pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +0 -5
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +0 -5
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +34 -2185
- pulumi_vault/database/outputs.py +0 -145
- pulumi_vault/database/secret_backend_connection.py +0 -5
- pulumi_vault/database/secret_backend_role.py +0 -5
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +0 -5
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +4 -24
- pulumi_vault/generic/secret.py +0 -5
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +4 -17
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +4 -18
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +4 -23
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +4 -34
- pulumi_vault/identity/get_group.py +4 -40
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +4 -15
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +0 -5
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +0 -5
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +0 -5
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +0 -32
- pulumi_vault/kv/get_secret.py +4 -19
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
- pulumi_vault/kv/get_secret_v2.py +6 -25
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +0 -5
- pulumi_vault/kv/secret.py +0 -5
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +0 -5
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +0 -5
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +0 -5
- pulumi_vault/namespace.py +0 -5
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +0 -41
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +0 -5
- pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +4 -17
- pulumi_vault/pkisecret/outputs.py +0 -5
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +0 -5
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +0 -5
- pulumi_vault/secrets/sync_azure_destination.py +0 -5
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +0 -5
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +0 -39
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +4 -28
- pulumi_vault/transform/get_encode.py +4 -28
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +0 -5
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +0 -5
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['GroupAliasArgs', 'GroupAlias']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['GroupMemberEntityIdsArgs', 'GroupMemberEntityIds']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['GroupMemberGroupIdsArgs', 'GroupMemberGroupIds']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['GroupPoliciesArgs', 'GroupPolicies']
|
pulumi_vault/identity/mfa_duo.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaDuoArgs', 'MfaDuo']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaLoginEnforcementArgs', 'MfaLoginEnforcement']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaOktaArgs', 'MfaOkta']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaPingidArgs', 'MfaPingid']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['MfaTotpArgs', 'MfaTotp']
|
pulumi_vault/identity/oidc.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['OidcArgs', 'Oidc']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['OidcAssignmentArgs', 'OidcAssignment']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['OidcClientArgs', 'OidcClient']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['OidcKeyArgs', 'OidcKey']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['OidcKeyAllowedClientIDArgs', 'OidcKeyAllowedClientID']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['OidcProviderArgs', 'OidcProvider']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['OidcRoleArgs', 'OidcRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['OidcScopeArgs', 'OidcScope']
|
pulumi_vault/identity/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
pulumi_vault/jwt/_inputs.py
CHANGED
@@ -4,70 +4,15 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'AuthBackendTuneArgs',
|
19
|
-
'AuthBackendTuneArgsDict',
|
20
14
|
]
|
21
15
|
|
22
|
-
MYPY = False
|
23
|
-
|
24
|
-
if not MYPY:
|
25
|
-
class AuthBackendTuneArgsDict(TypedDict):
|
26
|
-
allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
27
|
-
"""
|
28
|
-
List of headers to whitelist and allowing
|
29
|
-
a plugin to include them in the response.
|
30
|
-
"""
|
31
|
-
audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
32
|
-
"""
|
33
|
-
Specifies the list of keys that will
|
34
|
-
not be HMAC'd by audit devices in the request data object.
|
35
|
-
"""
|
36
|
-
audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
37
|
-
"""
|
38
|
-
Specifies the list of keys that will
|
39
|
-
not be HMAC'd by audit devices in the response data object.
|
40
|
-
"""
|
41
|
-
default_lease_ttl: NotRequired[pulumi.Input[str]]
|
42
|
-
"""
|
43
|
-
Specifies the default time-to-live.
|
44
|
-
If set, this overrides the global default.
|
45
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
46
|
-
"""
|
47
|
-
listing_visibility: NotRequired[pulumi.Input[str]]
|
48
|
-
"""
|
49
|
-
Specifies whether to show this mount in
|
50
|
-
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
51
|
-
"""
|
52
|
-
max_lease_ttl: NotRequired[pulumi.Input[str]]
|
53
|
-
"""
|
54
|
-
Specifies the maximum time-to-live.
|
55
|
-
If set, this overrides the global default.
|
56
|
-
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
57
|
-
"""
|
58
|
-
passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
59
|
-
"""
|
60
|
-
List of headers to whitelist and
|
61
|
-
pass from the request to the backend.
|
62
|
-
"""
|
63
|
-
token_type: NotRequired[pulumi.Input[str]]
|
64
|
-
"""
|
65
|
-
Specifies the type of tokens that should be returned by
|
66
|
-
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
67
|
-
"""
|
68
|
-
elif False:
|
69
|
-
AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
|
70
|
-
|
71
16
|
@pulumi.input_type
|
72
17
|
class AuthBackendTuneArgs:
|
73
18
|
def __init__(__self__, *,
|
pulumi_vault/jwt/auth_backend.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
pulumi_vault/jwt/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
pulumi_vault/kmip/secret_role.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretRoleArgs', 'SecretRole']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretScopeArgs', 'SecretScope']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
|
@@ -27,8 +22,7 @@ class AuthBackendConfigArgs:
|
|
27
22
|
kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
|
28
23
|
namespace: Optional[pulumi.Input[str]] = None,
|
29
24
|
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
-
token_reviewer_jwt: Optional[pulumi.Input[str]] = None
|
31
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None):
|
25
|
+
token_reviewer_jwt: Optional[pulumi.Input[str]] = None):
|
32
26
|
"""
|
33
27
|
The set of arguments for constructing a AuthBackendConfig resource.
|
34
28
|
:param pulumi.Input[str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
@@ -43,7 +37,6 @@ class AuthBackendConfigArgs:
|
|
43
37
|
*Available only for Vault Enterprise*.
|
44
38
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
45
39
|
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
46
|
-
:param pulumi.Input[bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
47
40
|
"""
|
48
41
|
pulumi.set(__self__, "kubernetes_host", kubernetes_host)
|
49
42
|
if backend is not None:
|
@@ -62,8 +55,6 @@ class AuthBackendConfigArgs:
|
|
62
55
|
pulumi.set(__self__, "pem_keys", pem_keys)
|
63
56
|
if token_reviewer_jwt is not None:
|
64
57
|
pulumi.set(__self__, "token_reviewer_jwt", token_reviewer_jwt)
|
65
|
-
if use_annotations_as_alias_metadata is not None:
|
66
|
-
pulumi.set(__self__, "use_annotations_as_alias_metadata", use_annotations_as_alias_metadata)
|
67
58
|
|
68
59
|
@property
|
69
60
|
@pulumi.getter(name="kubernetesHost")
|
@@ -176,18 +167,6 @@ class AuthBackendConfigArgs:
|
|
176
167
|
def token_reviewer_jwt(self, value: Optional[pulumi.Input[str]]):
|
177
168
|
pulumi.set(self, "token_reviewer_jwt", value)
|
178
169
|
|
179
|
-
@property
|
180
|
-
@pulumi.getter(name="useAnnotationsAsAliasMetadata")
|
181
|
-
def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[bool]]:
|
182
|
-
"""
|
183
|
-
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
184
|
-
"""
|
185
|
-
return pulumi.get(self, "use_annotations_as_alias_metadata")
|
186
|
-
|
187
|
-
@use_annotations_as_alias_metadata.setter
|
188
|
-
def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[bool]]):
|
189
|
-
pulumi.set(self, "use_annotations_as_alias_metadata", value)
|
190
|
-
|
191
170
|
|
192
171
|
@pulumi.input_type
|
193
172
|
class _AuthBackendConfigState:
|
@@ -200,8 +179,7 @@ class _AuthBackendConfigState:
|
|
200
179
|
kubernetes_host: Optional[pulumi.Input[str]] = None,
|
201
180
|
namespace: Optional[pulumi.Input[str]] = None,
|
202
181
|
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
203
|
-
token_reviewer_jwt: Optional[pulumi.Input[str]] = None
|
204
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None):
|
182
|
+
token_reviewer_jwt: Optional[pulumi.Input[str]] = None):
|
205
183
|
"""
|
206
184
|
Input properties used for looking up and filtering AuthBackendConfig resources.
|
207
185
|
:param pulumi.Input[str] backend: Unique name of the kubernetes backend to configure.
|
@@ -216,7 +194,6 @@ class _AuthBackendConfigState:
|
|
216
194
|
*Available only for Vault Enterprise*.
|
217
195
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
218
196
|
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
219
|
-
:param pulumi.Input[bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
220
197
|
"""
|
221
198
|
if backend is not None:
|
222
199
|
pulumi.set(__self__, "backend", backend)
|
@@ -236,8 +213,6 @@ class _AuthBackendConfigState:
|
|
236
213
|
pulumi.set(__self__, "pem_keys", pem_keys)
|
237
214
|
if token_reviewer_jwt is not None:
|
238
215
|
pulumi.set(__self__, "token_reviewer_jwt", token_reviewer_jwt)
|
239
|
-
if use_annotations_as_alias_metadata is not None:
|
240
|
-
pulumi.set(__self__, "use_annotations_as_alias_metadata", use_annotations_as_alias_metadata)
|
241
216
|
|
242
217
|
@property
|
243
218
|
@pulumi.getter
|
@@ -350,18 +325,6 @@ class _AuthBackendConfigState:
|
|
350
325
|
def token_reviewer_jwt(self, value: Optional[pulumi.Input[str]]):
|
351
326
|
pulumi.set(self, "token_reviewer_jwt", value)
|
352
327
|
|
353
|
-
@property
|
354
|
-
@pulumi.getter(name="useAnnotationsAsAliasMetadata")
|
355
|
-
def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[bool]]:
|
356
|
-
"""
|
357
|
-
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
358
|
-
"""
|
359
|
-
return pulumi.get(self, "use_annotations_as_alias_metadata")
|
360
|
-
|
361
|
-
@use_annotations_as_alias_metadata.setter
|
362
|
-
def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[bool]]):
|
363
|
-
pulumi.set(self, "use_annotations_as_alias_metadata", value)
|
364
|
-
|
365
328
|
|
366
329
|
class AuthBackendConfig(pulumi.CustomResource):
|
367
330
|
@overload
|
@@ -377,7 +340,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
377
340
|
namespace: Optional[pulumi.Input[str]] = None,
|
378
341
|
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
379
342
|
token_reviewer_jwt: Optional[pulumi.Input[str]] = None,
|
380
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None,
|
381
343
|
__props__=None):
|
382
344
|
"""
|
383
345
|
Manages an Kubernetes auth backend config in a Vault server. See the [Vault
|
@@ -424,7 +386,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
424
386
|
*Available only for Vault Enterprise*.
|
425
387
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
426
388
|
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
427
|
-
:param pulumi.Input[bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
428
389
|
"""
|
429
390
|
...
|
430
391
|
@overload
|
@@ -487,7 +448,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
487
448
|
namespace: Optional[pulumi.Input[str]] = None,
|
488
449
|
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
489
450
|
token_reviewer_jwt: Optional[pulumi.Input[str]] = None,
|
490
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None,
|
491
451
|
__props__=None):
|
492
452
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
493
453
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -508,7 +468,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
508
468
|
__props__.__dict__["namespace"] = namespace
|
509
469
|
__props__.__dict__["pem_keys"] = pem_keys
|
510
470
|
__props__.__dict__["token_reviewer_jwt"] = None if token_reviewer_jwt is None else pulumi.Output.secret(token_reviewer_jwt)
|
511
|
-
__props__.__dict__["use_annotations_as_alias_metadata"] = use_annotations_as_alias_metadata
|
512
471
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["tokenReviewerJwt"])
|
513
472
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
514
473
|
super(AuthBackendConfig, __self__).__init__(
|
@@ -529,8 +488,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
529
488
|
kubernetes_host: Optional[pulumi.Input[str]] = None,
|
530
489
|
namespace: Optional[pulumi.Input[str]] = None,
|
531
490
|
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
532
|
-
token_reviewer_jwt: Optional[pulumi.Input[str]] = None
|
533
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None) -> 'AuthBackendConfig':
|
491
|
+
token_reviewer_jwt: Optional[pulumi.Input[str]] = None) -> 'AuthBackendConfig':
|
534
492
|
"""
|
535
493
|
Get an existing AuthBackendConfig resource's state with the given name, id, and optional extra
|
536
494
|
properties used to qualify the lookup.
|
@@ -550,7 +508,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
550
508
|
*Available only for Vault Enterprise*.
|
551
509
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
552
510
|
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
553
|
-
:param pulumi.Input[bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
554
511
|
"""
|
555
512
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
556
513
|
|
@@ -565,7 +522,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
565
522
|
__props__.__dict__["namespace"] = namespace
|
566
523
|
__props__.__dict__["pem_keys"] = pem_keys
|
567
524
|
__props__.__dict__["token_reviewer_jwt"] = token_reviewer_jwt
|
568
|
-
__props__.__dict__["use_annotations_as_alias_metadata"] = use_annotations_as_alias_metadata
|
569
525
|
return AuthBackendConfig(resource_name, opts=opts, __props__=__props__)
|
570
526
|
|
571
527
|
@property
|
@@ -643,11 +599,3 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
643
599
|
"""
|
644
600
|
return pulumi.get(self, "token_reviewer_jwt")
|
645
601
|
|
646
|
-
@property
|
647
|
-
@pulumi.getter(name="useAnnotationsAsAliasMetadata")
|
648
|
-
def use_annotations_as_alias_metadata(self) -> pulumi.Output[bool]:
|
649
|
-
"""
|
650
|
-
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
651
|
-
"""
|
652
|
-
return pulumi.get(self, "use_annotations_as_alias_metadata")
|
653
|
-
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|