pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,470 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetAuthBackendRoleResult',
19
+ 'AwaitableGetAuthBackendRoleResult',
20
+ 'get_auth_backend_role',
21
+ 'get_auth_backend_role_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetAuthBackendRoleResult:
26
+ """
27
+ A collection of values returned by getAuthBackendRole.
28
+ """
29
+ def __init__(__self__, alias_metadata=None, alias_name_source=None, audience=None, backend=None, bound_service_account_names=None, bound_service_account_namespaces=None, id=None, namespace=None, role_name=None, token_bound_cidrs=None, token_explicit_max_ttl=None, token_max_ttl=None, token_no_default_policy=None, token_num_uses=None, token_period=None, token_policies=None, token_ttl=None, token_type=None):
30
+ if alias_metadata and not isinstance(alias_metadata, dict):
31
+ raise TypeError("Expected argument 'alias_metadata' to be a dict")
32
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
33
+ if alias_name_source and not isinstance(alias_name_source, str):
34
+ raise TypeError("Expected argument 'alias_name_source' to be a str")
35
+ pulumi.set(__self__, "alias_name_source", alias_name_source)
36
+ if audience and not isinstance(audience, str):
37
+ raise TypeError("Expected argument 'audience' to be a str")
38
+ pulumi.set(__self__, "audience", audience)
39
+ if backend and not isinstance(backend, str):
40
+ raise TypeError("Expected argument 'backend' to be a str")
41
+ pulumi.set(__self__, "backend", backend)
42
+ if bound_service_account_names and not isinstance(bound_service_account_names, list):
43
+ raise TypeError("Expected argument 'bound_service_account_names' to be a list")
44
+ pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
45
+ if bound_service_account_namespaces and not isinstance(bound_service_account_namespaces, list):
46
+ raise TypeError("Expected argument 'bound_service_account_namespaces' to be a list")
47
+ pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
48
+ if id and not isinstance(id, str):
49
+ raise TypeError("Expected argument 'id' to be a str")
50
+ pulumi.set(__self__, "id", id)
51
+ if namespace and not isinstance(namespace, str):
52
+ raise TypeError("Expected argument 'namespace' to be a str")
53
+ pulumi.set(__self__, "namespace", namespace)
54
+ if role_name and not isinstance(role_name, str):
55
+ raise TypeError("Expected argument 'role_name' to be a str")
56
+ pulumi.set(__self__, "role_name", role_name)
57
+ if token_bound_cidrs and not isinstance(token_bound_cidrs, list):
58
+ raise TypeError("Expected argument 'token_bound_cidrs' to be a list")
59
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
60
+ if token_explicit_max_ttl and not isinstance(token_explicit_max_ttl, int):
61
+ raise TypeError("Expected argument 'token_explicit_max_ttl' to be a int")
62
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
63
+ if token_max_ttl and not isinstance(token_max_ttl, int):
64
+ raise TypeError("Expected argument 'token_max_ttl' to be a int")
65
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
66
+ if token_no_default_policy and not isinstance(token_no_default_policy, bool):
67
+ raise TypeError("Expected argument 'token_no_default_policy' to be a bool")
68
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
69
+ if token_num_uses and not isinstance(token_num_uses, int):
70
+ raise TypeError("Expected argument 'token_num_uses' to be a int")
71
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
72
+ if token_period and not isinstance(token_period, int):
73
+ raise TypeError("Expected argument 'token_period' to be a int")
74
+ pulumi.set(__self__, "token_period", token_period)
75
+ if token_policies and not isinstance(token_policies, list):
76
+ raise TypeError("Expected argument 'token_policies' to be a list")
77
+ pulumi.set(__self__, "token_policies", token_policies)
78
+ if token_ttl and not isinstance(token_ttl, int):
79
+ raise TypeError("Expected argument 'token_ttl' to be a int")
80
+ pulumi.set(__self__, "token_ttl", token_ttl)
81
+ if token_type and not isinstance(token_type, str):
82
+ raise TypeError("Expected argument 'token_type' to be a str")
83
+ pulumi.set(__self__, "token_type", token_type)
84
+
85
+ @_builtins.property
86
+ @pulumi.getter(name="aliasMetadata")
87
+ def alias_metadata(self) -> Optional[Mapping[str, _builtins.str]]:
88
+ return pulumi.get(self, "alias_metadata")
89
+
90
+ @_builtins.property
91
+ @pulumi.getter(name="aliasNameSource")
92
+ def alias_name_source(self) -> _builtins.str:
93
+ """
94
+ Method used for generating identity aliases. (vault-1.9+)
95
+ """
96
+ return pulumi.get(self, "alias_name_source")
97
+
98
+ @_builtins.property
99
+ @pulumi.getter
100
+ def audience(self) -> Optional[_builtins.str]:
101
+ """
102
+ Audience claim to verify in the JWT.
103
+ """
104
+ return pulumi.get(self, "audience")
105
+
106
+ @_builtins.property
107
+ @pulumi.getter
108
+ def backend(self) -> Optional[_builtins.str]:
109
+ return pulumi.get(self, "backend")
110
+
111
+ @_builtins.property
112
+ @pulumi.getter(name="boundServiceAccountNames")
113
+ def bound_service_account_names(self) -> Sequence[_builtins.str]:
114
+ """
115
+ List of service account names able to access this role. If set to "*" all names are allowed, both this and bound_service_account_namespaces can not be "*".
116
+ """
117
+ return pulumi.get(self, "bound_service_account_names")
118
+
119
+ @_builtins.property
120
+ @pulumi.getter(name="boundServiceAccountNamespaces")
121
+ def bound_service_account_namespaces(self) -> Sequence[_builtins.str]:
122
+ """
123
+ List of namespaces allowed to access this role. If set to "*" all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
124
+ """
125
+ return pulumi.get(self, "bound_service_account_namespaces")
126
+
127
+ @_builtins.property
128
+ @pulumi.getter
129
+ def id(self) -> _builtins.str:
130
+ """
131
+ The provider-assigned unique ID for this managed resource.
132
+ """
133
+ return pulumi.get(self, "id")
134
+
135
+ @_builtins.property
136
+ @pulumi.getter
137
+ def namespace(self) -> Optional[_builtins.str]:
138
+ return pulumi.get(self, "namespace")
139
+
140
+ @_builtins.property
141
+ @pulumi.getter(name="roleName")
142
+ def role_name(self) -> _builtins.str:
143
+ return pulumi.get(self, "role_name")
144
+
145
+ @_builtins.property
146
+ @pulumi.getter(name="tokenBoundCidrs")
147
+ def token_bound_cidrs(self) -> Optional[Sequence[_builtins.str]]:
148
+ """
149
+ List of CIDR blocks; if set, specifies blocks of IP
150
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
151
+ as well.
152
+ """
153
+ return pulumi.get(self, "token_bound_cidrs")
154
+
155
+ @_builtins.property
156
+ @pulumi.getter(name="tokenExplicitMaxTtl")
157
+ def token_explicit_max_ttl(self) -> Optional[_builtins.int]:
158
+ """
159
+ If set, will encode an
160
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
161
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
162
+ `token_max_ttl` would otherwise allow a renewal.
163
+ """
164
+ return pulumi.get(self, "token_explicit_max_ttl")
165
+
166
+ @_builtins.property
167
+ @pulumi.getter(name="tokenMaxTtl")
168
+ def token_max_ttl(self) -> Optional[_builtins.int]:
169
+ """
170
+ The maximum lifetime for generated tokens in number of seconds.
171
+ Its current value will be referenced at renewal time.
172
+ """
173
+ return pulumi.get(self, "token_max_ttl")
174
+
175
+ @_builtins.property
176
+ @pulumi.getter(name="tokenNoDefaultPolicy")
177
+ def token_no_default_policy(self) -> Optional[_builtins.bool]:
178
+ """
179
+ If set, the default policy will not be set on
180
+ generated tokens; otherwise it will be added to the policies set in token_policies.
181
+ """
182
+ return pulumi.get(self, "token_no_default_policy")
183
+
184
+ @_builtins.property
185
+ @pulumi.getter(name="tokenNumUses")
186
+ def token_num_uses(self) -> Optional[_builtins.int]:
187
+ """
188
+ The
189
+ [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
190
+ if any, in number of seconds to set on the token.
191
+ """
192
+ return pulumi.get(self, "token_num_uses")
193
+
194
+ @_builtins.property
195
+ @pulumi.getter(name="tokenPeriod")
196
+ def token_period(self) -> Optional[_builtins.int]:
197
+ """
198
+ (Optional) If set, indicates that the
199
+ token generated using this role should never expire. The token should be renewed within the
200
+ duration specified by this value. At each renewal, the token's TTL will be set to the
201
+ value of this field. Specified in seconds.
202
+ """
203
+ return pulumi.get(self, "token_period")
204
+
205
+ @_builtins.property
206
+ @pulumi.getter(name="tokenPolicies")
207
+ def token_policies(self) -> Optional[Sequence[_builtins.str]]:
208
+ """
209
+ List of policies to encode onto generated tokens. Depending
210
+ on the auth method, this list may be supplemented by user/group/other values.
211
+ """
212
+ return pulumi.get(self, "token_policies")
213
+
214
+ @_builtins.property
215
+ @pulumi.getter(name="tokenTtl")
216
+ def token_ttl(self) -> Optional[_builtins.int]:
217
+ """
218
+ The incremental lifetime for generated tokens in number of seconds.
219
+ Its current value will be referenced at renewal time.
220
+ """
221
+ return pulumi.get(self, "token_ttl")
222
+
223
+ @_builtins.property
224
+ @pulumi.getter(name="tokenType")
225
+ def token_type(self) -> Optional[_builtins.str]:
226
+ """
227
+ The type of token that should be generated. Can be `service`,
228
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
229
+ `service` tokens). For token store roles, there are two additional possibilities:
230
+ `default-service` and `default-batch` which specify the type to return unless the client
231
+ requests a different type at generation time.
232
+ """
233
+ return pulumi.get(self, "token_type")
234
+
235
+
236
+ class AwaitableGetAuthBackendRoleResult(GetAuthBackendRoleResult):
237
+ # pylint: disable=using-constant-test
238
+ def __await__(self):
239
+ if False:
240
+ yield self
241
+ return GetAuthBackendRoleResult(
242
+ alias_metadata=self.alias_metadata,
243
+ alias_name_source=self.alias_name_source,
244
+ audience=self.audience,
245
+ backend=self.backend,
246
+ bound_service_account_names=self.bound_service_account_names,
247
+ bound_service_account_namespaces=self.bound_service_account_namespaces,
248
+ id=self.id,
249
+ namespace=self.namespace,
250
+ role_name=self.role_name,
251
+ token_bound_cidrs=self.token_bound_cidrs,
252
+ token_explicit_max_ttl=self.token_explicit_max_ttl,
253
+ token_max_ttl=self.token_max_ttl,
254
+ token_no_default_policy=self.token_no_default_policy,
255
+ token_num_uses=self.token_num_uses,
256
+ token_period=self.token_period,
257
+ token_policies=self.token_policies,
258
+ token_ttl=self.token_ttl,
259
+ token_type=self.token_type)
260
+
261
+
262
+ def get_auth_backend_role(alias_metadata: Optional[Mapping[str, _builtins.str]] = None,
263
+ audience: Optional[_builtins.str] = None,
264
+ backend: Optional[_builtins.str] = None,
265
+ namespace: Optional[_builtins.str] = None,
266
+ role_name: Optional[_builtins.str] = None,
267
+ token_bound_cidrs: Optional[Sequence[_builtins.str]] = None,
268
+ token_explicit_max_ttl: Optional[_builtins.int] = None,
269
+ token_max_ttl: Optional[_builtins.int] = None,
270
+ token_no_default_policy: Optional[_builtins.bool] = None,
271
+ token_num_uses: Optional[_builtins.int] = None,
272
+ token_period: Optional[_builtins.int] = None,
273
+ token_policies: Optional[Sequence[_builtins.str]] = None,
274
+ token_ttl: Optional[_builtins.int] = None,
275
+ token_type: Optional[_builtins.str] = None,
276
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendRoleResult:
277
+ """
278
+ Reads the Role of an Kubernetes from a Vault server. See the [Vault
279
+ documentation](https://www.vaultproject.io/api-docs/auth/kubernetes#read-role) for more
280
+ information.
281
+
282
+ ## Example Usage
283
+
284
+ ```python
285
+ import pulumi
286
+ import pulumi_vault as vault
287
+
288
+ role = vault.kubernetes.get_auth_backend_role(backend="my-kubernetes-backend",
289
+ role_name="my-role")
290
+ pulumi.export("policies", role.policies)
291
+ ```
292
+
293
+
294
+ :param _builtins.str audience: Audience claim to verify in the JWT.
295
+ :param _builtins.str backend: The unique name for the Kubernetes backend the role to
296
+ retrieve Role attributes for resides in. Defaults to "kubernetes".
297
+ :param _builtins.str namespace: The namespace of the target resource.
298
+ The value should not contain leading or trailing forward slashes.
299
+ The `namespace` is always relative to the provider's configured namespace.
300
+ *Available only for Vault Enterprise*.
301
+ :param _builtins.str role_name: The name of the role to retrieve the Role attributes for.
302
+ :param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
303
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
304
+ as well.
305
+ :param _builtins.int token_explicit_max_ttl: If set, will encode an
306
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
307
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
308
+ `token_max_ttl` would otherwise allow a renewal.
309
+ :param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
310
+ Its current value will be referenced at renewal time.
311
+ :param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
312
+ generated tokens; otherwise it will be added to the policies set in token_policies.
313
+ :param _builtins.int token_num_uses: The
314
+ [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
315
+ if any, in number of seconds to set on the token.
316
+ :param _builtins.int token_period: (Optional) If set, indicates that the
317
+ token generated using this role should never expire. The token should be renewed within the
318
+ duration specified by this value. At each renewal, the token's TTL will be set to the
319
+ value of this field. Specified in seconds.
320
+ :param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
321
+ on the auth method, this list may be supplemented by user/group/other values.
322
+ :param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
323
+ Its current value will be referenced at renewal time.
324
+ :param _builtins.str token_type: The type of token that should be generated. Can be `service`,
325
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
326
+ `service` tokens). For token store roles, there are two additional possibilities:
327
+ `default-service` and `default-batch` which specify the type to return unless the client
328
+ requests a different type at generation time.
329
+ """
330
+ __args__ = dict()
331
+ __args__['aliasMetadata'] = alias_metadata
332
+ __args__['audience'] = audience
333
+ __args__['backend'] = backend
334
+ __args__['namespace'] = namespace
335
+ __args__['roleName'] = role_name
336
+ __args__['tokenBoundCidrs'] = token_bound_cidrs
337
+ __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
338
+ __args__['tokenMaxTtl'] = token_max_ttl
339
+ __args__['tokenNoDefaultPolicy'] = token_no_default_policy
340
+ __args__['tokenNumUses'] = token_num_uses
341
+ __args__['tokenPeriod'] = token_period
342
+ __args__['tokenPolicies'] = token_policies
343
+ __args__['tokenTtl'] = token_ttl
344
+ __args__['tokenType'] = token_type
345
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
346
+ __ret__ = pulumi.runtime.invoke('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult).value
347
+
348
+ return AwaitableGetAuthBackendRoleResult(
349
+ alias_metadata=pulumi.get(__ret__, 'alias_metadata'),
350
+ alias_name_source=pulumi.get(__ret__, 'alias_name_source'),
351
+ audience=pulumi.get(__ret__, 'audience'),
352
+ backend=pulumi.get(__ret__, 'backend'),
353
+ bound_service_account_names=pulumi.get(__ret__, 'bound_service_account_names'),
354
+ bound_service_account_namespaces=pulumi.get(__ret__, 'bound_service_account_namespaces'),
355
+ id=pulumi.get(__ret__, 'id'),
356
+ namespace=pulumi.get(__ret__, 'namespace'),
357
+ role_name=pulumi.get(__ret__, 'role_name'),
358
+ token_bound_cidrs=pulumi.get(__ret__, 'token_bound_cidrs'),
359
+ token_explicit_max_ttl=pulumi.get(__ret__, 'token_explicit_max_ttl'),
360
+ token_max_ttl=pulumi.get(__ret__, 'token_max_ttl'),
361
+ token_no_default_policy=pulumi.get(__ret__, 'token_no_default_policy'),
362
+ token_num_uses=pulumi.get(__ret__, 'token_num_uses'),
363
+ token_period=pulumi.get(__ret__, 'token_period'),
364
+ token_policies=pulumi.get(__ret__, 'token_policies'),
365
+ token_ttl=pulumi.get(__ret__, 'token_ttl'),
366
+ token_type=pulumi.get(__ret__, 'token_type'))
367
+ def get_auth_backend_role_output(alias_metadata: Optional[pulumi.Input[Optional[Mapping[str, _builtins.str]]]] = None,
368
+ audience: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
369
+ backend: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
370
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
371
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
372
+ token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
373
+ token_explicit_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
374
+ token_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
375
+ token_no_default_policy: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
376
+ token_num_uses: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
377
+ token_period: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
378
+ token_policies: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
379
+ token_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
380
+ token_type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
381
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleResult]:
382
+ """
383
+ Reads the Role of an Kubernetes from a Vault server. See the [Vault
384
+ documentation](https://www.vaultproject.io/api-docs/auth/kubernetes#read-role) for more
385
+ information.
386
+
387
+ ## Example Usage
388
+
389
+ ```python
390
+ import pulumi
391
+ import pulumi_vault as vault
392
+
393
+ role = vault.kubernetes.get_auth_backend_role(backend="my-kubernetes-backend",
394
+ role_name="my-role")
395
+ pulumi.export("policies", role.policies)
396
+ ```
397
+
398
+
399
+ :param _builtins.str audience: Audience claim to verify in the JWT.
400
+ :param _builtins.str backend: The unique name for the Kubernetes backend the role to
401
+ retrieve Role attributes for resides in. Defaults to "kubernetes".
402
+ :param _builtins.str namespace: The namespace of the target resource.
403
+ The value should not contain leading or trailing forward slashes.
404
+ The `namespace` is always relative to the provider's configured namespace.
405
+ *Available only for Vault Enterprise*.
406
+ :param _builtins.str role_name: The name of the role to retrieve the Role attributes for.
407
+ :param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
408
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
409
+ as well.
410
+ :param _builtins.int token_explicit_max_ttl: If set, will encode an
411
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
412
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
413
+ `token_max_ttl` would otherwise allow a renewal.
414
+ :param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
415
+ Its current value will be referenced at renewal time.
416
+ :param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
417
+ generated tokens; otherwise it will be added to the policies set in token_policies.
418
+ :param _builtins.int token_num_uses: The
419
+ [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
420
+ if any, in number of seconds to set on the token.
421
+ :param _builtins.int token_period: (Optional) If set, indicates that the
422
+ token generated using this role should never expire. The token should be renewed within the
423
+ duration specified by this value. At each renewal, the token's TTL will be set to the
424
+ value of this field. Specified in seconds.
425
+ :param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
426
+ on the auth method, this list may be supplemented by user/group/other values.
427
+ :param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
428
+ Its current value will be referenced at renewal time.
429
+ :param _builtins.str token_type: The type of token that should be generated. Can be `service`,
430
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
431
+ `service` tokens). For token store roles, there are two additional possibilities:
432
+ `default-service` and `default-batch` which specify the type to return unless the client
433
+ requests a different type at generation time.
434
+ """
435
+ __args__ = dict()
436
+ __args__['aliasMetadata'] = alias_metadata
437
+ __args__['audience'] = audience
438
+ __args__['backend'] = backend
439
+ __args__['namespace'] = namespace
440
+ __args__['roleName'] = role_name
441
+ __args__['tokenBoundCidrs'] = token_bound_cidrs
442
+ __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
443
+ __args__['tokenMaxTtl'] = token_max_ttl
444
+ __args__['tokenNoDefaultPolicy'] = token_no_default_policy
445
+ __args__['tokenNumUses'] = token_num_uses
446
+ __args__['tokenPeriod'] = token_period
447
+ __args__['tokenPolicies'] = token_policies
448
+ __args__['tokenTtl'] = token_ttl
449
+ __args__['tokenType'] = token_type
450
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
451
+ __ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
452
+ return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
453
+ alias_metadata=pulumi.get(__response__, 'alias_metadata'),
454
+ alias_name_source=pulumi.get(__response__, 'alias_name_source'),
455
+ audience=pulumi.get(__response__, 'audience'),
456
+ backend=pulumi.get(__response__, 'backend'),
457
+ bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
458
+ bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
459
+ id=pulumi.get(__response__, 'id'),
460
+ namespace=pulumi.get(__response__, 'namespace'),
461
+ role_name=pulumi.get(__response__, 'role_name'),
462
+ token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
463
+ token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
464
+ token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
465
+ token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
466
+ token_num_uses=pulumi.get(__response__, 'token_num_uses'),
467
+ token_period=pulumi.get(__response__, 'token_period'),
468
+ token_policies=pulumi.get(__response__, 'token_policies'),
469
+ token_ttl=pulumi.get(__response__, 'token_ttl'),
470
+ token_type=pulumi.get(__response__, 'token_type')))