pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -59,75 +58,75 @@ class GetAuthBackendConfigResult:
|
|
59
58
|
raise TypeError("Expected argument 'use_annotations_as_alias_metadata' to be a bool")
|
60
59
|
pulumi.set(__self__, "use_annotations_as_alias_metadata", use_annotations_as_alias_metadata)
|
61
60
|
|
62
|
-
@property
|
61
|
+
@_builtins.property
|
63
62
|
@pulumi.getter
|
64
|
-
def backend(self) -> Optional[
|
63
|
+
def backend(self) -> Optional[_builtins.str]:
|
65
64
|
return pulumi.get(self, "backend")
|
66
65
|
|
67
|
-
@property
|
66
|
+
@_builtins.property
|
68
67
|
@pulumi.getter(name="disableIssValidation")
|
69
|
-
def disable_iss_validation(self) ->
|
68
|
+
def disable_iss_validation(self) -> _builtins.bool:
|
70
69
|
"""
|
71
70
|
(Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
72
71
|
"""
|
73
72
|
return pulumi.get(self, "disable_iss_validation")
|
74
73
|
|
75
|
-
@property
|
74
|
+
@_builtins.property
|
76
75
|
@pulumi.getter(name="disableLocalCaJwt")
|
77
|
-
def disable_local_ca_jwt(self) ->
|
76
|
+
def disable_local_ca_jwt(self) -> _builtins.bool:
|
78
77
|
"""
|
79
78
|
(Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
80
79
|
"""
|
81
80
|
return pulumi.get(self, "disable_local_ca_jwt")
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter
|
85
|
-
def id(self) ->
|
84
|
+
def id(self) -> _builtins.str:
|
86
85
|
"""
|
87
86
|
The provider-assigned unique ID for this managed resource.
|
88
87
|
"""
|
89
88
|
return pulumi.get(self, "id")
|
90
89
|
|
91
|
-
@property
|
90
|
+
@_builtins.property
|
92
91
|
@pulumi.getter
|
93
|
-
def issuer(self) ->
|
92
|
+
def issuer(self) -> _builtins.str:
|
94
93
|
"""
|
95
94
|
Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
96
95
|
"""
|
97
96
|
return pulumi.get(self, "issuer")
|
98
97
|
|
99
|
-
@property
|
98
|
+
@_builtins.property
|
100
99
|
@pulumi.getter(name="kubernetesCaCert")
|
101
|
-
def kubernetes_ca_cert(self) ->
|
100
|
+
def kubernetes_ca_cert(self) -> _builtins.str:
|
102
101
|
"""
|
103
102
|
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
104
103
|
"""
|
105
104
|
return pulumi.get(self, "kubernetes_ca_cert")
|
106
105
|
|
107
|
-
@property
|
106
|
+
@_builtins.property
|
108
107
|
@pulumi.getter(name="kubernetesHost")
|
109
|
-
def kubernetes_host(self) ->
|
108
|
+
def kubernetes_host(self) -> _builtins.str:
|
110
109
|
"""
|
111
110
|
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
112
111
|
"""
|
113
112
|
return pulumi.get(self, "kubernetes_host")
|
114
113
|
|
115
|
-
@property
|
114
|
+
@_builtins.property
|
116
115
|
@pulumi.getter
|
117
|
-
def namespace(self) -> Optional[
|
116
|
+
def namespace(self) -> Optional[_builtins.str]:
|
118
117
|
return pulumi.get(self, "namespace")
|
119
118
|
|
120
|
-
@property
|
119
|
+
@_builtins.property
|
121
120
|
@pulumi.getter(name="pemKeys")
|
122
|
-
def pem_keys(self) -> Sequence[
|
121
|
+
def pem_keys(self) -> Sequence[_builtins.str]:
|
123
122
|
"""
|
124
123
|
Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
125
124
|
"""
|
126
125
|
return pulumi.get(self, "pem_keys")
|
127
126
|
|
128
|
-
@property
|
127
|
+
@_builtins.property
|
129
128
|
@pulumi.getter(name="useAnnotationsAsAliasMetadata")
|
130
|
-
def use_annotations_as_alias_metadata(self) ->
|
129
|
+
def use_annotations_as_alias_metadata(self) -> _builtins.bool:
|
131
130
|
"""
|
132
131
|
(Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
133
132
|
"""
|
@@ -152,15 +151,15 @@ class AwaitableGetAuthBackendConfigResult(GetAuthBackendConfigResult):
|
|
152
151
|
use_annotations_as_alias_metadata=self.use_annotations_as_alias_metadata)
|
153
152
|
|
154
153
|
|
155
|
-
def get_auth_backend_config(backend: Optional[
|
156
|
-
disable_iss_validation: Optional[
|
157
|
-
disable_local_ca_jwt: Optional[
|
158
|
-
issuer: Optional[
|
159
|
-
kubernetes_ca_cert: Optional[
|
160
|
-
kubernetes_host: Optional[
|
161
|
-
namespace: Optional[
|
162
|
-
pem_keys: Optional[Sequence[
|
163
|
-
use_annotations_as_alias_metadata: Optional[
|
154
|
+
def get_auth_backend_config(backend: Optional[_builtins.str] = None,
|
155
|
+
disable_iss_validation: Optional[_builtins.bool] = None,
|
156
|
+
disable_local_ca_jwt: Optional[_builtins.bool] = None,
|
157
|
+
issuer: Optional[_builtins.str] = None,
|
158
|
+
kubernetes_ca_cert: Optional[_builtins.str] = None,
|
159
|
+
kubernetes_host: Optional[_builtins.str] = None,
|
160
|
+
namespace: Optional[_builtins.str] = None,
|
161
|
+
pem_keys: Optional[Sequence[_builtins.str]] = None,
|
162
|
+
use_annotations_as_alias_metadata: Optional[_builtins.bool] = None,
|
164
163
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendConfigResult:
|
165
164
|
"""
|
166
165
|
Reads the Role of an Kubernetes from a Vault server. See the [Vault
|
@@ -168,19 +167,19 @@ def get_auth_backend_config(backend: Optional[builtins.str] = None,
|
|
168
167
|
information.
|
169
168
|
|
170
169
|
|
171
|
-
:param
|
170
|
+
:param _builtins.str backend: The unique name for the Kubernetes backend the config to
|
172
171
|
retrieve Role attributes for resides in. Defaults to "kubernetes".
|
173
|
-
:param
|
174
|
-
:param
|
175
|
-
:param
|
176
|
-
:param
|
177
|
-
:param
|
178
|
-
:param
|
172
|
+
:param _builtins.bool disable_iss_validation: (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
173
|
+
:param _builtins.bool disable_local_ca_jwt: (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
174
|
+
:param _builtins.str issuer: Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
175
|
+
:param _builtins.str kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
176
|
+
:param _builtins.str kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
177
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
179
178
|
The value should not contain leading or trailing forward slashes.
|
180
179
|
The `namespace` is always relative to the provider's configured namespace.
|
181
180
|
*Available only for Vault Enterprise*.
|
182
|
-
:param Sequence[
|
183
|
-
:param
|
181
|
+
:param Sequence[_builtins.str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
182
|
+
:param _builtins.bool use_annotations_as_alias_metadata: (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
184
183
|
"""
|
185
184
|
__args__ = dict()
|
186
185
|
__args__['backend'] = backend
|
@@ -206,15 +205,15 @@ def get_auth_backend_config(backend: Optional[builtins.str] = None,
|
|
206
205
|
namespace=pulumi.get(__ret__, 'namespace'),
|
207
206
|
pem_keys=pulumi.get(__ret__, 'pem_keys'),
|
208
207
|
use_annotations_as_alias_metadata=pulumi.get(__ret__, 'use_annotations_as_alias_metadata'))
|
209
|
-
def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[
|
210
|
-
disable_iss_validation: Optional[pulumi.Input[Optional[
|
211
|
-
disable_local_ca_jwt: Optional[pulumi.Input[Optional[
|
212
|
-
issuer: Optional[pulumi.Input[Optional[
|
213
|
-
kubernetes_ca_cert: Optional[pulumi.Input[Optional[
|
214
|
-
kubernetes_host: Optional[pulumi.Input[Optional[
|
215
|
-
namespace: Optional[pulumi.Input[Optional[
|
216
|
-
pem_keys: Optional[pulumi.Input[Optional[Sequence[
|
217
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[Optional[
|
208
|
+
def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
209
|
+
disable_iss_validation: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
210
|
+
disable_local_ca_jwt: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
211
|
+
issuer: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
212
|
+
kubernetes_ca_cert: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
213
|
+
kubernetes_host: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
214
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
215
|
+
pem_keys: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
|
216
|
+
use_annotations_as_alias_metadata: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
218
217
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendConfigResult]:
|
219
218
|
"""
|
220
219
|
Reads the Role of an Kubernetes from a Vault server. See the [Vault
|
@@ -222,19 +221,19 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[built
|
|
222
221
|
information.
|
223
222
|
|
224
223
|
|
225
|
-
:param
|
224
|
+
:param _builtins.str backend: The unique name for the Kubernetes backend the config to
|
226
225
|
retrieve Role attributes for resides in. Defaults to "kubernetes".
|
227
|
-
:param
|
228
|
-
:param
|
229
|
-
:param
|
230
|
-
:param
|
231
|
-
:param
|
232
|
-
:param
|
226
|
+
:param _builtins.bool disable_iss_validation: (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
227
|
+
:param _builtins.bool disable_local_ca_jwt: (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
228
|
+
:param _builtins.str issuer: Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
229
|
+
:param _builtins.str kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
230
|
+
:param _builtins.str kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
231
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
233
232
|
The value should not contain leading or trailing forward slashes.
|
234
233
|
The `namespace` is always relative to the provider's configured namespace.
|
235
234
|
*Available only for Vault Enterprise*.
|
236
|
-
:param Sequence[
|
237
|
-
:param
|
235
|
+
:param Sequence[_builtins.str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
236
|
+
:param _builtins.bool use_annotations_as_alias_metadata: (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
238
237
|
"""
|
239
238
|
__args__ = dict()
|
240
239
|
__args__['backend'] = backend
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -80,64 +79,64 @@ class GetAuthBackendRoleResult:
|
|
80
79
|
raise TypeError("Expected argument 'token_type' to be a str")
|
81
80
|
pulumi.set(__self__, "token_type", token_type)
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter(name="aliasNameSource")
|
85
|
-
def alias_name_source(self) ->
|
84
|
+
def alias_name_source(self) -> _builtins.str:
|
86
85
|
"""
|
87
86
|
Method used for generating identity aliases. (vault-1.9+)
|
88
87
|
"""
|
89
88
|
return pulumi.get(self, "alias_name_source")
|
90
89
|
|
91
|
-
@property
|
90
|
+
@_builtins.property
|
92
91
|
@pulumi.getter
|
93
|
-
def audience(self) -> Optional[
|
92
|
+
def audience(self) -> Optional[_builtins.str]:
|
94
93
|
"""
|
95
94
|
Audience claim to verify in the JWT.
|
96
95
|
"""
|
97
96
|
return pulumi.get(self, "audience")
|
98
97
|
|
99
|
-
@property
|
98
|
+
@_builtins.property
|
100
99
|
@pulumi.getter
|
101
|
-
def backend(self) -> Optional[
|
100
|
+
def backend(self) -> Optional[_builtins.str]:
|
102
101
|
return pulumi.get(self, "backend")
|
103
102
|
|
104
|
-
@property
|
103
|
+
@_builtins.property
|
105
104
|
@pulumi.getter(name="boundServiceAccountNames")
|
106
|
-
def bound_service_account_names(self) -> Sequence[
|
105
|
+
def bound_service_account_names(self) -> Sequence[_builtins.str]:
|
107
106
|
"""
|
108
107
|
List of service account names able to access this role. If set to "*" all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
109
108
|
"""
|
110
109
|
return pulumi.get(self, "bound_service_account_names")
|
111
110
|
|
112
|
-
@property
|
111
|
+
@_builtins.property
|
113
112
|
@pulumi.getter(name="boundServiceAccountNamespaces")
|
114
|
-
def bound_service_account_namespaces(self) -> Sequence[
|
113
|
+
def bound_service_account_namespaces(self) -> Sequence[_builtins.str]:
|
115
114
|
"""
|
116
115
|
List of namespaces allowed to access this role. If set to "*" all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
117
116
|
"""
|
118
117
|
return pulumi.get(self, "bound_service_account_namespaces")
|
119
118
|
|
120
|
-
@property
|
119
|
+
@_builtins.property
|
121
120
|
@pulumi.getter
|
122
|
-
def id(self) ->
|
121
|
+
def id(self) -> _builtins.str:
|
123
122
|
"""
|
124
123
|
The provider-assigned unique ID for this managed resource.
|
125
124
|
"""
|
126
125
|
return pulumi.get(self, "id")
|
127
126
|
|
128
|
-
@property
|
127
|
+
@_builtins.property
|
129
128
|
@pulumi.getter
|
130
|
-
def namespace(self) -> Optional[
|
129
|
+
def namespace(self) -> Optional[_builtins.str]:
|
131
130
|
return pulumi.get(self, "namespace")
|
132
131
|
|
133
|
-
@property
|
132
|
+
@_builtins.property
|
134
133
|
@pulumi.getter(name="roleName")
|
135
|
-
def role_name(self) ->
|
134
|
+
def role_name(self) -> _builtins.str:
|
136
135
|
return pulumi.get(self, "role_name")
|
137
136
|
|
138
|
-
@property
|
137
|
+
@_builtins.property
|
139
138
|
@pulumi.getter(name="tokenBoundCidrs")
|
140
|
-
def token_bound_cidrs(self) -> Optional[Sequence[
|
139
|
+
def token_bound_cidrs(self) -> Optional[Sequence[_builtins.str]]:
|
141
140
|
"""
|
142
141
|
List of CIDR blocks; if set, specifies blocks of IP
|
143
142
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
@@ -145,9 +144,9 @@ class GetAuthBackendRoleResult:
|
|
145
144
|
"""
|
146
145
|
return pulumi.get(self, "token_bound_cidrs")
|
147
146
|
|
148
|
-
@property
|
147
|
+
@_builtins.property
|
149
148
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
150
|
-
def token_explicit_max_ttl(self) -> Optional[
|
149
|
+
def token_explicit_max_ttl(self) -> Optional[_builtins.int]:
|
151
150
|
"""
|
152
151
|
If set, will encode an
|
153
152
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
@@ -156,27 +155,27 @@ class GetAuthBackendRoleResult:
|
|
156
155
|
"""
|
157
156
|
return pulumi.get(self, "token_explicit_max_ttl")
|
158
157
|
|
159
|
-
@property
|
158
|
+
@_builtins.property
|
160
159
|
@pulumi.getter(name="tokenMaxTtl")
|
161
|
-
def token_max_ttl(self) -> Optional[
|
160
|
+
def token_max_ttl(self) -> Optional[_builtins.int]:
|
162
161
|
"""
|
163
162
|
The maximum lifetime for generated tokens in number of seconds.
|
164
163
|
Its current value will be referenced at renewal time.
|
165
164
|
"""
|
166
165
|
return pulumi.get(self, "token_max_ttl")
|
167
166
|
|
168
|
-
@property
|
167
|
+
@_builtins.property
|
169
168
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
170
|
-
def token_no_default_policy(self) -> Optional[
|
169
|
+
def token_no_default_policy(self) -> Optional[_builtins.bool]:
|
171
170
|
"""
|
172
171
|
If set, the default policy will not be set on
|
173
172
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
174
173
|
"""
|
175
174
|
return pulumi.get(self, "token_no_default_policy")
|
176
175
|
|
177
|
-
@property
|
176
|
+
@_builtins.property
|
178
177
|
@pulumi.getter(name="tokenNumUses")
|
179
|
-
def token_num_uses(self) -> Optional[
|
178
|
+
def token_num_uses(self) -> Optional[_builtins.int]:
|
180
179
|
"""
|
181
180
|
The
|
182
181
|
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
@@ -184,9 +183,9 @@ class GetAuthBackendRoleResult:
|
|
184
183
|
"""
|
185
184
|
return pulumi.get(self, "token_num_uses")
|
186
185
|
|
187
|
-
@property
|
186
|
+
@_builtins.property
|
188
187
|
@pulumi.getter(name="tokenPeriod")
|
189
|
-
def token_period(self) -> Optional[
|
188
|
+
def token_period(self) -> Optional[_builtins.int]:
|
190
189
|
"""
|
191
190
|
(Optional) If set, indicates that the
|
192
191
|
token generated using this role should never expire. The token should be renewed within the
|
@@ -195,27 +194,27 @@ class GetAuthBackendRoleResult:
|
|
195
194
|
"""
|
196
195
|
return pulumi.get(self, "token_period")
|
197
196
|
|
198
|
-
@property
|
197
|
+
@_builtins.property
|
199
198
|
@pulumi.getter(name="tokenPolicies")
|
200
|
-
def token_policies(self) -> Optional[Sequence[
|
199
|
+
def token_policies(self) -> Optional[Sequence[_builtins.str]]:
|
201
200
|
"""
|
202
201
|
List of policies to encode onto generated tokens. Depending
|
203
202
|
on the auth method, this list may be supplemented by user/group/other values.
|
204
203
|
"""
|
205
204
|
return pulumi.get(self, "token_policies")
|
206
205
|
|
207
|
-
@property
|
206
|
+
@_builtins.property
|
208
207
|
@pulumi.getter(name="tokenTtl")
|
209
|
-
def token_ttl(self) -> Optional[
|
208
|
+
def token_ttl(self) -> Optional[_builtins.int]:
|
210
209
|
"""
|
211
210
|
The incremental lifetime for generated tokens in number of seconds.
|
212
211
|
Its current value will be referenced at renewal time.
|
213
212
|
"""
|
214
213
|
return pulumi.get(self, "token_ttl")
|
215
214
|
|
216
|
-
@property
|
215
|
+
@_builtins.property
|
217
216
|
@pulumi.getter(name="tokenType")
|
218
|
-
def token_type(self) -> Optional[
|
217
|
+
def token_type(self) -> Optional[_builtins.str]:
|
219
218
|
"""
|
220
219
|
The type of token that should be generated. Can be `service`,
|
221
220
|
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
@@ -251,19 +250,19 @@ class AwaitableGetAuthBackendRoleResult(GetAuthBackendRoleResult):
|
|
251
250
|
token_type=self.token_type)
|
252
251
|
|
253
252
|
|
254
|
-
def get_auth_backend_role(audience: Optional[
|
255
|
-
backend: Optional[
|
256
|
-
namespace: Optional[
|
257
|
-
role_name: Optional[
|
258
|
-
token_bound_cidrs: Optional[Sequence[
|
259
|
-
token_explicit_max_ttl: Optional[
|
260
|
-
token_max_ttl: Optional[
|
261
|
-
token_no_default_policy: Optional[
|
262
|
-
token_num_uses: Optional[
|
263
|
-
token_period: Optional[
|
264
|
-
token_policies: Optional[Sequence[
|
265
|
-
token_ttl: Optional[
|
266
|
-
token_type: Optional[
|
253
|
+
def get_auth_backend_role(audience: Optional[_builtins.str] = None,
|
254
|
+
backend: Optional[_builtins.str] = None,
|
255
|
+
namespace: Optional[_builtins.str] = None,
|
256
|
+
role_name: Optional[_builtins.str] = None,
|
257
|
+
token_bound_cidrs: Optional[Sequence[_builtins.str]] = None,
|
258
|
+
token_explicit_max_ttl: Optional[_builtins.int] = None,
|
259
|
+
token_max_ttl: Optional[_builtins.int] = None,
|
260
|
+
token_no_default_policy: Optional[_builtins.bool] = None,
|
261
|
+
token_num_uses: Optional[_builtins.int] = None,
|
262
|
+
token_period: Optional[_builtins.int] = None,
|
263
|
+
token_policies: Optional[Sequence[_builtins.str]] = None,
|
264
|
+
token_ttl: Optional[_builtins.int] = None,
|
265
|
+
token_type: Optional[_builtins.str] = None,
|
267
266
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendRoleResult:
|
268
267
|
"""
|
269
268
|
Reads the Role of an Kubernetes from a Vault server. See the [Vault
|
@@ -271,37 +270,37 @@ def get_auth_backend_role(audience: Optional[builtins.str] = None,
|
|
271
270
|
information.
|
272
271
|
|
273
272
|
|
274
|
-
:param
|
275
|
-
:param
|
273
|
+
:param _builtins.str audience: Audience claim to verify in the JWT.
|
274
|
+
:param _builtins.str backend: The unique name for the Kubernetes backend the role to
|
276
275
|
retrieve Role attributes for resides in. Defaults to "kubernetes".
|
277
|
-
:param
|
276
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
278
277
|
The value should not contain leading or trailing forward slashes.
|
279
278
|
The `namespace` is always relative to the provider's configured namespace.
|
280
279
|
*Available only for Vault Enterprise*.
|
281
|
-
:param
|
282
|
-
:param Sequence[
|
280
|
+
:param _builtins.str role_name: The name of the role to retrieve the Role attributes for.
|
281
|
+
:param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
283
282
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
284
283
|
as well.
|
285
|
-
:param
|
284
|
+
:param _builtins.int token_explicit_max_ttl: If set, will encode an
|
286
285
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
287
286
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
288
287
|
`token_max_ttl` would otherwise allow a renewal.
|
289
|
-
:param
|
288
|
+
:param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
290
289
|
Its current value will be referenced at renewal time.
|
291
|
-
:param
|
290
|
+
:param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
|
292
291
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
293
|
-
:param
|
292
|
+
:param _builtins.int token_num_uses: The
|
294
293
|
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
295
294
|
if any, in number of seconds to set on the token.
|
296
|
-
:param
|
295
|
+
:param _builtins.int token_period: (Optional) If set, indicates that the
|
297
296
|
token generated using this role should never expire. The token should be renewed within the
|
298
297
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
299
298
|
value of this field. Specified in seconds.
|
300
|
-
:param Sequence[
|
299
|
+
:param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
|
301
300
|
on the auth method, this list may be supplemented by user/group/other values.
|
302
|
-
:param
|
301
|
+
:param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
303
302
|
Its current value will be referenced at renewal time.
|
304
|
-
:param
|
303
|
+
:param _builtins.str token_type: The type of token that should be generated. Can be `service`,
|
305
304
|
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
306
305
|
`service` tokens). For token store roles, there are two additional possibilities:
|
307
306
|
`default-service` and `default-batch` which specify the type to return unless the client
|
@@ -342,19 +341,19 @@ def get_auth_backend_role(audience: Optional[builtins.str] = None,
|
|
342
341
|
token_policies=pulumi.get(__ret__, 'token_policies'),
|
343
342
|
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
344
343
|
token_type=pulumi.get(__ret__, 'token_type'))
|
345
|
-
def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[
|
346
|
-
backend: Optional[pulumi.Input[Optional[
|
347
|
-
namespace: Optional[pulumi.Input[Optional[
|
348
|
-
role_name: Optional[pulumi.Input[
|
349
|
-
token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[
|
350
|
-
token_explicit_max_ttl: Optional[pulumi.Input[Optional[
|
351
|
-
token_max_ttl: Optional[pulumi.Input[Optional[
|
352
|
-
token_no_default_policy: Optional[pulumi.Input[Optional[
|
353
|
-
token_num_uses: Optional[pulumi.Input[Optional[
|
354
|
-
token_period: Optional[pulumi.Input[Optional[
|
355
|
-
token_policies: Optional[pulumi.Input[Optional[Sequence[
|
356
|
-
token_ttl: Optional[pulumi.Input[Optional[
|
357
|
-
token_type: Optional[pulumi.Input[Optional[
|
344
|
+
def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
345
|
+
backend: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
346
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
347
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
348
|
+
token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
|
349
|
+
token_explicit_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
350
|
+
token_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
351
|
+
token_no_default_policy: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
352
|
+
token_num_uses: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
353
|
+
token_period: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
354
|
+
token_policies: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
|
355
|
+
token_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
356
|
+
token_type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
358
357
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleResult]:
|
359
358
|
"""
|
360
359
|
Reads the Role of an Kubernetes from a Vault server. See the [Vault
|
@@ -362,37 +361,37 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[builti
|
|
362
361
|
information.
|
363
362
|
|
364
363
|
|
365
|
-
:param
|
366
|
-
:param
|
364
|
+
:param _builtins.str audience: Audience claim to verify in the JWT.
|
365
|
+
:param _builtins.str backend: The unique name for the Kubernetes backend the role to
|
367
366
|
retrieve Role attributes for resides in. Defaults to "kubernetes".
|
368
|
-
:param
|
367
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
369
368
|
The value should not contain leading or trailing forward slashes.
|
370
369
|
The `namespace` is always relative to the provider's configured namespace.
|
371
370
|
*Available only for Vault Enterprise*.
|
372
|
-
:param
|
373
|
-
:param Sequence[
|
371
|
+
:param _builtins.str role_name: The name of the role to retrieve the Role attributes for.
|
372
|
+
:param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
374
373
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
375
374
|
as well.
|
376
|
-
:param
|
375
|
+
:param _builtins.int token_explicit_max_ttl: If set, will encode an
|
377
376
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
378
377
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
379
378
|
`token_max_ttl` would otherwise allow a renewal.
|
380
|
-
:param
|
379
|
+
:param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
381
380
|
Its current value will be referenced at renewal time.
|
382
|
-
:param
|
381
|
+
:param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
|
383
382
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
384
|
-
:param
|
383
|
+
:param _builtins.int token_num_uses: The
|
385
384
|
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
386
385
|
if any, in number of seconds to set on the token.
|
387
|
-
:param
|
386
|
+
:param _builtins.int token_period: (Optional) If set, indicates that the
|
388
387
|
token generated using this role should never expire. The token should be renewed within the
|
389
388
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
390
389
|
value of this field. Specified in seconds.
|
391
|
-
:param Sequence[
|
390
|
+
:param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
|
392
391
|
on the auth method, this list may be supplemented by user/group/other values.
|
393
|
-
:param
|
392
|
+
:param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
394
393
|
Its current value will be referenced at renewal time.
|
395
|
-
:param
|
394
|
+
:param _builtins.str token_type: The type of token that should be generated. Can be `service`,
|
396
395
|
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
397
396
|
`service` tokens). For token store roles, there are two additional possibilities:
|
398
397
|
`default-service` and `default-batch` which specify the type to return unless the client
|