pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,28 +20,28 @@ __all__ = ['OidcRoleArgs', 'OidcRole']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class OidcRoleArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
key: pulumi.Input[str],
|
23
|
-
client_id: Optional[pulumi.Input[str]] = None,
|
24
|
-
name: Optional[pulumi.Input[str]] = None,
|
25
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
26
|
-
template: Optional[pulumi.Input[str]] = None,
|
27
|
-
ttl: Optional[pulumi.Input[int]] = None):
|
23
|
+
key: pulumi.Input[builtins.str],
|
24
|
+
client_id: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
template: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None):
|
28
29
|
"""
|
29
30
|
The set of arguments for constructing a OidcRole resource.
|
30
|
-
:param pulumi.Input[str] key: A configured named key, the key must already exist
|
31
|
+
:param pulumi.Input[builtins.str] key: A configured named key, the key must already exist
|
31
32
|
before tokens can be issued.
|
32
|
-
:param pulumi.Input[str] client_id: The value that will be included in the `aud` field of all the OIDC identity
|
33
|
+
:param pulumi.Input[builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
|
33
34
|
tokens issued by this role
|
34
|
-
:param pulumi.Input[str] name: Name of the OIDC Role to create.
|
35
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
35
|
+
:param pulumi.Input[builtins.str] name: Name of the OIDC Role to create.
|
36
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
36
37
|
The value should not contain leading or trailing forward slashes.
|
37
38
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
38
39
|
*Available only for Vault Enterprise*.
|
39
|
-
:param pulumi.Input[str] template: The template string to use for generating tokens. This may be in
|
40
|
+
:param pulumi.Input[builtins.str] template: The template string to use for generating tokens. This may be in
|
40
41
|
string-ified JSON or base64 format. See the
|
41
42
|
[documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
|
42
43
|
for the template format.
|
43
|
-
:param pulumi.Input[int] ttl: TTL of the tokens generated against the role in number of seconds.
|
44
|
+
:param pulumi.Input[builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
|
44
45
|
"""
|
45
46
|
pulumi.set(__self__, "key", key)
|
46
47
|
if client_id is not None:
|
@@ -56,7 +57,7 @@ class OidcRoleArgs:
|
|
56
57
|
|
57
58
|
@property
|
58
59
|
@pulumi.getter
|
59
|
-
def key(self) -> pulumi.Input[str]:
|
60
|
+
def key(self) -> pulumi.Input[builtins.str]:
|
60
61
|
"""
|
61
62
|
A configured named key, the key must already exist
|
62
63
|
before tokens can be issued.
|
@@ -64,12 +65,12 @@ class OidcRoleArgs:
|
|
64
65
|
return pulumi.get(self, "key")
|
65
66
|
|
66
67
|
@key.setter
|
67
|
-
def key(self, value: pulumi.Input[str]):
|
68
|
+
def key(self, value: pulumi.Input[builtins.str]):
|
68
69
|
pulumi.set(self, "key", value)
|
69
70
|
|
70
71
|
@property
|
71
72
|
@pulumi.getter(name="clientId")
|
72
|
-
def client_id(self) -> Optional[pulumi.Input[str]]:
|
73
|
+
def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
73
74
|
"""
|
74
75
|
The value that will be included in the `aud` field of all the OIDC identity
|
75
76
|
tokens issued by this role
|
@@ -77,24 +78,24 @@ class OidcRoleArgs:
|
|
77
78
|
return pulumi.get(self, "client_id")
|
78
79
|
|
79
80
|
@client_id.setter
|
80
|
-
def client_id(self, value: Optional[pulumi.Input[str]]):
|
81
|
+
def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
81
82
|
pulumi.set(self, "client_id", value)
|
82
83
|
|
83
84
|
@property
|
84
85
|
@pulumi.getter
|
85
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
86
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
86
87
|
"""
|
87
88
|
Name of the OIDC Role to create.
|
88
89
|
"""
|
89
90
|
return pulumi.get(self, "name")
|
90
91
|
|
91
92
|
@name.setter
|
92
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
93
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
93
94
|
pulumi.set(self, "name", value)
|
94
95
|
|
95
96
|
@property
|
96
97
|
@pulumi.getter
|
97
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
98
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
98
99
|
"""
|
99
100
|
The namespace to provision the resource in.
|
100
101
|
The value should not contain leading or trailing forward slashes.
|
@@ -104,12 +105,12 @@ class OidcRoleArgs:
|
|
104
105
|
return pulumi.get(self, "namespace")
|
105
106
|
|
106
107
|
@namespace.setter
|
107
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
108
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
108
109
|
pulumi.set(self, "namespace", value)
|
109
110
|
|
110
111
|
@property
|
111
112
|
@pulumi.getter
|
112
|
-
def template(self) -> Optional[pulumi.Input[str]]:
|
113
|
+
def template(self) -> Optional[pulumi.Input[builtins.str]]:
|
113
114
|
"""
|
114
115
|
The template string to use for generating tokens. This may be in
|
115
116
|
string-ified JSON or base64 format. See the
|
@@ -119,47 +120,47 @@ class OidcRoleArgs:
|
|
119
120
|
return pulumi.get(self, "template")
|
120
121
|
|
121
122
|
@template.setter
|
122
|
-
def template(self, value: Optional[pulumi.Input[str]]):
|
123
|
+
def template(self, value: Optional[pulumi.Input[builtins.str]]):
|
123
124
|
pulumi.set(self, "template", value)
|
124
125
|
|
125
126
|
@property
|
126
127
|
@pulumi.getter
|
127
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
128
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
128
129
|
"""
|
129
130
|
TTL of the tokens generated against the role in number of seconds.
|
130
131
|
"""
|
131
132
|
return pulumi.get(self, "ttl")
|
132
133
|
|
133
134
|
@ttl.setter
|
134
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
135
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
135
136
|
pulumi.set(self, "ttl", value)
|
136
137
|
|
137
138
|
|
138
139
|
@pulumi.input_type
|
139
140
|
class _OidcRoleState:
|
140
141
|
def __init__(__self__, *,
|
141
|
-
client_id: Optional[pulumi.Input[str]] = None,
|
142
|
-
key: Optional[pulumi.Input[str]] = None,
|
143
|
-
name: Optional[pulumi.Input[str]] = None,
|
144
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
145
|
-
template: Optional[pulumi.Input[str]] = None,
|
146
|
-
ttl: Optional[pulumi.Input[int]] = None):
|
142
|
+
client_id: Optional[pulumi.Input[builtins.str]] = None,
|
143
|
+
key: Optional[pulumi.Input[builtins.str]] = None,
|
144
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
145
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
146
|
+
template: Optional[pulumi.Input[builtins.str]] = None,
|
147
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None):
|
147
148
|
"""
|
148
149
|
Input properties used for looking up and filtering OidcRole resources.
|
149
|
-
:param pulumi.Input[str] client_id: The value that will be included in the `aud` field of all the OIDC identity
|
150
|
+
:param pulumi.Input[builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
|
150
151
|
tokens issued by this role
|
151
|
-
:param pulumi.Input[str] key: A configured named key, the key must already exist
|
152
|
+
:param pulumi.Input[builtins.str] key: A configured named key, the key must already exist
|
152
153
|
before tokens can be issued.
|
153
|
-
:param pulumi.Input[str] name: Name of the OIDC Role to create.
|
154
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
154
|
+
:param pulumi.Input[builtins.str] name: Name of the OIDC Role to create.
|
155
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
155
156
|
The value should not contain leading or trailing forward slashes.
|
156
157
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
157
158
|
*Available only for Vault Enterprise*.
|
158
|
-
:param pulumi.Input[str] template: The template string to use for generating tokens. This may be in
|
159
|
+
:param pulumi.Input[builtins.str] template: The template string to use for generating tokens. This may be in
|
159
160
|
string-ified JSON or base64 format. See the
|
160
161
|
[documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
|
161
162
|
for the template format.
|
162
|
-
:param pulumi.Input[int] ttl: TTL of the tokens generated against the role in number of seconds.
|
163
|
+
:param pulumi.Input[builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
|
163
164
|
"""
|
164
165
|
if client_id is not None:
|
165
166
|
pulumi.set(__self__, "client_id", client_id)
|
@@ -176,7 +177,7 @@ class _OidcRoleState:
|
|
176
177
|
|
177
178
|
@property
|
178
179
|
@pulumi.getter(name="clientId")
|
179
|
-
def client_id(self) -> Optional[pulumi.Input[str]]:
|
180
|
+
def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
180
181
|
"""
|
181
182
|
The value that will be included in the `aud` field of all the OIDC identity
|
182
183
|
tokens issued by this role
|
@@ -184,12 +185,12 @@ class _OidcRoleState:
|
|
184
185
|
return pulumi.get(self, "client_id")
|
185
186
|
|
186
187
|
@client_id.setter
|
187
|
-
def client_id(self, value: Optional[pulumi.Input[str]]):
|
188
|
+
def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
188
189
|
pulumi.set(self, "client_id", value)
|
189
190
|
|
190
191
|
@property
|
191
192
|
@pulumi.getter
|
192
|
-
def key(self) -> Optional[pulumi.Input[str]]:
|
193
|
+
def key(self) -> Optional[pulumi.Input[builtins.str]]:
|
193
194
|
"""
|
194
195
|
A configured named key, the key must already exist
|
195
196
|
before tokens can be issued.
|
@@ -197,24 +198,24 @@ class _OidcRoleState:
|
|
197
198
|
return pulumi.get(self, "key")
|
198
199
|
|
199
200
|
@key.setter
|
200
|
-
def key(self, value: Optional[pulumi.Input[str]]):
|
201
|
+
def key(self, value: Optional[pulumi.Input[builtins.str]]):
|
201
202
|
pulumi.set(self, "key", value)
|
202
203
|
|
203
204
|
@property
|
204
205
|
@pulumi.getter
|
205
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
206
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
206
207
|
"""
|
207
208
|
Name of the OIDC Role to create.
|
208
209
|
"""
|
209
210
|
return pulumi.get(self, "name")
|
210
211
|
|
211
212
|
@name.setter
|
212
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
213
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
213
214
|
pulumi.set(self, "name", value)
|
214
215
|
|
215
216
|
@property
|
216
217
|
@pulumi.getter
|
217
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
218
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
218
219
|
"""
|
219
220
|
The namespace to provision the resource in.
|
220
221
|
The value should not contain leading or trailing forward slashes.
|
@@ -224,12 +225,12 @@ class _OidcRoleState:
|
|
224
225
|
return pulumi.get(self, "namespace")
|
225
226
|
|
226
227
|
@namespace.setter
|
227
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
228
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
228
229
|
pulumi.set(self, "namespace", value)
|
229
230
|
|
230
231
|
@property
|
231
232
|
@pulumi.getter
|
232
|
-
def template(self) -> Optional[pulumi.Input[str]]:
|
233
|
+
def template(self) -> Optional[pulumi.Input[builtins.str]]:
|
233
234
|
"""
|
234
235
|
The template string to use for generating tokens. This may be in
|
235
236
|
string-ified JSON or base64 format. See the
|
@@ -239,19 +240,19 @@ class _OidcRoleState:
|
|
239
240
|
return pulumi.get(self, "template")
|
240
241
|
|
241
242
|
@template.setter
|
242
|
-
def template(self, value: Optional[pulumi.Input[str]]):
|
243
|
+
def template(self, value: Optional[pulumi.Input[builtins.str]]):
|
243
244
|
pulumi.set(self, "template", value)
|
244
245
|
|
245
246
|
@property
|
246
247
|
@pulumi.getter
|
247
|
-
def ttl(self) -> Optional[pulumi.Input[int]]:
|
248
|
+
def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
248
249
|
"""
|
249
250
|
TTL of the tokens generated against the role in number of seconds.
|
250
251
|
"""
|
251
252
|
return pulumi.get(self, "ttl")
|
252
253
|
|
253
254
|
@ttl.setter
|
254
|
-
def ttl(self, value: Optional[pulumi.Input[int]]):
|
255
|
+
def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
255
256
|
pulumi.set(self, "ttl", value)
|
256
257
|
|
257
258
|
|
@@ -260,12 +261,12 @@ class OidcRole(pulumi.CustomResource):
|
|
260
261
|
def __init__(__self__,
|
261
262
|
resource_name: str,
|
262
263
|
opts: Optional[pulumi.ResourceOptions] = None,
|
263
|
-
client_id: Optional[pulumi.Input[str]] = None,
|
264
|
-
key: Optional[pulumi.Input[str]] = None,
|
265
|
-
name: Optional[pulumi.Input[str]] = None,
|
266
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
267
|
-
template: Optional[pulumi.Input[str]] = None,
|
268
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
264
|
+
client_id: Optional[pulumi.Input[builtins.str]] = None,
|
265
|
+
key: Optional[pulumi.Input[builtins.str]] = None,
|
266
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
267
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
268
|
+
template: Optional[pulumi.Input[builtins.str]] = None,
|
269
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
269
270
|
__props__=None):
|
270
271
|
"""
|
271
272
|
## Example Usage
|
@@ -322,20 +323,20 @@ class OidcRole(pulumi.CustomResource):
|
|
322
323
|
|
323
324
|
:param str resource_name: The name of the resource.
|
324
325
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
325
|
-
:param pulumi.Input[str] client_id: The value that will be included in the `aud` field of all the OIDC identity
|
326
|
+
:param pulumi.Input[builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
|
326
327
|
tokens issued by this role
|
327
|
-
:param pulumi.Input[str] key: A configured named key, the key must already exist
|
328
|
+
:param pulumi.Input[builtins.str] key: A configured named key, the key must already exist
|
328
329
|
before tokens can be issued.
|
329
|
-
:param pulumi.Input[str] name: Name of the OIDC Role to create.
|
330
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
330
|
+
:param pulumi.Input[builtins.str] name: Name of the OIDC Role to create.
|
331
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
331
332
|
The value should not contain leading or trailing forward slashes.
|
332
333
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
333
334
|
*Available only for Vault Enterprise*.
|
334
|
-
:param pulumi.Input[str] template: The template string to use for generating tokens. This may be in
|
335
|
+
:param pulumi.Input[builtins.str] template: The template string to use for generating tokens. This may be in
|
335
336
|
string-ified JSON or base64 format. See the
|
336
337
|
[documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
|
337
338
|
for the template format.
|
338
|
-
:param pulumi.Input[int] ttl: TTL of the tokens generated against the role in number of seconds.
|
339
|
+
:param pulumi.Input[builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
|
339
340
|
"""
|
340
341
|
...
|
341
342
|
@overload
|
@@ -411,12 +412,12 @@ class OidcRole(pulumi.CustomResource):
|
|
411
412
|
def _internal_init(__self__,
|
412
413
|
resource_name: str,
|
413
414
|
opts: Optional[pulumi.ResourceOptions] = None,
|
414
|
-
client_id: Optional[pulumi.Input[str]] = None,
|
415
|
-
key: Optional[pulumi.Input[str]] = None,
|
416
|
-
name: Optional[pulumi.Input[str]] = None,
|
417
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
418
|
-
template: Optional[pulumi.Input[str]] = None,
|
419
|
-
ttl: Optional[pulumi.Input[int]] = None,
|
415
|
+
client_id: Optional[pulumi.Input[builtins.str]] = None,
|
416
|
+
key: Optional[pulumi.Input[builtins.str]] = None,
|
417
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
418
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
419
|
+
template: Optional[pulumi.Input[builtins.str]] = None,
|
420
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None,
|
420
421
|
__props__=None):
|
421
422
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
422
423
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -444,12 +445,12 @@ class OidcRole(pulumi.CustomResource):
|
|
444
445
|
def get(resource_name: str,
|
445
446
|
id: pulumi.Input[str],
|
446
447
|
opts: Optional[pulumi.ResourceOptions] = None,
|
447
|
-
client_id: Optional[pulumi.Input[str]] = None,
|
448
|
-
key: Optional[pulumi.Input[str]] = None,
|
449
|
-
name: Optional[pulumi.Input[str]] = None,
|
450
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
451
|
-
template: Optional[pulumi.Input[str]] = None,
|
452
|
-
ttl: Optional[pulumi.Input[int]] = None) -> 'OidcRole':
|
448
|
+
client_id: Optional[pulumi.Input[builtins.str]] = None,
|
449
|
+
key: Optional[pulumi.Input[builtins.str]] = None,
|
450
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
451
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
452
|
+
template: Optional[pulumi.Input[builtins.str]] = None,
|
453
|
+
ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'OidcRole':
|
453
454
|
"""
|
454
455
|
Get an existing OidcRole resource's state with the given name, id, and optional extra
|
455
456
|
properties used to qualify the lookup.
|
@@ -457,20 +458,20 @@ class OidcRole(pulumi.CustomResource):
|
|
457
458
|
:param str resource_name: The unique name of the resulting resource.
|
458
459
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
459
460
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
460
|
-
:param pulumi.Input[str] client_id: The value that will be included in the `aud` field of all the OIDC identity
|
461
|
+
:param pulumi.Input[builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
|
461
462
|
tokens issued by this role
|
462
|
-
:param pulumi.Input[str] key: A configured named key, the key must already exist
|
463
|
+
:param pulumi.Input[builtins.str] key: A configured named key, the key must already exist
|
463
464
|
before tokens can be issued.
|
464
|
-
:param pulumi.Input[str] name: Name of the OIDC Role to create.
|
465
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
465
|
+
:param pulumi.Input[builtins.str] name: Name of the OIDC Role to create.
|
466
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
466
467
|
The value should not contain leading or trailing forward slashes.
|
467
468
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
468
469
|
*Available only for Vault Enterprise*.
|
469
|
-
:param pulumi.Input[str] template: The template string to use for generating tokens. This may be in
|
470
|
+
:param pulumi.Input[builtins.str] template: The template string to use for generating tokens. This may be in
|
470
471
|
string-ified JSON or base64 format. See the
|
471
472
|
[documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
|
472
473
|
for the template format.
|
473
|
-
:param pulumi.Input[int] ttl: TTL of the tokens generated against the role in number of seconds.
|
474
|
+
:param pulumi.Input[builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
|
474
475
|
"""
|
475
476
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
476
477
|
|
@@ -486,7 +487,7 @@ class OidcRole(pulumi.CustomResource):
|
|
486
487
|
|
487
488
|
@property
|
488
489
|
@pulumi.getter(name="clientId")
|
489
|
-
def client_id(self) -> pulumi.Output[str]:
|
490
|
+
def client_id(self) -> pulumi.Output[builtins.str]:
|
490
491
|
"""
|
491
492
|
The value that will be included in the `aud` field of all the OIDC identity
|
492
493
|
tokens issued by this role
|
@@ -495,7 +496,7 @@ class OidcRole(pulumi.CustomResource):
|
|
495
496
|
|
496
497
|
@property
|
497
498
|
@pulumi.getter
|
498
|
-
def key(self) -> pulumi.Output[str]:
|
499
|
+
def key(self) -> pulumi.Output[builtins.str]:
|
499
500
|
"""
|
500
501
|
A configured named key, the key must already exist
|
501
502
|
before tokens can be issued.
|
@@ -504,7 +505,7 @@ class OidcRole(pulumi.CustomResource):
|
|
504
505
|
|
505
506
|
@property
|
506
507
|
@pulumi.getter
|
507
|
-
def name(self) -> pulumi.Output[str]:
|
508
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
508
509
|
"""
|
509
510
|
Name of the OIDC Role to create.
|
510
511
|
"""
|
@@ -512,7 +513,7 @@ class OidcRole(pulumi.CustomResource):
|
|
512
513
|
|
513
514
|
@property
|
514
515
|
@pulumi.getter
|
515
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
516
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
516
517
|
"""
|
517
518
|
The namespace to provision the resource in.
|
518
519
|
The value should not contain leading or trailing forward slashes.
|
@@ -523,7 +524,7 @@ class OidcRole(pulumi.CustomResource):
|
|
523
524
|
|
524
525
|
@property
|
525
526
|
@pulumi.getter
|
526
|
-
def template(self) -> pulumi.Output[Optional[str]]:
|
527
|
+
def template(self) -> pulumi.Output[Optional[builtins.str]]:
|
527
528
|
"""
|
528
529
|
The template string to use for generating tokens. This may be in
|
529
530
|
string-ified JSON or base64 format. See the
|
@@ -534,7 +535,7 @@ class OidcRole(pulumi.CustomResource):
|
|
534
535
|
|
535
536
|
@property
|
536
537
|
@pulumi.getter
|
537
|
-
def ttl(self) -> pulumi.Output[Optional[int]]:
|
538
|
+
def ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
538
539
|
"""
|
539
540
|
TTL of the tokens generated against the role in number of seconds.
|
540
541
|
"""
|