pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,344 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetServiceAccountTokenResult',
19
+ 'AwaitableGetServiceAccountTokenResult',
20
+ 'get_service_account_token',
21
+ 'get_service_account_token_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetServiceAccountTokenResult:
26
+ """
27
+ A collection of values returned by getServiceAccountToken.
28
+ """
29
+ def __init__(__self__, backend=None, cluster_role_binding=None, id=None, kubernetes_namespace=None, lease_duration=None, lease_id=None, lease_renewable=None, namespace=None, role=None, service_account_name=None, service_account_namespace=None, service_account_token=None, ttl=None):
30
+ if backend and not isinstance(backend, str):
31
+ raise TypeError("Expected argument 'backend' to be a str")
32
+ pulumi.set(__self__, "backend", backend)
33
+ if cluster_role_binding and not isinstance(cluster_role_binding, bool):
34
+ raise TypeError("Expected argument 'cluster_role_binding' to be a bool")
35
+ pulumi.set(__self__, "cluster_role_binding", cluster_role_binding)
36
+ if id and not isinstance(id, str):
37
+ raise TypeError("Expected argument 'id' to be a str")
38
+ pulumi.set(__self__, "id", id)
39
+ if kubernetes_namespace and not isinstance(kubernetes_namespace, str):
40
+ raise TypeError("Expected argument 'kubernetes_namespace' to be a str")
41
+ pulumi.set(__self__, "kubernetes_namespace", kubernetes_namespace)
42
+ if lease_duration and not isinstance(lease_duration, int):
43
+ raise TypeError("Expected argument 'lease_duration' to be a int")
44
+ pulumi.set(__self__, "lease_duration", lease_duration)
45
+ if lease_id and not isinstance(lease_id, str):
46
+ raise TypeError("Expected argument 'lease_id' to be a str")
47
+ pulumi.set(__self__, "lease_id", lease_id)
48
+ if lease_renewable and not isinstance(lease_renewable, bool):
49
+ raise TypeError("Expected argument 'lease_renewable' to be a bool")
50
+ pulumi.set(__self__, "lease_renewable", lease_renewable)
51
+ if namespace and not isinstance(namespace, str):
52
+ raise TypeError("Expected argument 'namespace' to be a str")
53
+ pulumi.set(__self__, "namespace", namespace)
54
+ if role and not isinstance(role, str):
55
+ raise TypeError("Expected argument 'role' to be a str")
56
+ pulumi.set(__self__, "role", role)
57
+ if service_account_name and not isinstance(service_account_name, str):
58
+ raise TypeError("Expected argument 'service_account_name' to be a str")
59
+ pulumi.set(__self__, "service_account_name", service_account_name)
60
+ if service_account_namespace and not isinstance(service_account_namespace, str):
61
+ raise TypeError("Expected argument 'service_account_namespace' to be a str")
62
+ pulumi.set(__self__, "service_account_namespace", service_account_namespace)
63
+ if service_account_token and not isinstance(service_account_token, str):
64
+ raise TypeError("Expected argument 'service_account_token' to be a str")
65
+ pulumi.set(__self__, "service_account_token", service_account_token)
66
+ if ttl and not isinstance(ttl, str):
67
+ raise TypeError("Expected argument 'ttl' to be a str")
68
+ pulumi.set(__self__, "ttl", ttl)
69
+
70
+ @_builtins.property
71
+ @pulumi.getter
72
+ def backend(self) -> _builtins.str:
73
+ return pulumi.get(self, "backend")
74
+
75
+ @_builtins.property
76
+ @pulumi.getter(name="clusterRoleBinding")
77
+ def cluster_role_binding(self) -> Optional[_builtins.bool]:
78
+ return pulumi.get(self, "cluster_role_binding")
79
+
80
+ @_builtins.property
81
+ @pulumi.getter
82
+ def id(self) -> _builtins.str:
83
+ """
84
+ The provider-assigned unique ID for this managed resource.
85
+ """
86
+ return pulumi.get(self, "id")
87
+
88
+ @_builtins.property
89
+ @pulumi.getter(name="kubernetesNamespace")
90
+ def kubernetes_namespace(self) -> _builtins.str:
91
+ return pulumi.get(self, "kubernetes_namespace")
92
+
93
+ @_builtins.property
94
+ @pulumi.getter(name="leaseDuration")
95
+ def lease_duration(self) -> _builtins.int:
96
+ """
97
+ The duration of the lease in seconds.
98
+ """
99
+ return pulumi.get(self, "lease_duration")
100
+
101
+ @_builtins.property
102
+ @pulumi.getter(name="leaseId")
103
+ def lease_id(self) -> _builtins.str:
104
+ """
105
+ The lease identifier assigned by Vault.
106
+ """
107
+ return pulumi.get(self, "lease_id")
108
+
109
+ @_builtins.property
110
+ @pulumi.getter(name="leaseRenewable")
111
+ def lease_renewable(self) -> _builtins.bool:
112
+ """
113
+ True if the duration of this lease can be extended through renewal.
114
+ """
115
+ return pulumi.get(self, "lease_renewable")
116
+
117
+ @_builtins.property
118
+ @pulumi.getter
119
+ def namespace(self) -> Optional[_builtins.str]:
120
+ return pulumi.get(self, "namespace")
121
+
122
+ @_builtins.property
123
+ @pulumi.getter
124
+ def role(self) -> _builtins.str:
125
+ return pulumi.get(self, "role")
126
+
127
+ @_builtins.property
128
+ @pulumi.getter(name="serviceAccountName")
129
+ def service_account_name(self) -> _builtins.str:
130
+ """
131
+ The name of the service account associated with the token.
132
+ """
133
+ return pulumi.get(self, "service_account_name")
134
+
135
+ @_builtins.property
136
+ @pulumi.getter(name="serviceAccountNamespace")
137
+ def service_account_namespace(self) -> _builtins.str:
138
+ """
139
+ The Kubernetes namespace that the service account resides in.
140
+ """
141
+ return pulumi.get(self, "service_account_namespace")
142
+
143
+ @_builtins.property
144
+ @pulumi.getter(name="serviceAccountToken")
145
+ def service_account_token(self) -> _builtins.str:
146
+ """
147
+ The Kubernetes service account token.
148
+ """
149
+ return pulumi.get(self, "service_account_token")
150
+
151
+ @_builtins.property
152
+ @pulumi.getter
153
+ def ttl(self) -> Optional[_builtins.str]:
154
+ return pulumi.get(self, "ttl")
155
+
156
+
157
+ class AwaitableGetServiceAccountTokenResult(GetServiceAccountTokenResult):
158
+ # pylint: disable=using-constant-test
159
+ def __await__(self):
160
+ if False:
161
+ yield self
162
+ return GetServiceAccountTokenResult(
163
+ backend=self.backend,
164
+ cluster_role_binding=self.cluster_role_binding,
165
+ id=self.id,
166
+ kubernetes_namespace=self.kubernetes_namespace,
167
+ lease_duration=self.lease_duration,
168
+ lease_id=self.lease_id,
169
+ lease_renewable=self.lease_renewable,
170
+ namespace=self.namespace,
171
+ role=self.role,
172
+ service_account_name=self.service_account_name,
173
+ service_account_namespace=self.service_account_namespace,
174
+ service_account_token=self.service_account_token,
175
+ ttl=self.ttl)
176
+
177
+
178
+ def get_service_account_token(backend: Optional[_builtins.str] = None,
179
+ cluster_role_binding: Optional[_builtins.bool] = None,
180
+ kubernetes_namespace: Optional[_builtins.str] = None,
181
+ namespace: Optional[_builtins.str] = None,
182
+ role: Optional[_builtins.str] = None,
183
+ ttl: Optional[_builtins.str] = None,
184
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetServiceAccountTokenResult:
185
+ """
186
+ ## Example Usage
187
+
188
+ ```python
189
+ import pulumi
190
+ import pulumi_std as std
191
+ import pulumi_vault as vault
192
+
193
+ config = vault.kubernetes.SecretBackend("config",
194
+ path="kubernetes",
195
+ description="kubernetes secrets engine description",
196
+ kubernetes_host="https://127.0.0.1:61233",
197
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
198
+ service_account_jwt=std.file(input="/path/to/token").result,
199
+ disable_local_ca_jwt=False)
200
+ role = vault.kubernetes.SecretBackendRole("role",
201
+ backend=config.path,
202
+ name="service-account-name-role",
203
+ allowed_kubernetes_namespaces=["*"],
204
+ token_max_ttl=43200,
205
+ token_default_ttl=21600,
206
+ service_account_name="test-service-account-with-generated-token",
207
+ extra_labels={
208
+ "id": "abc123",
209
+ "name": "some_name",
210
+ },
211
+ extra_annotations={
212
+ "env": "development",
213
+ "location": "earth",
214
+ })
215
+ token = vault.kubernetes.get_service_account_token_output(backend=config.path,
216
+ role=role.name,
217
+ kubernetes_namespace="test",
218
+ cluster_role_binding=False,
219
+ ttl="1h")
220
+ ```
221
+
222
+
223
+ :param _builtins.str backend: The Kubernetes secret backend to generate service account
224
+ tokens from.
225
+ :param _builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
226
+ permissions across the whole cluster instead of within a namespace.
227
+ :param _builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
228
+ generate the credentials.
229
+ :param _builtins.str namespace: The namespace of the target resource.
230
+ The value should not contain leading or trailing forward slashes.
231
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
232
+ *Available only for Vault Enterprise*.
233
+ :param _builtins.str role: The name of the Kubernetes secret backend role to generate service
234
+ account tokens from.
235
+ :param _builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
236
+ seconds or as a Go duration format string.
237
+ """
238
+ __args__ = dict()
239
+ __args__['backend'] = backend
240
+ __args__['clusterRoleBinding'] = cluster_role_binding
241
+ __args__['kubernetesNamespace'] = kubernetes_namespace
242
+ __args__['namespace'] = namespace
243
+ __args__['role'] = role
244
+ __args__['ttl'] = ttl
245
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
246
+ __ret__ = pulumi.runtime.invoke('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult).value
247
+
248
+ return AwaitableGetServiceAccountTokenResult(
249
+ backend=pulumi.get(__ret__, 'backend'),
250
+ cluster_role_binding=pulumi.get(__ret__, 'cluster_role_binding'),
251
+ id=pulumi.get(__ret__, 'id'),
252
+ kubernetes_namespace=pulumi.get(__ret__, 'kubernetes_namespace'),
253
+ lease_duration=pulumi.get(__ret__, 'lease_duration'),
254
+ lease_id=pulumi.get(__ret__, 'lease_id'),
255
+ lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
256
+ namespace=pulumi.get(__ret__, 'namespace'),
257
+ role=pulumi.get(__ret__, 'role'),
258
+ service_account_name=pulumi.get(__ret__, 'service_account_name'),
259
+ service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
260
+ service_account_token=pulumi.get(__ret__, 'service_account_token'),
261
+ ttl=pulumi.get(__ret__, 'ttl'))
262
+ def get_service_account_token_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
263
+ cluster_role_binding: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
264
+ kubernetes_namespace: Optional[pulumi.Input[_builtins.str]] = None,
265
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
266
+ role: Optional[pulumi.Input[_builtins.str]] = None,
267
+ ttl: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
268
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetServiceAccountTokenResult]:
269
+ """
270
+ ## Example Usage
271
+
272
+ ```python
273
+ import pulumi
274
+ import pulumi_std as std
275
+ import pulumi_vault as vault
276
+
277
+ config = vault.kubernetes.SecretBackend("config",
278
+ path="kubernetes",
279
+ description="kubernetes secrets engine description",
280
+ kubernetes_host="https://127.0.0.1:61233",
281
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
282
+ service_account_jwt=std.file(input="/path/to/token").result,
283
+ disable_local_ca_jwt=False)
284
+ role = vault.kubernetes.SecretBackendRole("role",
285
+ backend=config.path,
286
+ name="service-account-name-role",
287
+ allowed_kubernetes_namespaces=["*"],
288
+ token_max_ttl=43200,
289
+ token_default_ttl=21600,
290
+ service_account_name="test-service-account-with-generated-token",
291
+ extra_labels={
292
+ "id": "abc123",
293
+ "name": "some_name",
294
+ },
295
+ extra_annotations={
296
+ "env": "development",
297
+ "location": "earth",
298
+ })
299
+ token = vault.kubernetes.get_service_account_token_output(backend=config.path,
300
+ role=role.name,
301
+ kubernetes_namespace="test",
302
+ cluster_role_binding=False,
303
+ ttl="1h")
304
+ ```
305
+
306
+
307
+ :param _builtins.str backend: The Kubernetes secret backend to generate service account
308
+ tokens from.
309
+ :param _builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
310
+ permissions across the whole cluster instead of within a namespace.
311
+ :param _builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
312
+ generate the credentials.
313
+ :param _builtins.str namespace: The namespace of the target resource.
314
+ The value should not contain leading or trailing forward slashes.
315
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
316
+ *Available only for Vault Enterprise*.
317
+ :param _builtins.str role: The name of the Kubernetes secret backend role to generate service
318
+ account tokens from.
319
+ :param _builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
320
+ seconds or as a Go duration format string.
321
+ """
322
+ __args__ = dict()
323
+ __args__['backend'] = backend
324
+ __args__['clusterRoleBinding'] = cluster_role_binding
325
+ __args__['kubernetesNamespace'] = kubernetes_namespace
326
+ __args__['namespace'] = namespace
327
+ __args__['role'] = role
328
+ __args__['ttl'] = ttl
329
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
330
+ __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult)
331
+ return __ret__.apply(lambda __response__: GetServiceAccountTokenResult(
332
+ backend=pulumi.get(__response__, 'backend'),
333
+ cluster_role_binding=pulumi.get(__response__, 'cluster_role_binding'),
334
+ id=pulumi.get(__response__, 'id'),
335
+ kubernetes_namespace=pulumi.get(__response__, 'kubernetes_namespace'),
336
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
337
+ lease_id=pulumi.get(__response__, 'lease_id'),
338
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
339
+ namespace=pulumi.get(__response__, 'namespace'),
340
+ role=pulumi.get(__response__, 'role'),
341
+ service_account_name=pulumi.get(__response__, 'service_account_name'),
342
+ service_account_namespace=pulumi.get(__response__, 'service_account_namespace'),
343
+ service_account_token=pulumi.get(__response__, 'service_account_token'),
344
+ ttl=pulumi.get(__response__, 'ttl')))