pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,667 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['OidcClientArgs', 'OidcClient']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class OidcClientArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
access_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
23
|
+
assignments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
24
|
+
client_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
25
|
+
id_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
26
|
+
key: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
28
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
29
|
+
redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
|
30
|
+
"""
|
|
31
|
+
The set of arguments for constructing a OidcClient resource.
|
|
32
|
+
:param pulumi.Input[_builtins.int] access_token_ttl: The time-to-live for access tokens obtained by the client.
|
|
33
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] assignments: A list of assignment resources associated with the client.
|
|
34
|
+
:param pulumi.Input[_builtins.str] client_type: The client type based on its ability to maintain confidentiality of credentials.
|
|
35
|
+
The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
|
|
36
|
+
:param pulumi.Input[_builtins.int] id_token_ttl: The time-to-live for ID tokens obtained by the client.
|
|
37
|
+
The value should be less than the `verification_ttl` on the key.
|
|
38
|
+
:param pulumi.Input[_builtins.str] key: A reference to a named key resource in Vault.
|
|
39
|
+
This cannot be modified after creation. If not provided, the `default`
|
|
40
|
+
key is used.
|
|
41
|
+
:param pulumi.Input[_builtins.str] name: The name of the client.
|
|
42
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
43
|
+
The value should not contain leading or trailing forward slashes.
|
|
44
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
45
|
+
*Available only for Vault Enterprise*.
|
|
46
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] redirect_uris: Redirection URI values used by the client.
|
|
47
|
+
One of these values must exactly match the `redirect_uri` parameter value
|
|
48
|
+
used in each authentication request.
|
|
49
|
+
"""
|
|
50
|
+
if access_token_ttl is not None:
|
|
51
|
+
pulumi.set(__self__, "access_token_ttl", access_token_ttl)
|
|
52
|
+
if assignments is not None:
|
|
53
|
+
pulumi.set(__self__, "assignments", assignments)
|
|
54
|
+
if client_type is not None:
|
|
55
|
+
pulumi.set(__self__, "client_type", client_type)
|
|
56
|
+
if id_token_ttl is not None:
|
|
57
|
+
pulumi.set(__self__, "id_token_ttl", id_token_ttl)
|
|
58
|
+
if key is not None:
|
|
59
|
+
pulumi.set(__self__, "key", key)
|
|
60
|
+
if name is not None:
|
|
61
|
+
pulumi.set(__self__, "name", name)
|
|
62
|
+
if namespace is not None:
|
|
63
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
64
|
+
if redirect_uris is not None:
|
|
65
|
+
pulumi.set(__self__, "redirect_uris", redirect_uris)
|
|
66
|
+
|
|
67
|
+
@_builtins.property
|
|
68
|
+
@pulumi.getter(name="accessTokenTtl")
|
|
69
|
+
def access_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
70
|
+
"""
|
|
71
|
+
The time-to-live for access tokens obtained by the client.
|
|
72
|
+
"""
|
|
73
|
+
return pulumi.get(self, "access_token_ttl")
|
|
74
|
+
|
|
75
|
+
@access_token_ttl.setter
|
|
76
|
+
def access_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
77
|
+
pulumi.set(self, "access_token_ttl", value)
|
|
78
|
+
|
|
79
|
+
@_builtins.property
|
|
80
|
+
@pulumi.getter
|
|
81
|
+
def assignments(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
82
|
+
"""
|
|
83
|
+
A list of assignment resources associated with the client.
|
|
84
|
+
"""
|
|
85
|
+
return pulumi.get(self, "assignments")
|
|
86
|
+
|
|
87
|
+
@assignments.setter
|
|
88
|
+
def assignments(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
89
|
+
pulumi.set(self, "assignments", value)
|
|
90
|
+
|
|
91
|
+
@_builtins.property
|
|
92
|
+
@pulumi.getter(name="clientType")
|
|
93
|
+
def client_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
94
|
+
"""
|
|
95
|
+
The client type based on its ability to maintain confidentiality of credentials.
|
|
96
|
+
The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
|
|
97
|
+
"""
|
|
98
|
+
return pulumi.get(self, "client_type")
|
|
99
|
+
|
|
100
|
+
@client_type.setter
|
|
101
|
+
def client_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
102
|
+
pulumi.set(self, "client_type", value)
|
|
103
|
+
|
|
104
|
+
@_builtins.property
|
|
105
|
+
@pulumi.getter(name="idTokenTtl")
|
|
106
|
+
def id_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
107
|
+
"""
|
|
108
|
+
The time-to-live for ID tokens obtained by the client.
|
|
109
|
+
The value should be less than the `verification_ttl` on the key.
|
|
110
|
+
"""
|
|
111
|
+
return pulumi.get(self, "id_token_ttl")
|
|
112
|
+
|
|
113
|
+
@id_token_ttl.setter
|
|
114
|
+
def id_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
115
|
+
pulumi.set(self, "id_token_ttl", value)
|
|
116
|
+
|
|
117
|
+
@_builtins.property
|
|
118
|
+
@pulumi.getter
|
|
119
|
+
def key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
120
|
+
"""
|
|
121
|
+
A reference to a named key resource in Vault.
|
|
122
|
+
This cannot be modified after creation. If not provided, the `default`
|
|
123
|
+
key is used.
|
|
124
|
+
"""
|
|
125
|
+
return pulumi.get(self, "key")
|
|
126
|
+
|
|
127
|
+
@key.setter
|
|
128
|
+
def key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
129
|
+
pulumi.set(self, "key", value)
|
|
130
|
+
|
|
131
|
+
@_builtins.property
|
|
132
|
+
@pulumi.getter
|
|
133
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
134
|
+
"""
|
|
135
|
+
The name of the client.
|
|
136
|
+
"""
|
|
137
|
+
return pulumi.get(self, "name")
|
|
138
|
+
|
|
139
|
+
@name.setter
|
|
140
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
141
|
+
pulumi.set(self, "name", value)
|
|
142
|
+
|
|
143
|
+
@_builtins.property
|
|
144
|
+
@pulumi.getter
|
|
145
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
146
|
+
"""
|
|
147
|
+
The namespace to provision the resource in.
|
|
148
|
+
The value should not contain leading or trailing forward slashes.
|
|
149
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
150
|
+
*Available only for Vault Enterprise*.
|
|
151
|
+
"""
|
|
152
|
+
return pulumi.get(self, "namespace")
|
|
153
|
+
|
|
154
|
+
@namespace.setter
|
|
155
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
156
|
+
pulumi.set(self, "namespace", value)
|
|
157
|
+
|
|
158
|
+
@_builtins.property
|
|
159
|
+
@pulumi.getter(name="redirectUris")
|
|
160
|
+
def redirect_uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
161
|
+
"""
|
|
162
|
+
Redirection URI values used by the client.
|
|
163
|
+
One of these values must exactly match the `redirect_uri` parameter value
|
|
164
|
+
used in each authentication request.
|
|
165
|
+
"""
|
|
166
|
+
return pulumi.get(self, "redirect_uris")
|
|
167
|
+
|
|
168
|
+
@redirect_uris.setter
|
|
169
|
+
def redirect_uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
170
|
+
pulumi.set(self, "redirect_uris", value)
|
|
171
|
+
|
|
172
|
+
|
|
173
|
+
@pulumi.input_type
|
|
174
|
+
class _OidcClientState:
|
|
175
|
+
def __init__(__self__, *,
|
|
176
|
+
access_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
177
|
+
assignments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
178
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
179
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
|
180
|
+
client_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
181
|
+
id_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
182
|
+
key: Optional[pulumi.Input[_builtins.str]] = None,
|
|
183
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
184
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
185
|
+
redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
|
186
|
+
"""
|
|
187
|
+
Input properties used for looking up and filtering OidcClient resources.
|
|
188
|
+
:param pulumi.Input[_builtins.int] access_token_ttl: The time-to-live for access tokens obtained by the client.
|
|
189
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] assignments: A list of assignment resources associated with the client.
|
|
190
|
+
:param pulumi.Input[_builtins.str] client_id: The Client ID returned by Vault.
|
|
191
|
+
:param pulumi.Input[_builtins.str] client_secret: The Client Secret Key returned by Vault.
|
|
192
|
+
For public OpenID Clients `client_secret` is set to an empty string `""`
|
|
193
|
+
:param pulumi.Input[_builtins.str] client_type: The client type based on its ability to maintain confidentiality of credentials.
|
|
194
|
+
The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
|
|
195
|
+
:param pulumi.Input[_builtins.int] id_token_ttl: The time-to-live for ID tokens obtained by the client.
|
|
196
|
+
The value should be less than the `verification_ttl` on the key.
|
|
197
|
+
:param pulumi.Input[_builtins.str] key: A reference to a named key resource in Vault.
|
|
198
|
+
This cannot be modified after creation. If not provided, the `default`
|
|
199
|
+
key is used.
|
|
200
|
+
:param pulumi.Input[_builtins.str] name: The name of the client.
|
|
201
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
202
|
+
The value should not contain leading or trailing forward slashes.
|
|
203
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
204
|
+
*Available only for Vault Enterprise*.
|
|
205
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] redirect_uris: Redirection URI values used by the client.
|
|
206
|
+
One of these values must exactly match the `redirect_uri` parameter value
|
|
207
|
+
used in each authentication request.
|
|
208
|
+
"""
|
|
209
|
+
if access_token_ttl is not None:
|
|
210
|
+
pulumi.set(__self__, "access_token_ttl", access_token_ttl)
|
|
211
|
+
if assignments is not None:
|
|
212
|
+
pulumi.set(__self__, "assignments", assignments)
|
|
213
|
+
if client_id is not None:
|
|
214
|
+
pulumi.set(__self__, "client_id", client_id)
|
|
215
|
+
if client_secret is not None:
|
|
216
|
+
pulumi.set(__self__, "client_secret", client_secret)
|
|
217
|
+
if client_type is not None:
|
|
218
|
+
pulumi.set(__self__, "client_type", client_type)
|
|
219
|
+
if id_token_ttl is not None:
|
|
220
|
+
pulumi.set(__self__, "id_token_ttl", id_token_ttl)
|
|
221
|
+
if key is not None:
|
|
222
|
+
pulumi.set(__self__, "key", key)
|
|
223
|
+
if name is not None:
|
|
224
|
+
pulumi.set(__self__, "name", name)
|
|
225
|
+
if namespace is not None:
|
|
226
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
227
|
+
if redirect_uris is not None:
|
|
228
|
+
pulumi.set(__self__, "redirect_uris", redirect_uris)
|
|
229
|
+
|
|
230
|
+
@_builtins.property
|
|
231
|
+
@pulumi.getter(name="accessTokenTtl")
|
|
232
|
+
def access_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
233
|
+
"""
|
|
234
|
+
The time-to-live for access tokens obtained by the client.
|
|
235
|
+
"""
|
|
236
|
+
return pulumi.get(self, "access_token_ttl")
|
|
237
|
+
|
|
238
|
+
@access_token_ttl.setter
|
|
239
|
+
def access_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
240
|
+
pulumi.set(self, "access_token_ttl", value)
|
|
241
|
+
|
|
242
|
+
@_builtins.property
|
|
243
|
+
@pulumi.getter
|
|
244
|
+
def assignments(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
245
|
+
"""
|
|
246
|
+
A list of assignment resources associated with the client.
|
|
247
|
+
"""
|
|
248
|
+
return pulumi.get(self, "assignments")
|
|
249
|
+
|
|
250
|
+
@assignments.setter
|
|
251
|
+
def assignments(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
252
|
+
pulumi.set(self, "assignments", value)
|
|
253
|
+
|
|
254
|
+
@_builtins.property
|
|
255
|
+
@pulumi.getter(name="clientId")
|
|
256
|
+
def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
257
|
+
"""
|
|
258
|
+
The Client ID returned by Vault.
|
|
259
|
+
"""
|
|
260
|
+
return pulumi.get(self, "client_id")
|
|
261
|
+
|
|
262
|
+
@client_id.setter
|
|
263
|
+
def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
264
|
+
pulumi.set(self, "client_id", value)
|
|
265
|
+
|
|
266
|
+
@_builtins.property
|
|
267
|
+
@pulumi.getter(name="clientSecret")
|
|
268
|
+
def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
269
|
+
"""
|
|
270
|
+
The Client Secret Key returned by Vault.
|
|
271
|
+
For public OpenID Clients `client_secret` is set to an empty string `""`
|
|
272
|
+
"""
|
|
273
|
+
return pulumi.get(self, "client_secret")
|
|
274
|
+
|
|
275
|
+
@client_secret.setter
|
|
276
|
+
def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
277
|
+
pulumi.set(self, "client_secret", value)
|
|
278
|
+
|
|
279
|
+
@_builtins.property
|
|
280
|
+
@pulumi.getter(name="clientType")
|
|
281
|
+
def client_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
282
|
+
"""
|
|
283
|
+
The client type based on its ability to maintain confidentiality of credentials.
|
|
284
|
+
The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
|
|
285
|
+
"""
|
|
286
|
+
return pulumi.get(self, "client_type")
|
|
287
|
+
|
|
288
|
+
@client_type.setter
|
|
289
|
+
def client_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
290
|
+
pulumi.set(self, "client_type", value)
|
|
291
|
+
|
|
292
|
+
@_builtins.property
|
|
293
|
+
@pulumi.getter(name="idTokenTtl")
|
|
294
|
+
def id_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
295
|
+
"""
|
|
296
|
+
The time-to-live for ID tokens obtained by the client.
|
|
297
|
+
The value should be less than the `verification_ttl` on the key.
|
|
298
|
+
"""
|
|
299
|
+
return pulumi.get(self, "id_token_ttl")
|
|
300
|
+
|
|
301
|
+
@id_token_ttl.setter
|
|
302
|
+
def id_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
303
|
+
pulumi.set(self, "id_token_ttl", value)
|
|
304
|
+
|
|
305
|
+
@_builtins.property
|
|
306
|
+
@pulumi.getter
|
|
307
|
+
def key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
308
|
+
"""
|
|
309
|
+
A reference to a named key resource in Vault.
|
|
310
|
+
This cannot be modified after creation. If not provided, the `default`
|
|
311
|
+
key is used.
|
|
312
|
+
"""
|
|
313
|
+
return pulumi.get(self, "key")
|
|
314
|
+
|
|
315
|
+
@key.setter
|
|
316
|
+
def key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
317
|
+
pulumi.set(self, "key", value)
|
|
318
|
+
|
|
319
|
+
@_builtins.property
|
|
320
|
+
@pulumi.getter
|
|
321
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
322
|
+
"""
|
|
323
|
+
The name of the client.
|
|
324
|
+
"""
|
|
325
|
+
return pulumi.get(self, "name")
|
|
326
|
+
|
|
327
|
+
@name.setter
|
|
328
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
329
|
+
pulumi.set(self, "name", value)
|
|
330
|
+
|
|
331
|
+
@_builtins.property
|
|
332
|
+
@pulumi.getter
|
|
333
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
334
|
+
"""
|
|
335
|
+
The namespace to provision the resource in.
|
|
336
|
+
The value should not contain leading or trailing forward slashes.
|
|
337
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
338
|
+
*Available only for Vault Enterprise*.
|
|
339
|
+
"""
|
|
340
|
+
return pulumi.get(self, "namespace")
|
|
341
|
+
|
|
342
|
+
@namespace.setter
|
|
343
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
344
|
+
pulumi.set(self, "namespace", value)
|
|
345
|
+
|
|
346
|
+
@_builtins.property
|
|
347
|
+
@pulumi.getter(name="redirectUris")
|
|
348
|
+
def redirect_uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
349
|
+
"""
|
|
350
|
+
Redirection URI values used by the client.
|
|
351
|
+
One of these values must exactly match the `redirect_uri` parameter value
|
|
352
|
+
used in each authentication request.
|
|
353
|
+
"""
|
|
354
|
+
return pulumi.get(self, "redirect_uris")
|
|
355
|
+
|
|
356
|
+
@redirect_uris.setter
|
|
357
|
+
def redirect_uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
358
|
+
pulumi.set(self, "redirect_uris", value)
|
|
359
|
+
|
|
360
|
+
|
|
361
|
+
@pulumi.type_token("vault:identity/oidcClient:OidcClient")
|
|
362
|
+
class OidcClient(pulumi.CustomResource):
|
|
363
|
+
@overload
|
|
364
|
+
def __init__(__self__,
|
|
365
|
+
resource_name: str,
|
|
366
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
367
|
+
access_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
368
|
+
assignments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
369
|
+
client_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
370
|
+
id_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
371
|
+
key: Optional[pulumi.Input[_builtins.str]] = None,
|
|
372
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
373
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
374
|
+
redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
375
|
+
__props__=None):
|
|
376
|
+
"""
|
|
377
|
+
Manages OIDC Clients in a Vault server. See the [Vault documentation](https://www.vaultproject.io/api-docs/secret/identity/oidc-provider#create-or-update-an-assignment)
|
|
378
|
+
for more information.
|
|
379
|
+
|
|
380
|
+
## Example Usage
|
|
381
|
+
|
|
382
|
+
```python
|
|
383
|
+
import pulumi
|
|
384
|
+
import pulumi_vault as vault
|
|
385
|
+
|
|
386
|
+
test = vault.identity.OidcAssignment("test",
|
|
387
|
+
name="my-assignment",
|
|
388
|
+
entity_ids=["ascbascas-2231a-sdfaa"],
|
|
389
|
+
group_ids=["sajkdsad-32414-sfsada"])
|
|
390
|
+
test_oidc_client = vault.identity.OidcClient("test",
|
|
391
|
+
name="my-app",
|
|
392
|
+
redirect_uris=[
|
|
393
|
+
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
394
|
+
"http://127.0.0.1:8251/callback",
|
|
395
|
+
"http://127.0.0.1:8080/callback",
|
|
396
|
+
],
|
|
397
|
+
assignments=[test.name],
|
|
398
|
+
id_token_ttl=2400,
|
|
399
|
+
access_token_ttl=7200)
|
|
400
|
+
```
|
|
401
|
+
|
|
402
|
+
## Import
|
|
403
|
+
|
|
404
|
+
OIDC Clients can be imported using the `name`, e.g.
|
|
405
|
+
|
|
406
|
+
```sh
|
|
407
|
+
$ pulumi import vault:identity/oidcClient:OidcClient test my-app
|
|
408
|
+
```
|
|
409
|
+
|
|
410
|
+
:param str resource_name: The name of the resource.
|
|
411
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
412
|
+
:param pulumi.Input[_builtins.int] access_token_ttl: The time-to-live for access tokens obtained by the client.
|
|
413
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] assignments: A list of assignment resources associated with the client.
|
|
414
|
+
:param pulumi.Input[_builtins.str] client_type: The client type based on its ability to maintain confidentiality of credentials.
|
|
415
|
+
The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
|
|
416
|
+
:param pulumi.Input[_builtins.int] id_token_ttl: The time-to-live for ID tokens obtained by the client.
|
|
417
|
+
The value should be less than the `verification_ttl` on the key.
|
|
418
|
+
:param pulumi.Input[_builtins.str] key: A reference to a named key resource in Vault.
|
|
419
|
+
This cannot be modified after creation. If not provided, the `default`
|
|
420
|
+
key is used.
|
|
421
|
+
:param pulumi.Input[_builtins.str] name: The name of the client.
|
|
422
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
423
|
+
The value should not contain leading or trailing forward slashes.
|
|
424
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
425
|
+
*Available only for Vault Enterprise*.
|
|
426
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] redirect_uris: Redirection URI values used by the client.
|
|
427
|
+
One of these values must exactly match the `redirect_uri` parameter value
|
|
428
|
+
used in each authentication request.
|
|
429
|
+
"""
|
|
430
|
+
...
|
|
431
|
+
@overload
|
|
432
|
+
def __init__(__self__,
|
|
433
|
+
resource_name: str,
|
|
434
|
+
args: Optional[OidcClientArgs] = None,
|
|
435
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
436
|
+
"""
|
|
437
|
+
Manages OIDC Clients in a Vault server. See the [Vault documentation](https://www.vaultproject.io/api-docs/secret/identity/oidc-provider#create-or-update-an-assignment)
|
|
438
|
+
for more information.
|
|
439
|
+
|
|
440
|
+
## Example Usage
|
|
441
|
+
|
|
442
|
+
```python
|
|
443
|
+
import pulumi
|
|
444
|
+
import pulumi_vault as vault
|
|
445
|
+
|
|
446
|
+
test = vault.identity.OidcAssignment("test",
|
|
447
|
+
name="my-assignment",
|
|
448
|
+
entity_ids=["ascbascas-2231a-sdfaa"],
|
|
449
|
+
group_ids=["sajkdsad-32414-sfsada"])
|
|
450
|
+
test_oidc_client = vault.identity.OidcClient("test",
|
|
451
|
+
name="my-app",
|
|
452
|
+
redirect_uris=[
|
|
453
|
+
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
|
454
|
+
"http://127.0.0.1:8251/callback",
|
|
455
|
+
"http://127.0.0.1:8080/callback",
|
|
456
|
+
],
|
|
457
|
+
assignments=[test.name],
|
|
458
|
+
id_token_ttl=2400,
|
|
459
|
+
access_token_ttl=7200)
|
|
460
|
+
```
|
|
461
|
+
|
|
462
|
+
## Import
|
|
463
|
+
|
|
464
|
+
OIDC Clients can be imported using the `name`, e.g.
|
|
465
|
+
|
|
466
|
+
```sh
|
|
467
|
+
$ pulumi import vault:identity/oidcClient:OidcClient test my-app
|
|
468
|
+
```
|
|
469
|
+
|
|
470
|
+
:param str resource_name: The name of the resource.
|
|
471
|
+
:param OidcClientArgs args: The arguments to use to populate this resource's properties.
|
|
472
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
473
|
+
"""
|
|
474
|
+
...
|
|
475
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
476
|
+
resource_args, opts = _utilities.get_resource_args_opts(OidcClientArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
477
|
+
if resource_args is not None:
|
|
478
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
479
|
+
else:
|
|
480
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
481
|
+
|
|
482
|
+
def _internal_init(__self__,
|
|
483
|
+
resource_name: str,
|
|
484
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
485
|
+
access_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
486
|
+
assignments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
487
|
+
client_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
488
|
+
id_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
489
|
+
key: Optional[pulumi.Input[_builtins.str]] = None,
|
|
490
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
491
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
492
|
+
redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
493
|
+
__props__=None):
|
|
494
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
495
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
496
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
497
|
+
if opts.id is None:
|
|
498
|
+
if __props__ is not None:
|
|
499
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
500
|
+
__props__ = OidcClientArgs.__new__(OidcClientArgs)
|
|
501
|
+
|
|
502
|
+
__props__.__dict__["access_token_ttl"] = access_token_ttl
|
|
503
|
+
__props__.__dict__["assignments"] = assignments
|
|
504
|
+
__props__.__dict__["client_type"] = client_type
|
|
505
|
+
__props__.__dict__["id_token_ttl"] = id_token_ttl
|
|
506
|
+
__props__.__dict__["key"] = key
|
|
507
|
+
__props__.__dict__["name"] = name
|
|
508
|
+
__props__.__dict__["namespace"] = namespace
|
|
509
|
+
__props__.__dict__["redirect_uris"] = redirect_uris
|
|
510
|
+
__props__.__dict__["client_id"] = None
|
|
511
|
+
__props__.__dict__["client_secret"] = None
|
|
512
|
+
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientSecret"])
|
|
513
|
+
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
|
514
|
+
super(OidcClient, __self__).__init__(
|
|
515
|
+
'vault:identity/oidcClient:OidcClient',
|
|
516
|
+
resource_name,
|
|
517
|
+
__props__,
|
|
518
|
+
opts)
|
|
519
|
+
|
|
520
|
+
@staticmethod
|
|
521
|
+
def get(resource_name: str,
|
|
522
|
+
id: pulumi.Input[str],
|
|
523
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
524
|
+
access_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
525
|
+
assignments: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
526
|
+
client_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
527
|
+
client_secret: Optional[pulumi.Input[_builtins.str]] = None,
|
|
528
|
+
client_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
529
|
+
id_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
530
|
+
key: Optional[pulumi.Input[_builtins.str]] = None,
|
|
531
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
532
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
533
|
+
redirect_uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'OidcClient':
|
|
534
|
+
"""
|
|
535
|
+
Get an existing OidcClient resource's state with the given name, id, and optional extra
|
|
536
|
+
properties used to qualify the lookup.
|
|
537
|
+
|
|
538
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
539
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
540
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
541
|
+
:param pulumi.Input[_builtins.int] access_token_ttl: The time-to-live for access tokens obtained by the client.
|
|
542
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] assignments: A list of assignment resources associated with the client.
|
|
543
|
+
:param pulumi.Input[_builtins.str] client_id: The Client ID returned by Vault.
|
|
544
|
+
:param pulumi.Input[_builtins.str] client_secret: The Client Secret Key returned by Vault.
|
|
545
|
+
For public OpenID Clients `client_secret` is set to an empty string `""`
|
|
546
|
+
:param pulumi.Input[_builtins.str] client_type: The client type based on its ability to maintain confidentiality of credentials.
|
|
547
|
+
The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
|
|
548
|
+
:param pulumi.Input[_builtins.int] id_token_ttl: The time-to-live for ID tokens obtained by the client.
|
|
549
|
+
The value should be less than the `verification_ttl` on the key.
|
|
550
|
+
:param pulumi.Input[_builtins.str] key: A reference to a named key resource in Vault.
|
|
551
|
+
This cannot be modified after creation. If not provided, the `default`
|
|
552
|
+
key is used.
|
|
553
|
+
:param pulumi.Input[_builtins.str] name: The name of the client.
|
|
554
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
555
|
+
The value should not contain leading or trailing forward slashes.
|
|
556
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
557
|
+
*Available only for Vault Enterprise*.
|
|
558
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] redirect_uris: Redirection URI values used by the client.
|
|
559
|
+
One of these values must exactly match the `redirect_uri` parameter value
|
|
560
|
+
used in each authentication request.
|
|
561
|
+
"""
|
|
562
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
563
|
+
|
|
564
|
+
__props__ = _OidcClientState.__new__(_OidcClientState)
|
|
565
|
+
|
|
566
|
+
__props__.__dict__["access_token_ttl"] = access_token_ttl
|
|
567
|
+
__props__.__dict__["assignments"] = assignments
|
|
568
|
+
__props__.__dict__["client_id"] = client_id
|
|
569
|
+
__props__.__dict__["client_secret"] = client_secret
|
|
570
|
+
__props__.__dict__["client_type"] = client_type
|
|
571
|
+
__props__.__dict__["id_token_ttl"] = id_token_ttl
|
|
572
|
+
__props__.__dict__["key"] = key
|
|
573
|
+
__props__.__dict__["name"] = name
|
|
574
|
+
__props__.__dict__["namespace"] = namespace
|
|
575
|
+
__props__.__dict__["redirect_uris"] = redirect_uris
|
|
576
|
+
return OidcClient(resource_name, opts=opts, __props__=__props__)
|
|
577
|
+
|
|
578
|
+
@_builtins.property
|
|
579
|
+
@pulumi.getter(name="accessTokenTtl")
|
|
580
|
+
def access_token_ttl(self) -> pulumi.Output[_builtins.int]:
|
|
581
|
+
"""
|
|
582
|
+
The time-to-live for access tokens obtained by the client.
|
|
583
|
+
"""
|
|
584
|
+
return pulumi.get(self, "access_token_ttl")
|
|
585
|
+
|
|
586
|
+
@_builtins.property
|
|
587
|
+
@pulumi.getter
|
|
588
|
+
def assignments(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
589
|
+
"""
|
|
590
|
+
A list of assignment resources associated with the client.
|
|
591
|
+
"""
|
|
592
|
+
return pulumi.get(self, "assignments")
|
|
593
|
+
|
|
594
|
+
@_builtins.property
|
|
595
|
+
@pulumi.getter(name="clientId")
|
|
596
|
+
def client_id(self) -> pulumi.Output[_builtins.str]:
|
|
597
|
+
"""
|
|
598
|
+
The Client ID returned by Vault.
|
|
599
|
+
"""
|
|
600
|
+
return pulumi.get(self, "client_id")
|
|
601
|
+
|
|
602
|
+
@_builtins.property
|
|
603
|
+
@pulumi.getter(name="clientSecret")
|
|
604
|
+
def client_secret(self) -> pulumi.Output[_builtins.str]:
|
|
605
|
+
"""
|
|
606
|
+
The Client Secret Key returned by Vault.
|
|
607
|
+
For public OpenID Clients `client_secret` is set to an empty string `""`
|
|
608
|
+
"""
|
|
609
|
+
return pulumi.get(self, "client_secret")
|
|
610
|
+
|
|
611
|
+
@_builtins.property
|
|
612
|
+
@pulumi.getter(name="clientType")
|
|
613
|
+
def client_type(self) -> pulumi.Output[_builtins.str]:
|
|
614
|
+
"""
|
|
615
|
+
The client type based on its ability to maintain confidentiality of credentials.
|
|
616
|
+
The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
|
|
617
|
+
"""
|
|
618
|
+
return pulumi.get(self, "client_type")
|
|
619
|
+
|
|
620
|
+
@_builtins.property
|
|
621
|
+
@pulumi.getter(name="idTokenTtl")
|
|
622
|
+
def id_token_ttl(self) -> pulumi.Output[_builtins.int]:
|
|
623
|
+
"""
|
|
624
|
+
The time-to-live for ID tokens obtained by the client.
|
|
625
|
+
The value should be less than the `verification_ttl` on the key.
|
|
626
|
+
"""
|
|
627
|
+
return pulumi.get(self, "id_token_ttl")
|
|
628
|
+
|
|
629
|
+
@_builtins.property
|
|
630
|
+
@pulumi.getter
|
|
631
|
+
def key(self) -> pulumi.Output[_builtins.str]:
|
|
632
|
+
"""
|
|
633
|
+
A reference to a named key resource in Vault.
|
|
634
|
+
This cannot be modified after creation. If not provided, the `default`
|
|
635
|
+
key is used.
|
|
636
|
+
"""
|
|
637
|
+
return pulumi.get(self, "key")
|
|
638
|
+
|
|
639
|
+
@_builtins.property
|
|
640
|
+
@pulumi.getter
|
|
641
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
|
642
|
+
"""
|
|
643
|
+
The name of the client.
|
|
644
|
+
"""
|
|
645
|
+
return pulumi.get(self, "name")
|
|
646
|
+
|
|
647
|
+
@_builtins.property
|
|
648
|
+
@pulumi.getter
|
|
649
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
650
|
+
"""
|
|
651
|
+
The namespace to provision the resource in.
|
|
652
|
+
The value should not contain leading or trailing forward slashes.
|
|
653
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
654
|
+
*Available only for Vault Enterprise*.
|
|
655
|
+
"""
|
|
656
|
+
return pulumi.get(self, "namespace")
|
|
657
|
+
|
|
658
|
+
@_builtins.property
|
|
659
|
+
@pulumi.getter(name="redirectUris")
|
|
660
|
+
def redirect_uris(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
661
|
+
"""
|
|
662
|
+
Redirection URI values used by the client.
|
|
663
|
+
One of these values must exactly match the `redirect_uri` parameter value
|
|
664
|
+
used in each authentication request.
|
|
665
|
+
"""
|
|
666
|
+
return pulumi.get(self, "redirect_uris")
|
|
667
|
+
|