pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,59 +19,59 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
backend: pulumi.Input[
|
24
|
-
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[
|
25
|
-
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
27
|
-
extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
28
|
-
generated_role_rules: Optional[pulumi.Input[
|
29
|
-
kubernetes_role_name: Optional[pulumi.Input[
|
30
|
-
kubernetes_role_type: Optional[pulumi.Input[
|
31
|
-
name: Optional[pulumi.Input[
|
32
|
-
name_template: Optional[pulumi.Input[
|
33
|
-
namespace: Optional[pulumi.Input[
|
34
|
-
service_account_name: Optional[pulumi.Input[
|
35
|
-
token_default_ttl: Optional[pulumi.Input[
|
36
|
-
token_max_ttl: Optional[pulumi.Input[
|
22
|
+
backend: pulumi.Input[_builtins.str],
|
23
|
+
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
generated_role_rules: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
kubernetes_role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
kubernetes_role_type: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
33
|
+
service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
token_default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
35
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
37
36
|
"""
|
38
37
|
The set of arguments for constructing a SecretBackendRole resource.
|
39
|
-
:param pulumi.Input[
|
38
|
+
:param pulumi.Input[_builtins.str] backend: The path of the Kubernetes Secrets Engine backend mount to create
|
40
39
|
the role in.
|
41
|
-
:param pulumi.Input[
|
40
|
+
:param pulumi.Input[_builtins.str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
|
42
41
|
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
43
42
|
of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
|
44
43
|
If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
|
45
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
44
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
|
46
45
|
can generate credentials for. If set to `*` all namespaces are allowed. If set with
|
47
46
|
`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
|
48
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
47
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_annotations: Additional annotations to apply to all generated
|
49
48
|
Kubernetes objects.
|
50
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
49
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_labels: Additional labels to apply to all generated Kubernetes
|
51
50
|
objects.
|
52
51
|
|
53
52
|
This resource also directly accepts all Mount fields.
|
54
|
-
:param pulumi.Input[
|
53
|
+
:param pulumi.Input[_builtins.str] generated_role_rules: The Role or ClusterRole rules to use when generating
|
55
54
|
a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
|
56
55
|
and `kubernetes_role_name`. If set, the entire chain of Kubernetes objects will be generated
|
57
56
|
when credentials are requested.
|
58
|
-
:param pulumi.Input[
|
57
|
+
:param pulumi.Input[_builtins.str] kubernetes_role_name: The pre-existing Role or ClusterRole to bind a
|
59
58
|
generated service account to. Mutually exclusive with `service_account_name` and
|
60
59
|
`generated_role_rules`. If set, Kubernetes token, service account, and role
|
61
60
|
binding objects will be created when credentials are requested.
|
62
|
-
:param pulumi.Input[
|
61
|
+
:param pulumi.Input[_builtins.str] kubernetes_role_type: Specifies whether the Kubernetes role is a Role or
|
63
62
|
ClusterRole.
|
64
|
-
:param pulumi.Input[
|
65
|
-
:param pulumi.Input[
|
63
|
+
:param pulumi.Input[_builtins.str] name: The name of the role.
|
64
|
+
:param pulumi.Input[_builtins.str] name_template: The name template to use when generating service accounts,
|
66
65
|
roles and role bindings. If unset, a default template is used.
|
67
|
-
:param pulumi.Input[
|
66
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
68
67
|
The value should not contain leading or trailing forward slashes.
|
69
68
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
70
69
|
*Available only for Vault Enterprise*.
|
71
|
-
:param pulumi.Input[
|
70
|
+
:param pulumi.Input[_builtins.str] service_account_name: The pre-existing service account to generate tokens for.
|
72
71
|
Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
|
73
72
|
Kubernetes token will be created when credentials are requested.
|
74
|
-
:param pulumi.Input[
|
75
|
-
:param pulumi.Input[
|
73
|
+
:param pulumi.Input[_builtins.int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
|
74
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
|
76
75
|
"""
|
77
76
|
pulumi.set(__self__, "backend", backend)
|
78
77
|
if allowed_kubernetes_namespace_selector is not None:
|
@@ -102,9 +101,9 @@ class SecretBackendRoleArgs:
|
|
102
101
|
if token_max_ttl is not None:
|
103
102
|
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
104
103
|
|
105
|
-
@property
|
104
|
+
@_builtins.property
|
106
105
|
@pulumi.getter
|
107
|
-
def backend(self) -> pulumi.Input[
|
106
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
108
107
|
"""
|
109
108
|
The path of the Kubernetes Secrets Engine backend mount to create
|
110
109
|
the role in.
|
@@ -112,12 +111,12 @@ class SecretBackendRoleArgs:
|
|
112
111
|
return pulumi.get(self, "backend")
|
113
112
|
|
114
113
|
@backend.setter
|
115
|
-
def backend(self, value: pulumi.Input[
|
114
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
116
115
|
pulumi.set(self, "backend", value)
|
117
116
|
|
118
|
-
@property
|
117
|
+
@_builtins.property
|
119
118
|
@pulumi.getter(name="allowedKubernetesNamespaceSelector")
|
120
|
-
def allowed_kubernetes_namespace_selector(self) -> Optional[pulumi.Input[
|
119
|
+
def allowed_kubernetes_namespace_selector(self) -> Optional[pulumi.Input[_builtins.str]]:
|
121
120
|
"""
|
122
121
|
A label selector for Kubernetes namespaces
|
123
122
|
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
@@ -127,12 +126,12 @@ class SecretBackendRoleArgs:
|
|
127
126
|
return pulumi.get(self, "allowed_kubernetes_namespace_selector")
|
128
127
|
|
129
128
|
@allowed_kubernetes_namespace_selector.setter
|
130
|
-
def allowed_kubernetes_namespace_selector(self, value: Optional[pulumi.Input[
|
129
|
+
def allowed_kubernetes_namespace_selector(self, value: Optional[pulumi.Input[_builtins.str]]):
|
131
130
|
pulumi.set(self, "allowed_kubernetes_namespace_selector", value)
|
132
131
|
|
133
|
-
@property
|
132
|
+
@_builtins.property
|
134
133
|
@pulumi.getter(name="allowedKubernetesNamespaces")
|
135
|
-
def allowed_kubernetes_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
134
|
+
def allowed_kubernetes_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
136
135
|
"""
|
137
136
|
The list of Kubernetes namespaces this role
|
138
137
|
can generate credentials for. If set to `*` all namespaces are allowed. If set with
|
@@ -141,12 +140,12 @@ class SecretBackendRoleArgs:
|
|
141
140
|
return pulumi.get(self, "allowed_kubernetes_namespaces")
|
142
141
|
|
143
142
|
@allowed_kubernetes_namespaces.setter
|
144
|
-
def allowed_kubernetes_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
143
|
+
def allowed_kubernetes_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
145
144
|
pulumi.set(self, "allowed_kubernetes_namespaces", value)
|
146
145
|
|
147
|
-
@property
|
146
|
+
@_builtins.property
|
148
147
|
@pulumi.getter(name="extraAnnotations")
|
149
|
-
def extra_annotations(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
148
|
+
def extra_annotations(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
150
149
|
"""
|
151
150
|
Additional annotations to apply to all generated
|
152
151
|
Kubernetes objects.
|
@@ -154,12 +153,12 @@ class SecretBackendRoleArgs:
|
|
154
153
|
return pulumi.get(self, "extra_annotations")
|
155
154
|
|
156
155
|
@extra_annotations.setter
|
157
|
-
def extra_annotations(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
156
|
+
def extra_annotations(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
158
157
|
pulumi.set(self, "extra_annotations", value)
|
159
158
|
|
160
|
-
@property
|
159
|
+
@_builtins.property
|
161
160
|
@pulumi.getter(name="extraLabels")
|
162
|
-
def extra_labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
161
|
+
def extra_labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
163
162
|
"""
|
164
163
|
Additional labels to apply to all generated Kubernetes
|
165
164
|
objects.
|
@@ -169,12 +168,12 @@ class SecretBackendRoleArgs:
|
|
169
168
|
return pulumi.get(self, "extra_labels")
|
170
169
|
|
171
170
|
@extra_labels.setter
|
172
|
-
def extra_labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
171
|
+
def extra_labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
173
172
|
pulumi.set(self, "extra_labels", value)
|
174
173
|
|
175
|
-
@property
|
174
|
+
@_builtins.property
|
176
175
|
@pulumi.getter(name="generatedRoleRules")
|
177
|
-
def generated_role_rules(self) -> Optional[pulumi.Input[
|
176
|
+
def generated_role_rules(self) -> Optional[pulumi.Input[_builtins.str]]:
|
178
177
|
"""
|
179
178
|
The Role or ClusterRole rules to use when generating
|
180
179
|
a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
|
@@ -184,12 +183,12 @@ class SecretBackendRoleArgs:
|
|
184
183
|
return pulumi.get(self, "generated_role_rules")
|
185
184
|
|
186
185
|
@generated_role_rules.setter
|
187
|
-
def generated_role_rules(self, value: Optional[pulumi.Input[
|
186
|
+
def generated_role_rules(self, value: Optional[pulumi.Input[_builtins.str]]):
|
188
187
|
pulumi.set(self, "generated_role_rules", value)
|
189
188
|
|
190
|
-
@property
|
189
|
+
@_builtins.property
|
191
190
|
@pulumi.getter(name="kubernetesRoleName")
|
192
|
-
def kubernetes_role_name(self) -> Optional[pulumi.Input[
|
191
|
+
def kubernetes_role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
193
192
|
"""
|
194
193
|
The pre-existing Role or ClusterRole to bind a
|
195
194
|
generated service account to. Mutually exclusive with `service_account_name` and
|
@@ -199,12 +198,12 @@ class SecretBackendRoleArgs:
|
|
199
198
|
return pulumi.get(self, "kubernetes_role_name")
|
200
199
|
|
201
200
|
@kubernetes_role_name.setter
|
202
|
-
def kubernetes_role_name(self, value: Optional[pulumi.Input[
|
201
|
+
def kubernetes_role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
203
202
|
pulumi.set(self, "kubernetes_role_name", value)
|
204
203
|
|
205
|
-
@property
|
204
|
+
@_builtins.property
|
206
205
|
@pulumi.getter(name="kubernetesRoleType")
|
207
|
-
def kubernetes_role_type(self) -> Optional[pulumi.Input[
|
206
|
+
def kubernetes_role_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
208
207
|
"""
|
209
208
|
Specifies whether the Kubernetes role is a Role or
|
210
209
|
ClusterRole.
|
@@ -212,24 +211,24 @@ class SecretBackendRoleArgs:
|
|
212
211
|
return pulumi.get(self, "kubernetes_role_type")
|
213
212
|
|
214
213
|
@kubernetes_role_type.setter
|
215
|
-
def kubernetes_role_type(self, value: Optional[pulumi.Input[
|
214
|
+
def kubernetes_role_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
216
215
|
pulumi.set(self, "kubernetes_role_type", value)
|
217
216
|
|
218
|
-
@property
|
217
|
+
@_builtins.property
|
219
218
|
@pulumi.getter
|
220
|
-
def name(self) -> Optional[pulumi.Input[
|
219
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
221
220
|
"""
|
222
221
|
The name of the role.
|
223
222
|
"""
|
224
223
|
return pulumi.get(self, "name")
|
225
224
|
|
226
225
|
@name.setter
|
227
|
-
def name(self, value: Optional[pulumi.Input[
|
226
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
228
227
|
pulumi.set(self, "name", value)
|
229
228
|
|
230
|
-
@property
|
229
|
+
@_builtins.property
|
231
230
|
@pulumi.getter(name="nameTemplate")
|
232
|
-
def name_template(self) -> Optional[pulumi.Input[
|
231
|
+
def name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
233
232
|
"""
|
234
233
|
The name template to use when generating service accounts,
|
235
234
|
roles and role bindings. If unset, a default template is used.
|
@@ -237,12 +236,12 @@ class SecretBackendRoleArgs:
|
|
237
236
|
return pulumi.get(self, "name_template")
|
238
237
|
|
239
238
|
@name_template.setter
|
240
|
-
def name_template(self, value: Optional[pulumi.Input[
|
239
|
+
def name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
241
240
|
pulumi.set(self, "name_template", value)
|
242
241
|
|
243
|
-
@property
|
242
|
+
@_builtins.property
|
244
243
|
@pulumi.getter
|
245
|
-
def namespace(self) -> Optional[pulumi.Input[
|
244
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
246
245
|
"""
|
247
246
|
The namespace to provision the resource in.
|
248
247
|
The value should not contain leading or trailing forward slashes.
|
@@ -252,12 +251,12 @@ class SecretBackendRoleArgs:
|
|
252
251
|
return pulumi.get(self, "namespace")
|
253
252
|
|
254
253
|
@namespace.setter
|
255
|
-
def namespace(self, value: Optional[pulumi.Input[
|
254
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
256
255
|
pulumi.set(self, "namespace", value)
|
257
256
|
|
258
|
-
@property
|
257
|
+
@_builtins.property
|
259
258
|
@pulumi.getter(name="serviceAccountName")
|
260
|
-
def service_account_name(self) -> Optional[pulumi.Input[
|
259
|
+
def service_account_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
261
260
|
"""
|
262
261
|
The pre-existing service account to generate tokens for.
|
263
262
|
Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
|
@@ -266,90 +265,90 @@ class SecretBackendRoleArgs:
|
|
266
265
|
return pulumi.get(self, "service_account_name")
|
267
266
|
|
268
267
|
@service_account_name.setter
|
269
|
-
def service_account_name(self, value: Optional[pulumi.Input[
|
268
|
+
def service_account_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
270
269
|
pulumi.set(self, "service_account_name", value)
|
271
270
|
|
272
|
-
@property
|
271
|
+
@_builtins.property
|
273
272
|
@pulumi.getter(name="tokenDefaultTtl")
|
274
|
-
def token_default_ttl(self) -> Optional[pulumi.Input[
|
273
|
+
def token_default_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
275
274
|
"""
|
276
275
|
The default TTL for generated Kubernetes tokens in seconds.
|
277
276
|
"""
|
278
277
|
return pulumi.get(self, "token_default_ttl")
|
279
278
|
|
280
279
|
@token_default_ttl.setter
|
281
|
-
def token_default_ttl(self, value: Optional[pulumi.Input[
|
280
|
+
def token_default_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
282
281
|
pulumi.set(self, "token_default_ttl", value)
|
283
282
|
|
284
|
-
@property
|
283
|
+
@_builtins.property
|
285
284
|
@pulumi.getter(name="tokenMaxTtl")
|
286
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
285
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
287
286
|
"""
|
288
287
|
The maximum TTL for generated Kubernetes tokens in seconds.
|
289
288
|
"""
|
290
289
|
return pulumi.get(self, "token_max_ttl")
|
291
290
|
|
292
291
|
@token_max_ttl.setter
|
293
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
292
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
294
293
|
pulumi.set(self, "token_max_ttl", value)
|
295
294
|
|
296
295
|
|
297
296
|
@pulumi.input_type
|
298
297
|
class _SecretBackendRoleState:
|
299
298
|
def __init__(__self__, *,
|
300
|
-
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[
|
301
|
-
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[
|
302
|
-
backend: Optional[pulumi.Input[
|
303
|
-
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
304
|
-
extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
305
|
-
generated_role_rules: Optional[pulumi.Input[
|
306
|
-
kubernetes_role_name: Optional[pulumi.Input[
|
307
|
-
kubernetes_role_type: Optional[pulumi.Input[
|
308
|
-
name: Optional[pulumi.Input[
|
309
|
-
name_template: Optional[pulumi.Input[
|
310
|
-
namespace: Optional[pulumi.Input[
|
311
|
-
service_account_name: Optional[pulumi.Input[
|
312
|
-
token_default_ttl: Optional[pulumi.Input[
|
313
|
-
token_max_ttl: Optional[pulumi.Input[
|
299
|
+
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
|
300
|
+
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
301
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
302
|
+
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
303
|
+
extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
304
|
+
generated_role_rules: Optional[pulumi.Input[_builtins.str]] = None,
|
305
|
+
kubernetes_role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
306
|
+
kubernetes_role_type: Optional[pulumi.Input[_builtins.str]] = None,
|
307
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
308
|
+
name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
309
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
310
|
+
service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
|
311
|
+
token_default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
312
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
314
313
|
"""
|
315
314
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
316
|
-
:param pulumi.Input[
|
315
|
+
:param pulumi.Input[_builtins.str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
|
317
316
|
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
318
317
|
of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
|
319
318
|
If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
|
320
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
319
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
|
321
320
|
can generate credentials for. If set to `*` all namespaces are allowed. If set with
|
322
321
|
`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
|
323
|
-
:param pulumi.Input[
|
322
|
+
:param pulumi.Input[_builtins.str] backend: The path of the Kubernetes Secrets Engine backend mount to create
|
324
323
|
the role in.
|
325
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
324
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_annotations: Additional annotations to apply to all generated
|
326
325
|
Kubernetes objects.
|
327
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
326
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_labels: Additional labels to apply to all generated Kubernetes
|
328
327
|
objects.
|
329
328
|
|
330
329
|
This resource also directly accepts all Mount fields.
|
331
|
-
:param pulumi.Input[
|
330
|
+
:param pulumi.Input[_builtins.str] generated_role_rules: The Role or ClusterRole rules to use when generating
|
332
331
|
a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
|
333
332
|
and `kubernetes_role_name`. If set, the entire chain of Kubernetes objects will be generated
|
334
333
|
when credentials are requested.
|
335
|
-
:param pulumi.Input[
|
334
|
+
:param pulumi.Input[_builtins.str] kubernetes_role_name: The pre-existing Role or ClusterRole to bind a
|
336
335
|
generated service account to. Mutually exclusive with `service_account_name` and
|
337
336
|
`generated_role_rules`. If set, Kubernetes token, service account, and role
|
338
337
|
binding objects will be created when credentials are requested.
|
339
|
-
:param pulumi.Input[
|
338
|
+
:param pulumi.Input[_builtins.str] kubernetes_role_type: Specifies whether the Kubernetes role is a Role or
|
340
339
|
ClusterRole.
|
341
|
-
:param pulumi.Input[
|
342
|
-
:param pulumi.Input[
|
340
|
+
:param pulumi.Input[_builtins.str] name: The name of the role.
|
341
|
+
:param pulumi.Input[_builtins.str] name_template: The name template to use when generating service accounts,
|
343
342
|
roles and role bindings. If unset, a default template is used.
|
344
|
-
:param pulumi.Input[
|
343
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
345
344
|
The value should not contain leading or trailing forward slashes.
|
346
345
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
347
346
|
*Available only for Vault Enterprise*.
|
348
|
-
:param pulumi.Input[
|
347
|
+
:param pulumi.Input[_builtins.str] service_account_name: The pre-existing service account to generate tokens for.
|
349
348
|
Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
|
350
349
|
Kubernetes token will be created when credentials are requested.
|
351
|
-
:param pulumi.Input[
|
352
|
-
:param pulumi.Input[
|
350
|
+
:param pulumi.Input[_builtins.int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
|
351
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
|
353
352
|
"""
|
354
353
|
if allowed_kubernetes_namespace_selector is not None:
|
355
354
|
pulumi.set(__self__, "allowed_kubernetes_namespace_selector", allowed_kubernetes_namespace_selector)
|
@@ -380,9 +379,9 @@ class _SecretBackendRoleState:
|
|
380
379
|
if token_max_ttl is not None:
|
381
380
|
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
382
381
|
|
383
|
-
@property
|
382
|
+
@_builtins.property
|
384
383
|
@pulumi.getter(name="allowedKubernetesNamespaceSelector")
|
385
|
-
def allowed_kubernetes_namespace_selector(self) -> Optional[pulumi.Input[
|
384
|
+
def allowed_kubernetes_namespace_selector(self) -> Optional[pulumi.Input[_builtins.str]]:
|
386
385
|
"""
|
387
386
|
A label selector for Kubernetes namespaces
|
388
387
|
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
@@ -392,12 +391,12 @@ class _SecretBackendRoleState:
|
|
392
391
|
return pulumi.get(self, "allowed_kubernetes_namespace_selector")
|
393
392
|
|
394
393
|
@allowed_kubernetes_namespace_selector.setter
|
395
|
-
def allowed_kubernetes_namespace_selector(self, value: Optional[pulumi.Input[
|
394
|
+
def allowed_kubernetes_namespace_selector(self, value: Optional[pulumi.Input[_builtins.str]]):
|
396
395
|
pulumi.set(self, "allowed_kubernetes_namespace_selector", value)
|
397
396
|
|
398
|
-
@property
|
397
|
+
@_builtins.property
|
399
398
|
@pulumi.getter(name="allowedKubernetesNamespaces")
|
400
|
-
def allowed_kubernetes_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
399
|
+
def allowed_kubernetes_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
401
400
|
"""
|
402
401
|
The list of Kubernetes namespaces this role
|
403
402
|
can generate credentials for. If set to `*` all namespaces are allowed. If set with
|
@@ -406,12 +405,12 @@ class _SecretBackendRoleState:
|
|
406
405
|
return pulumi.get(self, "allowed_kubernetes_namespaces")
|
407
406
|
|
408
407
|
@allowed_kubernetes_namespaces.setter
|
409
|
-
def allowed_kubernetes_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
408
|
+
def allowed_kubernetes_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
410
409
|
pulumi.set(self, "allowed_kubernetes_namespaces", value)
|
411
410
|
|
412
|
-
@property
|
411
|
+
@_builtins.property
|
413
412
|
@pulumi.getter
|
414
|
-
def backend(self) -> Optional[pulumi.Input[
|
413
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
415
414
|
"""
|
416
415
|
The path of the Kubernetes Secrets Engine backend mount to create
|
417
416
|
the role in.
|
@@ -419,12 +418,12 @@ class _SecretBackendRoleState:
|
|
419
418
|
return pulumi.get(self, "backend")
|
420
419
|
|
421
420
|
@backend.setter
|
422
|
-
def backend(self, value: Optional[pulumi.Input[
|
421
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
423
422
|
pulumi.set(self, "backend", value)
|
424
423
|
|
425
|
-
@property
|
424
|
+
@_builtins.property
|
426
425
|
@pulumi.getter(name="extraAnnotations")
|
427
|
-
def extra_annotations(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
426
|
+
def extra_annotations(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
428
427
|
"""
|
429
428
|
Additional annotations to apply to all generated
|
430
429
|
Kubernetes objects.
|
@@ -432,12 +431,12 @@ class _SecretBackendRoleState:
|
|
432
431
|
return pulumi.get(self, "extra_annotations")
|
433
432
|
|
434
433
|
@extra_annotations.setter
|
435
|
-
def extra_annotations(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
434
|
+
def extra_annotations(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
436
435
|
pulumi.set(self, "extra_annotations", value)
|
437
436
|
|
438
|
-
@property
|
437
|
+
@_builtins.property
|
439
438
|
@pulumi.getter(name="extraLabels")
|
440
|
-
def extra_labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
439
|
+
def extra_labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
441
440
|
"""
|
442
441
|
Additional labels to apply to all generated Kubernetes
|
443
442
|
objects.
|
@@ -447,12 +446,12 @@ class _SecretBackendRoleState:
|
|
447
446
|
return pulumi.get(self, "extra_labels")
|
448
447
|
|
449
448
|
@extra_labels.setter
|
450
|
-
def extra_labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
449
|
+
def extra_labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
451
450
|
pulumi.set(self, "extra_labels", value)
|
452
451
|
|
453
|
-
@property
|
452
|
+
@_builtins.property
|
454
453
|
@pulumi.getter(name="generatedRoleRules")
|
455
|
-
def generated_role_rules(self) -> Optional[pulumi.Input[
|
454
|
+
def generated_role_rules(self) -> Optional[pulumi.Input[_builtins.str]]:
|
456
455
|
"""
|
457
456
|
The Role or ClusterRole rules to use when generating
|
458
457
|
a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
|
@@ -462,12 +461,12 @@ class _SecretBackendRoleState:
|
|
462
461
|
return pulumi.get(self, "generated_role_rules")
|
463
462
|
|
464
463
|
@generated_role_rules.setter
|
465
|
-
def generated_role_rules(self, value: Optional[pulumi.Input[
|
464
|
+
def generated_role_rules(self, value: Optional[pulumi.Input[_builtins.str]]):
|
466
465
|
pulumi.set(self, "generated_role_rules", value)
|
467
466
|
|
468
|
-
@property
|
467
|
+
@_builtins.property
|
469
468
|
@pulumi.getter(name="kubernetesRoleName")
|
470
|
-
def kubernetes_role_name(self) -> Optional[pulumi.Input[
|
469
|
+
def kubernetes_role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
471
470
|
"""
|
472
471
|
The pre-existing Role or ClusterRole to bind a
|
473
472
|
generated service account to. Mutually exclusive with `service_account_name` and
|
@@ -477,12 +476,12 @@ class _SecretBackendRoleState:
|
|
477
476
|
return pulumi.get(self, "kubernetes_role_name")
|
478
477
|
|
479
478
|
@kubernetes_role_name.setter
|
480
|
-
def kubernetes_role_name(self, value: Optional[pulumi.Input[
|
479
|
+
def kubernetes_role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
481
480
|
pulumi.set(self, "kubernetes_role_name", value)
|
482
481
|
|
483
|
-
@property
|
482
|
+
@_builtins.property
|
484
483
|
@pulumi.getter(name="kubernetesRoleType")
|
485
|
-
def kubernetes_role_type(self) -> Optional[pulumi.Input[
|
484
|
+
def kubernetes_role_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
486
485
|
"""
|
487
486
|
Specifies whether the Kubernetes role is a Role or
|
488
487
|
ClusterRole.
|
@@ -490,24 +489,24 @@ class _SecretBackendRoleState:
|
|
490
489
|
return pulumi.get(self, "kubernetes_role_type")
|
491
490
|
|
492
491
|
@kubernetes_role_type.setter
|
493
|
-
def kubernetes_role_type(self, value: Optional[pulumi.Input[
|
492
|
+
def kubernetes_role_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
494
493
|
pulumi.set(self, "kubernetes_role_type", value)
|
495
494
|
|
496
|
-
@property
|
495
|
+
@_builtins.property
|
497
496
|
@pulumi.getter
|
498
|
-
def name(self) -> Optional[pulumi.Input[
|
497
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
499
498
|
"""
|
500
499
|
The name of the role.
|
501
500
|
"""
|
502
501
|
return pulumi.get(self, "name")
|
503
502
|
|
504
503
|
@name.setter
|
505
|
-
def name(self, value: Optional[pulumi.Input[
|
504
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
506
505
|
pulumi.set(self, "name", value)
|
507
506
|
|
508
|
-
@property
|
507
|
+
@_builtins.property
|
509
508
|
@pulumi.getter(name="nameTemplate")
|
510
|
-
def name_template(self) -> Optional[pulumi.Input[
|
509
|
+
def name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
511
510
|
"""
|
512
511
|
The name template to use when generating service accounts,
|
513
512
|
roles and role bindings. If unset, a default template is used.
|
@@ -515,12 +514,12 @@ class _SecretBackendRoleState:
|
|
515
514
|
return pulumi.get(self, "name_template")
|
516
515
|
|
517
516
|
@name_template.setter
|
518
|
-
def name_template(self, value: Optional[pulumi.Input[
|
517
|
+
def name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
519
518
|
pulumi.set(self, "name_template", value)
|
520
519
|
|
521
|
-
@property
|
520
|
+
@_builtins.property
|
522
521
|
@pulumi.getter
|
523
|
-
def namespace(self) -> Optional[pulumi.Input[
|
522
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
524
523
|
"""
|
525
524
|
The namespace to provision the resource in.
|
526
525
|
The value should not contain leading or trailing forward slashes.
|
@@ -530,12 +529,12 @@ class _SecretBackendRoleState:
|
|
530
529
|
return pulumi.get(self, "namespace")
|
531
530
|
|
532
531
|
@namespace.setter
|
533
|
-
def namespace(self, value: Optional[pulumi.Input[
|
532
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
534
533
|
pulumi.set(self, "namespace", value)
|
535
534
|
|
536
|
-
@property
|
535
|
+
@_builtins.property
|
537
536
|
@pulumi.getter(name="serviceAccountName")
|
538
|
-
def service_account_name(self) -> Optional[pulumi.Input[
|
537
|
+
def service_account_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
539
538
|
"""
|
540
539
|
The pre-existing service account to generate tokens for.
|
541
540
|
Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
|
@@ -544,31 +543,31 @@ class _SecretBackendRoleState:
|
|
544
543
|
return pulumi.get(self, "service_account_name")
|
545
544
|
|
546
545
|
@service_account_name.setter
|
547
|
-
def service_account_name(self, value: Optional[pulumi.Input[
|
546
|
+
def service_account_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
548
547
|
pulumi.set(self, "service_account_name", value)
|
549
548
|
|
550
|
-
@property
|
549
|
+
@_builtins.property
|
551
550
|
@pulumi.getter(name="tokenDefaultTtl")
|
552
|
-
def token_default_ttl(self) -> Optional[pulumi.Input[
|
551
|
+
def token_default_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
553
552
|
"""
|
554
553
|
The default TTL for generated Kubernetes tokens in seconds.
|
555
554
|
"""
|
556
555
|
return pulumi.get(self, "token_default_ttl")
|
557
556
|
|
558
557
|
@token_default_ttl.setter
|
559
|
-
def token_default_ttl(self, value: Optional[pulumi.Input[
|
558
|
+
def token_default_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
560
559
|
pulumi.set(self, "token_default_ttl", value)
|
561
560
|
|
562
|
-
@property
|
561
|
+
@_builtins.property
|
563
562
|
@pulumi.getter(name="tokenMaxTtl")
|
564
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
563
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
565
564
|
"""
|
566
565
|
The maximum TTL for generated Kubernetes tokens in seconds.
|
567
566
|
"""
|
568
567
|
return pulumi.get(self, "token_max_ttl")
|
569
568
|
|
570
569
|
@token_max_ttl.setter
|
571
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
570
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
572
571
|
pulumi.set(self, "token_max_ttl", value)
|
573
572
|
|
574
573
|
|
@@ -578,20 +577,20 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
578
577
|
def __init__(__self__,
|
579
578
|
resource_name: str,
|
580
579
|
opts: Optional[pulumi.ResourceOptions] = None,
|
581
|
-
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[
|
582
|
-
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[
|
583
|
-
backend: Optional[pulumi.Input[
|
584
|
-
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
585
|
-
extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
586
|
-
generated_role_rules: Optional[pulumi.Input[
|
587
|
-
kubernetes_role_name: Optional[pulumi.Input[
|
588
|
-
kubernetes_role_type: Optional[pulumi.Input[
|
589
|
-
name: Optional[pulumi.Input[
|
590
|
-
name_template: Optional[pulumi.Input[
|
591
|
-
namespace: Optional[pulumi.Input[
|
592
|
-
service_account_name: Optional[pulumi.Input[
|
593
|
-
token_default_ttl: Optional[pulumi.Input[
|
594
|
-
token_max_ttl: Optional[pulumi.Input[
|
580
|
+
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
|
581
|
+
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
582
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
583
|
+
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
584
|
+
extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
585
|
+
generated_role_rules: Optional[pulumi.Input[_builtins.str]] = None,
|
586
|
+
kubernetes_role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
587
|
+
kubernetes_role_type: Optional[pulumi.Input[_builtins.str]] = None,
|
588
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
589
|
+
name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
590
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
591
|
+
service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
|
592
|
+
token_default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
593
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
595
594
|
__props__=None):
|
596
595
|
"""
|
597
596
|
## Example Usage
|
@@ -706,43 +705,43 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
706
705
|
|
707
706
|
:param str resource_name: The name of the resource.
|
708
707
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
709
|
-
:param pulumi.Input[
|
708
|
+
:param pulumi.Input[_builtins.str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
|
710
709
|
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
711
710
|
of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
|
712
711
|
If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
|
713
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
712
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
|
714
713
|
can generate credentials for. If set to `*` all namespaces are allowed. If set with
|
715
714
|
`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
|
716
|
-
:param pulumi.Input[
|
715
|
+
:param pulumi.Input[_builtins.str] backend: The path of the Kubernetes Secrets Engine backend mount to create
|
717
716
|
the role in.
|
718
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
717
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_annotations: Additional annotations to apply to all generated
|
719
718
|
Kubernetes objects.
|
720
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
719
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_labels: Additional labels to apply to all generated Kubernetes
|
721
720
|
objects.
|
722
721
|
|
723
722
|
This resource also directly accepts all Mount fields.
|
724
|
-
:param pulumi.Input[
|
723
|
+
:param pulumi.Input[_builtins.str] generated_role_rules: The Role or ClusterRole rules to use when generating
|
725
724
|
a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
|
726
725
|
and `kubernetes_role_name`. If set, the entire chain of Kubernetes objects will be generated
|
727
726
|
when credentials are requested.
|
728
|
-
:param pulumi.Input[
|
727
|
+
:param pulumi.Input[_builtins.str] kubernetes_role_name: The pre-existing Role or ClusterRole to bind a
|
729
728
|
generated service account to. Mutually exclusive with `service_account_name` and
|
730
729
|
`generated_role_rules`. If set, Kubernetes token, service account, and role
|
731
730
|
binding objects will be created when credentials are requested.
|
732
|
-
:param pulumi.Input[
|
731
|
+
:param pulumi.Input[_builtins.str] kubernetes_role_type: Specifies whether the Kubernetes role is a Role or
|
733
732
|
ClusterRole.
|
734
|
-
:param pulumi.Input[
|
735
|
-
:param pulumi.Input[
|
733
|
+
:param pulumi.Input[_builtins.str] name: The name of the role.
|
734
|
+
:param pulumi.Input[_builtins.str] name_template: The name template to use when generating service accounts,
|
736
735
|
roles and role bindings. If unset, a default template is used.
|
737
|
-
:param pulumi.Input[
|
736
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
738
737
|
The value should not contain leading or trailing forward slashes.
|
739
738
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
740
739
|
*Available only for Vault Enterprise*.
|
741
|
-
:param pulumi.Input[
|
740
|
+
:param pulumi.Input[_builtins.str] service_account_name: The pre-existing service account to generate tokens for.
|
742
741
|
Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
|
743
742
|
Kubernetes token will be created when credentials are requested.
|
744
|
-
:param pulumi.Input[
|
745
|
-
:param pulumi.Input[
|
743
|
+
:param pulumi.Input[_builtins.int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
|
744
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
|
746
745
|
"""
|
747
746
|
...
|
748
747
|
@overload
|
@@ -876,20 +875,20 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
876
875
|
def _internal_init(__self__,
|
877
876
|
resource_name: str,
|
878
877
|
opts: Optional[pulumi.ResourceOptions] = None,
|
879
|
-
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[
|
880
|
-
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[
|
881
|
-
backend: Optional[pulumi.Input[
|
882
|
-
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
883
|
-
extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
884
|
-
generated_role_rules: Optional[pulumi.Input[
|
885
|
-
kubernetes_role_name: Optional[pulumi.Input[
|
886
|
-
kubernetes_role_type: Optional[pulumi.Input[
|
887
|
-
name: Optional[pulumi.Input[
|
888
|
-
name_template: Optional[pulumi.Input[
|
889
|
-
namespace: Optional[pulumi.Input[
|
890
|
-
service_account_name: Optional[pulumi.Input[
|
891
|
-
token_default_ttl: Optional[pulumi.Input[
|
892
|
-
token_max_ttl: Optional[pulumi.Input[
|
878
|
+
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
|
879
|
+
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
880
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
881
|
+
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
882
|
+
extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
883
|
+
generated_role_rules: Optional[pulumi.Input[_builtins.str]] = None,
|
884
|
+
kubernetes_role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
885
|
+
kubernetes_role_type: Optional[pulumi.Input[_builtins.str]] = None,
|
886
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
887
|
+
name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
888
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
889
|
+
service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
|
890
|
+
token_default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
891
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
893
892
|
__props__=None):
|
894
893
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
895
894
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -925,20 +924,20 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
925
924
|
def get(resource_name: str,
|
926
925
|
id: pulumi.Input[str],
|
927
926
|
opts: Optional[pulumi.ResourceOptions] = None,
|
928
|
-
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[
|
929
|
-
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[
|
930
|
-
backend: Optional[pulumi.Input[
|
931
|
-
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
932
|
-
extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
933
|
-
generated_role_rules: Optional[pulumi.Input[
|
934
|
-
kubernetes_role_name: Optional[pulumi.Input[
|
935
|
-
kubernetes_role_type: Optional[pulumi.Input[
|
936
|
-
name: Optional[pulumi.Input[
|
937
|
-
name_template: Optional[pulumi.Input[
|
938
|
-
namespace: Optional[pulumi.Input[
|
939
|
-
service_account_name: Optional[pulumi.Input[
|
940
|
-
token_default_ttl: Optional[pulumi.Input[
|
941
|
-
token_max_ttl: Optional[pulumi.Input[
|
927
|
+
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
|
928
|
+
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
929
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
930
|
+
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
931
|
+
extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
932
|
+
generated_role_rules: Optional[pulumi.Input[_builtins.str]] = None,
|
933
|
+
kubernetes_role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
934
|
+
kubernetes_role_type: Optional[pulumi.Input[_builtins.str]] = None,
|
935
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
936
|
+
name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
937
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
938
|
+
service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
|
939
|
+
token_default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
940
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretBackendRole':
|
942
941
|
"""
|
943
942
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
944
943
|
properties used to qualify the lookup.
|
@@ -946,43 +945,43 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
946
945
|
:param str resource_name: The unique name of the resulting resource.
|
947
946
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
948
947
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
949
|
-
:param pulumi.Input[
|
948
|
+
:param pulumi.Input[_builtins.str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
|
950
949
|
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
951
950
|
of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
|
952
951
|
If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
|
953
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
952
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
|
954
953
|
can generate credentials for. If set to `*` all namespaces are allowed. If set with
|
955
954
|
`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
|
956
|
-
:param pulumi.Input[
|
955
|
+
:param pulumi.Input[_builtins.str] backend: The path of the Kubernetes Secrets Engine backend mount to create
|
957
956
|
the role in.
|
958
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
957
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_annotations: Additional annotations to apply to all generated
|
959
958
|
Kubernetes objects.
|
960
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
959
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_labels: Additional labels to apply to all generated Kubernetes
|
961
960
|
objects.
|
962
961
|
|
963
962
|
This resource also directly accepts all Mount fields.
|
964
|
-
:param pulumi.Input[
|
963
|
+
:param pulumi.Input[_builtins.str] generated_role_rules: The Role or ClusterRole rules to use when generating
|
965
964
|
a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
|
966
965
|
and `kubernetes_role_name`. If set, the entire chain of Kubernetes objects will be generated
|
967
966
|
when credentials are requested.
|
968
|
-
:param pulumi.Input[
|
967
|
+
:param pulumi.Input[_builtins.str] kubernetes_role_name: The pre-existing Role or ClusterRole to bind a
|
969
968
|
generated service account to. Mutually exclusive with `service_account_name` and
|
970
969
|
`generated_role_rules`. If set, Kubernetes token, service account, and role
|
971
970
|
binding objects will be created when credentials are requested.
|
972
|
-
:param pulumi.Input[
|
971
|
+
:param pulumi.Input[_builtins.str] kubernetes_role_type: Specifies whether the Kubernetes role is a Role or
|
973
972
|
ClusterRole.
|
974
|
-
:param pulumi.Input[
|
975
|
-
:param pulumi.Input[
|
973
|
+
:param pulumi.Input[_builtins.str] name: The name of the role.
|
974
|
+
:param pulumi.Input[_builtins.str] name_template: The name template to use when generating service accounts,
|
976
975
|
roles and role bindings. If unset, a default template is used.
|
977
|
-
:param pulumi.Input[
|
976
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
978
977
|
The value should not contain leading or trailing forward slashes.
|
979
978
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
980
979
|
*Available only for Vault Enterprise*.
|
981
|
-
:param pulumi.Input[
|
980
|
+
:param pulumi.Input[_builtins.str] service_account_name: The pre-existing service account to generate tokens for.
|
982
981
|
Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
|
983
982
|
Kubernetes token will be created when credentials are requested.
|
984
|
-
:param pulumi.Input[
|
985
|
-
:param pulumi.Input[
|
983
|
+
:param pulumi.Input[_builtins.int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
|
984
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
|
986
985
|
"""
|
987
986
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
988
987
|
|
@@ -1004,9 +1003,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1004
1003
|
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
1005
1004
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
1006
1005
|
|
1007
|
-
@property
|
1006
|
+
@_builtins.property
|
1008
1007
|
@pulumi.getter(name="allowedKubernetesNamespaceSelector")
|
1009
|
-
def allowed_kubernetes_namespace_selector(self) -> pulumi.Output[Optional[
|
1008
|
+
def allowed_kubernetes_namespace_selector(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1010
1009
|
"""
|
1011
1010
|
A label selector for Kubernetes namespaces
|
1012
1011
|
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
@@ -1015,9 +1014,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1015
1014
|
"""
|
1016
1015
|
return pulumi.get(self, "allowed_kubernetes_namespace_selector")
|
1017
1016
|
|
1018
|
-
@property
|
1017
|
+
@_builtins.property
|
1019
1018
|
@pulumi.getter(name="allowedKubernetesNamespaces")
|
1020
|
-
def allowed_kubernetes_namespaces(self) -> pulumi.Output[Optional[Sequence[
|
1019
|
+
def allowed_kubernetes_namespaces(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1021
1020
|
"""
|
1022
1021
|
The list of Kubernetes namespaces this role
|
1023
1022
|
can generate credentials for. If set to `*` all namespaces are allowed. If set with
|
@@ -1025,27 +1024,27 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1025
1024
|
"""
|
1026
1025
|
return pulumi.get(self, "allowed_kubernetes_namespaces")
|
1027
1026
|
|
1028
|
-
@property
|
1027
|
+
@_builtins.property
|
1029
1028
|
@pulumi.getter
|
1030
|
-
def backend(self) -> pulumi.Output[
|
1029
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
1031
1030
|
"""
|
1032
1031
|
The path of the Kubernetes Secrets Engine backend mount to create
|
1033
1032
|
the role in.
|
1034
1033
|
"""
|
1035
1034
|
return pulumi.get(self, "backend")
|
1036
1035
|
|
1037
|
-
@property
|
1036
|
+
@_builtins.property
|
1038
1037
|
@pulumi.getter(name="extraAnnotations")
|
1039
|
-
def extra_annotations(self) -> pulumi.Output[Optional[Mapping[str,
|
1038
|
+
def extra_annotations(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1040
1039
|
"""
|
1041
1040
|
Additional annotations to apply to all generated
|
1042
1041
|
Kubernetes objects.
|
1043
1042
|
"""
|
1044
1043
|
return pulumi.get(self, "extra_annotations")
|
1045
1044
|
|
1046
|
-
@property
|
1045
|
+
@_builtins.property
|
1047
1046
|
@pulumi.getter(name="extraLabels")
|
1048
|
-
def extra_labels(self) -> pulumi.Output[Optional[Mapping[str,
|
1047
|
+
def extra_labels(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
1049
1048
|
"""
|
1050
1049
|
Additional labels to apply to all generated Kubernetes
|
1051
1050
|
objects.
|
@@ -1054,9 +1053,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1054
1053
|
"""
|
1055
1054
|
return pulumi.get(self, "extra_labels")
|
1056
1055
|
|
1057
|
-
@property
|
1056
|
+
@_builtins.property
|
1058
1057
|
@pulumi.getter(name="generatedRoleRules")
|
1059
|
-
def generated_role_rules(self) -> pulumi.Output[Optional[
|
1058
|
+
def generated_role_rules(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1060
1059
|
"""
|
1061
1060
|
The Role or ClusterRole rules to use when generating
|
1062
1061
|
a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
|
@@ -1065,9 +1064,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1065
1064
|
"""
|
1066
1065
|
return pulumi.get(self, "generated_role_rules")
|
1067
1066
|
|
1068
|
-
@property
|
1067
|
+
@_builtins.property
|
1069
1068
|
@pulumi.getter(name="kubernetesRoleName")
|
1070
|
-
def kubernetes_role_name(self) -> pulumi.Output[Optional[
|
1069
|
+
def kubernetes_role_name(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1071
1070
|
"""
|
1072
1071
|
The pre-existing Role or ClusterRole to bind a
|
1073
1072
|
generated service account to. Mutually exclusive with `service_account_name` and
|
@@ -1076,35 +1075,35 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1076
1075
|
"""
|
1077
1076
|
return pulumi.get(self, "kubernetes_role_name")
|
1078
1077
|
|
1079
|
-
@property
|
1078
|
+
@_builtins.property
|
1080
1079
|
@pulumi.getter(name="kubernetesRoleType")
|
1081
|
-
def kubernetes_role_type(self) -> pulumi.Output[Optional[
|
1080
|
+
def kubernetes_role_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1082
1081
|
"""
|
1083
1082
|
Specifies whether the Kubernetes role is a Role or
|
1084
1083
|
ClusterRole.
|
1085
1084
|
"""
|
1086
1085
|
return pulumi.get(self, "kubernetes_role_type")
|
1087
1086
|
|
1088
|
-
@property
|
1087
|
+
@_builtins.property
|
1089
1088
|
@pulumi.getter
|
1090
|
-
def name(self) -> pulumi.Output[
|
1089
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
1091
1090
|
"""
|
1092
1091
|
The name of the role.
|
1093
1092
|
"""
|
1094
1093
|
return pulumi.get(self, "name")
|
1095
1094
|
|
1096
|
-
@property
|
1095
|
+
@_builtins.property
|
1097
1096
|
@pulumi.getter(name="nameTemplate")
|
1098
|
-
def name_template(self) -> pulumi.Output[Optional[
|
1097
|
+
def name_template(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1099
1098
|
"""
|
1100
1099
|
The name template to use when generating service accounts,
|
1101
1100
|
roles and role bindings. If unset, a default template is used.
|
1102
1101
|
"""
|
1103
1102
|
return pulumi.get(self, "name_template")
|
1104
1103
|
|
1105
|
-
@property
|
1104
|
+
@_builtins.property
|
1106
1105
|
@pulumi.getter
|
1107
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1106
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1108
1107
|
"""
|
1109
1108
|
The namespace to provision the resource in.
|
1110
1109
|
The value should not contain leading or trailing forward slashes.
|
@@ -1113,9 +1112,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1113
1112
|
"""
|
1114
1113
|
return pulumi.get(self, "namespace")
|
1115
1114
|
|
1116
|
-
@property
|
1115
|
+
@_builtins.property
|
1117
1116
|
@pulumi.getter(name="serviceAccountName")
|
1118
|
-
def service_account_name(self) -> pulumi.Output[Optional[
|
1117
|
+
def service_account_name(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1119
1118
|
"""
|
1120
1119
|
The pre-existing service account to generate tokens for.
|
1121
1120
|
Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
|
@@ -1123,17 +1122,17 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1123
1122
|
"""
|
1124
1123
|
return pulumi.get(self, "service_account_name")
|
1125
1124
|
|
1126
|
-
@property
|
1125
|
+
@_builtins.property
|
1127
1126
|
@pulumi.getter(name="tokenDefaultTtl")
|
1128
|
-
def token_default_ttl(self) -> pulumi.Output[Optional[
|
1127
|
+
def token_default_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1129
1128
|
"""
|
1130
1129
|
The default TTL for generated Kubernetes tokens in seconds.
|
1131
1130
|
"""
|
1132
1131
|
return pulumi.get(self, "token_default_ttl")
|
1133
1132
|
|
1134
|
-
@property
|
1133
|
+
@_builtins.property
|
1135
1134
|
@pulumi.getter(name="tokenMaxTtl")
|
1136
|
-
def token_max_ttl(self) -> pulumi.Output[Optional[
|
1135
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1137
1136
|
"""
|
1138
1137
|
The maximum TTL for generated Kubernetes tokens in seconds.
|
1139
1138
|
"""
|