pulumi-oci 2.12.0a1728642710__py3-none-any.whl → 2.13.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +24 -19
- pulumi_oci/containerengine/_inputs.py +341 -0
- pulumi_oci/containerengine/cluster.py +64 -0
- pulumi_oci/containerengine/get_cluster.py +12 -1
- pulumi_oci/containerengine/outputs.py +582 -0
- pulumi_oci/core/_inputs.py +299 -37
- pulumi_oci/core/boot_volume.py +90 -5
- pulumi_oci/core/get_block_volume_replica.py +15 -1
- pulumi_oci/core/get_boot_volume.py +15 -4
- pulumi_oci/core/get_boot_volume_replica.py +15 -1
- pulumi_oci/core/get_volume.py +18 -4
- pulumi_oci/core/instance_configuration.py +4 -0
- pulumi_oci/core/outputs.py +573 -46
- pulumi_oci/core/volume.py +110 -12
- pulumi_oci/core/volume_backup_policy_assignment.py +68 -19
- pulumi_oci/core/volume_group.py +56 -5
- pulumi_oci/datasafe/__init__.py +1 -0
- pulumi_oci/datasafe/generate_on_prem_connector_configuration.py +271 -0
- pulumi_oci/desktops/_inputs.py +175 -13
- pulumi_oci/desktops/desktop_pool.py +67 -0
- pulumi_oci/desktops/get_desktop_pool.py +16 -1
- pulumi_oci/desktops/outputs.py +339 -18
- pulumi_oci/dns/__init__.py +2 -0
- pulumi_oci/dns/_inputs.py +1157 -12
- pulumi_oci/dns/action_create_zone_from_zone_file.py +42 -2
- pulumi_oci/dns/get_records.py +45 -13
- pulumi_oci/dns/get_resolver.py +8 -6
- pulumi_oci/dns/get_resolver_endpoint.py +8 -6
- pulumi_oci/dns/get_resolver_endpoints.py +2 -2
- pulumi_oci/dns/get_resolvers.py +12 -12
- pulumi_oci/dns/get_rrset.py +16 -16
- pulumi_oci/dns/get_rrsets.py +12 -10
- pulumi_oci/dns/get_view.py +8 -4
- pulumi_oci/dns/get_views.py +12 -12
- pulumi_oci/dns/get_zones.py +33 -13
- pulumi_oci/dns/outputs.py +1388 -79
- pulumi_oci/dns/record.py +12 -12
- pulumi_oci/dns/resolver.py +7 -7
- pulumi_oci/dns/resolver_endpoint.py +2 -2
- pulumi_oci/dns/rrset.py +50 -41
- pulumi_oci/dns/zone.py +176 -17
- pulumi_oci/dns/zone_promote_dnssec_key_version.py +328 -0
- pulumi_oci/dns/zone_stage_dnssec_key_version.py +318 -0
- pulumi_oci/goldengate/__init__.py +1 -0
- pulumi_oci/goldengate/_inputs.py +165 -0
- pulumi_oci/goldengate/connection.py +49 -35
- pulumi_oci/goldengate/database_registration.py +7 -7
- pulumi_oci/goldengate/deployment.py +79 -4
- pulumi_oci/goldengate/get_deployment.py +30 -2
- pulumi_oci/goldengate/get_deployment_environments.py +144 -0
- pulumi_oci/goldengate/outputs.py +409 -2
- pulumi_oci/pulumi-plugin.json +1 -1
- {pulumi_oci-2.12.0a1728642710.dist-info → pulumi_oci-2.13.0.dist-info}/METADATA +1 -1
- {pulumi_oci-2.12.0a1728642710.dist-info → pulumi_oci-2.13.0.dist-info}/RECORD +56 -61
- {pulumi_oci-2.12.0a1728642710.dist-info → pulumi_oci-2.13.0.dist-info}/WHEEL +1 -1
- pulumi_oci/globallydistributeddatabase/__init__.py +0 -15
- pulumi_oci/globallydistributeddatabase/_inputs.py +0 -1289
- pulumi_oci/globallydistributeddatabase/get_private_endpoint.py +0 -323
- pulumi_oci/globallydistributeddatabase/get_private_endpoints.py +0 -191
- pulumi_oci/globallydistributeddatabase/get_sharded_database.py +0 -660
- pulumi_oci/globallydistributeddatabase/get_sharded_databases.py +0 -191
- pulumi_oci/globallydistributeddatabase/outputs.py +0 -2063
- pulumi_oci/globallydistributeddatabase/private_endpoint.py +0 -747
- pulumi_oci/globallydistributeddatabase/sharded_database.py +0 -1821
- {pulumi_oci-2.12.0a1728642710.dist-info → pulumi_oci-2.13.0.dist-info}/top_level.txt +0 -0
@@ -28,6 +28,9 @@ __all__ = [
|
|
28
28
|
'ClusterOptionsAddOns',
|
29
29
|
'ClusterOptionsAdmissionControllerOptions',
|
30
30
|
'ClusterOptionsKubernetesNetworkConfig',
|
31
|
+
'ClusterOptionsOpenIdConnectDiscovery',
|
32
|
+
'ClusterOptionsOpenIdConnectTokenAuthenticationConfig',
|
33
|
+
'ClusterOptionsOpenIdConnectTokenAuthenticationConfigRequiredClaim',
|
31
34
|
'ClusterOptionsPersistentVolumeConfig',
|
32
35
|
'ClusterOptionsServiceLbConfig',
|
33
36
|
'ContainerInstanceContainer',
|
@@ -83,6 +86,9 @@ __all__ = [
|
|
83
86
|
'GetClusterOptionAdmissionControllerOptionResult',
|
84
87
|
'GetClusterOptionClusterPodNetworkOptionResult',
|
85
88
|
'GetClusterOptionKubernetesNetworkConfigResult',
|
89
|
+
'GetClusterOptionOpenIdConnectDiscoveryResult',
|
90
|
+
'GetClusterOptionOpenIdConnectTokenAuthenticationConfigResult',
|
91
|
+
'GetClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimResult',
|
86
92
|
'GetClusterOptionPersistentVolumeConfigResult',
|
87
93
|
'GetClusterOptionServiceLbConfigResult',
|
88
94
|
'GetClusterWorkloadMappingsFilterResult',
|
@@ -98,6 +104,9 @@ __all__ = [
|
|
98
104
|
'GetClustersClusterOptionAddOnResult',
|
99
105
|
'GetClustersClusterOptionAdmissionControllerOptionResult',
|
100
106
|
'GetClustersClusterOptionKubernetesNetworkConfigResult',
|
107
|
+
'GetClustersClusterOptionOpenIdConnectDiscoveryResult',
|
108
|
+
'GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigResult',
|
109
|
+
'GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimResult',
|
101
110
|
'GetClustersClusterOptionPersistentVolumeConfigResult',
|
102
111
|
'GetClustersClusterOptionServiceLbConfigResult',
|
103
112
|
'GetClustersFilterResult',
|
@@ -663,6 +672,10 @@ class ClusterOptions(dict):
|
|
663
672
|
suggest = "admission_controller_options"
|
664
673
|
elif key == "kubernetesNetworkConfig":
|
665
674
|
suggest = "kubernetes_network_config"
|
675
|
+
elif key == "openIdConnectDiscovery":
|
676
|
+
suggest = "open_id_connect_discovery"
|
677
|
+
elif key == "openIdConnectTokenAuthenticationConfig":
|
678
|
+
suggest = "open_id_connect_token_authentication_config"
|
666
679
|
elif key == "persistentVolumeConfig":
|
667
680
|
suggest = "persistent_volume_config"
|
668
681
|
elif key == "serviceLbConfig":
|
@@ -685,6 +698,8 @@ class ClusterOptions(dict):
|
|
685
698
|
add_ons: Optional['outputs.ClusterOptionsAddOns'] = None,
|
686
699
|
admission_controller_options: Optional['outputs.ClusterOptionsAdmissionControllerOptions'] = None,
|
687
700
|
kubernetes_network_config: Optional['outputs.ClusterOptionsKubernetesNetworkConfig'] = None,
|
701
|
+
open_id_connect_discovery: Optional['outputs.ClusterOptionsOpenIdConnectDiscovery'] = None,
|
702
|
+
open_id_connect_token_authentication_config: Optional['outputs.ClusterOptionsOpenIdConnectTokenAuthenticationConfig'] = None,
|
688
703
|
persistent_volume_config: Optional['outputs.ClusterOptionsPersistentVolumeConfig'] = None,
|
689
704
|
service_lb_config: Optional['outputs.ClusterOptionsServiceLbConfig'] = None,
|
690
705
|
service_lb_subnet_ids: Optional[Sequence[str]] = None):
|
@@ -692,6 +707,8 @@ class ClusterOptions(dict):
|
|
692
707
|
:param 'ClusterOptionsAddOnsArgs' add_ons: Configurable cluster add-ons
|
693
708
|
:param 'ClusterOptionsAdmissionControllerOptionsArgs' admission_controller_options: (Updatable) Configurable cluster admission controllers
|
694
709
|
:param 'ClusterOptionsKubernetesNetworkConfigArgs' kubernetes_network_config: Network configuration for Kubernetes.
|
710
|
+
:param 'ClusterOptionsOpenIdConnectDiscoveryArgs' open_id_connect_discovery: (Updatable) The property that define the status of the OIDC Discovery feature for a cluster.
|
711
|
+
:param 'ClusterOptionsOpenIdConnectTokenAuthenticationConfigArgs' open_id_connect_token_authentication_config: (Updatable) The properties that configure OIDC token authentication in kube-apiserver. For more information, see [Configuring the API Server](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-flags).
|
695
712
|
:param 'ClusterOptionsPersistentVolumeConfigArgs' persistent_volume_config: (Updatable) Configuration to be applied to block volumes created by Kubernetes Persistent Volume Claims (PVC)
|
696
713
|
:param 'ClusterOptionsServiceLbConfigArgs' service_lb_config: (Updatable) Configuration to be applied to load balancers created by Kubernetes services
|
697
714
|
:param Sequence[str] service_lb_subnet_ids: The OCIDs of the subnets used for Kubernetes services load balancers.
|
@@ -702,6 +719,10 @@ class ClusterOptions(dict):
|
|
702
719
|
pulumi.set(__self__, "admission_controller_options", admission_controller_options)
|
703
720
|
if kubernetes_network_config is not None:
|
704
721
|
pulumi.set(__self__, "kubernetes_network_config", kubernetes_network_config)
|
722
|
+
if open_id_connect_discovery is not None:
|
723
|
+
pulumi.set(__self__, "open_id_connect_discovery", open_id_connect_discovery)
|
724
|
+
if open_id_connect_token_authentication_config is not None:
|
725
|
+
pulumi.set(__self__, "open_id_connect_token_authentication_config", open_id_connect_token_authentication_config)
|
705
726
|
if persistent_volume_config is not None:
|
706
727
|
pulumi.set(__self__, "persistent_volume_config", persistent_volume_config)
|
707
728
|
if service_lb_config is not None:
|
@@ -733,6 +754,22 @@ class ClusterOptions(dict):
|
|
733
754
|
"""
|
734
755
|
return pulumi.get(self, "kubernetes_network_config")
|
735
756
|
|
757
|
+
@property
|
758
|
+
@pulumi.getter(name="openIdConnectDiscovery")
|
759
|
+
def open_id_connect_discovery(self) -> Optional['outputs.ClusterOptionsOpenIdConnectDiscovery']:
|
760
|
+
"""
|
761
|
+
(Updatable) The property that define the status of the OIDC Discovery feature for a cluster.
|
762
|
+
"""
|
763
|
+
return pulumi.get(self, "open_id_connect_discovery")
|
764
|
+
|
765
|
+
@property
|
766
|
+
@pulumi.getter(name="openIdConnectTokenAuthenticationConfig")
|
767
|
+
def open_id_connect_token_authentication_config(self) -> Optional['outputs.ClusterOptionsOpenIdConnectTokenAuthenticationConfig']:
|
768
|
+
"""
|
769
|
+
(Updatable) The properties that configure OIDC token authentication in kube-apiserver. For more information, see [Configuring the API Server](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-flags).
|
770
|
+
"""
|
771
|
+
return pulumi.get(self, "open_id_connect_token_authentication_config")
|
772
|
+
|
736
773
|
@property
|
737
774
|
@pulumi.getter(name="persistentVolumeConfig")
|
738
775
|
def persistent_volume_config(self) -> Optional['outputs.ClusterOptionsPersistentVolumeConfig']:
|
@@ -894,6 +931,234 @@ class ClusterOptionsKubernetesNetworkConfig(dict):
|
|
894
931
|
return pulumi.get(self, "services_cidr")
|
895
932
|
|
896
933
|
|
934
|
+
@pulumi.output_type
|
935
|
+
class ClusterOptionsOpenIdConnectDiscovery(dict):
|
936
|
+
@staticmethod
|
937
|
+
def __key_warning(key: str):
|
938
|
+
suggest = None
|
939
|
+
if key == "isOpenIdConnectDiscoveryEnabled":
|
940
|
+
suggest = "is_open_id_connect_discovery_enabled"
|
941
|
+
|
942
|
+
if suggest:
|
943
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterOptionsOpenIdConnectDiscovery. Access the value via the '{suggest}' property getter instead.")
|
944
|
+
|
945
|
+
def __getitem__(self, key: str) -> Any:
|
946
|
+
ClusterOptionsOpenIdConnectDiscovery.__key_warning(key)
|
947
|
+
return super().__getitem__(key)
|
948
|
+
|
949
|
+
def get(self, key: str, default = None) -> Any:
|
950
|
+
ClusterOptionsOpenIdConnectDiscovery.__key_warning(key)
|
951
|
+
return super().get(key, default)
|
952
|
+
|
953
|
+
def __init__(__self__, *,
|
954
|
+
is_open_id_connect_discovery_enabled: Optional[bool] = None):
|
955
|
+
"""
|
956
|
+
:param bool is_open_id_connect_discovery_enabled: (Updatable) Whether the cluster has OIDC Discovery enabled. Defaults to false. If set to true, the cluster will be assigned a public OIDC Discovery endpoint.
|
957
|
+
"""
|
958
|
+
if is_open_id_connect_discovery_enabled is not None:
|
959
|
+
pulumi.set(__self__, "is_open_id_connect_discovery_enabled", is_open_id_connect_discovery_enabled)
|
960
|
+
|
961
|
+
@property
|
962
|
+
@pulumi.getter(name="isOpenIdConnectDiscoveryEnabled")
|
963
|
+
def is_open_id_connect_discovery_enabled(self) -> Optional[bool]:
|
964
|
+
"""
|
965
|
+
(Updatable) Whether the cluster has OIDC Discovery enabled. Defaults to false. If set to true, the cluster will be assigned a public OIDC Discovery endpoint.
|
966
|
+
"""
|
967
|
+
return pulumi.get(self, "is_open_id_connect_discovery_enabled")
|
968
|
+
|
969
|
+
|
970
|
+
@pulumi.output_type
|
971
|
+
class ClusterOptionsOpenIdConnectTokenAuthenticationConfig(dict):
|
972
|
+
@staticmethod
|
973
|
+
def __key_warning(key: str):
|
974
|
+
suggest = None
|
975
|
+
if key == "isOpenIdConnectAuthEnabled":
|
976
|
+
suggest = "is_open_id_connect_auth_enabled"
|
977
|
+
elif key == "caCertificate":
|
978
|
+
suggest = "ca_certificate"
|
979
|
+
elif key == "clientId":
|
980
|
+
suggest = "client_id"
|
981
|
+
elif key == "groupsClaim":
|
982
|
+
suggest = "groups_claim"
|
983
|
+
elif key == "groupsPrefix":
|
984
|
+
suggest = "groups_prefix"
|
985
|
+
elif key == "issuerUrl":
|
986
|
+
suggest = "issuer_url"
|
987
|
+
elif key == "requiredClaims":
|
988
|
+
suggest = "required_claims"
|
989
|
+
elif key == "signingAlgorithms":
|
990
|
+
suggest = "signing_algorithms"
|
991
|
+
elif key == "usernameClaim":
|
992
|
+
suggest = "username_claim"
|
993
|
+
elif key == "usernamePrefix":
|
994
|
+
suggest = "username_prefix"
|
995
|
+
|
996
|
+
if suggest:
|
997
|
+
pulumi.log.warn(f"Key '{key}' not found in ClusterOptionsOpenIdConnectTokenAuthenticationConfig. Access the value via the '{suggest}' property getter instead.")
|
998
|
+
|
999
|
+
def __getitem__(self, key: str) -> Any:
|
1000
|
+
ClusterOptionsOpenIdConnectTokenAuthenticationConfig.__key_warning(key)
|
1001
|
+
return super().__getitem__(key)
|
1002
|
+
|
1003
|
+
def get(self, key: str, default = None) -> Any:
|
1004
|
+
ClusterOptionsOpenIdConnectTokenAuthenticationConfig.__key_warning(key)
|
1005
|
+
return super().get(key, default)
|
1006
|
+
|
1007
|
+
def __init__(__self__, *,
|
1008
|
+
is_open_id_connect_auth_enabled: bool,
|
1009
|
+
ca_certificate: Optional[str] = None,
|
1010
|
+
client_id: Optional[str] = None,
|
1011
|
+
groups_claim: Optional[str] = None,
|
1012
|
+
groups_prefix: Optional[str] = None,
|
1013
|
+
issuer_url: Optional[str] = None,
|
1014
|
+
required_claims: Optional[Sequence['outputs.ClusterOptionsOpenIdConnectTokenAuthenticationConfigRequiredClaim']] = None,
|
1015
|
+
signing_algorithms: Optional[Sequence[str]] = None,
|
1016
|
+
username_claim: Optional[str] = None,
|
1017
|
+
username_prefix: Optional[str] = None):
|
1018
|
+
"""
|
1019
|
+
:param bool is_open_id_connect_auth_enabled: (Updatable) Whether the cluster has OIDC Auth Config enabled. Defaults to false.
|
1020
|
+
:param str ca_certificate: (Updatable) A Base64 encoded public RSA or ECDSA certificates used to signed your identity provider's web certificate.
|
1021
|
+
:param str client_id: (Updatable) A client id that all tokens must be issued for.
|
1022
|
+
:param str groups_claim: (Updatable) JWT claim to use as the user's group. If the claim is present it must be an array of strings.
|
1023
|
+
:param str groups_prefix: (Updatable) Prefix prepended to group claims to prevent clashes with existing names (such as system:groups).
|
1024
|
+
:param str issuer_url: (Updatable) URL of the provider that allows the API server to discover public signing keys. Only URLs that use the https:// scheme are accepted. This is typically the provider's discovery URL, changed to have an empty path.
|
1025
|
+
:param Sequence['ClusterOptionsOpenIdConnectTokenAuthenticationConfigRequiredClaimArgs'] required_claims: (Updatable) A key=value pair that describes a required claim in the ID Token. If set, the claim is verified to be present in the ID Token with a matching value. Repeat this flag to specify multiple claims.
|
1026
|
+
:param Sequence[str] signing_algorithms: (Updatable) The signing algorithms accepted. Default is ["RS256"].
|
1027
|
+
:param str username_claim: (Updatable) JWT claim to use as the user name. By default sub, which is expected to be a unique identifier of the end user. Admins can choose other claims, such as email or name, depending on their provider. However, claims other than email will be prefixed with the issuer URL to prevent naming clashes with other plugins.
|
1028
|
+
:param str username_prefix: (Updatable) Prefix prepended to username claims to prevent clashes with existing names (such as system:users). For example, the value oidc: will create usernames like oidc:jane.doe. If this flag isn't provided and --oidc-username-claim is a value other than email the prefix defaults to ( Issuer URL )# where ( Issuer URL ) is the value of --oidc-issuer-url. The value - can be used to disable all prefixing.
|
1029
|
+
"""
|
1030
|
+
pulumi.set(__self__, "is_open_id_connect_auth_enabled", is_open_id_connect_auth_enabled)
|
1031
|
+
if ca_certificate is not None:
|
1032
|
+
pulumi.set(__self__, "ca_certificate", ca_certificate)
|
1033
|
+
if client_id is not None:
|
1034
|
+
pulumi.set(__self__, "client_id", client_id)
|
1035
|
+
if groups_claim is not None:
|
1036
|
+
pulumi.set(__self__, "groups_claim", groups_claim)
|
1037
|
+
if groups_prefix is not None:
|
1038
|
+
pulumi.set(__self__, "groups_prefix", groups_prefix)
|
1039
|
+
if issuer_url is not None:
|
1040
|
+
pulumi.set(__self__, "issuer_url", issuer_url)
|
1041
|
+
if required_claims is not None:
|
1042
|
+
pulumi.set(__self__, "required_claims", required_claims)
|
1043
|
+
if signing_algorithms is not None:
|
1044
|
+
pulumi.set(__self__, "signing_algorithms", signing_algorithms)
|
1045
|
+
if username_claim is not None:
|
1046
|
+
pulumi.set(__self__, "username_claim", username_claim)
|
1047
|
+
if username_prefix is not None:
|
1048
|
+
pulumi.set(__self__, "username_prefix", username_prefix)
|
1049
|
+
|
1050
|
+
@property
|
1051
|
+
@pulumi.getter(name="isOpenIdConnectAuthEnabled")
|
1052
|
+
def is_open_id_connect_auth_enabled(self) -> bool:
|
1053
|
+
"""
|
1054
|
+
(Updatable) Whether the cluster has OIDC Auth Config enabled. Defaults to false.
|
1055
|
+
"""
|
1056
|
+
return pulumi.get(self, "is_open_id_connect_auth_enabled")
|
1057
|
+
|
1058
|
+
@property
|
1059
|
+
@pulumi.getter(name="caCertificate")
|
1060
|
+
def ca_certificate(self) -> Optional[str]:
|
1061
|
+
"""
|
1062
|
+
(Updatable) A Base64 encoded public RSA or ECDSA certificates used to signed your identity provider's web certificate.
|
1063
|
+
"""
|
1064
|
+
return pulumi.get(self, "ca_certificate")
|
1065
|
+
|
1066
|
+
@property
|
1067
|
+
@pulumi.getter(name="clientId")
|
1068
|
+
def client_id(self) -> Optional[str]:
|
1069
|
+
"""
|
1070
|
+
(Updatable) A client id that all tokens must be issued for.
|
1071
|
+
"""
|
1072
|
+
return pulumi.get(self, "client_id")
|
1073
|
+
|
1074
|
+
@property
|
1075
|
+
@pulumi.getter(name="groupsClaim")
|
1076
|
+
def groups_claim(self) -> Optional[str]:
|
1077
|
+
"""
|
1078
|
+
(Updatable) JWT claim to use as the user's group. If the claim is present it must be an array of strings.
|
1079
|
+
"""
|
1080
|
+
return pulumi.get(self, "groups_claim")
|
1081
|
+
|
1082
|
+
@property
|
1083
|
+
@pulumi.getter(name="groupsPrefix")
|
1084
|
+
def groups_prefix(self) -> Optional[str]:
|
1085
|
+
"""
|
1086
|
+
(Updatable) Prefix prepended to group claims to prevent clashes with existing names (such as system:groups).
|
1087
|
+
"""
|
1088
|
+
return pulumi.get(self, "groups_prefix")
|
1089
|
+
|
1090
|
+
@property
|
1091
|
+
@pulumi.getter(name="issuerUrl")
|
1092
|
+
def issuer_url(self) -> Optional[str]:
|
1093
|
+
"""
|
1094
|
+
(Updatable) URL of the provider that allows the API server to discover public signing keys. Only URLs that use the https:// scheme are accepted. This is typically the provider's discovery URL, changed to have an empty path.
|
1095
|
+
"""
|
1096
|
+
return pulumi.get(self, "issuer_url")
|
1097
|
+
|
1098
|
+
@property
|
1099
|
+
@pulumi.getter(name="requiredClaims")
|
1100
|
+
def required_claims(self) -> Optional[Sequence['outputs.ClusterOptionsOpenIdConnectTokenAuthenticationConfigRequiredClaim']]:
|
1101
|
+
"""
|
1102
|
+
(Updatable) A key=value pair that describes a required claim in the ID Token. If set, the claim is verified to be present in the ID Token with a matching value. Repeat this flag to specify multiple claims.
|
1103
|
+
"""
|
1104
|
+
return pulumi.get(self, "required_claims")
|
1105
|
+
|
1106
|
+
@property
|
1107
|
+
@pulumi.getter(name="signingAlgorithms")
|
1108
|
+
def signing_algorithms(self) -> Optional[Sequence[str]]:
|
1109
|
+
"""
|
1110
|
+
(Updatable) The signing algorithms accepted. Default is ["RS256"].
|
1111
|
+
"""
|
1112
|
+
return pulumi.get(self, "signing_algorithms")
|
1113
|
+
|
1114
|
+
@property
|
1115
|
+
@pulumi.getter(name="usernameClaim")
|
1116
|
+
def username_claim(self) -> Optional[str]:
|
1117
|
+
"""
|
1118
|
+
(Updatable) JWT claim to use as the user name. By default sub, which is expected to be a unique identifier of the end user. Admins can choose other claims, such as email or name, depending on their provider. However, claims other than email will be prefixed with the issuer URL to prevent naming clashes with other plugins.
|
1119
|
+
"""
|
1120
|
+
return pulumi.get(self, "username_claim")
|
1121
|
+
|
1122
|
+
@property
|
1123
|
+
@pulumi.getter(name="usernamePrefix")
|
1124
|
+
def username_prefix(self) -> Optional[str]:
|
1125
|
+
"""
|
1126
|
+
(Updatable) Prefix prepended to username claims to prevent clashes with existing names (such as system:users). For example, the value oidc: will create usernames like oidc:jane.doe. If this flag isn't provided and --oidc-username-claim is a value other than email the prefix defaults to ( Issuer URL )# where ( Issuer URL ) is the value of --oidc-issuer-url. The value - can be used to disable all prefixing.
|
1127
|
+
"""
|
1128
|
+
return pulumi.get(self, "username_prefix")
|
1129
|
+
|
1130
|
+
|
1131
|
+
@pulumi.output_type
|
1132
|
+
class ClusterOptionsOpenIdConnectTokenAuthenticationConfigRequiredClaim(dict):
|
1133
|
+
def __init__(__self__, *,
|
1134
|
+
key: Optional[str] = None,
|
1135
|
+
value: Optional[str] = None):
|
1136
|
+
"""
|
1137
|
+
:param str key: (Updatable) The key of the pair.
|
1138
|
+
:param str value: (Updatable) The value of the pair.
|
1139
|
+
"""
|
1140
|
+
if key is not None:
|
1141
|
+
pulumi.set(__self__, "key", key)
|
1142
|
+
if value is not None:
|
1143
|
+
pulumi.set(__self__, "value", value)
|
1144
|
+
|
1145
|
+
@property
|
1146
|
+
@pulumi.getter
|
1147
|
+
def key(self) -> Optional[str]:
|
1148
|
+
"""
|
1149
|
+
(Updatable) The key of the pair.
|
1150
|
+
"""
|
1151
|
+
return pulumi.get(self, "key")
|
1152
|
+
|
1153
|
+
@property
|
1154
|
+
@pulumi.getter
|
1155
|
+
def value(self) -> Optional[str]:
|
1156
|
+
"""
|
1157
|
+
(Updatable) The value of the pair.
|
1158
|
+
"""
|
1159
|
+
return pulumi.get(self, "value")
|
1160
|
+
|
1161
|
+
|
897
1162
|
@pulumi.output_type
|
898
1163
|
class ClusterOptionsPersistentVolumeConfig(dict):
|
899
1164
|
@staticmethod
|
@@ -4491,6 +4756,8 @@ class GetClusterOptionResult(dict):
|
|
4491
4756
|
add_ons: Sequence['outputs.GetClusterOptionAddOnResult'],
|
4492
4757
|
admission_controller_options: Sequence['outputs.GetClusterOptionAdmissionControllerOptionResult'],
|
4493
4758
|
kubernetes_network_configs: Sequence['outputs.GetClusterOptionKubernetesNetworkConfigResult'],
|
4759
|
+
open_id_connect_discoveries: Sequence['outputs.GetClusterOptionOpenIdConnectDiscoveryResult'],
|
4760
|
+
open_id_connect_token_authentication_configs: Sequence['outputs.GetClusterOptionOpenIdConnectTokenAuthenticationConfigResult'],
|
4494
4761
|
persistent_volume_configs: Sequence['outputs.GetClusterOptionPersistentVolumeConfigResult'],
|
4495
4762
|
service_lb_configs: Sequence['outputs.GetClusterOptionServiceLbConfigResult'],
|
4496
4763
|
service_lb_subnet_ids: Sequence[str]):
|
@@ -4505,6 +4772,8 @@ class GetClusterOptionResult(dict):
|
|
4505
4772
|
pulumi.set(__self__, "add_ons", add_ons)
|
4506
4773
|
pulumi.set(__self__, "admission_controller_options", admission_controller_options)
|
4507
4774
|
pulumi.set(__self__, "kubernetes_network_configs", kubernetes_network_configs)
|
4775
|
+
pulumi.set(__self__, "open_id_connect_discoveries", open_id_connect_discoveries)
|
4776
|
+
pulumi.set(__self__, "open_id_connect_token_authentication_configs", open_id_connect_token_authentication_configs)
|
4508
4777
|
pulumi.set(__self__, "persistent_volume_configs", persistent_volume_configs)
|
4509
4778
|
pulumi.set(__self__, "service_lb_configs", service_lb_configs)
|
4510
4779
|
pulumi.set(__self__, "service_lb_subnet_ids", service_lb_subnet_ids)
|
@@ -4533,6 +4802,16 @@ class GetClusterOptionResult(dict):
|
|
4533
4802
|
"""
|
4534
4803
|
return pulumi.get(self, "kubernetes_network_configs")
|
4535
4804
|
|
4805
|
+
@property
|
4806
|
+
@pulumi.getter(name="openIdConnectDiscoveries")
|
4807
|
+
def open_id_connect_discoveries(self) -> Sequence['outputs.GetClusterOptionOpenIdConnectDiscoveryResult']:
|
4808
|
+
return pulumi.get(self, "open_id_connect_discoveries")
|
4809
|
+
|
4810
|
+
@property
|
4811
|
+
@pulumi.getter(name="openIdConnectTokenAuthenticationConfigs")
|
4812
|
+
def open_id_connect_token_authentication_configs(self) -> Sequence['outputs.GetClusterOptionOpenIdConnectTokenAuthenticationConfigResult']:
|
4813
|
+
return pulumi.get(self, "open_id_connect_token_authentication_configs")
|
4814
|
+
|
4536
4815
|
@property
|
4537
4816
|
@pulumi.getter(name="persistentVolumeConfigs")
|
4538
4817
|
def persistent_volume_configs(self) -> Sequence['outputs.GetClusterOptionPersistentVolumeConfigResult']:
|
@@ -4652,6 +4931,112 @@ class GetClusterOptionKubernetesNetworkConfigResult(dict):
|
|
4652
4931
|
return pulumi.get(self, "services_cidr")
|
4653
4932
|
|
4654
4933
|
|
4934
|
+
@pulumi.output_type
|
4935
|
+
class GetClusterOptionOpenIdConnectDiscoveryResult(dict):
|
4936
|
+
def __init__(__self__, *,
|
4937
|
+
is_open_id_connect_discovery_enabled: bool):
|
4938
|
+
pulumi.set(__self__, "is_open_id_connect_discovery_enabled", is_open_id_connect_discovery_enabled)
|
4939
|
+
|
4940
|
+
@property
|
4941
|
+
@pulumi.getter(name="isOpenIdConnectDiscoveryEnabled")
|
4942
|
+
def is_open_id_connect_discovery_enabled(self) -> bool:
|
4943
|
+
return pulumi.get(self, "is_open_id_connect_discovery_enabled")
|
4944
|
+
|
4945
|
+
|
4946
|
+
@pulumi.output_type
|
4947
|
+
class GetClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict):
|
4948
|
+
def __init__(__self__, *,
|
4949
|
+
ca_certificate: str,
|
4950
|
+
client_id: str,
|
4951
|
+
groups_claim: str,
|
4952
|
+
groups_prefix: str,
|
4953
|
+
is_open_id_connect_auth_enabled: bool,
|
4954
|
+
issuer_url: str,
|
4955
|
+
required_claims: Sequence['outputs.GetClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimResult'],
|
4956
|
+
signing_algorithms: Sequence[str],
|
4957
|
+
username_claim: str,
|
4958
|
+
username_prefix: str):
|
4959
|
+
pulumi.set(__self__, "ca_certificate", ca_certificate)
|
4960
|
+
pulumi.set(__self__, "client_id", client_id)
|
4961
|
+
pulumi.set(__self__, "groups_claim", groups_claim)
|
4962
|
+
pulumi.set(__self__, "groups_prefix", groups_prefix)
|
4963
|
+
pulumi.set(__self__, "is_open_id_connect_auth_enabled", is_open_id_connect_auth_enabled)
|
4964
|
+
pulumi.set(__self__, "issuer_url", issuer_url)
|
4965
|
+
pulumi.set(__self__, "required_claims", required_claims)
|
4966
|
+
pulumi.set(__self__, "signing_algorithms", signing_algorithms)
|
4967
|
+
pulumi.set(__self__, "username_claim", username_claim)
|
4968
|
+
pulumi.set(__self__, "username_prefix", username_prefix)
|
4969
|
+
|
4970
|
+
@property
|
4971
|
+
@pulumi.getter(name="caCertificate")
|
4972
|
+
def ca_certificate(self) -> str:
|
4973
|
+
return pulumi.get(self, "ca_certificate")
|
4974
|
+
|
4975
|
+
@property
|
4976
|
+
@pulumi.getter(name="clientId")
|
4977
|
+
def client_id(self) -> str:
|
4978
|
+
return pulumi.get(self, "client_id")
|
4979
|
+
|
4980
|
+
@property
|
4981
|
+
@pulumi.getter(name="groupsClaim")
|
4982
|
+
def groups_claim(self) -> str:
|
4983
|
+
return pulumi.get(self, "groups_claim")
|
4984
|
+
|
4985
|
+
@property
|
4986
|
+
@pulumi.getter(name="groupsPrefix")
|
4987
|
+
def groups_prefix(self) -> str:
|
4988
|
+
return pulumi.get(self, "groups_prefix")
|
4989
|
+
|
4990
|
+
@property
|
4991
|
+
@pulumi.getter(name="isOpenIdConnectAuthEnabled")
|
4992
|
+
def is_open_id_connect_auth_enabled(self) -> bool:
|
4993
|
+
return pulumi.get(self, "is_open_id_connect_auth_enabled")
|
4994
|
+
|
4995
|
+
@property
|
4996
|
+
@pulumi.getter(name="issuerUrl")
|
4997
|
+
def issuer_url(self) -> str:
|
4998
|
+
return pulumi.get(self, "issuer_url")
|
4999
|
+
|
5000
|
+
@property
|
5001
|
+
@pulumi.getter(name="requiredClaims")
|
5002
|
+
def required_claims(self) -> Sequence['outputs.GetClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimResult']:
|
5003
|
+
return pulumi.get(self, "required_claims")
|
5004
|
+
|
5005
|
+
@property
|
5006
|
+
@pulumi.getter(name="signingAlgorithms")
|
5007
|
+
def signing_algorithms(self) -> Sequence[str]:
|
5008
|
+
return pulumi.get(self, "signing_algorithms")
|
5009
|
+
|
5010
|
+
@property
|
5011
|
+
@pulumi.getter(name="usernameClaim")
|
5012
|
+
def username_claim(self) -> str:
|
5013
|
+
return pulumi.get(self, "username_claim")
|
5014
|
+
|
5015
|
+
@property
|
5016
|
+
@pulumi.getter(name="usernamePrefix")
|
5017
|
+
def username_prefix(self) -> str:
|
5018
|
+
return pulumi.get(self, "username_prefix")
|
5019
|
+
|
5020
|
+
|
5021
|
+
@pulumi.output_type
|
5022
|
+
class GetClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimResult(dict):
|
5023
|
+
def __init__(__self__, *,
|
5024
|
+
key: str,
|
5025
|
+
value: str):
|
5026
|
+
pulumi.set(__self__, "key", key)
|
5027
|
+
pulumi.set(__self__, "value", value)
|
5028
|
+
|
5029
|
+
@property
|
5030
|
+
@pulumi.getter
|
5031
|
+
def key(self) -> str:
|
5032
|
+
return pulumi.get(self, "key")
|
5033
|
+
|
5034
|
+
@property
|
5035
|
+
@pulumi.getter
|
5036
|
+
def value(self) -> str:
|
5037
|
+
return pulumi.get(self, "value")
|
5038
|
+
|
5039
|
+
|
4655
5040
|
@pulumi.output_type
|
4656
5041
|
class GetClusterOptionPersistentVolumeConfigResult(dict):
|
4657
5042
|
def __init__(__self__, *,
|
@@ -4860,6 +5245,7 @@ class GetClustersClusterResult(dict):
|
|
4860
5245
|
lifecycle_details: str,
|
4861
5246
|
metadatas: Sequence['outputs.GetClustersClusterMetadataResult'],
|
4862
5247
|
name: str,
|
5248
|
+
open_id_connect_discovery_endpoint: str,
|
4863
5249
|
options: Sequence['outputs.GetClustersClusterOptionResult'],
|
4864
5250
|
state: str,
|
4865
5251
|
type: str,
|
@@ -4879,6 +5265,7 @@ class GetClustersClusterResult(dict):
|
|
4879
5265
|
:param str lifecycle_details: Details about the state of the cluster masters.
|
4880
5266
|
:param Sequence['GetClustersClusterMetadataArgs'] metadatas: Metadata about the cluster.
|
4881
5267
|
:param str name: The name to filter on.
|
5268
|
+
:param str open_id_connect_discovery_endpoint: The cluster-specific OpenID Connect Discovery endpoint
|
4882
5269
|
:param Sequence['GetClustersClusterOptionArgs'] options: Optional attributes for the cluster.
|
4883
5270
|
:param str state: A cluster lifecycle state to filter on. Can have multiple parameters of this name.
|
4884
5271
|
:param str type: Type of cluster. Values can be BASIC_CLUSTER or ENHANCED_CLUSTER. For more information, see [Cluster Types](https://docs.cloud.oracle.com/iaas/Content/ContEng/Tasks/contengcomparingenhancedwithbasicclusters_topic.htm)
|
@@ -4898,6 +5285,7 @@ class GetClustersClusterResult(dict):
|
|
4898
5285
|
pulumi.set(__self__, "lifecycle_details", lifecycle_details)
|
4899
5286
|
pulumi.set(__self__, "metadatas", metadatas)
|
4900
5287
|
pulumi.set(__self__, "name", name)
|
5288
|
+
pulumi.set(__self__, "open_id_connect_discovery_endpoint", open_id_connect_discovery_endpoint)
|
4901
5289
|
pulumi.set(__self__, "options", options)
|
4902
5290
|
pulumi.set(__self__, "state", state)
|
4903
5291
|
pulumi.set(__self__, "type", type)
|
@@ -5015,6 +5403,14 @@ class GetClustersClusterResult(dict):
|
|
5015
5403
|
"""
|
5016
5404
|
return pulumi.get(self, "name")
|
5017
5405
|
|
5406
|
+
@property
|
5407
|
+
@pulumi.getter(name="openIdConnectDiscoveryEndpoint")
|
5408
|
+
def open_id_connect_discovery_endpoint(self) -> str:
|
5409
|
+
"""
|
5410
|
+
The cluster-specific OpenID Connect Discovery endpoint
|
5411
|
+
"""
|
5412
|
+
return pulumi.get(self, "open_id_connect_discovery_endpoint")
|
5413
|
+
|
5018
5414
|
@property
|
5019
5415
|
@pulumi.getter
|
5020
5416
|
def options(self) -> Sequence['outputs.GetClustersClusterOptionResult']:
|
@@ -5327,6 +5723,8 @@ class GetClustersClusterOptionResult(dict):
|
|
5327
5723
|
add_ons: Sequence['outputs.GetClustersClusterOptionAddOnResult'],
|
5328
5724
|
admission_controller_options: Sequence['outputs.GetClustersClusterOptionAdmissionControllerOptionResult'],
|
5329
5725
|
kubernetes_network_configs: Sequence['outputs.GetClustersClusterOptionKubernetesNetworkConfigResult'],
|
5726
|
+
open_id_connect_discoveries: Sequence['outputs.GetClustersClusterOptionOpenIdConnectDiscoveryResult'],
|
5727
|
+
open_id_connect_token_authentication_configs: Sequence['outputs.GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigResult'],
|
5330
5728
|
persistent_volume_configs: Sequence['outputs.GetClustersClusterOptionPersistentVolumeConfigResult'],
|
5331
5729
|
service_lb_configs: Sequence['outputs.GetClustersClusterOptionServiceLbConfigResult'],
|
5332
5730
|
service_lb_subnet_ids: Sequence[str]):
|
@@ -5334,6 +5732,8 @@ class GetClustersClusterOptionResult(dict):
|
|
5334
5732
|
:param Sequence['GetClustersClusterOptionAddOnArgs'] add_ons: Configurable cluster add-ons
|
5335
5733
|
:param Sequence['GetClustersClusterOptionAdmissionControllerOptionArgs'] admission_controller_options: Configurable cluster admission controllers
|
5336
5734
|
:param Sequence['GetClustersClusterOptionKubernetesNetworkConfigArgs'] kubernetes_network_configs: Network configuration for Kubernetes.
|
5735
|
+
:param Sequence['GetClustersClusterOptionOpenIdConnectDiscoveryArgs'] open_id_connect_discoveries: The property that define the status of the OIDC Discovery feature for a cluster.
|
5736
|
+
:param Sequence['GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigArgs'] open_id_connect_token_authentication_configs: The properties that configure OIDC token authentication in kube-apiserver. For more information, see [Configuring the API Server](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-flags).
|
5337
5737
|
:param Sequence['GetClustersClusterOptionPersistentVolumeConfigArgs'] persistent_volume_configs: Configuration to be applied to block volumes created by Kubernetes Persistent Volume Claims (PVC)
|
5338
5738
|
:param Sequence['GetClustersClusterOptionServiceLbConfigArgs'] service_lb_configs: Configuration to be applied to load balancers created by Kubernetes services
|
5339
5739
|
:param Sequence[str] service_lb_subnet_ids: The OCIDs of the subnets used for Kubernetes services load balancers.
|
@@ -5341,6 +5741,8 @@ class GetClustersClusterOptionResult(dict):
|
|
5341
5741
|
pulumi.set(__self__, "add_ons", add_ons)
|
5342
5742
|
pulumi.set(__self__, "admission_controller_options", admission_controller_options)
|
5343
5743
|
pulumi.set(__self__, "kubernetes_network_configs", kubernetes_network_configs)
|
5744
|
+
pulumi.set(__self__, "open_id_connect_discoveries", open_id_connect_discoveries)
|
5745
|
+
pulumi.set(__self__, "open_id_connect_token_authentication_configs", open_id_connect_token_authentication_configs)
|
5344
5746
|
pulumi.set(__self__, "persistent_volume_configs", persistent_volume_configs)
|
5345
5747
|
pulumi.set(__self__, "service_lb_configs", service_lb_configs)
|
5346
5748
|
pulumi.set(__self__, "service_lb_subnet_ids", service_lb_subnet_ids)
|
@@ -5369,6 +5771,22 @@ class GetClustersClusterOptionResult(dict):
|
|
5369
5771
|
"""
|
5370
5772
|
return pulumi.get(self, "kubernetes_network_configs")
|
5371
5773
|
|
5774
|
+
@property
|
5775
|
+
@pulumi.getter(name="openIdConnectDiscoveries")
|
5776
|
+
def open_id_connect_discoveries(self) -> Sequence['outputs.GetClustersClusterOptionOpenIdConnectDiscoveryResult']:
|
5777
|
+
"""
|
5778
|
+
The property that define the status of the OIDC Discovery feature for a cluster.
|
5779
|
+
"""
|
5780
|
+
return pulumi.get(self, "open_id_connect_discoveries")
|
5781
|
+
|
5782
|
+
@property
|
5783
|
+
@pulumi.getter(name="openIdConnectTokenAuthenticationConfigs")
|
5784
|
+
def open_id_connect_token_authentication_configs(self) -> Sequence['outputs.GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigResult']:
|
5785
|
+
"""
|
5786
|
+
The properties that configure OIDC token authentication in kube-apiserver. For more information, see [Configuring the API Server](https://kubernetes.io/docs/reference/access-authn-authz/authentication/#using-flags).
|
5787
|
+
"""
|
5788
|
+
return pulumi.get(self, "open_id_connect_token_authentication_configs")
|
5789
|
+
|
5372
5790
|
@property
|
5373
5791
|
@pulumi.getter(name="persistentVolumeConfigs")
|
5374
5792
|
def persistent_volume_configs(self) -> Sequence['outputs.GetClustersClusterOptionPersistentVolumeConfigResult']:
|
@@ -5470,6 +5888,170 @@ class GetClustersClusterOptionKubernetesNetworkConfigResult(dict):
|
|
5470
5888
|
return pulumi.get(self, "services_cidr")
|
5471
5889
|
|
5472
5890
|
|
5891
|
+
@pulumi.output_type
|
5892
|
+
class GetClustersClusterOptionOpenIdConnectDiscoveryResult(dict):
|
5893
|
+
def __init__(__self__, *,
|
5894
|
+
is_open_id_connect_discovery_enabled: bool):
|
5895
|
+
"""
|
5896
|
+
:param bool is_open_id_connect_discovery_enabled: Whether the cluster has OIDC Discovery enabled. Defaults to false. If set to true, the cluster will be assigned a public OIDC Discovery endpoint.
|
5897
|
+
"""
|
5898
|
+
pulumi.set(__self__, "is_open_id_connect_discovery_enabled", is_open_id_connect_discovery_enabled)
|
5899
|
+
|
5900
|
+
@property
|
5901
|
+
@pulumi.getter(name="isOpenIdConnectDiscoveryEnabled")
|
5902
|
+
def is_open_id_connect_discovery_enabled(self) -> bool:
|
5903
|
+
"""
|
5904
|
+
Whether the cluster has OIDC Discovery enabled. Defaults to false. If set to true, the cluster will be assigned a public OIDC Discovery endpoint.
|
5905
|
+
"""
|
5906
|
+
return pulumi.get(self, "is_open_id_connect_discovery_enabled")
|
5907
|
+
|
5908
|
+
|
5909
|
+
@pulumi.output_type
|
5910
|
+
class GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigResult(dict):
|
5911
|
+
def __init__(__self__, *,
|
5912
|
+
ca_certificate: str,
|
5913
|
+
client_id: str,
|
5914
|
+
groups_claim: str,
|
5915
|
+
groups_prefix: str,
|
5916
|
+
is_open_id_connect_auth_enabled: bool,
|
5917
|
+
issuer_url: str,
|
5918
|
+
required_claims: Sequence['outputs.GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimResult'],
|
5919
|
+
signing_algorithms: Sequence[str],
|
5920
|
+
username_claim: str,
|
5921
|
+
username_prefix: str):
|
5922
|
+
"""
|
5923
|
+
:param str ca_certificate: A Base64 encoded public RSA or ECDSA certificates used to signed your identity provider's web certificate.
|
5924
|
+
:param str client_id: A client id that all tokens must be issued for.
|
5925
|
+
:param str groups_claim: JWT claim to use as the user's group. If the claim is present it must be an array of strings.
|
5926
|
+
:param str groups_prefix: Prefix prepended to group claims to prevent clashes with existing names (such as system:groups).
|
5927
|
+
:param bool is_open_id_connect_auth_enabled: Whether the cluster has OIDC Auth Config enabled. Defaults to false.
|
5928
|
+
:param str issuer_url: URL of the provider that allows the API server to discover public signing keys. Only URLs that use the https:// scheme are accepted. This is typically the provider's discovery URL, changed to have an empty path.
|
5929
|
+
:param Sequence['GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimArgs'] required_claims: A key=value pair that describes a required claim in the ID Token. If set, the claim is verified to be present in the ID Token with a matching value. Repeat this flag to specify multiple claims.
|
5930
|
+
:param Sequence[str] signing_algorithms: The signing algorithms accepted. Default is ["RS256"].
|
5931
|
+
:param str username_claim: JWT claim to use as the user name. By default sub, which is expected to be a unique identifier of the end user. Admins can choose other claims, such as email or name, depending on their provider. However, claims other than email will be prefixed with the issuer URL to prevent naming clashes with other plugins.
|
5932
|
+
:param str username_prefix: Prefix prepended to username claims to prevent clashes with existing names (such as system:users). For example, the value oidc: will create usernames like oidc:jane.doe. If this flag isn't provided and --oidc-username-claim is a value other than email the prefix defaults to ( Issuer URL )# where ( Issuer URL ) is the value of --oidc-issuer-url. The value - can be used to disable all prefixing.
|
5933
|
+
"""
|
5934
|
+
pulumi.set(__self__, "ca_certificate", ca_certificate)
|
5935
|
+
pulumi.set(__self__, "client_id", client_id)
|
5936
|
+
pulumi.set(__self__, "groups_claim", groups_claim)
|
5937
|
+
pulumi.set(__self__, "groups_prefix", groups_prefix)
|
5938
|
+
pulumi.set(__self__, "is_open_id_connect_auth_enabled", is_open_id_connect_auth_enabled)
|
5939
|
+
pulumi.set(__self__, "issuer_url", issuer_url)
|
5940
|
+
pulumi.set(__self__, "required_claims", required_claims)
|
5941
|
+
pulumi.set(__self__, "signing_algorithms", signing_algorithms)
|
5942
|
+
pulumi.set(__self__, "username_claim", username_claim)
|
5943
|
+
pulumi.set(__self__, "username_prefix", username_prefix)
|
5944
|
+
|
5945
|
+
@property
|
5946
|
+
@pulumi.getter(name="caCertificate")
|
5947
|
+
def ca_certificate(self) -> str:
|
5948
|
+
"""
|
5949
|
+
A Base64 encoded public RSA or ECDSA certificates used to signed your identity provider's web certificate.
|
5950
|
+
"""
|
5951
|
+
return pulumi.get(self, "ca_certificate")
|
5952
|
+
|
5953
|
+
@property
|
5954
|
+
@pulumi.getter(name="clientId")
|
5955
|
+
def client_id(self) -> str:
|
5956
|
+
"""
|
5957
|
+
A client id that all tokens must be issued for.
|
5958
|
+
"""
|
5959
|
+
return pulumi.get(self, "client_id")
|
5960
|
+
|
5961
|
+
@property
|
5962
|
+
@pulumi.getter(name="groupsClaim")
|
5963
|
+
def groups_claim(self) -> str:
|
5964
|
+
"""
|
5965
|
+
JWT claim to use as the user's group. If the claim is present it must be an array of strings.
|
5966
|
+
"""
|
5967
|
+
return pulumi.get(self, "groups_claim")
|
5968
|
+
|
5969
|
+
@property
|
5970
|
+
@pulumi.getter(name="groupsPrefix")
|
5971
|
+
def groups_prefix(self) -> str:
|
5972
|
+
"""
|
5973
|
+
Prefix prepended to group claims to prevent clashes with existing names (such as system:groups).
|
5974
|
+
"""
|
5975
|
+
return pulumi.get(self, "groups_prefix")
|
5976
|
+
|
5977
|
+
@property
|
5978
|
+
@pulumi.getter(name="isOpenIdConnectAuthEnabled")
|
5979
|
+
def is_open_id_connect_auth_enabled(self) -> bool:
|
5980
|
+
"""
|
5981
|
+
Whether the cluster has OIDC Auth Config enabled. Defaults to false.
|
5982
|
+
"""
|
5983
|
+
return pulumi.get(self, "is_open_id_connect_auth_enabled")
|
5984
|
+
|
5985
|
+
@property
|
5986
|
+
@pulumi.getter(name="issuerUrl")
|
5987
|
+
def issuer_url(self) -> str:
|
5988
|
+
"""
|
5989
|
+
URL of the provider that allows the API server to discover public signing keys. Only URLs that use the https:// scheme are accepted. This is typically the provider's discovery URL, changed to have an empty path.
|
5990
|
+
"""
|
5991
|
+
return pulumi.get(self, "issuer_url")
|
5992
|
+
|
5993
|
+
@property
|
5994
|
+
@pulumi.getter(name="requiredClaims")
|
5995
|
+
def required_claims(self) -> Sequence['outputs.GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimResult']:
|
5996
|
+
"""
|
5997
|
+
A key=value pair that describes a required claim in the ID Token. If set, the claim is verified to be present in the ID Token with a matching value. Repeat this flag to specify multiple claims.
|
5998
|
+
"""
|
5999
|
+
return pulumi.get(self, "required_claims")
|
6000
|
+
|
6001
|
+
@property
|
6002
|
+
@pulumi.getter(name="signingAlgorithms")
|
6003
|
+
def signing_algorithms(self) -> Sequence[str]:
|
6004
|
+
"""
|
6005
|
+
The signing algorithms accepted. Default is ["RS256"].
|
6006
|
+
"""
|
6007
|
+
return pulumi.get(self, "signing_algorithms")
|
6008
|
+
|
6009
|
+
@property
|
6010
|
+
@pulumi.getter(name="usernameClaim")
|
6011
|
+
def username_claim(self) -> str:
|
6012
|
+
"""
|
6013
|
+
JWT claim to use as the user name. By default sub, which is expected to be a unique identifier of the end user. Admins can choose other claims, such as email or name, depending on their provider. However, claims other than email will be prefixed with the issuer URL to prevent naming clashes with other plugins.
|
6014
|
+
"""
|
6015
|
+
return pulumi.get(self, "username_claim")
|
6016
|
+
|
6017
|
+
@property
|
6018
|
+
@pulumi.getter(name="usernamePrefix")
|
6019
|
+
def username_prefix(self) -> str:
|
6020
|
+
"""
|
6021
|
+
Prefix prepended to username claims to prevent clashes with existing names (such as system:users). For example, the value oidc: will create usernames like oidc:jane.doe. If this flag isn't provided and --oidc-username-claim is a value other than email the prefix defaults to ( Issuer URL )# where ( Issuer URL ) is the value of --oidc-issuer-url. The value - can be used to disable all prefixing.
|
6022
|
+
"""
|
6023
|
+
return pulumi.get(self, "username_prefix")
|
6024
|
+
|
6025
|
+
|
6026
|
+
@pulumi.output_type
|
6027
|
+
class GetClustersClusterOptionOpenIdConnectTokenAuthenticationConfigRequiredClaimResult(dict):
|
6028
|
+
def __init__(__self__, *,
|
6029
|
+
key: str,
|
6030
|
+
value: str):
|
6031
|
+
"""
|
6032
|
+
:param str key: The key of the pair.
|
6033
|
+
:param str value: The value of the pair.
|
6034
|
+
"""
|
6035
|
+
pulumi.set(__self__, "key", key)
|
6036
|
+
pulumi.set(__self__, "value", value)
|
6037
|
+
|
6038
|
+
@property
|
6039
|
+
@pulumi.getter
|
6040
|
+
def key(self) -> str:
|
6041
|
+
"""
|
6042
|
+
The key of the pair.
|
6043
|
+
"""
|
6044
|
+
return pulumi.get(self, "key")
|
6045
|
+
|
6046
|
+
@property
|
6047
|
+
@pulumi.getter
|
6048
|
+
def value(self) -> str:
|
6049
|
+
"""
|
6050
|
+
The value of the pair.
|
6051
|
+
"""
|
6052
|
+
return pulumi.get(self, "value")
|
6053
|
+
|
6054
|
+
|
5473
6055
|
@pulumi.output_type
|
5474
6056
|
class GetClustersClusterOptionPersistentVolumeConfigResult(dict):
|
5475
6057
|
def __init__(__self__, *,
|