pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,28 +19,28 @@ __all__ = ['OidcRoleArgs', 'OidcRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class OidcRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
key: pulumi.Input[
|
24
|
-
client_id: Optional[pulumi.Input[
|
25
|
-
name: Optional[pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
27
|
-
template: Optional[pulumi.Input[
|
28
|
-
ttl: Optional[pulumi.Input[
|
22
|
+
key: pulumi.Input[_builtins.str],
|
23
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
template: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
29
28
|
"""
|
30
29
|
The set of arguments for constructing a OidcRole resource.
|
31
|
-
:param pulumi.Input[
|
30
|
+
:param pulumi.Input[_builtins.str] key: A configured named key, the key must already exist
|
32
31
|
before tokens can be issued.
|
33
|
-
:param pulumi.Input[
|
32
|
+
:param pulumi.Input[_builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
|
34
33
|
tokens issued by this role
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
34
|
+
:param pulumi.Input[_builtins.str] name: Name of the OIDC Role to create.
|
35
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
37
36
|
The value should not contain leading or trailing forward slashes.
|
38
37
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
39
38
|
*Available only for Vault Enterprise*.
|
40
|
-
:param pulumi.Input[
|
39
|
+
:param pulumi.Input[_builtins.str] template: The template string to use for generating tokens. This may be in
|
41
40
|
string-ified JSON or base64 format. See the
|
42
41
|
[documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
|
43
42
|
for the template format.
|
44
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
|
45
44
|
"""
|
46
45
|
pulumi.set(__self__, "key", key)
|
47
46
|
if client_id is not None:
|
@@ -55,9 +54,9 @@ class OidcRoleArgs:
|
|
55
54
|
if ttl is not None:
|
56
55
|
pulumi.set(__self__, "ttl", ttl)
|
57
56
|
|
58
|
-
@property
|
57
|
+
@_builtins.property
|
59
58
|
@pulumi.getter
|
60
|
-
def key(self) -> pulumi.Input[
|
59
|
+
def key(self) -> pulumi.Input[_builtins.str]:
|
61
60
|
"""
|
62
61
|
A configured named key, the key must already exist
|
63
62
|
before tokens can be issued.
|
@@ -65,12 +64,12 @@ class OidcRoleArgs:
|
|
65
64
|
return pulumi.get(self, "key")
|
66
65
|
|
67
66
|
@key.setter
|
68
|
-
def key(self, value: pulumi.Input[
|
67
|
+
def key(self, value: pulumi.Input[_builtins.str]):
|
69
68
|
pulumi.set(self, "key", value)
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter(name="clientId")
|
73
|
-
def client_id(self) -> Optional[pulumi.Input[
|
72
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
74
73
|
"""
|
75
74
|
The value that will be included in the `aud` field of all the OIDC identity
|
76
75
|
tokens issued by this role
|
@@ -78,24 +77,24 @@ class OidcRoleArgs:
|
|
78
77
|
return pulumi.get(self, "client_id")
|
79
78
|
|
80
79
|
@client_id.setter
|
81
|
-
def client_id(self, value: Optional[pulumi.Input[
|
80
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
82
81
|
pulumi.set(self, "client_id", value)
|
83
82
|
|
84
|
-
@property
|
83
|
+
@_builtins.property
|
85
84
|
@pulumi.getter
|
86
|
-
def name(self) -> Optional[pulumi.Input[
|
85
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
87
86
|
"""
|
88
87
|
Name of the OIDC Role to create.
|
89
88
|
"""
|
90
89
|
return pulumi.get(self, "name")
|
91
90
|
|
92
91
|
@name.setter
|
93
|
-
def name(self, value: Optional[pulumi.Input[
|
92
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
94
93
|
pulumi.set(self, "name", value)
|
95
94
|
|
96
|
-
@property
|
95
|
+
@_builtins.property
|
97
96
|
@pulumi.getter
|
98
|
-
def namespace(self) -> Optional[pulumi.Input[
|
97
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
99
98
|
"""
|
100
99
|
The namespace to provision the resource in.
|
101
100
|
The value should not contain leading or trailing forward slashes.
|
@@ -105,12 +104,12 @@ class OidcRoleArgs:
|
|
105
104
|
return pulumi.get(self, "namespace")
|
106
105
|
|
107
106
|
@namespace.setter
|
108
|
-
def namespace(self, value: Optional[pulumi.Input[
|
107
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
109
108
|
pulumi.set(self, "namespace", value)
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter
|
113
|
-
def template(self) -> Optional[pulumi.Input[
|
112
|
+
def template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
114
113
|
"""
|
115
114
|
The template string to use for generating tokens. This may be in
|
116
115
|
string-ified JSON or base64 format. See the
|
@@ -120,47 +119,47 @@ class OidcRoleArgs:
|
|
120
119
|
return pulumi.get(self, "template")
|
121
120
|
|
122
121
|
@template.setter
|
123
|
-
def template(self, value: Optional[pulumi.Input[
|
122
|
+
def template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
124
123
|
pulumi.set(self, "template", value)
|
125
124
|
|
126
|
-
@property
|
125
|
+
@_builtins.property
|
127
126
|
@pulumi.getter
|
128
|
-
def ttl(self) -> Optional[pulumi.Input[
|
127
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
129
128
|
"""
|
130
129
|
TTL of the tokens generated against the role in number of seconds.
|
131
130
|
"""
|
132
131
|
return pulumi.get(self, "ttl")
|
133
132
|
|
134
133
|
@ttl.setter
|
135
|
-
def ttl(self, value: Optional[pulumi.Input[
|
134
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
136
135
|
pulumi.set(self, "ttl", value)
|
137
136
|
|
138
137
|
|
139
138
|
@pulumi.input_type
|
140
139
|
class _OidcRoleState:
|
141
140
|
def __init__(__self__, *,
|
142
|
-
client_id: Optional[pulumi.Input[
|
143
|
-
key: Optional[pulumi.Input[
|
144
|
-
name: Optional[pulumi.Input[
|
145
|
-
namespace: Optional[pulumi.Input[
|
146
|
-
template: Optional[pulumi.Input[
|
147
|
-
ttl: Optional[pulumi.Input[
|
141
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
142
|
+
key: Optional[pulumi.Input[_builtins.str]] = None,
|
143
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
144
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
145
|
+
template: Optional[pulumi.Input[_builtins.str]] = None,
|
146
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
148
147
|
"""
|
149
148
|
Input properties used for looking up and filtering OidcRole resources.
|
150
|
-
:param pulumi.Input[
|
149
|
+
:param pulumi.Input[_builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
|
151
150
|
tokens issued by this role
|
152
|
-
:param pulumi.Input[
|
151
|
+
:param pulumi.Input[_builtins.str] key: A configured named key, the key must already exist
|
153
152
|
before tokens can be issued.
|
154
|
-
:param pulumi.Input[
|
155
|
-
:param pulumi.Input[
|
153
|
+
:param pulumi.Input[_builtins.str] name: Name of the OIDC Role to create.
|
154
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
156
155
|
The value should not contain leading or trailing forward slashes.
|
157
156
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
158
157
|
*Available only for Vault Enterprise*.
|
159
|
-
:param pulumi.Input[
|
158
|
+
:param pulumi.Input[_builtins.str] template: The template string to use for generating tokens. This may be in
|
160
159
|
string-ified JSON or base64 format. See the
|
161
160
|
[documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
|
162
161
|
for the template format.
|
163
|
-
:param pulumi.Input[
|
162
|
+
:param pulumi.Input[_builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
|
164
163
|
"""
|
165
164
|
if client_id is not None:
|
166
165
|
pulumi.set(__self__, "client_id", client_id)
|
@@ -175,9 +174,9 @@ class _OidcRoleState:
|
|
175
174
|
if ttl is not None:
|
176
175
|
pulumi.set(__self__, "ttl", ttl)
|
177
176
|
|
178
|
-
@property
|
177
|
+
@_builtins.property
|
179
178
|
@pulumi.getter(name="clientId")
|
180
|
-
def client_id(self) -> Optional[pulumi.Input[
|
179
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
181
180
|
"""
|
182
181
|
The value that will be included in the `aud` field of all the OIDC identity
|
183
182
|
tokens issued by this role
|
@@ -185,12 +184,12 @@ class _OidcRoleState:
|
|
185
184
|
return pulumi.get(self, "client_id")
|
186
185
|
|
187
186
|
@client_id.setter
|
188
|
-
def client_id(self, value: Optional[pulumi.Input[
|
187
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
189
188
|
pulumi.set(self, "client_id", value)
|
190
189
|
|
191
|
-
@property
|
190
|
+
@_builtins.property
|
192
191
|
@pulumi.getter
|
193
|
-
def key(self) -> Optional[pulumi.Input[
|
192
|
+
def key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
194
193
|
"""
|
195
194
|
A configured named key, the key must already exist
|
196
195
|
before tokens can be issued.
|
@@ -198,24 +197,24 @@ class _OidcRoleState:
|
|
198
197
|
return pulumi.get(self, "key")
|
199
198
|
|
200
199
|
@key.setter
|
201
|
-
def key(self, value: Optional[pulumi.Input[
|
200
|
+
def key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
202
201
|
pulumi.set(self, "key", value)
|
203
202
|
|
204
|
-
@property
|
203
|
+
@_builtins.property
|
205
204
|
@pulumi.getter
|
206
|
-
def name(self) -> Optional[pulumi.Input[
|
205
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
207
206
|
"""
|
208
207
|
Name of the OIDC Role to create.
|
209
208
|
"""
|
210
209
|
return pulumi.get(self, "name")
|
211
210
|
|
212
211
|
@name.setter
|
213
|
-
def name(self, value: Optional[pulumi.Input[
|
212
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
214
213
|
pulumi.set(self, "name", value)
|
215
214
|
|
216
|
-
@property
|
215
|
+
@_builtins.property
|
217
216
|
@pulumi.getter
|
218
|
-
def namespace(self) -> Optional[pulumi.Input[
|
217
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
219
218
|
"""
|
220
219
|
The namespace to provision the resource in.
|
221
220
|
The value should not contain leading or trailing forward slashes.
|
@@ -225,12 +224,12 @@ class _OidcRoleState:
|
|
225
224
|
return pulumi.get(self, "namespace")
|
226
225
|
|
227
226
|
@namespace.setter
|
228
|
-
def namespace(self, value: Optional[pulumi.Input[
|
227
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
229
228
|
pulumi.set(self, "namespace", value)
|
230
229
|
|
231
|
-
@property
|
230
|
+
@_builtins.property
|
232
231
|
@pulumi.getter
|
233
|
-
def template(self) -> Optional[pulumi.Input[
|
232
|
+
def template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
234
233
|
"""
|
235
234
|
The template string to use for generating tokens. This may be in
|
236
235
|
string-ified JSON or base64 format. See the
|
@@ -240,19 +239,19 @@ class _OidcRoleState:
|
|
240
239
|
return pulumi.get(self, "template")
|
241
240
|
|
242
241
|
@template.setter
|
243
|
-
def template(self, value: Optional[pulumi.Input[
|
242
|
+
def template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
244
243
|
pulumi.set(self, "template", value)
|
245
244
|
|
246
|
-
@property
|
245
|
+
@_builtins.property
|
247
246
|
@pulumi.getter
|
248
|
-
def ttl(self) -> Optional[pulumi.Input[
|
247
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
249
248
|
"""
|
250
249
|
TTL of the tokens generated against the role in number of seconds.
|
251
250
|
"""
|
252
251
|
return pulumi.get(self, "ttl")
|
253
252
|
|
254
253
|
@ttl.setter
|
255
|
-
def ttl(self, value: Optional[pulumi.Input[
|
254
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
256
255
|
pulumi.set(self, "ttl", value)
|
257
256
|
|
258
257
|
|
@@ -262,12 +261,12 @@ class OidcRole(pulumi.CustomResource):
|
|
262
261
|
def __init__(__self__,
|
263
262
|
resource_name: str,
|
264
263
|
opts: Optional[pulumi.ResourceOptions] = None,
|
265
|
-
client_id: Optional[pulumi.Input[
|
266
|
-
key: Optional[pulumi.Input[
|
267
|
-
name: Optional[pulumi.Input[
|
268
|
-
namespace: Optional[pulumi.Input[
|
269
|
-
template: Optional[pulumi.Input[
|
270
|
-
ttl: Optional[pulumi.Input[
|
264
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
265
|
+
key: Optional[pulumi.Input[_builtins.str]] = None,
|
266
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
267
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
268
|
+
template: Optional[pulumi.Input[_builtins.str]] = None,
|
269
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
271
270
|
__props__=None):
|
272
271
|
"""
|
273
272
|
## Example Usage
|
@@ -324,20 +323,20 @@ class OidcRole(pulumi.CustomResource):
|
|
324
323
|
|
325
324
|
:param str resource_name: The name of the resource.
|
326
325
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
327
|
-
:param pulumi.Input[
|
326
|
+
:param pulumi.Input[_builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
|
328
327
|
tokens issued by this role
|
329
|
-
:param pulumi.Input[
|
328
|
+
:param pulumi.Input[_builtins.str] key: A configured named key, the key must already exist
|
330
329
|
before tokens can be issued.
|
331
|
-
:param pulumi.Input[
|
332
|
-
:param pulumi.Input[
|
330
|
+
:param pulumi.Input[_builtins.str] name: Name of the OIDC Role to create.
|
331
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
333
332
|
The value should not contain leading or trailing forward slashes.
|
334
333
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
335
334
|
*Available only for Vault Enterprise*.
|
336
|
-
:param pulumi.Input[
|
335
|
+
:param pulumi.Input[_builtins.str] template: The template string to use for generating tokens. This may be in
|
337
336
|
string-ified JSON or base64 format. See the
|
338
337
|
[documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
|
339
338
|
for the template format.
|
340
|
-
:param pulumi.Input[
|
339
|
+
:param pulumi.Input[_builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
|
341
340
|
"""
|
342
341
|
...
|
343
342
|
@overload
|
@@ -413,12 +412,12 @@ class OidcRole(pulumi.CustomResource):
|
|
413
412
|
def _internal_init(__self__,
|
414
413
|
resource_name: str,
|
415
414
|
opts: Optional[pulumi.ResourceOptions] = None,
|
416
|
-
client_id: Optional[pulumi.Input[
|
417
|
-
key: Optional[pulumi.Input[
|
418
|
-
name: Optional[pulumi.Input[
|
419
|
-
namespace: Optional[pulumi.Input[
|
420
|
-
template: Optional[pulumi.Input[
|
421
|
-
ttl: Optional[pulumi.Input[
|
415
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
416
|
+
key: Optional[pulumi.Input[_builtins.str]] = None,
|
417
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
418
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
419
|
+
template: Optional[pulumi.Input[_builtins.str]] = None,
|
420
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
422
421
|
__props__=None):
|
423
422
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
424
423
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -446,12 +445,12 @@ class OidcRole(pulumi.CustomResource):
|
|
446
445
|
def get(resource_name: str,
|
447
446
|
id: pulumi.Input[str],
|
448
447
|
opts: Optional[pulumi.ResourceOptions] = None,
|
449
|
-
client_id: Optional[pulumi.Input[
|
450
|
-
key: Optional[pulumi.Input[
|
451
|
-
name: Optional[pulumi.Input[
|
452
|
-
namespace: Optional[pulumi.Input[
|
453
|
-
template: Optional[pulumi.Input[
|
454
|
-
ttl: Optional[pulumi.Input[
|
448
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
449
|
+
key: Optional[pulumi.Input[_builtins.str]] = None,
|
450
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
451
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
452
|
+
template: Optional[pulumi.Input[_builtins.str]] = None,
|
453
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'OidcRole':
|
455
454
|
"""
|
456
455
|
Get an existing OidcRole resource's state with the given name, id, and optional extra
|
457
456
|
properties used to qualify the lookup.
|
@@ -459,20 +458,20 @@ class OidcRole(pulumi.CustomResource):
|
|
459
458
|
:param str resource_name: The unique name of the resulting resource.
|
460
459
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
461
460
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
462
|
-
:param pulumi.Input[
|
461
|
+
:param pulumi.Input[_builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
|
463
462
|
tokens issued by this role
|
464
|
-
:param pulumi.Input[
|
463
|
+
:param pulumi.Input[_builtins.str] key: A configured named key, the key must already exist
|
465
464
|
before tokens can be issued.
|
466
|
-
:param pulumi.Input[
|
467
|
-
:param pulumi.Input[
|
465
|
+
:param pulumi.Input[_builtins.str] name: Name of the OIDC Role to create.
|
466
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
468
467
|
The value should not contain leading or trailing forward slashes.
|
469
468
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
470
469
|
*Available only for Vault Enterprise*.
|
471
|
-
:param pulumi.Input[
|
470
|
+
:param pulumi.Input[_builtins.str] template: The template string to use for generating tokens. This may be in
|
472
471
|
string-ified JSON or base64 format. See the
|
473
472
|
[documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
|
474
473
|
for the template format.
|
475
|
-
:param pulumi.Input[
|
474
|
+
:param pulumi.Input[_builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
|
476
475
|
"""
|
477
476
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
478
477
|
|
@@ -486,35 +485,35 @@ class OidcRole(pulumi.CustomResource):
|
|
486
485
|
__props__.__dict__["ttl"] = ttl
|
487
486
|
return OidcRole(resource_name, opts=opts, __props__=__props__)
|
488
487
|
|
489
|
-
@property
|
488
|
+
@_builtins.property
|
490
489
|
@pulumi.getter(name="clientId")
|
491
|
-
def client_id(self) -> pulumi.Output[
|
490
|
+
def client_id(self) -> pulumi.Output[_builtins.str]:
|
492
491
|
"""
|
493
492
|
The value that will be included in the `aud` field of all the OIDC identity
|
494
493
|
tokens issued by this role
|
495
494
|
"""
|
496
495
|
return pulumi.get(self, "client_id")
|
497
496
|
|
498
|
-
@property
|
497
|
+
@_builtins.property
|
499
498
|
@pulumi.getter
|
500
|
-
def key(self) -> pulumi.Output[
|
499
|
+
def key(self) -> pulumi.Output[_builtins.str]:
|
501
500
|
"""
|
502
501
|
A configured named key, the key must already exist
|
503
502
|
before tokens can be issued.
|
504
503
|
"""
|
505
504
|
return pulumi.get(self, "key")
|
506
505
|
|
507
|
-
@property
|
506
|
+
@_builtins.property
|
508
507
|
@pulumi.getter
|
509
|
-
def name(self) -> pulumi.Output[
|
508
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
510
509
|
"""
|
511
510
|
Name of the OIDC Role to create.
|
512
511
|
"""
|
513
512
|
return pulumi.get(self, "name")
|
514
513
|
|
515
|
-
@property
|
514
|
+
@_builtins.property
|
516
515
|
@pulumi.getter
|
517
|
-
def namespace(self) -> pulumi.Output[Optional[
|
516
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
518
517
|
"""
|
519
518
|
The namespace to provision the resource in.
|
520
519
|
The value should not contain leading or trailing forward slashes.
|
@@ -523,9 +522,9 @@ class OidcRole(pulumi.CustomResource):
|
|
523
522
|
"""
|
524
523
|
return pulumi.get(self, "namespace")
|
525
524
|
|
526
|
-
@property
|
525
|
+
@_builtins.property
|
527
526
|
@pulumi.getter
|
528
|
-
def template(self) -> pulumi.Output[Optional[
|
527
|
+
def template(self) -> pulumi.Output[Optional[_builtins.str]]:
|
529
528
|
"""
|
530
529
|
The template string to use for generating tokens. This may be in
|
531
530
|
string-ified JSON or base64 format. See the
|
@@ -534,9 +533,9 @@ class OidcRole(pulumi.CustomResource):
|
|
534
533
|
"""
|
535
534
|
return pulumi.get(self, "template")
|
536
535
|
|
537
|
-
@property
|
536
|
+
@_builtins.property
|
538
537
|
@pulumi.getter
|
539
|
-
def ttl(self) -> pulumi.Output[Optional[
|
538
|
+
def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
540
539
|
"""
|
541
540
|
TTL of the tokens generated against the role in number of seconds.
|
542
541
|
"""
|