diff --git a/3.x/_gen/main.libsonnet b/3.x/_gen/main.libsonnet index 197fc0e..603ee50 100644 --- a/3.x/_gen/main.libsonnet +++ b/3.x/_gen/main.libsonnet @@ -104,6 +104,7 @@ local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet'); password_policy: (import 'resources/password_policy.libsonnet'), pki_secret_backend_cert: (import 'resources/pki_secret_backend_cert.libsonnet'), pki_secret_backend_config_ca: (import 'resources/pki_secret_backend_config_ca.libsonnet'), + pki_secret_backend_config_issuers: (import 'resources/pki_secret_backend_config_issuers.libsonnet'), pki_secret_backend_config_urls: (import 'resources/pki_secret_backend_config_urls.libsonnet'), pki_secret_backend_crl_config: (import 'resources/pki_secret_backend_crl_config.libsonnet'), pki_secret_backend_intermediate_cert_request: (import 'resources/pki_secret_backend_intermediate_cert_request.libsonnet'), diff --git a/3.x/_gen/provider_vault.libsonnet b/3.x/_gen/provider_vault.libsonnet index 2257ffb..0274677 100644 --- a/3.x/_gen/provider_vault.libsonnet +++ b/3.x/_gen/provider_vault.libsonnet @@ -2,7 +2,7 @@ local tf = (import 'github.com/tf-libsonnet/core/main.libsonnet'); local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet'); { '#':: d.pkg(name='provider', url='', help='`provider` represents the `vault` Terraform provider config.\n\n\n\nThis package contains functions and utilities for setting up the provider using Jsonnet code.\n'), - '#new':: d.fn(help='\n`vault.provider.new` injects a new `vault` Terraform `provider`\nblock into the root module document.\n\nOptionally, this inserts the provider into the\n[required_providers](https://developer.hashicorp.com/terraform/language/providers/requirements) `terraform` sub block if\nthe `src` and/or `version` parameters are set.\n\n**Args**:\n - `add_address_to_env` (`string`): If true, adds the value of the `address` argument to the Terraform process environment. When `null`, the `add_address_to_env` field will be omitted from the resulting object.\n - `address` (`string`): URL of the root of the target Vault server.\n - `ca_cert_dir` (`string`): Path to directory containing CA certificate files to validate the server's certificate. When `null`, the `ca_cert_dir` field will be omitted from the resulting object.\n - `ca_cert_file` (`string`): Path to a CA certificate file to validate the server's certificate. When `null`, the `ca_cert_file` field will be omitted from the resulting object.\n - `max_lease_ttl_seconds` (`number`): Maximum TTL for secret leases requested by this provider. When `null`, the `max_lease_ttl_seconds` field will be omitted from the resulting object.\n - `max_retries` (`number`): Maximum number of retries when a 5xx error code is encountered. When `null`, the `max_retries` field will be omitted from the resulting object.\n - `max_retries_ccc` (`number`): Maximum number of retries for Client Controlled Consistency related operations When `null`, the `max_retries_ccc` field will be omitted from the resulting object.\n - `namespace` (`string`): The namespace to use. Available only for Vault Enterprise. When `null`, the `namespace` field will be omitted from the resulting object.\n - `skip_child_token` (`bool`): Set this to true to prevent the creation of ephemeral child token used by this provider. When `null`, the `skip_child_token` field will be omitted from the resulting object.\n - `skip_get_vault_version` (`bool`): Skip the dynamic fetching of the Vault server version. When `null`, the `skip_get_vault_version` field will be omitted from the resulting object.\n - `skip_tls_verify` (`bool`): Set this to true only if the target Vault server is an insecure development instance. When `null`, the `skip_tls_verify` field will be omitted from the resulting object.\n - `tls_server_name` (`string`): Name to use as the SNI host when connecting via TLS. When `null`, the `tls_server_name` field will be omitted from the resulting object.\n - `token` (`string`): Token to use to authenticate to Vault. When `null`, the `token` field will be omitted from the resulting object.\n - `token_name` (`string`): Token name to use for creating the Vault child token. When `null`, the `token_name` field will be omitted from the resulting object.\n - `vault_version_override` (`string`): Override the Vault server version, which is normally determined dynamically from the target Vault server When `null`, the `vault_version_override` field will be omitted from the resulting object.\n - `auth_login` (`list[obj]`): Login to vault with an existing auth method using auth/<mount>/login When `null`, the `auth_login` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login.new](#fn-vaultauthloginnew) constructor.\n - `auth_login_aws` (`list[obj]`): Login to vault using the AWS method When `null`, the `auth_login_aws` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_aws.new](#fn-vaultauthloginawsnew) constructor.\n - `auth_login_azure` (`list[obj]`): Login to vault using the azure method When `null`, the `auth_login_azure` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_azure.new](#fn-vaultauthloginazurenew) constructor.\n - `auth_login_cert` (`list[obj]`): Login to vault using the cert method When `null`, the `auth_login_cert` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_cert.new](#fn-vaultauthlogincertnew) constructor.\n - `auth_login_gcp` (`list[obj]`): Login to vault using the gcp method When `null`, the `auth_login_gcp` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_gcp.new](#fn-vaultauthlogingcpnew) constructor.\n - `auth_login_jwt` (`list[obj]`): Login to vault using the jwt method When `null`, the `auth_login_jwt` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_jwt.new](#fn-vaultauthloginjwtnew) constructor.\n - `auth_login_kerberos` (`list[obj]`): Login to vault using the kerberos method When `null`, the `auth_login_kerberos` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_kerberos.new](#fn-vaultauthloginkerberosnew) constructor.\n - `auth_login_oci` (`list[obj]`): Login to vault using the OCI method When `null`, the `auth_login_oci` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_oci.new](#fn-vaultauthloginocinew) constructor.\n - `auth_login_oidc` (`list[obj]`): Login to vault using the oidc method When `null`, the `auth_login_oidc` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_oidc.new](#fn-vaultauthloginoidcnew) constructor.\n - `auth_login_radius` (`list[obj]`): Login to vault using the radius method When `null`, the `auth_login_radius` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_radius.new](#fn-vaultauthloginradiusnew) constructor.\n - `auth_login_userpass` (`list[obj]`): Login to vault using the userpass method When `null`, the `auth_login_userpass` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_userpass.new](#fn-vaultauthloginuserpassnew) constructor.\n - `client_auth` (`list[obj]`): Client authentication credentials. When `null`, the `client_auth` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.client_auth.new](#fn-vaultclientauthnew) constructor.\n - `headers` (`list[obj]`): The headers to send with each Vault request. When `null`, the `headers` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.headers.new](#fn-vaultheadersnew) constructor.\n - `alias` (`string`): The provider `alias` to set for this instance of the provider block. When `null`, the `alias`\n field will be omitted from the resulting provider block.\n - `src` (`string`): The provider `source` to set on the resulting `required_providers` block. If `src` or `version` is\n set and is not `null`, a `required_providers` block and entry for the provider will be injected into the document.\n - `version` (`string`): The provider `version` to set on the resulting `required_providers` block. If `src` or\n `version` is set and is not `null`, a `required_providers` block and entry for the provider will be injected into the\n document.\n\n\n**Returns**:\n- A mixin object that injects the new provider (and optionally, `required_providers` block) into the root Terraform configuration.\n', args=[]), + '#new':: d.fn(help='\n`vault.provider.new` injects a new `vault` Terraform `provider`\nblock into the root module document.\n\nOptionally, this inserts the provider into the\n[required_providers](https://developer.hashicorp.com/terraform/language/providers/requirements) `terraform` sub block if\nthe `src` and/or `version` parameters are set.\n\n**Args**:\n - `add_address_to_env` (`string`): If true, adds the value of the `address` argument to the Terraform process environment. When `null`, the `add_address_to_env` field will be omitted from the resulting object.\n - `address` (`string`): URL of the root of the target Vault server.\n - `ca_cert_dir` (`string`): Path to directory containing CA certificate files to validate the server's certificate. When `null`, the `ca_cert_dir` field will be omitted from the resulting object.\n - `ca_cert_file` (`string`): Path to a CA certificate file to validate the server's certificate. When `null`, the `ca_cert_file` field will be omitted from the resulting object.\n - `max_lease_ttl_seconds` (`number`): Maximum TTL for secret leases requested by this provider. When `null`, the `max_lease_ttl_seconds` field will be omitted from the resulting object.\n - `max_retries` (`number`): Maximum number of retries when a 5xx error code is encountered. When `null`, the `max_retries` field will be omitted from the resulting object.\n - `max_retries_ccc` (`number`): Maximum number of retries for Client Controlled Consistency related operations When `null`, the `max_retries_ccc` field will be omitted from the resulting object.\n - `namespace` (`string`): The namespace to use. Available only for Vault Enterprise. When `null`, the `namespace` field will be omitted from the resulting object.\n - `skip_child_token` (`bool`): Set this to true to prevent the creation of ephemeral child token used by this provider. When `null`, the `skip_child_token` field will be omitted from the resulting object.\n - `skip_get_vault_version` (`bool`): Skip the dynamic fetching of the Vault server version. When `null`, the `skip_get_vault_version` field will be omitted from the resulting object.\n - `skip_tls_verify` (`bool`): Set this to true only if the target Vault server is an insecure development instance. When `null`, the `skip_tls_verify` field will be omitted from the resulting object.\n - `tls_server_name` (`string`): Name to use as the SNI host when connecting via TLS. When `null`, the `tls_server_name` field will be omitted from the resulting object.\n - `token` (`string`): Token to use to authenticate to Vault. When `null`, the `token` field will be omitted from the resulting object.\n - `token_name` (`string`): Token name to use for creating the Vault child token. When `null`, the `token_name` field will be omitted from the resulting object.\n - `vault_version_override` (`string`): Override the Vault server version, which is normally determined dynamically from the target Vault server When `null`, the `vault_version_override` field will be omitted from the resulting object.\n - `auth_login` (`list[obj]`): Login to vault with an existing auth method using auth/<mount>/login When `null`, the `auth_login` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login.new](#fn-vaultauthloginnew) constructor.\n - `auth_login_aws` (`list[obj]`): Login to vault using the AWS method When `null`, the `auth_login_aws` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_aws.new](#fn-vaultauthloginawsnew) constructor.\n - `auth_login_azure` (`list[obj]`): Login to vault using the azure method When `null`, the `auth_login_azure` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_azure.new](#fn-vaultauthloginazurenew) constructor.\n - `auth_login_cert` (`list[obj]`): Login to vault using the cert method When `null`, the `auth_login_cert` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_cert.new](#fn-vaultauthlogincertnew) constructor.\n - `auth_login_gcp` (`list[obj]`): Login to vault using the gcp method When `null`, the `auth_login_gcp` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_gcp.new](#fn-vaultauthlogingcpnew) constructor.\n - `auth_login_jwt` (`list[obj]`): Login to vault using the jwt method When `null`, the `auth_login_jwt` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_jwt.new](#fn-vaultauthloginjwtnew) constructor.\n - `auth_login_kerberos` (`list[obj]`): Login to vault using the kerberos method When `null`, the `auth_login_kerberos` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_kerberos.new](#fn-vaultauthloginkerberosnew) constructor.\n - `auth_login_oci` (`list[obj]`): Login to vault using the OCI method When `null`, the `auth_login_oci` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_oci.new](#fn-vaultauthloginocinew) constructor.\n - `auth_login_oidc` (`list[obj]`): Login to vault using the oidc method When `null`, the `auth_login_oidc` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_oidc.new](#fn-vaultauthloginoidcnew) constructor.\n - `auth_login_radius` (`list[obj]`): Login to vault using the radius method When `null`, the `auth_login_radius` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_radius.new](#fn-vaultauthloginradiusnew) constructor.\n - `auth_login_token_file` (`list[obj]`): Login to vault using When `null`, the `auth_login_token_file` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_token_file.new](#fn-vaultauthlogintokenfilenew) constructor.\n - `auth_login_userpass` (`list[obj]`): Login to vault using the userpass method When `null`, the `auth_login_userpass` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_userpass.new](#fn-vaultauthloginuserpassnew) constructor.\n - `client_auth` (`list[obj]`): Client authentication credentials. When `null`, the `client_auth` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.client_auth.new](#fn-vaultclientauthnew) constructor.\n - `headers` (`list[obj]`): The headers to send with each Vault request. When `null`, the `headers` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.headers.new](#fn-vaultheadersnew) constructor.\n - `alias` (`string`): The provider `alias` to set for this instance of the provider block. When `null`, the `alias`\n field will be omitted from the resulting provider block.\n - `src` (`string`): The provider `source` to set on the resulting `required_providers` block. If `src` or `version` is\n set and is not `null`, a `required_providers` block and entry for the provider will be injected into the document.\n - `version` (`string`): The provider `version` to set on the resulting `required_providers` block. If `src` or\n `version` is set and is not `null`, a `required_providers` block and entry for the provider will be injected into the\n document.\n\n\n**Returns**:\n- A mixin object that injects the new provider (and optionally, `required_providers` block) into the root Terraform configuration.\n', args=[]), new( address, add_address_to_env=null, @@ -16,6 +16,7 @@ local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet'); auth_login_oci=null, auth_login_oidc=null, auth_login_radius=null, + auth_login_token_file=null, auth_login_userpass=null, ca_cert_dir=null, ca_cert_file=null, @@ -53,6 +54,7 @@ local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet'); auth_login_oci=auth_login_oci, auth_login_oidc=auth_login_oidc, auth_login_radius=auth_login_radius, + auth_login_token_file=auth_login_token_file, auth_login_userpass=auth_login_userpass, ca_cert_dir=ca_cert_dir, ca_cert_file=ca_cert_file, @@ -71,7 +73,7 @@ local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet'); vault_version_override=vault_version_override ) ), - '#newAttrs':: d.fn(help='\n`vault.provider.` constructs a new object with attributes and blocks configured for the `vault`\nTerraform `provider`.\n\nUnlike [vault.provider.new](#fn-vaultnew), this function will not inject the `provider`\nblock into the root Terraform document. Instead, this must be passed in as the `attrs` argument for the\n[tf.withProvider](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withprovider) function to build a complete block.\n\nThis is most useful when you need to preprocess the attributes with functions, conditional, or looping logic prior to\ninjecting into a complete block.\n\n**Args**:\n - `add_address_to_env` (`string`): If true, adds the value of the `address` argument to the Terraform process environment. When `null`, the `add_address_to_env` field will be omitted from the resulting object.\n - `address` (`string`): URL of the root of the target Vault server.\n - `ca_cert_dir` (`string`): Path to directory containing CA certificate files to validate the server's certificate. When `null`, the `ca_cert_dir` field will be omitted from the resulting object.\n - `ca_cert_file` (`string`): Path to a CA certificate file to validate the server's certificate. When `null`, the `ca_cert_file` field will be omitted from the resulting object.\n - `max_lease_ttl_seconds` (`number`): Maximum TTL for secret leases requested by this provider. When `null`, the `max_lease_ttl_seconds` field will be omitted from the resulting object.\n - `max_retries` (`number`): Maximum number of retries when a 5xx error code is encountered. When `null`, the `max_retries` field will be omitted from the resulting object.\n - `max_retries_ccc` (`number`): Maximum number of retries for Client Controlled Consistency related operations When `null`, the `max_retries_ccc` field will be omitted from the resulting object.\n - `namespace` (`string`): The namespace to use. Available only for Vault Enterprise. When `null`, the `namespace` field will be omitted from the resulting object.\n - `skip_child_token` (`bool`): Set this to true to prevent the creation of ephemeral child token used by this provider. When `null`, the `skip_child_token` field will be omitted from the resulting object.\n - `skip_get_vault_version` (`bool`): Skip the dynamic fetching of the Vault server version. When `null`, the `skip_get_vault_version` field will be omitted from the resulting object.\n - `skip_tls_verify` (`bool`): Set this to true only if the target Vault server is an insecure development instance. When `null`, the `skip_tls_verify` field will be omitted from the resulting object.\n - `tls_server_name` (`string`): Name to use as the SNI host when connecting via TLS. When `null`, the `tls_server_name` field will be omitted from the resulting object.\n - `token` (`string`): Token to use to authenticate to Vault. When `null`, the `token` field will be omitted from the resulting object.\n - `token_name` (`string`): Token name to use for creating the Vault child token. When `null`, the `token_name` field will be omitted from the resulting object.\n - `vault_version_override` (`string`): Override the Vault server version, which is normally determined dynamically from the target Vault server When `null`, the `vault_version_override` field will be omitted from the resulting object.\n - `auth_login` (`list[obj]`): Login to vault with an existing auth method using auth/<mount>/login When `null`, the `auth_login` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login.new](#fn-vaultauthloginnew) constructor.\n - `auth_login_aws` (`list[obj]`): Login to vault using the AWS method When `null`, the `auth_login_aws` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_aws.new](#fn-vaultauthloginawsnew) constructor.\n - `auth_login_azure` (`list[obj]`): Login to vault using the azure method When `null`, the `auth_login_azure` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_azure.new](#fn-vaultauthloginazurenew) constructor.\n - `auth_login_cert` (`list[obj]`): Login to vault using the cert method When `null`, the `auth_login_cert` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_cert.new](#fn-vaultauthlogincertnew) constructor.\n - `auth_login_gcp` (`list[obj]`): Login to vault using the gcp method When `null`, the `auth_login_gcp` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_gcp.new](#fn-vaultauthlogingcpnew) constructor.\n - `auth_login_jwt` (`list[obj]`): Login to vault using the jwt method When `null`, the `auth_login_jwt` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_jwt.new](#fn-vaultauthloginjwtnew) constructor.\n - `auth_login_kerberos` (`list[obj]`): Login to vault using the kerberos method When `null`, the `auth_login_kerberos` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_kerberos.new](#fn-vaultauthloginkerberosnew) constructor.\n - `auth_login_oci` (`list[obj]`): Login to vault using the OCI method When `null`, the `auth_login_oci` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_oci.new](#fn-vaultauthloginocinew) constructor.\n - `auth_login_oidc` (`list[obj]`): Login to vault using the oidc method When `null`, the `auth_login_oidc` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_oidc.new](#fn-vaultauthloginoidcnew) constructor.\n - `auth_login_radius` (`list[obj]`): Login to vault using the radius method When `null`, the `auth_login_radius` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_radius.new](#fn-vaultauthloginradiusnew) constructor.\n - `auth_login_userpass` (`list[obj]`): Login to vault using the userpass method When `null`, the `auth_login_userpass` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_userpass.new](#fn-vaultauthloginuserpassnew) constructor.\n - `client_auth` (`list[obj]`): Client authentication credentials. When `null`, the `client_auth` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.client_auth.new](#fn-vaultclientauthnew) constructor.\n - `headers` (`list[obj]`): The headers to send with each Vault request. When `null`, the `headers` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.headers.new](#fn-vaultheadersnew) constructor.\n\n**Returns**:\n - An attribute object that can be used with [tf.withProvider](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withprovider) to construct a new `vault` provider\n configuration into the root Terraform configuration.\n', args=[]), + '#newAttrs':: d.fn(help='\n`vault.provider.` constructs a new object with attributes and blocks configured for the `vault`\nTerraform `provider`.\n\nUnlike [vault.provider.new](#fn-vaultnew), this function will not inject the `provider`\nblock into the root Terraform document. Instead, this must be passed in as the `attrs` argument for the\n[tf.withProvider](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withprovider) function to build a complete block.\n\nThis is most useful when you need to preprocess the attributes with functions, conditional, or looping logic prior to\ninjecting into a complete block.\n\n**Args**:\n - `add_address_to_env` (`string`): If true, adds the value of the `address` argument to the Terraform process environment. When `null`, the `add_address_to_env` field will be omitted from the resulting object.\n - `address` (`string`): URL of the root of the target Vault server.\n - `ca_cert_dir` (`string`): Path to directory containing CA certificate files to validate the server's certificate. When `null`, the `ca_cert_dir` field will be omitted from the resulting object.\n - `ca_cert_file` (`string`): Path to a CA certificate file to validate the server's certificate. When `null`, the `ca_cert_file` field will be omitted from the resulting object.\n - `max_lease_ttl_seconds` (`number`): Maximum TTL for secret leases requested by this provider. When `null`, the `max_lease_ttl_seconds` field will be omitted from the resulting object.\n - `max_retries` (`number`): Maximum number of retries when a 5xx error code is encountered. When `null`, the `max_retries` field will be omitted from the resulting object.\n - `max_retries_ccc` (`number`): Maximum number of retries for Client Controlled Consistency related operations When `null`, the `max_retries_ccc` field will be omitted from the resulting object.\n - `namespace` (`string`): The namespace to use. Available only for Vault Enterprise. When `null`, the `namespace` field will be omitted from the resulting object.\n - `skip_child_token` (`bool`): Set this to true to prevent the creation of ephemeral child token used by this provider. When `null`, the `skip_child_token` field will be omitted from the resulting object.\n - `skip_get_vault_version` (`bool`): Skip the dynamic fetching of the Vault server version. When `null`, the `skip_get_vault_version` field will be omitted from the resulting object.\n - `skip_tls_verify` (`bool`): Set this to true only if the target Vault server is an insecure development instance. When `null`, the `skip_tls_verify` field will be omitted from the resulting object.\n - `tls_server_name` (`string`): Name to use as the SNI host when connecting via TLS. When `null`, the `tls_server_name` field will be omitted from the resulting object.\n - `token` (`string`): Token to use to authenticate to Vault. When `null`, the `token` field will be omitted from the resulting object.\n - `token_name` (`string`): Token name to use for creating the Vault child token. When `null`, the `token_name` field will be omitted from the resulting object.\n - `vault_version_override` (`string`): Override the Vault server version, which is normally determined dynamically from the target Vault server When `null`, the `vault_version_override` field will be omitted from the resulting object.\n - `auth_login` (`list[obj]`): Login to vault with an existing auth method using auth/<mount>/login When `null`, the `auth_login` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login.new](#fn-vaultauthloginnew) constructor.\n - `auth_login_aws` (`list[obj]`): Login to vault using the AWS method When `null`, the `auth_login_aws` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_aws.new](#fn-vaultauthloginawsnew) constructor.\n - `auth_login_azure` (`list[obj]`): Login to vault using the azure method When `null`, the `auth_login_azure` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_azure.new](#fn-vaultauthloginazurenew) constructor.\n - `auth_login_cert` (`list[obj]`): Login to vault using the cert method When `null`, the `auth_login_cert` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_cert.new](#fn-vaultauthlogincertnew) constructor.\n - `auth_login_gcp` (`list[obj]`): Login to vault using the gcp method When `null`, the `auth_login_gcp` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_gcp.new](#fn-vaultauthlogingcpnew) constructor.\n - `auth_login_jwt` (`list[obj]`): Login to vault using the jwt method When `null`, the `auth_login_jwt` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_jwt.new](#fn-vaultauthloginjwtnew) constructor.\n - `auth_login_kerberos` (`list[obj]`): Login to vault using the kerberos method When `null`, the `auth_login_kerberos` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_kerberos.new](#fn-vaultauthloginkerberosnew) constructor.\n - `auth_login_oci` (`list[obj]`): Login to vault using the OCI method When `null`, the `auth_login_oci` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_oci.new](#fn-vaultauthloginocinew) constructor.\n - `auth_login_oidc` (`list[obj]`): Login to vault using the oidc method When `null`, the `auth_login_oidc` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_oidc.new](#fn-vaultauthloginoidcnew) constructor.\n - `auth_login_radius` (`list[obj]`): Login to vault using the radius method When `null`, the `auth_login_radius` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_radius.new](#fn-vaultauthloginradiusnew) constructor.\n - `auth_login_token_file` (`list[obj]`): Login to vault using When `null`, the `auth_login_token_file` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_token_file.new](#fn-vaultauthlogintokenfilenew) constructor.\n - `auth_login_userpass` (`list[obj]`): Login to vault using the userpass method When `null`, the `auth_login_userpass` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_userpass.new](#fn-vaultauthloginuserpassnew) constructor.\n - `client_auth` (`list[obj]`): Client authentication credentials. When `null`, the `client_auth` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.client_auth.new](#fn-vaultclientauthnew) constructor.\n - `headers` (`list[obj]`): The headers to send with each Vault request. When `null`, the `headers` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.headers.new](#fn-vaultheadersnew) constructor.\n\n**Returns**:\n - An attribute object that can be used with [tf.withProvider](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withprovider) to construct a new `vault` provider\n configuration into the root Terraform configuration.\n', args=[]), newAttrs( address, add_address_to_env=null, @@ -85,6 +87,7 @@ local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet'); auth_login_oci=null, auth_login_oidc=null, auth_login_radius=null, + auth_login_token_file=null, auth_login_userpass=null, ca_cert_dir=null, ca_cert_file=null, @@ -114,6 +117,7 @@ local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet'); auth_login_oci: auth_login_oci, auth_login_oidc: auth_login_oidc, auth_login_radius: auth_login_radius, + auth_login_token_file: auth_login_token_file, auth_login_userpass: auth_login_userpass, ca_cert_dir: ca_cert_dir, ca_cert_file: ca_cert_file, @@ -327,6 +331,16 @@ local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet'); username: username, }), }, + auth_login_token_file:: { + '#new':: d.fn(help='\n`vault.auth_login_token_file.new` constructs a new object with attributes and blocks configured for the `auth_login_token_file`\nTerraform sub block.\n\n\n\n**Args**:\n - `filename` (`string`): The name of a file containing a single line that is a valid Vault token\n - `namespace` (`string`): The authentication engine's namespace. When `null`, the `namespace` field will be omitted from the resulting object.\n\n**Returns**:\n - An attribute object that represents the `auth_login_token_file` sub block.\n', args=[]), + new( + filename, + namespace=null + ):: std.prune(a={ + filename: filename, + namespace: namespace, + }), + }, auth_login_userpass:: { '#new':: d.fn(help='\n`vault.auth_login_userpass.new` constructs a new object with attributes and blocks configured for the `auth_login_userpass`\nTerraform sub block.\n\n\n\n**Args**:\n - `mount` (`string`): The path where the authentication engine is mounted. When `null`, the `mount` field will be omitted from the resulting object.\n - `namespace` (`string`): The authentication engine's namespace. When `null`, the `namespace` field will be omitted from the resulting object.\n - `password` (`string`): Login with password When `null`, the `password` field will be omitted from the resulting object.\n - `password_file` (`string`): Login with password from a file When `null`, the `password_file` field will be omitted from the resulting object.\n - `username` (`string`): Login with username\n\n**Returns**:\n - An attribute object that represents the `auth_login_userpass` sub block.\n', args=[]), new( diff --git a/3.x/_gen/resources/pki_secret_backend_config_issuers.libsonnet b/3.x/_gen/resources/pki_secret_backend_config_issuers.libsonnet new file mode 100644 index 0000000..4080cb6 --- /dev/null +++ b/3.x/_gen/resources/pki_secret_backend_config_issuers.libsonnet @@ -0,0 +1,76 @@ +local tf = (import 'github.com/tf-libsonnet/core/main.libsonnet'); +local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet'); +{ + '#':: d.pkg(name='pki_secret_backend_config_issuers', url='', help='`pki_secret_backend_config_issuers` represents the `vault_pki_secret_backend_config_issuers` Terraform resource.\n\n\n\nThis package contains functions and utilities for setting up the resource using Jsonnet code.\n'), + '#new':: d.fn(help="\n`vault.pki_secret_backend_config_issuers.new` injects a new `vault_pki_secret_backend_config_issuers` Terraform `resource`\nblock into the root module document.\n\nAdditionally, this inserts a private function into the `_ref` attribute that generates references to attributes of the\nresource. For example, if you added a new instance to the root using:\n\n # arguments omitted for brevity\n vault.pki_secret_backend_config_issuers.new('some_id')\n\nYou can get the reference to the `id` field of the created `vault.pki_secret_backend_config_issuers` using the reference:\n\n $._ref.vault_pki_secret_backend_config_issuers.some_id.get('id')\n\nThis is the same as directly entering `\"${ vault_pki_secret_backend_config_issuers.some_id.id }\"` as the value.\n\nNOTE: if you are chaining multiple resources together in a merge operation, you may not be able to use `super`, `self`,\nor `$` to refer to the root object. Instead, make an explicit outer object using `local`.\n\n**Args**:\n - `resourceLabel` (`string`): The name label of the block.\n - `backend` (`string`): Full path where PKI backend is mounted.\n - `default` (`string`): Specifies the default issuer by ID. When `null`, the `default` field will be omitted from the resulting object.\n - `default_follows_latest_issuer` (`bool`): Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. When `null`, the `default_follows_latest_issuer` field will be omitted from the resulting object.\n - `namespace` (`string`): Target namespace. (requires Enterprise) When `null`, the `namespace` field will be omitted from the resulting object.\n\n**Returns**:\n- A mixin object that injects the new resource into the root Terraform configuration.\n", args=[]), + new( + resourceLabel, + backend, + default=null, + default_follows_latest_issuer=null, + namespace=null, + _meta={} + ):: tf.withResource( + type='vault_pki_secret_backend_config_issuers', + label=resourceLabel, + attrs=self.newAttrs( + backend=backend, + default=default, + default_follows_latest_issuer=default_follows_latest_issuer, + namespace=namespace + ), + _meta=_meta + ), + '#newAttrs':: d.fn(help='\n`vault.pki_secret_backend_config_issuers.newAttrs` constructs a new object with attributes and blocks configured for the `pki_secret_backend_config_issuers`\nTerraform resource.\n\nUnlike [vault.pki_secret_backend_config_issuers.new](#fn-new), this function will not inject the `resource`\nblock into the root Terraform document. Instead, this must be passed in as the `attrs` argument for the\n[tf.withResource](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withresource) function to build a complete block.\n\nThis is most useful when you need to preprocess the attributes with functions, conditional, or looping logic prior to\ninjecting into a complete block.\n\n**Args**:\n - `backend` (`string`): Full path where PKI backend is mounted.\n - `default` (`string`): Specifies the default issuer by ID. When `null`, the `default` field will be omitted from the resulting object.\n - `default_follows_latest_issuer` (`bool`): Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. When `null`, the `default_follows_latest_issuer` field will be omitted from the resulting object.\n - `namespace` (`string`): Target namespace. (requires Enterprise) When `null`, the `namespace` field will be omitted from the resulting object.\n\n**Returns**:\n - An attribute object that can be used with [tf.withResource](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withresource) to construct a new `pki_secret_backend_config_issuers` resource into the root Terraform configuration.\n', args=[]), + newAttrs( + backend, + default=null, + default_follows_latest_issuer=null, + namespace=null + ):: std.prune(a={ + backend: backend, + default: default, + default_follows_latest_issuer: default_follows_latest_issuer, + namespace: namespace, + }), + '#withBackend':: d.fn(help='`vault.string.withBackend` constructs a mixin object that can be merged into the `string`\nTerraform resource block to set or update the backend field.\n\n\n\n**Args**:\n - `resourceLabel` (`string`): The name label of the block to update.\n - `value` (`string`): The value to set for the `backend` field.\n', args=[]), + withBackend(resourceLabel, value): { + resource+: { + vault_pki_secret_backend_config_issuers+: { + [resourceLabel]+: { + backend: value, + }, + }, + }, + }, + '#withDefault':: d.fn(help='`vault.string.withDefault` constructs a mixin object that can be merged into the `string`\nTerraform resource block to set or update the default field.\n\n\n\n**Args**:\n - `resourceLabel` (`string`): The name label of the block to update.\n - `value` (`string`): The value to set for the `default` field.\n', args=[]), + withDefault(resourceLabel, value): { + resource+: { + vault_pki_secret_backend_config_issuers+: { + [resourceLabel]+: { + default: value, + }, + }, + }, + }, + '#withDefaultFollowsLatestIssuer':: d.fn(help='`vault.bool.withDefaultFollowsLatestIssuer` constructs a mixin object that can be merged into the `bool`\nTerraform resource block to set or update the default_follows_latest_issuer field.\n\n\n\n**Args**:\n - `resourceLabel` (`string`): The name label of the block to update.\n - `value` (`bool`): The value to set for the `default_follows_latest_issuer` field.\n', args=[]), + withDefaultFollowsLatestIssuer(resourceLabel, value): { + resource+: { + vault_pki_secret_backend_config_issuers+: { + [resourceLabel]+: { + default_follows_latest_issuer: value, + }, + }, + }, + }, + '#withNamespace':: d.fn(help='`vault.string.withNamespace` constructs a mixin object that can be merged into the `string`\nTerraform resource block to set or update the namespace field.\n\n\n\n**Args**:\n - `resourceLabel` (`string`): The name label of the block to update.\n - `value` (`string`): The value to set for the `namespace` field.\n', args=[]), + withNamespace(resourceLabel, value): { + resource+: { + vault_pki_secret_backend_config_issuers+: { + [resourceLabel]+: { + namespace: value, + }, + }, + }, + }, +} diff --git a/docs/3.x/README.md b/docs/3.x/README.md index 0e89d4d..cd01b9e 100644 --- a/docs/3.x/README.md +++ b/docs/3.x/README.md @@ -114,6 +114,7 @@ project. * [password_policy](password_policy.md) * [pki_secret_backend_cert](pki_secret_backend_cert.md) * [pki_secret_backend_config_ca](pki_secret_backend_config_ca.md) +* [pki_secret_backend_config_issuers](pki_secret_backend_config_issuers.md) * [pki_secret_backend_config_urls](pki_secret_backend_config_urls.md) * [pki_secret_backend_crl_config](pki_secret_backend_crl_config.md) * [pki_secret_backend_intermediate_cert_request](pki_secret_backend_intermediate_cert_request.md) diff --git a/docs/3.x/pki_secret_backend_config_issuers.md b/docs/3.x/pki_secret_backend_config_issuers.md new file mode 100644 index 0000000..e4234c9 --- /dev/null +++ b/docs/3.x/pki_secret_backend_config_issuers.md @@ -0,0 +1,149 @@ +--- +permalink: /pki_secret_backend_config_issuers/ +--- + +# pki_secret_backend_config_issuers + +`pki_secret_backend_config_issuers` represents the `vault_pki_secret_backend_config_issuers` Terraform resource. + + + +This package contains functions and utilities for setting up the resource using Jsonnet code. + + +## Index + +* [`fn new()`](#fn-new) +* [`fn newAttrs()`](#fn-newattrs) +* [`fn withBackend()`](#fn-withbackend) +* [`fn withDefault()`](#fn-withdefault) +* [`fn withDefaultFollowsLatestIssuer()`](#fn-withdefaultfollowslatestissuer) +* [`fn withNamespace()`](#fn-withnamespace) + +## Fields + +### fn new + +```ts +new() +``` + + +`vault.pki_secret_backend_config_issuers.new` injects a new `vault_pki_secret_backend_config_issuers` Terraform `resource` +block into the root module document. + +Additionally, this inserts a private function into the `_ref` attribute that generates references to attributes of the +resource. For example, if you added a new instance to the root using: + + # arguments omitted for brevity + vault.pki_secret_backend_config_issuers.new('some_id') + +You can get the reference to the `id` field of the created `vault.pki_secret_backend_config_issuers` using the reference: + + $._ref.vault_pki_secret_backend_config_issuers.some_id.get('id') + +This is the same as directly entering `"${ vault_pki_secret_backend_config_issuers.some_id.id }"` as the value. + +NOTE: if you are chaining multiple resources together in a merge operation, you may not be able to use `super`, `self`, +or `$` to refer to the root object. Instead, make an explicit outer object using `local`. + +**Args**: + - `resourceLabel` (`string`): The name label of the block. + - `backend` (`string`): Full path where PKI backend is mounted. + - `default` (`string`): Specifies the default issuer by ID. When `null`, the `default` field will be omitted from the resulting object. + - `default_follows_latest_issuer` (`bool`): Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. When `null`, the `default_follows_latest_issuer` field will be omitted from the resulting object. + - `namespace` (`string`): Target namespace. (requires Enterprise) When `null`, the `namespace` field will be omitted from the resulting object. + +**Returns**: +- A mixin object that injects the new resource into the root Terraform configuration. + + +### fn newAttrs + +```ts +newAttrs() +``` + + +`vault.pki_secret_backend_config_issuers.newAttrs` constructs a new object with attributes and blocks configured for the `pki_secret_backend_config_issuers` +Terraform resource. + +Unlike [vault.pki_secret_backend_config_issuers.new](#fn-new), this function will not inject the `resource` +block into the root Terraform document. Instead, this must be passed in as the `attrs` argument for the +[tf.withResource](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withresource) function to build a complete block. + +This is most useful when you need to preprocess the attributes with functions, conditional, or looping logic prior to +injecting into a complete block. + +**Args**: + - `backend` (`string`): Full path where PKI backend is mounted. + - `default` (`string`): Specifies the default issuer by ID. When `null`, the `default` field will be omitted from the resulting object. + - `default_follows_latest_issuer` (`bool`): Specifies whether a root creation or an issuer import operation updates the default issuer to the newly added issuer. When `null`, the `default_follows_latest_issuer` field will be omitted from the resulting object. + - `namespace` (`string`): Target namespace. (requires Enterprise) When `null`, the `namespace` field will be omitted from the resulting object. + +**Returns**: + - An attribute object that can be used with [tf.withResource](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withresource) to construct a new `pki_secret_backend_config_issuers` resource into the root Terraform configuration. + + +### fn withBackend + +```ts +withBackend() +``` + +`vault.string.withBackend` constructs a mixin object that can be merged into the `string` +Terraform resource block to set or update the backend field. + + + +**Args**: + - `resourceLabel` (`string`): The name label of the block to update. + - `value` (`string`): The value to set for the `backend` field. + + +### fn withDefault + +```ts +withDefault() +``` + +`vault.string.withDefault` constructs a mixin object that can be merged into the `string` +Terraform resource block to set or update the default field. + + + +**Args**: + - `resourceLabel` (`string`): The name label of the block to update. + - `value` (`string`): The value to set for the `default` field. + + +### fn withDefaultFollowsLatestIssuer + +```ts +withDefaultFollowsLatestIssuer() +``` + +`vault.bool.withDefaultFollowsLatestIssuer` constructs a mixin object that can be merged into the `bool` +Terraform resource block to set or update the default_follows_latest_issuer field. + + + +**Args**: + - `resourceLabel` (`string`): The name label of the block to update. + - `value` (`bool`): The value to set for the `default_follows_latest_issuer` field. + + +### fn withNamespace + +```ts +withNamespace() +``` + +`vault.string.withNamespace` constructs a mixin object that can be merged into the `string` +Terraform resource block to set or update the namespace field. + + + +**Args**: + - `resourceLabel` (`string`): The name label of the block to update. + - `value` (`string`): The value to set for the `namespace` field. diff --git a/docs/3.x/provider.md b/docs/3.x/provider.md index 8e0f458..e05cc29 100644 --- a/docs/3.x/provider.md +++ b/docs/3.x/provider.md @@ -35,6 +35,8 @@ This package contains functions and utilities for setting up the provider using * [`fn new()`](#fn-auth_login_oidcnew) * [`obj auth_login_radius`](#obj-auth_login_radius) * [`fn new()`](#fn-auth_login_radiusnew) +* [`obj auth_login_token_file`](#obj-auth_login_token_file) + * [`fn new()`](#fn-auth_login_token_filenew) * [`obj auth_login_userpass`](#obj-auth_login_userpass) * [`fn new()`](#fn-auth_login_userpassnew) * [`obj client_auth`](#obj-client_auth) @@ -84,6 +86,7 @@ the `src` and/or `version` parameters are set. - `auth_login_oci` (`list[obj]`): Login to vault using the OCI method When `null`, the `auth_login_oci` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_oci.new](#fn-vaultauthloginocinew) constructor. - `auth_login_oidc` (`list[obj]`): Login to vault using the oidc method When `null`, the `auth_login_oidc` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_oidc.new](#fn-vaultauthloginoidcnew) constructor. - `auth_login_radius` (`list[obj]`): Login to vault using the radius method When `null`, the `auth_login_radius` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_radius.new](#fn-vaultauthloginradiusnew) constructor. + - `auth_login_token_file` (`list[obj]`): Login to vault using When `null`, the `auth_login_token_file` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_token_file.new](#fn-vaultauthlogintokenfilenew) constructor. - `auth_login_userpass` (`list[obj]`): Login to vault using the userpass method When `null`, the `auth_login_userpass` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_userpass.new](#fn-vaultauthloginuserpassnew) constructor. - `client_auth` (`list[obj]`): Client authentication credentials. When `null`, the `client_auth` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.client_auth.new](#fn-vaultclientauthnew) constructor. - `headers` (`list[obj]`): The headers to send with each Vault request. When `null`, the `headers` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.headers.new](#fn-vaultheadersnew) constructor. @@ -143,6 +146,7 @@ injecting into a complete block. - `auth_login_oci` (`list[obj]`): Login to vault using the OCI method When `null`, the `auth_login_oci` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_oci.new](#fn-vaultauthloginocinew) constructor. - `auth_login_oidc` (`list[obj]`): Login to vault using the oidc method When `null`, the `auth_login_oidc` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_oidc.new](#fn-vaultauthloginoidcnew) constructor. - `auth_login_radius` (`list[obj]`): Login to vault using the radius method When `null`, the `auth_login_radius` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_radius.new](#fn-vaultauthloginradiusnew) constructor. + - `auth_login_token_file` (`list[obj]`): Login to vault using When `null`, the `auth_login_token_file` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_token_file.new](#fn-vaultauthlogintokenfilenew) constructor. - `auth_login_userpass` (`list[obj]`): Login to vault using the userpass method When `null`, the `auth_login_userpass` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.auth_login_userpass.new](#fn-vaultauthloginuserpassnew) constructor. - `client_auth` (`list[obj]`): Client authentication credentials. When `null`, the `client_auth` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.client_auth.new](#fn-vaultclientauthnew) constructor. - `headers` (`list[obj]`): The headers to send with each Vault request. When `null`, the `headers` sub block will be omitted from the resulting object. When setting the sub block, it is recommended to construct the object using the [vault.provider.headers.new](#fn-vaultheadersnew) constructor. @@ -440,6 +444,30 @@ Terraform sub block. - An attribute object that represents the `auth_login_radius` sub block. +## obj auth_login_token_file + + + +### fn auth_login_token_file.new + +```ts +new() +``` + + +`vault.auth_login_token_file.new` constructs a new object with attributes and blocks configured for the `auth_login_token_file` +Terraform sub block. + + + +**Args**: + - `filename` (`string`): The name of a file containing a single line that is a valid Vault token + - `namespace` (`string`): The authentication engine's namespace. When `null`, the `namespace` field will be omitted from the resulting object. + +**Returns**: + - An attribute object that represents the `auth_login_token_file` sub block. + + ## obj auth_login_userpass