pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2056
- pulumi_vault/database/outputs.py +54 -59
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +0 -5
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +0 -5
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +0 -5
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +6 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -5
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -33
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
pulumi_vault/jwt/_inputs.py
CHANGED
@@ -4,70 +4,15 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'AuthBackendTuneArgs',
|
19
|
-
'AuthBackendTuneArgsDict',
|
20
14
|
]
|
21
15
|
|
22
|
-
MYPY = False
|
23
|
-
|
24
|
-
if not MYPY:
|
25
|
-
class AuthBackendTuneArgsDict(TypedDict):
|
26
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
27
|
-
"""
|
28
|
-
List of headers to whitelist and allowing
|
29
|
-
a plugin to include them in the response.
|
30
|
-
"""
|
31
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
32
|
-
"""
|
33
|
-
Specifies the list of keys that will
|
34
|
-
not be HMAC'd by audit devices in the request data object.
|
35
|
-
"""
|
36
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
37
|
-
"""
|
38
|
-
Specifies the list of keys that will
|
39
|
-
not be HMAC'd by audit devices in the response data object.
|
40
|
-
"""
|
41
|
-
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
42
|
-
"""
|
43
|
-
Specifies the default time-to-live.
|
44
|
-
If set, this overrides the global default.
|
45
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
46
|
-
"""
|
47
|
-
listing_visibility: NotRequired[pulumi.Input[str]]
|
48
|
-
"""
|
49
|
-
Specifies whether to show this mount in
|
50
|
-
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
51
|
-
"""
|
52
|
-
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
53
|
-
"""
|
54
|
-
Specifies the maximum time-to-live.
|
55
|
-
If set, this overrides the global default.
|
56
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
57
|
-
"""
|
58
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
59
|
-
"""
|
60
|
-
List of headers to whitelist and
|
61
|
-
pass from the request to the backend.
|
62
|
-
"""
|
63
|
-
token_type: NotRequired[pulumi.Input[str]]
|
64
|
-
"""
|
65
|
-
Specifies the type of tokens that should be returned by
|
66
|
-
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
67
|
-
"""
|
68
|
-
elif False:
|
69
|
-
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
70
|
-
|
71
16
|
@pulumi.input_type
|
72
17
|
class AuthBackendTuneArgs:
|
73
18
|
def __init__(__self__, *,
|
pulumi_vault/jwt/auth_backend.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -24,10 +19,10 @@ class AuthBackendRoleArgs:
|
|
24
19
|
allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
20
|
backend: Optional[pulumi.Input[str]] = None,
|
26
21
|
bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
27
|
-
bound_claims: Optional[pulumi.Input[Mapping[str,
|
22
|
+
bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
28
23
|
bound_claims_type: Optional[pulumi.Input[str]] = None,
|
29
24
|
bound_subject: Optional[pulumi.Input[str]] = None,
|
30
|
-
claim_mappings: Optional[pulumi.Input[Mapping[str,
|
25
|
+
claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
31
26
|
clock_skew_leeway: Optional[pulumi.Input[int]] = None,
|
32
27
|
disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
|
33
28
|
expiration_leeway: Optional[pulumi.Input[int]] = None,
|
@@ -60,7 +55,7 @@ class AuthBackendRoleArgs:
|
|
60
55
|
Defaults to `jwt`.
|
61
56
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
|
62
57
|
type `oidc`) List of `aud` claims to match against. Any match is sufficient.
|
63
|
-
:param pulumi.Input[Mapping[str,
|
58
|
+
:param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
|
64
59
|
A claim's value must be a string, which may contain one value or multiple
|
65
60
|
comma-separated values, e.g. `"red"` or `"red,green,blue"`.
|
66
61
|
:param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
|
@@ -68,7 +63,7 @@ class AuthBackendRoleArgs:
|
|
68
63
|
match). Requires Vault 1.4.0 or above.
|
69
64
|
:param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
|
70
65
|
this value.
|
71
|
-
:param pulumi.Input[Mapping[str,
|
66
|
+
:param pulumi.Input[Mapping[str, Any]] claim_mappings: If set, a map of claims (keys) to be copied
|
72
67
|
to specified metadata fields (values).
|
73
68
|
:param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
|
74
69
|
seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
@@ -234,7 +229,7 @@ class AuthBackendRoleArgs:
|
|
234
229
|
|
235
230
|
@property
|
236
231
|
@pulumi.getter(name="boundClaims")
|
237
|
-
def bound_claims(self) -> Optional[pulumi.Input[Mapping[str,
|
232
|
+
def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
238
233
|
"""
|
239
234
|
If set, a map of claims to values to match against.
|
240
235
|
A claim's value must be a string, which may contain one value or multiple
|
@@ -243,7 +238,7 @@ class AuthBackendRoleArgs:
|
|
243
238
|
return pulumi.get(self, "bound_claims")
|
244
239
|
|
245
240
|
@bound_claims.setter
|
246
|
-
def bound_claims(self, value: Optional[pulumi.Input[Mapping[str,
|
241
|
+
def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
247
242
|
pulumi.set(self, "bound_claims", value)
|
248
243
|
|
249
244
|
@property
|
@@ -275,7 +270,7 @@ class AuthBackendRoleArgs:
|
|
275
270
|
|
276
271
|
@property
|
277
272
|
@pulumi.getter(name="claimMappings")
|
278
|
-
def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str,
|
273
|
+
def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
279
274
|
"""
|
280
275
|
If set, a map of claims (keys) to be copied
|
281
276
|
to specified metadata fields (values).
|
@@ -283,7 +278,7 @@ class AuthBackendRoleArgs:
|
|
283
278
|
return pulumi.get(self, "claim_mappings")
|
284
279
|
|
285
280
|
@claim_mappings.setter
|
286
|
-
def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str,
|
281
|
+
def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
287
282
|
pulumi.set(self, "claim_mappings", value)
|
288
283
|
|
289
284
|
@property
|
@@ -552,10 +547,10 @@ class _AuthBackendRoleState:
|
|
552
547
|
allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
553
548
|
backend: Optional[pulumi.Input[str]] = None,
|
554
549
|
bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
555
|
-
bound_claims: Optional[pulumi.Input[Mapping[str,
|
550
|
+
bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
556
551
|
bound_claims_type: Optional[pulumi.Input[str]] = None,
|
557
552
|
bound_subject: Optional[pulumi.Input[str]] = None,
|
558
|
-
claim_mappings: Optional[pulumi.Input[Mapping[str,
|
553
|
+
claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
559
554
|
clock_skew_leeway: Optional[pulumi.Input[int]] = None,
|
560
555
|
disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
|
561
556
|
expiration_leeway: Optional[pulumi.Input[int]] = None,
|
@@ -586,7 +581,7 @@ class _AuthBackendRoleState:
|
|
586
581
|
Defaults to `jwt`.
|
587
582
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
|
588
583
|
type `oidc`) List of `aud` claims to match against. Any match is sufficient.
|
589
|
-
:param pulumi.Input[Mapping[str,
|
584
|
+
:param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
|
590
585
|
A claim's value must be a string, which may contain one value or multiple
|
591
586
|
comma-separated values, e.g. `"red"` or `"red,green,blue"`.
|
592
587
|
:param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
|
@@ -594,7 +589,7 @@ class _AuthBackendRoleState:
|
|
594
589
|
match). Requires Vault 1.4.0 or above.
|
595
590
|
:param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
|
596
591
|
this value.
|
597
|
-
:param pulumi.Input[Mapping[str,
|
592
|
+
:param pulumi.Input[Mapping[str, Any]] claim_mappings: If set, a map of claims (keys) to be copied
|
598
593
|
to specified metadata fields (values).
|
599
594
|
:param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
|
600
595
|
seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
@@ -740,7 +735,7 @@ class _AuthBackendRoleState:
|
|
740
735
|
|
741
736
|
@property
|
742
737
|
@pulumi.getter(name="boundClaims")
|
743
|
-
def bound_claims(self) -> Optional[pulumi.Input[Mapping[str,
|
738
|
+
def bound_claims(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
744
739
|
"""
|
745
740
|
If set, a map of claims to values to match against.
|
746
741
|
A claim's value must be a string, which may contain one value or multiple
|
@@ -749,7 +744,7 @@ class _AuthBackendRoleState:
|
|
749
744
|
return pulumi.get(self, "bound_claims")
|
750
745
|
|
751
746
|
@bound_claims.setter
|
752
|
-
def bound_claims(self, value: Optional[pulumi.Input[Mapping[str,
|
747
|
+
def bound_claims(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
753
748
|
pulumi.set(self, "bound_claims", value)
|
754
749
|
|
755
750
|
@property
|
@@ -781,7 +776,7 @@ class _AuthBackendRoleState:
|
|
781
776
|
|
782
777
|
@property
|
783
778
|
@pulumi.getter(name="claimMappings")
|
784
|
-
def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str,
|
779
|
+
def claim_mappings(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
785
780
|
"""
|
786
781
|
If set, a map of claims (keys) to be copied
|
787
782
|
to specified metadata fields (values).
|
@@ -789,7 +784,7 @@ class _AuthBackendRoleState:
|
|
789
784
|
return pulumi.get(self, "claim_mappings")
|
790
785
|
|
791
786
|
@claim_mappings.setter
|
792
|
-
def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str,
|
787
|
+
def claim_mappings(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
793
788
|
pulumi.set(self, "claim_mappings", value)
|
794
789
|
|
795
790
|
@property
|
@@ -1086,10 +1081,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1086
1081
|
allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1087
1082
|
backend: Optional[pulumi.Input[str]] = None,
|
1088
1083
|
bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1089
|
-
bound_claims: Optional[pulumi.Input[Mapping[str,
|
1084
|
+
bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1090
1085
|
bound_claims_type: Optional[pulumi.Input[str]] = None,
|
1091
1086
|
bound_subject: Optional[pulumi.Input[str]] = None,
|
1092
|
-
claim_mappings: Optional[pulumi.Input[Mapping[str,
|
1087
|
+
claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1093
1088
|
clock_skew_leeway: Optional[pulumi.Input[int]] = None,
|
1094
1089
|
disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
|
1095
1090
|
expiration_leeway: Optional[pulumi.Input[int]] = None,
|
@@ -1181,7 +1176,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1181
1176
|
Defaults to `jwt`.
|
1182
1177
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
|
1183
1178
|
type `oidc`) List of `aud` claims to match against. Any match is sufficient.
|
1184
|
-
:param pulumi.Input[Mapping[str,
|
1179
|
+
:param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
|
1185
1180
|
A claim's value must be a string, which may contain one value or multiple
|
1186
1181
|
comma-separated values, e.g. `"red"` or `"red,green,blue"`.
|
1187
1182
|
:param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
|
@@ -1189,7 +1184,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1189
1184
|
match). Requires Vault 1.4.0 or above.
|
1190
1185
|
:param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
|
1191
1186
|
this value.
|
1192
|
-
:param pulumi.Input[Mapping[str,
|
1187
|
+
:param pulumi.Input[Mapping[str, Any]] claim_mappings: If set, a map of claims (keys) to be copied
|
1193
1188
|
to specified metadata fields (values).
|
1194
1189
|
:param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
|
1195
1190
|
seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
@@ -1319,10 +1314,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1319
1314
|
allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1320
1315
|
backend: Optional[pulumi.Input[str]] = None,
|
1321
1316
|
bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1322
|
-
bound_claims: Optional[pulumi.Input[Mapping[str,
|
1317
|
+
bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1323
1318
|
bound_claims_type: Optional[pulumi.Input[str]] = None,
|
1324
1319
|
bound_subject: Optional[pulumi.Input[str]] = None,
|
1325
|
-
claim_mappings: Optional[pulumi.Input[Mapping[str,
|
1320
|
+
claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1326
1321
|
clock_skew_leeway: Optional[pulumi.Input[int]] = None,
|
1327
1322
|
disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
|
1328
1323
|
expiration_leeway: Optional[pulumi.Input[int]] = None,
|
@@ -1400,10 +1395,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1400
1395
|
allowed_redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1401
1396
|
backend: Optional[pulumi.Input[str]] = None,
|
1402
1397
|
bound_audiences: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1403
|
-
bound_claims: Optional[pulumi.Input[Mapping[str,
|
1398
|
+
bound_claims: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1404
1399
|
bound_claims_type: Optional[pulumi.Input[str]] = None,
|
1405
1400
|
bound_subject: Optional[pulumi.Input[str]] = None,
|
1406
|
-
claim_mappings: Optional[pulumi.Input[Mapping[str,
|
1401
|
+
claim_mappings: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1407
1402
|
clock_skew_leeway: Optional[pulumi.Input[int]] = None,
|
1408
1403
|
disable_bound_claims_parsing: Optional[pulumi.Input[bool]] = None,
|
1409
1404
|
expiration_leeway: Optional[pulumi.Input[int]] = None,
|
@@ -1439,7 +1434,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1439
1434
|
Defaults to `jwt`.
|
1440
1435
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
|
1441
1436
|
type `oidc`) List of `aud` claims to match against. Any match is sufficient.
|
1442
|
-
:param pulumi.Input[Mapping[str,
|
1437
|
+
:param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
|
1443
1438
|
A claim's value must be a string, which may contain one value or multiple
|
1444
1439
|
comma-separated values, e.g. `"red"` or `"red,green,blue"`.
|
1445
1440
|
:param pulumi.Input[str] bound_claims_type: How to interpret values in the claims/values
|
@@ -1447,7 +1442,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1447
1442
|
match). Requires Vault 1.4.0 or above.
|
1448
1443
|
:param pulumi.Input[str] bound_subject: If set, requires that the `sub` claim matches
|
1449
1444
|
this value.
|
1450
|
-
:param pulumi.Input[Mapping[str,
|
1445
|
+
:param pulumi.Input[Mapping[str, Any]] claim_mappings: If set, a map of claims (keys) to be copied
|
1451
1446
|
to specified metadata fields (values).
|
1452
1447
|
:param pulumi.Input[int] clock_skew_leeway: The amount of leeway to add to all claims to account for clock skew, in
|
1453
1448
|
seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
@@ -1557,7 +1552,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1557
1552
|
|
1558
1553
|
@property
|
1559
1554
|
@pulumi.getter(name="boundClaims")
|
1560
|
-
def bound_claims(self) -> pulumi.Output[Optional[Mapping[str,
|
1555
|
+
def bound_claims(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1561
1556
|
"""
|
1562
1557
|
If set, a map of claims to values to match against.
|
1563
1558
|
A claim's value must be a string, which may contain one value or multiple
|
@@ -1586,7 +1581,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1586
1581
|
|
1587
1582
|
@property
|
1588
1583
|
@pulumi.getter(name="claimMappings")
|
1589
|
-
def claim_mappings(self) -> pulumi.Output[Optional[Mapping[str,
|
1584
|
+
def claim_mappings(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1590
1585
|
"""
|
1591
1586
|
If set, a map of claims (keys) to be copied
|
1592
1587
|
to specified metadata fields (values).
|
pulumi_vault/jwt/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
pulumi_vault/kmip/secret_role.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretScopeArgs', 'SecretScope']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -181,6 +176,9 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
181
176
|
kubernetes_host=pulumi.get(__ret__, 'kubernetes_host'),
|
182
177
|
namespace=pulumi.get(__ret__, 'namespace'),
|
183
178
|
pem_keys=pulumi.get(__ret__, 'pem_keys'))
|
179
|
+
|
180
|
+
|
181
|
+
@_utilities.lift_output_func(get_auth_backend_config)
|
184
182
|
def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
185
183
|
disable_iss_validation: Optional[pulumi.Input[Optional[bool]]] = None,
|
186
184
|
disable_local_ca_jwt: Optional[pulumi.Input[Optional[bool]]] = None,
|
@@ -207,24 +205,4 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
|
|
207
205
|
*Available only for Vault Enterprise*.
|
208
206
|
:param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
209
207
|
"""
|
210
|
-
|
211
|
-
__args__['backend'] = backend
|
212
|
-
__args__['disableIssValidation'] = disable_iss_validation
|
213
|
-
__args__['disableLocalCaJwt'] = disable_local_ca_jwt
|
214
|
-
__args__['issuer'] = issuer
|
215
|
-
__args__['kubernetesCaCert'] = kubernetes_ca_cert
|
216
|
-
__args__['kubernetesHost'] = kubernetes_host
|
217
|
-
__args__['namespace'] = namespace
|
218
|
-
__args__['pemKeys'] = pem_keys
|
219
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
220
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult)
|
221
|
-
return __ret__.apply(lambda __response__: GetAuthBackendConfigResult(
|
222
|
-
backend=pulumi.get(__response__, 'backend'),
|
223
|
-
disable_iss_validation=pulumi.get(__response__, 'disable_iss_validation'),
|
224
|
-
disable_local_ca_jwt=pulumi.get(__response__, 'disable_local_ca_jwt'),
|
225
|
-
id=pulumi.get(__response__, 'id'),
|
226
|
-
issuer=pulumi.get(__response__, 'issuer'),
|
227
|
-
kubernetes_ca_cert=pulumi.get(__response__, 'kubernetes_ca_cert'),
|
228
|
-
kubernetes_host=pulumi.get(__response__, 'kubernetes_host'),
|
229
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
230
|
-
pem_keys=pulumi.get(__response__, 'pem_keys')))
|
208
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -341,6 +336,9 @@ def get_auth_backend_role(audience: Optional[str] = None,
|
|
341
336
|
token_policies=pulumi.get(__ret__, 'token_policies'),
|
342
337
|
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
343
338
|
token_type=pulumi.get(__ret__, 'token_type'))
|
339
|
+
|
340
|
+
|
341
|
+
@_utilities.lift_output_func(get_auth_backend_role)
|
344
342
|
def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] = None,
|
345
343
|
backend: Optional[pulumi.Input[Optional[str]]] = None,
|
346
344
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -397,37 +395,4 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]]
|
|
397
395
|
`default-service` and `default-batch` which specify the type to return unless the client
|
398
396
|
requests a different type at generation time.
|
399
397
|
"""
|
400
|
-
|
401
|
-
__args__['audience'] = audience
|
402
|
-
__args__['backend'] = backend
|
403
|
-
__args__['namespace'] = namespace
|
404
|
-
__args__['roleName'] = role_name
|
405
|
-
__args__['tokenBoundCidrs'] = token_bound_cidrs
|
406
|
-
__args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
|
407
|
-
__args__['tokenMaxTtl'] = token_max_ttl
|
408
|
-
__args__['tokenNoDefaultPolicy'] = token_no_default_policy
|
409
|
-
__args__['tokenNumUses'] = token_num_uses
|
410
|
-
__args__['tokenPeriod'] = token_period
|
411
|
-
__args__['tokenPolicies'] = token_policies
|
412
|
-
__args__['tokenTtl'] = token_ttl
|
413
|
-
__args__['tokenType'] = token_type
|
414
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
415
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
|
416
|
-
return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
|
417
|
-
alias_name_source=pulumi.get(__response__, 'alias_name_source'),
|
418
|
-
audience=pulumi.get(__response__, 'audience'),
|
419
|
-
backend=pulumi.get(__response__, 'backend'),
|
420
|
-
bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
|
421
|
-
bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
|
422
|
-
id=pulumi.get(__response__, 'id'),
|
423
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
424
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
425
|
-
token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
|
426
|
-
token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
|
427
|
-
token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
|
428
|
-
token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
|
429
|
-
token_num_uses=pulumi.get(__response__, 'token_num_uses'),
|
430
|
-
token_period=pulumi.get(__response__, 'token_period'),
|
431
|
-
token_policies=pulumi.get(__response__, 'token_policies'),
|
432
|
-
token_ttl=pulumi.get(__response__, 'token_ttl'),
|
433
|
-
token_type=pulumi.get(__response__, 'token_type')))
|
398
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -259,6 +254,9 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
259
254
|
service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
|
260
255
|
service_account_token=pulumi.get(__ret__, 'service_account_token'),
|
261
256
|
ttl=pulumi.get(__ret__, 'ttl'))
|
257
|
+
|
258
|
+
|
259
|
+
@_utilities.lift_output_func(get_service_account_token)
|
262
260
|
def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None,
|
263
261
|
cluster_role_binding: Optional[pulumi.Input[Optional[bool]]] = None,
|
264
262
|
kubernetes_namespace: Optional[pulumi.Input[str]] = None,
|
@@ -319,26 +317,4 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
319
317
|
:param str ttl: The TTL of the generated Kubernetes service account token, specified in
|
320
318
|
seconds or as a Go duration format string.
|
321
319
|
"""
|
322
|
-
|
323
|
-
__args__['backend'] = backend
|
324
|
-
__args__['clusterRoleBinding'] = cluster_role_binding
|
325
|
-
__args__['kubernetesNamespace'] = kubernetes_namespace
|
326
|
-
__args__['namespace'] = namespace
|
327
|
-
__args__['role'] = role
|
328
|
-
__args__['ttl'] = ttl
|
329
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
330
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult)
|
331
|
-
return __ret__.apply(lambda __response__: GetServiceAccountTokenResult(
|
332
|
-
backend=pulumi.get(__response__, 'backend'),
|
333
|
-
cluster_role_binding=pulumi.get(__response__, 'cluster_role_binding'),
|
334
|
-
id=pulumi.get(__response__, 'id'),
|
335
|
-
kubernetes_namespace=pulumi.get(__response__, 'kubernetes_namespace'),
|
336
|
-
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
337
|
-
lease_id=pulumi.get(__response__, 'lease_id'),
|
338
|
-
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
339
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
340
|
-
role=pulumi.get(__response__, 'role'),
|
341
|
-
service_account_name=pulumi.get(__response__, 'service_account_name'),
|
342
|
-
service_account_namespace=pulumi.get(__response__, 'service_account_namespace'),
|
343
|
-
service_account_token=pulumi.get(__response__, 'service_account_token'),
|
344
|
-
ttl=pulumi.get(__response__, 'ttl')))
|
320
|
+
...
|