pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,25 +19,25 @@ __all__ = ['OidcKeyArgs', 'OidcKey']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class OidcKeyArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
algorithm: Optional[pulumi.Input[
|
24
|
-
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[
|
25
|
-
name: Optional[pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
27
|
-
rotation_period: Optional[pulumi.Input[
|
28
|
-
verification_ttl: Optional[pulumi.Input[
|
22
|
+
algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
27
|
+
verification_ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
29
28
|
"""
|
30
29
|
The set of arguments for constructing a OidcKey resource.
|
31
|
-
:param pulumi.Input[
|
30
|
+
:param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
|
32
31
|
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
33
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
32
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
|
34
33
|
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
34
|
+
:param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
|
35
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
37
36
|
The value should not contain leading or trailing forward slashes.
|
38
37
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
39
38
|
*Available only for Vault Enterprise*.
|
40
|
-
:param pulumi.Input[
|
41
|
-
:param pulumi.Input[
|
39
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
|
40
|
+
:param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
|
42
41
|
available for verification after being rotated in seconds.
|
43
42
|
"""
|
44
43
|
if algorithm is not None:
|
@@ -54,9 +53,9 @@ class OidcKeyArgs:
|
|
54
53
|
if verification_ttl is not None:
|
55
54
|
pulumi.set(__self__, "verification_ttl", verification_ttl)
|
56
55
|
|
57
|
-
@property
|
56
|
+
@_builtins.property
|
58
57
|
@pulumi.getter
|
59
|
-
def algorithm(self) -> Optional[pulumi.Input[
|
58
|
+
def algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
|
60
59
|
"""
|
61
60
|
Signing algorithm to use. Signing algorithm to use.
|
62
61
|
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
@@ -64,12 +63,12 @@ class OidcKeyArgs:
|
|
64
63
|
return pulumi.get(self, "algorithm")
|
65
64
|
|
66
65
|
@algorithm.setter
|
67
|
-
def algorithm(self, value: Optional[pulumi.Input[
|
66
|
+
def algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
|
68
67
|
pulumi.set(self, "algorithm", value)
|
69
68
|
|
70
|
-
@property
|
69
|
+
@_builtins.property
|
71
70
|
@pulumi.getter(name="allowedClientIds")
|
72
|
-
def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
71
|
+
def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
73
72
|
"""
|
74
73
|
Array of role client ID allowed to use this key for signing. If
|
75
74
|
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
@@ -77,24 +76,24 @@ class OidcKeyArgs:
|
|
77
76
|
return pulumi.get(self, "allowed_client_ids")
|
78
77
|
|
79
78
|
@allowed_client_ids.setter
|
80
|
-
def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
79
|
+
def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
81
80
|
pulumi.set(self, "allowed_client_ids", value)
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter
|
85
|
-
def name(self) -> Optional[pulumi.Input[
|
84
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
86
85
|
"""
|
87
86
|
Name of the OIDC Key to create.
|
88
87
|
"""
|
89
88
|
return pulumi.get(self, "name")
|
90
89
|
|
91
90
|
@name.setter
|
92
|
-
def name(self, value: Optional[pulumi.Input[
|
91
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
93
92
|
pulumi.set(self, "name", value)
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter
|
97
|
-
def namespace(self) -> Optional[pulumi.Input[
|
96
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
98
97
|
"""
|
99
98
|
The namespace to provision the resource in.
|
100
99
|
The value should not contain leading or trailing forward slashes.
|
@@ -104,24 +103,24 @@ class OidcKeyArgs:
|
|
104
103
|
return pulumi.get(self, "namespace")
|
105
104
|
|
106
105
|
@namespace.setter
|
107
|
-
def namespace(self, value: Optional[pulumi.Input[
|
106
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
108
107
|
pulumi.set(self, "namespace", value)
|
109
108
|
|
110
|
-
@property
|
109
|
+
@_builtins.property
|
111
110
|
@pulumi.getter(name="rotationPeriod")
|
112
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
111
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
113
112
|
"""
|
114
113
|
How often to generate a new signing key in number of seconds
|
115
114
|
"""
|
116
115
|
return pulumi.get(self, "rotation_period")
|
117
116
|
|
118
117
|
@rotation_period.setter
|
119
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
118
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
120
119
|
pulumi.set(self, "rotation_period", value)
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter(name="verificationTtl")
|
124
|
-
def verification_ttl(self) -> Optional[pulumi.Input[
|
123
|
+
def verification_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
125
124
|
"""
|
126
125
|
"Controls how long the public portion of a signing key will be
|
127
126
|
available for verification after being rotated in seconds.
|
@@ -129,32 +128,32 @@ class OidcKeyArgs:
|
|
129
128
|
return pulumi.get(self, "verification_ttl")
|
130
129
|
|
131
130
|
@verification_ttl.setter
|
132
|
-
def verification_ttl(self, value: Optional[pulumi.Input[
|
131
|
+
def verification_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
133
132
|
pulumi.set(self, "verification_ttl", value)
|
134
133
|
|
135
134
|
|
136
135
|
@pulumi.input_type
|
137
136
|
class _OidcKeyState:
|
138
137
|
def __init__(__self__, *,
|
139
|
-
algorithm: Optional[pulumi.Input[
|
140
|
-
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[
|
141
|
-
name: Optional[pulumi.Input[
|
142
|
-
namespace: Optional[pulumi.Input[
|
143
|
-
rotation_period: Optional[pulumi.Input[
|
144
|
-
verification_ttl: Optional[pulumi.Input[
|
138
|
+
algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
139
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
140
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
141
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
142
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
143
|
+
verification_ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
145
144
|
"""
|
146
145
|
Input properties used for looking up and filtering OidcKey resources.
|
147
|
-
:param pulumi.Input[
|
146
|
+
:param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
|
148
147
|
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
149
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
148
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
|
150
149
|
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
151
|
-
:param pulumi.Input[
|
152
|
-
:param pulumi.Input[
|
150
|
+
:param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
|
151
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
153
152
|
The value should not contain leading or trailing forward slashes.
|
154
153
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
155
154
|
*Available only for Vault Enterprise*.
|
156
|
-
:param pulumi.Input[
|
157
|
-
:param pulumi.Input[
|
155
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
|
156
|
+
:param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
|
158
157
|
available for verification after being rotated in seconds.
|
159
158
|
"""
|
160
159
|
if algorithm is not None:
|
@@ -170,9 +169,9 @@ class _OidcKeyState:
|
|
170
169
|
if verification_ttl is not None:
|
171
170
|
pulumi.set(__self__, "verification_ttl", verification_ttl)
|
172
171
|
|
173
|
-
@property
|
172
|
+
@_builtins.property
|
174
173
|
@pulumi.getter
|
175
|
-
def algorithm(self) -> Optional[pulumi.Input[
|
174
|
+
def algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
|
176
175
|
"""
|
177
176
|
Signing algorithm to use. Signing algorithm to use.
|
178
177
|
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
@@ -180,12 +179,12 @@ class _OidcKeyState:
|
|
180
179
|
return pulumi.get(self, "algorithm")
|
181
180
|
|
182
181
|
@algorithm.setter
|
183
|
-
def algorithm(self, value: Optional[pulumi.Input[
|
182
|
+
def algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
|
184
183
|
pulumi.set(self, "algorithm", value)
|
185
184
|
|
186
|
-
@property
|
185
|
+
@_builtins.property
|
187
186
|
@pulumi.getter(name="allowedClientIds")
|
188
|
-
def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
187
|
+
def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
189
188
|
"""
|
190
189
|
Array of role client ID allowed to use this key for signing. If
|
191
190
|
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
@@ -193,24 +192,24 @@ class _OidcKeyState:
|
|
193
192
|
return pulumi.get(self, "allowed_client_ids")
|
194
193
|
|
195
194
|
@allowed_client_ids.setter
|
196
|
-
def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
195
|
+
def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
197
196
|
pulumi.set(self, "allowed_client_ids", value)
|
198
197
|
|
199
|
-
@property
|
198
|
+
@_builtins.property
|
200
199
|
@pulumi.getter
|
201
|
-
def name(self) -> Optional[pulumi.Input[
|
200
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
202
201
|
"""
|
203
202
|
Name of the OIDC Key to create.
|
204
203
|
"""
|
205
204
|
return pulumi.get(self, "name")
|
206
205
|
|
207
206
|
@name.setter
|
208
|
-
def name(self, value: Optional[pulumi.Input[
|
207
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
209
208
|
pulumi.set(self, "name", value)
|
210
209
|
|
211
|
-
@property
|
210
|
+
@_builtins.property
|
212
211
|
@pulumi.getter
|
213
|
-
def namespace(self) -> Optional[pulumi.Input[
|
212
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
214
213
|
"""
|
215
214
|
The namespace to provision the resource in.
|
216
215
|
The value should not contain leading or trailing forward slashes.
|
@@ -220,24 +219,24 @@ class _OidcKeyState:
|
|
220
219
|
return pulumi.get(self, "namespace")
|
221
220
|
|
222
221
|
@namespace.setter
|
223
|
-
def namespace(self, value: Optional[pulumi.Input[
|
222
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
224
223
|
pulumi.set(self, "namespace", value)
|
225
224
|
|
226
|
-
@property
|
225
|
+
@_builtins.property
|
227
226
|
@pulumi.getter(name="rotationPeriod")
|
228
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
227
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
229
228
|
"""
|
230
229
|
How often to generate a new signing key in number of seconds
|
231
230
|
"""
|
232
231
|
return pulumi.get(self, "rotation_period")
|
233
232
|
|
234
233
|
@rotation_period.setter
|
235
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
234
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
236
235
|
pulumi.set(self, "rotation_period", value)
|
237
236
|
|
238
|
-
@property
|
237
|
+
@_builtins.property
|
239
238
|
@pulumi.getter(name="verificationTtl")
|
240
|
-
def verification_ttl(self) -> Optional[pulumi.Input[
|
239
|
+
def verification_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
241
240
|
"""
|
242
241
|
"Controls how long the public portion of a signing key will be
|
243
242
|
available for verification after being rotated in seconds.
|
@@ -245,7 +244,7 @@ class _OidcKeyState:
|
|
245
244
|
return pulumi.get(self, "verification_ttl")
|
246
245
|
|
247
246
|
@verification_ttl.setter
|
248
|
-
def verification_ttl(self, value: Optional[pulumi.Input[
|
247
|
+
def verification_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
249
248
|
pulumi.set(self, "verification_ttl", value)
|
250
249
|
|
251
250
|
|
@@ -255,12 +254,12 @@ class OidcKey(pulumi.CustomResource):
|
|
255
254
|
def __init__(__self__,
|
256
255
|
resource_name: str,
|
257
256
|
opts: Optional[pulumi.ResourceOptions] = None,
|
258
|
-
algorithm: Optional[pulumi.Input[
|
259
|
-
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[
|
260
|
-
name: Optional[pulumi.Input[
|
261
|
-
namespace: Optional[pulumi.Input[
|
262
|
-
rotation_period: Optional[pulumi.Input[
|
263
|
-
verification_ttl: Optional[pulumi.Input[
|
257
|
+
algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
258
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
259
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
260
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
261
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
262
|
+
verification_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
264
263
|
__props__=None):
|
265
264
|
"""
|
266
265
|
## Example Usage
|
@@ -290,17 +289,17 @@ class OidcKey(pulumi.CustomResource):
|
|
290
289
|
|
291
290
|
:param str resource_name: The name of the resource.
|
292
291
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
293
|
-
:param pulumi.Input[
|
292
|
+
:param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
|
294
293
|
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
295
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
294
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
|
296
295
|
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
297
|
-
:param pulumi.Input[
|
298
|
-
:param pulumi.Input[
|
296
|
+
:param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
|
297
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
299
298
|
The value should not contain leading or trailing forward slashes.
|
300
299
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
301
300
|
*Available only for Vault Enterprise*.
|
302
|
-
:param pulumi.Input[
|
303
|
-
:param pulumi.Input[
|
301
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
|
302
|
+
:param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
|
304
303
|
available for verification after being rotated in seconds.
|
305
304
|
"""
|
306
305
|
...
|
@@ -350,12 +349,12 @@ class OidcKey(pulumi.CustomResource):
|
|
350
349
|
def _internal_init(__self__,
|
351
350
|
resource_name: str,
|
352
351
|
opts: Optional[pulumi.ResourceOptions] = None,
|
353
|
-
algorithm: Optional[pulumi.Input[
|
354
|
-
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[
|
355
|
-
name: Optional[pulumi.Input[
|
356
|
-
namespace: Optional[pulumi.Input[
|
357
|
-
rotation_period: Optional[pulumi.Input[
|
358
|
-
verification_ttl: Optional[pulumi.Input[
|
352
|
+
algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
353
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
354
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
355
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
356
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
357
|
+
verification_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
359
358
|
__props__=None):
|
360
359
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
361
360
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -381,12 +380,12 @@ class OidcKey(pulumi.CustomResource):
|
|
381
380
|
def get(resource_name: str,
|
382
381
|
id: pulumi.Input[str],
|
383
382
|
opts: Optional[pulumi.ResourceOptions] = None,
|
384
|
-
algorithm: Optional[pulumi.Input[
|
385
|
-
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[
|
386
|
-
name: Optional[pulumi.Input[
|
387
|
-
namespace: Optional[pulumi.Input[
|
388
|
-
rotation_period: Optional[pulumi.Input[
|
389
|
-
verification_ttl: Optional[pulumi.Input[
|
383
|
+
algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
384
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
385
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
386
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
387
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
388
|
+
verification_ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'OidcKey':
|
390
389
|
"""
|
391
390
|
Get an existing OidcKey resource's state with the given name, id, and optional extra
|
392
391
|
properties used to qualify the lookup.
|
@@ -394,17 +393,17 @@ class OidcKey(pulumi.CustomResource):
|
|
394
393
|
:param str resource_name: The unique name of the resulting resource.
|
395
394
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
396
395
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
397
|
-
:param pulumi.Input[
|
396
|
+
:param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
|
398
397
|
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
399
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
398
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
|
400
399
|
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
401
|
-
:param pulumi.Input[
|
402
|
-
:param pulumi.Input[
|
400
|
+
:param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
|
401
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
403
402
|
The value should not contain leading or trailing forward slashes.
|
404
403
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
405
404
|
*Available only for Vault Enterprise*.
|
406
|
-
:param pulumi.Input[
|
407
|
-
:param pulumi.Input[
|
405
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
|
406
|
+
:param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
|
408
407
|
available for verification after being rotated in seconds.
|
409
408
|
"""
|
410
409
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -419,35 +418,35 @@ class OidcKey(pulumi.CustomResource):
|
|
419
418
|
__props__.__dict__["verification_ttl"] = verification_ttl
|
420
419
|
return OidcKey(resource_name, opts=opts, __props__=__props__)
|
421
420
|
|
422
|
-
@property
|
421
|
+
@_builtins.property
|
423
422
|
@pulumi.getter
|
424
|
-
def algorithm(self) -> pulumi.Output[Optional[
|
423
|
+
def algorithm(self) -> pulumi.Output[Optional[_builtins.str]]:
|
425
424
|
"""
|
426
425
|
Signing algorithm to use. Signing algorithm to use.
|
427
426
|
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
428
427
|
"""
|
429
428
|
return pulumi.get(self, "algorithm")
|
430
429
|
|
431
|
-
@property
|
430
|
+
@_builtins.property
|
432
431
|
@pulumi.getter(name="allowedClientIds")
|
433
|
-
def allowed_client_ids(self) -> pulumi.Output[Sequence[
|
432
|
+
def allowed_client_ids(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
434
433
|
"""
|
435
434
|
Array of role client ID allowed to use this key for signing. If
|
436
435
|
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
437
436
|
"""
|
438
437
|
return pulumi.get(self, "allowed_client_ids")
|
439
438
|
|
440
|
-
@property
|
439
|
+
@_builtins.property
|
441
440
|
@pulumi.getter
|
442
|
-
def name(self) -> pulumi.Output[
|
441
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
443
442
|
"""
|
444
443
|
Name of the OIDC Key to create.
|
445
444
|
"""
|
446
445
|
return pulumi.get(self, "name")
|
447
446
|
|
448
|
-
@property
|
447
|
+
@_builtins.property
|
449
448
|
@pulumi.getter
|
450
|
-
def namespace(self) -> pulumi.Output[Optional[
|
449
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
451
450
|
"""
|
452
451
|
The namespace to provision the resource in.
|
453
452
|
The value should not contain leading or trailing forward slashes.
|
@@ -456,17 +455,17 @@ class OidcKey(pulumi.CustomResource):
|
|
456
455
|
"""
|
457
456
|
return pulumi.get(self, "namespace")
|
458
457
|
|
459
|
-
@property
|
458
|
+
@_builtins.property
|
460
459
|
@pulumi.getter(name="rotationPeriod")
|
461
|
-
def rotation_period(self) -> pulumi.Output[Optional[
|
460
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
462
461
|
"""
|
463
462
|
How often to generate a new signing key in number of seconds
|
464
463
|
"""
|
465
464
|
return pulumi.get(self, "rotation_period")
|
466
465
|
|
467
|
-
@property
|
466
|
+
@_builtins.property
|
468
467
|
@pulumi.getter(name="verificationTtl")
|
469
|
-
def verification_ttl(self) -> pulumi.Output[Optional[
|
468
|
+
def verification_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
470
469
|
"""
|
471
470
|
"Controls how long the public portion of a signing key will be
|
472
471
|
available for verification after being rotated in seconds.
|