mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-06 06:37:02 +02:00
77 lines
3.5 KiB
TypeScript
77 lines
3.5 KiB
TypeScript
/**
|
|
* HashiCorp Vault API
|
|
* HTTP API that gives you full access to Vault. All API routes are prefixed with `/v1/`.
|
|
*
|
|
* The version of the OpenAPI document: 1.21.0
|
|
*
|
|
*
|
|
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
* https://openapi-generator.tech
|
|
* Do not edit the class manually.
|
|
*/
|
|
/**
|
|
*
|
|
* @export
|
|
* @interface KubernetesConfigureAuthRequest
|
|
*/
|
|
export interface KubernetesConfigureAuthRequest {
|
|
/**
|
|
* Disable JWT issuer validation (Deprecated, will be removed in a future release)
|
|
* @type {boolean}
|
|
* @memberof KubernetesConfigureAuthRequest
|
|
* @deprecated
|
|
*/
|
|
disableIssValidation?: boolean;
|
|
/**
|
|
* Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod
|
|
* @type {boolean}
|
|
* @memberof KubernetesConfigureAuthRequest
|
|
*/
|
|
disableLocalCaJwt?: boolean;
|
|
/**
|
|
* Optional JWT issuer. If no issuer is specified, then this plugin will use kubernetes.io/serviceaccount as the default issuer. (Deprecated, will be removed in a future release)
|
|
* @type {string}
|
|
* @memberof KubernetesConfigureAuthRequest
|
|
* @deprecated
|
|
*/
|
|
issuer?: string;
|
|
/**
|
|
* Optional PEM encoded CA cert for use by the TLS client used to talk with the API. If it is not set and disable_local_ca_jwt is true, the system's trusted CA certificate pool will be used.
|
|
* @type {string}
|
|
* @memberof KubernetesConfigureAuthRequest
|
|
*/
|
|
kubernetesCaCert?: string;
|
|
/**
|
|
* Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
|
* @type {string}
|
|
* @memberof KubernetesConfigureAuthRequest
|
|
*/
|
|
kubernetesHost?: string;
|
|
/**
|
|
* Optional list of PEM-formated public keys or certificates used to verify the signatures of kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
|
* @type {Array<string>}
|
|
* @memberof KubernetesConfigureAuthRequest
|
|
*/
|
|
pemKeys?: Array<string>;
|
|
/**
|
|
* A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
|
|
* @type {string}
|
|
* @memberof KubernetesConfigureAuthRequest
|
|
*/
|
|
tokenReviewerJwt?: string;
|
|
/**
|
|
* Use annotations from the client token's associated service account as alias metadata for the Vault entity. Only annotations with the prefix "vault.hashicorp.com/alias-metadata-" will be used. Note that Vault will need permission to read service accounts from the Kubernetes API.
|
|
* @type {boolean}
|
|
* @memberof KubernetesConfigureAuthRequest
|
|
*/
|
|
useAnnotationsAsAliasMetadata?: boolean;
|
|
}
|
|
/**
|
|
* Check if a given object implements the KubernetesConfigureAuthRequest interface.
|
|
*/
|
|
export declare function instanceOfKubernetesConfigureAuthRequest(value: object): value is KubernetesConfigureAuthRequest;
|
|
export declare function KubernetesConfigureAuthRequestFromJSON(json: any): KubernetesConfigureAuthRequest;
|
|
export declare function KubernetesConfigureAuthRequestFromJSONTyped(json: any, ignoreDiscriminator: boolean): KubernetesConfigureAuthRequest;
|
|
export declare function KubernetesConfigureAuthRequestToJSON(json: any): KubernetesConfigureAuthRequest;
|
|
export declare function KubernetesConfigureAuthRequestToJSONTyped(value?: KubernetesConfigureAuthRequest | null, ignoreDiscriminator?: boolean): any;
|