pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,470 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetAuthBackendRoleResult',
|
|
19
|
+
'AwaitableGetAuthBackendRoleResult',
|
|
20
|
+
'get_auth_backend_role',
|
|
21
|
+
'get_auth_backend_role_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetAuthBackendRoleResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getAuthBackendRole.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, alias_metadata=None, alias_name_source=None, audience=None, backend=None, bound_service_account_names=None, bound_service_account_namespaces=None, id=None, namespace=None, role_name=None, token_bound_cidrs=None, token_explicit_max_ttl=None, token_max_ttl=None, token_no_default_policy=None, token_num_uses=None, token_period=None, token_policies=None, token_ttl=None, token_type=None):
|
|
30
|
+
if alias_metadata and not isinstance(alias_metadata, dict):
|
|
31
|
+
raise TypeError("Expected argument 'alias_metadata' to be a dict")
|
|
32
|
+
pulumi.set(__self__, "alias_metadata", alias_metadata)
|
|
33
|
+
if alias_name_source and not isinstance(alias_name_source, str):
|
|
34
|
+
raise TypeError("Expected argument 'alias_name_source' to be a str")
|
|
35
|
+
pulumi.set(__self__, "alias_name_source", alias_name_source)
|
|
36
|
+
if audience and not isinstance(audience, str):
|
|
37
|
+
raise TypeError("Expected argument 'audience' to be a str")
|
|
38
|
+
pulumi.set(__self__, "audience", audience)
|
|
39
|
+
if backend and not isinstance(backend, str):
|
|
40
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
|
41
|
+
pulumi.set(__self__, "backend", backend)
|
|
42
|
+
if bound_service_account_names and not isinstance(bound_service_account_names, list):
|
|
43
|
+
raise TypeError("Expected argument 'bound_service_account_names' to be a list")
|
|
44
|
+
pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
|
|
45
|
+
if bound_service_account_namespaces and not isinstance(bound_service_account_namespaces, list):
|
|
46
|
+
raise TypeError("Expected argument 'bound_service_account_namespaces' to be a list")
|
|
47
|
+
pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
|
|
48
|
+
if id and not isinstance(id, str):
|
|
49
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
50
|
+
pulumi.set(__self__, "id", id)
|
|
51
|
+
if namespace and not isinstance(namespace, str):
|
|
52
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
53
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
54
|
+
if role_name and not isinstance(role_name, str):
|
|
55
|
+
raise TypeError("Expected argument 'role_name' to be a str")
|
|
56
|
+
pulumi.set(__self__, "role_name", role_name)
|
|
57
|
+
if token_bound_cidrs and not isinstance(token_bound_cidrs, list):
|
|
58
|
+
raise TypeError("Expected argument 'token_bound_cidrs' to be a list")
|
|
59
|
+
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
|
60
|
+
if token_explicit_max_ttl and not isinstance(token_explicit_max_ttl, int):
|
|
61
|
+
raise TypeError("Expected argument 'token_explicit_max_ttl' to be a int")
|
|
62
|
+
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
|
63
|
+
if token_max_ttl and not isinstance(token_max_ttl, int):
|
|
64
|
+
raise TypeError("Expected argument 'token_max_ttl' to be a int")
|
|
65
|
+
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
|
66
|
+
if token_no_default_policy and not isinstance(token_no_default_policy, bool):
|
|
67
|
+
raise TypeError("Expected argument 'token_no_default_policy' to be a bool")
|
|
68
|
+
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
|
69
|
+
if token_num_uses and not isinstance(token_num_uses, int):
|
|
70
|
+
raise TypeError("Expected argument 'token_num_uses' to be a int")
|
|
71
|
+
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
|
72
|
+
if token_period and not isinstance(token_period, int):
|
|
73
|
+
raise TypeError("Expected argument 'token_period' to be a int")
|
|
74
|
+
pulumi.set(__self__, "token_period", token_period)
|
|
75
|
+
if token_policies and not isinstance(token_policies, list):
|
|
76
|
+
raise TypeError("Expected argument 'token_policies' to be a list")
|
|
77
|
+
pulumi.set(__self__, "token_policies", token_policies)
|
|
78
|
+
if token_ttl and not isinstance(token_ttl, int):
|
|
79
|
+
raise TypeError("Expected argument 'token_ttl' to be a int")
|
|
80
|
+
pulumi.set(__self__, "token_ttl", token_ttl)
|
|
81
|
+
if token_type and not isinstance(token_type, str):
|
|
82
|
+
raise TypeError("Expected argument 'token_type' to be a str")
|
|
83
|
+
pulumi.set(__self__, "token_type", token_type)
|
|
84
|
+
|
|
85
|
+
@_builtins.property
|
|
86
|
+
@pulumi.getter(name="aliasMetadata")
|
|
87
|
+
def alias_metadata(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
88
|
+
return pulumi.get(self, "alias_metadata")
|
|
89
|
+
|
|
90
|
+
@_builtins.property
|
|
91
|
+
@pulumi.getter(name="aliasNameSource")
|
|
92
|
+
def alias_name_source(self) -> _builtins.str:
|
|
93
|
+
"""
|
|
94
|
+
Method used for generating identity aliases. (vault-1.9+)
|
|
95
|
+
"""
|
|
96
|
+
return pulumi.get(self, "alias_name_source")
|
|
97
|
+
|
|
98
|
+
@_builtins.property
|
|
99
|
+
@pulumi.getter
|
|
100
|
+
def audience(self) -> Optional[_builtins.str]:
|
|
101
|
+
"""
|
|
102
|
+
Audience claim to verify in the JWT.
|
|
103
|
+
"""
|
|
104
|
+
return pulumi.get(self, "audience")
|
|
105
|
+
|
|
106
|
+
@_builtins.property
|
|
107
|
+
@pulumi.getter
|
|
108
|
+
def backend(self) -> Optional[_builtins.str]:
|
|
109
|
+
return pulumi.get(self, "backend")
|
|
110
|
+
|
|
111
|
+
@_builtins.property
|
|
112
|
+
@pulumi.getter(name="boundServiceAccountNames")
|
|
113
|
+
def bound_service_account_names(self) -> Sequence[_builtins.str]:
|
|
114
|
+
"""
|
|
115
|
+
List of service account names able to access this role. If set to "*" all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
|
116
|
+
"""
|
|
117
|
+
return pulumi.get(self, "bound_service_account_names")
|
|
118
|
+
|
|
119
|
+
@_builtins.property
|
|
120
|
+
@pulumi.getter(name="boundServiceAccountNamespaces")
|
|
121
|
+
def bound_service_account_namespaces(self) -> Sequence[_builtins.str]:
|
|
122
|
+
"""
|
|
123
|
+
List of namespaces allowed to access this role. If set to "*" all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
|
124
|
+
"""
|
|
125
|
+
return pulumi.get(self, "bound_service_account_namespaces")
|
|
126
|
+
|
|
127
|
+
@_builtins.property
|
|
128
|
+
@pulumi.getter
|
|
129
|
+
def id(self) -> _builtins.str:
|
|
130
|
+
"""
|
|
131
|
+
The provider-assigned unique ID for this managed resource.
|
|
132
|
+
"""
|
|
133
|
+
return pulumi.get(self, "id")
|
|
134
|
+
|
|
135
|
+
@_builtins.property
|
|
136
|
+
@pulumi.getter
|
|
137
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
138
|
+
return pulumi.get(self, "namespace")
|
|
139
|
+
|
|
140
|
+
@_builtins.property
|
|
141
|
+
@pulumi.getter(name="roleName")
|
|
142
|
+
def role_name(self) -> _builtins.str:
|
|
143
|
+
return pulumi.get(self, "role_name")
|
|
144
|
+
|
|
145
|
+
@_builtins.property
|
|
146
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
|
147
|
+
def token_bound_cidrs(self) -> Optional[Sequence[_builtins.str]]:
|
|
148
|
+
"""
|
|
149
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
|
150
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
151
|
+
as well.
|
|
152
|
+
"""
|
|
153
|
+
return pulumi.get(self, "token_bound_cidrs")
|
|
154
|
+
|
|
155
|
+
@_builtins.property
|
|
156
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
|
157
|
+
def token_explicit_max_ttl(self) -> Optional[_builtins.int]:
|
|
158
|
+
"""
|
|
159
|
+
If set, will encode an
|
|
160
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
161
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
162
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
163
|
+
"""
|
|
164
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
|
165
|
+
|
|
166
|
+
@_builtins.property
|
|
167
|
+
@pulumi.getter(name="tokenMaxTtl")
|
|
168
|
+
def token_max_ttl(self) -> Optional[_builtins.int]:
|
|
169
|
+
"""
|
|
170
|
+
The maximum lifetime for generated tokens in number of seconds.
|
|
171
|
+
Its current value will be referenced at renewal time.
|
|
172
|
+
"""
|
|
173
|
+
return pulumi.get(self, "token_max_ttl")
|
|
174
|
+
|
|
175
|
+
@_builtins.property
|
|
176
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
|
177
|
+
def token_no_default_policy(self) -> Optional[_builtins.bool]:
|
|
178
|
+
"""
|
|
179
|
+
If set, the default policy will not be set on
|
|
180
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
181
|
+
"""
|
|
182
|
+
return pulumi.get(self, "token_no_default_policy")
|
|
183
|
+
|
|
184
|
+
@_builtins.property
|
|
185
|
+
@pulumi.getter(name="tokenNumUses")
|
|
186
|
+
def token_num_uses(self) -> Optional[_builtins.int]:
|
|
187
|
+
"""
|
|
188
|
+
The
|
|
189
|
+
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
|
190
|
+
if any, in number of seconds to set on the token.
|
|
191
|
+
"""
|
|
192
|
+
return pulumi.get(self, "token_num_uses")
|
|
193
|
+
|
|
194
|
+
@_builtins.property
|
|
195
|
+
@pulumi.getter(name="tokenPeriod")
|
|
196
|
+
def token_period(self) -> Optional[_builtins.int]:
|
|
197
|
+
"""
|
|
198
|
+
(Optional) If set, indicates that the
|
|
199
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
200
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
201
|
+
value of this field. Specified in seconds.
|
|
202
|
+
"""
|
|
203
|
+
return pulumi.get(self, "token_period")
|
|
204
|
+
|
|
205
|
+
@_builtins.property
|
|
206
|
+
@pulumi.getter(name="tokenPolicies")
|
|
207
|
+
def token_policies(self) -> Optional[Sequence[_builtins.str]]:
|
|
208
|
+
"""
|
|
209
|
+
List of policies to encode onto generated tokens. Depending
|
|
210
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
211
|
+
"""
|
|
212
|
+
return pulumi.get(self, "token_policies")
|
|
213
|
+
|
|
214
|
+
@_builtins.property
|
|
215
|
+
@pulumi.getter(name="tokenTtl")
|
|
216
|
+
def token_ttl(self) -> Optional[_builtins.int]:
|
|
217
|
+
"""
|
|
218
|
+
The incremental lifetime for generated tokens in number of seconds.
|
|
219
|
+
Its current value will be referenced at renewal time.
|
|
220
|
+
"""
|
|
221
|
+
return pulumi.get(self, "token_ttl")
|
|
222
|
+
|
|
223
|
+
@_builtins.property
|
|
224
|
+
@pulumi.getter(name="tokenType")
|
|
225
|
+
def token_type(self) -> Optional[_builtins.str]:
|
|
226
|
+
"""
|
|
227
|
+
The type of token that should be generated. Can be `service`,
|
|
228
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
229
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
|
230
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
|
231
|
+
requests a different type at generation time.
|
|
232
|
+
"""
|
|
233
|
+
return pulumi.get(self, "token_type")
|
|
234
|
+
|
|
235
|
+
|
|
236
|
+
class AwaitableGetAuthBackendRoleResult(GetAuthBackendRoleResult):
|
|
237
|
+
# pylint: disable=using-constant-test
|
|
238
|
+
def __await__(self):
|
|
239
|
+
if False:
|
|
240
|
+
yield self
|
|
241
|
+
return GetAuthBackendRoleResult(
|
|
242
|
+
alias_metadata=self.alias_metadata,
|
|
243
|
+
alias_name_source=self.alias_name_source,
|
|
244
|
+
audience=self.audience,
|
|
245
|
+
backend=self.backend,
|
|
246
|
+
bound_service_account_names=self.bound_service_account_names,
|
|
247
|
+
bound_service_account_namespaces=self.bound_service_account_namespaces,
|
|
248
|
+
id=self.id,
|
|
249
|
+
namespace=self.namespace,
|
|
250
|
+
role_name=self.role_name,
|
|
251
|
+
token_bound_cidrs=self.token_bound_cidrs,
|
|
252
|
+
token_explicit_max_ttl=self.token_explicit_max_ttl,
|
|
253
|
+
token_max_ttl=self.token_max_ttl,
|
|
254
|
+
token_no_default_policy=self.token_no_default_policy,
|
|
255
|
+
token_num_uses=self.token_num_uses,
|
|
256
|
+
token_period=self.token_period,
|
|
257
|
+
token_policies=self.token_policies,
|
|
258
|
+
token_ttl=self.token_ttl,
|
|
259
|
+
token_type=self.token_type)
|
|
260
|
+
|
|
261
|
+
|
|
262
|
+
def get_auth_backend_role(alias_metadata: Optional[Mapping[str, _builtins.str]] = None,
|
|
263
|
+
audience: Optional[_builtins.str] = None,
|
|
264
|
+
backend: Optional[_builtins.str] = None,
|
|
265
|
+
namespace: Optional[_builtins.str] = None,
|
|
266
|
+
role_name: Optional[_builtins.str] = None,
|
|
267
|
+
token_bound_cidrs: Optional[Sequence[_builtins.str]] = None,
|
|
268
|
+
token_explicit_max_ttl: Optional[_builtins.int] = None,
|
|
269
|
+
token_max_ttl: Optional[_builtins.int] = None,
|
|
270
|
+
token_no_default_policy: Optional[_builtins.bool] = None,
|
|
271
|
+
token_num_uses: Optional[_builtins.int] = None,
|
|
272
|
+
token_period: Optional[_builtins.int] = None,
|
|
273
|
+
token_policies: Optional[Sequence[_builtins.str]] = None,
|
|
274
|
+
token_ttl: Optional[_builtins.int] = None,
|
|
275
|
+
token_type: Optional[_builtins.str] = None,
|
|
276
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendRoleResult:
|
|
277
|
+
"""
|
|
278
|
+
Reads the Role of an Kubernetes from a Vault server. See the [Vault
|
|
279
|
+
documentation](https://www.vaultproject.io/api-docs/auth/kubernetes#read-role) for more
|
|
280
|
+
information.
|
|
281
|
+
|
|
282
|
+
## Example Usage
|
|
283
|
+
|
|
284
|
+
```python
|
|
285
|
+
import pulumi
|
|
286
|
+
import pulumi_vault as vault
|
|
287
|
+
|
|
288
|
+
role = vault.kubernetes.get_auth_backend_role(backend="my-kubernetes-backend",
|
|
289
|
+
role_name="my-role")
|
|
290
|
+
pulumi.export("policies", role.policies)
|
|
291
|
+
```
|
|
292
|
+
|
|
293
|
+
|
|
294
|
+
:param _builtins.str audience: Audience claim to verify in the JWT.
|
|
295
|
+
:param _builtins.str backend: The unique name for the Kubernetes backend the role to
|
|
296
|
+
retrieve Role attributes for resides in. Defaults to "kubernetes".
|
|
297
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
298
|
+
The value should not contain leading or trailing forward slashes.
|
|
299
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
300
|
+
*Available only for Vault Enterprise*.
|
|
301
|
+
:param _builtins.str role_name: The name of the role to retrieve the Role attributes for.
|
|
302
|
+
:param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
|
303
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
304
|
+
as well.
|
|
305
|
+
:param _builtins.int token_explicit_max_ttl: If set, will encode an
|
|
306
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
307
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
308
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
309
|
+
:param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
|
310
|
+
Its current value will be referenced at renewal time.
|
|
311
|
+
:param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
|
|
312
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
313
|
+
:param _builtins.int token_num_uses: The
|
|
314
|
+
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
|
315
|
+
if any, in number of seconds to set on the token.
|
|
316
|
+
:param _builtins.int token_period: (Optional) If set, indicates that the
|
|
317
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
318
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
319
|
+
value of this field. Specified in seconds.
|
|
320
|
+
:param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
|
|
321
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
322
|
+
:param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
|
323
|
+
Its current value will be referenced at renewal time.
|
|
324
|
+
:param _builtins.str token_type: The type of token that should be generated. Can be `service`,
|
|
325
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
326
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
|
327
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
|
328
|
+
requests a different type at generation time.
|
|
329
|
+
"""
|
|
330
|
+
__args__ = dict()
|
|
331
|
+
__args__['aliasMetadata'] = alias_metadata
|
|
332
|
+
__args__['audience'] = audience
|
|
333
|
+
__args__['backend'] = backend
|
|
334
|
+
__args__['namespace'] = namespace
|
|
335
|
+
__args__['roleName'] = role_name
|
|
336
|
+
__args__['tokenBoundCidrs'] = token_bound_cidrs
|
|
337
|
+
__args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
|
|
338
|
+
__args__['tokenMaxTtl'] = token_max_ttl
|
|
339
|
+
__args__['tokenNoDefaultPolicy'] = token_no_default_policy
|
|
340
|
+
__args__['tokenNumUses'] = token_num_uses
|
|
341
|
+
__args__['tokenPeriod'] = token_period
|
|
342
|
+
__args__['tokenPolicies'] = token_policies
|
|
343
|
+
__args__['tokenTtl'] = token_ttl
|
|
344
|
+
__args__['tokenType'] = token_type
|
|
345
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
346
|
+
__ret__ = pulumi.runtime.invoke('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult).value
|
|
347
|
+
|
|
348
|
+
return AwaitableGetAuthBackendRoleResult(
|
|
349
|
+
alias_metadata=pulumi.get(__ret__, 'alias_metadata'),
|
|
350
|
+
alias_name_source=pulumi.get(__ret__, 'alias_name_source'),
|
|
351
|
+
audience=pulumi.get(__ret__, 'audience'),
|
|
352
|
+
backend=pulumi.get(__ret__, 'backend'),
|
|
353
|
+
bound_service_account_names=pulumi.get(__ret__, 'bound_service_account_names'),
|
|
354
|
+
bound_service_account_namespaces=pulumi.get(__ret__, 'bound_service_account_namespaces'),
|
|
355
|
+
id=pulumi.get(__ret__, 'id'),
|
|
356
|
+
namespace=pulumi.get(__ret__, 'namespace'),
|
|
357
|
+
role_name=pulumi.get(__ret__, 'role_name'),
|
|
358
|
+
token_bound_cidrs=pulumi.get(__ret__, 'token_bound_cidrs'),
|
|
359
|
+
token_explicit_max_ttl=pulumi.get(__ret__, 'token_explicit_max_ttl'),
|
|
360
|
+
token_max_ttl=pulumi.get(__ret__, 'token_max_ttl'),
|
|
361
|
+
token_no_default_policy=pulumi.get(__ret__, 'token_no_default_policy'),
|
|
362
|
+
token_num_uses=pulumi.get(__ret__, 'token_num_uses'),
|
|
363
|
+
token_period=pulumi.get(__ret__, 'token_period'),
|
|
364
|
+
token_policies=pulumi.get(__ret__, 'token_policies'),
|
|
365
|
+
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
|
366
|
+
token_type=pulumi.get(__ret__, 'token_type'))
|
|
367
|
+
def get_auth_backend_role_output(alias_metadata: Optional[pulumi.Input[Optional[Mapping[str, _builtins.str]]]] = None,
|
|
368
|
+
audience: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
369
|
+
backend: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
370
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
371
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
372
|
+
token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
|
|
373
|
+
token_explicit_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
|
374
|
+
token_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
|
375
|
+
token_no_default_policy: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
|
376
|
+
token_num_uses: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
|
377
|
+
token_period: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
|
378
|
+
token_policies: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
|
|
379
|
+
token_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
|
380
|
+
token_type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
381
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleResult]:
|
|
382
|
+
"""
|
|
383
|
+
Reads the Role of an Kubernetes from a Vault server. See the [Vault
|
|
384
|
+
documentation](https://www.vaultproject.io/api-docs/auth/kubernetes#read-role) for more
|
|
385
|
+
information.
|
|
386
|
+
|
|
387
|
+
## Example Usage
|
|
388
|
+
|
|
389
|
+
```python
|
|
390
|
+
import pulumi
|
|
391
|
+
import pulumi_vault as vault
|
|
392
|
+
|
|
393
|
+
role = vault.kubernetes.get_auth_backend_role(backend="my-kubernetes-backend",
|
|
394
|
+
role_name="my-role")
|
|
395
|
+
pulumi.export("policies", role.policies)
|
|
396
|
+
```
|
|
397
|
+
|
|
398
|
+
|
|
399
|
+
:param _builtins.str audience: Audience claim to verify in the JWT.
|
|
400
|
+
:param _builtins.str backend: The unique name for the Kubernetes backend the role to
|
|
401
|
+
retrieve Role attributes for resides in. Defaults to "kubernetes".
|
|
402
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
403
|
+
The value should not contain leading or trailing forward slashes.
|
|
404
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
405
|
+
*Available only for Vault Enterprise*.
|
|
406
|
+
:param _builtins.str role_name: The name of the role to retrieve the Role attributes for.
|
|
407
|
+
:param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
|
408
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
409
|
+
as well.
|
|
410
|
+
:param _builtins.int token_explicit_max_ttl: If set, will encode an
|
|
411
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
412
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
413
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
414
|
+
:param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
|
415
|
+
Its current value will be referenced at renewal time.
|
|
416
|
+
:param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
|
|
417
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
418
|
+
:param _builtins.int token_num_uses: The
|
|
419
|
+
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
|
420
|
+
if any, in number of seconds to set on the token.
|
|
421
|
+
:param _builtins.int token_period: (Optional) If set, indicates that the
|
|
422
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
423
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
424
|
+
value of this field. Specified in seconds.
|
|
425
|
+
:param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
|
|
426
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
427
|
+
:param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
|
428
|
+
Its current value will be referenced at renewal time.
|
|
429
|
+
:param _builtins.str token_type: The type of token that should be generated. Can be `service`,
|
|
430
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
431
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
|
432
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
|
433
|
+
requests a different type at generation time.
|
|
434
|
+
"""
|
|
435
|
+
__args__ = dict()
|
|
436
|
+
__args__['aliasMetadata'] = alias_metadata
|
|
437
|
+
__args__['audience'] = audience
|
|
438
|
+
__args__['backend'] = backend
|
|
439
|
+
__args__['namespace'] = namespace
|
|
440
|
+
__args__['roleName'] = role_name
|
|
441
|
+
__args__['tokenBoundCidrs'] = token_bound_cidrs
|
|
442
|
+
__args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
|
|
443
|
+
__args__['tokenMaxTtl'] = token_max_ttl
|
|
444
|
+
__args__['tokenNoDefaultPolicy'] = token_no_default_policy
|
|
445
|
+
__args__['tokenNumUses'] = token_num_uses
|
|
446
|
+
__args__['tokenPeriod'] = token_period
|
|
447
|
+
__args__['tokenPolicies'] = token_policies
|
|
448
|
+
__args__['tokenTtl'] = token_ttl
|
|
449
|
+
__args__['tokenType'] = token_type
|
|
450
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
451
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
|
|
452
|
+
return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
|
|
453
|
+
alias_metadata=pulumi.get(__response__, 'alias_metadata'),
|
|
454
|
+
alias_name_source=pulumi.get(__response__, 'alias_name_source'),
|
|
455
|
+
audience=pulumi.get(__response__, 'audience'),
|
|
456
|
+
backend=pulumi.get(__response__, 'backend'),
|
|
457
|
+
bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
|
|
458
|
+
bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
|
|
459
|
+
id=pulumi.get(__response__, 'id'),
|
|
460
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
|
461
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
|
462
|
+
token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
|
|
463
|
+
token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
|
|
464
|
+
token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
|
|
465
|
+
token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
|
|
466
|
+
token_num_uses=pulumi.get(__response__, 'token_num_uses'),
|
|
467
|
+
token_period=pulumi.get(__response__, 'token_period'),
|
|
468
|
+
token_policies=pulumi.get(__response__, 'token_policies'),
|
|
469
|
+
token_ttl=pulumi.get(__response__, 'token_ttl'),
|
|
470
|
+
token_type=pulumi.get(__response__, 'token_type')))
|