pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,12 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ from .. import _utilities
7
+ import typing
8
+ # Export this package's modules as members:
9
+ from .auth_backend_login import *
10
+ from .auth_backend_role import *
11
+ from .auth_backend_role_secret_id import *
12
+ from .get_auth_backend_role_id import *
@@ -0,0 +1,571 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendLoginArgs:
21
+ def __init__(__self__, *,
22
+ role_id: pulumi.Input[_builtins.str],
23
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None):
26
+ """
27
+ The set of arguments for constructing a AuthBackendLogin resource.
28
+ :param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
29
+ :param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
30
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
31
+ The value should not contain leading or trailing forward slashes.
32
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
+ *Available only for Vault Enterprise*.
34
+ :param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
35
+ unless `bind_secret_id` is set to false on the role.
36
+ """
37
+ pulumi.set(__self__, "role_id", role_id)
38
+ if backend is not None:
39
+ pulumi.set(__self__, "backend", backend)
40
+ if namespace is not None:
41
+ pulumi.set(__self__, "namespace", namespace)
42
+ if secret_id is not None:
43
+ pulumi.set(__self__, "secret_id", secret_id)
44
+
45
+ @_builtins.property
46
+ @pulumi.getter(name="roleId")
47
+ def role_id(self) -> pulumi.Input[_builtins.str]:
48
+ """
49
+ The ID of the role to log in with.
50
+ """
51
+ return pulumi.get(self, "role_id")
52
+
53
+ @role_id.setter
54
+ def role_id(self, value: pulumi.Input[_builtins.str]):
55
+ pulumi.set(self, "role_id", value)
56
+
57
+ @_builtins.property
58
+ @pulumi.getter
59
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
60
+ """
61
+ The unique path of the Vault backend to log in with.
62
+ """
63
+ return pulumi.get(self, "backend")
64
+
65
+ @backend.setter
66
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
67
+ pulumi.set(self, "backend", value)
68
+
69
+ @_builtins.property
70
+ @pulumi.getter
71
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
72
+ """
73
+ The namespace to provision the resource in.
74
+ The value should not contain leading or trailing forward slashes.
75
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
76
+ *Available only for Vault Enterprise*.
77
+ """
78
+ return pulumi.get(self, "namespace")
79
+
80
+ @namespace.setter
81
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
82
+ pulumi.set(self, "namespace", value)
83
+
84
+ @_builtins.property
85
+ @pulumi.getter(name="secretId")
86
+ def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
87
+ """
88
+ The secret ID of the role to log in with. Required
89
+ unless `bind_secret_id` is set to false on the role.
90
+ """
91
+ return pulumi.get(self, "secret_id")
92
+
93
+ @secret_id.setter
94
+ def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
95
+ pulumi.set(self, "secret_id", value)
96
+
97
+
98
+ @pulumi.input_type
99
+ class _AuthBackendLoginState:
100
+ def __init__(__self__, *,
101
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
102
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
103
+ client_token: Optional[pulumi.Input[_builtins.str]] = None,
104
+ lease_duration: Optional[pulumi.Input[_builtins.int]] = None,
105
+ lease_started: Optional[pulumi.Input[_builtins.str]] = None,
106
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
107
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
108
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
109
+ renewable: Optional[pulumi.Input[_builtins.bool]] = None,
110
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
111
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None):
112
+ """
113
+ Input properties used for looking up and filtering AuthBackendLogin resources.
114
+ :param pulumi.Input[_builtins.str] accessor: The accessor for the token.
115
+ :param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
116
+ :param pulumi.Input[_builtins.str] client_token: The Vault token created.
117
+ :param pulumi.Input[_builtins.int] lease_duration: How long the token is valid for, in seconds.
118
+ :param pulumi.Input[_builtins.str] lease_started: The date and time the lease started, in RFC 3339 format.
119
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: The metadata associated with the token.
120
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
121
+ The value should not contain leading or trailing forward slashes.
122
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
123
+ *Available only for Vault Enterprise*.
124
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies applied to the token.
125
+ :param pulumi.Input[_builtins.bool] renewable: Whether the token is renewable or not.
126
+ :param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
127
+ :param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
128
+ unless `bind_secret_id` is set to false on the role.
129
+ """
130
+ if accessor is not None:
131
+ pulumi.set(__self__, "accessor", accessor)
132
+ if backend is not None:
133
+ pulumi.set(__self__, "backend", backend)
134
+ if client_token is not None:
135
+ pulumi.set(__self__, "client_token", client_token)
136
+ if lease_duration is not None:
137
+ pulumi.set(__self__, "lease_duration", lease_duration)
138
+ if lease_started is not None:
139
+ pulumi.set(__self__, "lease_started", lease_started)
140
+ if metadata is not None:
141
+ pulumi.set(__self__, "metadata", metadata)
142
+ if namespace is not None:
143
+ pulumi.set(__self__, "namespace", namespace)
144
+ if policies is not None:
145
+ pulumi.set(__self__, "policies", policies)
146
+ if renewable is not None:
147
+ pulumi.set(__self__, "renewable", renewable)
148
+ if role_id is not None:
149
+ pulumi.set(__self__, "role_id", role_id)
150
+ if secret_id is not None:
151
+ pulumi.set(__self__, "secret_id", secret_id)
152
+
153
+ @_builtins.property
154
+ @pulumi.getter
155
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
156
+ """
157
+ The accessor for the token.
158
+ """
159
+ return pulumi.get(self, "accessor")
160
+
161
+ @accessor.setter
162
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
163
+ pulumi.set(self, "accessor", value)
164
+
165
+ @_builtins.property
166
+ @pulumi.getter
167
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
168
+ """
169
+ The unique path of the Vault backend to log in with.
170
+ """
171
+ return pulumi.get(self, "backend")
172
+
173
+ @backend.setter
174
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
175
+ pulumi.set(self, "backend", value)
176
+
177
+ @_builtins.property
178
+ @pulumi.getter(name="clientToken")
179
+ def client_token(self) -> Optional[pulumi.Input[_builtins.str]]:
180
+ """
181
+ The Vault token created.
182
+ """
183
+ return pulumi.get(self, "client_token")
184
+
185
+ @client_token.setter
186
+ def client_token(self, value: Optional[pulumi.Input[_builtins.str]]):
187
+ pulumi.set(self, "client_token", value)
188
+
189
+ @_builtins.property
190
+ @pulumi.getter(name="leaseDuration")
191
+ def lease_duration(self) -> Optional[pulumi.Input[_builtins.int]]:
192
+ """
193
+ How long the token is valid for, in seconds.
194
+ """
195
+ return pulumi.get(self, "lease_duration")
196
+
197
+ @lease_duration.setter
198
+ def lease_duration(self, value: Optional[pulumi.Input[_builtins.int]]):
199
+ pulumi.set(self, "lease_duration", value)
200
+
201
+ @_builtins.property
202
+ @pulumi.getter(name="leaseStarted")
203
+ def lease_started(self) -> Optional[pulumi.Input[_builtins.str]]:
204
+ """
205
+ The date and time the lease started, in RFC 3339 format.
206
+ """
207
+ return pulumi.get(self, "lease_started")
208
+
209
+ @lease_started.setter
210
+ def lease_started(self, value: Optional[pulumi.Input[_builtins.str]]):
211
+ pulumi.set(self, "lease_started", value)
212
+
213
+ @_builtins.property
214
+ @pulumi.getter
215
+ def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
216
+ """
217
+ The metadata associated with the token.
218
+ """
219
+ return pulumi.get(self, "metadata")
220
+
221
+ @metadata.setter
222
+ def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
223
+ pulumi.set(self, "metadata", value)
224
+
225
+ @_builtins.property
226
+ @pulumi.getter
227
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
228
+ """
229
+ The namespace to provision the resource in.
230
+ The value should not contain leading or trailing forward slashes.
231
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
232
+ *Available only for Vault Enterprise*.
233
+ """
234
+ return pulumi.get(self, "namespace")
235
+
236
+ @namespace.setter
237
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
238
+ pulumi.set(self, "namespace", value)
239
+
240
+ @_builtins.property
241
+ @pulumi.getter
242
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
243
+ """
244
+ A list of policies applied to the token.
245
+ """
246
+ return pulumi.get(self, "policies")
247
+
248
+ @policies.setter
249
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
250
+ pulumi.set(self, "policies", value)
251
+
252
+ @_builtins.property
253
+ @pulumi.getter
254
+ def renewable(self) -> Optional[pulumi.Input[_builtins.bool]]:
255
+ """
256
+ Whether the token is renewable or not.
257
+ """
258
+ return pulumi.get(self, "renewable")
259
+
260
+ @renewable.setter
261
+ def renewable(self, value: Optional[pulumi.Input[_builtins.bool]]):
262
+ pulumi.set(self, "renewable", value)
263
+
264
+ @_builtins.property
265
+ @pulumi.getter(name="roleId")
266
+ def role_id(self) -> Optional[pulumi.Input[_builtins.str]]:
267
+ """
268
+ The ID of the role to log in with.
269
+ """
270
+ return pulumi.get(self, "role_id")
271
+
272
+ @role_id.setter
273
+ def role_id(self, value: Optional[pulumi.Input[_builtins.str]]):
274
+ pulumi.set(self, "role_id", value)
275
+
276
+ @_builtins.property
277
+ @pulumi.getter(name="secretId")
278
+ def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
279
+ """
280
+ The secret ID of the role to log in with. Required
281
+ unless `bind_secret_id` is set to false on the role.
282
+ """
283
+ return pulumi.get(self, "secret_id")
284
+
285
+ @secret_id.setter
286
+ def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
287
+ pulumi.set(self, "secret_id", value)
288
+
289
+
290
+ @pulumi.type_token("vault:appRole/authBackendLogin:AuthBackendLogin")
291
+ class AuthBackendLogin(pulumi.CustomResource):
292
+ @overload
293
+ def __init__(__self__,
294
+ resource_name: str,
295
+ opts: Optional[pulumi.ResourceOptions] = None,
296
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
297
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
298
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
299
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
300
+ __props__=None):
301
+ """
302
+ Logs into Vault using the AppRole auth backend. See the [Vault
303
+ documentation](https://www.vaultproject.io/docs/auth/approle) for more
304
+ information.
305
+
306
+ ## Example Usage
307
+
308
+ ```python
309
+ import pulumi
310
+ import pulumi_vault as vault
311
+
312
+ approle = vault.AuthBackend("approle", type="approle")
313
+ example = vault.approle.AuthBackendRole("example",
314
+ backend=approle.path,
315
+ role_name="test-role",
316
+ token_policies=[
317
+ "default",
318
+ "dev",
319
+ "prod",
320
+ ])
321
+ id = vault.approle.AuthBackendRoleSecretId("id",
322
+ backend=approle.path,
323
+ role_name=example.role_name)
324
+ login = vault.approle.AuthBackendLogin("login",
325
+ backend=approle.path,
326
+ role_id=example.role_id,
327
+ secret_id=id.secret_id)
328
+ ```
329
+
330
+ :param str resource_name: The name of the resource.
331
+ :param pulumi.ResourceOptions opts: Options for the resource.
332
+ :param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
333
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
334
+ The value should not contain leading or trailing forward slashes.
335
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
336
+ *Available only for Vault Enterprise*.
337
+ :param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
338
+ :param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
339
+ unless `bind_secret_id` is set to false on the role.
340
+ """
341
+ ...
342
+ @overload
343
+ def __init__(__self__,
344
+ resource_name: str,
345
+ args: AuthBackendLoginArgs,
346
+ opts: Optional[pulumi.ResourceOptions] = None):
347
+ """
348
+ Logs into Vault using the AppRole auth backend. See the [Vault
349
+ documentation](https://www.vaultproject.io/docs/auth/approle) for more
350
+ information.
351
+
352
+ ## Example Usage
353
+
354
+ ```python
355
+ import pulumi
356
+ import pulumi_vault as vault
357
+
358
+ approle = vault.AuthBackend("approle", type="approle")
359
+ example = vault.approle.AuthBackendRole("example",
360
+ backend=approle.path,
361
+ role_name="test-role",
362
+ token_policies=[
363
+ "default",
364
+ "dev",
365
+ "prod",
366
+ ])
367
+ id = vault.approle.AuthBackendRoleSecretId("id",
368
+ backend=approle.path,
369
+ role_name=example.role_name)
370
+ login = vault.approle.AuthBackendLogin("login",
371
+ backend=approle.path,
372
+ role_id=example.role_id,
373
+ secret_id=id.secret_id)
374
+ ```
375
+
376
+ :param str resource_name: The name of the resource.
377
+ :param AuthBackendLoginArgs args: The arguments to use to populate this resource's properties.
378
+ :param pulumi.ResourceOptions opts: Options for the resource.
379
+ """
380
+ ...
381
+ def __init__(__self__, resource_name: str, *args, **kwargs):
382
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendLoginArgs, pulumi.ResourceOptions, *args, **kwargs)
383
+ if resource_args is not None:
384
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
385
+ else:
386
+ __self__._internal_init(resource_name, *args, **kwargs)
387
+
388
+ def _internal_init(__self__,
389
+ resource_name: str,
390
+ opts: Optional[pulumi.ResourceOptions] = None,
391
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
392
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
393
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
394
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
395
+ __props__=None):
396
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
397
+ if not isinstance(opts, pulumi.ResourceOptions):
398
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
399
+ if opts.id is None:
400
+ if __props__ is not None:
401
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
402
+ __props__ = AuthBackendLoginArgs.__new__(AuthBackendLoginArgs)
403
+
404
+ __props__.__dict__["backend"] = backend
405
+ __props__.__dict__["namespace"] = namespace
406
+ if role_id is None and not opts.urn:
407
+ raise TypeError("Missing required property 'role_id'")
408
+ __props__.__dict__["role_id"] = role_id
409
+ __props__.__dict__["secret_id"] = None if secret_id is None else pulumi.Output.secret(secret_id)
410
+ __props__.__dict__["accessor"] = None
411
+ __props__.__dict__["client_token"] = None
412
+ __props__.__dict__["lease_duration"] = None
413
+ __props__.__dict__["lease_started"] = None
414
+ __props__.__dict__["metadata"] = None
415
+ __props__.__dict__["policies"] = None
416
+ __props__.__dict__["renewable"] = None
417
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientToken", "secretId"])
418
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
419
+ super(AuthBackendLogin, __self__).__init__(
420
+ 'vault:appRole/authBackendLogin:AuthBackendLogin',
421
+ resource_name,
422
+ __props__,
423
+ opts)
424
+
425
+ @staticmethod
426
+ def get(resource_name: str,
427
+ id: pulumi.Input[str],
428
+ opts: Optional[pulumi.ResourceOptions] = None,
429
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
430
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
431
+ client_token: Optional[pulumi.Input[_builtins.str]] = None,
432
+ lease_duration: Optional[pulumi.Input[_builtins.int]] = None,
433
+ lease_started: Optional[pulumi.Input[_builtins.str]] = None,
434
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
435
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
436
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
437
+ renewable: Optional[pulumi.Input[_builtins.bool]] = None,
438
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
439
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendLogin':
440
+ """
441
+ Get an existing AuthBackendLogin resource's state with the given name, id, and optional extra
442
+ properties used to qualify the lookup.
443
+
444
+ :param str resource_name: The unique name of the resulting resource.
445
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
446
+ :param pulumi.ResourceOptions opts: Options for the resource.
447
+ :param pulumi.Input[_builtins.str] accessor: The accessor for the token.
448
+ :param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
449
+ :param pulumi.Input[_builtins.str] client_token: The Vault token created.
450
+ :param pulumi.Input[_builtins.int] lease_duration: How long the token is valid for, in seconds.
451
+ :param pulumi.Input[_builtins.str] lease_started: The date and time the lease started, in RFC 3339 format.
452
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: The metadata associated with the token.
453
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
454
+ The value should not contain leading or trailing forward slashes.
455
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
456
+ *Available only for Vault Enterprise*.
457
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies applied to the token.
458
+ :param pulumi.Input[_builtins.bool] renewable: Whether the token is renewable or not.
459
+ :param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
460
+ :param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
461
+ unless `bind_secret_id` is set to false on the role.
462
+ """
463
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
464
+
465
+ __props__ = _AuthBackendLoginState.__new__(_AuthBackendLoginState)
466
+
467
+ __props__.__dict__["accessor"] = accessor
468
+ __props__.__dict__["backend"] = backend
469
+ __props__.__dict__["client_token"] = client_token
470
+ __props__.__dict__["lease_duration"] = lease_duration
471
+ __props__.__dict__["lease_started"] = lease_started
472
+ __props__.__dict__["metadata"] = metadata
473
+ __props__.__dict__["namespace"] = namespace
474
+ __props__.__dict__["policies"] = policies
475
+ __props__.__dict__["renewable"] = renewable
476
+ __props__.__dict__["role_id"] = role_id
477
+ __props__.__dict__["secret_id"] = secret_id
478
+ return AuthBackendLogin(resource_name, opts=opts, __props__=__props__)
479
+
480
+ @_builtins.property
481
+ @pulumi.getter
482
+ def accessor(self) -> pulumi.Output[_builtins.str]:
483
+ """
484
+ The accessor for the token.
485
+ """
486
+ return pulumi.get(self, "accessor")
487
+
488
+ @_builtins.property
489
+ @pulumi.getter
490
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
491
+ """
492
+ The unique path of the Vault backend to log in with.
493
+ """
494
+ return pulumi.get(self, "backend")
495
+
496
+ @_builtins.property
497
+ @pulumi.getter(name="clientToken")
498
+ def client_token(self) -> pulumi.Output[_builtins.str]:
499
+ """
500
+ The Vault token created.
501
+ """
502
+ return pulumi.get(self, "client_token")
503
+
504
+ @_builtins.property
505
+ @pulumi.getter(name="leaseDuration")
506
+ def lease_duration(self) -> pulumi.Output[_builtins.int]:
507
+ """
508
+ How long the token is valid for, in seconds.
509
+ """
510
+ return pulumi.get(self, "lease_duration")
511
+
512
+ @_builtins.property
513
+ @pulumi.getter(name="leaseStarted")
514
+ def lease_started(self) -> pulumi.Output[_builtins.str]:
515
+ """
516
+ The date and time the lease started, in RFC 3339 format.
517
+ """
518
+ return pulumi.get(self, "lease_started")
519
+
520
+ @_builtins.property
521
+ @pulumi.getter
522
+ def metadata(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
523
+ """
524
+ The metadata associated with the token.
525
+ """
526
+ return pulumi.get(self, "metadata")
527
+
528
+ @_builtins.property
529
+ @pulumi.getter
530
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
531
+ """
532
+ The namespace to provision the resource in.
533
+ The value should not contain leading or trailing forward slashes.
534
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
535
+ *Available only for Vault Enterprise*.
536
+ """
537
+ return pulumi.get(self, "namespace")
538
+
539
+ @_builtins.property
540
+ @pulumi.getter
541
+ def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
542
+ """
543
+ A list of policies applied to the token.
544
+ """
545
+ return pulumi.get(self, "policies")
546
+
547
+ @_builtins.property
548
+ @pulumi.getter
549
+ def renewable(self) -> pulumi.Output[_builtins.bool]:
550
+ """
551
+ Whether the token is renewable or not.
552
+ """
553
+ return pulumi.get(self, "renewable")
554
+
555
+ @_builtins.property
556
+ @pulumi.getter(name="roleId")
557
+ def role_id(self) -> pulumi.Output[_builtins.str]:
558
+ """
559
+ The ID of the role to log in with.
560
+ """
561
+ return pulumi.get(self, "role_id")
562
+
563
+ @_builtins.property
564
+ @pulumi.getter(name="secretId")
565
+ def secret_id(self) -> pulumi.Output[Optional[_builtins.str]]:
566
+ """
567
+ The secret ID of the role to log in with. Required
568
+ unless `bind_secret_id` is set to false on the role.
569
+ """
570
+ return pulumi.get(self, "secret_id")
571
+