pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,31 +19,31 @@ __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendConfigArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
kubernetes_host: pulumi.Input[
|
24
|
-
backend: Optional[pulumi.Input[
|
25
|
-
disable_iss_validation: Optional[pulumi.Input[
|
26
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
27
|
-
issuer: Optional[pulumi.Input[
|
28
|
-
kubernetes_ca_cert: Optional[pulumi.Input[
|
29
|
-
namespace: Optional[pulumi.Input[
|
30
|
-
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
31
|
-
token_reviewer_jwt: Optional[pulumi.Input[
|
32
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[
|
22
|
+
kubernetes_host: pulumi.Input[_builtins.str],
|
23
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
disable_iss_validation: Optional[pulumi.Input[_builtins.bool]] = None,
|
25
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
26
|
+
issuer: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
30
|
+
token_reviewer_jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
use_annotations_as_alias_metadata: Optional[pulumi.Input[_builtins.bool]] = None):
|
33
32
|
"""
|
34
33
|
The set of arguments for constructing a AuthBackendConfig resource.
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
37
|
-
:param pulumi.Input[
|
38
|
-
:param pulumi.Input[
|
39
|
-
:param pulumi.Input[
|
40
|
-
:param pulumi.Input[
|
41
|
-
:param pulumi.Input[
|
34
|
+
:param pulumi.Input[_builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
35
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
|
36
|
+
:param pulumi.Input[_builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
37
|
+
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
38
|
+
:param pulumi.Input[_builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
39
|
+
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
40
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
42
41
|
The value should not contain leading or trailing forward slashes.
|
43
42
|
The `namespace` is always relative to the provider's configured namespace.
|
44
43
|
*Available only for Vault Enterprise*.
|
45
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
46
|
-
:param pulumi.Input[
|
47
|
-
:param pulumi.Input[
|
44
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
45
|
+
:param pulumi.Input[_builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
46
|
+
:param pulumi.Input[_builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
48
47
|
"""
|
49
48
|
pulumi.set(__self__, "kubernetes_host", kubernetes_host)
|
50
49
|
if backend is not None:
|
@@ -66,81 +65,81 @@ class AuthBackendConfigArgs:
|
|
66
65
|
if use_annotations_as_alias_metadata is not None:
|
67
66
|
pulumi.set(__self__, "use_annotations_as_alias_metadata", use_annotations_as_alias_metadata)
|
68
67
|
|
69
|
-
@property
|
68
|
+
@_builtins.property
|
70
69
|
@pulumi.getter(name="kubernetesHost")
|
71
|
-
def kubernetes_host(self) -> pulumi.Input[
|
70
|
+
def kubernetes_host(self) -> pulumi.Input[_builtins.str]:
|
72
71
|
"""
|
73
72
|
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
74
73
|
"""
|
75
74
|
return pulumi.get(self, "kubernetes_host")
|
76
75
|
|
77
76
|
@kubernetes_host.setter
|
78
|
-
def kubernetes_host(self, value: pulumi.Input[
|
77
|
+
def kubernetes_host(self, value: pulumi.Input[_builtins.str]):
|
79
78
|
pulumi.set(self, "kubernetes_host", value)
|
80
79
|
|
81
|
-
@property
|
80
|
+
@_builtins.property
|
82
81
|
@pulumi.getter
|
83
|
-
def backend(self) -> Optional[pulumi.Input[
|
82
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
84
83
|
"""
|
85
84
|
Unique name of the kubernetes backend to configure.
|
86
85
|
"""
|
87
86
|
return pulumi.get(self, "backend")
|
88
87
|
|
89
88
|
@backend.setter
|
90
|
-
def backend(self, value: Optional[pulumi.Input[
|
89
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
91
90
|
pulumi.set(self, "backend", value)
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter(name="disableIssValidation")
|
95
|
-
def disable_iss_validation(self) -> Optional[pulumi.Input[
|
94
|
+
def disable_iss_validation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
96
95
|
"""
|
97
96
|
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
98
97
|
"""
|
99
98
|
return pulumi.get(self, "disable_iss_validation")
|
100
99
|
|
101
100
|
@disable_iss_validation.setter
|
102
|
-
def disable_iss_validation(self, value: Optional[pulumi.Input[
|
101
|
+
def disable_iss_validation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
103
102
|
pulumi.set(self, "disable_iss_validation", value)
|
104
103
|
|
105
|
-
@property
|
104
|
+
@_builtins.property
|
106
105
|
@pulumi.getter(name="disableLocalCaJwt")
|
107
|
-
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[
|
106
|
+
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
108
107
|
"""
|
109
108
|
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
110
109
|
"""
|
111
110
|
return pulumi.get(self, "disable_local_ca_jwt")
|
112
111
|
|
113
112
|
@disable_local_ca_jwt.setter
|
114
|
-
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[
|
113
|
+
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
115
114
|
pulumi.set(self, "disable_local_ca_jwt", value)
|
116
115
|
|
117
|
-
@property
|
116
|
+
@_builtins.property
|
118
117
|
@pulumi.getter
|
119
|
-
def issuer(self) -> Optional[pulumi.Input[
|
118
|
+
def issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
|
120
119
|
"""
|
121
120
|
JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
122
121
|
"""
|
123
122
|
return pulumi.get(self, "issuer")
|
124
123
|
|
125
124
|
@issuer.setter
|
126
|
-
def issuer(self, value: Optional[pulumi.Input[
|
125
|
+
def issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
|
127
126
|
pulumi.set(self, "issuer", value)
|
128
127
|
|
129
|
-
@property
|
128
|
+
@_builtins.property
|
130
129
|
@pulumi.getter(name="kubernetesCaCert")
|
131
|
-
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[
|
130
|
+
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
132
131
|
"""
|
133
132
|
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
134
133
|
"""
|
135
134
|
return pulumi.get(self, "kubernetes_ca_cert")
|
136
135
|
|
137
136
|
@kubernetes_ca_cert.setter
|
138
|
-
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[
|
137
|
+
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
139
138
|
pulumi.set(self, "kubernetes_ca_cert", value)
|
140
139
|
|
141
|
-
@property
|
140
|
+
@_builtins.property
|
142
141
|
@pulumi.getter
|
143
|
-
def namespace(self) -> Optional[pulumi.Input[
|
142
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
144
143
|
"""
|
145
144
|
The namespace to provision the resource in.
|
146
145
|
The value should not contain leading or trailing forward slashes.
|
@@ -150,74 +149,74 @@ class AuthBackendConfigArgs:
|
|
150
149
|
return pulumi.get(self, "namespace")
|
151
150
|
|
152
151
|
@namespace.setter
|
153
|
-
def namespace(self, value: Optional[pulumi.Input[
|
152
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
154
153
|
pulumi.set(self, "namespace", value)
|
155
154
|
|
156
|
-
@property
|
155
|
+
@_builtins.property
|
157
156
|
@pulumi.getter(name="pemKeys")
|
158
|
-
def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
157
|
+
def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
159
158
|
"""
|
160
159
|
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
161
160
|
"""
|
162
161
|
return pulumi.get(self, "pem_keys")
|
163
162
|
|
164
163
|
@pem_keys.setter
|
165
|
-
def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
164
|
+
def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
166
165
|
pulumi.set(self, "pem_keys", value)
|
167
166
|
|
168
|
-
@property
|
167
|
+
@_builtins.property
|
169
168
|
@pulumi.getter(name="tokenReviewerJwt")
|
170
|
-
def token_reviewer_jwt(self) -> Optional[pulumi.Input[
|
169
|
+
def token_reviewer_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
171
170
|
"""
|
172
171
|
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
173
172
|
"""
|
174
173
|
return pulumi.get(self, "token_reviewer_jwt")
|
175
174
|
|
176
175
|
@token_reviewer_jwt.setter
|
177
|
-
def token_reviewer_jwt(self, value: Optional[pulumi.Input[
|
176
|
+
def token_reviewer_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
178
177
|
pulumi.set(self, "token_reviewer_jwt", value)
|
179
178
|
|
180
|
-
@property
|
179
|
+
@_builtins.property
|
181
180
|
@pulumi.getter(name="useAnnotationsAsAliasMetadata")
|
182
|
-
def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[
|
181
|
+
def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
183
182
|
"""
|
184
183
|
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
185
184
|
"""
|
186
185
|
return pulumi.get(self, "use_annotations_as_alias_metadata")
|
187
186
|
|
188
187
|
@use_annotations_as_alias_metadata.setter
|
189
|
-
def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[
|
188
|
+
def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
190
189
|
pulumi.set(self, "use_annotations_as_alias_metadata", value)
|
191
190
|
|
192
191
|
|
193
192
|
@pulumi.input_type
|
194
193
|
class _AuthBackendConfigState:
|
195
194
|
def __init__(__self__, *,
|
196
|
-
backend: Optional[pulumi.Input[
|
197
|
-
disable_iss_validation: Optional[pulumi.Input[
|
198
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
199
|
-
issuer: Optional[pulumi.Input[
|
200
|
-
kubernetes_ca_cert: Optional[pulumi.Input[
|
201
|
-
kubernetes_host: Optional[pulumi.Input[
|
202
|
-
namespace: Optional[pulumi.Input[
|
203
|
-
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
204
|
-
token_reviewer_jwt: Optional[pulumi.Input[
|
205
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[
|
195
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
196
|
+
disable_iss_validation: Optional[pulumi.Input[_builtins.bool]] = None,
|
197
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
198
|
+
issuer: Optional[pulumi.Input[_builtins.str]] = None,
|
199
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
200
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
201
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
202
|
+
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
203
|
+
token_reviewer_jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
204
|
+
use_annotations_as_alias_metadata: Optional[pulumi.Input[_builtins.bool]] = None):
|
206
205
|
"""
|
207
206
|
Input properties used for looking up and filtering AuthBackendConfig resources.
|
208
|
-
:param pulumi.Input[
|
209
|
-
:param pulumi.Input[
|
210
|
-
:param pulumi.Input[
|
211
|
-
:param pulumi.Input[
|
212
|
-
:param pulumi.Input[
|
213
|
-
:param pulumi.Input[
|
214
|
-
:param pulumi.Input[
|
207
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
|
208
|
+
:param pulumi.Input[_builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
209
|
+
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
210
|
+
:param pulumi.Input[_builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
211
|
+
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
212
|
+
:param pulumi.Input[_builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
213
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
215
214
|
The value should not contain leading or trailing forward slashes.
|
216
215
|
The `namespace` is always relative to the provider's configured namespace.
|
217
216
|
*Available only for Vault Enterprise*.
|
218
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
219
|
-
:param pulumi.Input[
|
220
|
-
:param pulumi.Input[
|
217
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
218
|
+
:param pulumi.Input[_builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
219
|
+
:param pulumi.Input[_builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
221
220
|
"""
|
222
221
|
if backend is not None:
|
223
222
|
pulumi.set(__self__, "backend", backend)
|
@@ -240,81 +239,81 @@ class _AuthBackendConfigState:
|
|
240
239
|
if use_annotations_as_alias_metadata is not None:
|
241
240
|
pulumi.set(__self__, "use_annotations_as_alias_metadata", use_annotations_as_alias_metadata)
|
242
241
|
|
243
|
-
@property
|
242
|
+
@_builtins.property
|
244
243
|
@pulumi.getter
|
245
|
-
def backend(self) -> Optional[pulumi.Input[
|
244
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
246
245
|
"""
|
247
246
|
Unique name of the kubernetes backend to configure.
|
248
247
|
"""
|
249
248
|
return pulumi.get(self, "backend")
|
250
249
|
|
251
250
|
@backend.setter
|
252
|
-
def backend(self, value: Optional[pulumi.Input[
|
251
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
253
252
|
pulumi.set(self, "backend", value)
|
254
253
|
|
255
|
-
@property
|
254
|
+
@_builtins.property
|
256
255
|
@pulumi.getter(name="disableIssValidation")
|
257
|
-
def disable_iss_validation(self) -> Optional[pulumi.Input[
|
256
|
+
def disable_iss_validation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
258
257
|
"""
|
259
258
|
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
260
259
|
"""
|
261
260
|
return pulumi.get(self, "disable_iss_validation")
|
262
261
|
|
263
262
|
@disable_iss_validation.setter
|
264
|
-
def disable_iss_validation(self, value: Optional[pulumi.Input[
|
263
|
+
def disable_iss_validation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
265
264
|
pulumi.set(self, "disable_iss_validation", value)
|
266
265
|
|
267
|
-
@property
|
266
|
+
@_builtins.property
|
268
267
|
@pulumi.getter(name="disableLocalCaJwt")
|
269
|
-
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[
|
268
|
+
def disable_local_ca_jwt(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
270
269
|
"""
|
271
270
|
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
272
271
|
"""
|
273
272
|
return pulumi.get(self, "disable_local_ca_jwt")
|
274
273
|
|
275
274
|
@disable_local_ca_jwt.setter
|
276
|
-
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[
|
275
|
+
def disable_local_ca_jwt(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
277
276
|
pulumi.set(self, "disable_local_ca_jwt", value)
|
278
277
|
|
279
|
-
@property
|
278
|
+
@_builtins.property
|
280
279
|
@pulumi.getter
|
281
|
-
def issuer(self) -> Optional[pulumi.Input[
|
280
|
+
def issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
|
282
281
|
"""
|
283
282
|
JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
284
283
|
"""
|
285
284
|
return pulumi.get(self, "issuer")
|
286
285
|
|
287
286
|
@issuer.setter
|
288
|
-
def issuer(self, value: Optional[pulumi.Input[
|
287
|
+
def issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
|
289
288
|
pulumi.set(self, "issuer", value)
|
290
289
|
|
291
|
-
@property
|
290
|
+
@_builtins.property
|
292
291
|
@pulumi.getter(name="kubernetesCaCert")
|
293
|
-
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[
|
292
|
+
def kubernetes_ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
294
293
|
"""
|
295
294
|
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
296
295
|
"""
|
297
296
|
return pulumi.get(self, "kubernetes_ca_cert")
|
298
297
|
|
299
298
|
@kubernetes_ca_cert.setter
|
300
|
-
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[
|
299
|
+
def kubernetes_ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
301
300
|
pulumi.set(self, "kubernetes_ca_cert", value)
|
302
301
|
|
303
|
-
@property
|
302
|
+
@_builtins.property
|
304
303
|
@pulumi.getter(name="kubernetesHost")
|
305
|
-
def kubernetes_host(self) -> Optional[pulumi.Input[
|
304
|
+
def kubernetes_host(self) -> Optional[pulumi.Input[_builtins.str]]:
|
306
305
|
"""
|
307
306
|
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
308
307
|
"""
|
309
308
|
return pulumi.get(self, "kubernetes_host")
|
310
309
|
|
311
310
|
@kubernetes_host.setter
|
312
|
-
def kubernetes_host(self, value: Optional[pulumi.Input[
|
311
|
+
def kubernetes_host(self, value: Optional[pulumi.Input[_builtins.str]]):
|
313
312
|
pulumi.set(self, "kubernetes_host", value)
|
314
313
|
|
315
|
-
@property
|
314
|
+
@_builtins.property
|
316
315
|
@pulumi.getter
|
317
|
-
def namespace(self) -> Optional[pulumi.Input[
|
316
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
318
317
|
"""
|
319
318
|
The namespace to provision the resource in.
|
320
319
|
The value should not contain leading or trailing forward slashes.
|
@@ -324,43 +323,43 @@ class _AuthBackendConfigState:
|
|
324
323
|
return pulumi.get(self, "namespace")
|
325
324
|
|
326
325
|
@namespace.setter
|
327
|
-
def namespace(self, value: Optional[pulumi.Input[
|
326
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
328
327
|
pulumi.set(self, "namespace", value)
|
329
328
|
|
330
|
-
@property
|
329
|
+
@_builtins.property
|
331
330
|
@pulumi.getter(name="pemKeys")
|
332
|
-
def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
331
|
+
def pem_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
333
332
|
"""
|
334
333
|
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
335
334
|
"""
|
336
335
|
return pulumi.get(self, "pem_keys")
|
337
336
|
|
338
337
|
@pem_keys.setter
|
339
|
-
def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
338
|
+
def pem_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
340
339
|
pulumi.set(self, "pem_keys", value)
|
341
340
|
|
342
|
-
@property
|
341
|
+
@_builtins.property
|
343
342
|
@pulumi.getter(name="tokenReviewerJwt")
|
344
|
-
def token_reviewer_jwt(self) -> Optional[pulumi.Input[
|
343
|
+
def token_reviewer_jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
|
345
344
|
"""
|
346
345
|
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
347
346
|
"""
|
348
347
|
return pulumi.get(self, "token_reviewer_jwt")
|
349
348
|
|
350
349
|
@token_reviewer_jwt.setter
|
351
|
-
def token_reviewer_jwt(self, value: Optional[pulumi.Input[
|
350
|
+
def token_reviewer_jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
|
352
351
|
pulumi.set(self, "token_reviewer_jwt", value)
|
353
352
|
|
354
|
-
@property
|
353
|
+
@_builtins.property
|
355
354
|
@pulumi.getter(name="useAnnotationsAsAliasMetadata")
|
356
|
-
def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[
|
355
|
+
def use_annotations_as_alias_metadata(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
357
356
|
"""
|
358
357
|
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
359
358
|
"""
|
360
359
|
return pulumi.get(self, "use_annotations_as_alias_metadata")
|
361
360
|
|
362
361
|
@use_annotations_as_alias_metadata.setter
|
363
|
-
def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[
|
362
|
+
def use_annotations_as_alias_metadata(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
364
363
|
pulumi.set(self, "use_annotations_as_alias_metadata", value)
|
365
364
|
|
366
365
|
|
@@ -370,16 +369,16 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
370
369
|
def __init__(__self__,
|
371
370
|
resource_name: str,
|
372
371
|
opts: Optional[pulumi.ResourceOptions] = None,
|
373
|
-
backend: Optional[pulumi.Input[
|
374
|
-
disable_iss_validation: Optional[pulumi.Input[
|
375
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
376
|
-
issuer: Optional[pulumi.Input[
|
377
|
-
kubernetes_ca_cert: Optional[pulumi.Input[
|
378
|
-
kubernetes_host: Optional[pulumi.Input[
|
379
|
-
namespace: Optional[pulumi.Input[
|
380
|
-
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
381
|
-
token_reviewer_jwt: Optional[pulumi.Input[
|
382
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[
|
372
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
373
|
+
disable_iss_validation: Optional[pulumi.Input[_builtins.bool]] = None,
|
374
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
375
|
+
issuer: Optional[pulumi.Input[_builtins.str]] = None,
|
376
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
377
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
378
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
379
|
+
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
380
|
+
token_reviewer_jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
381
|
+
use_annotations_as_alias_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
|
383
382
|
__props__=None):
|
384
383
|
"""
|
385
384
|
Manages an Kubernetes auth backend config in a Vault server. See the [Vault
|
@@ -414,19 +413,19 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
414
413
|
|
415
414
|
:param str resource_name: The name of the resource.
|
416
415
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
417
|
-
:param pulumi.Input[
|
418
|
-
:param pulumi.Input[
|
419
|
-
:param pulumi.Input[
|
420
|
-
:param pulumi.Input[
|
421
|
-
:param pulumi.Input[
|
422
|
-
:param pulumi.Input[
|
423
|
-
:param pulumi.Input[
|
416
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
|
417
|
+
:param pulumi.Input[_builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
418
|
+
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
419
|
+
:param pulumi.Input[_builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
420
|
+
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
421
|
+
:param pulumi.Input[_builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
422
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
424
423
|
The value should not contain leading or trailing forward slashes.
|
425
424
|
The `namespace` is always relative to the provider's configured namespace.
|
426
425
|
*Available only for Vault Enterprise*.
|
427
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
428
|
-
:param pulumi.Input[
|
429
|
-
:param pulumi.Input[
|
426
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
427
|
+
:param pulumi.Input[_builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
428
|
+
:param pulumi.Input[_builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
430
429
|
"""
|
431
430
|
...
|
432
431
|
@overload
|
@@ -480,16 +479,16 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
480
479
|
def _internal_init(__self__,
|
481
480
|
resource_name: str,
|
482
481
|
opts: Optional[pulumi.ResourceOptions] = None,
|
483
|
-
backend: Optional[pulumi.Input[
|
484
|
-
disable_iss_validation: Optional[pulumi.Input[
|
485
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
486
|
-
issuer: Optional[pulumi.Input[
|
487
|
-
kubernetes_ca_cert: Optional[pulumi.Input[
|
488
|
-
kubernetes_host: Optional[pulumi.Input[
|
489
|
-
namespace: Optional[pulumi.Input[
|
490
|
-
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
491
|
-
token_reviewer_jwt: Optional[pulumi.Input[
|
492
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[
|
482
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
483
|
+
disable_iss_validation: Optional[pulumi.Input[_builtins.bool]] = None,
|
484
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
485
|
+
issuer: Optional[pulumi.Input[_builtins.str]] = None,
|
486
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
487
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
488
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
489
|
+
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
490
|
+
token_reviewer_jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
491
|
+
use_annotations_as_alias_metadata: Optional[pulumi.Input[_builtins.bool]] = None,
|
493
492
|
__props__=None):
|
494
493
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
495
494
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -523,16 +522,16 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
523
522
|
def get(resource_name: str,
|
524
523
|
id: pulumi.Input[str],
|
525
524
|
opts: Optional[pulumi.ResourceOptions] = None,
|
526
|
-
backend: Optional[pulumi.Input[
|
527
|
-
disable_iss_validation: Optional[pulumi.Input[
|
528
|
-
disable_local_ca_jwt: Optional[pulumi.Input[
|
529
|
-
issuer: Optional[pulumi.Input[
|
530
|
-
kubernetes_ca_cert: Optional[pulumi.Input[
|
531
|
-
kubernetes_host: Optional[pulumi.Input[
|
532
|
-
namespace: Optional[pulumi.Input[
|
533
|
-
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[
|
534
|
-
token_reviewer_jwt: Optional[pulumi.Input[
|
535
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[
|
525
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
526
|
+
disable_iss_validation: Optional[pulumi.Input[_builtins.bool]] = None,
|
527
|
+
disable_local_ca_jwt: Optional[pulumi.Input[_builtins.bool]] = None,
|
528
|
+
issuer: Optional[pulumi.Input[_builtins.str]] = None,
|
529
|
+
kubernetes_ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
530
|
+
kubernetes_host: Optional[pulumi.Input[_builtins.str]] = None,
|
531
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
532
|
+
pem_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
533
|
+
token_reviewer_jwt: Optional[pulumi.Input[_builtins.str]] = None,
|
534
|
+
use_annotations_as_alias_metadata: Optional[pulumi.Input[_builtins.bool]] = None) -> 'AuthBackendConfig':
|
536
535
|
"""
|
537
536
|
Get an existing AuthBackendConfig resource's state with the given name, id, and optional extra
|
538
537
|
properties used to qualify the lookup.
|
@@ -540,19 +539,19 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
540
539
|
:param str resource_name: The unique name of the resulting resource.
|
541
540
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
542
541
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
543
|
-
:param pulumi.Input[
|
544
|
-
:param pulumi.Input[
|
545
|
-
:param pulumi.Input[
|
546
|
-
:param pulumi.Input[
|
547
|
-
:param pulumi.Input[
|
548
|
-
:param pulumi.Input[
|
549
|
-
:param pulumi.Input[
|
542
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
|
543
|
+
:param pulumi.Input[_builtins.bool] disable_iss_validation: Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
544
|
+
:param pulumi.Input[_builtins.bool] disable_local_ca_jwt: Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
545
|
+
:param pulumi.Input[_builtins.str] issuer: JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
546
|
+
:param pulumi.Input[_builtins.str] kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
547
|
+
:param pulumi.Input[_builtins.str] kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
548
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
550
549
|
The value should not contain leading or trailing forward slashes.
|
551
550
|
The `namespace` is always relative to the provider's configured namespace.
|
552
551
|
*Available only for Vault Enterprise*.
|
553
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
554
|
-
:param pulumi.Input[
|
555
|
-
:param pulumi.Input[
|
552
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] pem_keys: List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
553
|
+
:param pulumi.Input[_builtins.str] token_reviewer_jwt: A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
554
|
+
:param pulumi.Input[_builtins.bool] use_annotations_as_alias_metadata: Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
556
555
|
"""
|
557
556
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
558
557
|
|
@@ -570,57 +569,57 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
570
569
|
__props__.__dict__["use_annotations_as_alias_metadata"] = use_annotations_as_alias_metadata
|
571
570
|
return AuthBackendConfig(resource_name, opts=opts, __props__=__props__)
|
572
571
|
|
573
|
-
@property
|
572
|
+
@_builtins.property
|
574
573
|
@pulumi.getter
|
575
|
-
def backend(self) -> pulumi.Output[Optional[
|
574
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
576
575
|
"""
|
577
576
|
Unique name of the kubernetes backend to configure.
|
578
577
|
"""
|
579
578
|
return pulumi.get(self, "backend")
|
580
579
|
|
581
|
-
@property
|
580
|
+
@_builtins.property
|
582
581
|
@pulumi.getter(name="disableIssValidation")
|
583
|
-
def disable_iss_validation(self) -> pulumi.Output[
|
582
|
+
def disable_iss_validation(self) -> pulumi.Output[_builtins.bool]:
|
584
583
|
"""
|
585
584
|
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
586
585
|
"""
|
587
586
|
return pulumi.get(self, "disable_iss_validation")
|
588
587
|
|
589
|
-
@property
|
588
|
+
@_builtins.property
|
590
589
|
@pulumi.getter(name="disableLocalCaJwt")
|
591
|
-
def disable_local_ca_jwt(self) -> pulumi.Output[
|
590
|
+
def disable_local_ca_jwt(self) -> pulumi.Output[_builtins.bool]:
|
592
591
|
"""
|
593
592
|
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
594
593
|
"""
|
595
594
|
return pulumi.get(self, "disable_local_ca_jwt")
|
596
595
|
|
597
|
-
@property
|
596
|
+
@_builtins.property
|
598
597
|
@pulumi.getter
|
599
|
-
def issuer(self) -> pulumi.Output[Optional[
|
598
|
+
def issuer(self) -> pulumi.Output[Optional[_builtins.str]]:
|
600
599
|
"""
|
601
600
|
JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
602
601
|
"""
|
603
602
|
return pulumi.get(self, "issuer")
|
604
603
|
|
605
|
-
@property
|
604
|
+
@_builtins.property
|
606
605
|
@pulumi.getter(name="kubernetesCaCert")
|
607
|
-
def kubernetes_ca_cert(self) -> pulumi.Output[
|
606
|
+
def kubernetes_ca_cert(self) -> pulumi.Output[_builtins.str]:
|
608
607
|
"""
|
609
608
|
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
610
609
|
"""
|
611
610
|
return pulumi.get(self, "kubernetes_ca_cert")
|
612
611
|
|
613
|
-
@property
|
612
|
+
@_builtins.property
|
614
613
|
@pulumi.getter(name="kubernetesHost")
|
615
|
-
def kubernetes_host(self) -> pulumi.Output[
|
614
|
+
def kubernetes_host(self) -> pulumi.Output[_builtins.str]:
|
616
615
|
"""
|
617
616
|
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
618
617
|
"""
|
619
618
|
return pulumi.get(self, "kubernetes_host")
|
620
619
|
|
621
|
-
@property
|
620
|
+
@_builtins.property
|
622
621
|
@pulumi.getter
|
623
|
-
def namespace(self) -> pulumi.Output[Optional[
|
622
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
624
623
|
"""
|
625
624
|
The namespace to provision the resource in.
|
626
625
|
The value should not contain leading or trailing forward slashes.
|
@@ -629,25 +628,25 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
629
628
|
"""
|
630
629
|
return pulumi.get(self, "namespace")
|
631
630
|
|
632
|
-
@property
|
631
|
+
@_builtins.property
|
633
632
|
@pulumi.getter(name="pemKeys")
|
634
|
-
def pem_keys(self) -> pulumi.Output[Optional[Sequence[
|
633
|
+
def pem_keys(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
635
634
|
"""
|
636
635
|
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
637
636
|
"""
|
638
637
|
return pulumi.get(self, "pem_keys")
|
639
638
|
|
640
|
-
@property
|
639
|
+
@_builtins.property
|
641
640
|
@pulumi.getter(name="tokenReviewerJwt")
|
642
|
-
def token_reviewer_jwt(self) -> pulumi.Output[Optional[
|
641
|
+
def token_reviewer_jwt(self) -> pulumi.Output[Optional[_builtins.str]]:
|
643
642
|
"""
|
644
643
|
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
645
644
|
"""
|
646
645
|
return pulumi.get(self, "token_reviewer_jwt")
|
647
646
|
|
648
|
-
@property
|
647
|
+
@_builtins.property
|
649
648
|
@pulumi.getter(name="useAnnotationsAsAliasMetadata")
|
650
|
-
def use_annotations_as_alias_metadata(self) -> pulumi.Output[
|
649
|
+
def use_annotations_as_alias_metadata(self) -> pulumi.Output[_builtins.bool]:
|
651
650
|
"""
|
652
651
|
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
653
652
|
"""
|