, "service_account")
621
+
622
+ @_builtins.property
623
+ @pulumi.getter(name="useRootNamespace")
624
+ def use_root_namespace(self) -> Optional[_builtins.bool]:
625
+ """
626
+ Authenticate to the root Vault namespace. Conflicts with namespace
627
+ """
628
+ return pulumi.get(self, "use_root_namespace")
629
+
630
+
631
+ @pulumi.output_type
632
+ class AuthLoginJwt(dict):
633
+ def __init__(__self__, *,
634
+ role: _builtins.str,
635
+ jwt: Optional[_builtins.str] = None,
636
+ mount: Optional[_builtins.str] = None,
637
+ namespace: Optional[_builtins.str] = None,
638
+ use_root_namespace: Optional[_builtins.bool] = None):
639
+ """
640
+ :param _builtins.str role: Name of the login role.
641
+ :param _builtins.str jwt: A signed JSON Web Token.
642
+ :param _builtins.str mount: The path where the authentication engine is mounted.
643
+ :param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
644
+ :param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
645
+ """
646
+ pulumi.set(__self__, "role", role)
647
+ if jwt is not None:
648
+ pulumi.set(__self__, "jwt", jwt)
649
+ if mount is not None:
650
+ pulumi.set(__self__, "mount", mount)
651
+ if namespace is not None:
652
+ pulumi.set(__self__, "namespace", namespace)
653
+ if use_root_namespace is not None:
654
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
655
+
656
+ @_builtins.property
657
+ @pulumi.getter
658
+ def role(self) -> _builtins.str:
659
+ """
660
+ Name of the login role.
661
+ """
662
+ return pulumi.get(self, "role")
663
+
664
+ @_builtins.property
665
+ @pulumi.getter
666
+ def jwt(self) -> Optional[_builtins.str]:
667
+ """
668
+ A signed JSON Web Token.
669
+ """
670
+ return pulumi.get(self, "jwt")
671
+
672
+ @_builtins.property
673
+ @pulumi.getter
674
+ def mount(self) -> Optional[_builtins.str]:
675
+ """
676
+ The path where the authentication engine is mounted.
677
+ """
678
+ return pulumi.get(self, "mount")
679
+
680
+ @_builtins.property
681
+ @pulumi.getter
682
+ def namespace(self) -> Optional[_builtins.str]:
683
+ """
684
+ The authentication engine's namespace. Conflicts with use_root_namespace
685
+ """
686
+ return pulumi.get(self, "namespace")
687
+
688
+ @_builtins.property
689
+ @pulumi.getter(name="useRootNamespace")
690
+ def use_root_namespace(self) -> Optional[_builtins.bool]:
691
+ """
692
+ Authenticate to the root Vault namespace. Conflicts with namespace
693
+ """
694
+ return pulumi.get(self, "use_root_namespace")
695
+
696
+
697
+ @pulumi.output_type
698
+ class AuthLoginKerberos(dict):
699
+ def __init__(__self__, *,
700
+ disable_fast_negotiation: Optional[_builtins.bool] = None,
701
+ keytab_path: Optional[_builtins.str] = None,
702
+ krb5conf_path: Optional[_builtins.str] = None,
703
+ mount: Optional[_builtins.str] = None,
704
+ namespace: Optional[_builtins.str] = None,
705
+ realm: Optional[_builtins.str] = None,
706
+ remove_instance_name: Optional[_builtins.bool] = None,
707
+ service: Optional[_builtins.str] = None,
708
+ token: Optional[_builtins.str] = None,
709
+ use_root_namespace: Optional[_builtins.bool] = None,
710
+ username: Optional[_builtins.str] = None):
711
+ """
712
+ :param _builtins.bool disable_fast_negotiation: Disable the Kerberos FAST negotiation.
713
+ :param _builtins.str keytab_path: The Kerberos keytab file containing the entry of the login entity.
714
+ :param _builtins.str krb5conf_path: A valid Kerberos configuration file e.g. /etc/krb5.conf.
715
+ :param _builtins.str mount: The path where the authentication engine is mounted.
716
+ :param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
717
+ :param _builtins.str realm: The Kerberos server's authoritative authentication domain
718
+ :param _builtins.bool remove_instance_name: Strip the host from the username found in the keytab.
719
+ :param _builtins.str service: The service principle name.
720
+ :param _builtins.str token: Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
721
+ :param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
722
+ :param _builtins.str username: The username to login into Kerberos with.
723
+ """
724
+ if disable_fast_negotiation is not None:
725
+ pulumi.set(__self__, "disable_fast_negotiation", disable_fast_negotiation)
726
+ if keytab_path is not None:
727
+ pulumi.set(__self__, "keytab_path", keytab_path)
728
+ if krb5conf_path is not None:
729
+ pulumi.set(__self__, "krb5conf_path", krb5conf_path)
730
+ if mount is not None:
731
+ pulumi.set(__self__, "mount", mount)
732
+ if namespace is not None:
733
+ pulumi.set(__self__, "namespace", namespace)
734
+ if realm is not None:
735
+ pulumi.set(__self__, "realm", realm)
736
+ if remove_instance_name is not None:
737
+ pulumi.set(__self__, "remove_instance_name", remove_instance_name)
738
+ if service is not None:
739
+ pulumi.set(__self__, "service", service)
740
+ if token is not None:
741
+ pulumi.set(__self__, "token", token)
742
+ if use_root_namespace is not None:
743
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
744
+ if username is not None:
745
+ pulumi.set(__self__, "username", username)
746
+
747
+ @_builtins.property
748
+ @pulumi.getter(name="disableFastNegotiation")
749
+ def disable_fast_negotiation(self) -> Optional[_builtins.bool]:
750
+ """
751
+ Disable the Kerberos FAST negotiation.
752
+ """
753
+ return pulumi.get(self, "disable_fast_negotiation")
754
+
755
+ @_builtins.property
756
+ @pulumi.getter(name="keytabPath")
757
+ def keytab_path(self) -> Optional[_builtins.str]:
758
+ """
759
+ The Kerberos keytab file containing the entry of the login entity.
760
+ """
761
+ return pulumi.get(self, "keytab_path")
762
+
763
+ @_builtins.property
764
+ @pulumi.getter(name="krb5confPath")
765
+ def krb5conf_path(self) -> Optional[_builtins.str]:
766
+ """
767
+ A valid Kerberos configuration file e.g. /etc/krb5.conf.
768
+ """
769
+ return pulumi.get(self, "krb5conf_path")
770
+
771
+ @_builtins.property
772
+ @pulumi.getter
773
+ def mount(self) -> Optional[_builtins.str]:
774
+ """
775
+ The path where the authentication engine is mounted.
776
+ """
777
+ return pulumi.get(self, "mount")
778
+
779
+ @_builtins.property
780
+ @pulumi.getter
781
+ def namespace(self) -> Optional[_builtins.str]:
782
+ """
783
+ The authentication engine's namespace. Conflicts with use_root_namespace
784
+ """
785
+ return pulumi.get(self, "namespace")
786
+
787
+ @_builtins.property
788
+ @pulumi.getter
789
+ def realm(self) -> Optional[_builtins.str]:
790
+ """
791
+ The Kerberos server's authoritative authentication domain
792
+ """
793
+ return pulumi.get(self, "realm")
794
+
795
+ @_builtins.property
796
+ @pulumi.getter(name="removeInstanceName")
797
+ def remove_instance_name(self) -> Optional[_builtins.bool]:
798
+ """
799
+ Strip the host from the username found in the keytab.
800
+ """
801
+ return pulumi.get(self, "remove_instance_name")
802
+
803
+ @_builtins.property
804
+ @pulumi.getter
805
+ def service(self) -> Optional[_builtins.str]:
806
+ """
807
+ The service principle name.
808
+ """
809
+ return pulumi.get(self, "service")
810
+
811
+ @_builtins.property
812
+ @pulumi.getter
813
+ def token(self) -> Optional[_builtins.str]:
814
+ """
815
+ Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
816
+ """
817
+ return pulumi.get(self, "token")
818
+
819
+ @_builtins.property
820
+ @pulumi.getter(name="useRootNamespace")
821
+ def use_root_namespace(self) -> Optional[_builtins.bool]:
822
+ """
823
+ Authenticate to the root Vault namespace. Conflicts with namespace
824
+ """
825
+ return pulumi.get(self, "use_root_namespace")
826
+
827
+ @_builtins.property
828
+ @pulumi.getter
829
+ def username(self) -> Optional[_builtins.str]:
830
+ """
831
+ The username to login into Kerberos with.
832
+ """
833
+ return pulumi.get(self, "username")
834
+
835
+
836
+ @pulumi.output_type
837
+ class AuthLoginOci(dict):
838
+ def __init__(__self__, *,
839
+ auth_type: _builtins.str,
840
+ role: _builtins.str,
841
+ mount: Optional[_builtins.str] = None,
842
+ namespace: Optional[_builtins.str] = None,
843
+ use_root_namespace: Optional[_builtins.bool] = None):
844
+ """
845
+ :param _builtins.str auth_type: Authentication type to use when getting OCI credentials.
846
+ :param _builtins.str role: Name of the login role.
847
+ :param _builtins.str mount: The path where the authentication engine is mounted.
848
+ :param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
849
+ :param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
850
+ """
851
+ pulumi.set(__self__, "auth_type", auth_type)
852
+ pulumi.set(__self__, "role", role)
853
+ if mount is not None:
854
+ pulumi.set(__self__, "mount", mount)
855
+ if namespace is not None:
856
+ pulumi.set(__self__, "namespace", namespace)
857
+ if use_root_namespace is not None:
858
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
859
+
860
+ @_builtins.property
861
+ @pulumi.getter(name="authType")
862
+ def auth_type(self) -> _builtins.str:
863
+ """
864
+ Authentication type to use when getting OCI credentials.
865
+ """
866
+ return pulumi.get(self, "auth_type")
867
+
868
+ @_builtins.property
869
+ @pulumi.getter
870
+ def role(self) -> _builtins.str:
871
+ """
872
+ Name of the login role.
873
+ """
874
+ return pulumi.get(self, "role")
875
+
876
+ @_builtins.property
877
+ @pulumi.getter
878
+ def mount(self) -> Optional[_builtins.str]:
879
+ """
880
+ The path where the authentication engine is mounted.
881
+ """
882
+ return pulumi.get(self, "mount")
883
+
884
+ @_builtins.property
885
+ @pulumi.getter
886
+ def namespace(self) -> Optional[_builtins.str]:
887
+ """
888
+ The authentication engine's namespace. Conflicts with use_root_namespace
889
+ """
890
+ return pulumi.get(self, "namespace")
891
+
892
+ @_builtins.property
893
+ @pulumi.getter(name="useRootNamespace")
894
+ def use_root_namespace(self) -> Optional[_builtins.bool]:
895
+ """
896
+ Authenticate to the root Vault namespace. Conflicts with namespace
897
+ """
898
+ return pulumi.get(self, "use_root_namespace")
899
+
900
+
901
+ @pulumi.output_type
902
+ class AuthLoginOidc(dict):
903
+ def __init__(__self__, *,
904
+ role: _builtins.str,
905
+ callback_address: Optional[_builtins.str] = None,
906
+ callback_listener_address: Optional[_builtins.str] = None,
907
+ mount: Optional[_builtins.str] = None,
908
+ namespace: Optional[_builtins.str] = None,
909
+ use_root_namespace: Optional[_builtins.bool] = None):
910
+ """
911
+ :param _builtins.str role: Name of the login role.
912
+ :param _builtins.str callback_address: The callback address. Must be a valid URI without the path.
913
+ :param _builtins.str callback_listener_address: The callback listener's address. Must be a valid URI without the path.
914
+ :param _builtins.str mount: The path where the authentication engine is mounted.
915
+ :param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
916
+ :param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
917
+ """
918
+ pulumi.set(__self__, "role", role)
919
+ if callback_address is not None:
920
+ pulumi.set(__self__, "callback_address", callback_address)
921
+ if callback_listener_address is not None:
922
+ pulumi.set(__self__, "callback_listener_address", callback_listener_address)
923
+ if mount is not None:
924
+ pulumi.set(__self__, "mount", mount)
925
+ if namespace is not None:
926
+ pulumi.set(__self__, "namespace", namespace)
927
+ if use_root_namespace is not None:
928
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
929
+
930
+ @_builtins.property
931
+ @pulumi.getter
932
+ def role(self) -> _builtins.str:
933
+ """
934
+ Name of the login role.
935
+ """
936
+ return pulumi.get(self, "role")
937
+
938
+ @_builtins.property
939
+ @pulumi.getter(name="callbackAddress")
940
+ def callback_address(self) -> Optional[_builtins.str]:
941
+ """
942
+ The callback address. Must be a valid URI without the path.
943
+ """
944
+ return pulumi.get(self, "callback_address")
945
+
946
+ @_builtins.property
947
+ @pulumi.getter(name="callbackListenerAddress")
948
+ def callback_listener_address(self) -> Optional[_builtins.str]:
949
+ """
950
+ The callback listener's address. Must be a valid URI without the path.
951
+ """
952
+ return pulumi.get(self, "callback_listener_address")
953
+
954
+ @_builtins.property
955
+ @pulumi.getter
956
+ def mount(self) -> Optional[_builtins.str]:
957
+ """
958
+ The path where the authentication engine is mounted.
959
+ """
960
+ return pulumi.get(self, "mount")
961
+
962
+ @_builtins.property
963
+ @pulumi.getter
964
+ def namespace(self) -> Optional[_builtins.str]:
965
+ """
966
+ The authentication engine's namespace. Conflicts with use_root_namespace
967
+ """
968
+ return pulumi.get(self, "namespace")
969
+
970
+ @_builtins.property
971
+ @pulumi.getter(name="useRootNamespace")
972
+ def use_root_namespace(self) -> Optional[_builtins.bool]:
973
+ """
974
+ Authenticate to the root Vault namespace. Conflicts with namespace
975
+ """
976
+ return pulumi.get(self, "use_root_namespace")
977
+
978
+
979
+ @pulumi.output_type
980
+ class AuthLoginRadius(dict):
981
+ def __init__(__self__, *,
982
+ mount: Optional[_builtins.str] = None,
983
+ namespace: Optional[_builtins.str] = None,
984
+ password: Optional[_builtins.str] = None,
985
+ use_root_namespace: Optional[_builtins.bool] = None,
986
+ username: Optional[_builtins.str] = None):
987
+ """
988
+ :param _builtins.str mount: The path where the authentication engine is mounted.
989
+ :param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
990
+ :param _builtins.str password: The Radius password for username.
991
+ :param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
992
+ :param _builtins.str username: The Radius username.
993
+ """
994
+ if mount is not None:
995
+ pulumi.set(__self__, "mount", mount)
996
+ if namespace is not None:
997
+ pulumi.set(__self__, "namespace", namespace)
998
+ if password is not None:
999
+ pulumi.set(__self__, "password", password)
1000
+ if use_root_namespace is not None:
1001
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1002
+ if username is not None:
1003
+ pulumi.set(__self__, "username", username)
1004
+
1005
+ @_builtins.property
1006
+ @pulumi.getter
1007
+ def mount(self) -> Optional[_builtins.str]:
1008
+ """
1009
+ The path where the authentication engine is mounted.
1010
+ """
1011
+ return pulumi.get(self, "mount")
1012
+
1013
+ @_builtins.property
1014
+ @pulumi.getter
1015
+ def namespace(self) -> Optional[_builtins.str]:
1016
+ """
1017
+ The authentication engine's namespace. Conflicts with use_root_namespace
1018
+ """
1019
+ return pulumi.get(self, "namespace")
1020
+
1021
+ @_builtins.property
1022
+ @pulumi.getter
1023
+ def password(self) -> Optional[_builtins.str]:
1024
+ """
1025
+ The Radius password for username.
1026
+ """
1027
+ return pulumi.get(self, "password")
1028
+
1029
+ @_builtins.property
1030
+ @pulumi.getter(name="useRootNamespace")
1031
+ def use_root_namespace(self) -> Optional[_builtins.bool]:
1032
+ """
1033
+ Authenticate to the root Vault namespace. Conflicts with namespace
1034
+ """
1035
+ return pulumi.get(self, "use_root_namespace")
1036
+
1037
+ @_builtins.property
1038
+ @pulumi.getter
1039
+ def username(self) -> Optional[_builtins.str]:
1040
+ """
1041
+ The Radius username.
1042
+ """
1043
+ return pulumi.get(self, "username")
1044
+
1045
+
1046
+ @pulumi.output_type
1047
+ class AuthLoginTokenFile(dict):
1048
+ def __init__(__self__, *,
1049
+ filename: Optional[_builtins.str] = None,
1050
+ namespace: Optional[_builtins.str] = None,
1051
+ use_root_namespace: Optional[_builtins.bool] = None):
1052
+ """
1053
+ :param _builtins.str filename: The name of a file containing a single line that is a valid Vault token
1054
+ :param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1055
+ :param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1056
+ """
1057
+ if filename is not None:
1058
+ pulumi.set(__self__, "filename", filename)
1059
+ if namespace is not None:
1060
+ pulumi.set(__self__, "namespace", namespace)
1061
+ if use_root_namespace is not None:
1062
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1063
+
1064
+ @_builtins.property
1065
+ @pulumi.getter
1066
+ def filename(self) -> Optional[_builtins.str]:
1067
+ """
1068
+ The name of a file containing a single line that is a valid Vault token
1069
+ """
1070
+ return pulumi.get(self, "filename")
1071
+
1072
+ @_builtins.property
1073
+ @pulumi.getter
1074
+ def namespace(self) -> Optional[_builtins.str]:
1075
+ """
1076
+ The authentication engine's namespace. Conflicts with use_root_namespace
1077
+ """
1078
+ return pulumi.get(self, "namespace")
1079
+
1080
+ @_builtins.property
1081
+ @pulumi.getter(name="useRootNamespace")
1082
+ def use_root_namespace(self) -> Optional[_builtins.bool]:
1083
+ """
1084
+ Authenticate to the root Vault namespace. Conflicts with namespace
1085
+ """
1086
+ return pulumi.get(self, "use_root_namespace")
1087
+
1088
+
1089
+ @pulumi.output_type
1090
+ class AuthLoginUserpass(dict):
1091
+ def __init__(__self__, *,
1092
+ mount: Optional[_builtins.str] = None,
1093
+ namespace: Optional[_builtins.str] = None,
1094
+ password: Optional[_builtins.str] = None,
1095
+ password_file: Optional[_builtins.str] = None,
1096
+ use_root_namespace: Optional[_builtins.bool] = None,
1097
+ username: Optional[_builtins.str] = None):
1098
+ """
1099
+ :param _builtins.str mount: The path where the authentication engine is mounted.
1100
+ :param _builtins.str namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1101
+ :param _builtins.str password: Login with password
1102
+ :param _builtins.str password_file: Login with password from a file
1103
+ :param _builtins.bool use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1104
+ :param _builtins.str username: Login with username
1105
+ """
1106
+ if mount is not None:
1107
+ pulumi.set(__self__, "mount", mount)
1108
+ if namespace is not None:
1109
+ pulumi.set(__self__, "namespace", namespace)
1110
+ if password is not None:
1111
+ pulumi.set(__self__, "password", password)
1112
+ if password_file is not None:
1113
+ pulumi.set(__self__, "password_file", password_file)
1114
+ if use_root_namespace is not None:
1115
+ pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1116
+ if username is not None:
1117
+ pulumi.set(__self__, "username", username)
1118
+
1119
+ @_builtins.property
1120
+ @pulumi.getter
1121
+ def mount(self) -> Optional[_builtins.str]:
1122
+ """
1123
+ The path where the authentication engine is mounted.
1124
+ """
1125
+ return pulumi.get(self, "mount")
1126
+
1127
+ @_builtins.property
1128
+ @pulumi.getter
1129
+ def namespace(self) -> Optional[_builtins.str]:
1130
+ """
1131
+ The authentication engine's namespace. Conflicts with use_root_namespace
1132
+ """
1133
+ return pulumi.get(self, "namespace")
1134
+
1135
+ @_builtins.property
1136
+ @pulumi.getter
1137
+ def password(self) -> Optional[_builtins.str]:
1138
+ """
1139
+ Login with password
1140
+ """
1141
+ return pulumi.get(self, "password")
1142
+
1143
+ @_builtins.property
1144
+ @pulumi.getter(name="passwordFile")
1145
+ def password_file(self) -> Optional[_builtins.str]:
1146
+ """
1147
+ Login with password from a file
1148
+ """
1149
+ return pulumi.get(self, "password_file")
1150
+
1151
+ @_builtins.property
1152
+ @pulumi.getter(name="useRootNamespace")
1153
+ def use_root_namespace(self) -> Optional[_builtins.bool]:
1154
+ """
1155
+ Authenticate to the root Vault namespace. Conflicts with namespace
1156
+ """
1157
+ return pulumi.get(self, "use_root_namespace")
1158
+
1159
+ @_builtins.property
1160
+ @pulumi.getter
1161
+ def username(self) -> Optional[_builtins.str]:
1162
+ """
1163
+ Login with username
1164
+ """
1165
+ return pulumi.get(self, "username")
1166
+
1167
+
1168
+ @pulumi.output_type
1169
+ class ClientAuth(dict):
1170
+ def __init__(__self__, *,
1171
+ cert_file: _builtins.str,
1172
+ key_file: _builtins.str):
1173
+ """
1174
+ :param _builtins.str cert_file: Path to a file containing the client certificate.
1175
+ :param _builtins.str key_file: Path to a file containing the private key that the certificate was issued for.
1176
+ """
1177
+ pulumi.set(__self__, "cert_file", cert_file)
1178
+ pulumi.set(__self__, "key_file", key_file)
1179
+
1180
+ @_builtins.property
1181
+ @pulumi.getter(name="certFile")
1182
+ def cert_file(self) -> _builtins.str:
1183
+ """
1184
+ Path to a file containing the client certificate.
1185
+ """
1186
+ return pulumi.get(self, "cert_file")
1187
+
1188
+ @_builtins.property
1189
+ @pulumi.getter(name="keyFile")
1190
+ def key_file(self) -> _builtins.str:
1191
+ """
1192
+ Path to a file containing the private key that the certificate was issued for.
1193
+ """
1194
+ return pulumi.get(self, "key_file")
1195
+
1196
+
1197
+ @pulumi.output_type
1198
+ class Headers(dict):
1199
+ def __init__(__self__, *,
1200
+ name: _builtins.str,
1201
+ value: _builtins.str):
1202
+ """
1203
+ :param _builtins.str name: The header name
1204
+ :param _builtins.str value: The header value
1205
+ """
1206
+ pulumi.set(__self__, "name", name)
1207
+ pulumi.set(__self__, "value", value)
1208
+
1209
+ @_builtins.property
1210
+ @pulumi.getter
1211
+ def name(self) -> _builtins.str:
1212
+ """
1213
+ The header name
1214
+ """
1215
+ return pulumi.get(self, "name")
1216
+
1217
+ @_builtins.property
1218
+ @pulumi.getter
1219
+ def value(self) -> _builtins.str:
1220
+ """
1221
+ The header value
1222
+ """
1223
+ return pulumi.get(self, "value")
1224
+
1225
+