pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,31 +20,31 @@ __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendConfigArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
kubernetes_host: pulumi.Input[str],
|
23
|
-
backend: Optional[pulumi.Input[str]] = None,
|
24
|
-
disable_iss_validation: Optional[pulumi.Input[bool]] = None,
|
25
|
-
disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
|
26
|
-
issuer: Optional[pulumi.Input[str]] = None,
|
27
|
-
kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
|
28
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
29
|
-
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
-
token_reviewer_jwt: Optional[pulumi.Input[str]] = None,
|
31
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None):
|
23
|
+
kubernetes_host: pulumi.Input[builtins.str],
|
24
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
|
26
|
+
disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
|
27
|
+
issuer: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
31
|
+
token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
|
32
|
+
use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None):
|
32
33
|
"""
|
33
34
|
The set of arguments for constructing a AuthBackendConfig resource.
|
34
|
-
:param pulumi.Input[str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
35
|
-
:param pulumi.Input[str] backend: Unique name of the kubernetes backend to configure.
|
36
|
-
:param pulumi.Input[bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
37
|
-
:param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
38
|
-
:param pulumi.Input[str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
39
|
-
:param pulumi.Input[str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
40
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
35
|
+
:param pulumi.Input[builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
36
|
+
:param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
|
37
|
+
:param pulumi.Input[builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
38
|
+
:param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
39
|
+
:param pulumi.Input[builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
40
|
+
:param pulumi.Input[builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
41
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
41
42
|
The value should not contain leading or trailing forward slashes.
|
42
43
|
The `namespace` is always relative to the provider's configured namespace.
|
43
44
|
*Available only for Vault Enterprise*.
|
44
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
45
|
-
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
46
|
-
:param pulumi.Input[bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
45
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
46
|
+
:param pulumi.Input[builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
47
|
+
:param pulumi.Input[builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
47
48
|
"""
|
48
49
|
pulumi.set(__self__, "kubernetes_host", kubernetes_host)
|
49
50
|
if backend is not None:
|
@@ -67,79 +68,79 @@ class AuthBackendConfigArgs:
|
|
67
68
|
|
68
69
|
@property
|
69
70
|
@pulumi.getter(name="kubernetesHost")
|
70
|
-
def kubernetes_host(self) -> pulumi.Input[str]:
|
71
|
+
def kubernetes_host(self) -> pulumi.Input[builtins.str]:
|
71
72
|
"""
|
72
73
|
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
73
74
|
"""
|
74
75
|
return pulumi.get(self, "kubernetes_host")
|
75
76
|
|
76
77
|
@kubernetes_host.setter
|
77
|
-
def kubernetes_host(self, value: pulumi.Input[str]):
|
78
|
+
def kubernetes_host(self, value: pulumi.Input[builtins.str]):
|
78
79
|
pulumi.set(self, "kubernetes_host", value)
|
79
80
|
|
80
81
|
@property
|
81
82
|
@pulumi.getter
|
82
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
83
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
83
84
|
"""
|
84
85
|
Unique name of the kubernetes backend to configure.
|
85
86
|
"""
|
86
87
|
return pulumi.get(self, "backend")
|
87
88
|
|
88
89
|
@backend.setter
|
89
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
90
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
90
91
|
pulumi.set(self, "backend", value)
|
91
92
|
|
92
93
|
@property
|
93
94
|
@pulumi.getter(name="disableIssValidation")
|
94
|
-
def disable_iss_validation(self) -> Optional[pulumi.Input[bool]]:
|
95
|
+
def disable_iss_validation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
95
96
|
"""
|
96
97
|
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
97
98
|
"""
|
98
99
|
return pulumi.get(self, "disable_iss_validation")
|
99
100
|
|
100
101
|
@disable_iss_validation.setter
|
101
|
-
def disable_iss_validation(self, value: Optional[pulumi.Input[bool]]):
|
102
|
+
def disable_iss_validation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
102
103
|
pulumi.set(self, "disable_iss_validation", value)
|
103
104
|
|
104
105
|
@property
|
105
106
|
@pulumi.getter(name="disableLocalCaJwt")
|
106
|
-
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[bool]]:
|
107
|
+
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[builtins.bool]]:
|
107
108
|
"""
|
108
109
|
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
109
110
|
"""
|
110
111
|
return pulumi.get(self, "disable_local_ca_jwt")
|
111
112
|
|
112
113
|
@disable_local_ca_jwt.setter
|
113
|
-
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[bool]]):
|
114
|
+
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[builtins.bool]]):
|
114
115
|
pulumi.set(self, "disable_local_ca_jwt", value)
|
115
116
|
|
116
117
|
@property
|
117
118
|
@pulumi.getter
|
118
|
-
def issuer(self) -> Optional[pulumi.Input[str]]:
|
119
|
+
def issuer(self) -> Optional[pulumi.Input[builtins.str]]:
|
119
120
|
"""
|
120
121
|
JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
121
122
|
"""
|
122
123
|
return pulumi.get(self, "issuer")
|
123
124
|
|
124
125
|
@issuer.setter
|
125
|
-
def issuer(self, value: Optional[pulumi.Input[str]]):
|
126
|
+
def issuer(self, value: Optional[pulumi.Input[builtins.str]]):
|
126
127
|
pulumi.set(self, "issuer", value)
|
127
128
|
|
128
129
|
@property
|
129
130
|
@pulumi.getter(name="kubernetesCaCert")
|
130
|
-
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[str]]:
|
131
|
+
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
131
132
|
"""
|
132
133
|
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
133
134
|
"""
|
134
135
|
return pulumi.get(self, "kubernetes_ca_cert")
|
135
136
|
|
136
137
|
@kubernetes_ca_cert.setter
|
137
|
-
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[str]]):
|
138
|
+
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
138
139
|
pulumi.set(self, "kubernetes_ca_cert", value)
|
139
140
|
|
140
141
|
@property
|
141
142
|
@pulumi.getter
|
142
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
143
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
143
144
|
"""
|
144
145
|
The namespace to provision the resource in.
|
145
146
|
The value should not contain leading or trailing forward slashes.
|
@@ -149,74 +150,74 @@ class AuthBackendConfigArgs:
|
|
149
150
|
return pulumi.get(self, "namespace")
|
150
151
|
|
151
152
|
@namespace.setter
|
152
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
153
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
153
154
|
pulumi.set(self, "namespace", value)
|
154
155
|
|
155
156
|
@property
|
156
157
|
@pulumi.getter(name="pemKeys")
|
157
|
-
def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
158
|
+
def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
158
159
|
"""
|
159
160
|
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
160
161
|
"""
|
161
162
|
return pulumi.get(self, "pem_keys")
|
162
163
|
|
163
164
|
@pem_keys.setter
|
164
|
-
def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
165
|
+
def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
165
166
|
pulumi.set(self, "pem_keys", value)
|
166
167
|
|
167
168
|
@property
|
168
169
|
@pulumi.getter(name="tokenReviewerJwt")
|
169
|
-
def token_reviewer_jwt(self) -> Optional[pulumi.Input[str]]:
|
170
|
+
def token_reviewer_jwt(self) -> Optional[pulumi.Input[builtins.str]]:
|
170
171
|
"""
|
171
172
|
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
172
173
|
"""
|
173
174
|
return pulumi.get(self, "token_reviewer_jwt")
|
174
175
|
|
175
176
|
@token_reviewer_jwt.setter
|
176
|
-
def token_reviewer_jwt(self, value: Optional[pulumi.Input[str]]):
|
177
|
+
def token_reviewer_jwt(self, value: Optional[pulumi.Input[builtins.str]]):
|
177
178
|
pulumi.set(self, "token_reviewer_jwt", value)
|
178
179
|
|
179
180
|
@property
|
180
181
|
@pulumi.getter(name="useAnnotationsAsAliasMetadata")
|
181
|
-
def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[bool]]:
|
182
|
+
def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[builtins.bool]]:
|
182
183
|
"""
|
183
184
|
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
184
185
|
"""
|
185
186
|
return pulumi.get(self, "use_annotations_as_alias_metadata")
|
186
187
|
|
187
188
|
@use_annotations_as_alias_metadata.setter
|
188
|
-
def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[bool]]):
|
189
|
+
def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[builtins.bool]]):
|
189
190
|
pulumi.set(self, "use_annotations_as_alias_metadata", value)
|
190
191
|
|
191
192
|
|
192
193
|
@pulumi.input_type
|
193
194
|
class _AuthBackendConfigState:
|
194
195
|
def __init__(__self__, *,
|
195
|
-
backend: Optional[pulumi.Input[str]] = None,
|
196
|
-
disable_iss_validation: Optional[pulumi.Input[bool]] = None,
|
197
|
-
disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
|
198
|
-
issuer: Optional[pulumi.Input[str]] = None,
|
199
|
-
kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
|
200
|
-
kubernetes_host: Optional[pulumi.Input[str]] = None,
|
201
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
202
|
-
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
203
|
-
token_reviewer_jwt: Optional[pulumi.Input[str]] = None,
|
204
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None):
|
196
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
197
|
+
disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
|
198
|
+
disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
|
199
|
+
issuer: Optional[pulumi.Input[builtins.str]] = None,
|
200
|
+
kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
201
|
+
kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
|
202
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
203
|
+
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
204
|
+
token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
|
205
|
+
use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None):
|
205
206
|
"""
|
206
207
|
Input properties used for looking up and filtering AuthBackendConfig resources.
|
207
|
-
:param pulumi.Input[str] backend: Unique name of the kubernetes backend to configure.
|
208
|
-
:param pulumi.Input[bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
209
|
-
:param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
210
|
-
:param pulumi.Input[str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
211
|
-
:param pulumi.Input[str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
212
|
-
:param pulumi.Input[str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
213
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
208
|
+
:param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
|
209
|
+
:param pulumi.Input[builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
210
|
+
:param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
211
|
+
:param pulumi.Input[builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
212
|
+
:param pulumi.Input[builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
213
|
+
:param pulumi.Input[builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
214
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
214
215
|
The value should not contain leading or trailing forward slashes.
|
215
216
|
The `namespace` is always relative to the provider's configured namespace.
|
216
217
|
*Available only for Vault Enterprise*.
|
217
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
218
|
-
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
219
|
-
:param pulumi.Input[bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
218
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
219
|
+
:param pulumi.Input[builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
220
|
+
:param pulumi.Input[builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
220
221
|
"""
|
221
222
|
if backend is not None:
|
222
223
|
pulumi.set(__self__, "backend", backend)
|
@@ -241,79 +242,79 @@ class _AuthBackendConfigState:
|
|
241
242
|
|
242
243
|
@property
|
243
244
|
@pulumi.getter
|
244
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
245
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
245
246
|
"""
|
246
247
|
Unique name of the kubernetes backend to configure.
|
247
248
|
"""
|
248
249
|
return pulumi.get(self, "backend")
|
249
250
|
|
250
251
|
@backend.setter
|
251
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
252
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
252
253
|
pulumi.set(self, "backend", value)
|
253
254
|
|
254
255
|
@property
|
255
256
|
@pulumi.getter(name="disableIssValidation")
|
256
|
-
def disable_iss_validation(self) -> Optional[pulumi.Input[bool]]:
|
257
|
+
def disable_iss_validation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
257
258
|
"""
|
258
259
|
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
259
260
|
"""
|
260
261
|
return pulumi.get(self, "disable_iss_validation")
|
261
262
|
|
262
263
|
@disable_iss_validation.setter
|
263
|
-
def disable_iss_validation(self, value: Optional[pulumi.Input[bool]]):
|
264
|
+
def disable_iss_validation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
264
265
|
pulumi.set(self, "disable_iss_validation", value)
|
265
266
|
|
266
267
|
@property
|
267
268
|
@pulumi.getter(name="disableLocalCaJwt")
|
268
|
-
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[bool]]:
|
269
|
+
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[builtins.bool]]:
|
269
270
|
"""
|
270
271
|
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
271
272
|
"""
|
272
273
|
return pulumi.get(self, "disable_local_ca_jwt")
|
273
274
|
|
274
275
|
@disable_local_ca_jwt.setter
|
275
|
-
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[bool]]):
|
276
|
+
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[builtins.bool]]):
|
276
277
|
pulumi.set(self, "disable_local_ca_jwt", value)
|
277
278
|
|
278
279
|
@property
|
279
280
|
@pulumi.getter
|
280
|
-
def issuer(self) -> Optional[pulumi.Input[str]]:
|
281
|
+
def issuer(self) -> Optional[pulumi.Input[builtins.str]]:
|
281
282
|
"""
|
282
283
|
JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
283
284
|
"""
|
284
285
|
return pulumi.get(self, "issuer")
|
285
286
|
|
286
287
|
@issuer.setter
|
287
|
-
def issuer(self, value: Optional[pulumi.Input[str]]):
|
288
|
+
def issuer(self, value: Optional[pulumi.Input[builtins.str]]):
|
288
289
|
pulumi.set(self, "issuer", value)
|
289
290
|
|
290
291
|
@property
|
291
292
|
@pulumi.getter(name="kubernetesCaCert")
|
292
|
-
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[str]]:
|
293
|
+
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
293
294
|
"""
|
294
295
|
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
295
296
|
"""
|
296
297
|
return pulumi.get(self, "kubernetes_ca_cert")
|
297
298
|
|
298
299
|
@kubernetes_ca_cert.setter
|
299
|
-
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[str]]):
|
300
|
+
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
300
301
|
pulumi.set(self, "kubernetes_ca_cert", value)
|
301
302
|
|
302
303
|
@property
|
303
304
|
@pulumi.getter(name="kubernetesHost")
|
304
|
-
def kubernetes_host(self) -> Optional[pulumi.Input[str]]:
|
305
|
+
def kubernetes_host(self) -> Optional[pulumi.Input[builtins.str]]:
|
305
306
|
"""
|
306
307
|
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
307
308
|
"""
|
308
309
|
return pulumi.get(self, "kubernetes_host")
|
309
310
|
|
310
311
|
@kubernetes_host.setter
|
311
|
-
def kubernetes_host(self, value: Optional[pulumi.Input[str]]):
|
312
|
+
def kubernetes_host(self, value: Optional[pulumi.Input[builtins.str]]):
|
312
313
|
pulumi.set(self, "kubernetes_host", value)
|
313
314
|
|
314
315
|
@property
|
315
316
|
@pulumi.getter
|
316
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
317
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
317
318
|
"""
|
318
319
|
The namespace to provision the resource in.
|
319
320
|
The value should not contain leading or trailing forward slashes.
|
@@ -323,43 +324,43 @@ class _AuthBackendConfigState:
|
|
323
324
|
return pulumi.get(self, "namespace")
|
324
325
|
|
325
326
|
@namespace.setter
|
326
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
327
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
327
328
|
pulumi.set(self, "namespace", value)
|
328
329
|
|
329
330
|
@property
|
330
331
|
@pulumi.getter(name="pemKeys")
|
331
|
-
def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
332
|
+
def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
332
333
|
"""
|
333
334
|
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
334
335
|
"""
|
335
336
|
return pulumi.get(self, "pem_keys")
|
336
337
|
|
337
338
|
@pem_keys.setter
|
338
|
-
def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
339
|
+
def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
339
340
|
pulumi.set(self, "pem_keys", value)
|
340
341
|
|
341
342
|
@property
|
342
343
|
@pulumi.getter(name="tokenReviewerJwt")
|
343
|
-
def token_reviewer_jwt(self) -> Optional[pulumi.Input[str]]:
|
344
|
+
def token_reviewer_jwt(self) -> Optional[pulumi.Input[builtins.str]]:
|
344
345
|
"""
|
345
346
|
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
346
347
|
"""
|
347
348
|
return pulumi.get(self, "token_reviewer_jwt")
|
348
349
|
|
349
350
|
@token_reviewer_jwt.setter
|
350
|
-
def token_reviewer_jwt(self, value: Optional[pulumi.Input[str]]):
|
351
|
+
def token_reviewer_jwt(self, value: Optional[pulumi.Input[builtins.str]]):
|
351
352
|
pulumi.set(self, "token_reviewer_jwt", value)
|
352
353
|
|
353
354
|
@property
|
354
355
|
@pulumi.getter(name="useAnnotationsAsAliasMetadata")
|
355
|
-
def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[bool]]:
|
356
|
+
def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[builtins.bool]]:
|
356
357
|
"""
|
357
358
|
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
358
359
|
"""
|
359
360
|
return pulumi.get(self, "use_annotations_as_alias_metadata")
|
360
361
|
|
361
362
|
@use_annotations_as_alias_metadata.setter
|
362
|
-
def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[bool]]):
|
363
|
+
def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[builtins.bool]]):
|
363
364
|
pulumi.set(self, "use_annotations_as_alias_metadata", value)
|
364
365
|
|
365
366
|
|
@@ -368,16 +369,16 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
368
369
|
def __init__(__self__,
|
369
370
|
resource_name: str,
|
370
371
|
opts: Optional[pulumi.ResourceOptions] = None,
|
371
|
-
backend: Optional[pulumi.Input[str]] = None,
|
372
|
-
disable_iss_validation: Optional[pulumi.Input[bool]] = None,
|
373
|
-
disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
|
374
|
-
issuer: Optional[pulumi.Input[str]] = None,
|
375
|
-
kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
|
376
|
-
kubernetes_host: Optional[pulumi.Input[str]] = None,
|
377
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
378
|
-
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
379
|
-
token_reviewer_jwt: Optional[pulumi.Input[str]] = None,
|
380
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None,
|
372
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
373
|
+
disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
|
374
|
+
disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
|
375
|
+
issuer: Optional[pulumi.Input[builtins.str]] = None,
|
376
|
+
kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
377
|
+
kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
|
378
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
379
|
+
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
380
|
+
token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
|
381
|
+
use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None,
|
381
382
|
__props__=None):
|
382
383
|
"""
|
383
384
|
Manages an Kubernetes auth backend config in a Vault server. See the [Vault
|
@@ -412,19 +413,19 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
412
413
|
|
413
414
|
:param str resource_name: The name of the resource.
|
414
415
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
415
|
-
:param pulumi.Input[str] backend: Unique name of the kubernetes backend to configure.
|
416
|
-
:param pulumi.Input[bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
417
|
-
:param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
418
|
-
:param pulumi.Input[str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
419
|
-
:param pulumi.Input[str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
420
|
-
:param pulumi.Input[str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
421
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
416
|
+
:param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
|
417
|
+
:param pulumi.Input[builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
418
|
+
:param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
419
|
+
:param pulumi.Input[builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
420
|
+
:param pulumi.Input[builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
421
|
+
:param pulumi.Input[builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
422
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
422
423
|
The value should not contain leading or trailing forward slashes.
|
423
424
|
The `namespace` is always relative to the provider's configured namespace.
|
424
425
|
*Available only for Vault Enterprise*.
|
425
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
426
|
-
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
427
|
-
:param pulumi.Input[bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
426
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
427
|
+
:param pulumi.Input[builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
428
|
+
:param pulumi.Input[builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
428
429
|
"""
|
429
430
|
...
|
430
431
|
@overload
|
@@ -478,16 +479,16 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
478
479
|
def _internal_init(__self__,
|
479
480
|
resource_name: str,
|
480
481
|
opts: Optional[pulumi.ResourceOptions] = None,
|
481
|
-
backend: Optional[pulumi.Input[str]] = None,
|
482
|
-
disable_iss_validation: Optional[pulumi.Input[bool]] = None,
|
483
|
-
disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
|
484
|
-
issuer: Optional[pulumi.Input[str]] = None,
|
485
|
-
kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
|
486
|
-
kubernetes_host: Optional[pulumi.Input[str]] = None,
|
487
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
488
|
-
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
489
|
-
token_reviewer_jwt: Optional[pulumi.Input[str]] = None,
|
490
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None,
|
482
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
483
|
+
disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
|
484
|
+
disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
|
485
|
+
issuer: Optional[pulumi.Input[builtins.str]] = None,
|
486
|
+
kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
487
|
+
kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
|
488
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
489
|
+
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
490
|
+
token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
|
491
|
+
use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None,
|
491
492
|
__props__=None):
|
492
493
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
493
494
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -521,16 +522,16 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
521
522
|
def get(resource_name: str,
|
522
523
|
id: pulumi.Input[str],
|
523
524
|
opts: Optional[pulumi.ResourceOptions] = None,
|
524
|
-
backend: Optional[pulumi.Input[str]] = None,
|
525
|
-
disable_iss_validation: Optional[pulumi.Input[bool]] = None,
|
526
|
-
disable_local_ca_jwt: Optional[pulumi.Input[bool]] = None,
|
527
|
-
issuer: Optional[pulumi.Input[str]] = None,
|
528
|
-
kubernetes_ca_cert: Optional[pulumi.Input[str]] = None,
|
529
|
-
kubernetes_host: Optional[pulumi.Input[str]] = None,
|
530
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
531
|
-
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
532
|
-
token_reviewer_jwt: Optional[pulumi.Input[str]] = None,
|
533
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[bool]] = None) -> 'AuthBackendConfig':
|
525
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
526
|
+
disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
|
527
|
+
disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
|
528
|
+
issuer: Optional[pulumi.Input[builtins.str]] = None,
|
529
|
+
kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
|
530
|
+
kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
|
531
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
532
|
+
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
533
|
+
token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
|
534
|
+
use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None) -> 'AuthBackendConfig':
|
534
535
|
"""
|
535
536
|
Get an existing AuthBackendConfig resource's state with the given name, id, and optional extra
|
536
537
|
properties used to qualify the lookup.
|
@@ -538,19 +539,19 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
538
539
|
:param str resource_name: The unique name of the resulting resource.
|
539
540
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
540
541
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
541
|
-
:param pulumi.Input[str] backend: Unique name of the kubernetes backend to configure.
|
542
|
-
:param pulumi.Input[bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
543
|
-
:param pulumi.Input[bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
544
|
-
:param pulumi.Input[str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
545
|
-
:param pulumi.Input[str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
546
|
-
:param pulumi.Input[str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
547
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
542
|
+
:param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
|
543
|
+
:param pulumi.Input[builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
544
|
+
:param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
545
|
+
:param pulumi.Input[builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
546
|
+
:param pulumi.Input[builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
547
|
+
:param pulumi.Input[builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
548
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
548
549
|
The value should not contain leading or trailing forward slashes.
|
549
550
|
The `namespace` is always relative to the provider's configured namespace.
|
550
551
|
*Available only for Vault Enterprise*.
|
551
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
552
|
-
:param pulumi.Input[str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
553
|
-
:param pulumi.Input[bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
552
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
553
|
+
:param pulumi.Input[builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
554
|
+
:param pulumi.Input[builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
554
555
|
"""
|
555
556
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
556
557
|
|
@@ -570,7 +571,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
570
571
|
|
571
572
|
@property
|
572
573
|
@pulumi.getter
|
573
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
574
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
574
575
|
"""
|
575
576
|
Unique name of the kubernetes backend to configure.
|
576
577
|
"""
|
@@ -578,7 +579,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
578
579
|
|
579
580
|
@property
|
580
581
|
@pulumi.getter(name="disableIssValidation")
|
581
|
-
def disable_iss_validation(self) -> pulumi.Output[bool]:
|
582
|
+
def disable_iss_validation(self) -> pulumi.Output[builtins.bool]:
|
582
583
|
"""
|
583
584
|
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
584
585
|
"""
|
@@ -586,7 +587,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
586
587
|
|
587
588
|
@property
|
588
589
|
@pulumi.getter(name="disableLocalCaJwt")
|
589
|
-
def disable_local_ca_jwt(self) -> pulumi.Output[bool]:
|
590
|
+
def disable_local_ca_jwt(self) -> pulumi.Output[builtins.bool]:
|
590
591
|
"""
|
591
592
|
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
592
593
|
"""
|
@@ -594,7 +595,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
594
595
|
|
595
596
|
@property
|
596
597
|
@pulumi.getter
|
597
|
-
def issuer(self) -> pulumi.Output[Optional[str]]:
|
598
|
+
def issuer(self) -> pulumi.Output[Optional[builtins.str]]:
|
598
599
|
"""
|
599
600
|
JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
600
601
|
"""
|
@@ -602,7 +603,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
602
603
|
|
603
604
|
@property
|
604
605
|
@pulumi.getter(name="kubernetesCaCert")
|
605
|
-
def kubernetes_ca_cert(self) -> pulumi.Output[str]:
|
606
|
+
def kubernetes_ca_cert(self) -> pulumi.Output[builtins.str]:
|
606
607
|
"""
|
607
608
|
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
608
609
|
"""
|
@@ -610,7 +611,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
610
611
|
|
611
612
|
@property
|
612
613
|
@pulumi.getter(name="kubernetesHost")
|
613
|
-
def kubernetes_host(self) -> pulumi.Output[str]:
|
614
|
+
def kubernetes_host(self) -> pulumi.Output[builtins.str]:
|
614
615
|
"""
|
615
616
|
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
616
617
|
"""
|
@@ -618,7 +619,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
618
619
|
|
619
620
|
@property
|
620
621
|
@pulumi.getter
|
621
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
622
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
622
623
|
"""
|
623
624
|
The namespace to provision the resource in.
|
624
625
|
The value should not contain leading or trailing forward slashes.
|
@@ -629,7 +630,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
629
630
|
|
630
631
|
@property
|
631
632
|
@pulumi.getter(name="pemKeys")
|
632
|
-
def pem_keys(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
633
|
+
def pem_keys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
633
634
|
"""
|
634
635
|
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
635
636
|
"""
|
@@ -637,7 +638,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
637
638
|
|
638
639
|
@property
|
639
640
|
@pulumi.getter(name="tokenReviewerJwt")
|
640
|
-
def token_reviewer_jwt(self) -> pulumi.Output[Optional[str]]:
|
641
|
+
def token_reviewer_jwt(self) -> pulumi.Output[Optional[builtins.str]]:
|
641
642
|
"""
|
642
643
|
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
643
644
|
"""
|
@@ -645,7 +646,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
645
646
|
|
646
647
|
@property
|
647
648
|
@pulumi.getter(name="useAnnotationsAsAliasMetadata")
|
648
|
-
def use_annotations_as_alias_metadata(self) -> pulumi.Output[bool]:
|
649
|
+
def use_annotations_as_alias_metadata(self) -> pulumi.Output[builtins.bool]:
|
649
650
|
"""
|
650
651
|
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
651
652
|
"""
|