pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,474 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['OidcKeyArgs', 'OidcKey']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class OidcKeyArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
|
23
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
24
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
26
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
27
|
+
verification_ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
|
28
|
+
"""
|
|
29
|
+
The set of arguments for constructing a OidcKey resource.
|
|
30
|
+
:param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
|
|
31
|
+
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
|
32
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
|
|
33
|
+
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
|
34
|
+
:param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
|
|
35
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
36
|
+
The value should not contain leading or trailing forward slashes.
|
|
37
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
38
|
+
*Available only for Vault Enterprise*.
|
|
39
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
|
|
40
|
+
:param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
|
|
41
|
+
available for verification after being rotated in seconds.
|
|
42
|
+
"""
|
|
43
|
+
if algorithm is not None:
|
|
44
|
+
pulumi.set(__self__, "algorithm", algorithm)
|
|
45
|
+
if allowed_client_ids is not None:
|
|
46
|
+
pulumi.set(__self__, "allowed_client_ids", allowed_client_ids)
|
|
47
|
+
if name is not None:
|
|
48
|
+
pulumi.set(__self__, "name", name)
|
|
49
|
+
if namespace is not None:
|
|
50
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
51
|
+
if rotation_period is not None:
|
|
52
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
|
53
|
+
if verification_ttl is not None:
|
|
54
|
+
pulumi.set(__self__, "verification_ttl", verification_ttl)
|
|
55
|
+
|
|
56
|
+
@_builtins.property
|
|
57
|
+
@pulumi.getter
|
|
58
|
+
def algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
59
|
+
"""
|
|
60
|
+
Signing algorithm to use. Signing algorithm to use.
|
|
61
|
+
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
|
62
|
+
"""
|
|
63
|
+
return pulumi.get(self, "algorithm")
|
|
64
|
+
|
|
65
|
+
@algorithm.setter
|
|
66
|
+
def algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
67
|
+
pulumi.set(self, "algorithm", value)
|
|
68
|
+
|
|
69
|
+
@_builtins.property
|
|
70
|
+
@pulumi.getter(name="allowedClientIds")
|
|
71
|
+
def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
72
|
+
"""
|
|
73
|
+
Array of role client ID allowed to use this key for signing. If
|
|
74
|
+
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
|
75
|
+
"""
|
|
76
|
+
return pulumi.get(self, "allowed_client_ids")
|
|
77
|
+
|
|
78
|
+
@allowed_client_ids.setter
|
|
79
|
+
def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
80
|
+
pulumi.set(self, "allowed_client_ids", value)
|
|
81
|
+
|
|
82
|
+
@_builtins.property
|
|
83
|
+
@pulumi.getter
|
|
84
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
85
|
+
"""
|
|
86
|
+
Name of the OIDC Key to create.
|
|
87
|
+
"""
|
|
88
|
+
return pulumi.get(self, "name")
|
|
89
|
+
|
|
90
|
+
@name.setter
|
|
91
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
92
|
+
pulumi.set(self, "name", value)
|
|
93
|
+
|
|
94
|
+
@_builtins.property
|
|
95
|
+
@pulumi.getter
|
|
96
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
97
|
+
"""
|
|
98
|
+
The namespace to provision the resource in.
|
|
99
|
+
The value should not contain leading or trailing forward slashes.
|
|
100
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
101
|
+
*Available only for Vault Enterprise*.
|
|
102
|
+
"""
|
|
103
|
+
return pulumi.get(self, "namespace")
|
|
104
|
+
|
|
105
|
+
@namespace.setter
|
|
106
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
107
|
+
pulumi.set(self, "namespace", value)
|
|
108
|
+
|
|
109
|
+
@_builtins.property
|
|
110
|
+
@pulumi.getter(name="rotationPeriod")
|
|
111
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
112
|
+
"""
|
|
113
|
+
How often to generate a new signing key in number of seconds
|
|
114
|
+
"""
|
|
115
|
+
return pulumi.get(self, "rotation_period")
|
|
116
|
+
|
|
117
|
+
@rotation_period.setter
|
|
118
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
119
|
+
pulumi.set(self, "rotation_period", value)
|
|
120
|
+
|
|
121
|
+
@_builtins.property
|
|
122
|
+
@pulumi.getter(name="verificationTtl")
|
|
123
|
+
def verification_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
124
|
+
"""
|
|
125
|
+
"Controls how long the public portion of a signing key will be
|
|
126
|
+
available for verification after being rotated in seconds.
|
|
127
|
+
"""
|
|
128
|
+
return pulumi.get(self, "verification_ttl")
|
|
129
|
+
|
|
130
|
+
@verification_ttl.setter
|
|
131
|
+
def verification_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
132
|
+
pulumi.set(self, "verification_ttl", value)
|
|
133
|
+
|
|
134
|
+
|
|
135
|
+
@pulumi.input_type
|
|
136
|
+
class _OidcKeyState:
|
|
137
|
+
def __init__(__self__, *,
|
|
138
|
+
algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
|
139
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
140
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
141
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
142
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
143
|
+
verification_ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
|
144
|
+
"""
|
|
145
|
+
Input properties used for looking up and filtering OidcKey resources.
|
|
146
|
+
:param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
|
|
147
|
+
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
|
148
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
|
|
149
|
+
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
|
150
|
+
:param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
|
|
151
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
152
|
+
The value should not contain leading or trailing forward slashes.
|
|
153
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
154
|
+
*Available only for Vault Enterprise*.
|
|
155
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
|
|
156
|
+
:param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
|
|
157
|
+
available for verification after being rotated in seconds.
|
|
158
|
+
"""
|
|
159
|
+
if algorithm is not None:
|
|
160
|
+
pulumi.set(__self__, "algorithm", algorithm)
|
|
161
|
+
if allowed_client_ids is not None:
|
|
162
|
+
pulumi.set(__self__, "allowed_client_ids", allowed_client_ids)
|
|
163
|
+
if name is not None:
|
|
164
|
+
pulumi.set(__self__, "name", name)
|
|
165
|
+
if namespace is not None:
|
|
166
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
167
|
+
if rotation_period is not None:
|
|
168
|
+
pulumi.set(__self__, "rotation_period", rotation_period)
|
|
169
|
+
if verification_ttl is not None:
|
|
170
|
+
pulumi.set(__self__, "verification_ttl", verification_ttl)
|
|
171
|
+
|
|
172
|
+
@_builtins.property
|
|
173
|
+
@pulumi.getter
|
|
174
|
+
def algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
175
|
+
"""
|
|
176
|
+
Signing algorithm to use. Signing algorithm to use.
|
|
177
|
+
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
|
178
|
+
"""
|
|
179
|
+
return pulumi.get(self, "algorithm")
|
|
180
|
+
|
|
181
|
+
@algorithm.setter
|
|
182
|
+
def algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
183
|
+
pulumi.set(self, "algorithm", value)
|
|
184
|
+
|
|
185
|
+
@_builtins.property
|
|
186
|
+
@pulumi.getter(name="allowedClientIds")
|
|
187
|
+
def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
188
|
+
"""
|
|
189
|
+
Array of role client ID allowed to use this key for signing. If
|
|
190
|
+
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
|
191
|
+
"""
|
|
192
|
+
return pulumi.get(self, "allowed_client_ids")
|
|
193
|
+
|
|
194
|
+
@allowed_client_ids.setter
|
|
195
|
+
def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
196
|
+
pulumi.set(self, "allowed_client_ids", value)
|
|
197
|
+
|
|
198
|
+
@_builtins.property
|
|
199
|
+
@pulumi.getter
|
|
200
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
201
|
+
"""
|
|
202
|
+
Name of the OIDC Key to create.
|
|
203
|
+
"""
|
|
204
|
+
return pulumi.get(self, "name")
|
|
205
|
+
|
|
206
|
+
@name.setter
|
|
207
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
208
|
+
pulumi.set(self, "name", value)
|
|
209
|
+
|
|
210
|
+
@_builtins.property
|
|
211
|
+
@pulumi.getter
|
|
212
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
213
|
+
"""
|
|
214
|
+
The namespace to provision the resource in.
|
|
215
|
+
The value should not contain leading or trailing forward slashes.
|
|
216
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
217
|
+
*Available only for Vault Enterprise*.
|
|
218
|
+
"""
|
|
219
|
+
return pulumi.get(self, "namespace")
|
|
220
|
+
|
|
221
|
+
@namespace.setter
|
|
222
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
223
|
+
pulumi.set(self, "namespace", value)
|
|
224
|
+
|
|
225
|
+
@_builtins.property
|
|
226
|
+
@pulumi.getter(name="rotationPeriod")
|
|
227
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
228
|
+
"""
|
|
229
|
+
How often to generate a new signing key in number of seconds
|
|
230
|
+
"""
|
|
231
|
+
return pulumi.get(self, "rotation_period")
|
|
232
|
+
|
|
233
|
+
@rotation_period.setter
|
|
234
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
235
|
+
pulumi.set(self, "rotation_period", value)
|
|
236
|
+
|
|
237
|
+
@_builtins.property
|
|
238
|
+
@pulumi.getter(name="verificationTtl")
|
|
239
|
+
def verification_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
240
|
+
"""
|
|
241
|
+
"Controls how long the public portion of a signing key will be
|
|
242
|
+
available for verification after being rotated in seconds.
|
|
243
|
+
"""
|
|
244
|
+
return pulumi.get(self, "verification_ttl")
|
|
245
|
+
|
|
246
|
+
@verification_ttl.setter
|
|
247
|
+
def verification_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
248
|
+
pulumi.set(self, "verification_ttl", value)
|
|
249
|
+
|
|
250
|
+
|
|
251
|
+
@pulumi.type_token("vault:identity/oidcKey:OidcKey")
|
|
252
|
+
class OidcKey(pulumi.CustomResource):
|
|
253
|
+
@overload
|
|
254
|
+
def __init__(__self__,
|
|
255
|
+
resource_name: str,
|
|
256
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
257
|
+
algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
|
258
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
259
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
260
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
261
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
262
|
+
verification_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
263
|
+
__props__=None):
|
|
264
|
+
"""
|
|
265
|
+
## Example Usage
|
|
266
|
+
|
|
267
|
+
```python
|
|
268
|
+
import pulumi
|
|
269
|
+
import pulumi_vault as vault
|
|
270
|
+
|
|
271
|
+
key = vault.identity.OidcKey("key",
|
|
272
|
+
name="key",
|
|
273
|
+
algorithm="RS256")
|
|
274
|
+
role = vault.identity.OidcRole("role",
|
|
275
|
+
name="role",
|
|
276
|
+
key=key.name)
|
|
277
|
+
role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
|
|
278
|
+
key_name=key.name,
|
|
279
|
+
allowed_client_id=role.client_id)
|
|
280
|
+
```
|
|
281
|
+
|
|
282
|
+
## Import
|
|
283
|
+
|
|
284
|
+
The key can be imported with the key name, for example:
|
|
285
|
+
|
|
286
|
+
```sh
|
|
287
|
+
$ pulumi import vault:identity/oidcKey:OidcKey key key
|
|
288
|
+
```
|
|
289
|
+
|
|
290
|
+
:param str resource_name: The name of the resource.
|
|
291
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
292
|
+
:param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
|
|
293
|
+
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
|
294
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
|
|
295
|
+
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
|
296
|
+
:param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
|
|
297
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
298
|
+
The value should not contain leading or trailing forward slashes.
|
|
299
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
300
|
+
*Available only for Vault Enterprise*.
|
|
301
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
|
|
302
|
+
:param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
|
|
303
|
+
available for verification after being rotated in seconds.
|
|
304
|
+
"""
|
|
305
|
+
...
|
|
306
|
+
@overload
|
|
307
|
+
def __init__(__self__,
|
|
308
|
+
resource_name: str,
|
|
309
|
+
args: Optional[OidcKeyArgs] = None,
|
|
310
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
311
|
+
"""
|
|
312
|
+
## Example Usage
|
|
313
|
+
|
|
314
|
+
```python
|
|
315
|
+
import pulumi
|
|
316
|
+
import pulumi_vault as vault
|
|
317
|
+
|
|
318
|
+
key = vault.identity.OidcKey("key",
|
|
319
|
+
name="key",
|
|
320
|
+
algorithm="RS256")
|
|
321
|
+
role = vault.identity.OidcRole("role",
|
|
322
|
+
name="role",
|
|
323
|
+
key=key.name)
|
|
324
|
+
role_oidc_key_allowed_client_id = vault.identity.OidcKeyAllowedClientID("role",
|
|
325
|
+
key_name=key.name,
|
|
326
|
+
allowed_client_id=role.client_id)
|
|
327
|
+
```
|
|
328
|
+
|
|
329
|
+
## Import
|
|
330
|
+
|
|
331
|
+
The key can be imported with the key name, for example:
|
|
332
|
+
|
|
333
|
+
```sh
|
|
334
|
+
$ pulumi import vault:identity/oidcKey:OidcKey key key
|
|
335
|
+
```
|
|
336
|
+
|
|
337
|
+
:param str resource_name: The name of the resource.
|
|
338
|
+
:param OidcKeyArgs args: The arguments to use to populate this resource's properties.
|
|
339
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
340
|
+
"""
|
|
341
|
+
...
|
|
342
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
343
|
+
resource_args, opts = _utilities.get_resource_args_opts(OidcKeyArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
344
|
+
if resource_args is not None:
|
|
345
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
346
|
+
else:
|
|
347
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
348
|
+
|
|
349
|
+
def _internal_init(__self__,
|
|
350
|
+
resource_name: str,
|
|
351
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
352
|
+
algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
|
353
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
354
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
355
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
356
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
357
|
+
verification_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
358
|
+
__props__=None):
|
|
359
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
360
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
361
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
362
|
+
if opts.id is None:
|
|
363
|
+
if __props__ is not None:
|
|
364
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
365
|
+
__props__ = OidcKeyArgs.__new__(OidcKeyArgs)
|
|
366
|
+
|
|
367
|
+
__props__.__dict__["algorithm"] = algorithm
|
|
368
|
+
__props__.__dict__["allowed_client_ids"] = allowed_client_ids
|
|
369
|
+
__props__.__dict__["name"] = name
|
|
370
|
+
__props__.__dict__["namespace"] = namespace
|
|
371
|
+
__props__.__dict__["rotation_period"] = rotation_period
|
|
372
|
+
__props__.__dict__["verification_ttl"] = verification_ttl
|
|
373
|
+
super(OidcKey, __self__).__init__(
|
|
374
|
+
'vault:identity/oidcKey:OidcKey',
|
|
375
|
+
resource_name,
|
|
376
|
+
__props__,
|
|
377
|
+
opts)
|
|
378
|
+
|
|
379
|
+
@staticmethod
|
|
380
|
+
def get(resource_name: str,
|
|
381
|
+
id: pulumi.Input[str],
|
|
382
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
383
|
+
algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
|
384
|
+
allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
385
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
386
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
387
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
388
|
+
verification_ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'OidcKey':
|
|
389
|
+
"""
|
|
390
|
+
Get an existing OidcKey resource's state with the given name, id, and optional extra
|
|
391
|
+
properties used to qualify the lookup.
|
|
392
|
+
|
|
393
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
394
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
395
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
396
|
+
:param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
|
|
397
|
+
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
|
398
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
|
|
399
|
+
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
|
400
|
+
:param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
|
|
401
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
402
|
+
The value should not contain leading or trailing forward slashes.
|
|
403
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
404
|
+
*Available only for Vault Enterprise*.
|
|
405
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
|
|
406
|
+
:param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
|
|
407
|
+
available for verification after being rotated in seconds.
|
|
408
|
+
"""
|
|
409
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
410
|
+
|
|
411
|
+
__props__ = _OidcKeyState.__new__(_OidcKeyState)
|
|
412
|
+
|
|
413
|
+
__props__.__dict__["algorithm"] = algorithm
|
|
414
|
+
__props__.__dict__["allowed_client_ids"] = allowed_client_ids
|
|
415
|
+
__props__.__dict__["name"] = name
|
|
416
|
+
__props__.__dict__["namespace"] = namespace
|
|
417
|
+
__props__.__dict__["rotation_period"] = rotation_period
|
|
418
|
+
__props__.__dict__["verification_ttl"] = verification_ttl
|
|
419
|
+
return OidcKey(resource_name, opts=opts, __props__=__props__)
|
|
420
|
+
|
|
421
|
+
@_builtins.property
|
|
422
|
+
@pulumi.getter
|
|
423
|
+
def algorithm(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
424
|
+
"""
|
|
425
|
+
Signing algorithm to use. Signing algorithm to use.
|
|
426
|
+
Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
|
|
427
|
+
"""
|
|
428
|
+
return pulumi.get(self, "algorithm")
|
|
429
|
+
|
|
430
|
+
@_builtins.property
|
|
431
|
+
@pulumi.getter(name="allowedClientIds")
|
|
432
|
+
def allowed_client_ids(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
|
433
|
+
"""
|
|
434
|
+
Array of role client ID allowed to use this key for signing. If
|
|
435
|
+
empty, no roles are allowed. If `["*"]`, all roles are allowed.
|
|
436
|
+
"""
|
|
437
|
+
return pulumi.get(self, "allowed_client_ids")
|
|
438
|
+
|
|
439
|
+
@_builtins.property
|
|
440
|
+
@pulumi.getter
|
|
441
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
|
442
|
+
"""
|
|
443
|
+
Name of the OIDC Key to create.
|
|
444
|
+
"""
|
|
445
|
+
return pulumi.get(self, "name")
|
|
446
|
+
|
|
447
|
+
@_builtins.property
|
|
448
|
+
@pulumi.getter
|
|
449
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
450
|
+
"""
|
|
451
|
+
The namespace to provision the resource in.
|
|
452
|
+
The value should not contain leading or trailing forward slashes.
|
|
453
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
454
|
+
*Available only for Vault Enterprise*.
|
|
455
|
+
"""
|
|
456
|
+
return pulumi.get(self, "namespace")
|
|
457
|
+
|
|
458
|
+
@_builtins.property
|
|
459
|
+
@pulumi.getter(name="rotationPeriod")
|
|
460
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
461
|
+
"""
|
|
462
|
+
How often to generate a new signing key in number of seconds
|
|
463
|
+
"""
|
|
464
|
+
return pulumi.get(self, "rotation_period")
|
|
465
|
+
|
|
466
|
+
@_builtins.property
|
|
467
|
+
@pulumi.getter(name="verificationTtl")
|
|
468
|
+
def verification_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
469
|
+
"""
|
|
470
|
+
"Controls how long the public portion of a signing key will be
|
|
471
|
+
available for verification after being rotated in seconds.
|
|
472
|
+
"""
|
|
473
|
+
return pulumi.get(self, "verification_ttl")
|
|
474
|
+
|