pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,334 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetOidcOpenidConfigResult',
|
|
19
|
+
'AwaitableGetOidcOpenidConfigResult',
|
|
20
|
+
'get_oidc_openid_config',
|
|
21
|
+
'get_oidc_openid_config_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetOidcOpenidConfigResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getOidcOpenidConfig.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, authorization_endpoint=None, grant_types_supporteds=None, id=None, id_token_signing_alg_values_supporteds=None, issuer=None, jwks_uri=None, name=None, namespace=None, request_uri_parameter_supported=None, response_types_supporteds=None, scopes_supporteds=None, subject_types_supporteds=None, token_endpoint=None, token_endpoint_auth_methods_supporteds=None, userinfo_endpoint=None):
|
|
30
|
+
if authorization_endpoint and not isinstance(authorization_endpoint, str):
|
|
31
|
+
raise TypeError("Expected argument 'authorization_endpoint' to be a str")
|
|
32
|
+
pulumi.set(__self__, "authorization_endpoint", authorization_endpoint)
|
|
33
|
+
if grant_types_supporteds and not isinstance(grant_types_supporteds, list):
|
|
34
|
+
raise TypeError("Expected argument 'grant_types_supporteds' to be a list")
|
|
35
|
+
pulumi.set(__self__, "grant_types_supporteds", grant_types_supporteds)
|
|
36
|
+
if id and not isinstance(id, str):
|
|
37
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
38
|
+
pulumi.set(__self__, "id", id)
|
|
39
|
+
if id_token_signing_alg_values_supporteds and not isinstance(id_token_signing_alg_values_supporteds, list):
|
|
40
|
+
raise TypeError("Expected argument 'id_token_signing_alg_values_supporteds' to be a list")
|
|
41
|
+
pulumi.set(__self__, "id_token_signing_alg_values_supporteds", id_token_signing_alg_values_supporteds)
|
|
42
|
+
if issuer and not isinstance(issuer, str):
|
|
43
|
+
raise TypeError("Expected argument 'issuer' to be a str")
|
|
44
|
+
pulumi.set(__self__, "issuer", issuer)
|
|
45
|
+
if jwks_uri and not isinstance(jwks_uri, str):
|
|
46
|
+
raise TypeError("Expected argument 'jwks_uri' to be a str")
|
|
47
|
+
pulumi.set(__self__, "jwks_uri", jwks_uri)
|
|
48
|
+
if name and not isinstance(name, str):
|
|
49
|
+
raise TypeError("Expected argument 'name' to be a str")
|
|
50
|
+
pulumi.set(__self__, "name", name)
|
|
51
|
+
if namespace and not isinstance(namespace, str):
|
|
52
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
53
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
54
|
+
if request_uri_parameter_supported and not isinstance(request_uri_parameter_supported, bool):
|
|
55
|
+
raise TypeError("Expected argument 'request_uri_parameter_supported' to be a bool")
|
|
56
|
+
pulumi.set(__self__, "request_uri_parameter_supported", request_uri_parameter_supported)
|
|
57
|
+
if response_types_supporteds and not isinstance(response_types_supporteds, list):
|
|
58
|
+
raise TypeError("Expected argument 'response_types_supporteds' to be a list")
|
|
59
|
+
pulumi.set(__self__, "response_types_supporteds", response_types_supporteds)
|
|
60
|
+
if scopes_supporteds and not isinstance(scopes_supporteds, list):
|
|
61
|
+
raise TypeError("Expected argument 'scopes_supporteds' to be a list")
|
|
62
|
+
pulumi.set(__self__, "scopes_supporteds", scopes_supporteds)
|
|
63
|
+
if subject_types_supporteds and not isinstance(subject_types_supporteds, list):
|
|
64
|
+
raise TypeError("Expected argument 'subject_types_supporteds' to be a list")
|
|
65
|
+
pulumi.set(__self__, "subject_types_supporteds", subject_types_supporteds)
|
|
66
|
+
if token_endpoint and not isinstance(token_endpoint, str):
|
|
67
|
+
raise TypeError("Expected argument 'token_endpoint' to be a str")
|
|
68
|
+
pulumi.set(__self__, "token_endpoint", token_endpoint)
|
|
69
|
+
if token_endpoint_auth_methods_supporteds and not isinstance(token_endpoint_auth_methods_supporteds, list):
|
|
70
|
+
raise TypeError("Expected argument 'token_endpoint_auth_methods_supporteds' to be a list")
|
|
71
|
+
pulumi.set(__self__, "token_endpoint_auth_methods_supporteds", token_endpoint_auth_methods_supporteds)
|
|
72
|
+
if userinfo_endpoint and not isinstance(userinfo_endpoint, str):
|
|
73
|
+
raise TypeError("Expected argument 'userinfo_endpoint' to be a str")
|
|
74
|
+
pulumi.set(__self__, "userinfo_endpoint", userinfo_endpoint)
|
|
75
|
+
|
|
76
|
+
@_builtins.property
|
|
77
|
+
@pulumi.getter(name="authorizationEndpoint")
|
|
78
|
+
def authorization_endpoint(self) -> _builtins.str:
|
|
79
|
+
"""
|
|
80
|
+
The Authorization Endpoint for the provider.
|
|
81
|
+
"""
|
|
82
|
+
return pulumi.get(self, "authorization_endpoint")
|
|
83
|
+
|
|
84
|
+
@_builtins.property
|
|
85
|
+
@pulumi.getter(name="grantTypesSupporteds")
|
|
86
|
+
def grant_types_supporteds(self) -> Sequence[_builtins.str]:
|
|
87
|
+
"""
|
|
88
|
+
The grant types supported by the provider.
|
|
89
|
+
"""
|
|
90
|
+
return pulumi.get(self, "grant_types_supporteds")
|
|
91
|
+
|
|
92
|
+
@_builtins.property
|
|
93
|
+
@pulumi.getter
|
|
94
|
+
def id(self) -> _builtins.str:
|
|
95
|
+
"""
|
|
96
|
+
The provider-assigned unique ID for this managed resource.
|
|
97
|
+
"""
|
|
98
|
+
return pulumi.get(self, "id")
|
|
99
|
+
|
|
100
|
+
@_builtins.property
|
|
101
|
+
@pulumi.getter(name="idTokenSigningAlgValuesSupporteds")
|
|
102
|
+
def id_token_signing_alg_values_supporteds(self) -> Sequence[_builtins.str]:
|
|
103
|
+
"""
|
|
104
|
+
The signing algorithms supported by
|
|
105
|
+
the provider.
|
|
106
|
+
"""
|
|
107
|
+
return pulumi.get(self, "id_token_signing_alg_values_supporteds")
|
|
108
|
+
|
|
109
|
+
@_builtins.property
|
|
110
|
+
@pulumi.getter
|
|
111
|
+
def issuer(self) -> _builtins.str:
|
|
112
|
+
"""
|
|
113
|
+
The URL of the issuer for the provider.
|
|
114
|
+
"""
|
|
115
|
+
return pulumi.get(self, "issuer")
|
|
116
|
+
|
|
117
|
+
@_builtins.property
|
|
118
|
+
@pulumi.getter(name="jwksUri")
|
|
119
|
+
def jwks_uri(self) -> _builtins.str:
|
|
120
|
+
"""
|
|
121
|
+
The well known keys URI for the provider.
|
|
122
|
+
"""
|
|
123
|
+
return pulumi.get(self, "jwks_uri")
|
|
124
|
+
|
|
125
|
+
@_builtins.property
|
|
126
|
+
@pulumi.getter
|
|
127
|
+
def name(self) -> _builtins.str:
|
|
128
|
+
return pulumi.get(self, "name")
|
|
129
|
+
|
|
130
|
+
@_builtins.property
|
|
131
|
+
@pulumi.getter
|
|
132
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
133
|
+
return pulumi.get(self, "namespace")
|
|
134
|
+
|
|
135
|
+
@_builtins.property
|
|
136
|
+
@pulumi.getter(name="requestUriParameterSupported")
|
|
137
|
+
def request_uri_parameter_supported(self) -> _builtins.bool:
|
|
138
|
+
"""
|
|
139
|
+
Specifies whether Request URI Parameter is
|
|
140
|
+
supported by the provider.
|
|
141
|
+
"""
|
|
142
|
+
return pulumi.get(self, "request_uri_parameter_supported")
|
|
143
|
+
|
|
144
|
+
@_builtins.property
|
|
145
|
+
@pulumi.getter(name="responseTypesSupporteds")
|
|
146
|
+
def response_types_supporteds(self) -> Sequence[_builtins.str]:
|
|
147
|
+
"""
|
|
148
|
+
The response types supported by the provider.
|
|
149
|
+
"""
|
|
150
|
+
return pulumi.get(self, "response_types_supporteds")
|
|
151
|
+
|
|
152
|
+
@_builtins.property
|
|
153
|
+
@pulumi.getter(name="scopesSupporteds")
|
|
154
|
+
def scopes_supporteds(self) -> Sequence[_builtins.str]:
|
|
155
|
+
"""
|
|
156
|
+
The scopes supported by the provider.
|
|
157
|
+
"""
|
|
158
|
+
return pulumi.get(self, "scopes_supporteds")
|
|
159
|
+
|
|
160
|
+
@_builtins.property
|
|
161
|
+
@pulumi.getter(name="subjectTypesSupporteds")
|
|
162
|
+
def subject_types_supporteds(self) -> Sequence[_builtins.str]:
|
|
163
|
+
"""
|
|
164
|
+
The subject types supported by the provider.
|
|
165
|
+
"""
|
|
166
|
+
return pulumi.get(self, "subject_types_supporteds")
|
|
167
|
+
|
|
168
|
+
@_builtins.property
|
|
169
|
+
@pulumi.getter(name="tokenEndpoint")
|
|
170
|
+
def token_endpoint(self) -> _builtins.str:
|
|
171
|
+
"""
|
|
172
|
+
The Token Endpoint for the provider.
|
|
173
|
+
"""
|
|
174
|
+
return pulumi.get(self, "token_endpoint")
|
|
175
|
+
|
|
176
|
+
@_builtins.property
|
|
177
|
+
@pulumi.getter(name="tokenEndpointAuthMethodsSupporteds")
|
|
178
|
+
def token_endpoint_auth_methods_supporteds(self) -> Sequence[_builtins.str]:
|
|
179
|
+
"""
|
|
180
|
+
The token endpoint auth methods supported by the provider.
|
|
181
|
+
"""
|
|
182
|
+
return pulumi.get(self, "token_endpoint_auth_methods_supporteds")
|
|
183
|
+
|
|
184
|
+
@_builtins.property
|
|
185
|
+
@pulumi.getter(name="userinfoEndpoint")
|
|
186
|
+
def userinfo_endpoint(self) -> _builtins.str:
|
|
187
|
+
"""
|
|
188
|
+
The User Info Endpoint for the provider
|
|
189
|
+
"""
|
|
190
|
+
return pulumi.get(self, "userinfo_endpoint")
|
|
191
|
+
|
|
192
|
+
|
|
193
|
+
class AwaitableGetOidcOpenidConfigResult(GetOidcOpenidConfigResult):
|
|
194
|
+
# pylint: disable=using-constant-test
|
|
195
|
+
def __await__(self):
|
|
196
|
+
if False:
|
|
197
|
+
yield self
|
|
198
|
+
return GetOidcOpenidConfigResult(
|
|
199
|
+
authorization_endpoint=self.authorization_endpoint,
|
|
200
|
+
grant_types_supporteds=self.grant_types_supporteds,
|
|
201
|
+
id=self.id,
|
|
202
|
+
id_token_signing_alg_values_supporteds=self.id_token_signing_alg_values_supporteds,
|
|
203
|
+
issuer=self.issuer,
|
|
204
|
+
jwks_uri=self.jwks_uri,
|
|
205
|
+
name=self.name,
|
|
206
|
+
namespace=self.namespace,
|
|
207
|
+
request_uri_parameter_supported=self.request_uri_parameter_supported,
|
|
208
|
+
response_types_supporteds=self.response_types_supporteds,
|
|
209
|
+
scopes_supporteds=self.scopes_supporteds,
|
|
210
|
+
subject_types_supporteds=self.subject_types_supporteds,
|
|
211
|
+
token_endpoint=self.token_endpoint,
|
|
212
|
+
token_endpoint_auth_methods_supporteds=self.token_endpoint_auth_methods_supporteds,
|
|
213
|
+
userinfo_endpoint=self.userinfo_endpoint)
|
|
214
|
+
|
|
215
|
+
|
|
216
|
+
def get_oidc_openid_config(name: Optional[_builtins.str] = None,
|
|
217
|
+
namespace: Optional[_builtins.str] = None,
|
|
218
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetOidcOpenidConfigResult:
|
|
219
|
+
"""
|
|
220
|
+
## Example Usage
|
|
221
|
+
|
|
222
|
+
```python
|
|
223
|
+
import pulumi
|
|
224
|
+
import pulumi_vault as vault
|
|
225
|
+
|
|
226
|
+
key = vault.identity.OidcKey("key",
|
|
227
|
+
name="key",
|
|
228
|
+
allowed_client_ids=["*"],
|
|
229
|
+
rotation_period=3600,
|
|
230
|
+
verification_ttl=3600)
|
|
231
|
+
app = vault.identity.OidcClient("app",
|
|
232
|
+
name="application",
|
|
233
|
+
key=key.name,
|
|
234
|
+
redirect_uris=[
|
|
235
|
+
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
236
|
+
"http://127.0.0.1:8251/callback",
|
|
237
|
+
"http://127.0.0.1:8080/callback",
|
|
238
|
+
],
|
|
239
|
+
id_token_ttl=2400,
|
|
240
|
+
access_token_ttl=7200)
|
|
241
|
+
provider = vault.identity.OidcProvider("provider",
|
|
242
|
+
name="provider",
|
|
243
|
+
allowed_client_ids=[test["clientId"]])
|
|
244
|
+
config = vault.identity.get_oidc_openid_config_output(name=provider.name)
|
|
245
|
+
```
|
|
246
|
+
|
|
247
|
+
|
|
248
|
+
:param _builtins.str name: The name of the OIDC Provider in Vault.
|
|
249
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
250
|
+
The value should not contain leading or trailing forward slashes.
|
|
251
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
252
|
+
*Available only for Vault Enterprise*.
|
|
253
|
+
"""
|
|
254
|
+
__args__ = dict()
|
|
255
|
+
__args__['name'] = name
|
|
256
|
+
__args__['namespace'] = namespace
|
|
257
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
258
|
+
__ret__ = pulumi.runtime.invoke('vault:identity/getOidcOpenidConfig:getOidcOpenidConfig', __args__, opts=opts, typ=GetOidcOpenidConfigResult).value
|
|
259
|
+
|
|
260
|
+
return AwaitableGetOidcOpenidConfigResult(
|
|
261
|
+
authorization_endpoint=pulumi.get(__ret__, 'authorization_endpoint'),
|
|
262
|
+
grant_types_supporteds=pulumi.get(__ret__, 'grant_types_supporteds'),
|
|
263
|
+
id=pulumi.get(__ret__, 'id'),
|
|
264
|
+
id_token_signing_alg_values_supporteds=pulumi.get(__ret__, 'id_token_signing_alg_values_supporteds'),
|
|
265
|
+
issuer=pulumi.get(__ret__, 'issuer'),
|
|
266
|
+
jwks_uri=pulumi.get(__ret__, 'jwks_uri'),
|
|
267
|
+
name=pulumi.get(__ret__, 'name'),
|
|
268
|
+
namespace=pulumi.get(__ret__, 'namespace'),
|
|
269
|
+
request_uri_parameter_supported=pulumi.get(__ret__, 'request_uri_parameter_supported'),
|
|
270
|
+
response_types_supporteds=pulumi.get(__ret__, 'response_types_supporteds'),
|
|
271
|
+
scopes_supporteds=pulumi.get(__ret__, 'scopes_supporteds'),
|
|
272
|
+
subject_types_supporteds=pulumi.get(__ret__, 'subject_types_supporteds'),
|
|
273
|
+
token_endpoint=pulumi.get(__ret__, 'token_endpoint'),
|
|
274
|
+
token_endpoint_auth_methods_supporteds=pulumi.get(__ret__, 'token_endpoint_auth_methods_supporteds'),
|
|
275
|
+
userinfo_endpoint=pulumi.get(__ret__, 'userinfo_endpoint'))
|
|
276
|
+
def get_oidc_openid_config_output(name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
277
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
278
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetOidcOpenidConfigResult]:
|
|
279
|
+
"""
|
|
280
|
+
## Example Usage
|
|
281
|
+
|
|
282
|
+
```python
|
|
283
|
+
import pulumi
|
|
284
|
+
import pulumi_vault as vault
|
|
285
|
+
|
|
286
|
+
key = vault.identity.OidcKey("key",
|
|
287
|
+
name="key",
|
|
288
|
+
allowed_client_ids=["*"],
|
|
289
|
+
rotation_period=3600,
|
|
290
|
+
verification_ttl=3600)
|
|
291
|
+
app = vault.identity.OidcClient("app",
|
|
292
|
+
name="application",
|
|
293
|
+
key=key.name,
|
|
294
|
+
redirect_uris=[
|
|
295
|
+
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
296
|
+
"http://127.0.0.1:8251/callback",
|
|
297
|
+
"http://127.0.0.1:8080/callback",
|
|
298
|
+
],
|
|
299
|
+
id_token_ttl=2400,
|
|
300
|
+
access_token_ttl=7200)
|
|
301
|
+
provider = vault.identity.OidcProvider("provider",
|
|
302
|
+
name="provider",
|
|
303
|
+
allowed_client_ids=[test["clientId"]])
|
|
304
|
+
config = vault.identity.get_oidc_openid_config_output(name=provider.name)
|
|
305
|
+
```
|
|
306
|
+
|
|
307
|
+
|
|
308
|
+
:param _builtins.str name: The name of the OIDC Provider in Vault.
|
|
309
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
310
|
+
The value should not contain leading or trailing forward slashes.
|
|
311
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
312
|
+
*Available only for Vault Enterprise*.
|
|
313
|
+
"""
|
|
314
|
+
__args__ = dict()
|
|
315
|
+
__args__['name'] = name
|
|
316
|
+
__args__['namespace'] = namespace
|
|
317
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
318
|
+
__ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcOpenidConfig:getOidcOpenidConfig', __args__, opts=opts, typ=GetOidcOpenidConfigResult)
|
|
319
|
+
return __ret__.apply(lambda __response__: GetOidcOpenidConfigResult(
|
|
320
|
+
authorization_endpoint=pulumi.get(__response__, 'authorization_endpoint'),
|
|
321
|
+
grant_types_supporteds=pulumi.get(__response__, 'grant_types_supporteds'),
|
|
322
|
+
id=pulumi.get(__response__, 'id'),
|
|
323
|
+
id_token_signing_alg_values_supporteds=pulumi.get(__response__, 'id_token_signing_alg_values_supporteds'),
|
|
324
|
+
issuer=pulumi.get(__response__, 'issuer'),
|
|
325
|
+
jwks_uri=pulumi.get(__response__, 'jwks_uri'),
|
|
326
|
+
name=pulumi.get(__response__, 'name'),
|
|
327
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
|
328
|
+
request_uri_parameter_supported=pulumi.get(__response__, 'request_uri_parameter_supported'),
|
|
329
|
+
response_types_supporteds=pulumi.get(__response__, 'response_types_supporteds'),
|
|
330
|
+
scopes_supporteds=pulumi.get(__response__, 'scopes_supporteds'),
|
|
331
|
+
subject_types_supporteds=pulumi.get(__response__, 'subject_types_supporteds'),
|
|
332
|
+
token_endpoint=pulumi.get(__response__, 'token_endpoint'),
|
|
333
|
+
token_endpoint_auth_methods_supporteds=pulumi.get(__response__, 'token_endpoint_auth_methods_supporteds'),
|
|
334
|
+
userinfo_endpoint=pulumi.get(__response__, 'userinfo_endpoint')))
|
|
@@ -0,0 +1,179 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetOidcPublicKeysResult',
|
|
19
|
+
'AwaitableGetOidcPublicKeysResult',
|
|
20
|
+
'get_oidc_public_keys',
|
|
21
|
+
'get_oidc_public_keys_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetOidcPublicKeysResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getOidcPublicKeys.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, id=None, keys=None, name=None, namespace=None):
|
|
30
|
+
if id and not isinstance(id, str):
|
|
31
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
32
|
+
pulumi.set(__self__, "id", id)
|
|
33
|
+
if keys and not isinstance(keys, list):
|
|
34
|
+
raise TypeError("Expected argument 'keys' to be a list")
|
|
35
|
+
pulumi.set(__self__, "keys", keys)
|
|
36
|
+
if name and not isinstance(name, str):
|
|
37
|
+
raise TypeError("Expected argument 'name' to be a str")
|
|
38
|
+
pulumi.set(__self__, "name", name)
|
|
39
|
+
if namespace and not isinstance(namespace, str):
|
|
40
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
41
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
42
|
+
|
|
43
|
+
@_builtins.property
|
|
44
|
+
@pulumi.getter
|
|
45
|
+
def id(self) -> _builtins.str:
|
|
46
|
+
"""
|
|
47
|
+
The provider-assigned unique ID for this managed resource.
|
|
48
|
+
"""
|
|
49
|
+
return pulumi.get(self, "id")
|
|
50
|
+
|
|
51
|
+
@_builtins.property
|
|
52
|
+
@pulumi.getter
|
|
53
|
+
def keys(self) -> Sequence[Mapping[str, _builtins.str]]:
|
|
54
|
+
"""
|
|
55
|
+
The public portion of keys for an OIDC provider.
|
|
56
|
+
Clients can use them to validate the authenticity of an identity token.
|
|
57
|
+
"""
|
|
58
|
+
return pulumi.get(self, "keys")
|
|
59
|
+
|
|
60
|
+
@_builtins.property
|
|
61
|
+
@pulumi.getter
|
|
62
|
+
def name(self) -> _builtins.str:
|
|
63
|
+
return pulumi.get(self, "name")
|
|
64
|
+
|
|
65
|
+
@_builtins.property
|
|
66
|
+
@pulumi.getter
|
|
67
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
68
|
+
return pulumi.get(self, "namespace")
|
|
69
|
+
|
|
70
|
+
|
|
71
|
+
class AwaitableGetOidcPublicKeysResult(GetOidcPublicKeysResult):
|
|
72
|
+
# pylint: disable=using-constant-test
|
|
73
|
+
def __await__(self):
|
|
74
|
+
if False:
|
|
75
|
+
yield self
|
|
76
|
+
return GetOidcPublicKeysResult(
|
|
77
|
+
id=self.id,
|
|
78
|
+
keys=self.keys,
|
|
79
|
+
name=self.name,
|
|
80
|
+
namespace=self.namespace)
|
|
81
|
+
|
|
82
|
+
|
|
83
|
+
def get_oidc_public_keys(name: Optional[_builtins.str] = None,
|
|
84
|
+
namespace: Optional[_builtins.str] = None,
|
|
85
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetOidcPublicKeysResult:
|
|
86
|
+
"""
|
|
87
|
+
## Example Usage
|
|
88
|
+
|
|
89
|
+
```python
|
|
90
|
+
import pulumi
|
|
91
|
+
import pulumi_vault as vault
|
|
92
|
+
|
|
93
|
+
key = vault.identity.OidcKey("key",
|
|
94
|
+
name="key",
|
|
95
|
+
allowed_client_ids=["*"],
|
|
96
|
+
rotation_period=3600,
|
|
97
|
+
verification_ttl=3600)
|
|
98
|
+
app = vault.identity.OidcClient("app",
|
|
99
|
+
name="application",
|
|
100
|
+
key=key.name,
|
|
101
|
+
redirect_uris=[
|
|
102
|
+
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
103
|
+
"http://127.0.0.1:8251/callback",
|
|
104
|
+
"http://127.0.0.1:8080/callback",
|
|
105
|
+
],
|
|
106
|
+
id_token_ttl=2400,
|
|
107
|
+
access_token_ttl=7200)
|
|
108
|
+
provider = vault.identity.OidcProvider("provider",
|
|
109
|
+
name="provider",
|
|
110
|
+
allowed_client_ids=[test["clientId"]])
|
|
111
|
+
public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
|
|
112
|
+
```
|
|
113
|
+
|
|
114
|
+
|
|
115
|
+
:param _builtins.str name: The name of the OIDC Provider in Vault.
|
|
116
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
117
|
+
The value should not contain leading or trailing forward slashes.
|
|
118
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
119
|
+
*Available only for Vault Enterprise*.
|
|
120
|
+
"""
|
|
121
|
+
__args__ = dict()
|
|
122
|
+
__args__['name'] = name
|
|
123
|
+
__args__['namespace'] = namespace
|
|
124
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
125
|
+
__ret__ = pulumi.runtime.invoke('vault:identity/getOidcPublicKeys:getOidcPublicKeys', __args__, opts=opts, typ=GetOidcPublicKeysResult).value
|
|
126
|
+
|
|
127
|
+
return AwaitableGetOidcPublicKeysResult(
|
|
128
|
+
id=pulumi.get(__ret__, 'id'),
|
|
129
|
+
keys=pulumi.get(__ret__, 'keys'),
|
|
130
|
+
name=pulumi.get(__ret__, 'name'),
|
|
131
|
+
namespace=pulumi.get(__ret__, 'namespace'))
|
|
132
|
+
def get_oidc_public_keys_output(name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
133
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
134
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetOidcPublicKeysResult]:
|
|
135
|
+
"""
|
|
136
|
+
## Example Usage
|
|
137
|
+
|
|
138
|
+
```python
|
|
139
|
+
import pulumi
|
|
140
|
+
import pulumi_vault as vault
|
|
141
|
+
|
|
142
|
+
key = vault.identity.OidcKey("key",
|
|
143
|
+
name="key",
|
|
144
|
+
allowed_client_ids=["*"],
|
|
145
|
+
rotation_period=3600,
|
|
146
|
+
verification_ttl=3600)
|
|
147
|
+
app = vault.identity.OidcClient("app",
|
|
148
|
+
name="application",
|
|
149
|
+
key=key.name,
|
|
150
|
+
redirect_uris=[
|
|
151
|
+
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
152
|
+
"http://127.0.0.1:8251/callback",
|
|
153
|
+
"http://127.0.0.1:8080/callback",
|
|
154
|
+
],
|
|
155
|
+
id_token_ttl=2400,
|
|
156
|
+
access_token_ttl=7200)
|
|
157
|
+
provider = vault.identity.OidcProvider("provider",
|
|
158
|
+
name="provider",
|
|
159
|
+
allowed_client_ids=[test["clientId"]])
|
|
160
|
+
public_keys = vault.identity.get_oidc_public_keys_output(name=provider.name)
|
|
161
|
+
```
|
|
162
|
+
|
|
163
|
+
|
|
164
|
+
:param _builtins.str name: The name of the OIDC Provider in Vault.
|
|
165
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
166
|
+
The value should not contain leading or trailing forward slashes.
|
|
167
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
168
|
+
*Available only for Vault Enterprise*.
|
|
169
|
+
"""
|
|
170
|
+
__args__ = dict()
|
|
171
|
+
__args__['name'] = name
|
|
172
|
+
__args__['namespace'] = namespace
|
|
173
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
174
|
+
__ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcPublicKeys:getOidcPublicKeys', __args__, opts=opts, typ=GetOidcPublicKeysResult)
|
|
175
|
+
return __ret__.apply(lambda __response__: GetOidcPublicKeysResult(
|
|
176
|
+
id=pulumi.get(__response__, 'id'),
|
|
177
|
+
keys=pulumi.get(__response__, 'keys'),
|
|
178
|
+
name=pulumi.get(__response__, 'name'),
|
|
179
|
+
namespace=pulumi.get(__response__, 'namespace')))
|