pulumi-vault 6.6.0a1741836364__py3-none-any.whl → 6.7.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +583 -562
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +188 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +68 -18
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +73 -60
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.7.0.dist-info/RECORD +265 -0
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
- pulumi_vault-6.6.0a1741836364.dist-info/RECORD +0 -265
- {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -69,17 +70,17 @@ class GetServiceAccountTokenResult:
|
|
69
70
|
|
70
71
|
@property
|
71
72
|
@pulumi.getter
|
72
|
-
def backend(self) -> str:
|
73
|
+
def backend(self) -> builtins.str:
|
73
74
|
return pulumi.get(self, "backend")
|
74
75
|
|
75
76
|
@property
|
76
77
|
@pulumi.getter(name="clusterRoleBinding")
|
77
|
-
def cluster_role_binding(self) -> Optional[bool]:
|
78
|
+
def cluster_role_binding(self) -> Optional[builtins.bool]:
|
78
79
|
return pulumi.get(self, "cluster_role_binding")
|
79
80
|
|
80
81
|
@property
|
81
82
|
@pulumi.getter
|
82
|
-
def id(self) -> str:
|
83
|
+
def id(self) -> builtins.str:
|
83
84
|
"""
|
84
85
|
The provider-assigned unique ID for this managed resource.
|
85
86
|
"""
|
@@ -87,12 +88,12 @@ class GetServiceAccountTokenResult:
|
|
87
88
|
|
88
89
|
@property
|
89
90
|
@pulumi.getter(name="kubernetesNamespace")
|
90
|
-
def kubernetes_namespace(self) -> str:
|
91
|
+
def kubernetes_namespace(self) -> builtins.str:
|
91
92
|
return pulumi.get(self, "kubernetes_namespace")
|
92
93
|
|
93
94
|
@property
|
94
95
|
@pulumi.getter(name="leaseDuration")
|
95
|
-
def lease_duration(self) -> int:
|
96
|
+
def lease_duration(self) -> builtins.int:
|
96
97
|
"""
|
97
98
|
The duration of the lease in seconds.
|
98
99
|
"""
|
@@ -100,7 +101,7 @@ class GetServiceAccountTokenResult:
|
|
100
101
|
|
101
102
|
@property
|
102
103
|
@pulumi.getter(name="leaseId")
|
103
|
-
def lease_id(self) -> str:
|
104
|
+
def lease_id(self) -> builtins.str:
|
104
105
|
"""
|
105
106
|
The lease identifier assigned by Vault.
|
106
107
|
"""
|
@@ -108,7 +109,7 @@ class GetServiceAccountTokenResult:
|
|
108
109
|
|
109
110
|
@property
|
110
111
|
@pulumi.getter(name="leaseRenewable")
|
111
|
-
def lease_renewable(self) -> bool:
|
112
|
+
def lease_renewable(self) -> builtins.bool:
|
112
113
|
"""
|
113
114
|
True if the duration of this lease can be extended through renewal.
|
114
115
|
"""
|
@@ -116,17 +117,17 @@ class GetServiceAccountTokenResult:
|
|
116
117
|
|
117
118
|
@property
|
118
119
|
@pulumi.getter
|
119
|
-
def namespace(self) -> Optional[str]:
|
120
|
+
def namespace(self) -> Optional[builtins.str]:
|
120
121
|
return pulumi.get(self, "namespace")
|
121
122
|
|
122
123
|
@property
|
123
124
|
@pulumi.getter
|
124
|
-
def role(self) -> str:
|
125
|
+
def role(self) -> builtins.str:
|
125
126
|
return pulumi.get(self, "role")
|
126
127
|
|
127
128
|
@property
|
128
129
|
@pulumi.getter(name="serviceAccountName")
|
129
|
-
def service_account_name(self) -> str:
|
130
|
+
def service_account_name(self) -> builtins.str:
|
130
131
|
"""
|
131
132
|
The name of the service account associated with the token.
|
132
133
|
"""
|
@@ -134,7 +135,7 @@ class GetServiceAccountTokenResult:
|
|
134
135
|
|
135
136
|
@property
|
136
137
|
@pulumi.getter(name="serviceAccountNamespace")
|
137
|
-
def service_account_namespace(self) -> str:
|
138
|
+
def service_account_namespace(self) -> builtins.str:
|
138
139
|
"""
|
139
140
|
The Kubernetes namespace that the service account resides in.
|
140
141
|
"""
|
@@ -142,7 +143,7 @@ class GetServiceAccountTokenResult:
|
|
142
143
|
|
143
144
|
@property
|
144
145
|
@pulumi.getter(name="serviceAccountToken")
|
145
|
-
def service_account_token(self) -> str:
|
146
|
+
def service_account_token(self) -> builtins.str:
|
146
147
|
"""
|
147
148
|
The Kubernetes service account token.
|
148
149
|
"""
|
@@ -150,7 +151,7 @@ class GetServiceAccountTokenResult:
|
|
150
151
|
|
151
152
|
@property
|
152
153
|
@pulumi.getter
|
153
|
-
def ttl(self) -> Optional[str]:
|
154
|
+
def ttl(self) -> Optional[builtins.str]:
|
154
155
|
return pulumi.get(self, "ttl")
|
155
156
|
|
156
157
|
|
@@ -175,12 +176,12 @@ class AwaitableGetServiceAccountTokenResult(GetServiceAccountTokenResult):
|
|
175
176
|
ttl=self.ttl)
|
176
177
|
|
177
178
|
|
178
|
-
def get_service_account_token(backend: Optional[str] = None,
|
179
|
-
cluster_role_binding: Optional[bool] = None,
|
180
|
-
kubernetes_namespace: Optional[str] = None,
|
181
|
-
namespace: Optional[str] = None,
|
182
|
-
role: Optional[str] = None,
|
183
|
-
ttl: Optional[str] = None,
|
179
|
+
def get_service_account_token(backend: Optional[builtins.str] = None,
|
180
|
+
cluster_role_binding: Optional[builtins.bool] = None,
|
181
|
+
kubernetes_namespace: Optional[builtins.str] = None,
|
182
|
+
namespace: Optional[builtins.str] = None,
|
183
|
+
role: Optional[builtins.str] = None,
|
184
|
+
ttl: Optional[builtins.str] = None,
|
184
185
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetServiceAccountTokenResult:
|
185
186
|
"""
|
186
187
|
## Example Usage
|
@@ -220,19 +221,19 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
220
221
|
```
|
221
222
|
|
222
223
|
|
223
|
-
:param str backend: The Kubernetes secret backend to generate service account
|
224
|
+
:param builtins.str backend: The Kubernetes secret backend to generate service account
|
224
225
|
tokens from.
|
225
|
-
:param bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
|
226
|
+
:param builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
|
226
227
|
permissions across the whole cluster instead of within a namespace.
|
227
|
-
:param str kubernetes_namespace: The name of the Kubernetes namespace in which to
|
228
|
+
:param builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
|
228
229
|
generate the credentials.
|
229
|
-
:param str namespace: The namespace of the target resource.
|
230
|
+
:param builtins.str namespace: The namespace of the target resource.
|
230
231
|
The value should not contain leading or trailing forward slashes.
|
231
232
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
232
233
|
*Available only for Vault Enterprise*.
|
233
|
-
:param str role: The name of the Kubernetes secret backend role to generate service
|
234
|
+
:param builtins.str role: The name of the Kubernetes secret backend role to generate service
|
234
235
|
account tokens from.
|
235
|
-
:param str ttl: The TTL of the generated Kubernetes service account token, specified in
|
236
|
+
:param builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
|
236
237
|
seconds or as a Go duration format string.
|
237
238
|
"""
|
238
239
|
__args__ = dict()
|
@@ -259,12 +260,12 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
259
260
|
service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
|
260
261
|
service_account_token=pulumi.get(__ret__, 'service_account_token'),
|
261
262
|
ttl=pulumi.get(__ret__, 'ttl'))
|
262
|
-
def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None,
|
263
|
-
cluster_role_binding: Optional[pulumi.Input[Optional[bool]]] = None,
|
264
|
-
kubernetes_namespace: Optional[pulumi.Input[str]] = None,
|
265
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
266
|
-
role: Optional[pulumi.Input[str]] = None,
|
267
|
-
ttl: Optional[pulumi.Input[Optional[str]]] = None,
|
263
|
+
def get_service_account_token_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
264
|
+
cluster_role_binding: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
265
|
+
kubernetes_namespace: Optional[pulumi.Input[builtins.str]] = None,
|
266
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
267
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
268
|
+
ttl: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
268
269
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetServiceAccountTokenResult]:
|
269
270
|
"""
|
270
271
|
## Example Usage
|
@@ -304,19 +305,19 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
304
305
|
```
|
305
306
|
|
306
307
|
|
307
|
-
:param str backend: The Kubernetes secret backend to generate service account
|
308
|
+
:param builtins.str backend: The Kubernetes secret backend to generate service account
|
308
309
|
tokens from.
|
309
|
-
:param bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
|
310
|
+
:param builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
|
310
311
|
permissions across the whole cluster instead of within a namespace.
|
311
|
-
:param str kubernetes_namespace: The name of the Kubernetes namespace in which to
|
312
|
+
:param builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
|
312
313
|
generate the credentials.
|
313
|
-
:param str namespace: The namespace of the target resource.
|
314
|
+
:param builtins.str namespace: The namespace of the target resource.
|
314
315
|
The value should not contain leading or trailing forward slashes.
|
315
316
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
316
317
|
*Available only for Vault Enterprise*.
|
317
|
-
:param str role: The name of the Kubernetes secret backend role to generate service
|
318
|
+
:param builtins.str role: The name of the Kubernetes secret backend role to generate service
|
318
319
|
account tokens from.
|
319
|
-
:param str ttl: The TTL of the generated Kubernetes service account token, specified in
|
320
|
+
:param builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
|
320
321
|
seconds or as a Go duration format string.
|
321
322
|
"""
|
322
323
|
__args__ = dict()
|