pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +120 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +37 -7
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +35 -23
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
pulumi_vault/identity/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -21,7 +26,7 @@ class GetEntityAliasResult(dict):
|
|
21
26
|
id: str,
|
22
27
|
last_update_time: str,
|
23
28
|
merged_from_canonical_ids: Sequence[str],
|
24
|
-
metadata: Mapping[str,
|
29
|
+
metadata: Mapping[str, str],
|
25
30
|
mount_accessor: str,
|
26
31
|
mount_path: str,
|
27
32
|
mount_type: str,
|
@@ -32,7 +37,7 @@ class GetEntityAliasResult(dict):
|
|
32
37
|
:param str id: ID of the alias
|
33
38
|
:param str last_update_time: Last update time of the alias
|
34
39
|
:param Sequence[str] merged_from_canonical_ids: List of canonical IDs merged with this alias
|
35
|
-
:param Mapping[str,
|
40
|
+
:param Mapping[str, str] metadata: Arbitrary metadata
|
36
41
|
:param str mount_accessor: Authentication mount acccessor which this alias belongs to
|
37
42
|
:param str mount_path: Authentication mount path which this alias belongs to
|
38
43
|
:param str mount_type: Authentication mount type which this alias belongs to
|
@@ -91,7 +96,7 @@ class GetEntityAliasResult(dict):
|
|
91
96
|
|
92
97
|
@property
|
93
98
|
@pulumi.getter
|
94
|
-
def metadata(self) -> Mapping[str,
|
99
|
+
def metadata(self) -> Mapping[str, str]:
|
95
100
|
"""
|
96
101
|
Arbitrary metadata
|
97
102
|
"""
|
pulumi_vault/jwt/_inputs.py
CHANGED
@@ -4,15 +4,70 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'AuthBackendTuneArgs',
|
19
|
+
'AuthBackendTuneArgsDict',
|
14
20
|
]
|
15
21
|
|
22
|
+
MYPY = False
|
23
|
+
|
24
|
+
if not MYPY:
|
25
|
+
class AuthBackendTuneArgsDict(TypedDict):
|
26
|
+
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
27
|
+
"""
|
28
|
+
List of headers to whitelist and allowing
|
29
|
+
a plugin to include them in the response.
|
30
|
+
"""
|
31
|
+
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
32
|
+
"""
|
33
|
+
Specifies the list of keys that will
|
34
|
+
not be HMAC'd by audit devices in the request data object.
|
35
|
+
"""
|
36
|
+
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
37
|
+
"""
|
38
|
+
Specifies the list of keys that will
|
39
|
+
not be HMAC'd by audit devices in the response data object.
|
40
|
+
"""
|
41
|
+
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
42
|
+
"""
|
43
|
+
Specifies the default time-to-live.
|
44
|
+
If set, this overrides the global default.
|
45
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
46
|
+
"""
|
47
|
+
listing_visibility: NotRequired[pulumi.Input[str]]
|
48
|
+
"""
|
49
|
+
Specifies whether to show this mount in
|
50
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
51
|
+
"""
|
52
|
+
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
53
|
+
"""
|
54
|
+
Specifies the maximum time-to-live.
|
55
|
+
If set, this overrides the global default.
|
56
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
57
|
+
"""
|
58
|
+
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
59
|
+
"""
|
60
|
+
List of headers to whitelist and
|
61
|
+
pass from the request to the backend.
|
62
|
+
"""
|
63
|
+
token_type: NotRequired[pulumi.Input[str]]
|
64
|
+
"""
|
65
|
+
Specifies the type of tokens that should be returned by
|
66
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
67
|
+
"""
|
68
|
+
elif False:
|
69
|
+
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
70
|
+
|
16
71
|
@pulumi.input_type
|
17
72
|
class AuthBackendTuneArgs:
|
18
73
|
def __init__(__self__, *,
|
pulumi_vault/jwt/auth_backend.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -765,7 +770,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
765
770
|
oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
766
771
|
path: Optional[pulumi.Input[str]] = None,
|
767
772
|
provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
768
|
-
tune: Optional[pulumi.Input[
|
773
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
769
774
|
type: Optional[pulumi.Input[str]] = None,
|
770
775
|
__props__=None):
|
771
776
|
"""
|
@@ -801,9 +806,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
801
806
|
oidc_client_id="1234567890",
|
802
807
|
oidc_client_secret="secret123456",
|
803
808
|
bound_issuer="https://myco.auth0.com/",
|
804
|
-
tune=
|
805
|
-
listing_visibility
|
806
|
-
)
|
809
|
+
tune={
|
810
|
+
"listing_visibility": "unauth",
|
811
|
+
})
|
807
812
|
```
|
808
813
|
|
809
814
|
Configuring the auth backend with a `provider_config:
|
@@ -908,9 +913,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
908
913
|
oidc_client_id="1234567890",
|
909
914
|
oidc_client_secret="secret123456",
|
910
915
|
bound_issuer="https://myco.auth0.com/",
|
911
|
-
tune=
|
912
|
-
listing_visibility
|
913
|
-
)
|
916
|
+
tune={
|
917
|
+
"listing_visibility": "unauth",
|
918
|
+
})
|
914
919
|
```
|
915
920
|
|
916
921
|
Configuring the auth backend with a `provider_config:
|
@@ -979,7 +984,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
979
984
|
oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
980
985
|
path: Optional[pulumi.Input[str]] = None,
|
981
986
|
provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
982
|
-
tune: Optional[pulumi.Input[
|
987
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
983
988
|
type: Optional[pulumi.Input[str]] = None,
|
984
989
|
__props__=None):
|
985
990
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -1044,7 +1049,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1044
1049
|
oidc_response_types: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1045
1050
|
path: Optional[pulumi.Input[str]] = None,
|
1046
1051
|
provider_config: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1047
|
-
tune: Optional[pulumi.Input[
|
1052
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
1048
1053
|
type: Optional[pulumi.Input[str]] = None) -> 'AuthBackend':
|
1049
1054
|
"""
|
1050
1055
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -19,10 +24,10 @@ class AuthBackendRoleArgs:
|
|
19
24
|
allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
20
25
|
backend: Optional[pulumi.Input[str]] = None,
|
21
26
|
bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
22
|
-
bound_claims: Optional[pulumi.Input[Mapping[str,
|
27
|
+
bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
23
28
|
bound_claims_type: Optional[pulumi.Input[str]] = None,
|
24
29
|
bound_subject: Optional[pulumi.Input[str]] = None,
|
25
|
-
claim_mappings: Optional[pulumi.Input[Mapping[str,
|
30
|
+
claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
26
31
|
clock_skew_leeway: Optional[pulumi.Input[int]] = None,
|
27
32
|
disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
|
28
33
|
expiration_leeway: Optional[pulumi.Input[int]] = None,
|
@@ -55,7 +60,7 @@ class AuthBackendRoleArgs:
|
|
55
60
|
Defaults to `jwt`.
|
56
61
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
|
57
62
|
type `oidc`) List of `aud` claims to match against. Any match is sufficient.
|
58
|
-
:param pulumi.Input[Mapping[str,
|
63
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_claims: If set, a map of claims to values to match against.
|
59
64
|
A claim's value must be a string, which may contain one value or multiple
|
60
65
|
comma-separated values, e.g. `"red"` or `"red,green,blue"`.
|
61
66
|
:param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
|
@@ -63,7 +68,7 @@ class AuthBackendRoleArgs:
|
|
63
68
|
match). Requires Vault 1.4.0 or above.
|
64
69
|
:param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
|
65
70
|
this value.
|
66
|
-
:param pulumi.Input[Mapping[str,
|
71
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] claim_mappings: If set, a map of claims (keys) to be copied
|
67
72
|
to specified metadata fields (values).
|
68
73
|
:param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
|
69
74
|
seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
@@ -229,7 +234,7 @@ class AuthBackendRoleArgs:
|
|
229
234
|
|
230
235
|
@property
|
231
236
|
@pulumi.getter(name="boundClaims")
|
232
|
-
def bound_claims(self) -> Optional[pulumi.Input[Mapping[str,
|
237
|
+
def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
233
238
|
"""
|
234
239
|
If set, a map of claims to values to match against.
|
235
240
|
A claim's value must be a string, which may contain one value or multiple
|
@@ -238,7 +243,7 @@ class AuthBackendRoleArgs:
|
|
238
243
|
return pulumi.get(self, "bound_claims")
|
239
244
|
|
240
245
|
@bound_claims.setter
|
241
|
-
def bound_claims(self, value: Optional[pulumi.Input[Mapping[str,
|
246
|
+
def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
242
247
|
pulumi.set(self, "bound_claims", value)
|
243
248
|
|
244
249
|
@property
|
@@ -270,7 +275,7 @@ class AuthBackendRoleArgs:
|
|
270
275
|
|
271
276
|
@property
|
272
277
|
@pulumi.getter(name="claimMappings")
|
273
|
-
def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str,
|
278
|
+
def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
274
279
|
"""
|
275
280
|
If set, a map of claims (keys) to be copied
|
276
281
|
to specified metadata fields (values).
|
@@ -278,7 +283,7 @@ class AuthBackendRoleArgs:
|
|
278
283
|
return pulumi.get(self, "claim_mappings")
|
279
284
|
|
280
285
|
@claim_mappings.setter
|
281
|
-
def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str,
|
286
|
+
def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
282
287
|
pulumi.set(self, "claim_mappings", value)
|
283
288
|
|
284
289
|
@property
|
@@ -547,10 +552,10 @@ class _AuthBackendRoleState:
|
|
547
552
|
allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
548
553
|
backend: Optional[pulumi.Input[str]] = None,
|
549
554
|
bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
550
|
-
bound_claims: Optional[pulumi.Input[Mapping[str,
|
555
|
+
bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
551
556
|
bound_claims_type: Optional[pulumi.Input[str]] = None,
|
552
557
|
bound_subject: Optional[pulumi.Input[str]] = None,
|
553
|
-
claim_mappings: Optional[pulumi.Input[Mapping[str,
|
558
|
+
claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
554
559
|
clock_skew_leeway: Optional[pulumi.Input[int]] = None,
|
555
560
|
disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
|
556
561
|
expiration_leeway: Optional[pulumi.Input[int]] = None,
|
@@ -581,7 +586,7 @@ class _AuthBackendRoleState:
|
|
581
586
|
Defaults to `jwt`.
|
582
587
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
|
583
588
|
type `oidc`) List of `aud` claims to match against. Any match is sufficient.
|
584
|
-
:param pulumi.Input[Mapping[str,
|
589
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_claims: If set, a map of claims to values to match against.
|
585
590
|
A claim's value must be a string, which may contain one value or multiple
|
586
591
|
comma-separated values, e.g. `"red"` or `"red,green,blue"`.
|
587
592
|
:param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
|
@@ -589,7 +594,7 @@ class _AuthBackendRoleState:
|
|
589
594
|
match). Requires Vault 1.4.0 or above.
|
590
595
|
:param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
|
591
596
|
this value.
|
592
|
-
:param pulumi.Input[Mapping[str,
|
597
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] claim_mappings: If set, a map of claims (keys) to be copied
|
593
598
|
to specified metadata fields (values).
|
594
599
|
:param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
|
595
600
|
seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
@@ -735,7 +740,7 @@ class _AuthBackendRoleState:
|
|
735
740
|
|
736
741
|
@property
|
737
742
|
@pulumi.getter(name="boundClaims")
|
738
|
-
def bound_claims(self) -> Optional[pulumi.Input[Mapping[str,
|
743
|
+
def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
739
744
|
"""
|
740
745
|
If set, a map of claims to values to match against.
|
741
746
|
A claim's value must be a string, which may contain one value or multiple
|
@@ -744,7 +749,7 @@ class _AuthBackendRoleState:
|
|
744
749
|
return pulumi.get(self, "bound_claims")
|
745
750
|
|
746
751
|
@bound_claims.setter
|
747
|
-
def bound_claims(self, value: Optional[pulumi.Input[Mapping[str,
|
752
|
+
def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
748
753
|
pulumi.set(self, "bound_claims", value)
|
749
754
|
|
750
755
|
@property
|
@@ -776,7 +781,7 @@ class _AuthBackendRoleState:
|
|
776
781
|
|
777
782
|
@property
|
778
783
|
@pulumi.getter(name="claimMappings")
|
779
|
-
def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str,
|
784
|
+
def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
780
785
|
"""
|
781
786
|
If set, a map of claims (keys) to be copied
|
782
787
|
to specified metadata fields (values).
|
@@ -784,7 +789,7 @@ class _AuthBackendRoleState:
|
|
784
789
|
return pulumi.get(self, "claim_mappings")
|
785
790
|
|
786
791
|
@claim_mappings.setter
|
787
|
-
def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str,
|
792
|
+
def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
788
793
|
pulumi.set(self, "claim_mappings", value)
|
789
794
|
|
790
795
|
@property
|
@@ -1081,10 +1086,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1081
1086
|
allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1082
1087
|
backend: Optional[pulumi.Input[str]] = None,
|
1083
1088
|
bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1084
|
-
bound_claims: Optional[pulumi.Input[Mapping[str,
|
1089
|
+
bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1085
1090
|
bound_claims_type: Optional[pulumi.Input[str]] = None,
|
1086
1091
|
bound_subject: Optional[pulumi.Input[str]] = None,
|
1087
|
-
claim_mappings: Optional[pulumi.Input[Mapping[str,
|
1092
|
+
claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1088
1093
|
clock_skew_leeway: Optional[pulumi.Input[int]] = None,
|
1089
1094
|
disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
|
1090
1095
|
expiration_leeway: Optional[pulumi.Input[int]] = None,
|
@@ -1176,7 +1181,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1176
1181
|
Defaults to `jwt`.
|
1177
1182
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
|
1178
1183
|
type `oidc`) List of `aud` claims to match against. Any match is sufficient.
|
1179
|
-
:param pulumi.Input[Mapping[str,
|
1184
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_claims: If set, a map of claims to values to match against.
|
1180
1185
|
A claim's value must be a string, which may contain one value or multiple
|
1181
1186
|
comma-separated values, e.g. `"red"` or `"red,green,blue"`.
|
1182
1187
|
:param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
|
@@ -1184,7 +1189,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1184
1189
|
match). Requires Vault 1.4.0 or above.
|
1185
1190
|
:param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
|
1186
1191
|
this value.
|
1187
|
-
:param pulumi.Input[Mapping[str,
|
1192
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] claim_mappings: If set, a map of claims (keys) to be copied
|
1188
1193
|
to specified metadata fields (values).
|
1189
1194
|
:param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
|
1190
1195
|
seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
@@ -1314,10 +1319,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1314
1319
|
allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1315
1320
|
backend: Optional[pulumi.Input[str]] = None,
|
1316
1321
|
bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1317
|
-
bound_claims: Optional[pulumi.Input[Mapping[str,
|
1322
|
+
bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1318
1323
|
bound_claims_type: Optional[pulumi.Input[str]] = None,
|
1319
1324
|
bound_subject: Optional[pulumi.Input[str]] = None,
|
1320
|
-
claim_mappings: Optional[pulumi.Input[Mapping[str,
|
1325
|
+
claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1321
1326
|
clock_skew_leeway: Optional[pulumi.Input[int]] = None,
|
1322
1327
|
disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
|
1323
1328
|
expiration_leeway: Optional[pulumi.Input[int]] = None,
|
@@ -1395,10 +1400,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1395
1400
|
allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1396
1401
|
backend: Optional[pulumi.Input[str]] = None,
|
1397
1402
|
bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1398
|
-
bound_claims: Optional[pulumi.Input[Mapping[str,
|
1403
|
+
bound_claims: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1399
1404
|
bound_claims_type: Optional[pulumi.Input[str]] = None,
|
1400
1405
|
bound_subject: Optional[pulumi.Input[str]] = None,
|
1401
|
-
claim_mappings: Optional[pulumi.Input[Mapping[str,
|
1406
|
+
claim_mappings: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1402
1407
|
clock_skew_leeway: Optional[pulumi.Input[int]] = None,
|
1403
1408
|
disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
|
1404
1409
|
expiration_leeway: Optional[pulumi.Input[int]] = None,
|
@@ -1434,7 +1439,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1434
1439
|
Defaults to `jwt`.
|
1435
1440
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
|
1436
1441
|
type `oidc`) List of `aud` claims to match against. Any match is sufficient.
|
1437
|
-
:param pulumi.Input[Mapping[str,
|
1442
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] bound_claims: If set, a map of claims to values to match against.
|
1438
1443
|
A claim's value must be a string, which may contain one value or multiple
|
1439
1444
|
comma-separated values, e.g. `"red"` or `"red,green,blue"`.
|
1440
1445
|
:param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
|
@@ -1442,7 +1447,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1442
1447
|
match). Requires Vault 1.4.0 or above.
|
1443
1448
|
:param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
|
1444
1449
|
this value.
|
1445
|
-
:param pulumi.Input[Mapping[str,
|
1450
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] claim_mappings: If set, a map of claims (keys) to be copied
|
1446
1451
|
to specified metadata fields (values).
|
1447
1452
|
:param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
|
1448
1453
|
seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
@@ -1552,7 +1557,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1552
1557
|
|
1553
1558
|
@property
|
1554
1559
|
@pulumi.getter(name="boundClaims")
|
1555
|
-
def bound_claims(self) -> pulumi.Output[Optional[Mapping[str,
|
1560
|
+
def bound_claims(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1556
1561
|
"""
|
1557
1562
|
If set, a map of claims to values to match against.
|
1558
1563
|
A claim's value must be a string, which may contain one value or multiple
|
@@ -1581,7 +1586,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1581
1586
|
|
1582
1587
|
@property
|
1583
1588
|
@pulumi.getter(name="claimMappings")
|
1584
|
-
def claim_mappings(self) -> pulumi.Output[Optional[Mapping[str,
|
1589
|
+
def claim_mappings(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1585
1590
|
"""
|
1586
1591
|
If set, a map of claims (keys) to be copied
|
1587
1592
|
to specified metadata fields (values).
|
pulumi_vault/jwt/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
pulumi_vault/kmip/secret_role.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretScopeArgs', 'SecretScope']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -176,9 +181,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
176
181
|
kubernetes_host=pulumi.get(__ret__, 'kubernetes_host'),
|
177
182
|
namespace=pulumi.get(__ret__, 'namespace'),
|
178
183
|
pem_keys=pulumi.get(__ret__, 'pem_keys'))
|
179
|
-
|
180
|
-
|
181
|
-
@_utilities.lift_output_func(get_auth_backend_config)
|
182
184
|
def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
183
185
|
disable_iss_validation: Optional[pulumi.Input[Optional[bool]]] = None,
|
184
186
|
disable_local_ca_jwt: Optional[pulumi.Input[Optional[bool]]] = None,
|
@@ -205,4 +207,24 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
|
|
205
207
|
*Available only for Vault Enterprise*.
|
206
208
|
:param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
207
209
|
"""
|
208
|
-
|
210
|
+
__args__ = dict()
|
211
|
+
__args__['backend'] = backend
|
212
|
+
__args__['disableIssValidation'] = disable_iss_validation
|
213
|
+
__args__['disableLocalCaJwt'] = disable_local_ca_jwt
|
214
|
+
__args__['issuer'] = issuer
|
215
|
+
__args__['kubernetesCaCert'] = kubernetes_ca_cert
|
216
|
+
__args__['kubernetesHost'] = kubernetes_host
|
217
|
+
__args__['namespace'] = namespace
|
218
|
+
__args__['pemKeys'] = pem_keys
|
219
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
220
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult)
|
221
|
+
return __ret__.apply(lambda __response__: GetAuthBackendConfigResult(
|
222
|
+
backend=pulumi.get(__response__, 'backend'),
|
223
|
+
disable_iss_validation=pulumi.get(__response__, 'disable_iss_validation'),
|
224
|
+
disable_local_ca_jwt=pulumi.get(__response__, 'disable_local_ca_jwt'),
|
225
|
+
id=pulumi.get(__response__, 'id'),
|
226
|
+
issuer=pulumi.get(__response__, 'issuer'),
|
227
|
+
kubernetes_ca_cert=pulumi.get(__response__, 'kubernetes_ca_cert'),
|
228
|
+
kubernetes_host=pulumi.get(__response__, 'kubernetes_host'),
|
229
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
230
|
+
pem_keys=pulumi.get(__response__, 'pem_keys')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -336,9 +341,6 @@ def get_auth_backend_role(audience: Optional[str] = None,
|
|
336
341
|
token_policies=pulumi.get(__ret__, 'token_policies'),
|
337
342
|
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
338
343
|
token_type=pulumi.get(__ret__, 'token_type'))
|
339
|
-
|
340
|
-
|
341
|
-
@_utilities.lift_output_func(get_auth_backend_role)
|
342
344
|
def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] = None,
|
343
345
|
backend: Optional[pulumi.Input[Optional[str]]] = None,
|
344
346
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -395,4 +397,37 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]]
|
|
395
397
|
`default-service` and `default-batch` which specify the type to return unless the client
|
396
398
|
requests a different type at generation time.
|
397
399
|
"""
|
398
|
-
|
400
|
+
__args__ = dict()
|
401
|
+
__args__['audience'] = audience
|
402
|
+
__args__['backend'] = backend
|
403
|
+
__args__['namespace'] = namespace
|
404
|
+
__args__['roleName'] = role_name
|
405
|
+
__args__['tokenBoundCidrs'] = token_bound_cidrs
|
406
|
+
__args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
|
407
|
+
__args__['tokenMaxTtl'] = token_max_ttl
|
408
|
+
__args__['tokenNoDefaultPolicy'] = token_no_default_policy
|
409
|
+
__args__['tokenNumUses'] = token_num_uses
|
410
|
+
__args__['tokenPeriod'] = token_period
|
411
|
+
__args__['tokenPolicies'] = token_policies
|
412
|
+
__args__['tokenTtl'] = token_ttl
|
413
|
+
__args__['tokenType'] = token_type
|
414
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
415
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
|
416
|
+
return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
|
417
|
+
alias_name_source=pulumi.get(__response__, 'alias_name_source'),
|
418
|
+
audience=pulumi.get(__response__, 'audience'),
|
419
|
+
backend=pulumi.get(__response__, 'backend'),
|
420
|
+
bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
|
421
|
+
bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
|
422
|
+
id=pulumi.get(__response__, 'id'),
|
423
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
424
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
425
|
+
token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
|
426
|
+
token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
|
427
|
+
token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
|
428
|
+
token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
|
429
|
+
token_num_uses=pulumi.get(__response__, 'token_num_uses'),
|
430
|
+
token_period=pulumi.get(__response__, 'token_period'),
|
431
|
+
token_policies=pulumi.get(__response__, 'token_policies'),
|
432
|
+
token_ttl=pulumi.get(__response__, 'token_ttl'),
|
433
|
+
token_type=pulumi.get(__response__, 'token_type')))
|