1. Packages
  2. Pulumi Vault Provider
  3. API Docs
  4. kubernetes
  5. AuthBackendConfig
HashiCorp Vault v6.4.0 published on Wednesday, Nov 20, 2024 by Pulumi

vault.kubernetes.AuthBackendConfig

Explore with Pulumi AI

vault logo
HashiCorp Vault v6.4.0 published on Wednesday, Nov 20, 2024 by Pulumi

    Manages an Kubernetes auth backend config in a Vault server. See the Vault documentation for more information.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as vault from "@pulumi/vault";
    
    const kubernetes = new vault.AuthBackend("kubernetes", {type: "kubernetes"});
    const example = new vault.kubernetes.AuthBackendConfig("example", {
        backend: kubernetes.path,
        kubernetesHost: "http://example.com:443",
        kubernetesCaCert: `-----BEGIN CERTIFICATE-----
    example
    -----END CERTIFICATE-----`,
        tokenReviewerJwt: "ZXhhbXBsZQo=",
        issuer: "api",
        disableIssValidation: true,
    });
    
    import pulumi
    import pulumi_vault as vault
    
    kubernetes = vault.AuthBackend("kubernetes", type="kubernetes")
    example = vault.kubernetes.AuthBackendConfig("example",
        backend=kubernetes.path,
        kubernetes_host="http://example.com:443",
        kubernetes_ca_cert="""-----BEGIN CERTIFICATE-----
    example
    -----END CERTIFICATE-----""",
        token_reviewer_jwt="ZXhhbXBsZQo=",
        issuer="api",
        disable_iss_validation=True)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault"
    	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		kubernetes, err := vault.NewAuthBackend(ctx, "kubernetes", &vault.AuthBackendArgs{
    			Type: pulumi.String("kubernetes"),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = kubernetes.NewAuthBackendConfig(ctx, "example", &kubernetes.AuthBackendConfigArgs{
    			Backend:              kubernetes.Path,
    			KubernetesHost:       pulumi.String("http://example.com:443"),
    			KubernetesCaCert:     pulumi.String("-----BEGIN CERTIFICATE-----\nexample\n-----END CERTIFICATE-----"),
    			TokenReviewerJwt:     pulumi.String("ZXhhbXBsZQo="),
    			Issuer:               pulumi.String("api"),
    			DisableIssValidation: pulumi.Bool(true),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Vault = Pulumi.Vault;
    
    return await Deployment.RunAsync(() => 
    {
        var kubernetes = new Vault.AuthBackend("kubernetes", new()
        {
            Type = "kubernetes",
        });
    
        var example = new Vault.Kubernetes.AuthBackendConfig("example", new()
        {
            Backend = kubernetes.Path,
            KubernetesHost = "http://example.com:443",
            KubernetesCaCert = @"-----BEGIN CERTIFICATE-----
    example
    -----END CERTIFICATE-----",
            TokenReviewerJwt = "ZXhhbXBsZQo=",
            Issuer = "api",
            DisableIssValidation = true,
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.vault.AuthBackend;
    import com.pulumi.vault.AuthBackendArgs;
    import com.pulumi.vault.kubernetes.AuthBackendConfig;
    import com.pulumi.vault.kubernetes.AuthBackendConfigArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var kubernetes = new AuthBackend("kubernetes", AuthBackendArgs.builder()
                .type("kubernetes")
                .build());
    
            var example = new AuthBackendConfig("example", AuthBackendConfigArgs.builder()
                .backend(kubernetes.path())
                .kubernetesHost("http://example.com:443")
                .kubernetesCaCert("""
    -----BEGIN CERTIFICATE-----
    example
    -----END CERTIFICATE-----            """)
                .tokenReviewerJwt("ZXhhbXBsZQo=")
                .issuer("api")
                .disableIssValidation("true")
                .build());
    
        }
    }
    
    resources:
      kubernetes:
        type: vault:AuthBackend
        properties:
          type: kubernetes
      example:
        type: vault:kubernetes:AuthBackendConfig
        properties:
          backend: ${kubernetes.path}
          kubernetesHost: http://example.com:443
          kubernetesCaCert: |-
            -----BEGIN CERTIFICATE-----
            example
            -----END CERTIFICATE-----        
          tokenReviewerJwt: ZXhhbXBsZQo=
          issuer: api
          disableIssValidation: 'true'
    

    Create AuthBackendConfig Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new AuthBackendConfig(name: string, args: AuthBackendConfigArgs, opts?: CustomResourceOptions);
    @overload
    def AuthBackendConfig(resource_name: str,
                          args: AuthBackendConfigArgs,
                          opts: Optional[ResourceOptions] = None)
    
    @overload
    def AuthBackendConfig(resource_name: str,
                          opts: Optional[ResourceOptions] = None,
                          kubernetes_host: Optional[str] = None,
                          backend: Optional[str] = None,
                          disable_iss_validation: Optional[bool] = None,
                          disable_local_ca_jwt: Optional[bool] = None,
                          issuer: Optional[str] = None,
                          kubernetes_ca_cert: Optional[str] = None,
                          namespace: Optional[str] = None,
                          pem_keys: Optional[Sequence[str]] = None,
                          token_reviewer_jwt: Optional[str] = None,
                          use_annotations_as_alias_metadata: Optional[bool] = None)
    func NewAuthBackendConfig(ctx *Context, name string, args AuthBackendConfigArgs, opts ...ResourceOption) (*AuthBackendConfig, error)
    public AuthBackendConfig(string name, AuthBackendConfigArgs args, CustomResourceOptions? opts = null)
    public AuthBackendConfig(String name, AuthBackendConfigArgs args)
    public AuthBackendConfig(String name, AuthBackendConfigArgs args, CustomResourceOptions options)
    
    type: vault:kubernetes:AuthBackendConfig
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args AuthBackendConfigArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args AuthBackendConfigArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args AuthBackendConfigArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args AuthBackendConfigArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args AuthBackendConfigArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var vaultAuthBackendConfigResource = new Vault.Kubernetes.AuthBackendConfig("vaultAuthBackendConfigResource", new()
    {
        KubernetesHost = "string",
        Backend = "string",
        DisableIssValidation = false,
        DisableLocalCaJwt = false,
        Issuer = "string",
        KubernetesCaCert = "string",
        Namespace = "string",
        PemKeys = new[]
        {
            "string",
        },
        TokenReviewerJwt = "string",
        UseAnnotationsAsAliasMetadata = false,
    });
    
    example, err := kubernetes.NewAuthBackendConfig(ctx, "vaultAuthBackendConfigResource", &kubernetes.AuthBackendConfigArgs{
    	KubernetesHost:       pulumi.String("string"),
    	Backend:              pulumi.String("string"),
    	DisableIssValidation: pulumi.Bool(false),
    	DisableLocalCaJwt:    pulumi.Bool(false),
    	Issuer:               pulumi.String("string"),
    	KubernetesCaCert:     pulumi.String("string"),
    	Namespace:            pulumi.String("string"),
    	PemKeys: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	TokenReviewerJwt:              pulumi.String("string"),
    	UseAnnotationsAsAliasMetadata: pulumi.Bool(false),
    })
    
    var vaultAuthBackendConfigResource = new AuthBackendConfig("vaultAuthBackendConfigResource", AuthBackendConfigArgs.builder()
        .kubernetesHost("string")
        .backend("string")
        .disableIssValidation(false)
        .disableLocalCaJwt(false)
        .issuer("string")
        .kubernetesCaCert("string")
        .namespace("string")
        .pemKeys("string")
        .tokenReviewerJwt("string")
        .useAnnotationsAsAliasMetadata(false)
        .build());
    
    vault_auth_backend_config_resource = vault.kubernetes.AuthBackendConfig("vaultAuthBackendConfigResource",
        kubernetes_host="string",
        backend="string",
        disable_iss_validation=False,
        disable_local_ca_jwt=False,
        issuer="string",
        kubernetes_ca_cert="string",
        namespace="string",
        pem_keys=["string"],
        token_reviewer_jwt="string",
        use_annotations_as_alias_metadata=False)
    
    const vaultAuthBackendConfigResource = new vault.kubernetes.AuthBackendConfig("vaultAuthBackendConfigResource", {
        kubernetesHost: "string",
        backend: "string",
        disableIssValidation: false,
        disableLocalCaJwt: false,
        issuer: "string",
        kubernetesCaCert: "string",
        namespace: "string",
        pemKeys: ["string"],
        tokenReviewerJwt: "string",
        useAnnotationsAsAliasMetadata: false,
    });
    
    type: vault:kubernetes:AuthBackendConfig
    properties:
        backend: string
        disableIssValidation: false
        disableLocalCaJwt: false
        issuer: string
        kubernetesCaCert: string
        kubernetesHost: string
        namespace: string
        pemKeys:
            - string
        tokenReviewerJwt: string
        useAnnotationsAsAliasMetadata: false
    

    AuthBackendConfig Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The AuthBackendConfig resource accepts the following input properties:

    KubernetesHost string
    Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
    Backend string
    Unique name of the kubernetes backend to configure.
    DisableIssValidation bool
    Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    DisableLocalCaJwt bool
    Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    Issuer string
    JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
    KubernetesCaCert string
    PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
    Namespace string
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    PemKeys List<string>
    List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
    TokenReviewerJwt string
    A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
    UseAnnotationsAsAliasMetadata bool
    Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
    KubernetesHost string
    Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
    Backend string
    Unique name of the kubernetes backend to configure.
    DisableIssValidation bool
    Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    DisableLocalCaJwt bool
    Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    Issuer string
    JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
    KubernetesCaCert string
    PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
    Namespace string
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    PemKeys []string
    List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
    TokenReviewerJwt string
    A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
    UseAnnotationsAsAliasMetadata bool
    Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
    kubernetesHost String
    Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
    backend String
    Unique name of the kubernetes backend to configure.
    disableIssValidation Boolean
    Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    disableLocalCaJwt Boolean
    Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    issuer String
    JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
    kubernetesCaCert String
    PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
    namespace String
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pemKeys List<String>
    List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
    tokenReviewerJwt String
    A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
    useAnnotationsAsAliasMetadata Boolean
    Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
    kubernetesHost string
    Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
    backend string
    Unique name of the kubernetes backend to configure.
    disableIssValidation boolean
    Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    disableLocalCaJwt boolean
    Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    issuer string
    JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
    kubernetesCaCert string
    PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
    namespace string
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pemKeys string[]
    List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
    tokenReviewerJwt string
    A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
    useAnnotationsAsAliasMetadata boolean
    Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
    kubernetes_host str
    Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
    backend str
    Unique name of the kubernetes backend to configure.
    disable_iss_validation bool
    Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    disable_local_ca_jwt bool
    Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    issuer str
    JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
    kubernetes_ca_cert str
    PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
    namespace str
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pem_keys Sequence[str]
    List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
    token_reviewer_jwt str
    A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
    use_annotations_as_alias_metadata bool
    Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
    kubernetesHost String
    Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
    backend String
    Unique name of the kubernetes backend to configure.
    disableIssValidation Boolean
    Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    disableLocalCaJwt Boolean
    Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    issuer String
    JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
    kubernetesCaCert String
    PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
    namespace String
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pemKeys List<String>
    List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
    tokenReviewerJwt String
    A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
    useAnnotationsAsAliasMetadata Boolean
    Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+

    Outputs

    All input properties are implicitly available as output properties. Additionally, the AuthBackendConfig resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing AuthBackendConfig Resource

    Get an existing AuthBackendConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: AuthBackendConfigState, opts?: CustomResourceOptions): AuthBackendConfig
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            backend: Optional[str] = None,
            disable_iss_validation: Optional[bool] = None,
            disable_local_ca_jwt: Optional[bool] = None,
            issuer: Optional[str] = None,
            kubernetes_ca_cert: Optional[str] = None,
            kubernetes_host: Optional[str] = None,
            namespace: Optional[str] = None,
            pem_keys: Optional[Sequence[str]] = None,
            token_reviewer_jwt: Optional[str] = None,
            use_annotations_as_alias_metadata: Optional[bool] = None) -> AuthBackendConfig
    func GetAuthBackendConfig(ctx *Context, name string, id IDInput, state *AuthBackendConfigState, opts ...ResourceOption) (*AuthBackendConfig, error)
    public static AuthBackendConfig Get(string name, Input<string> id, AuthBackendConfigState? state, CustomResourceOptions? opts = null)
    public static AuthBackendConfig get(String name, Output<String> id, AuthBackendConfigState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Backend string
    Unique name of the kubernetes backend to configure.
    DisableIssValidation bool
    Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    DisableLocalCaJwt bool
    Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    Issuer string
    JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
    KubernetesCaCert string
    PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
    KubernetesHost string
    Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
    Namespace string
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    PemKeys List<string>
    List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
    TokenReviewerJwt string
    A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
    UseAnnotationsAsAliasMetadata bool
    Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
    Backend string
    Unique name of the kubernetes backend to configure.
    DisableIssValidation bool
    Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    DisableLocalCaJwt bool
    Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    Issuer string
    JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
    KubernetesCaCert string
    PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
    KubernetesHost string
    Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
    Namespace string
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    PemKeys []string
    List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
    TokenReviewerJwt string
    A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
    UseAnnotationsAsAliasMetadata bool
    Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
    backend String
    Unique name of the kubernetes backend to configure.
    disableIssValidation Boolean
    Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    disableLocalCaJwt Boolean
    Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    issuer String
    JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
    kubernetesCaCert String
    PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
    kubernetesHost String
    Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
    namespace String
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pemKeys List<String>
    List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
    tokenReviewerJwt String
    A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
    useAnnotationsAsAliasMetadata Boolean
    Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
    backend string
    Unique name of the kubernetes backend to configure.
    disableIssValidation boolean
    Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    disableLocalCaJwt boolean
    Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    issuer string
    JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
    kubernetesCaCert string
    PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
    kubernetesHost string
    Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
    namespace string
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pemKeys string[]
    List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
    tokenReviewerJwt string
    A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
    useAnnotationsAsAliasMetadata boolean
    Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
    backend str
    Unique name of the kubernetes backend to configure.
    disable_iss_validation bool
    Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    disable_local_ca_jwt bool
    Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    issuer str
    JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
    kubernetes_ca_cert str
    PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
    kubernetes_host str
    Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
    namespace str
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pem_keys Sequence[str]
    List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
    token_reviewer_jwt str
    A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
    use_annotations_as_alias_metadata bool
    Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
    backend String
    Unique name of the kubernetes backend to configure.
    disableIssValidation Boolean
    Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    disableLocalCaJwt Boolean
    Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
    issuer String
    JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
    kubernetesCaCert String
    PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
    kubernetesHost String
    Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
    namespace String
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pemKeys List<String>
    List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
    tokenReviewerJwt String
    A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
    useAnnotationsAsAliasMetadata Boolean
    Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+

    Import

    Kubernetes authentication backend can be imported using the path, e.g.

    $ pulumi import vault:kubernetes/authBackendConfig:AuthBackendConfig config auth/kubernetes/config
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Vault pulumi/pulumi-vault
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the vault Terraform Provider.
    vault logo
    HashiCorp Vault v6.4.0 published on Wednesday, Nov 20, 2024 by Pulumi