import * as pulumi from "@pulumi/pulumi"; import * as inputs from "./types/input"; /** * The provider type for the vault package. By default, resources use package-wide configuration * settings, however an explicit `Provider` instance may be created and passed during resource * construction to achieve fine-grained programmatic control over provider settings. See the * [documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information. */ export declare class Provider extends pulumi.ProviderResource { /** * Returns true if the given object is an instance of Provider. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj: any): obj is Provider; readonly addAddressToEnv: pulumi.Output; /** * URL of the root of the target Vault server. */ readonly address: pulumi.Output; /** * Path to directory containing CA certificate files to validate the server's certificate. */ readonly caCertDir: pulumi.Output; /** * Path to a CA certificate file to validate the server's certificate. */ readonly caCertFile: pulumi.Output; /** * The namespace to use. Available only for Vault Enterprise. */ readonly namespace: pulumi.Output; /** * Name to use as the SNI host when connecting via TLS. */ readonly tlsServerName: pulumi.Output; /** * Token to use to authenticate to Vault. */ readonly token: pulumi.Output; /** * Token name to use for creating the Vault child token. */ readonly tokenName: pulumi.Output; /** * Override the Vault server version, which is normally determined dynamically from the target Vault server */ readonly vaultVersionOverride: pulumi.Output; /** * Create a Provider resource with the given unique name, arguments, and options. * * @param name The _unique_ name of the resource. * @param args The arguments to use to populate this resource's properties. * @param opts A bag of options that control this resource's behavior. */ constructor(name: string, args?: ProviderArgs, opts?: pulumi.ResourceOptions); /** * This function returns a Terraform config object with terraform-namecased keys,to be used with the Terraform Module Provider. */ terraformConfig(): pulumi.Output; } /** * The set of arguments for constructing a Provider resource. */ export interface ProviderArgs { addAddressToEnv?: pulumi.Input; /** * URL of the root of the target Vault server. */ address?: pulumi.Input; /** * Login to vault with an existing auth method using auth//login */ authLogin?: pulumi.Input; /** * Login to vault using the AWS method */ authLoginAws?: pulumi.Input; /** * Login to vault using the azure method */ authLoginAzure?: pulumi.Input; /** * Login to vault using the cert method */ authLoginCert?: pulumi.Input; /** * Login to vault using the gcp method */ authLoginGcp?: pulumi.Input; /** * Login to vault using the jwt method */ authLoginJwt?: pulumi.Input; /** * Login to vault using the kerberos method */ authLoginKerberos?: pulumi.Input; /** * Login to vault using the OCI method */ authLoginOci?: pulumi.Input; /** * Login to vault using the oidc method */ authLoginOidc?: pulumi.Input; /** * Login to vault using the radius method */ authLoginRadius?: pulumi.Input; /** * Login to vault using */ authLoginTokenFile?: pulumi.Input; /** * Login to vault using the userpass method */ authLoginUserpass?: pulumi.Input; /** * Path to directory containing CA certificate files to validate the server's certificate. */ caCertDir?: pulumi.Input; /** * Path to a CA certificate file to validate the server's certificate. */ caCertFile?: pulumi.Input; /** * Client authentication credentials. */ clientAuth?: pulumi.Input; /** * The headers to send with each Vault request. */ headers?: pulumi.Input[]>; /** * Maximum TTL for secret leases requested by this provider. */ maxLeaseTtlSeconds?: pulumi.Input; /** * Maximum number of retries when a 5xx error code is encountered. */ maxRetries?: pulumi.Input; /** * Maximum number of retries for Client Controlled Consistency related operations */ maxRetriesCcc?: pulumi.Input; /** * The namespace to use. Available only for Vault Enterprise. */ namespace?: pulumi.Input; /** * In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the * token namespace as the root namespace for all resources. */ setNamespaceFromToken?: pulumi.Input; /** * Set this to true to prevent the creation of ephemeral child token used by this provider. */ skipChildToken?: pulumi.Input; /** * Skip the dynamic fetching of the Vault server version. */ skipGetVaultVersion?: pulumi.Input; /** * Set this to true only if the target Vault server is an insecure development instance. */ skipTlsVerify?: pulumi.Input; /** * Name to use as the SNI host when connecting via TLS. */ tlsServerName?: pulumi.Input; /** * Token to use to authenticate to Vault. */ token?: pulumi.Input; /** * Token name to use for creating the Vault child token. */ tokenName?: pulumi.Input; /** * Override the Vault server version, which is normally determined dynamically from the target Vault server */ vaultVersionOverride?: pulumi.Input; } export declare namespace Provider { /** * The results of the Provider.terraformConfig method. */ interface TerraformConfigResult { readonly result: { [key: string]: any; }; } }