pulumi-vault 6.6.0a1741836364__py3-none-any.whl → 6.7.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +583 -562
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +188 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +68 -18
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +73 -60
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
  261. pulumi_vault-6.7.0.dist-info/RECORD +265 -0
  262. {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
  263. pulumi_vault-6.6.0a1741836364.dist-info/RECORD +0 -265
  264. {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -69,17 +70,17 @@ class GetServiceAccountTokenResult:
69
70
 
70
71
  @property
71
72
  @pulumi.getter
72
- def backend(self) -> str:
73
+ def backend(self) -> builtins.str:
73
74
  return pulumi.get(self, "backend")
74
75
 
75
76
  @property
76
77
  @pulumi.getter(name="clusterRoleBinding")
77
- def cluster_role_binding(self) -> Optional[bool]:
78
+ def cluster_role_binding(self) -> Optional[builtins.bool]:
78
79
  return pulumi.get(self, "cluster_role_binding")
79
80
 
80
81
  @property
81
82
  @pulumi.getter
82
- def id(self) -> str:
83
+ def id(self) -> builtins.str:
83
84
  """
84
85
  The provider-assigned unique ID for this managed resource.
85
86
  """
@@ -87,12 +88,12 @@ class GetServiceAccountTokenResult:
87
88
 
88
89
  @property
89
90
  @pulumi.getter(name="kubernetesNamespace")
90
- def kubernetes_namespace(self) -> str:
91
+ def kubernetes_namespace(self) -> builtins.str:
91
92
  return pulumi.get(self, "kubernetes_namespace")
92
93
 
93
94
  @property
94
95
  @pulumi.getter(name="leaseDuration")
95
- def lease_duration(self) -> int:
96
+ def lease_duration(self) -> builtins.int:
96
97
  """
97
98
  The duration of the lease in seconds.
98
99
  """
@@ -100,7 +101,7 @@ class GetServiceAccountTokenResult:
100
101
 
101
102
  @property
102
103
  @pulumi.getter(name="leaseId")
103
- def lease_id(self) -> str:
104
+ def lease_id(self) -> builtins.str:
104
105
  """
105
106
  The lease identifier assigned by Vault.
106
107
  """
@@ -108,7 +109,7 @@ class GetServiceAccountTokenResult:
108
109
 
109
110
  @property
110
111
  @pulumi.getter(name="leaseRenewable")
111
- def lease_renewable(self) -> bool:
112
+ def lease_renewable(self) -> builtins.bool:
112
113
  """
113
114
  True if the duration of this lease can be extended through renewal.
114
115
  """
@@ -116,17 +117,17 @@ class GetServiceAccountTokenResult:
116
117
 
117
118
  @property
118
119
  @pulumi.getter
119
- def namespace(self) -> Optional[str]:
120
+ def namespace(self) -> Optional[builtins.str]:
120
121
  return pulumi.get(self, "namespace")
121
122
 
122
123
  @property
123
124
  @pulumi.getter
124
- def role(self) -> str:
125
+ def role(self) -> builtins.str:
125
126
  return pulumi.get(self, "role")
126
127
 
127
128
  @property
128
129
  @pulumi.getter(name="serviceAccountName")
129
- def service_account_name(self) -> str:
130
+ def service_account_name(self) -> builtins.str:
130
131
  """
131
132
  The name of the service account associated with the token.
132
133
  """
@@ -134,7 +135,7 @@ class GetServiceAccountTokenResult:
134
135
 
135
136
  @property
136
137
  @pulumi.getter(name="serviceAccountNamespace")
137
- def service_account_namespace(self) -> str:
138
+ def service_account_namespace(self) -> builtins.str:
138
139
  """
139
140
  The Kubernetes namespace that the service account resides in.
140
141
  """
@@ -142,7 +143,7 @@ class GetServiceAccountTokenResult:
142
143
 
143
144
  @property
144
145
  @pulumi.getter(name="serviceAccountToken")
145
- def service_account_token(self) -> str:
146
+ def service_account_token(self) -> builtins.str:
146
147
  """
147
148
  The Kubernetes service account token.
148
149
  """
@@ -150,7 +151,7 @@ class GetServiceAccountTokenResult:
150
151
 
151
152
  @property
152
153
  @pulumi.getter
153
- def ttl(self) -> Optional[str]:
154
+ def ttl(self) -> Optional[builtins.str]:
154
155
  return pulumi.get(self, "ttl")
155
156
 
156
157
 
@@ -175,12 +176,12 @@ class AwaitableGetServiceAccountTokenResult(GetServiceAccountTokenResult):
175
176
  ttl=self.ttl)
176
177
 
177
178
 
178
- def get_service_account_token(backend: Optional[str] = None,
179
- cluster_role_binding: Optional[bool] = None,
180
- kubernetes_namespace: Optional[str] = None,
181
- namespace: Optional[str] = None,
182
- role: Optional[str] = None,
183
- ttl: Optional[str] = None,
179
+ def get_service_account_token(backend: Optional[builtins.str] = None,
180
+ cluster_role_binding: Optional[builtins.bool] = None,
181
+ kubernetes_namespace: Optional[builtins.str] = None,
182
+ namespace: Optional[builtins.str] = None,
183
+ role: Optional[builtins.str] = None,
184
+ ttl: Optional[builtins.str] = None,
184
185
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetServiceAccountTokenResult:
185
186
  """
186
187
  ## Example Usage
@@ -220,19 +221,19 @@ def get_service_account_token(backend: Optional[str] = None,
220
221
  ```
221
222
 
222
223
 
223
- :param str backend: The Kubernetes secret backend to generate service account
224
+ :param builtins.str backend: The Kubernetes secret backend to generate service account
224
225
  tokens from.
225
- :param bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
226
+ :param builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
226
227
  permissions across the whole cluster instead of within a namespace.
227
- :param str kubernetes_namespace: The name of the Kubernetes namespace in which to
228
+ :param builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
228
229
  generate the credentials.
229
- :param str namespace: The namespace of the target resource.
230
+ :param builtins.str namespace: The namespace of the target resource.
230
231
  The value should not contain leading or trailing forward slashes.
231
232
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
232
233
  *Available only for Vault Enterprise*.
233
- :param str role: The name of the Kubernetes secret backend role to generate service
234
+ :param builtins.str role: The name of the Kubernetes secret backend role to generate service
234
235
  account tokens from.
235
- :param str ttl: The TTL of the generated Kubernetes service account token, specified in
236
+ :param builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
236
237
  seconds or as a Go duration format string.
237
238
  """
238
239
  __args__ = dict()
@@ -259,12 +260,12 @@ def get_service_account_token(backend: Optional[str] = None,
259
260
  service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
260
261
  service_account_token=pulumi.get(__ret__, 'service_account_token'),
261
262
  ttl=pulumi.get(__ret__, 'ttl'))
262
- def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None,
263
- cluster_role_binding: Optional[pulumi.Input[Optional[bool]]] = None,
264
- kubernetes_namespace: Optional[pulumi.Input[str]] = None,
265
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
266
- role: Optional[pulumi.Input[str]] = None,
267
- ttl: Optional[pulumi.Input[Optional[str]]] = None,
263
+ def get_service_account_token_output(backend: Optional[pulumi.Input[builtins.str]] = None,
264
+ cluster_role_binding: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
265
+ kubernetes_namespace: Optional[pulumi.Input[builtins.str]] = None,
266
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
267
+ role: Optional[pulumi.Input[builtins.str]] = None,
268
+ ttl: Optional[pulumi.Input[Optional[builtins.str]]] = None,
268
269
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetServiceAccountTokenResult]:
269
270
  """
270
271
  ## Example Usage
@@ -304,19 +305,19 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
304
305
  ```
305
306
 
306
307
 
307
- :param str backend: The Kubernetes secret backend to generate service account
308
+ :param builtins.str backend: The Kubernetes secret backend to generate service account
308
309
  tokens from.
309
- :param bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
310
+ :param builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
310
311
  permissions across the whole cluster instead of within a namespace.
311
- :param str kubernetes_namespace: The name of the Kubernetes namespace in which to
312
+ :param builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
312
313
  generate the credentials.
313
- :param str namespace: The namespace of the target resource.
314
+ :param builtins.str namespace: The namespace of the target resource.
314
315
  The value should not contain leading or trailing forward slashes.
315
316
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
316
317
  *Available only for Vault Enterprise*.
317
- :param str role: The name of the Kubernetes secret backend role to generate service
318
+ :param builtins.str role: The name of the Kubernetes secret backend role to generate service
318
319
  account tokens from.
319
- :param str ttl: The TTL of the generated Kubernetes service account token, specified in
320
+ :param builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
320
321
  seconds or as a Go duration format string.
321
322
  """
322
323
  __args__ = dict()