pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,31 +19,31 @@ __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
20
19
  @pulumi.input_type
21
20
  class AuthBackendConfigArgs:
22
21
  def __init__(__self__, *,
23
- kubernetes_host: pulumi.Input[builtins.str],
24
- backend: Optional[pulumi.Input[builtins.str]] = None,
25
- disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
26
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
27
- issuer: Optional[pulumi.Input[builtins.str]] = None,
28
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
29
- namespace: Optional[pulumi.Input[builtins.str]] = None,
30
- pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
31
- token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
32
- use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None):
22
+ kubernetes_host: pulumi.Input[_builtins.str],
23
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
24
+ disable_iss_validation: Optional[pulumi.Input[_builtins.bool]] = None,
25
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
26
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
27
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
+ token_reviewer_jwt: Optional[pulumi.Input[_builtins.str]] = None,
31
+ use_annotations_as_alias_metadata: Optional[pulumi.Input[_builtins.bool]] = None):
33
32
  """
34
33
  The set of arguments for constructing a AuthBackendConfig resource.
35
- :param pulumi.Input[builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
36
- :param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
37
- :param pulumi.Input[builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
38
- :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
39
- :param pulumi.Input[builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
40
- :param pulumi.Input[builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
41
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
34
+ :param pulumi.Input[_builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
35
+ :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
36
+ :param pulumi.Input[_builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
37
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
38
+ :param pulumi.Input[_builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
39
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
40
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
42
41
  The value should not contain leading or trailing forward slashes.
43
42
  The `namespace` is always relative to the provider's configured namespace.
44
43
  *Available only for Vault Enterprise*.
45
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
46
- :param pulumi.Input[builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
47
- :param pulumi.Input[builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
44
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
45
+ :param pulumi.Input[_builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
46
+ :param pulumi.Input[_builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
48
47
  """
49
48
  pulumi.set(__self__, "kubernetes_host", kubernetes_host)
50
49
  if backend is not None:
@@ -66,81 +65,81 @@ class AuthBackendConfigArgs:
66
65
  if use_annotations_as_alias_metadata is not None:
67
66
  pulumi.set(__self__, "use_annotations_as_alias_metadata", use_annotations_as_alias_metadata)
68
67
 
69
- @property
68
+ @_builtins.property
70
69
  @pulumi.getter(name="kubernetesHost")
71
- def kubernetes_host(self) -> pulumi.Input[builtins.str]:
70
+ def kubernetes_host(self) -> pulumi.Input[_builtins.str]:
72
71
  """
73
72
  Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
74
73
  """
75
74
  return pulumi.get(self, "kubernetes_host")
76
75
 
77
76
  @kubernetes_host.setter
78
- def kubernetes_host(self, value: pulumi.Input[builtins.str]):
77
+ def kubernetes_host(self, value: pulumi.Input[_builtins.str]):
79
78
  pulumi.set(self, "kubernetes_host", value)
80
79
 
81
- @property
80
+ @_builtins.property
82
81
  @pulumi.getter
83
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
82
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
84
83
  """
85
84
  Unique name of the kubernetes backend to configure.
86
85
  """
87
86
  return pulumi.get(self, "backend")
88
87
 
89
88
  @backend.setter
90
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
89
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
91
90
  pulumi.set(self, "backend", value)
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter(name="disableIssValidation")
95
- def disable_iss_validation(self) -> Optional[pulumi.Input[builtins.bool]]:
94
+ def disable_iss_validation(self) -> Optional[pulumi.Input[_builtins.bool]]:
96
95
  """
97
96
  Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
98
97
  """
99
98
  return pulumi.get(self, "disable_iss_validation")
100
99
 
101
100
  @disable_iss_validation.setter
102
- def disable_iss_validation(self, value: Optional[pulumi.Input[builtins.bool]]):
101
+ def disable_iss_validation(self, value: Optional[pulumi.Input[_builtins.bool]]):
103
102
  pulumi.set(self, "disable_iss_validation", value)
104
103
 
105
- @property
104
+ @_builtins.property
106
105
  @pulumi.getter(name="disableLocalCaJwt")
107
- def disable_local_ca_jwt(self) -> Optional[pulumi.Input[builtins.bool]]:
106
+ def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
108
107
  """
109
108
  Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
110
109
  """
111
110
  return pulumi.get(self, "disable_local_ca_jwt")
112
111
 
113
112
  @disable_local_ca_jwt.setter
114
- def disable_local_ca_jwt(self, value: Optional[pulumi.Input[builtins.bool]]):
113
+ def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
115
114
  pulumi.set(self, "disable_local_ca_jwt", value)
116
115
 
117
- @property
116
+ @_builtins.property
118
117
  @pulumi.getter
119
- def issuer(self) -> Optional[pulumi.Input[builtins.str]]:
118
+ def issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
120
119
  """
121
120
  JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
122
121
  """
123
122
  return pulumi.get(self, "issuer")
124
123
 
125
124
  @issuer.setter
126
- def issuer(self, value: Optional[pulumi.Input[builtins.str]]):
125
+ def issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
127
126
  pulumi.set(self, "issuer", value)
128
127
 
129
- @property
128
+ @_builtins.property
130
129
  @pulumi.getter(name="kubernetesCaCert")
131
- def kubernetes_ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
130
+ def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
132
131
  """
133
132
  PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
134
133
  """
135
134
  return pulumi.get(self, "kubernetes_ca_cert")
136
135
 
137
136
  @kubernetes_ca_cert.setter
138
- def kubernetes_ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
137
+ def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
139
138
  pulumi.set(self, "kubernetes_ca_cert", value)
140
139
 
141
- @property
140
+ @_builtins.property
142
141
  @pulumi.getter
143
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
142
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
144
143
  """
145
144
  The namespace to provision the resource in.
146
145
  The value should not contain leading or trailing forward slashes.
@@ -150,74 +149,74 @@ class AuthBackendConfigArgs:
150
149
  return pulumi.get(self, "namespace")
151
150
 
152
151
  @namespace.setter
153
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
152
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
154
153
  pulumi.set(self, "namespace", value)
155
154
 
156
- @property
155
+ @_builtins.property
157
156
  @pulumi.getter(name="pemKeys")
158
- def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
157
+ def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
159
158
  """
160
159
  List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
161
160
  """
162
161
  return pulumi.get(self, "pem_keys")
163
162
 
164
163
  @pem_keys.setter
165
- def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
164
+ def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
166
165
  pulumi.set(self, "pem_keys", value)
167
166
 
168
- @property
167
+ @_builtins.property
169
168
  @pulumi.getter(name="tokenReviewerJwt")
170
- def token_reviewer_jwt(self) -> Optional[pulumi.Input[builtins.str]]:
169
+ def token_reviewer_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
171
170
  """
172
171
  A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
173
172
  """
174
173
  return pulumi.get(self, "token_reviewer_jwt")
175
174
 
176
175
  @token_reviewer_jwt.setter
177
- def token_reviewer_jwt(self, value: Optional[pulumi.Input[builtins.str]]):
176
+ def token_reviewer_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
178
177
  pulumi.set(self, "token_reviewer_jwt", value)
179
178
 
180
- @property
179
+ @_builtins.property
181
180
  @pulumi.getter(name="useAnnotationsAsAliasMetadata")
182
- def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[builtins.bool]]:
181
+ def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[_builtins.bool]]:
183
182
  """
184
183
  Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
185
184
  """
186
185
  return pulumi.get(self, "use_annotations_as_alias_metadata")
187
186
 
188
187
  @use_annotations_as_alias_metadata.setter
189
- def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[builtins.bool]]):
188
+ def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[_builtins.bool]]):
190
189
  pulumi.set(self, "use_annotations_as_alias_metadata", value)
191
190
 
192
191
 
193
192
  @pulumi.input_type
194
193
  class _AuthBackendConfigState:
195
194
  def __init__(__self__, *,
196
- backend: Optional[pulumi.Input[builtins.str]] = None,
197
- disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
198
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
199
- issuer: Optional[pulumi.Input[builtins.str]] = None,
200
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
201
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
202
- namespace: Optional[pulumi.Input[builtins.str]] = None,
203
- pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
204
- token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
205
- use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None):
195
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
196
+ disable_iss_validation: Optional[pulumi.Input[_builtins.bool]] = None,
197
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
198
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
199
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
200
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
201
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
202
+ pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
203
+ token_reviewer_jwt: Optional[pulumi.Input[_builtins.str]] = None,
204
+ use_annotations_as_alias_metadata: Optional[pulumi.Input[_builtins.bool]] = None):
206
205
  """
207
206
  Input properties used for looking up and filtering AuthBackendConfig resources.
208
- :param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
209
- :param pulumi.Input[builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
210
- :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
211
- :param pulumi.Input[builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
212
- :param pulumi.Input[builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
213
- :param pulumi.Input[builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
214
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
207
+ :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
208
+ :param pulumi.Input[_builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
209
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
210
+ :param pulumi.Input[_builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
211
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
212
+ :param pulumi.Input[_builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
213
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
215
214
  The value should not contain leading or trailing forward slashes.
216
215
  The `namespace` is always relative to the provider's configured namespace.
217
216
  *Available only for Vault Enterprise*.
218
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
219
- :param pulumi.Input[builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
220
- :param pulumi.Input[builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
217
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
218
+ :param pulumi.Input[_builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
219
+ :param pulumi.Input[_builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
221
220
  """
222
221
  if backend is not None:
223
222
  pulumi.set(__self__, "backend", backend)
@@ -240,81 +239,81 @@ class _AuthBackendConfigState:
240
239
  if use_annotations_as_alias_metadata is not None:
241
240
  pulumi.set(__self__, "use_annotations_as_alias_metadata", use_annotations_as_alias_metadata)
242
241
 
243
- @property
242
+ @_builtins.property
244
243
  @pulumi.getter
245
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
244
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
246
245
  """
247
246
  Unique name of the kubernetes backend to configure.
248
247
  """
249
248
  return pulumi.get(self, "backend")
250
249
 
251
250
  @backend.setter
252
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
251
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
253
252
  pulumi.set(self, "backend", value)
254
253
 
255
- @property
254
+ @_builtins.property
256
255
  @pulumi.getter(name="disableIssValidation")
257
- def disable_iss_validation(self) -> Optional[pulumi.Input[builtins.bool]]:
256
+ def disable_iss_validation(self) -> Optional[pulumi.Input[_builtins.bool]]:
258
257
  """
259
258
  Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
260
259
  """
261
260
  return pulumi.get(self, "disable_iss_validation")
262
261
 
263
262
  @disable_iss_validation.setter
264
- def disable_iss_validation(self, value: Optional[pulumi.Input[builtins.bool]]):
263
+ def disable_iss_validation(self, value: Optional[pulumi.Input[_builtins.bool]]):
265
264
  pulumi.set(self, "disable_iss_validation", value)
266
265
 
267
- @property
266
+ @_builtins.property
268
267
  @pulumi.getter(name="disableLocalCaJwt")
269
- def disable_local_ca_jwt(self) -> Optional[pulumi.Input[builtins.bool]]:
268
+ def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
270
269
  """
271
270
  Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
272
271
  """
273
272
  return pulumi.get(self, "disable_local_ca_jwt")
274
273
 
275
274
  @disable_local_ca_jwt.setter
276
- def disable_local_ca_jwt(self, value: Optional[pulumi.Input[builtins.bool]]):
275
+ def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
277
276
  pulumi.set(self, "disable_local_ca_jwt", value)
278
277
 
279
- @property
278
+ @_builtins.property
280
279
  @pulumi.getter
281
- def issuer(self) -> Optional[pulumi.Input[builtins.str]]:
280
+ def issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
282
281
  """
283
282
  JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
284
283
  """
285
284
  return pulumi.get(self, "issuer")
286
285
 
287
286
  @issuer.setter
288
- def issuer(self, value: Optional[pulumi.Input[builtins.str]]):
287
+ def issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
289
288
  pulumi.set(self, "issuer", value)
290
289
 
291
- @property
290
+ @_builtins.property
292
291
  @pulumi.getter(name="kubernetesCaCert")
293
- def kubernetes_ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
292
+ def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
294
293
  """
295
294
  PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
296
295
  """
297
296
  return pulumi.get(self, "kubernetes_ca_cert")
298
297
 
299
298
  @kubernetes_ca_cert.setter
300
- def kubernetes_ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
299
+ def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
301
300
  pulumi.set(self, "kubernetes_ca_cert", value)
302
301
 
303
- @property
302
+ @_builtins.property
304
303
  @pulumi.getter(name="kubernetesHost")
305
- def kubernetes_host(self) -> Optional[pulumi.Input[builtins.str]]:
304
+ def kubernetes_host(self) -> Optional[pulumi.Input[_builtins.str]]:
306
305
  """
307
306
  Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
308
307
  """
309
308
  return pulumi.get(self, "kubernetes_host")
310
309
 
311
310
  @kubernetes_host.setter
312
- def kubernetes_host(self, value: Optional[pulumi.Input[builtins.str]]):
311
+ def kubernetes_host(self, value: Optional[pulumi.Input[_builtins.str]]):
313
312
  pulumi.set(self, "kubernetes_host", value)
314
313
 
315
- @property
314
+ @_builtins.property
316
315
  @pulumi.getter
317
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
316
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
318
317
  """
319
318
  The namespace to provision the resource in.
320
319
  The value should not contain leading or trailing forward slashes.
@@ -324,43 +323,43 @@ class _AuthBackendConfigState:
324
323
  return pulumi.get(self, "namespace")
325
324
 
326
325
  @namespace.setter
327
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
326
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
328
327
  pulumi.set(self, "namespace", value)
329
328
 
330
- @property
329
+ @_builtins.property
331
330
  @pulumi.getter(name="pemKeys")
332
- def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
331
+ def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
333
332
  """
334
333
  List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
335
334
  """
336
335
  return pulumi.get(self, "pem_keys")
337
336
 
338
337
  @pem_keys.setter
339
- def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
338
+ def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
340
339
  pulumi.set(self, "pem_keys", value)
341
340
 
342
- @property
341
+ @_builtins.property
343
342
  @pulumi.getter(name="tokenReviewerJwt")
344
- def token_reviewer_jwt(self) -> Optional[pulumi.Input[builtins.str]]:
343
+ def token_reviewer_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
345
344
  """
346
345
  A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
347
346
  """
348
347
  return pulumi.get(self, "token_reviewer_jwt")
349
348
 
350
349
  @token_reviewer_jwt.setter
351
- def token_reviewer_jwt(self, value: Optional[pulumi.Input[builtins.str]]):
350
+ def token_reviewer_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
352
351
  pulumi.set(self, "token_reviewer_jwt", value)
353
352
 
354
- @property
353
+ @_builtins.property
355
354
  @pulumi.getter(name="useAnnotationsAsAliasMetadata")
356
- def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[builtins.bool]]:
355
+ def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[_builtins.bool]]:
357
356
  """
358
357
  Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
359
358
  """
360
359
  return pulumi.get(self, "use_annotations_as_alias_metadata")
361
360
 
362
361
  @use_annotations_as_alias_metadata.setter
363
- def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[builtins.bool]]):
362
+ def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[_builtins.bool]]):
364
363
  pulumi.set(self, "use_annotations_as_alias_metadata", value)
365
364
 
366
365
 
@@ -370,16 +369,16 @@ class AuthBackendConfig(pulumi.CustomResource):
370
369
  def __init__(__self__,
371
370
  resource_name: str,
372
371
  opts: Optional[pulumi.ResourceOptions] = None,
373
- backend: Optional[pulumi.Input[builtins.str]] = None,
374
- disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
375
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
376
- issuer: Optional[pulumi.Input[builtins.str]] = None,
377
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
378
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
379
- namespace: Optional[pulumi.Input[builtins.str]] = None,
380
- pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
381
- token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
382
- use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None,
372
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
373
+ disable_iss_validation: Optional[pulumi.Input[_builtins.bool]] = None,
374
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
375
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
376
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
377
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
378
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
379
+ pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
380
+ token_reviewer_jwt: Optional[pulumi.Input[_builtins.str]] = None,
381
+ use_annotations_as_alias_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
383
382
  __props__=None):
384
383
  """
385
384
  Manages an Kubernetes auth backend config in a Vault server. See the [Vault
@@ -414,19 +413,19 @@ class AuthBackendConfig(pulumi.CustomResource):
414
413
 
415
414
  :param str resource_name: The name of the resource.
416
415
  :param pulumi.ResourceOptions opts: Options for the resource.
417
- :param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
418
- :param pulumi.Input[builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
419
- :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
420
- :param pulumi.Input[builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
421
- :param pulumi.Input[builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
422
- :param pulumi.Input[builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
423
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
416
+ :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
417
+ :param pulumi.Input[_builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
418
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
419
+ :param pulumi.Input[_builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
420
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
421
+ :param pulumi.Input[_builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
422
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
424
423
  The value should not contain leading or trailing forward slashes.
425
424
  The `namespace` is always relative to the provider's configured namespace.
426
425
  *Available only for Vault Enterprise*.
427
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
428
- :param pulumi.Input[builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
429
- :param pulumi.Input[builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
426
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
427
+ :param pulumi.Input[_builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
428
+ :param pulumi.Input[_builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
430
429
  """
431
430
  ...
432
431
  @overload
@@ -480,16 +479,16 @@ class AuthBackendConfig(pulumi.CustomResource):
480
479
  def _internal_init(__self__,
481
480
  resource_name: str,
482
481
  opts: Optional[pulumi.ResourceOptions] = None,
483
- backend: Optional[pulumi.Input[builtins.str]] = None,
484
- disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
485
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
486
- issuer: Optional[pulumi.Input[builtins.str]] = None,
487
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
488
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
489
- namespace: Optional[pulumi.Input[builtins.str]] = None,
490
- pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
491
- token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
492
- use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None,
482
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
483
+ disable_iss_validation: Optional[pulumi.Input[_builtins.bool]] = None,
484
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
485
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
486
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
487
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
488
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
489
+ pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
490
+ token_reviewer_jwt: Optional[pulumi.Input[_builtins.str]] = None,
491
+ use_annotations_as_alias_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
493
492
  __props__=None):
494
493
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
495
494
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -523,16 +522,16 @@ class AuthBackendConfig(pulumi.CustomResource):
523
522
  def get(resource_name: str,
524
523
  id: pulumi.Input[str],
525
524
  opts: Optional[pulumi.ResourceOptions] = None,
526
- backend: Optional[pulumi.Input[builtins.str]] = None,
527
- disable_iss_validation: Optional[pulumi.Input[builtins.bool]] = None,
528
- disable_local_ca_jwt: Optional[pulumi.Input[builtins.bool]] = None,
529
- issuer: Optional[pulumi.Input[builtins.str]] = None,
530
- kubernetes_ca_cert: Optional[pulumi.Input[builtins.str]] = None,
531
- kubernetes_host: Optional[pulumi.Input[builtins.str]] = None,
532
- namespace: Optional[pulumi.Input[builtins.str]] = None,
533
- pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
534
- token_reviewer_jwt: Optional[pulumi.Input[builtins.str]] = None,
535
- use_annotations_as_alias_metadata: Optional[pulumi.Input[builtins.bool]] = None) -> 'AuthBackendConfig':
525
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
526
+ disable_iss_validation: Optional[pulumi.Input[_builtins.bool]] = None,
527
+ disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
528
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
529
+ kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
530
+ kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
531
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
532
+ pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
533
+ token_reviewer_jwt: Optional[pulumi.Input[_builtins.str]] = None,
534
+ use_annotations_as_alias_metadata: Optional[pulumi.Input[_builtins.bool]] = None) -> 'AuthBackendConfig':
536
535
  """
537
536
  Get an existing AuthBackendConfig resource's state with the given name, id, and optional extra
538
537
  properties used to qualify the lookup.
@@ -540,19 +539,19 @@ class AuthBackendConfig(pulumi.CustomResource):
540
539
  :param str resource_name: The unique name of the resulting resource.
541
540
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
542
541
  :param pulumi.ResourceOptions opts: Options for the resource.
543
- :param pulumi.Input[builtins.str] backend: Unique name of the kubernetes backend to configure.
544
- :param pulumi.Input[builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
545
- :param pulumi.Input[builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
546
- :param pulumi.Input[builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
547
- :param pulumi.Input[builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
548
- :param pulumi.Input[builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
549
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
542
+ :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
543
+ :param pulumi.Input[_builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
544
+ :param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
545
+ :param pulumi.Input[_builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
546
+ :param pulumi.Input[_builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
547
+ :param pulumi.Input[_builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
548
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
550
549
  The value should not contain leading or trailing forward slashes.
551
550
  The `namespace` is always relative to the provider's configured namespace.
552
551
  *Available only for Vault Enterprise*.
553
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
554
- :param pulumi.Input[builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
555
- :param pulumi.Input[builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
552
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
553
+ :param pulumi.Input[_builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
554
+ :param pulumi.Input[_builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
556
555
  """
557
556
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
558
557
 
@@ -570,57 +569,57 @@ class AuthBackendConfig(pulumi.CustomResource):
570
569
  __props__.__dict__["use_annotations_as_alias_metadata"] = use_annotations_as_alias_metadata
571
570
  return AuthBackendConfig(resource_name, opts=opts, __props__=__props__)
572
571
 
573
- @property
572
+ @_builtins.property
574
573
  @pulumi.getter
575
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
574
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
576
575
  """
577
576
  Unique name of the kubernetes backend to configure.
578
577
  """
579
578
  return pulumi.get(self, "backend")
580
579
 
581
- @property
580
+ @_builtins.property
582
581
  @pulumi.getter(name="disableIssValidation")
583
- def disable_iss_validation(self) -> pulumi.Output[builtins.bool]:
582
+ def disable_iss_validation(self) -> pulumi.Output[_builtins.bool]:
584
583
  """
585
584
  Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
586
585
  """
587
586
  return pulumi.get(self, "disable_iss_validation")
588
587
 
589
- @property
588
+ @_builtins.property
590
589
  @pulumi.getter(name="disableLocalCaJwt")
591
- def disable_local_ca_jwt(self) -> pulumi.Output[builtins.bool]:
590
+ def disable_local_ca_jwt(self) -> pulumi.Output[_builtins.bool]:
592
591
  """
593
592
  Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
594
593
  """
595
594
  return pulumi.get(self, "disable_local_ca_jwt")
596
595
 
597
- @property
596
+ @_builtins.property
598
597
  @pulumi.getter
599
- def issuer(self) -> pulumi.Output[Optional[builtins.str]]:
598
+ def issuer(self) -> pulumi.Output[Optional[_builtins.str]]:
600
599
  """
601
600
  JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
602
601
  """
603
602
  return pulumi.get(self, "issuer")
604
603
 
605
- @property
604
+ @_builtins.property
606
605
  @pulumi.getter(name="kubernetesCaCert")
607
- def kubernetes_ca_cert(self) -> pulumi.Output[builtins.str]:
606
+ def kubernetes_ca_cert(self) -> pulumi.Output[_builtins.str]:
608
607
  """
609
608
  PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
610
609
  """
611
610
  return pulumi.get(self, "kubernetes_ca_cert")
612
611
 
613
- @property
612
+ @_builtins.property
614
613
  @pulumi.getter(name="kubernetesHost")
615
- def kubernetes_host(self) -> pulumi.Output[builtins.str]:
614
+ def kubernetes_host(self) -> pulumi.Output[_builtins.str]:
616
615
  """
617
616
  Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
618
617
  """
619
618
  return pulumi.get(self, "kubernetes_host")
620
619
 
621
- @property
620
+ @_builtins.property
622
621
  @pulumi.getter
623
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
622
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
624
623
  """
625
624
  The namespace to provision the resource in.
626
625
  The value should not contain leading or trailing forward slashes.
@@ -629,25 +628,25 @@ class AuthBackendConfig(pulumi.CustomResource):
629
628
  """
630
629
  return pulumi.get(self, "namespace")
631
630
 
632
- @property
631
+ @_builtins.property
633
632
  @pulumi.getter(name="pemKeys")
634
- def pem_keys(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
633
+ def pem_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
635
634
  """
636
635
  List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
637
636
  """
638
637
  return pulumi.get(self, "pem_keys")
639
638
 
640
- @property
639
+ @_builtins.property
641
640
  @pulumi.getter(name="tokenReviewerJwt")
642
- def token_reviewer_jwt(self) -> pulumi.Output[Optional[builtins.str]]:
641
+ def token_reviewer_jwt(self) -> pulumi.Output[Optional[_builtins.str]]:
643
642
  """
644
643
  A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
645
644
  """
646
645
  return pulumi.get(self, "token_reviewer_jwt")
647
646
 
648
- @property
647
+ @_builtins.property
649
648
  @pulumi.getter(name="useAnnotationsAsAliasMetadata")
650
- def use_annotations_as_alias_metadata(self) -> pulumi.Output[builtins.bool]:
649
+ def use_annotations_as_alias_metadata(self) -> pulumi.Output[_builtins.bool]:
651
650
  """
652
651
  Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
653
652
  """