pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -68,90 +67,90 @@ class GetServiceAccountTokenResult:
|
|
68
67
|
raise TypeError("Expected argument 'ttl' to be a str")
|
69
68
|
pulumi.set(__self__, "ttl", ttl)
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter
|
73
|
-
def backend(self) ->
|
72
|
+
def backend(self) -> _builtins.str:
|
74
73
|
return pulumi.get(self, "backend")
|
75
74
|
|
76
|
-
@property
|
75
|
+
@_builtins.property
|
77
76
|
@pulumi.getter(name="clusterRoleBinding")
|
78
|
-
def cluster_role_binding(self) -> Optional[
|
77
|
+
def cluster_role_binding(self) -> Optional[_builtins.bool]:
|
79
78
|
return pulumi.get(self, "cluster_role_binding")
|
80
79
|
|
81
|
-
@property
|
80
|
+
@_builtins.property
|
82
81
|
@pulumi.getter
|
83
|
-
def id(self) ->
|
82
|
+
def id(self) -> _builtins.str:
|
84
83
|
"""
|
85
84
|
The provider-assigned unique ID for this managed resource.
|
86
85
|
"""
|
87
86
|
return pulumi.get(self, "id")
|
88
87
|
|
89
|
-
@property
|
88
|
+
@_builtins.property
|
90
89
|
@pulumi.getter(name="kubernetesNamespace")
|
91
|
-
def kubernetes_namespace(self) ->
|
90
|
+
def kubernetes_namespace(self) -> _builtins.str:
|
92
91
|
return pulumi.get(self, "kubernetes_namespace")
|
93
92
|
|
94
|
-
@property
|
93
|
+
@_builtins.property
|
95
94
|
@pulumi.getter(name="leaseDuration")
|
96
|
-
def lease_duration(self) ->
|
95
|
+
def lease_duration(self) -> _builtins.int:
|
97
96
|
"""
|
98
97
|
The duration of the lease in seconds.
|
99
98
|
"""
|
100
99
|
return pulumi.get(self, "lease_duration")
|
101
100
|
|
102
|
-
@property
|
101
|
+
@_builtins.property
|
103
102
|
@pulumi.getter(name="leaseId")
|
104
|
-
def lease_id(self) ->
|
103
|
+
def lease_id(self) -> _builtins.str:
|
105
104
|
"""
|
106
105
|
The lease identifier assigned by Vault.
|
107
106
|
"""
|
108
107
|
return pulumi.get(self, "lease_id")
|
109
108
|
|
110
|
-
@property
|
109
|
+
@_builtins.property
|
111
110
|
@pulumi.getter(name="leaseRenewable")
|
112
|
-
def lease_renewable(self) ->
|
111
|
+
def lease_renewable(self) -> _builtins.bool:
|
113
112
|
"""
|
114
113
|
True if the duration of this lease can be extended through renewal.
|
115
114
|
"""
|
116
115
|
return pulumi.get(self, "lease_renewable")
|
117
116
|
|
118
|
-
@property
|
117
|
+
@_builtins.property
|
119
118
|
@pulumi.getter
|
120
|
-
def namespace(self) -> Optional[
|
119
|
+
def namespace(self) -> Optional[_builtins.str]:
|
121
120
|
return pulumi.get(self, "namespace")
|
122
121
|
|
123
|
-
@property
|
122
|
+
@_builtins.property
|
124
123
|
@pulumi.getter
|
125
|
-
def role(self) ->
|
124
|
+
def role(self) -> _builtins.str:
|
126
125
|
return pulumi.get(self, "role")
|
127
126
|
|
128
|
-
@property
|
127
|
+
@_builtins.property
|
129
128
|
@pulumi.getter(name="serviceAccountName")
|
130
|
-
def service_account_name(self) ->
|
129
|
+
def service_account_name(self) -> _builtins.str:
|
131
130
|
"""
|
132
131
|
The name of the service account associated with the token.
|
133
132
|
"""
|
134
133
|
return pulumi.get(self, "service_account_name")
|
135
134
|
|
136
|
-
@property
|
135
|
+
@_builtins.property
|
137
136
|
@pulumi.getter(name="serviceAccountNamespace")
|
138
|
-
def service_account_namespace(self) ->
|
137
|
+
def service_account_namespace(self) -> _builtins.str:
|
139
138
|
"""
|
140
139
|
The Kubernetes namespace that the service account resides in.
|
141
140
|
"""
|
142
141
|
return pulumi.get(self, "service_account_namespace")
|
143
142
|
|
144
|
-
@property
|
143
|
+
@_builtins.property
|
145
144
|
@pulumi.getter(name="serviceAccountToken")
|
146
|
-
def service_account_token(self) ->
|
145
|
+
def service_account_token(self) -> _builtins.str:
|
147
146
|
"""
|
148
147
|
The Kubernetes service account token.
|
149
148
|
"""
|
150
149
|
return pulumi.get(self, "service_account_token")
|
151
150
|
|
152
|
-
@property
|
151
|
+
@_builtins.property
|
153
152
|
@pulumi.getter
|
154
|
-
def ttl(self) -> Optional[
|
153
|
+
def ttl(self) -> Optional[_builtins.str]:
|
155
154
|
return pulumi.get(self, "ttl")
|
156
155
|
|
157
156
|
|
@@ -176,12 +175,12 @@ class AwaitableGetServiceAccountTokenResult(GetServiceAccountTokenResult):
|
|
176
175
|
ttl=self.ttl)
|
177
176
|
|
178
177
|
|
179
|
-
def get_service_account_token(backend: Optional[
|
180
|
-
cluster_role_binding: Optional[
|
181
|
-
kubernetes_namespace: Optional[
|
182
|
-
namespace: Optional[
|
183
|
-
role: Optional[
|
184
|
-
ttl: Optional[
|
178
|
+
def get_service_account_token(backend: Optional[_builtins.str] = None,
|
179
|
+
cluster_role_binding: Optional[_builtins.bool] = None,
|
180
|
+
kubernetes_namespace: Optional[_builtins.str] = None,
|
181
|
+
namespace: Optional[_builtins.str] = None,
|
182
|
+
role: Optional[_builtins.str] = None,
|
183
|
+
ttl: Optional[_builtins.str] = None,
|
185
184
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetServiceAccountTokenResult:
|
186
185
|
"""
|
187
186
|
## Example Usage
|
@@ -221,19 +220,19 @@ def get_service_account_token(backend: Optional[builtins.str] = None,
|
|
221
220
|
```
|
222
221
|
|
223
222
|
|
224
|
-
:param
|
223
|
+
:param _builtins.str backend: The Kubernetes secret backend to generate service account
|
225
224
|
tokens from.
|
226
|
-
:param
|
225
|
+
:param _builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
|
227
226
|
permissions across the whole cluster instead of within a namespace.
|
228
|
-
:param
|
227
|
+
:param _builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
|
229
228
|
generate the credentials.
|
230
|
-
:param
|
229
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
231
230
|
The value should not contain leading or trailing forward slashes.
|
232
231
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
233
232
|
*Available only for Vault Enterprise*.
|
234
|
-
:param
|
233
|
+
:param _builtins.str role: The name of the Kubernetes secret backend role to generate service
|
235
234
|
account tokens from.
|
236
|
-
:param
|
235
|
+
:param _builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
|
237
236
|
seconds or as a Go duration format string.
|
238
237
|
"""
|
239
238
|
__args__ = dict()
|
@@ -260,12 +259,12 @@ def get_service_account_token(backend: Optional[builtins.str] = None,
|
|
260
259
|
service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
|
261
260
|
service_account_token=pulumi.get(__ret__, 'service_account_token'),
|
262
261
|
ttl=pulumi.get(__ret__, 'ttl'))
|
263
|
-
def get_service_account_token_output(backend: Optional[pulumi.Input[
|
264
|
-
cluster_role_binding: Optional[pulumi.Input[Optional[
|
265
|
-
kubernetes_namespace: Optional[pulumi.Input[
|
266
|
-
namespace: Optional[pulumi.Input[Optional[
|
267
|
-
role: Optional[pulumi.Input[
|
268
|
-
ttl: Optional[pulumi.Input[Optional[
|
262
|
+
def get_service_account_token_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
263
|
+
cluster_role_binding: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
264
|
+
kubernetes_namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
265
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
266
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
267
|
+
ttl: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
269
268
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetServiceAccountTokenResult]:
|
270
269
|
"""
|
271
270
|
## Example Usage
|
@@ -305,19 +304,19 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[builtins.str
|
|
305
304
|
```
|
306
305
|
|
307
306
|
|
308
|
-
:param
|
307
|
+
:param _builtins.str backend: The Kubernetes secret backend to generate service account
|
309
308
|
tokens from.
|
310
|
-
:param
|
309
|
+
:param _builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
|
311
310
|
permissions across the whole cluster instead of within a namespace.
|
312
|
-
:param
|
311
|
+
:param _builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
|
313
312
|
generate the credentials.
|
314
|
-
:param
|
313
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
315
314
|
The value should not contain leading or trailing forward slashes.
|
316
315
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
317
316
|
*Available only for Vault Enterprise*.
|
318
|
-
:param
|
317
|
+
:param _builtins.str role: The name of the Kubernetes secret backend role to generate service
|
319
318
|
account tokens from.
|
320
|
-
:param
|
319
|
+
:param _builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
|
321
320
|
seconds or as a Go duration format string.
|
322
321
|
"""
|
323
322
|
__args__ = dict()
|