pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,31 +20,31 @@ __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
19
20
  @pulumi.input_type
20
21
  class AuthBackendConfigArgs:
21
22
  def __init__(__self__, *,
22
- kubernetes_host: pulumi.Input[str],
23
- backend: Optional[pulumi.Input[str]] = None,
24
- disable_iss_validation: Optional[pulumi.Input[bool]] = None,
25
- disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
26
- issuer: Optional[pulumi.Input[str]] = None,
27
- kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
28
- namespace: Optional[pulumi.Input[str]] = None,
29
- pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
30
- token_reviewer_jwt: Optional[pulumi.Input[str]] = None,
31
- use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None):
23
+ kubernetes_host: pulumi.Input[builtins.str],
24
+ backend: Optional[pulumi.Input[builtins.str]] = None,
25
+ disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
26
+ disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
27
+ issuer: Optional[pulumi.Input[builtins.str]] = None,
28
+ kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
29
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
30
+ pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
31
+ token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
32
+ use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None):
32
33
  """
33
34
  The set of arguments for constructing a AuthBackendConfig resource.
34
- :param pulumi.Input[str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
35
- :param pulumi.Input[str] backend: Unique name of the kubernetes backend to configure.
36
- :param pulumi.Input[bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
37
- :param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
38
- :param pulumi.Input[str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
39
- :param pulumi.Input[str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
40
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
35
+ :param pulumi.Input[builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
36
+ :param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
37
+ :param pulumi.Input[builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
38
+ :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
39
+ :param pulumi.Input[builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
40
+ :param pulumi.Input[builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
41
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
41
42
  The value should not contain leading or trailing forward slashes.
42
43
  The `namespace` is always relative to the provider's configured namespace.
43
44
  *Available only for Vault Enterprise*.
44
- :param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
45
- :param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
46
- :param pulumi.Input[bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
45
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
46
+ :param pulumi.Input[builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
47
+ :param pulumi.Input[builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
47
48
  """
48
49
  pulumi.set(__self__, "kubernetes_host", kubernetes_host)
49
50
  if backend is not None:
@@ -67,79 +68,79 @@ class AuthBackendConfigArgs:
67
68
 
68
69
  @property
69
70
  @pulumi.getter(name="kubernetesHost")
70
- def kubernetes_host(self) -> pulumi.Input[str]:
71
+ def kubernetes_host(self) -> pulumi.Input[builtins.str]:
71
72
  """
72
73
  Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
73
74
  """
74
75
  return pulumi.get(self, "kubernetes_host")
75
76
 
76
77
  @kubernetes_host.setter
77
- def kubernetes_host(self, value: pulumi.Input[str]):
78
+ def kubernetes_host(self, value: pulumi.Input[builtins.str]):
78
79
  pulumi.set(self, "kubernetes_host", value)
79
80
 
80
81
  @property
81
82
  @pulumi.getter
82
- def backend(self) -> Optional[pulumi.Input[str]]:
83
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
83
84
  """
84
85
  Unique name of the kubernetes backend to configure.
85
86
  """
86
87
  return pulumi.get(self, "backend")
87
88
 
88
89
  @backend.setter
89
- def backend(self, value: Optional[pulumi.Input[str]]):
90
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
90
91
  pulumi.set(self, "backend", value)
91
92
 
92
93
  @property
93
94
  @pulumi.getter(name="disableIssValidation")
94
- def disable_iss_validation(self) -> Optional[pulumi.Input[bool]]:
95
+ def disable_iss_validation(self) -> Optional[pulumi.Input[builtins.bool]]:
95
96
  """
96
97
  Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
97
98
  """
98
99
  return pulumi.get(self, "disable_iss_validation")
99
100
 
100
101
  @disable_iss_validation.setter
101
- def disable_iss_validation(self, value: Optional[pulumi.Input[bool]]):
102
+ def disable_iss_validation(self, value: Optional[pulumi.Input[builtins.bool]]):
102
103
  pulumi.set(self, "disable_iss_validation", value)
103
104
 
104
105
  @property
105
106
  @pulumi.getter(name="disableLocalCaJwt")
106
- def disable_local_ca_jwt(self) -> Optional[pulumi.Input[bool]]:
107
+ def disable_local_ca_jwt(self) -> Optional[pulumi.Input[builtins.bool]]:
107
108
  """
108
109
  Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
109
110
  """
110
111
  return pulumi.get(self, "disable_local_ca_jwt")
111
112
 
112
113
  @disable_local_ca_jwt.setter
113
- def disable_local_ca_jwt(self, value: Optional[pulumi.Input[bool]]):
114
+ def disable_local_ca_jwt(self, value: Optional[pulumi.Input[builtins.bool]]):
114
115
  pulumi.set(self, "disable_local_ca_jwt", value)
115
116
 
116
117
  @property
117
118
  @pulumi.getter
118
- def issuer(self) -> Optional[pulumi.Input[str]]:
119
+ def issuer(self) -> Optional[pulumi.Input[builtins.str]]:
119
120
  """
120
121
  JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
121
122
  """
122
123
  return pulumi.get(self, "issuer")
123
124
 
124
125
  @issuer.setter
125
- def issuer(self, value: Optional[pulumi.Input[str]]):
126
+ def issuer(self, value: Optional[pulumi.Input[builtins.str]]):
126
127
  pulumi.set(self, "issuer", value)
127
128
 
128
129
  @property
129
130
  @pulumi.getter(name="kubernetesCaCert")
130
- def kubernetes_ca_cert(self) -> Optional[pulumi.Input[str]]:
131
+ def kubernetes_ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
131
132
  """
132
133
  PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
133
134
  """
134
135
  return pulumi.get(self, "kubernetes_ca_cert")
135
136
 
136
137
  @kubernetes_ca_cert.setter
137
- def kubernetes_ca_cert(self, value: Optional[pulumi.Input[str]]):
138
+ def kubernetes_ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
138
139
  pulumi.set(self, "kubernetes_ca_cert", value)
139
140
 
140
141
  @property
141
142
  @pulumi.getter
142
- def namespace(self) -> Optional[pulumi.Input[str]]:
143
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
143
144
  """
144
145
  The namespace to provision the resource in.
145
146
  The value should not contain leading or trailing forward slashes.
@@ -149,74 +150,74 @@ class AuthBackendConfigArgs:
149
150
  return pulumi.get(self, "namespace")
150
151
 
151
152
  @namespace.setter
152
- def namespace(self, value: Optional[pulumi.Input[str]]):
153
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
153
154
  pulumi.set(self, "namespace", value)
154
155
 
155
156
  @property
156
157
  @pulumi.getter(name="pemKeys")
157
- def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
158
+ def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
158
159
  """
159
160
  List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
160
161
  """
161
162
  return pulumi.get(self, "pem_keys")
162
163
 
163
164
  @pem_keys.setter
164
- def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
165
+ def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
165
166
  pulumi.set(self, "pem_keys", value)
166
167
 
167
168
  @property
168
169
  @pulumi.getter(name="tokenReviewerJwt")
169
- def token_reviewer_jwt(self) -> Optional[pulumi.Input[str]]:
170
+ def token_reviewer_jwt(self) -> Optional[pulumi.Input[builtins.str]]:
170
171
  """
171
172
  A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
172
173
  """
173
174
  return pulumi.get(self, "token_reviewer_jwt")
174
175
 
175
176
  @token_reviewer_jwt.setter
176
- def token_reviewer_jwt(self, value: Optional[pulumi.Input[str]]):
177
+ def token_reviewer_jwt(self, value: Optional[pulumi.Input[builtins.str]]):
177
178
  pulumi.set(self, "token_reviewer_jwt", value)
178
179
 
179
180
  @property
180
181
  @pulumi.getter(name="useAnnotationsAsAliasMetadata")
181
- def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[bool]]:
182
+ def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[builtins.bool]]:
182
183
  """
183
184
  Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
184
185
  """
185
186
  return pulumi.get(self, "use_annotations_as_alias_metadata")
186
187
 
187
188
  @use_annotations_as_alias_metadata.setter
188
- def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[bool]]):
189
+ def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[builtins.bool]]):
189
190
  pulumi.set(self, "use_annotations_as_alias_metadata", value)
190
191
 
191
192
 
192
193
  @pulumi.input_type
193
194
  class _AuthBackendConfigState:
194
195
  def __init__(__self__, *,
195
- backend: Optional[pulumi.Input[str]] = None,
196
- disable_iss_validation: Optional[pulumi.Input[bool]] = None,
197
- disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
198
- issuer: Optional[pulumi.Input[str]] = None,
199
- kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
200
- kubernetes_host: Optional[pulumi.Input[str]] = None,
201
- namespace: Optional[pulumi.Input[str]] = None,
202
- pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
203
- token_reviewer_jwt: Optional[pulumi.Input[str]] = None,
204
- use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None):
196
+ backend: Optional[pulumi.Input[builtins.str]] = None,
197
+ disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
198
+ disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
199
+ issuer: Optional[pulumi.Input[builtins.str]] = None,
200
+ kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
201
+ kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
202
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
203
+ pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
204
+ token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
205
+ use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None):
205
206
  """
206
207
  Input properties used for looking up and filtering AuthBackendConfig resources.
207
- :param pulumi.Input[str] backend: Unique name of the kubernetes backend to configure.
208
- :param pulumi.Input[bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
209
- :param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
210
- :param pulumi.Input[str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
211
- :param pulumi.Input[str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
212
- :param pulumi.Input[str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
213
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
208
+ :param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
209
+ :param pulumi.Input[builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
210
+ :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
211
+ :param pulumi.Input[builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
212
+ :param pulumi.Input[builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
213
+ :param pulumi.Input[builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
214
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
214
215
  The value should not contain leading or trailing forward slashes.
215
216
  The `namespace` is always relative to the provider's configured namespace.
216
217
  *Available only for Vault Enterprise*.
217
- :param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
218
- :param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
219
- :param pulumi.Input[bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
218
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
219
+ :param pulumi.Input[builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
220
+ :param pulumi.Input[builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
220
221
  """
221
222
  if backend is not None:
222
223
  pulumi.set(__self__, "backend", backend)
@@ -241,79 +242,79 @@ class _AuthBackendConfigState:
241
242
 
242
243
  @property
243
244
  @pulumi.getter
244
- def backend(self) -> Optional[pulumi.Input[str]]:
245
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
245
246
  """
246
247
  Unique name of the kubernetes backend to configure.
247
248
  """
248
249
  return pulumi.get(self, "backend")
249
250
 
250
251
  @backend.setter
251
- def backend(self, value: Optional[pulumi.Input[str]]):
252
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
252
253
  pulumi.set(self, "backend", value)
253
254
 
254
255
  @property
255
256
  @pulumi.getter(name="disableIssValidation")
256
- def disable_iss_validation(self) -> Optional[pulumi.Input[bool]]:
257
+ def disable_iss_validation(self) -> Optional[pulumi.Input[builtins.bool]]:
257
258
  """
258
259
  Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
259
260
  """
260
261
  return pulumi.get(self, "disable_iss_validation")
261
262
 
262
263
  @disable_iss_validation.setter
263
- def disable_iss_validation(self, value: Optional[pulumi.Input[bool]]):
264
+ def disable_iss_validation(self, value: Optional[pulumi.Input[builtins.bool]]):
264
265
  pulumi.set(self, "disable_iss_validation", value)
265
266
 
266
267
  @property
267
268
  @pulumi.getter(name="disableLocalCaJwt")
268
- def disable_local_ca_jwt(self) -> Optional[pulumi.Input[bool]]:
269
+ def disable_local_ca_jwt(self) -> Optional[pulumi.Input[builtins.bool]]:
269
270
  """
270
271
  Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
271
272
  """
272
273
  return pulumi.get(self, "disable_local_ca_jwt")
273
274
 
274
275
  @disable_local_ca_jwt.setter
275
- def disable_local_ca_jwt(self, value: Optional[pulumi.Input[bool]]):
276
+ def disable_local_ca_jwt(self, value: Optional[pulumi.Input[builtins.bool]]):
276
277
  pulumi.set(self, "disable_local_ca_jwt", value)
277
278
 
278
279
  @property
279
280
  @pulumi.getter
280
- def issuer(self) -> Optional[pulumi.Input[str]]:
281
+ def issuer(self) -> Optional[pulumi.Input[builtins.str]]:
281
282
  """
282
283
  JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
283
284
  """
284
285
  return pulumi.get(self, "issuer")
285
286
 
286
287
  @issuer.setter
287
- def issuer(self, value: Optional[pulumi.Input[str]]):
288
+ def issuer(self, value: Optional[pulumi.Input[builtins.str]]):
288
289
  pulumi.set(self, "issuer", value)
289
290
 
290
291
  @property
291
292
  @pulumi.getter(name="kubernetesCaCert")
292
- def kubernetes_ca_cert(self) -> Optional[pulumi.Input[str]]:
293
+ def kubernetes_ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
293
294
  """
294
295
  PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
295
296
  """
296
297
  return pulumi.get(self, "kubernetes_ca_cert")
297
298
 
298
299
  @kubernetes_ca_cert.setter
299
- def kubernetes_ca_cert(self, value: Optional[pulumi.Input[str]]):
300
+ def kubernetes_ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
300
301
  pulumi.set(self, "kubernetes_ca_cert", value)
301
302
 
302
303
  @property
303
304
  @pulumi.getter(name="kubernetesHost")
304
- def kubernetes_host(self) -> Optional[pulumi.Input[str]]:
305
+ def kubernetes_host(self) -> Optional[pulumi.Input[builtins.str]]:
305
306
  """
306
307
  Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
307
308
  """
308
309
  return pulumi.get(self, "kubernetes_host")
309
310
 
310
311
  @kubernetes_host.setter
311
- def kubernetes_host(self, value: Optional[pulumi.Input[str]]):
312
+ def kubernetes_host(self, value: Optional[pulumi.Input[builtins.str]]):
312
313
  pulumi.set(self, "kubernetes_host", value)
313
314
 
314
315
  @property
315
316
  @pulumi.getter
316
- def namespace(self) -> Optional[pulumi.Input[str]]:
317
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
317
318
  """
318
319
  The namespace to provision the resource in.
319
320
  The value should not contain leading or trailing forward slashes.
@@ -323,43 +324,43 @@ class _AuthBackendConfigState:
323
324
  return pulumi.get(self, "namespace")
324
325
 
325
326
  @namespace.setter
326
- def namespace(self, value: Optional[pulumi.Input[str]]):
327
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
327
328
  pulumi.set(self, "namespace", value)
328
329
 
329
330
  @property
330
331
  @pulumi.getter(name="pemKeys")
331
- def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
332
+ def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
332
333
  """
333
334
  List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
334
335
  """
335
336
  return pulumi.get(self, "pem_keys")
336
337
 
337
338
  @pem_keys.setter
338
- def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
339
+ def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
339
340
  pulumi.set(self, "pem_keys", value)
340
341
 
341
342
  @property
342
343
  @pulumi.getter(name="tokenReviewerJwt")
343
- def token_reviewer_jwt(self) -> Optional[pulumi.Input[str]]:
344
+ def token_reviewer_jwt(self) -> Optional[pulumi.Input[builtins.str]]:
344
345
  """
345
346
  A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
346
347
  """
347
348
  return pulumi.get(self, "token_reviewer_jwt")
348
349
 
349
350
  @token_reviewer_jwt.setter
350
- def token_reviewer_jwt(self, value: Optional[pulumi.Input[str]]):
351
+ def token_reviewer_jwt(self, value: Optional[pulumi.Input[builtins.str]]):
351
352
  pulumi.set(self, "token_reviewer_jwt", value)
352
353
 
353
354
  @property
354
355
  @pulumi.getter(name="useAnnotationsAsAliasMetadata")
355
- def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[bool]]:
356
+ def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[builtins.bool]]:
356
357
  """
357
358
  Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
358
359
  """
359
360
  return pulumi.get(self, "use_annotations_as_alias_metadata")
360
361
 
361
362
  @use_annotations_as_alias_metadata.setter
362
- def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[bool]]):
363
+ def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[builtins.bool]]):
363
364
  pulumi.set(self, "use_annotations_as_alias_metadata", value)
364
365
 
365
366
 
@@ -368,16 +369,16 @@ class AuthBackendConfig(pulumi.CustomResource):
368
369
  def __init__(__self__,
369
370
  resource_name: str,
370
371
  opts: Optional[pulumi.ResourceOptions] = None,
371
- backend: Optional[pulumi.Input[str]] = None,
372
- disable_iss_validation: Optional[pulumi.Input[bool]] = None,
373
- disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
374
- issuer: Optional[pulumi.Input[str]] = None,
375
- kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
376
- kubernetes_host: Optional[pulumi.Input[str]] = None,
377
- namespace: Optional[pulumi.Input[str]] = None,
378
- pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
379
- token_reviewer_jwt: Optional[pulumi.Input[str]] = None,
380
- use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None,
372
+ backend: Optional[pulumi.Input[builtins.str]] = None,
373
+ disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
374
+ disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
375
+ issuer: Optional[pulumi.Input[builtins.str]] = None,
376
+ kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
377
+ kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
378
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
379
+ pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
380
+ token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
381
+ use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None,
381
382
  __props__=None):
382
383
  """
383
384
  Manages an Kubernetes auth backend config in a Vault server. See the [Vault
@@ -412,19 +413,19 @@ class AuthBackendConfig(pulumi.CustomResource):
412
413
 
413
414
  :param str resource_name: The name of the resource.
414
415
  :param pulumi.ResourceOptions opts: Options for the resource.
415
- :param pulumi.Input[str] backend: Unique name of the kubernetes backend to configure.
416
- :param pulumi.Input[bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
417
- :param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
418
- :param pulumi.Input[str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
419
- :param pulumi.Input[str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
420
- :param pulumi.Input[str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
421
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
416
+ :param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
417
+ :param pulumi.Input[builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
418
+ :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
419
+ :param pulumi.Input[builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
420
+ :param pulumi.Input[builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
421
+ :param pulumi.Input[builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
422
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
422
423
  The value should not contain leading or trailing forward slashes.
423
424
  The `namespace` is always relative to the provider's configured namespace.
424
425
  *Available only for Vault Enterprise*.
425
- :param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
426
- :param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
427
- :param pulumi.Input[bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
426
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
427
+ :param pulumi.Input[builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
428
+ :param pulumi.Input[builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
428
429
  """
429
430
  ...
430
431
  @overload
@@ -478,16 +479,16 @@ class AuthBackendConfig(pulumi.CustomResource):
478
479
  def _internal_init(__self__,
479
480
  resource_name: str,
480
481
  opts: Optional[pulumi.ResourceOptions] = None,
481
- backend: Optional[pulumi.Input[str]] = None,
482
- disable_iss_validation: Optional[pulumi.Input[bool]] = None,
483
- disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
484
- issuer: Optional[pulumi.Input[str]] = None,
485
- kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
486
- kubernetes_host: Optional[pulumi.Input[str]] = None,
487
- namespace: Optional[pulumi.Input[str]] = None,
488
- pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
489
- token_reviewer_jwt: Optional[pulumi.Input[str]] = None,
490
- use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None,
482
+ backend: Optional[pulumi.Input[builtins.str]] = None,
483
+ disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
484
+ disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
485
+ issuer: Optional[pulumi.Input[builtins.str]] = None,
486
+ kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
487
+ kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
488
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
489
+ pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
490
+ token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
491
+ use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None,
491
492
  __props__=None):
492
493
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
493
494
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -521,16 +522,16 @@ class AuthBackendConfig(pulumi.CustomResource):
521
522
  def get(resource_name: str,
522
523
  id: pulumi.Input[str],
523
524
  opts: Optional[pulumi.ResourceOptions] = None,
524
- backend: Optional[pulumi.Input[str]] = None,
525
- disable_iss_validation: Optional[pulumi.Input[bool]] = None,
526
- disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
527
- issuer: Optional[pulumi.Input[str]] = None,
528
- kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
529
- kubernetes_host: Optional[pulumi.Input[str]] = None,
530
- namespace: Optional[pulumi.Input[str]] = None,
531
- pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
532
- token_reviewer_jwt: Optional[pulumi.Input[str]] = None,
533
- use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None) -> 'AuthBackendConfig':
525
+ backend: Optional[pulumi.Input[builtins.str]] = None,
526
+ disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
527
+ disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
528
+ issuer: Optional[pulumi.Input[builtins.str]] = None,
529
+ kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
530
+ kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
531
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
532
+ pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
533
+ token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
534
+ use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None) -> 'AuthBackendConfig':
534
535
  """
535
536
  Get an existing AuthBackendConfig resource's state with the given name, id, and optional extra
536
537
  properties used to qualify the lookup.
@@ -538,19 +539,19 @@ class AuthBackendConfig(pulumi.CustomResource):
538
539
  :param str resource_name: The unique name of the resulting resource.
539
540
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
540
541
  :param pulumi.ResourceOptions opts: Options for the resource.
541
- :param pulumi.Input[str] backend: Unique name of the kubernetes backend to configure.
542
- :param pulumi.Input[bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
543
- :param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
544
- :param pulumi.Input[str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
545
- :param pulumi.Input[str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
546
- :param pulumi.Input[str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
547
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
542
+ :param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
543
+ :param pulumi.Input[builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
544
+ :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
545
+ :param pulumi.Input[builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
546
+ :param pulumi.Input[builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
547
+ :param pulumi.Input[builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
548
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
548
549
  The value should not contain leading or trailing forward slashes.
549
550
  The `namespace` is always relative to the provider's configured namespace.
550
551
  *Available only for Vault Enterprise*.
551
- :param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
552
- :param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
553
- :param pulumi.Input[bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
552
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
553
+ :param pulumi.Input[builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
554
+ :param pulumi.Input[builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
554
555
  """
555
556
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
556
557
 
@@ -570,7 +571,7 @@ class AuthBackendConfig(pulumi.CustomResource):
570
571
 
571
572
  @property
572
573
  @pulumi.getter
573
- def backend(self) -> pulumi.Output[Optional[str]]:
574
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
574
575
  """
575
576
  Unique name of the kubernetes backend to configure.
576
577
  """
@@ -578,7 +579,7 @@ class AuthBackendConfig(pulumi.CustomResource):
578
579
 
579
580
  @property
580
581
  @pulumi.getter(name="disableIssValidation")
581
- def disable_iss_validation(self) -> pulumi.Output[bool]:
582
+ def disable_iss_validation(self) -> pulumi.Output[builtins.bool]:
582
583
  """
583
584
  Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
584
585
  """
@@ -586,7 +587,7 @@ class AuthBackendConfig(pulumi.CustomResource):
586
587
 
587
588
  @property
588
589
  @pulumi.getter(name="disableLocalCaJwt")
589
- def disable_local_ca_jwt(self) -> pulumi.Output[bool]:
590
+ def disable_local_ca_jwt(self) -> pulumi.Output[builtins.bool]:
590
591
  """
591
592
  Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
592
593
  """
@@ -594,7 +595,7 @@ class AuthBackendConfig(pulumi.CustomResource):
594
595
 
595
596
  @property
596
597
  @pulumi.getter
597
- def issuer(self) -> pulumi.Output[Optional[str]]:
598
+ def issuer(self) -> pulumi.Output[Optional[builtins.str]]:
598
599
  """
599
600
  JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
600
601
  """
@@ -602,7 +603,7 @@ class AuthBackendConfig(pulumi.CustomResource):
602
603
 
603
604
  @property
604
605
  @pulumi.getter(name="kubernetesCaCert")
605
- def kubernetes_ca_cert(self) -> pulumi.Output[str]:
606
+ def kubernetes_ca_cert(self) -> pulumi.Output[builtins.str]:
606
607
  """
607
608
  PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
608
609
  """
@@ -610,7 +611,7 @@ class AuthBackendConfig(pulumi.CustomResource):
610
611
 
611
612
  @property
612
613
  @pulumi.getter(name="kubernetesHost")
613
- def kubernetes_host(self) -> pulumi.Output[str]:
614
+ def kubernetes_host(self) -> pulumi.Output[builtins.str]:
614
615
  """
615
616
  Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
616
617
  """
@@ -618,7 +619,7 @@ class AuthBackendConfig(pulumi.CustomResource):
618
619
 
619
620
  @property
620
621
  @pulumi.getter
621
- def namespace(self) -> pulumi.Output[Optional[str]]:
622
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
622
623
  """
623
624
  The namespace to provision the resource in.
624
625
  The value should not contain leading or trailing forward slashes.
@@ -629,7 +630,7 @@ class AuthBackendConfig(pulumi.CustomResource):
629
630
 
630
631
  @property
631
632
  @pulumi.getter(name="pemKeys")
632
- def pem_keys(self) -> pulumi.Output[Optional[Sequence[str]]]:
633
+ def pem_keys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
633
634
  """
634
635
  List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
635
636
  """
@@ -637,7 +638,7 @@ class AuthBackendConfig(pulumi.CustomResource):
637
638
 
638
639
  @property
639
640
  @pulumi.getter(name="tokenReviewerJwt")
640
- def token_reviewer_jwt(self) -> pulumi.Output[Optional[str]]:
641
+ def token_reviewer_jwt(self) -> pulumi.Output[Optional[builtins.str]]:
641
642
  """
642
643
  A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
643
644
  """
@@ -645,7 +646,7 @@ class AuthBackendConfig(pulumi.CustomResource):
645
646
 
646
647
  @property
647
648
  @pulumi.getter(name="useAnnotationsAsAliasMetadata")
648
- def use_annotations_as_alias_metadata(self) -> pulumi.Output[bool]:
649
+ def use_annotations_as_alias_metadata(self) -> pulumi.Output[builtins.bool]:
649
650
  """
650
651
  Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
651
652
  """