pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,344 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetServiceAccountTokenResult',
|
|
19
|
+
'AwaitableGetServiceAccountTokenResult',
|
|
20
|
+
'get_service_account_token',
|
|
21
|
+
'get_service_account_token_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetServiceAccountTokenResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getServiceAccountToken.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, backend=None, cluster_role_binding=None, id=None, kubernetes_namespace=None, lease_duration=None, lease_id=None, lease_renewable=None, namespace=None, role=None, service_account_name=None, service_account_namespace=None, service_account_token=None, ttl=None):
|
|
30
|
+
if backend and not isinstance(backend, str):
|
|
31
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
|
32
|
+
pulumi.set(__self__, "backend", backend)
|
|
33
|
+
if cluster_role_binding and not isinstance(cluster_role_binding, bool):
|
|
34
|
+
raise TypeError("Expected argument 'cluster_role_binding' to be a bool")
|
|
35
|
+
pulumi.set(__self__, "cluster_role_binding", cluster_role_binding)
|
|
36
|
+
if id and not isinstance(id, str):
|
|
37
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
38
|
+
pulumi.set(__self__, "id", id)
|
|
39
|
+
if kubernetes_namespace and not isinstance(kubernetes_namespace, str):
|
|
40
|
+
raise TypeError("Expected argument 'kubernetes_namespace' to be a str")
|
|
41
|
+
pulumi.set(__self__, "kubernetes_namespace", kubernetes_namespace)
|
|
42
|
+
if lease_duration and not isinstance(lease_duration, int):
|
|
43
|
+
raise TypeError("Expected argument 'lease_duration' to be a int")
|
|
44
|
+
pulumi.set(__self__, "lease_duration", lease_duration)
|
|
45
|
+
if lease_id and not isinstance(lease_id, str):
|
|
46
|
+
raise TypeError("Expected argument 'lease_id' to be a str")
|
|
47
|
+
pulumi.set(__self__, "lease_id", lease_id)
|
|
48
|
+
if lease_renewable and not isinstance(lease_renewable, bool):
|
|
49
|
+
raise TypeError("Expected argument 'lease_renewable' to be a bool")
|
|
50
|
+
pulumi.set(__self__, "lease_renewable", lease_renewable)
|
|
51
|
+
if namespace and not isinstance(namespace, str):
|
|
52
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
53
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
54
|
+
if role and not isinstance(role, str):
|
|
55
|
+
raise TypeError("Expected argument 'role' to be a str")
|
|
56
|
+
pulumi.set(__self__, "role", role)
|
|
57
|
+
if service_account_name and not isinstance(service_account_name, str):
|
|
58
|
+
raise TypeError("Expected argument 'service_account_name' to be a str")
|
|
59
|
+
pulumi.set(__self__, "service_account_name", service_account_name)
|
|
60
|
+
if service_account_namespace and not isinstance(service_account_namespace, str):
|
|
61
|
+
raise TypeError("Expected argument 'service_account_namespace' to be a str")
|
|
62
|
+
pulumi.set(__self__, "service_account_namespace", service_account_namespace)
|
|
63
|
+
if service_account_token and not isinstance(service_account_token, str):
|
|
64
|
+
raise TypeError("Expected argument 'service_account_token' to be a str")
|
|
65
|
+
pulumi.set(__self__, "service_account_token", service_account_token)
|
|
66
|
+
if ttl and not isinstance(ttl, str):
|
|
67
|
+
raise TypeError("Expected argument 'ttl' to be a str")
|
|
68
|
+
pulumi.set(__self__, "ttl", ttl)
|
|
69
|
+
|
|
70
|
+
@_builtins.property
|
|
71
|
+
@pulumi.getter
|
|
72
|
+
def backend(self) -> _builtins.str:
|
|
73
|
+
return pulumi.get(self, "backend")
|
|
74
|
+
|
|
75
|
+
@_builtins.property
|
|
76
|
+
@pulumi.getter(name="clusterRoleBinding")
|
|
77
|
+
def cluster_role_binding(self) -> Optional[_builtins.bool]:
|
|
78
|
+
return pulumi.get(self, "cluster_role_binding")
|
|
79
|
+
|
|
80
|
+
@_builtins.property
|
|
81
|
+
@pulumi.getter
|
|
82
|
+
def id(self) -> _builtins.str:
|
|
83
|
+
"""
|
|
84
|
+
The provider-assigned unique ID for this managed resource.
|
|
85
|
+
"""
|
|
86
|
+
return pulumi.get(self, "id")
|
|
87
|
+
|
|
88
|
+
@_builtins.property
|
|
89
|
+
@pulumi.getter(name="kubernetesNamespace")
|
|
90
|
+
def kubernetes_namespace(self) -> _builtins.str:
|
|
91
|
+
return pulumi.get(self, "kubernetes_namespace")
|
|
92
|
+
|
|
93
|
+
@_builtins.property
|
|
94
|
+
@pulumi.getter(name="leaseDuration")
|
|
95
|
+
def lease_duration(self) -> _builtins.int:
|
|
96
|
+
"""
|
|
97
|
+
The duration of the lease in seconds.
|
|
98
|
+
"""
|
|
99
|
+
return pulumi.get(self, "lease_duration")
|
|
100
|
+
|
|
101
|
+
@_builtins.property
|
|
102
|
+
@pulumi.getter(name="leaseId")
|
|
103
|
+
def lease_id(self) -> _builtins.str:
|
|
104
|
+
"""
|
|
105
|
+
The lease identifier assigned by Vault.
|
|
106
|
+
"""
|
|
107
|
+
return pulumi.get(self, "lease_id")
|
|
108
|
+
|
|
109
|
+
@_builtins.property
|
|
110
|
+
@pulumi.getter(name="leaseRenewable")
|
|
111
|
+
def lease_renewable(self) -> _builtins.bool:
|
|
112
|
+
"""
|
|
113
|
+
True if the duration of this lease can be extended through renewal.
|
|
114
|
+
"""
|
|
115
|
+
return pulumi.get(self, "lease_renewable")
|
|
116
|
+
|
|
117
|
+
@_builtins.property
|
|
118
|
+
@pulumi.getter
|
|
119
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
120
|
+
return pulumi.get(self, "namespace")
|
|
121
|
+
|
|
122
|
+
@_builtins.property
|
|
123
|
+
@pulumi.getter
|
|
124
|
+
def role(self) -> _builtins.str:
|
|
125
|
+
return pulumi.get(self, "role")
|
|
126
|
+
|
|
127
|
+
@_builtins.property
|
|
128
|
+
@pulumi.getter(name="serviceAccountName")
|
|
129
|
+
def service_account_name(self) -> _builtins.str:
|
|
130
|
+
"""
|
|
131
|
+
The name of the service account associated with the token.
|
|
132
|
+
"""
|
|
133
|
+
return pulumi.get(self, "service_account_name")
|
|
134
|
+
|
|
135
|
+
@_builtins.property
|
|
136
|
+
@pulumi.getter(name="serviceAccountNamespace")
|
|
137
|
+
def service_account_namespace(self) -> _builtins.str:
|
|
138
|
+
"""
|
|
139
|
+
The Kubernetes namespace that the service account resides in.
|
|
140
|
+
"""
|
|
141
|
+
return pulumi.get(self, "service_account_namespace")
|
|
142
|
+
|
|
143
|
+
@_builtins.property
|
|
144
|
+
@pulumi.getter(name="serviceAccountToken")
|
|
145
|
+
def service_account_token(self) -> _builtins.str:
|
|
146
|
+
"""
|
|
147
|
+
The Kubernetes service account token.
|
|
148
|
+
"""
|
|
149
|
+
return pulumi.get(self, "service_account_token")
|
|
150
|
+
|
|
151
|
+
@_builtins.property
|
|
152
|
+
@pulumi.getter
|
|
153
|
+
def ttl(self) -> Optional[_builtins.str]:
|
|
154
|
+
return pulumi.get(self, "ttl")
|
|
155
|
+
|
|
156
|
+
|
|
157
|
+
class AwaitableGetServiceAccountTokenResult(GetServiceAccountTokenResult):
|
|
158
|
+
# pylint: disable=using-constant-test
|
|
159
|
+
def __await__(self):
|
|
160
|
+
if False:
|
|
161
|
+
yield self
|
|
162
|
+
return GetServiceAccountTokenResult(
|
|
163
|
+
backend=self.backend,
|
|
164
|
+
cluster_role_binding=self.cluster_role_binding,
|
|
165
|
+
id=self.id,
|
|
166
|
+
kubernetes_namespace=self.kubernetes_namespace,
|
|
167
|
+
lease_duration=self.lease_duration,
|
|
168
|
+
lease_id=self.lease_id,
|
|
169
|
+
lease_renewable=self.lease_renewable,
|
|
170
|
+
namespace=self.namespace,
|
|
171
|
+
role=self.role,
|
|
172
|
+
service_account_name=self.service_account_name,
|
|
173
|
+
service_account_namespace=self.service_account_namespace,
|
|
174
|
+
service_account_token=self.service_account_token,
|
|
175
|
+
ttl=self.ttl)
|
|
176
|
+
|
|
177
|
+
|
|
178
|
+
def get_service_account_token(backend: Optional[_builtins.str] = None,
|
|
179
|
+
cluster_role_binding: Optional[_builtins.bool] = None,
|
|
180
|
+
kubernetes_namespace: Optional[_builtins.str] = None,
|
|
181
|
+
namespace: Optional[_builtins.str] = None,
|
|
182
|
+
role: Optional[_builtins.str] = None,
|
|
183
|
+
ttl: Optional[_builtins.str] = None,
|
|
184
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetServiceAccountTokenResult:
|
|
185
|
+
"""
|
|
186
|
+
## Example Usage
|
|
187
|
+
|
|
188
|
+
```python
|
|
189
|
+
import pulumi
|
|
190
|
+
import pulumi_std as std
|
|
191
|
+
import pulumi_vault as vault
|
|
192
|
+
|
|
193
|
+
config = vault.kubernetes.SecretBackend("config",
|
|
194
|
+
path="kubernetes",
|
|
195
|
+
description="kubernetes secrets engine description",
|
|
196
|
+
kubernetes_host="https://127.0.0.1:61233",
|
|
197
|
+
kubernetes_ca_cert=std.file(input="/path/to/cert").result,
|
|
198
|
+
service_account_jwt=std.file(input="/path/to/token").result,
|
|
199
|
+
disable_local_ca_jwt=False)
|
|
200
|
+
role = vault.kubernetes.SecretBackendRole("role",
|
|
201
|
+
backend=config.path,
|
|
202
|
+
name="service-account-name-role",
|
|
203
|
+
allowed_kubernetes_namespaces=["*"],
|
|
204
|
+
token_max_ttl=43200,
|
|
205
|
+
token_default_ttl=21600,
|
|
206
|
+
service_account_name="test-service-account-with-generated-token",
|
|
207
|
+
extra_labels={
|
|
208
|
+
"id": "abc123",
|
|
209
|
+
"name": "some_name",
|
|
210
|
+
},
|
|
211
|
+
extra_annotations={
|
|
212
|
+
"env": "development",
|
|
213
|
+
"location": "earth",
|
|
214
|
+
})
|
|
215
|
+
token = vault.kubernetes.get_service_account_token_output(backend=config.path,
|
|
216
|
+
role=role.name,
|
|
217
|
+
kubernetes_namespace="test",
|
|
218
|
+
cluster_role_binding=False,
|
|
219
|
+
ttl="1h")
|
|
220
|
+
```
|
|
221
|
+
|
|
222
|
+
|
|
223
|
+
:param _builtins.str backend: The Kubernetes secret backend to generate service account
|
|
224
|
+
tokens from.
|
|
225
|
+
:param _builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
|
|
226
|
+
permissions across the whole cluster instead of within a namespace.
|
|
227
|
+
:param _builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
|
|
228
|
+
generate the credentials.
|
|
229
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
230
|
+
The value should not contain leading or trailing forward slashes.
|
|
231
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
232
|
+
*Available only for Vault Enterprise*.
|
|
233
|
+
:param _builtins.str role: The name of the Kubernetes secret backend role to generate service
|
|
234
|
+
account tokens from.
|
|
235
|
+
:param _builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
|
|
236
|
+
seconds or as a Go duration format string.
|
|
237
|
+
"""
|
|
238
|
+
__args__ = dict()
|
|
239
|
+
__args__['backend'] = backend
|
|
240
|
+
__args__['clusterRoleBinding'] = cluster_role_binding
|
|
241
|
+
__args__['kubernetesNamespace'] = kubernetes_namespace
|
|
242
|
+
__args__['namespace'] = namespace
|
|
243
|
+
__args__['role'] = role
|
|
244
|
+
__args__['ttl'] = ttl
|
|
245
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
246
|
+
__ret__ = pulumi.runtime.invoke('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult).value
|
|
247
|
+
|
|
248
|
+
return AwaitableGetServiceAccountTokenResult(
|
|
249
|
+
backend=pulumi.get(__ret__, 'backend'),
|
|
250
|
+
cluster_role_binding=pulumi.get(__ret__, 'cluster_role_binding'),
|
|
251
|
+
id=pulumi.get(__ret__, 'id'),
|
|
252
|
+
kubernetes_namespace=pulumi.get(__ret__, 'kubernetes_namespace'),
|
|
253
|
+
lease_duration=pulumi.get(__ret__, 'lease_duration'),
|
|
254
|
+
lease_id=pulumi.get(__ret__, 'lease_id'),
|
|
255
|
+
lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
|
|
256
|
+
namespace=pulumi.get(__ret__, 'namespace'),
|
|
257
|
+
role=pulumi.get(__ret__, 'role'),
|
|
258
|
+
service_account_name=pulumi.get(__ret__, 'service_account_name'),
|
|
259
|
+
service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
|
|
260
|
+
service_account_token=pulumi.get(__ret__, 'service_account_token'),
|
|
261
|
+
ttl=pulumi.get(__ret__, 'ttl'))
|
|
262
|
+
def get_service_account_token_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
263
|
+
cluster_role_binding: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
|
264
|
+
kubernetes_namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
265
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
266
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
|
267
|
+
ttl: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
268
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetServiceAccountTokenResult]:
|
|
269
|
+
"""
|
|
270
|
+
## Example Usage
|
|
271
|
+
|
|
272
|
+
```python
|
|
273
|
+
import pulumi
|
|
274
|
+
import pulumi_std as std
|
|
275
|
+
import pulumi_vault as vault
|
|
276
|
+
|
|
277
|
+
config = vault.kubernetes.SecretBackend("config",
|
|
278
|
+
path="kubernetes",
|
|
279
|
+
description="kubernetes secrets engine description",
|
|
280
|
+
kubernetes_host="https://127.0.0.1:61233",
|
|
281
|
+
kubernetes_ca_cert=std.file(input="/path/to/cert").result,
|
|
282
|
+
service_account_jwt=std.file(input="/path/to/token").result,
|
|
283
|
+
disable_local_ca_jwt=False)
|
|
284
|
+
role = vault.kubernetes.SecretBackendRole("role",
|
|
285
|
+
backend=config.path,
|
|
286
|
+
name="service-account-name-role",
|
|
287
|
+
allowed_kubernetes_namespaces=["*"],
|
|
288
|
+
token_max_ttl=43200,
|
|
289
|
+
token_default_ttl=21600,
|
|
290
|
+
service_account_name="test-service-account-with-generated-token",
|
|
291
|
+
extra_labels={
|
|
292
|
+
"id": "abc123",
|
|
293
|
+
"name": "some_name",
|
|
294
|
+
},
|
|
295
|
+
extra_annotations={
|
|
296
|
+
"env": "development",
|
|
297
|
+
"location": "earth",
|
|
298
|
+
})
|
|
299
|
+
token = vault.kubernetes.get_service_account_token_output(backend=config.path,
|
|
300
|
+
role=role.name,
|
|
301
|
+
kubernetes_namespace="test",
|
|
302
|
+
cluster_role_binding=False,
|
|
303
|
+
ttl="1h")
|
|
304
|
+
```
|
|
305
|
+
|
|
306
|
+
|
|
307
|
+
:param _builtins.str backend: The Kubernetes secret backend to generate service account
|
|
308
|
+
tokens from.
|
|
309
|
+
:param _builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
|
|
310
|
+
permissions across the whole cluster instead of within a namespace.
|
|
311
|
+
:param _builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
|
|
312
|
+
generate the credentials.
|
|
313
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
314
|
+
The value should not contain leading or trailing forward slashes.
|
|
315
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
316
|
+
*Available only for Vault Enterprise*.
|
|
317
|
+
:param _builtins.str role: The name of the Kubernetes secret backend role to generate service
|
|
318
|
+
account tokens from.
|
|
319
|
+
:param _builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
|
|
320
|
+
seconds or as a Go duration format string.
|
|
321
|
+
"""
|
|
322
|
+
__args__ = dict()
|
|
323
|
+
__args__['backend'] = backend
|
|
324
|
+
__args__['clusterRoleBinding'] = cluster_role_binding
|
|
325
|
+
__args__['kubernetesNamespace'] = kubernetes_namespace
|
|
326
|
+
__args__['namespace'] = namespace
|
|
327
|
+
__args__['role'] = role
|
|
328
|
+
__args__['ttl'] = ttl
|
|
329
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
330
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult)
|
|
331
|
+
return __ret__.apply(lambda __response__: GetServiceAccountTokenResult(
|
|
332
|
+
backend=pulumi.get(__response__, 'backend'),
|
|
333
|
+
cluster_role_binding=pulumi.get(__response__, 'cluster_role_binding'),
|
|
334
|
+
id=pulumi.get(__response__, 'id'),
|
|
335
|
+
kubernetes_namespace=pulumi.get(__response__, 'kubernetes_namespace'),
|
|
336
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
|
337
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
|
338
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
|
339
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
|
340
|
+
role=pulumi.get(__response__, 'role'),
|
|
341
|
+
service_account_name=pulumi.get(__response__, 'service_account_name'),
|
|
342
|
+
service_account_namespace=pulumi.get(__response__, 'service_account_namespace'),
|
|
343
|
+
service_account_token=pulumi.get(__response__, 'service_account_token'),
|
|
344
|
+
ttl=pulumi.get(__response__, 'ttl')))
|