pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,334 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetOidcOpenidConfigResult',
19
+ 'AwaitableGetOidcOpenidConfigResult',
20
+ 'get_oidc_openid_config',
21
+ 'get_oidc_openid_config_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetOidcOpenidConfigResult:
26
+ """
27
+ A collection of values returned by getOidcOpenidConfig.
28
+ """
29
+ def __init__(__self__, authorization_endpoint=None, grant_types_supporteds=None, id=None, id_token_signing_alg_values_supporteds=None, issuer=None, jwks_uri=None, name=None, namespace=None, request_uri_parameter_supported=None, response_types_supporteds=None, scopes_supporteds=None, subject_types_supporteds=None, token_endpoint=None, token_endpoint_auth_methods_supporteds=None, userinfo_endpoint=None):
30
+ if authorization_endpoint and not isinstance(authorization_endpoint, str):
31
+ raise TypeError("Expected argument 'authorization_endpoint' to be a str")
32
+ pulumi.set(__self__, "authorization_endpoint", authorization_endpoint)
33
+ if grant_types_supporteds and not isinstance(grant_types_supporteds, list):
34
+ raise TypeError("Expected argument 'grant_types_supporteds' to be a list")
35
+ pulumi.set(__self__, "grant_types_supporteds", grant_types_supporteds)
36
+ if id and not isinstance(id, str):
37
+ raise TypeError("Expected argument 'id' to be a str")
38
+ pulumi.set(__self__, "id", id)
39
+ if id_token_signing_alg_values_supporteds and not isinstance(id_token_signing_alg_values_supporteds, list):
40
+ raise TypeError("Expected argument 'id_token_signing_alg_values_supporteds' to be a list")
41
+ pulumi.set(__self__, "id_token_signing_alg_values_supporteds", id_token_signing_alg_values_supporteds)
42
+ if issuer and not isinstance(issuer, str):
43
+ raise TypeError("Expected argument 'issuer' to be a str")
44
+ pulumi.set(__self__, "issuer", issuer)
45
+ if jwks_uri and not isinstance(jwks_uri, str):
46
+ raise TypeError("Expected argument 'jwks_uri' to be a str")
47
+ pulumi.set(__self__, "jwks_uri", jwks_uri)
48
+ if name and not isinstance(name, str):
49
+ raise TypeError("Expected argument 'name' to be a str")
50
+ pulumi.set(__self__, "name", name)
51
+ if namespace and not isinstance(namespace, str):
52
+ raise TypeError("Expected argument 'namespace' to be a str")
53
+ pulumi.set(__self__, "namespace", namespace)
54
+ if request_uri_parameter_supported and not isinstance(request_uri_parameter_supported, bool):
55
+ raise TypeError("Expected argument 'request_uri_parameter_supported' to be a bool")
56
+ pulumi.set(__self__, "request_uri_parameter_supported", request_uri_parameter_supported)
57
+ if response_types_supporteds and not isinstance(response_types_supporteds, list):
58
+ raise TypeError("Expected argument 'response_types_supporteds' to be a list")
59
+ pulumi.set(__self__, "response_types_supporteds", response_types_supporteds)
60
+ if scopes_supporteds and not isinstance(scopes_supporteds, list):
61
+ raise TypeError("Expected argument 'scopes_supporteds' to be a list")
62
+ pulumi.set(__self__, "scopes_supporteds", scopes_supporteds)
63
+ if subject_types_supporteds and not isinstance(subject_types_supporteds, list):
64
+ raise TypeError("Expected argument 'subject_types_supporteds' to be a list")
65
+ pulumi.set(__self__, "subject_types_supporteds", subject_types_supporteds)
66
+ if token_endpoint and not isinstance(token_endpoint, str):
67
+ raise TypeError("Expected argument 'token_endpoint' to be a str")
68
+ pulumi.set(__self__, "token_endpoint", token_endpoint)
69
+ if token_endpoint_auth_methods_supporteds and not isinstance(token_endpoint_auth_methods_supporteds, list):
70
+ raise TypeError("Expected argument 'token_endpoint_auth_methods_supporteds' to be a list")
71
+ pulumi.set(__self__, "token_endpoint_auth_methods_supporteds", token_endpoint_auth_methods_supporteds)
72
+ if userinfo_endpoint and not isinstance(userinfo_endpoint, str):
73
+ raise TypeError("Expected argument 'userinfo_endpoint' to be a str")
74
+ pulumi.set(__self__, "userinfo_endpoint", userinfo_endpoint)
75
+
76
+ @_builtins.property
77
+ @pulumi.getter(name="authorizationEndpoint")
78
+ def authorization_endpoint(self) -> _builtins.str:
79
+ """
80
+ The Authorization Endpoint for the provider.
81
+ """
82
+ return pulumi.get(self, "authorization_endpoint")
83
+
84
+ @_builtins.property
85
+ @pulumi.getter(name="grantTypesSupporteds")
86
+ def grant_types_supporteds(self) -> Sequence[_builtins.str]:
87
+ """
88
+ The grant types supported by the provider.
89
+ """
90
+ return pulumi.get(self, "grant_types_supporteds")
91
+
92
+ @_builtins.property
93
+ @pulumi.getter
94
+ def id(self) -> _builtins.str:
95
+ """
96
+ The provider-assigned unique ID for this managed resource.
97
+ """
98
+ return pulumi.get(self, "id")
99
+
100
+ @_builtins.property
101
+ @pulumi.getter(name="idTokenSigningAlgValuesSupporteds")
102
+ def id_token_signing_alg_values_supporteds(self) -> Sequence[_builtins.str]:
103
+ """
104
+ The signing algorithms supported by
105
+ the provider.
106
+ """
107
+ return pulumi.get(self, "id_token_signing_alg_values_supporteds")
108
+
109
+ @_builtins.property
110
+ @pulumi.getter
111
+ def issuer(self) -> _builtins.str:
112
+ """
113
+ The URL of the issuer for the provider.
114
+ """
115
+ return pulumi.get(self, "issuer")
116
+
117
+ @_builtins.property
118
+ @pulumi.getter(name="jwksUri")
119
+ def jwks_uri(self) -> _builtins.str:
120
+ """
121
+ The well known keys URI for the provider.
122
+ """
123
+ return pulumi.get(self, "jwks_uri")
124
+
125
+ @_builtins.property
126
+ @pulumi.getter
127
+ def name(self) -> _builtins.str:
128
+ return pulumi.get(self, "name")
129
+
130
+ @_builtins.property
131
+ @pulumi.getter
132
+ def namespace(self) -> Optional[_builtins.str]:
133
+ return pulumi.get(self, "namespace")
134
+
135
+ @_builtins.property
136
+ @pulumi.getter(name="requestUriParameterSupported")
137
+ def request_uri_parameter_supported(self) -> _builtins.bool:
138
+ """
139
+ Specifies whether Request URI Parameter is
140
+ supported by the provider.
141
+ """
142
+ return pulumi.get(self, "request_uri_parameter_supported")
143
+
144
+ @_builtins.property
145
+ @pulumi.getter(name="responseTypesSupporteds")
146
+ def response_types_supporteds(self) -> Sequence[_builtins.str]:
147
+ """
148
+ The response types supported by the provider.
149
+ """
150
+ return pulumi.get(self, "response_types_supporteds")
151
+
152
+ @_builtins.property
153
+ @pulumi.getter(name="scopesSupporteds")
154
+ def scopes_supporteds(self) -> Sequence[_builtins.str]:
155
+ """
156
+ The scopes supported by the provider.
157
+ """
158
+ return pulumi.get(self, "scopes_supporteds")
159
+
160
+ @_builtins.property
161
+ @pulumi.getter(name="subjectTypesSupporteds")
162
+ def subject_types_supporteds(self) -> Sequence[_builtins.str]:
163
+ """
164
+ The subject types supported by the provider.
165
+ """
166
+ return pulumi.get(self, "subject_types_supporteds")
167
+
168
+ @_builtins.property
169
+ @pulumi.getter(name="tokenEndpoint")
170
+ def token_endpoint(self) -> _builtins.str:
171
+ """
172
+ The Token Endpoint for the provider.
173
+ """
174
+ return pulumi.get(self, "token_endpoint")
175
+
176
+ @_builtins.property
177
+ @pulumi.getter(name="tokenEndpointAuthMethodsSupporteds")
178
+ def token_endpoint_auth_methods_supporteds(self) -> Sequence[_builtins.str]:
179
+ """
180
+ The token endpoint auth methods supported by the provider.
181
+ """
182
+ return pulumi.get(self, "token_endpoint_auth_methods_supporteds")
183
+
184
+ @_builtins.property
185
+ @pulumi.getter(name="userinfoEndpoint")
186
+ def userinfo_endpoint(self) -> _builtins.str:
187
+ """
188
+ The User Info Endpoint for the provider
189
+ """
190
+ return pulumi.get(self, "userinfo_endpoint")
191
+
192
+
193
+ class AwaitableGetOidcOpenidConfigResult(GetOidcOpenidConfigResult):
194
+ # pylint: disable=using-constant-test
195
+ def __await__(self):
196
+ if False:
197
+ yield self
198
+ return GetOidcOpenidConfigResult(
199
+ authorization_endpoint=self.authorization_endpoint,
200
+ grant_types_supporteds=self.grant_types_supporteds,
201
+ id=self.id,
202
+ id_token_signing_alg_values_supporteds=self.id_token_signing_alg_values_supporteds,
203
+ issuer=self.issuer,
204
+ jwks_uri=self.jwks_uri,
205
+ name=self.name,
206
+ namespace=self.namespace,
207
+ request_uri_parameter_supported=self.request_uri_parameter_supported,
208
+ response_types_supporteds=self.response_types_supporteds,
209
+ scopes_supporteds=self.scopes_supporteds,
210
+ subject_types_supporteds=self.subject_types_supporteds,
211
+ token_endpoint=self.token_endpoint,
212
+ token_endpoint_auth_methods_supporteds=self.token_endpoint_auth_methods_supporteds,
213
+ userinfo_endpoint=self.userinfo_endpoint)
214
+
215
+
216
+ def get_oidc_openid_config(name: Optional[_builtins.str] = None,
217
+ namespace: Optional[_builtins.str] = None,
218
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetOidcOpenidConfigResult:
219
+ """
220
+ ## Example Usage
221
+
222
+ ```python
223
+ import pulumi
224
+ import pulumi_vault as vault
225
+
226
+ key = vault.identity.OidcKey("key",
227
+ name="key",
228
+ allowed_client_ids=["*"],
229
+ rotation_period=3600,
230
+ verification_ttl=3600)
231
+ app = vault.identity.OidcClient("app",
232
+ name="application",
233
+ key=key.name,
234
+ redirect_uris=[
235
+ "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
236
+ "http://127.0.0.1:8251/callback",
237
+ "http://127.0.0.1:8080/callback",
238
+ ],
239
+ id_token_ttl=2400,
240
+ access_token_ttl=7200)
241
+ provider = vault.identity.OidcProvider("provider",
242
+ name="provider",
243
+ allowed_client_ids=[test["clientId"]])
244
+ config = vault.identity.get_oidc_openid_config_output(name=provider.name)
245
+ ```
246
+
247
+
248
+ :param _builtins.str name: The name of the OIDC Provider in Vault.
249
+ :param _builtins.str namespace: The namespace of the target resource.
250
+ The value should not contain leading or trailing forward slashes.
251
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
252
+ *Available only for Vault Enterprise*.
253
+ """
254
+ __args__ = dict()
255
+ __args__['name'] = name
256
+ __args__['namespace'] = namespace
257
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
258
+ __ret__ = pulumi.runtime.invoke('vault:identity/getOidcOpenidConfig:getOidcOpenidConfig', __args__, opts=opts, typ=GetOidcOpenidConfigResult).value
259
+
260
+ return AwaitableGetOidcOpenidConfigResult(
261
+ authorization_endpoint=pulumi.get(__ret__, 'authorization_endpoint'),
262
+ grant_types_supporteds=pulumi.get(__ret__, 'grant_types_supporteds'),
263
+ id=pulumi.get(__ret__, 'id'),
264
+ id_token_signing_alg_values_supporteds=pulumi.get(__ret__, 'id_token_signing_alg_values_supporteds'),
265
+ issuer=pulumi.get(__ret__, 'issuer'),
266
+ jwks_uri=pulumi.get(__ret__, 'jwks_uri'),
267
+ name=pulumi.get(__ret__, 'name'),
268
+ namespace=pulumi.get(__ret__, 'namespace'),
269
+ request_uri_parameter_supported=pulumi.get(__ret__, 'request_uri_parameter_supported'),
270
+ response_types_supporteds=pulumi.get(__ret__, 'response_types_supporteds'),
271
+ scopes_supporteds=pulumi.get(__ret__, 'scopes_supporteds'),
272
+ subject_types_supporteds=pulumi.get(__ret__, 'subject_types_supporteds'),
273
+ token_endpoint=pulumi.get(__ret__, 'token_endpoint'),
274
+ token_endpoint_auth_methods_supporteds=pulumi.get(__ret__, 'token_endpoint_auth_methods_supporteds'),
275
+ userinfo_endpoint=pulumi.get(__ret__, 'userinfo_endpoint'))
276
+ def get_oidc_openid_config_output(name: Optional[pulumi.Input[_builtins.str]] = None,
277
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
278
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetOidcOpenidConfigResult]:
279
+ """
280
+ ## Example Usage
281
+
282
+ ```python
283
+ import pulumi
284
+ import pulumi_vault as vault
285
+
286
+ key = vault.identity.OidcKey("key",
287
+ name="key",
288
+ allowed_client_ids=["*"],
289
+ rotation_period=3600,
290
+ verification_ttl=3600)
291
+ app = vault.identity.OidcClient("app",
292
+ name="application",
293
+ key=key.name,
294
+ redirect_uris=[
295
+ "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
296
+ "http://127.0.0.1:8251/callback",
297
+ "http://127.0.0.1:8080/callback",
298
+ ],
299
+ id_token_ttl=2400,
300
+ access_token_ttl=7200)
301
+ provider = vault.identity.OidcProvider("provider",
302
+ name="provider",
303
+ allowed_client_ids=[test["clientId"]])
304
+ config = vault.identity.get_oidc_openid_config_output(name=provider.name)
305
+ ```
306
+
307
+
308
+ :param _builtins.str name: The name of the OIDC Provider in Vault.
309
+ :param _builtins.str namespace: The namespace of the target resource.
310
+ The value should not contain leading or trailing forward slashes.
311
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
312
+ *Available only for Vault Enterprise*.
313
+ """
314
+ __args__ = dict()
315
+ __args__['name'] = name
316
+ __args__['namespace'] = namespace
317
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
318
+ __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcOpenidConfig:getOidcOpenidConfig', __args__, opts=opts, typ=GetOidcOpenidConfigResult)
319
+ return __ret__.apply(lambda __response__: GetOidcOpenidConfigResult(
320
+ authorization_endpoint=pulumi.get(__response__, 'authorization_endpoint'),
321
+ grant_types_supporteds=pulumi.get(__response__, 'grant_types_supporteds'),
322
+ id=pulumi.get(__response__, 'id'),
323
+ id_token_signing_alg_values_supporteds=pulumi.get(__response__, 'id_token_signing_alg_values_supporteds'),
324
+ issuer=pulumi.get(__response__, 'issuer'),
325
+ jwks_uri=pulumi.get(__response__, 'jwks_uri'),
326
+ name=pulumi.get(__response__, 'name'),
327
+ namespace=pulumi.get(__response__, 'namespace'),
328
+ request_uri_parameter_supported=pulumi.get(__response__, 'request_uri_parameter_supported'),
329
+ response_types_supporteds=pulumi.get(__response__, 'response_types_supporteds'),
330
+ scopes_supporteds=pulumi.get(__response__, 'scopes_supporteds'),
331
+ subject_types_supporteds=pulumi.get(__response__, 'subject_types_supporteds'),
332
+ token_endpoint=pulumi.get(__response__, 'token_endpoint'),
333
+ token_endpoint_auth_methods_supporteds=pulumi.get(__response__, 'token_endpoint_auth_methods_supporteds'),
334
+ userinfo_endpoint=pulumi.get(__response__, 'userinfo_endpoint')))
@@ -0,0 +1,179 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetOidcPublicKeysResult',
19
+ 'AwaitableGetOidcPublicKeysResult',
20
+ 'get_oidc_public_keys',
21
+ 'get_oidc_public_keys_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetOidcPublicKeysResult:
26
+ """
27
+ A collection of values returned by getOidcPublicKeys.
28
+ """
29
+ def __init__(__self__, id=None, keys=None, name=None, namespace=None):
30
+ if id and not isinstance(id, str):
31
+ raise TypeError("Expected argument 'id' to be a str")
32
+ pulumi.set(__self__, "id", id)
33
+ if keys and not isinstance(keys, list):
34
+ raise TypeError("Expected argument 'keys' to be a list")
35
+ pulumi.set(__self__, "keys", keys)
36
+ if name and not isinstance(name, str):
37
+ raise TypeError("Expected argument 'name' to be a str")
38
+ pulumi.set(__self__, "name", name)
39
+ if namespace and not isinstance(namespace, str):
40
+ raise TypeError("Expected argument 'namespace' to be a str")
41
+ pulumi.set(__self__, "namespace", namespace)
42
+
43
+ @_builtins.property
44
+ @pulumi.getter
45
+ def id(self) -> _builtins.str:
46
+ """
47
+ The provider-assigned unique ID for this managed resource.
48
+ """
49
+ return pulumi.get(self, "id")
50
+
51
+ @_builtins.property
52
+ @pulumi.getter
53
+ def keys(self) -> Sequence[Mapping[str, _builtins.str]]:
54
+ """
55
+ The public portion of keys for an OIDC provider.
56
+ Clients can use them to validate the authenticity of an identity token.
57
+ """
58
+ return pulumi.get(self, "keys")
59
+
60
+ @_builtins.property
61
+ @pulumi.getter
62
+ def name(self) -> _builtins.str:
63
+ return pulumi.get(self, "name")
64
+
65
+ @_builtins.property
66
+ @pulumi.getter
67
+ def namespace(self) -> Optional[_builtins.str]:
68
+ return pulumi.get(self, "namespace")
69
+
70
+
71
+ class AwaitableGetOidcPublicKeysResult(GetOidcPublicKeysResult):
72
+ # pylint: disable=using-constant-test
73
+ def __await__(self):
74
+ if False:
75
+ yield self
76
+ return GetOidcPublicKeysResult(
77
+ id=self.id,
78
+ keys=self.keys,
79
+ name=self.name,
80
+ namespace=self.namespace)
81
+
82
+
83
+ def get_oidc_public_keys(name: Optional[_builtins.str] = None,
84
+ namespace: Optional[_builtins.str] = None,
85
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetOidcPublicKeysResult:
86
+ """
87
+ ## Example Usage
88
+
89
+ ```python
90
+ import pulumi
91
+ import pulumi_vault as vault
92
+
93
+ key = vault.identity.OidcKey("key",
94
+ name="key",
95
+ allowed_client_ids=["*"],
96
+ rotation_period=3600,
97
+ verification_ttl=3600)
98
+ app = vault.identity.OidcClient("app",
99
+ name="application",
100
+ key=key.name,
101
+ redirect_uris=[
102
+ "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
103
+ "http://127.0.0.1:8251/callback",
104
+ "http://127.0.0.1:8080/callback",
105
+ ],
106
+ id_token_ttl=2400,
107
+ access_token_ttl=7200)
108
+ provider = vault.identity.OidcProvider("provider",
109
+ name="provider",
110
+ allowed_client_ids=[test["clientId"]])
111
+ public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
112
+ ```
113
+
114
+
115
+ :param _builtins.str name: The name of the OIDC Provider in Vault.
116
+ :param _builtins.str namespace: The namespace of the target resource.
117
+ The value should not contain leading or trailing forward slashes.
118
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
119
+ *Available only for Vault Enterprise*.
120
+ """
121
+ __args__ = dict()
122
+ __args__['name'] = name
123
+ __args__['namespace'] = namespace
124
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
125
+ __ret__ = pulumi.runtime.invoke('vault:identity/getOidcPublicKeys:getOidcPublicKeys', __args__, opts=opts, typ=GetOidcPublicKeysResult).value
126
+
127
+ return AwaitableGetOidcPublicKeysResult(
128
+ id=pulumi.get(__ret__, 'id'),
129
+ keys=pulumi.get(__ret__, 'keys'),
130
+ name=pulumi.get(__ret__, 'name'),
131
+ namespace=pulumi.get(__ret__, 'namespace'))
132
+ def get_oidc_public_keys_output(name: Optional[pulumi.Input[_builtins.str]] = None,
133
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
134
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetOidcPublicKeysResult]:
135
+ """
136
+ ## Example Usage
137
+
138
+ ```python
139
+ import pulumi
140
+ import pulumi_vault as vault
141
+
142
+ key = vault.identity.OidcKey("key",
143
+ name="key",
144
+ allowed_client_ids=["*"],
145
+ rotation_period=3600,
146
+ verification_ttl=3600)
147
+ app = vault.identity.OidcClient("app",
148
+ name="application",
149
+ key=key.name,
150
+ redirect_uris=[
151
+ "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
152
+ "http://127.0.0.1:8251/callback",
153
+ "http://127.0.0.1:8080/callback",
154
+ ],
155
+ id_token_ttl=2400,
156
+ access_token_ttl=7200)
157
+ provider = vault.identity.OidcProvider("provider",
158
+ name="provider",
159
+ allowed_client_ids=[test["clientId"]])
160
+ public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
161
+ ```
162
+
163
+
164
+ :param _builtins.str name: The name of the OIDC Provider in Vault.
165
+ :param _builtins.str namespace: The namespace of the target resource.
166
+ The value should not contain leading or trailing forward slashes.
167
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
168
+ *Available only for Vault Enterprise*.
169
+ """
170
+ __args__ = dict()
171
+ __args__['name'] = name
172
+ __args__['namespace'] = namespace
173
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
174
+ __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcPublicKeys:getOidcPublicKeys', __args__, opts=opts, typ=GetOidcPublicKeysResult)
175
+ return __ret__.apply(lambda __response__: GetOidcPublicKeysResult(
176
+ id=pulumi.get(__response__, 'id'),
177
+ keys=pulumi.get(__response__, 'keys'),
178
+ name=pulumi.get(__response__, 'name'),
179
+ namespace=pulumi.get(__response__, 'namespace')))