pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
from .. import _utilities
|
|
7
|
+
import typing
|
|
8
|
+
# Export this package's modules as members:
|
|
9
|
+
from .auth_backend_login import *
|
|
10
|
+
from .auth_backend_role import *
|
|
11
|
+
from .auth_backend_role_secret_id import *
|
|
12
|
+
from .get_auth_backend_role_id import *
|
|
@@ -0,0 +1,571 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class AuthBackendLoginArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
role_id: pulumi.Input[_builtins.str],
|
|
23
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
25
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None):
|
|
26
|
+
"""
|
|
27
|
+
The set of arguments for constructing a AuthBackendLogin resource.
|
|
28
|
+
:param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
|
|
29
|
+
:param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
|
|
30
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
31
|
+
The value should not contain leading or trailing forward slashes.
|
|
32
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
33
|
+
*Available only for Vault Enterprise*.
|
|
34
|
+
:param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
|
|
35
|
+
unless `bind_secret_id` is set to false on the role.
|
|
36
|
+
"""
|
|
37
|
+
pulumi.set(__self__, "role_id", role_id)
|
|
38
|
+
if backend is not None:
|
|
39
|
+
pulumi.set(__self__, "backend", backend)
|
|
40
|
+
if namespace is not None:
|
|
41
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
42
|
+
if secret_id is not None:
|
|
43
|
+
pulumi.set(__self__, "secret_id", secret_id)
|
|
44
|
+
|
|
45
|
+
@_builtins.property
|
|
46
|
+
@pulumi.getter(name="roleId")
|
|
47
|
+
def role_id(self) -> pulumi.Input[_builtins.str]:
|
|
48
|
+
"""
|
|
49
|
+
The ID of the role to log in with.
|
|
50
|
+
"""
|
|
51
|
+
return pulumi.get(self, "role_id")
|
|
52
|
+
|
|
53
|
+
@role_id.setter
|
|
54
|
+
def role_id(self, value: pulumi.Input[_builtins.str]):
|
|
55
|
+
pulumi.set(self, "role_id", value)
|
|
56
|
+
|
|
57
|
+
@_builtins.property
|
|
58
|
+
@pulumi.getter
|
|
59
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
60
|
+
"""
|
|
61
|
+
The unique path of the Vault backend to log in with.
|
|
62
|
+
"""
|
|
63
|
+
return pulumi.get(self, "backend")
|
|
64
|
+
|
|
65
|
+
@backend.setter
|
|
66
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
67
|
+
pulumi.set(self, "backend", value)
|
|
68
|
+
|
|
69
|
+
@_builtins.property
|
|
70
|
+
@pulumi.getter
|
|
71
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
72
|
+
"""
|
|
73
|
+
The namespace to provision the resource in.
|
|
74
|
+
The value should not contain leading or trailing forward slashes.
|
|
75
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
76
|
+
*Available only for Vault Enterprise*.
|
|
77
|
+
"""
|
|
78
|
+
return pulumi.get(self, "namespace")
|
|
79
|
+
|
|
80
|
+
@namespace.setter
|
|
81
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
82
|
+
pulumi.set(self, "namespace", value)
|
|
83
|
+
|
|
84
|
+
@_builtins.property
|
|
85
|
+
@pulumi.getter(name="secretId")
|
|
86
|
+
def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
87
|
+
"""
|
|
88
|
+
The secret ID of the role to log in with. Required
|
|
89
|
+
unless `bind_secret_id` is set to false on the role.
|
|
90
|
+
"""
|
|
91
|
+
return pulumi.get(self, "secret_id")
|
|
92
|
+
|
|
93
|
+
@secret_id.setter
|
|
94
|
+
def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
95
|
+
pulumi.set(self, "secret_id", value)
|
|
96
|
+
|
|
97
|
+
|
|
98
|
+
@pulumi.input_type
|
|
99
|
+
class _AuthBackendLoginState:
|
|
100
|
+
def __init__(__self__, *,
|
|
101
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
|
102
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
103
|
+
client_token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
104
|
+
lease_duration: Optional[pulumi.Input[_builtins.int]] = None,
|
|
105
|
+
lease_started: Optional[pulumi.Input[_builtins.str]] = None,
|
|
106
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
107
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
108
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
109
|
+
renewable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
110
|
+
role_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
111
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None):
|
|
112
|
+
"""
|
|
113
|
+
Input properties used for looking up and filtering AuthBackendLogin resources.
|
|
114
|
+
:param pulumi.Input[_builtins.str] accessor: The accessor for the token.
|
|
115
|
+
:param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
|
|
116
|
+
:param pulumi.Input[_builtins.str] client_token: The Vault token created.
|
|
117
|
+
:param pulumi.Input[_builtins.int] lease_duration: How long the token is valid for, in seconds.
|
|
118
|
+
:param pulumi.Input[_builtins.str] lease_started: The date and time the lease started, in RFC 3339 format.
|
|
119
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: The metadata associated with the token.
|
|
120
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
121
|
+
The value should not contain leading or trailing forward slashes.
|
|
122
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
123
|
+
*Available only for Vault Enterprise*.
|
|
124
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies applied to the token.
|
|
125
|
+
:param pulumi.Input[_builtins.bool] renewable: Whether the token is renewable or not.
|
|
126
|
+
:param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
|
|
127
|
+
:param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
|
|
128
|
+
unless `bind_secret_id` is set to false on the role.
|
|
129
|
+
"""
|
|
130
|
+
if accessor is not None:
|
|
131
|
+
pulumi.set(__self__, "accessor", accessor)
|
|
132
|
+
if backend is not None:
|
|
133
|
+
pulumi.set(__self__, "backend", backend)
|
|
134
|
+
if client_token is not None:
|
|
135
|
+
pulumi.set(__self__, "client_token", client_token)
|
|
136
|
+
if lease_duration is not None:
|
|
137
|
+
pulumi.set(__self__, "lease_duration", lease_duration)
|
|
138
|
+
if lease_started is not None:
|
|
139
|
+
pulumi.set(__self__, "lease_started", lease_started)
|
|
140
|
+
if metadata is not None:
|
|
141
|
+
pulumi.set(__self__, "metadata", metadata)
|
|
142
|
+
if namespace is not None:
|
|
143
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
144
|
+
if policies is not None:
|
|
145
|
+
pulumi.set(__self__, "policies", policies)
|
|
146
|
+
if renewable is not None:
|
|
147
|
+
pulumi.set(__self__, "renewable", renewable)
|
|
148
|
+
if role_id is not None:
|
|
149
|
+
pulumi.set(__self__, "role_id", role_id)
|
|
150
|
+
if secret_id is not None:
|
|
151
|
+
pulumi.set(__self__, "secret_id", secret_id)
|
|
152
|
+
|
|
153
|
+
@_builtins.property
|
|
154
|
+
@pulumi.getter
|
|
155
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
156
|
+
"""
|
|
157
|
+
The accessor for the token.
|
|
158
|
+
"""
|
|
159
|
+
return pulumi.get(self, "accessor")
|
|
160
|
+
|
|
161
|
+
@accessor.setter
|
|
162
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
163
|
+
pulumi.set(self, "accessor", value)
|
|
164
|
+
|
|
165
|
+
@_builtins.property
|
|
166
|
+
@pulumi.getter
|
|
167
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
168
|
+
"""
|
|
169
|
+
The unique path of the Vault backend to log in with.
|
|
170
|
+
"""
|
|
171
|
+
return pulumi.get(self, "backend")
|
|
172
|
+
|
|
173
|
+
@backend.setter
|
|
174
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
175
|
+
pulumi.set(self, "backend", value)
|
|
176
|
+
|
|
177
|
+
@_builtins.property
|
|
178
|
+
@pulumi.getter(name="clientToken")
|
|
179
|
+
def client_token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
180
|
+
"""
|
|
181
|
+
The Vault token created.
|
|
182
|
+
"""
|
|
183
|
+
return pulumi.get(self, "client_token")
|
|
184
|
+
|
|
185
|
+
@client_token.setter
|
|
186
|
+
def client_token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
187
|
+
pulumi.set(self, "client_token", value)
|
|
188
|
+
|
|
189
|
+
@_builtins.property
|
|
190
|
+
@pulumi.getter(name="leaseDuration")
|
|
191
|
+
def lease_duration(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
192
|
+
"""
|
|
193
|
+
How long the token is valid for, in seconds.
|
|
194
|
+
"""
|
|
195
|
+
return pulumi.get(self, "lease_duration")
|
|
196
|
+
|
|
197
|
+
@lease_duration.setter
|
|
198
|
+
def lease_duration(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
199
|
+
pulumi.set(self, "lease_duration", value)
|
|
200
|
+
|
|
201
|
+
@_builtins.property
|
|
202
|
+
@pulumi.getter(name="leaseStarted")
|
|
203
|
+
def lease_started(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
204
|
+
"""
|
|
205
|
+
The date and time the lease started, in RFC 3339 format.
|
|
206
|
+
"""
|
|
207
|
+
return pulumi.get(self, "lease_started")
|
|
208
|
+
|
|
209
|
+
@lease_started.setter
|
|
210
|
+
def lease_started(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
211
|
+
pulumi.set(self, "lease_started", value)
|
|
212
|
+
|
|
213
|
+
@_builtins.property
|
|
214
|
+
@pulumi.getter
|
|
215
|
+
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
216
|
+
"""
|
|
217
|
+
The metadata associated with the token.
|
|
218
|
+
"""
|
|
219
|
+
return pulumi.get(self, "metadata")
|
|
220
|
+
|
|
221
|
+
@metadata.setter
|
|
222
|
+
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
223
|
+
pulumi.set(self, "metadata", value)
|
|
224
|
+
|
|
225
|
+
@_builtins.property
|
|
226
|
+
@pulumi.getter
|
|
227
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
228
|
+
"""
|
|
229
|
+
The namespace to provision the resource in.
|
|
230
|
+
The value should not contain leading or trailing forward slashes.
|
|
231
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
232
|
+
*Available only for Vault Enterprise*.
|
|
233
|
+
"""
|
|
234
|
+
return pulumi.get(self, "namespace")
|
|
235
|
+
|
|
236
|
+
@namespace.setter
|
|
237
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
238
|
+
pulumi.set(self, "namespace", value)
|
|
239
|
+
|
|
240
|
+
@_builtins.property
|
|
241
|
+
@pulumi.getter
|
|
242
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
243
|
+
"""
|
|
244
|
+
A list of policies applied to the token.
|
|
245
|
+
"""
|
|
246
|
+
return pulumi.get(self, "policies")
|
|
247
|
+
|
|
248
|
+
@policies.setter
|
|
249
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
250
|
+
pulumi.set(self, "policies", value)
|
|
251
|
+
|
|
252
|
+
@_builtins.property
|
|
253
|
+
@pulumi.getter
|
|
254
|
+
def renewable(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
255
|
+
"""
|
|
256
|
+
Whether the token is renewable or not.
|
|
257
|
+
"""
|
|
258
|
+
return pulumi.get(self, "renewable")
|
|
259
|
+
|
|
260
|
+
@renewable.setter
|
|
261
|
+
def renewable(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
262
|
+
pulumi.set(self, "renewable", value)
|
|
263
|
+
|
|
264
|
+
@_builtins.property
|
|
265
|
+
@pulumi.getter(name="roleId")
|
|
266
|
+
def role_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
267
|
+
"""
|
|
268
|
+
The ID of the role to log in with.
|
|
269
|
+
"""
|
|
270
|
+
return pulumi.get(self, "role_id")
|
|
271
|
+
|
|
272
|
+
@role_id.setter
|
|
273
|
+
def role_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
274
|
+
pulumi.set(self, "role_id", value)
|
|
275
|
+
|
|
276
|
+
@_builtins.property
|
|
277
|
+
@pulumi.getter(name="secretId")
|
|
278
|
+
def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
279
|
+
"""
|
|
280
|
+
The secret ID of the role to log in with. Required
|
|
281
|
+
unless `bind_secret_id` is set to false on the role.
|
|
282
|
+
"""
|
|
283
|
+
return pulumi.get(self, "secret_id")
|
|
284
|
+
|
|
285
|
+
@secret_id.setter
|
|
286
|
+
def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
287
|
+
pulumi.set(self, "secret_id", value)
|
|
288
|
+
|
|
289
|
+
|
|
290
|
+
@pulumi.type_token("vault:appRole/authBackendLogin:AuthBackendLogin")
|
|
291
|
+
class AuthBackendLogin(pulumi.CustomResource):
|
|
292
|
+
@overload
|
|
293
|
+
def __init__(__self__,
|
|
294
|
+
resource_name: str,
|
|
295
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
296
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
297
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
298
|
+
role_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
299
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
300
|
+
__props__=None):
|
|
301
|
+
"""
|
|
302
|
+
Logs into Vault using the AppRole auth backend. See the [Vault
|
|
303
|
+
documentation](https://www.vaultproject.io/docs/auth/approle) for more
|
|
304
|
+
information.
|
|
305
|
+
|
|
306
|
+
## Example Usage
|
|
307
|
+
|
|
308
|
+
```python
|
|
309
|
+
import pulumi
|
|
310
|
+
import pulumi_vault as vault
|
|
311
|
+
|
|
312
|
+
approle = vault.AuthBackend("approle", type="approle")
|
|
313
|
+
example = vault.approle.AuthBackendRole("example",
|
|
314
|
+
backend=approle.path,
|
|
315
|
+
role_name="test-role",
|
|
316
|
+
token_policies=[
|
|
317
|
+
"default",
|
|
318
|
+
"dev",
|
|
319
|
+
"prod",
|
|
320
|
+
])
|
|
321
|
+
id = vault.approle.AuthBackendRoleSecretId("id",
|
|
322
|
+
backend=approle.path,
|
|
323
|
+
role_name=example.role_name)
|
|
324
|
+
login = vault.approle.AuthBackendLogin("login",
|
|
325
|
+
backend=approle.path,
|
|
326
|
+
role_id=example.role_id,
|
|
327
|
+
secret_id=id.secret_id)
|
|
328
|
+
```
|
|
329
|
+
|
|
330
|
+
:param str resource_name: The name of the resource.
|
|
331
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
332
|
+
:param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
|
|
333
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
334
|
+
The value should not contain leading or trailing forward slashes.
|
|
335
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
336
|
+
*Available only for Vault Enterprise*.
|
|
337
|
+
:param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
|
|
338
|
+
:param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
|
|
339
|
+
unless `bind_secret_id` is set to false on the role.
|
|
340
|
+
"""
|
|
341
|
+
...
|
|
342
|
+
@overload
|
|
343
|
+
def __init__(__self__,
|
|
344
|
+
resource_name: str,
|
|
345
|
+
args: AuthBackendLoginArgs,
|
|
346
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
347
|
+
"""
|
|
348
|
+
Logs into Vault using the AppRole auth backend. See the [Vault
|
|
349
|
+
documentation](https://www.vaultproject.io/docs/auth/approle) for more
|
|
350
|
+
information.
|
|
351
|
+
|
|
352
|
+
## Example Usage
|
|
353
|
+
|
|
354
|
+
```python
|
|
355
|
+
import pulumi
|
|
356
|
+
import pulumi_vault as vault
|
|
357
|
+
|
|
358
|
+
approle = vault.AuthBackend("approle", type="approle")
|
|
359
|
+
example = vault.approle.AuthBackendRole("example",
|
|
360
|
+
backend=approle.path,
|
|
361
|
+
role_name="test-role",
|
|
362
|
+
token_policies=[
|
|
363
|
+
"default",
|
|
364
|
+
"dev",
|
|
365
|
+
"prod",
|
|
366
|
+
])
|
|
367
|
+
id = vault.approle.AuthBackendRoleSecretId("id",
|
|
368
|
+
backend=approle.path,
|
|
369
|
+
role_name=example.role_name)
|
|
370
|
+
login = vault.approle.AuthBackendLogin("login",
|
|
371
|
+
backend=approle.path,
|
|
372
|
+
role_id=example.role_id,
|
|
373
|
+
secret_id=id.secret_id)
|
|
374
|
+
```
|
|
375
|
+
|
|
376
|
+
:param str resource_name: The name of the resource.
|
|
377
|
+
:param AuthBackendLoginArgs args: The arguments to use to populate this resource's properties.
|
|
378
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
379
|
+
"""
|
|
380
|
+
...
|
|
381
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
382
|
+
resource_args, opts = _utilities.get_resource_args_opts(AuthBackendLoginArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
383
|
+
if resource_args is not None:
|
|
384
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
385
|
+
else:
|
|
386
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
387
|
+
|
|
388
|
+
def _internal_init(__self__,
|
|
389
|
+
resource_name: str,
|
|
390
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
391
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
392
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
393
|
+
role_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
394
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
395
|
+
__props__=None):
|
|
396
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
397
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
398
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
399
|
+
if opts.id is None:
|
|
400
|
+
if __props__ is not None:
|
|
401
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
402
|
+
__props__ = AuthBackendLoginArgs.__new__(AuthBackendLoginArgs)
|
|
403
|
+
|
|
404
|
+
__props__.__dict__["backend"] = backend
|
|
405
|
+
__props__.__dict__["namespace"] = namespace
|
|
406
|
+
if role_id is None and not opts.urn:
|
|
407
|
+
raise TypeError("Missing required property 'role_id'")
|
|
408
|
+
__props__.__dict__["role_id"] = role_id
|
|
409
|
+
__props__.__dict__["secret_id"] = None if secret_id is None else pulumi.Output.secret(secret_id)
|
|
410
|
+
__props__.__dict__["accessor"] = None
|
|
411
|
+
__props__.__dict__["client_token"] = None
|
|
412
|
+
__props__.__dict__["lease_duration"] = None
|
|
413
|
+
__props__.__dict__["lease_started"] = None
|
|
414
|
+
__props__.__dict__["metadata"] = None
|
|
415
|
+
__props__.__dict__["policies"] = None
|
|
416
|
+
__props__.__dict__["renewable"] = None
|
|
417
|
+
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientToken", "secretId"])
|
|
418
|
+
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
|
419
|
+
super(AuthBackendLogin, __self__).__init__(
|
|
420
|
+
'vault:appRole/authBackendLogin:AuthBackendLogin',
|
|
421
|
+
resource_name,
|
|
422
|
+
__props__,
|
|
423
|
+
opts)
|
|
424
|
+
|
|
425
|
+
@staticmethod
|
|
426
|
+
def get(resource_name: str,
|
|
427
|
+
id: pulumi.Input[str],
|
|
428
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
429
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
|
430
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
431
|
+
client_token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
432
|
+
lease_duration: Optional[pulumi.Input[_builtins.int]] = None,
|
|
433
|
+
lease_started: Optional[pulumi.Input[_builtins.str]] = None,
|
|
434
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
435
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
436
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
437
|
+
renewable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
438
|
+
role_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
439
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendLogin':
|
|
440
|
+
"""
|
|
441
|
+
Get an existing AuthBackendLogin resource's state with the given name, id, and optional extra
|
|
442
|
+
properties used to qualify the lookup.
|
|
443
|
+
|
|
444
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
445
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
446
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
447
|
+
:param pulumi.Input[_builtins.str] accessor: The accessor for the token.
|
|
448
|
+
:param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
|
|
449
|
+
:param pulumi.Input[_builtins.str] client_token: The Vault token created.
|
|
450
|
+
:param pulumi.Input[_builtins.int] lease_duration: How long the token is valid for, in seconds.
|
|
451
|
+
:param pulumi.Input[_builtins.str] lease_started: The date and time the lease started, in RFC 3339 format.
|
|
452
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: The metadata associated with the token.
|
|
453
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
454
|
+
The value should not contain leading or trailing forward slashes.
|
|
455
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
456
|
+
*Available only for Vault Enterprise*.
|
|
457
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies applied to the token.
|
|
458
|
+
:param pulumi.Input[_builtins.bool] renewable: Whether the token is renewable or not.
|
|
459
|
+
:param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
|
|
460
|
+
:param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
|
|
461
|
+
unless `bind_secret_id` is set to false on the role.
|
|
462
|
+
"""
|
|
463
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
464
|
+
|
|
465
|
+
__props__ = _AuthBackendLoginState.__new__(_AuthBackendLoginState)
|
|
466
|
+
|
|
467
|
+
__props__.__dict__["accessor"] = accessor
|
|
468
|
+
__props__.__dict__["backend"] = backend
|
|
469
|
+
__props__.__dict__["client_token"] = client_token
|
|
470
|
+
__props__.__dict__["lease_duration"] = lease_duration
|
|
471
|
+
__props__.__dict__["lease_started"] = lease_started
|
|
472
|
+
__props__.__dict__["metadata"] = metadata
|
|
473
|
+
__props__.__dict__["namespace"] = namespace
|
|
474
|
+
__props__.__dict__["policies"] = policies
|
|
475
|
+
__props__.__dict__["renewable"] = renewable
|
|
476
|
+
__props__.__dict__["role_id"] = role_id
|
|
477
|
+
__props__.__dict__["secret_id"] = secret_id
|
|
478
|
+
return AuthBackendLogin(resource_name, opts=opts, __props__=__props__)
|
|
479
|
+
|
|
480
|
+
@_builtins.property
|
|
481
|
+
@pulumi.getter
|
|
482
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
|
483
|
+
"""
|
|
484
|
+
The accessor for the token.
|
|
485
|
+
"""
|
|
486
|
+
return pulumi.get(self, "accessor")
|
|
487
|
+
|
|
488
|
+
@_builtins.property
|
|
489
|
+
@pulumi.getter
|
|
490
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
491
|
+
"""
|
|
492
|
+
The unique path of the Vault backend to log in with.
|
|
493
|
+
"""
|
|
494
|
+
return pulumi.get(self, "backend")
|
|
495
|
+
|
|
496
|
+
@_builtins.property
|
|
497
|
+
@pulumi.getter(name="clientToken")
|
|
498
|
+
def client_token(self) -> pulumi.Output[_builtins.str]:
|
|
499
|
+
"""
|
|
500
|
+
The Vault token created.
|
|
501
|
+
"""
|
|
502
|
+
return pulumi.get(self, "client_token")
|
|
503
|
+
|
|
504
|
+
@_builtins.property
|
|
505
|
+
@pulumi.getter(name="leaseDuration")
|
|
506
|
+
def lease_duration(self) -> pulumi.Output[_builtins.int]:
|
|
507
|
+
"""
|
|
508
|
+
How long the token is valid for, in seconds.
|
|
509
|
+
"""
|
|
510
|
+
return pulumi.get(self, "lease_duration")
|
|
511
|
+
|
|
512
|
+
@_builtins.property
|
|
513
|
+
@pulumi.getter(name="leaseStarted")
|
|
514
|
+
def lease_started(self) -> pulumi.Output[_builtins.str]:
|
|
515
|
+
"""
|
|
516
|
+
The date and time the lease started, in RFC 3339 format.
|
|
517
|
+
"""
|
|
518
|
+
return pulumi.get(self, "lease_started")
|
|
519
|
+
|
|
520
|
+
@_builtins.property
|
|
521
|
+
@pulumi.getter
|
|
522
|
+
def metadata(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
|
|
523
|
+
"""
|
|
524
|
+
The metadata associated with the token.
|
|
525
|
+
"""
|
|
526
|
+
return pulumi.get(self, "metadata")
|
|
527
|
+
|
|
528
|
+
@_builtins.property
|
|
529
|
+
@pulumi.getter
|
|
530
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
531
|
+
"""
|
|
532
|
+
The namespace to provision the resource in.
|
|
533
|
+
The value should not contain leading or trailing forward slashes.
|
|
534
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
535
|
+
*Available only for Vault Enterprise*.
|
|
536
|
+
"""
|
|
537
|
+
return pulumi.get(self, "namespace")
|
|
538
|
+
|
|
539
|
+
@_builtins.property
|
|
540
|
+
@pulumi.getter
|
|
541
|
+
def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
|
542
|
+
"""
|
|
543
|
+
A list of policies applied to the token.
|
|
544
|
+
"""
|
|
545
|
+
return pulumi.get(self, "policies")
|
|
546
|
+
|
|
547
|
+
@_builtins.property
|
|
548
|
+
@pulumi.getter
|
|
549
|
+
def renewable(self) -> pulumi.Output[_builtins.bool]:
|
|
550
|
+
"""
|
|
551
|
+
Whether the token is renewable or not.
|
|
552
|
+
"""
|
|
553
|
+
return pulumi.get(self, "renewable")
|
|
554
|
+
|
|
555
|
+
@_builtins.property
|
|
556
|
+
@pulumi.getter(name="roleId")
|
|
557
|
+
def role_id(self) -> pulumi.Output[_builtins.str]:
|
|
558
|
+
"""
|
|
559
|
+
The ID of the role to log in with.
|
|
560
|
+
"""
|
|
561
|
+
return pulumi.get(self, "role_id")
|
|
562
|
+
|
|
563
|
+
@_builtins.property
|
|
564
|
+
@pulumi.getter(name="secretId")
|
|
565
|
+
def secret_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
566
|
+
"""
|
|
567
|
+
The secret ID of the role to log in with. Required
|
|
568
|
+
unless `bind_secret_id` is set to false on the role.
|
|
569
|
+
"""
|
|
570
|
+
return pulumi.get(self, "secret_id")
|
|
571
|
+
|