pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -59,75 +58,75 @@ class GetAuthBackendConfigResult:
59
58
  raise TypeError("Expected argument 'use_annotations_as_alias_metadata' to be a bool")
60
59
  pulumi.set(__self__, "use_annotations_as_alias_metadata", use_annotations_as_alias_metadata)
61
60
 
62
- @property
61
+ @_builtins.property
63
62
  @pulumi.getter
64
- def backend(self) -> Optional[builtins.str]:
63
+ def backend(self) -> Optional[_builtins.str]:
65
64
  return pulumi.get(self, "backend")
66
65
 
67
- @property
66
+ @_builtins.property
68
67
  @pulumi.getter(name="disableIssValidation")
69
- def disable_iss_validation(self) -> builtins.bool:
68
+ def disable_iss_validation(self) -> _builtins.bool:
70
69
  """
71
70
  (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
72
71
  """
73
72
  return pulumi.get(self, "disable_iss_validation")
74
73
 
75
- @property
74
+ @_builtins.property
76
75
  @pulumi.getter(name="disableLocalCaJwt")
77
- def disable_local_ca_jwt(self) -> builtins.bool:
76
+ def disable_local_ca_jwt(self) -> _builtins.bool:
78
77
  """
79
78
  (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
80
79
  """
81
80
  return pulumi.get(self, "disable_local_ca_jwt")
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter
85
- def id(self) -> builtins.str:
84
+ def id(self) -> _builtins.str:
86
85
  """
87
86
  The provider-assigned unique ID for this managed resource.
88
87
  """
89
88
  return pulumi.get(self, "id")
90
89
 
91
- @property
90
+ @_builtins.property
92
91
  @pulumi.getter
93
- def issuer(self) -> builtins.str:
92
+ def issuer(self) -> _builtins.str:
94
93
  """
95
94
  Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
96
95
  """
97
96
  return pulumi.get(self, "issuer")
98
97
 
99
- @property
98
+ @_builtins.property
100
99
  @pulumi.getter(name="kubernetesCaCert")
101
- def kubernetes_ca_cert(self) -> builtins.str:
100
+ def kubernetes_ca_cert(self) -> _builtins.str:
102
101
  """
103
102
  PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
104
103
  """
105
104
  return pulumi.get(self, "kubernetes_ca_cert")
106
105
 
107
- @property
106
+ @_builtins.property
108
107
  @pulumi.getter(name="kubernetesHost")
109
- def kubernetes_host(self) -> builtins.str:
108
+ def kubernetes_host(self) -> _builtins.str:
110
109
  """
111
110
  Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
112
111
  """
113
112
  return pulumi.get(self, "kubernetes_host")
114
113
 
115
- @property
114
+ @_builtins.property
116
115
  @pulumi.getter
117
- def namespace(self) -> Optional[builtins.str]:
116
+ def namespace(self) -> Optional[_builtins.str]:
118
117
  return pulumi.get(self, "namespace")
119
118
 
120
- @property
119
+ @_builtins.property
121
120
  @pulumi.getter(name="pemKeys")
122
- def pem_keys(self) -> Sequence[builtins.str]:
121
+ def pem_keys(self) -> Sequence[_builtins.str]:
123
122
  """
124
123
  Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
125
124
  """
126
125
  return pulumi.get(self, "pem_keys")
127
126
 
128
- @property
127
+ @_builtins.property
129
128
  @pulumi.getter(name="useAnnotationsAsAliasMetadata")
130
- def use_annotations_as_alias_metadata(self) -> builtins.bool:
129
+ def use_annotations_as_alias_metadata(self) -> _builtins.bool:
131
130
  """
132
131
  (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
133
132
  """
@@ -152,15 +151,15 @@ class AwaitableGetAuthBackendConfigResult(GetAuthBackendConfigResult):
152
151
  use_annotations_as_alias_metadata=self.use_annotations_as_alias_metadata)
153
152
 
154
153
 
155
- def get_auth_backend_config(backend: Optional[builtins.str] = None,
156
- disable_iss_validation: Optional[builtins.bool] = None,
157
- disable_local_ca_jwt: Optional[builtins.bool] = None,
158
- issuer: Optional[builtins.str] = None,
159
- kubernetes_ca_cert: Optional[builtins.str] = None,
160
- kubernetes_host: Optional[builtins.str] = None,
161
- namespace: Optional[builtins.str] = None,
162
- pem_keys: Optional[Sequence[builtins.str]] = None,
163
- use_annotations_as_alias_metadata: Optional[builtins.bool] = None,
154
+ def get_auth_backend_config(backend: Optional[_builtins.str] = None,
155
+ disable_iss_validation: Optional[_builtins.bool] = None,
156
+ disable_local_ca_jwt: Optional[_builtins.bool] = None,
157
+ issuer: Optional[_builtins.str] = None,
158
+ kubernetes_ca_cert: Optional[_builtins.str] = None,
159
+ kubernetes_host: Optional[_builtins.str] = None,
160
+ namespace: Optional[_builtins.str] = None,
161
+ pem_keys: Optional[Sequence[_builtins.str]] = None,
162
+ use_annotations_as_alias_metadata: Optional[_builtins.bool] = None,
164
163
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendConfigResult:
165
164
  """
166
165
  Reads the Role of an Kubernetes from a Vault server. See the [Vault
@@ -168,19 +167,19 @@ def get_auth_backend_config(backend: Optional[builtins.str] = None,
168
167
  information.
169
168
 
170
169
 
171
- :param builtins.str backend: The unique name for the Kubernetes backend the config to
170
+ :param _builtins.str backend: The unique name for the Kubernetes backend the config to
172
171
  retrieve Role attributes for resides in. Defaults to "kubernetes".
173
- :param builtins.bool disable_iss_validation: (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
174
- :param builtins.bool disable_local_ca_jwt: (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
175
- :param builtins.str issuer: Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
176
- :param builtins.str kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
177
- :param builtins.str kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
178
- :param builtins.str namespace: The namespace of the target resource.
172
+ :param _builtins.bool disable_iss_validation: (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
173
+ :param _builtins.bool disable_local_ca_jwt: (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
174
+ :param _builtins.str issuer: Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
175
+ :param _builtins.str kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
176
+ :param _builtins.str kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
177
+ :param _builtins.str namespace: The namespace of the target resource.
179
178
  The value should not contain leading or trailing forward slashes.
180
179
  The `namespace` is always relative to the provider's configured namespace.
181
180
  *Available only for Vault Enterprise*.
182
- :param Sequence[builtins.str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
183
- :param builtins.bool use_annotations_as_alias_metadata: (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
181
+ :param Sequence[_builtins.str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
182
+ :param _builtins.bool use_annotations_as_alias_metadata: (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
184
183
  """
185
184
  __args__ = dict()
186
185
  __args__['backend'] = backend
@@ -206,15 +205,15 @@ def get_auth_backend_config(backend: Optional[builtins.str] = None,
206
205
  namespace=pulumi.get(__ret__, 'namespace'),
207
206
  pem_keys=pulumi.get(__ret__, 'pem_keys'),
208
207
  use_annotations_as_alias_metadata=pulumi.get(__ret__, 'use_annotations_as_alias_metadata'))
209
- def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[builtins.str]]] = None,
210
- disable_iss_validation: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
211
- disable_local_ca_jwt: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
212
- issuer: Optional[pulumi.Input[Optional[builtins.str]]] = None,
213
- kubernetes_ca_cert: Optional[pulumi.Input[Optional[builtins.str]]] = None,
214
- kubernetes_host: Optional[pulumi.Input[Optional[builtins.str]]] = None,
215
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
216
- pem_keys: Optional[pulumi.Input[Optional[Sequence[builtins.str]]]] = None,
217
- use_annotations_as_alias_metadata: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
208
+ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
209
+ disable_iss_validation: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
210
+ disable_local_ca_jwt: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
211
+ issuer: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
212
+ kubernetes_ca_cert: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
213
+ kubernetes_host: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
214
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
215
+ pem_keys: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
216
+ use_annotations_as_alias_metadata: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
218
217
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendConfigResult]:
219
218
  """
220
219
  Reads the Role of an Kubernetes from a Vault server. See the [Vault
@@ -222,19 +221,19 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[built
222
221
  information.
223
222
 
224
223
 
225
- :param builtins.str backend: The unique name for the Kubernetes backend the config to
224
+ :param _builtins.str backend: The unique name for the Kubernetes backend the config to
226
225
  retrieve Role attributes for resides in. Defaults to "kubernetes".
227
- :param builtins.bool disable_iss_validation: (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
228
- :param builtins.bool disable_local_ca_jwt: (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
229
- :param builtins.str issuer: Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
230
- :param builtins.str kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
231
- :param builtins.str kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
232
- :param builtins.str namespace: The namespace of the target resource.
226
+ :param _builtins.bool disable_iss_validation: (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
227
+ :param _builtins.bool disable_local_ca_jwt: (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
228
+ :param _builtins.str issuer: Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
229
+ :param _builtins.str kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
230
+ :param _builtins.str kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
231
+ :param _builtins.str namespace: The namespace of the target resource.
233
232
  The value should not contain leading or trailing forward slashes.
234
233
  The `namespace` is always relative to the provider's configured namespace.
235
234
  *Available only for Vault Enterprise*.
236
- :param Sequence[builtins.str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
237
- :param builtins.bool use_annotations_as_alias_metadata: (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
235
+ :param Sequence[_builtins.str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
236
+ :param _builtins.bool use_annotations_as_alias_metadata: (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
238
237
  """
239
238
  __args__ = dict()
240
239
  __args__['backend'] = backend
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -80,64 +79,64 @@ class GetAuthBackendRoleResult:
80
79
  raise TypeError("Expected argument 'token_type' to be a str")
81
80
  pulumi.set(__self__, "token_type", token_type)
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter(name="aliasNameSource")
85
- def alias_name_source(self) -> builtins.str:
84
+ def alias_name_source(self) -> _builtins.str:
86
85
  """
87
86
  Method used for generating identity aliases. (vault-1.9+)
88
87
  """
89
88
  return pulumi.get(self, "alias_name_source")
90
89
 
91
- @property
90
+ @_builtins.property
92
91
  @pulumi.getter
93
- def audience(self) -> Optional[builtins.str]:
92
+ def audience(self) -> Optional[_builtins.str]:
94
93
  """
95
94
  Audience claim to verify in the JWT.
96
95
  """
97
96
  return pulumi.get(self, "audience")
98
97
 
99
- @property
98
+ @_builtins.property
100
99
  @pulumi.getter
101
- def backend(self) -> Optional[builtins.str]:
100
+ def backend(self) -> Optional[_builtins.str]:
102
101
  return pulumi.get(self, "backend")
103
102
 
104
- @property
103
+ @_builtins.property
105
104
  @pulumi.getter(name="boundServiceAccountNames")
106
- def bound_service_account_names(self) -> Sequence[builtins.str]:
105
+ def bound_service_account_names(self) -> Sequence[_builtins.str]:
107
106
  """
108
107
  List of service account names able to access this role. If set to "*" all names are allowed, both this and bound_service_account_namespaces can not be "*".
109
108
  """
110
109
  return pulumi.get(self, "bound_service_account_names")
111
110
 
112
- @property
111
+ @_builtins.property
113
112
  @pulumi.getter(name="boundServiceAccountNamespaces")
114
- def bound_service_account_namespaces(self) -> Sequence[builtins.str]:
113
+ def bound_service_account_namespaces(self) -> Sequence[_builtins.str]:
115
114
  """
116
115
  List of namespaces allowed to access this role. If set to "*" all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
117
116
  """
118
117
  return pulumi.get(self, "bound_service_account_namespaces")
119
118
 
120
- @property
119
+ @_builtins.property
121
120
  @pulumi.getter
122
- def id(self) -> builtins.str:
121
+ def id(self) -> _builtins.str:
123
122
  """
124
123
  The provider-assigned unique ID for this managed resource.
125
124
  """
126
125
  return pulumi.get(self, "id")
127
126
 
128
- @property
127
+ @_builtins.property
129
128
  @pulumi.getter
130
- def namespace(self) -> Optional[builtins.str]:
129
+ def namespace(self) -> Optional[_builtins.str]:
131
130
  return pulumi.get(self, "namespace")
132
131
 
133
- @property
132
+ @_builtins.property
134
133
  @pulumi.getter(name="roleName")
135
- def role_name(self) -> builtins.str:
134
+ def role_name(self) -> _builtins.str:
136
135
  return pulumi.get(self, "role_name")
137
136
 
138
- @property
137
+ @_builtins.property
139
138
  @pulumi.getter(name="tokenBoundCidrs")
140
- def token_bound_cidrs(self) -> Optional[Sequence[builtins.str]]:
139
+ def token_bound_cidrs(self) -> Optional[Sequence[_builtins.str]]:
141
140
  """
142
141
  List of CIDR blocks; if set, specifies blocks of IP
143
142
  addresses which can authenticate successfully, and ties the resulting token to these blocks
@@ -145,9 +144,9 @@ class GetAuthBackendRoleResult:
145
144
  """
146
145
  return pulumi.get(self, "token_bound_cidrs")
147
146
 
148
- @property
147
+ @_builtins.property
149
148
  @pulumi.getter(name="tokenExplicitMaxTtl")
150
- def token_explicit_max_ttl(self) -> Optional[builtins.int]:
149
+ def token_explicit_max_ttl(self) -> Optional[_builtins.int]:
151
150
  """
152
151
  If set, will encode an
153
152
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
@@ -156,27 +155,27 @@ class GetAuthBackendRoleResult:
156
155
  """
157
156
  return pulumi.get(self, "token_explicit_max_ttl")
158
157
 
159
- @property
158
+ @_builtins.property
160
159
  @pulumi.getter(name="tokenMaxTtl")
161
- def token_max_ttl(self) -> Optional[builtins.int]:
160
+ def token_max_ttl(self) -> Optional[_builtins.int]:
162
161
  """
163
162
  The maximum lifetime for generated tokens in number of seconds.
164
163
  Its current value will be referenced at renewal time.
165
164
  """
166
165
  return pulumi.get(self, "token_max_ttl")
167
166
 
168
- @property
167
+ @_builtins.property
169
168
  @pulumi.getter(name="tokenNoDefaultPolicy")
170
- def token_no_default_policy(self) -> Optional[builtins.bool]:
169
+ def token_no_default_policy(self) -> Optional[_builtins.bool]:
171
170
  """
172
171
  If set, the default policy will not be set on
173
172
  generated tokens; otherwise it will be added to the policies set in token_policies.
174
173
  """
175
174
  return pulumi.get(self, "token_no_default_policy")
176
175
 
177
- @property
176
+ @_builtins.property
178
177
  @pulumi.getter(name="tokenNumUses")
179
- def token_num_uses(self) -> Optional[builtins.int]:
178
+ def token_num_uses(self) -> Optional[_builtins.int]:
180
179
  """
181
180
  The
182
181
  [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
@@ -184,9 +183,9 @@ class GetAuthBackendRoleResult:
184
183
  """
185
184
  return pulumi.get(self, "token_num_uses")
186
185
 
187
- @property
186
+ @_builtins.property
188
187
  @pulumi.getter(name="tokenPeriod")
189
- def token_period(self) -> Optional[builtins.int]:
188
+ def token_period(self) -> Optional[_builtins.int]:
190
189
  """
191
190
  (Optional) If set, indicates that the
192
191
  token generated using this role should never expire. The token should be renewed within the
@@ -195,27 +194,27 @@ class GetAuthBackendRoleResult:
195
194
  """
196
195
  return pulumi.get(self, "token_period")
197
196
 
198
- @property
197
+ @_builtins.property
199
198
  @pulumi.getter(name="tokenPolicies")
200
- def token_policies(self) -> Optional[Sequence[builtins.str]]:
199
+ def token_policies(self) -> Optional[Sequence[_builtins.str]]:
201
200
  """
202
201
  List of policies to encode onto generated tokens. Depending
203
202
  on the auth method, this list may be supplemented by user/group/other values.
204
203
  """
205
204
  return pulumi.get(self, "token_policies")
206
205
 
207
- @property
206
+ @_builtins.property
208
207
  @pulumi.getter(name="tokenTtl")
209
- def token_ttl(self) -> Optional[builtins.int]:
208
+ def token_ttl(self) -> Optional[_builtins.int]:
210
209
  """
211
210
  The incremental lifetime for generated tokens in number of seconds.
212
211
  Its current value will be referenced at renewal time.
213
212
  """
214
213
  return pulumi.get(self, "token_ttl")
215
214
 
216
- @property
215
+ @_builtins.property
217
216
  @pulumi.getter(name="tokenType")
218
- def token_type(self) -> Optional[builtins.str]:
217
+ def token_type(self) -> Optional[_builtins.str]:
219
218
  """
220
219
  The type of token that should be generated. Can be `service`,
221
220
  `batch`, or `default` to use the mount's tuned default (which unless changed will be
@@ -251,19 +250,19 @@ class AwaitableGetAuthBackendRoleResult(GetAuthBackendRoleResult):
251
250
  token_type=self.token_type)
252
251
 
253
252
 
254
- def get_auth_backend_role(audience: Optional[builtins.str] = None,
255
- backend: Optional[builtins.str] = None,
256
- namespace: Optional[builtins.str] = None,
257
- role_name: Optional[builtins.str] = None,
258
- token_bound_cidrs: Optional[Sequence[builtins.str]] = None,
259
- token_explicit_max_ttl: Optional[builtins.int] = None,
260
- token_max_ttl: Optional[builtins.int] = None,
261
- token_no_default_policy: Optional[builtins.bool] = None,
262
- token_num_uses: Optional[builtins.int] = None,
263
- token_period: Optional[builtins.int] = None,
264
- token_policies: Optional[Sequence[builtins.str]] = None,
265
- token_ttl: Optional[builtins.int] = None,
266
- token_type: Optional[builtins.str] = None,
253
+ def get_auth_backend_role(audience: Optional[_builtins.str] = None,
254
+ backend: Optional[_builtins.str] = None,
255
+ namespace: Optional[_builtins.str] = None,
256
+ role_name: Optional[_builtins.str] = None,
257
+ token_bound_cidrs: Optional[Sequence[_builtins.str]] = None,
258
+ token_explicit_max_ttl: Optional[_builtins.int] = None,
259
+ token_max_ttl: Optional[_builtins.int] = None,
260
+ token_no_default_policy: Optional[_builtins.bool] = None,
261
+ token_num_uses: Optional[_builtins.int] = None,
262
+ token_period: Optional[_builtins.int] = None,
263
+ token_policies: Optional[Sequence[_builtins.str]] = None,
264
+ token_ttl: Optional[_builtins.int] = None,
265
+ token_type: Optional[_builtins.str] = None,
267
266
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendRoleResult:
268
267
  """
269
268
  Reads the Role of an Kubernetes from a Vault server. See the [Vault
@@ -271,37 +270,37 @@ def get_auth_backend_role(audience: Optional[builtins.str] = None,
271
270
  information.
272
271
 
273
272
 
274
- :param builtins.str audience: Audience claim to verify in the JWT.
275
- :param builtins.str backend: The unique name for the Kubernetes backend the role to
273
+ :param _builtins.str audience: Audience claim to verify in the JWT.
274
+ :param _builtins.str backend: The unique name for the Kubernetes backend the role to
276
275
  retrieve Role attributes for resides in. Defaults to "kubernetes".
277
- :param builtins.str namespace: The namespace of the target resource.
276
+ :param _builtins.str namespace: The namespace of the target resource.
278
277
  The value should not contain leading or trailing forward slashes.
279
278
  The `namespace` is always relative to the provider's configured namespace.
280
279
  *Available only for Vault Enterprise*.
281
- :param builtins.str role_name: The name of the role to retrieve the Role attributes for.
282
- :param Sequence[builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
280
+ :param _builtins.str role_name: The name of the role to retrieve the Role attributes for.
281
+ :param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
283
282
  addresses which can authenticate successfully, and ties the resulting token to these blocks
284
283
  as well.
285
- :param builtins.int token_explicit_max_ttl: If set, will encode an
284
+ :param _builtins.int token_explicit_max_ttl: If set, will encode an
286
285
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
287
286
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
288
287
  `token_max_ttl` would otherwise allow a renewal.
289
- :param builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
288
+ :param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
290
289
  Its current value will be referenced at renewal time.
291
- :param builtins.bool token_no_default_policy: If set, the default policy will not be set on
290
+ :param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
292
291
  generated tokens; otherwise it will be added to the policies set in token_policies.
293
- :param builtins.int token_num_uses: The
292
+ :param _builtins.int token_num_uses: The
294
293
  [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
295
294
  if any, in number of seconds to set on the token.
296
- :param builtins.int token_period: (Optional) If set, indicates that the
295
+ :param _builtins.int token_period: (Optional) If set, indicates that the
297
296
  token generated using this role should never expire. The token should be renewed within the
298
297
  duration specified by this value. At each renewal, the token's TTL will be set to the
299
298
  value of this field. Specified in seconds.
300
- :param Sequence[builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
299
+ :param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
301
300
  on the auth method, this list may be supplemented by user/group/other values.
302
- :param builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
301
+ :param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
303
302
  Its current value will be referenced at renewal time.
304
- :param builtins.str token_type: The type of token that should be generated. Can be `service`,
303
+ :param _builtins.str token_type: The type of token that should be generated. Can be `service`,
305
304
  `batch`, or `default` to use the mount's tuned default (which unless changed will be
306
305
  `service` tokens). For token store roles, there are two additional possibilities:
307
306
  `default-service` and `default-batch` which specify the type to return unless the client
@@ -342,19 +341,19 @@ def get_auth_backend_role(audience: Optional[builtins.str] = None,
342
341
  token_policies=pulumi.get(__ret__, 'token_policies'),
343
342
  token_ttl=pulumi.get(__ret__, 'token_ttl'),
344
343
  token_type=pulumi.get(__ret__, 'token_type'))
345
- def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[builtins.str]]] = None,
346
- backend: Optional[pulumi.Input[Optional[builtins.str]]] = None,
347
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
348
- role_name: Optional[pulumi.Input[builtins.str]] = None,
349
- token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[builtins.str]]]] = None,
350
- token_explicit_max_ttl: Optional[pulumi.Input[Optional[builtins.int]]] = None,
351
- token_max_ttl: Optional[pulumi.Input[Optional[builtins.int]]] = None,
352
- token_no_default_policy: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
353
- token_num_uses: Optional[pulumi.Input[Optional[builtins.int]]] = None,
354
- token_period: Optional[pulumi.Input[Optional[builtins.int]]] = None,
355
- token_policies: Optional[pulumi.Input[Optional[Sequence[builtins.str]]]] = None,
356
- token_ttl: Optional[pulumi.Input[Optional[builtins.int]]] = None,
357
- token_type: Optional[pulumi.Input[Optional[builtins.str]]] = None,
344
+ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
345
+ backend: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
346
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
347
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
348
+ token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
349
+ token_explicit_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
350
+ token_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
351
+ token_no_default_policy: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
352
+ token_num_uses: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
353
+ token_period: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
354
+ token_policies: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
355
+ token_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
356
+ token_type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
358
357
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleResult]:
359
358
  """
360
359
  Reads the Role of an Kubernetes from a Vault server. See the [Vault
@@ -362,37 +361,37 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[builti
362
361
  information.
363
362
 
364
363
 
365
- :param builtins.str audience: Audience claim to verify in the JWT.
366
- :param builtins.str backend: The unique name for the Kubernetes backend the role to
364
+ :param _builtins.str audience: Audience claim to verify in the JWT.
365
+ :param _builtins.str backend: The unique name for the Kubernetes backend the role to
367
366
  retrieve Role attributes for resides in. Defaults to "kubernetes".
368
- :param builtins.str namespace: The namespace of the target resource.
367
+ :param _builtins.str namespace: The namespace of the target resource.
369
368
  The value should not contain leading or trailing forward slashes.
370
369
  The `namespace` is always relative to the provider's configured namespace.
371
370
  *Available only for Vault Enterprise*.
372
- :param builtins.str role_name: The name of the role to retrieve the Role attributes for.
373
- :param Sequence[builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
371
+ :param _builtins.str role_name: The name of the role to retrieve the Role attributes for.
372
+ :param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
374
373
  addresses which can authenticate successfully, and ties the resulting token to these blocks
375
374
  as well.
376
- :param builtins.int token_explicit_max_ttl: If set, will encode an
375
+ :param _builtins.int token_explicit_max_ttl: If set, will encode an
377
376
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
378
377
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
379
378
  `token_max_ttl` would otherwise allow a renewal.
380
- :param builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
379
+ :param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
381
380
  Its current value will be referenced at renewal time.
382
- :param builtins.bool token_no_default_policy: If set, the default policy will not be set on
381
+ :param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
383
382
  generated tokens; otherwise it will be added to the policies set in token_policies.
384
- :param builtins.int token_num_uses: The
383
+ :param _builtins.int token_num_uses: The
385
384
  [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
386
385
  if any, in number of seconds to set on the token.
387
- :param builtins.int token_period: (Optional) If set, indicates that the
386
+ :param _builtins.int token_period: (Optional) If set, indicates that the
388
387
  token generated using this role should never expire. The token should be renewed within the
389
388
  duration specified by this value. At each renewal, the token's TTL will be set to the
390
389
  value of this field. Specified in seconds.
391
- :param Sequence[builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
390
+ :param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
392
391
  on the auth method, this list may be supplemented by user/group/other values.
393
- :param builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
392
+ :param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
394
393
  Its current value will be referenced at renewal time.
395
- :param builtins.str token_type: The type of token that should be generated. Can be `service`,
394
+ :param _builtins.str token_type: The type of token that should be generated. Can be `service`,
396
395
  `batch`, or `default` to use the mount's tuned default (which unless changed will be
397
396
  `service` tokens). For token store roles, there are two additional possibilities:
398
397
  `default-service` and `default-batch` which specify the type to return unless the client