@pulumi/vault 4.5.0 → 4.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/ad/getAccessCredentials.d.ts +18 -2
- package/ad/getAccessCredentials.js +5 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.js +14 -7
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +68 -68
- package/ad/secretBackend.js +1 -0
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +12 -12
- package/ad/secretLibrary.js +1 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +10 -10
- package/ad/secretRole.js +1 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +24 -24
- package/alicloud/authBackendRole.js +1 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.js +11 -4
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +16 -16
- package/approle/authBackendLogin.js +4 -3
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +39 -39
- package/approle/authBackendRole.js +2 -1
- package/approle/authBackendRole.js.map +1 -1
- package/approle/authBackendRoleSecretID.d.ts +17 -17
- package/approle/authBackendRoleSecretID.js +3 -2
- package/approle/authBackendRoleSecretID.js.map +1 -1
- package/approle/getAuthBackendRoleId.d.ts +17 -2
- package/approle/getAuthBackendRoleId.js +5 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.js +14 -7
- package/approle/index.js.map +1 -1
- package/audit.d.ts +10 -10
- package/audit.js +1 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +17 -17
- package/authBackend.js +1 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +8 -8
- package/aws/authBackendCert.js +1 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +16 -16
- package/aws/authBackendClient.js +1 -0
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +6 -6
- package/aws/authBackendIdentityWhitelist.js +1 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +28 -28
- package/aws/authBackendLogin.js +1 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +62 -62
- package/aws/authBackendRole.js +1 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +16 -16
- package/aws/authBackendRoleTag.js +1 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +6 -6
- package/aws/authBackendRoletagBlacklist.js +1 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +6 -6
- package/aws/authBackendStsRole.js +1 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +42 -6
- package/aws/getAccessCredentials.js +5 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.js +21 -14
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +18 -18
- package/aws/secretBackend.js +1 -0
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +18 -18
- package/aws/secretBackendRole.js +1 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +12 -12
- package/azure/authBackendConfig.js +1 -0
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +45 -45
- package/azure/authBackendRole.js +1 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +14 -14
- package/azure/backend.js +1 -0
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +16 -16
- package/azure/backendRole.js +1 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +47 -6
- package/azure/getAccessCredentials.js +5 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.js +15 -8
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +50 -50
- package/certAuthBackendRole.js +1 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/index.js +11 -4
- package/config/index.js.map +1 -1
- package/config/vars.d.ts +13 -13
- package/config/vars.js +82 -53
- package/config/vars.js.map +1 -1
- package/consul/index.js +12 -5
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +22 -22
- package/consul/secretBackend.js +1 -0
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +16 -16
- package/consul/secretBackendRole.js +1 -0
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.js +13 -6
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +38 -38
- package/database/secretBackendConnection.js +1 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +18 -18
- package/database/secretBackendRole.js +1 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +12 -12
- package/database/secretBackendStaticRole.js +1 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/egpPolicy.d.ts +8 -8
- package/egpPolicy.js +1 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +16 -16
- package/gcp/authBackend.js +1 -0
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +50 -50
- package/gcp/authBackendRole.js +1 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +80 -12
- package/gcp/getAuthBackendRole.js +6 -1
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.js +16 -9
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +12 -12
- package/gcp/secretBackend.js +1 -0
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +13 -13
- package/gcp/secretRoleset.js +1 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +39 -13
- package/gcp/secretStaticAccount.js +27 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +14 -14
- package/generic/endpoint.js +1 -0
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +22 -2
- package/generic/getSecret.js +5 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.js +13 -6
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +7 -7
- package/generic/secret.js +1 -0
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +13 -3
- package/getAuthBackend.js +6 -1
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +18 -2
- package/getNomadAccessToken.js +5 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +8 -1
- package/getPolicyDocument.js +5 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +44 -35
- package/github/authBackend.js +3 -2
- package/github/authBackend.js.map +1 -1
- package/github/index.js +13 -6
- package/github/index.js.map +1 -1
- package/github/team.d.ts +24 -24
- package/github/team.js +1 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +24 -24
- package/github/user.js +1 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +10 -10
- package/identity/entity.js +1 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +6 -6
- package/identity/entityAlias.js +1 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +7 -7
- package/identity/entityPolicies.js +1 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +33 -5
- package/identity/getEntity.js +5 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +33 -5
- package/identity/getGroup.js +5 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/group.d.ts +16 -16
- package/identity/group.js +1 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +6 -6
- package/identity/groupAlias.js +1 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +7 -7
- package/identity/groupMemberEntityIds.js +1 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +7 -7
- package/identity/groupPolicies.js +1 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.js +23 -16
- package/identity/index.js.map +1 -1
- package/identity/oidc.d.ts +2 -2
- package/identity/oidc.js +1 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcKey.d.ts +10 -10
- package/identity/oidcKey.js +1 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +4 -4
- package/identity/oidcKeyAllowedClientID.js +1 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcRole.d.ts +10 -10
- package/identity/oidcRole.js +1 -0
- package/identity/oidcRole.js.map +1 -1
- package/index.js +31 -23
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +33 -33
- package/jwt/authBackend.js +1 -0
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +64 -64
- package/jwt/authBackendRole.js +1 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.js +12 -5
- package/jwt/index.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +16 -16
- package/kubernetes/authBackendConfig.js +1 -0
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +40 -40
- package/kubernetes/authBackendRole.js +1 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +36 -7
- package/kubernetes/getAuthBackendConfig.js +5 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +115 -18
- package/kubernetes/getAuthBackendRole.js +5 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/index.js +14 -7
- package/kubernetes/index.js.map +1 -1
- package/ldap/authBackend.d.ts +63 -63
- package/ldap/authBackend.js +1 -0
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +6 -6
- package/ldap/authBackendGroup.js +1 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +8 -8
- package/ldap/authBackendUser.js +1 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.js +13 -6
- package/ldap/index.js.map +1 -1
- package/mfaDuo.d.ts +14 -14
- package/mfaDuo.js +1 -0
- package/mfaDuo.js.map +1 -1
- package/mount.d.ts +19 -19
- package/mount.js +1 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +3 -3
- package/namespace.js +1 -0
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +26 -26
- package/nomadSecretBackend.js +1 -0
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +10 -10
- package/nomadSecretRole.js +1 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +21 -21
- package/okta/authBackend.js +1 -0
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +6 -6
- package/okta/authBackendGroup.js +1 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +16 -8
- package/okta/authBackendUser.js +9 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.js +13 -6
- package/okta/index.js.map +1 -1
- package/package.json +4 -3
- package/package.json.bak +3 -2
- package/package.json.dev +4 -3
- package/passwordPolicy.d.ts +4 -4
- package/passwordPolicy.js +1 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.js +21 -14
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackend.d.ts +8 -8
- package/pkisecret/secretBackend.js +1 -0
- package/pkisecret/secretBackend.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +33 -33
- package/pkisecret/secretBackendCert.js +1 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +4 -4
- package/pkisecret/secretBackendConfigCa.js +1 -0
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +10 -10
- package/pkisecret/secretBackendConfigUrls.js +3 -2
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +7 -7
- package/pkisecret/secretBackendCrlConfig.js +2 -1
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +41 -41
- package/pkisecret/secretBackendIntermediateCertRequest.js +1 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +4 -4
- package/pkisecret/secretBackendIntermediateSetSigned.js +1 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +78 -78
- package/pkisecret/secretBackendRole.js +3 -2
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +47 -47
- package/pkisecret/secretBackendRootCert.js +1 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +45 -45
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -1
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +31 -31
- package/pkisecret/secretBackendSign.js +1 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +4 -4
- package/policy.js +1 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +41 -13
- package/provider.js +4 -3
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +6 -6
- package/quotaLeaseCount.js +1 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +6 -6
- package/quotaRateLimit.js +1 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.js +12 -5
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +16 -16
- package/rabbitmq/secretBackend.js +1 -0
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +8 -8
- package/rabbitmq/secretBackendRole.js +1 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +54 -54
- package/raftSnapshotAgentConfig.js +1 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +6 -6
- package/rgpPolicy.js +1 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.js +12 -5
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +8 -8
- package/ssh/secretBackendCa.js +1 -0
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +44 -44
- package/ssh/secretBackendRole.js +1 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/token.d.ts +34 -34
- package/token.js +1 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +39 -39
- package/tokenauth/authBackendRole.js +1 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.js +11 -4
- package/tokenauth/index.js.map +1 -1
- package/transform/alphabet.d.ts +6 -6
- package/transform/alphabet.js +1 -0
- package/transform/alphabet.js.map +1 -1
- package/transform/getDecode.d.ts +50 -8
- package/transform/getDecode.js +5 -0
- package/transform/getDecode.js.map +1 -1
- package/transform/getEncode.d.ts +50 -8
- package/transform/getEncode.js +5 -0
- package/transform/getEncode.js.map +1 -1
- package/transform/index.js +16 -9
- package/transform/index.js.map +1 -1
- package/transform/role.d.ts +6 -6
- package/transform/role.js +1 -0
- package/transform/role.js.map +1 -1
- package/transform/template.d.ts +10 -10
- package/transform/template.js +1 -0
- package/transform/template.js.map +1 -1
- package/transform/transformation.d.ts +16 -16
- package/transform/transformation.js +1 -0
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +27 -5
- package/transit/getDecrypt.js +6 -1
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +31 -5
- package/transit/getEncrypt.js +5 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.js +14 -7
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +27 -27
- package/transit/secretBackendKey.js +1 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +4 -4
- package/transit/secretCacheConfig.js +1 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js +1 -0
- package/types/index.js.map +1 -1
- package/types/input.d.ts +54 -0
- package/types/output.d.ts +0 -16
- package/utilities.js +1 -0
- package/utilities.js.map +1 -1
|
@@ -184,40 +184,40 @@ export interface AuthBackendRoleState {
|
|
|
184
184
|
/**
|
|
185
185
|
* Audience claim to verify in the JWT.
|
|
186
186
|
*/
|
|
187
|
-
|
|
187
|
+
audience?: pulumi.Input<string>;
|
|
188
188
|
/**
|
|
189
189
|
* Unique name of the kubernetes backend to configure.
|
|
190
190
|
*/
|
|
191
|
-
|
|
191
|
+
backend?: pulumi.Input<string>;
|
|
192
192
|
/**
|
|
193
193
|
* If set, a list of
|
|
194
194
|
* CIDRs valid as the source address for login requests. This value is also encoded into any resulting token.
|
|
195
195
|
*
|
|
196
196
|
* @deprecated use `token_bound_cidrs` instead if you are running Vault >= 1.2
|
|
197
197
|
*/
|
|
198
|
-
|
|
198
|
+
boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
199
199
|
/**
|
|
200
200
|
* List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and boundServiceAccountNamespaces can not be "*".
|
|
201
201
|
*/
|
|
202
|
-
|
|
202
|
+
boundServiceAccountNames?: pulumi.Input<pulumi.Input<string>[]>;
|
|
203
203
|
/**
|
|
204
204
|
* List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and boundServiceAccountNames can not be set to "*".
|
|
205
205
|
*/
|
|
206
|
-
|
|
206
|
+
boundServiceAccountNamespaces?: pulumi.Input<pulumi.Input<string>[]>;
|
|
207
207
|
/**
|
|
208
208
|
* The maximum allowed lifetime of tokens
|
|
209
209
|
* issued using this role, provided as a number of seconds.
|
|
210
210
|
*
|
|
211
211
|
* @deprecated use `token_max_ttl` instead if you are running Vault >= 1.2
|
|
212
212
|
*/
|
|
213
|
-
|
|
213
|
+
maxTtl?: pulumi.Input<number>;
|
|
214
214
|
/**
|
|
215
215
|
* If set, puts a use-count
|
|
216
216
|
* limitation on the issued token.
|
|
217
217
|
*
|
|
218
218
|
* @deprecated use `token_num_uses` instead if you are running Vault >= 1.2
|
|
219
219
|
*/
|
|
220
|
-
|
|
220
|
+
numUses?: pulumi.Input<number>;
|
|
221
221
|
/**
|
|
222
222
|
* If set, indicates that the
|
|
223
223
|
* token generated using this role should never expire. The token should be renewed within the
|
|
@@ -226,64 +226,64 @@ export interface AuthBackendRoleState {
|
|
|
226
226
|
*
|
|
227
227
|
* @deprecated use `token_period` instead if you are running Vault >= 1.2
|
|
228
228
|
*/
|
|
229
|
-
|
|
229
|
+
period?: pulumi.Input<number>;
|
|
230
230
|
/**
|
|
231
231
|
* An array of strings
|
|
232
232
|
* specifying the policies to be set on tokens issued using this role.
|
|
233
233
|
*
|
|
234
234
|
* @deprecated use `token_policies` instead if you are running Vault >= 1.2
|
|
235
235
|
*/
|
|
236
|
-
|
|
236
|
+
policies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
237
237
|
/**
|
|
238
238
|
* Name of the role.
|
|
239
239
|
*/
|
|
240
|
-
|
|
240
|
+
roleName?: pulumi.Input<string>;
|
|
241
241
|
/**
|
|
242
242
|
* List of CIDR blocks; if set, specifies blocks of IP
|
|
243
243
|
* addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
244
244
|
* as well.
|
|
245
245
|
*/
|
|
246
|
-
|
|
246
|
+
tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
247
247
|
/**
|
|
248
248
|
* If set, will encode an
|
|
249
249
|
* [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
250
250
|
* onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
|
|
251
251
|
* `tokenMaxTtl` would otherwise allow a renewal.
|
|
252
252
|
*/
|
|
253
|
-
|
|
253
|
+
tokenExplicitMaxTtl?: pulumi.Input<number>;
|
|
254
254
|
/**
|
|
255
255
|
* The maximum lifetime for generated tokens in number of seconds.
|
|
256
256
|
* Its current value will be referenced at renewal time.
|
|
257
257
|
*/
|
|
258
|
-
|
|
258
|
+
tokenMaxTtl?: pulumi.Input<number>;
|
|
259
259
|
/**
|
|
260
260
|
* If set, the default policy will not be set on
|
|
261
261
|
* generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
262
262
|
*/
|
|
263
|
-
|
|
263
|
+
tokenNoDefaultPolicy?: pulumi.Input<boolean>;
|
|
264
264
|
/**
|
|
265
265
|
* The
|
|
266
266
|
* [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
|
267
267
|
* if any, in number of seconds to set on the token.
|
|
268
268
|
*/
|
|
269
|
-
|
|
269
|
+
tokenNumUses?: pulumi.Input<number>;
|
|
270
270
|
/**
|
|
271
271
|
* If set, indicates that the
|
|
272
272
|
* token generated using this role should never expire. The token should be renewed within the
|
|
273
273
|
* duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
274
274
|
* value of this field. Specified in seconds.
|
|
275
275
|
*/
|
|
276
|
-
|
|
276
|
+
tokenPeriod?: pulumi.Input<number>;
|
|
277
277
|
/**
|
|
278
278
|
* List of policies to encode onto generated tokens. Depending
|
|
279
279
|
* on the auth method, this list may be supplemented by user/group/other values.
|
|
280
280
|
*/
|
|
281
|
-
|
|
281
|
+
tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
282
282
|
/**
|
|
283
283
|
* The incremental lifetime for generated tokens in number of seconds.
|
|
284
284
|
* Its current value will be referenced at renewal time.
|
|
285
285
|
*/
|
|
286
|
-
|
|
286
|
+
tokenTtl?: pulumi.Input<number>;
|
|
287
287
|
/**
|
|
288
288
|
* The type of token that should be generated. Can be `service`,
|
|
289
289
|
* `batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
@@ -291,14 +291,14 @@ export interface AuthBackendRoleState {
|
|
|
291
291
|
* `default-service` and `default-batch` which specify the type to return unless the client
|
|
292
292
|
* requests a different type at generation time.
|
|
293
293
|
*/
|
|
294
|
-
|
|
294
|
+
tokenType?: pulumi.Input<string>;
|
|
295
295
|
/**
|
|
296
296
|
* The TTL period of tokens issued
|
|
297
297
|
* using this role, provided as a number of seconds.
|
|
298
298
|
*
|
|
299
299
|
* @deprecated use `token_ttl` instead if you are running Vault >= 1.2
|
|
300
300
|
*/
|
|
301
|
-
|
|
301
|
+
ttl?: pulumi.Input<number>;
|
|
302
302
|
}
|
|
303
303
|
/**
|
|
304
304
|
* The set of arguments for constructing a AuthBackendRole resource.
|
|
@@ -307,40 +307,40 @@ export interface AuthBackendRoleArgs {
|
|
|
307
307
|
/**
|
|
308
308
|
* Audience claim to verify in the JWT.
|
|
309
309
|
*/
|
|
310
|
-
|
|
310
|
+
audience?: pulumi.Input<string>;
|
|
311
311
|
/**
|
|
312
312
|
* Unique name of the kubernetes backend to configure.
|
|
313
313
|
*/
|
|
314
|
-
|
|
314
|
+
backend?: pulumi.Input<string>;
|
|
315
315
|
/**
|
|
316
316
|
* If set, a list of
|
|
317
317
|
* CIDRs valid as the source address for login requests. This value is also encoded into any resulting token.
|
|
318
318
|
*
|
|
319
319
|
* @deprecated use `token_bound_cidrs` instead if you are running Vault >= 1.2
|
|
320
320
|
*/
|
|
321
|
-
|
|
321
|
+
boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
322
322
|
/**
|
|
323
323
|
* List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and boundServiceAccountNamespaces can not be "*".
|
|
324
324
|
*/
|
|
325
|
-
|
|
325
|
+
boundServiceAccountNames: pulumi.Input<pulumi.Input<string>[]>;
|
|
326
326
|
/**
|
|
327
327
|
* List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and boundServiceAccountNames can not be set to "*".
|
|
328
328
|
*/
|
|
329
|
-
|
|
329
|
+
boundServiceAccountNamespaces: pulumi.Input<pulumi.Input<string>[]>;
|
|
330
330
|
/**
|
|
331
331
|
* The maximum allowed lifetime of tokens
|
|
332
332
|
* issued using this role, provided as a number of seconds.
|
|
333
333
|
*
|
|
334
334
|
* @deprecated use `token_max_ttl` instead if you are running Vault >= 1.2
|
|
335
335
|
*/
|
|
336
|
-
|
|
336
|
+
maxTtl?: pulumi.Input<number>;
|
|
337
337
|
/**
|
|
338
338
|
* If set, puts a use-count
|
|
339
339
|
* limitation on the issued token.
|
|
340
340
|
*
|
|
341
341
|
* @deprecated use `token_num_uses` instead if you are running Vault >= 1.2
|
|
342
342
|
*/
|
|
343
|
-
|
|
343
|
+
numUses?: pulumi.Input<number>;
|
|
344
344
|
/**
|
|
345
345
|
* If set, indicates that the
|
|
346
346
|
* token generated using this role should never expire. The token should be renewed within the
|
|
@@ -349,64 +349,64 @@ export interface AuthBackendRoleArgs {
|
|
|
349
349
|
*
|
|
350
350
|
* @deprecated use `token_period` instead if you are running Vault >= 1.2
|
|
351
351
|
*/
|
|
352
|
-
|
|
352
|
+
period?: pulumi.Input<number>;
|
|
353
353
|
/**
|
|
354
354
|
* An array of strings
|
|
355
355
|
* specifying the policies to be set on tokens issued using this role.
|
|
356
356
|
*
|
|
357
357
|
* @deprecated use `token_policies` instead if you are running Vault >= 1.2
|
|
358
358
|
*/
|
|
359
|
-
|
|
359
|
+
policies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
360
360
|
/**
|
|
361
361
|
* Name of the role.
|
|
362
362
|
*/
|
|
363
|
-
|
|
363
|
+
roleName: pulumi.Input<string>;
|
|
364
364
|
/**
|
|
365
365
|
* List of CIDR blocks; if set, specifies blocks of IP
|
|
366
366
|
* addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
367
367
|
* as well.
|
|
368
368
|
*/
|
|
369
|
-
|
|
369
|
+
tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
370
370
|
/**
|
|
371
371
|
* If set, will encode an
|
|
372
372
|
* [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
373
373
|
* onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
|
|
374
374
|
* `tokenMaxTtl` would otherwise allow a renewal.
|
|
375
375
|
*/
|
|
376
|
-
|
|
376
|
+
tokenExplicitMaxTtl?: pulumi.Input<number>;
|
|
377
377
|
/**
|
|
378
378
|
* The maximum lifetime for generated tokens in number of seconds.
|
|
379
379
|
* Its current value will be referenced at renewal time.
|
|
380
380
|
*/
|
|
381
|
-
|
|
381
|
+
tokenMaxTtl?: pulumi.Input<number>;
|
|
382
382
|
/**
|
|
383
383
|
* If set, the default policy will not be set on
|
|
384
384
|
* generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
385
385
|
*/
|
|
386
|
-
|
|
386
|
+
tokenNoDefaultPolicy?: pulumi.Input<boolean>;
|
|
387
387
|
/**
|
|
388
388
|
* The
|
|
389
389
|
* [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
|
390
390
|
* if any, in number of seconds to set on the token.
|
|
391
391
|
*/
|
|
392
|
-
|
|
392
|
+
tokenNumUses?: pulumi.Input<number>;
|
|
393
393
|
/**
|
|
394
394
|
* If set, indicates that the
|
|
395
395
|
* token generated using this role should never expire. The token should be renewed within the
|
|
396
396
|
* duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
397
397
|
* value of this field. Specified in seconds.
|
|
398
398
|
*/
|
|
399
|
-
|
|
399
|
+
tokenPeriod?: pulumi.Input<number>;
|
|
400
400
|
/**
|
|
401
401
|
* List of policies to encode onto generated tokens. Depending
|
|
402
402
|
* on the auth method, this list may be supplemented by user/group/other values.
|
|
403
403
|
*/
|
|
404
|
-
|
|
404
|
+
tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
405
405
|
/**
|
|
406
406
|
* The incremental lifetime for generated tokens in number of seconds.
|
|
407
407
|
* Its current value will be referenced at renewal time.
|
|
408
408
|
*/
|
|
409
|
-
|
|
409
|
+
tokenTtl?: pulumi.Input<number>;
|
|
410
410
|
/**
|
|
411
411
|
* The type of token that should be generated. Can be `service`,
|
|
412
412
|
* `batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
@@ -414,12 +414,12 @@ export interface AuthBackendRoleArgs {
|
|
|
414
414
|
* `default-service` and `default-batch` which specify the type to return unless the client
|
|
415
415
|
* requests a different type at generation time.
|
|
416
416
|
*/
|
|
417
|
-
|
|
417
|
+
tokenType?: pulumi.Input<string>;
|
|
418
418
|
/**
|
|
419
419
|
* The TTL period of tokens issued
|
|
420
420
|
* using this role, provided as a number of seconds.
|
|
421
421
|
*
|
|
422
422
|
* @deprecated use `token_ttl` instead if you are running Vault >= 1.2
|
|
423
423
|
*/
|
|
424
|
-
|
|
424
|
+
ttl?: pulumi.Input<number>;
|
|
425
425
|
}
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.AuthBackendRole = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendRole.js","sourceRoot":"","sources":["../../kubernetes/authBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"authBackendRole.js","sourceRoot":"","sources":["../../kubernetes/authBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IA2JtD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,MAAM,CAAC,+BAA+B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,6BAA6B,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,wBAAwB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrE,MAAM,IAAI,KAAK,CAAC,sDAAsD,CAAC,CAAC;aAC3E;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,6BAA6B,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1E,MAAM,IAAI,KAAK,CAAC,2DAA2D,CAAC,CAAC;aAChF;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,MAAM,CAAC,+BAA+B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,6BAA6B,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;IAvND;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;;AA1BL,0CAyNC;AA3MG,gBAAgB;AACO,4BAAY,GAAG,kDAAkD,CAAC"}
|
|
@@ -13,25 +13,25 @@ export interface GetAuthBackendConfigArgs {
|
|
|
13
13
|
* The unique name for the Kubernetes backend the config to
|
|
14
14
|
* retrieve Role attributes for resides in. Defaults to "kubernetes".
|
|
15
15
|
*/
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
16
|
+
backend?: string;
|
|
17
|
+
disableIssValidation?: boolean;
|
|
18
|
+
disableLocalCaJwt?: boolean;
|
|
19
19
|
/**
|
|
20
20
|
* Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
|
21
21
|
*/
|
|
22
|
-
|
|
22
|
+
issuer?: string;
|
|
23
23
|
/**
|
|
24
24
|
* PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
|
25
25
|
*/
|
|
26
|
-
|
|
26
|
+
kubernetesCaCert?: string;
|
|
27
27
|
/**
|
|
28
28
|
* Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
|
29
29
|
*/
|
|
30
|
-
|
|
30
|
+
kubernetesHost?: string;
|
|
31
31
|
/**
|
|
32
32
|
* Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
|
33
33
|
*/
|
|
34
|
-
|
|
34
|
+
pemKeys?: string[];
|
|
35
35
|
}
|
|
36
36
|
/**
|
|
37
37
|
* A collection of values returned by getAuthBackendConfig.
|
|
@@ -61,3 +61,32 @@ export interface GetAuthBackendConfigResult {
|
|
|
61
61
|
*/
|
|
62
62
|
readonly pemKeys: string[];
|
|
63
63
|
}
|
|
64
|
+
export declare function getAuthBackendConfigOutput(args?: GetAuthBackendConfigOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetAuthBackendConfigResult>;
|
|
65
|
+
/**
|
|
66
|
+
* A collection of arguments for invoking getAuthBackendConfig.
|
|
67
|
+
*/
|
|
68
|
+
export interface GetAuthBackendConfigOutputArgs {
|
|
69
|
+
/**
|
|
70
|
+
* The unique name for the Kubernetes backend the config to
|
|
71
|
+
* retrieve Role attributes for resides in. Defaults to "kubernetes".
|
|
72
|
+
*/
|
|
73
|
+
backend?: pulumi.Input<string>;
|
|
74
|
+
disableIssValidation?: pulumi.Input<boolean>;
|
|
75
|
+
disableLocalCaJwt?: pulumi.Input<boolean>;
|
|
76
|
+
/**
|
|
77
|
+
* Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
|
78
|
+
*/
|
|
79
|
+
issuer?: pulumi.Input<string>;
|
|
80
|
+
/**
|
|
81
|
+
* PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
|
82
|
+
*/
|
|
83
|
+
kubernetesCaCert?: pulumi.Input<string>;
|
|
84
|
+
/**
|
|
85
|
+
* Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
|
86
|
+
*/
|
|
87
|
+
kubernetesHost?: pulumi.Input<string>;
|
|
88
|
+
/**
|
|
89
|
+
* Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
|
90
|
+
*/
|
|
91
|
+
pemKeys?: pulumi.Input<pulumi.Input<string>[]>;
|
|
92
|
+
}
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getAuthBackendConfigOutput = exports.getAuthBackendConfig = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
/**
|
|
@@ -28,4 +29,8 @@ function getAuthBackendConfig(args, opts) {
|
|
|
28
29
|
}, opts);
|
|
29
30
|
}
|
|
30
31
|
exports.getAuthBackendConfig = getAuthBackendConfig;
|
|
32
|
+
function getAuthBackendConfigOutput(args, opts) {
|
|
33
|
+
return pulumi.output(args).apply(a => getAuthBackendConfig(a, opts));
|
|
34
|
+
}
|
|
35
|
+
exports.getAuthBackendConfigOutput = getAuthBackendConfigOutput;
|
|
31
36
|
//# sourceMappingURL=getAuthBackendConfig.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getAuthBackendConfig.js","sourceRoot":"","sources":["../../kubernetes/getAuthBackendConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"getAuthBackendConfig.js","sourceRoot":"","sources":["../../kubernetes/getAuthBackendConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;GAIG;AACH,SAAgB,oBAAoB,CAAC,IAA+B,EAAE,IAA2B;IAC7F,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,4DAA4D,EAAE;QACvF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,mBAAmB,EAAE,IAAI,CAAC,iBAAiB;QAC3C,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,kBAAkB,EAAE,IAAI,CAAC,gBAAgB;QACzC,gBAAgB,EAAE,IAAI,CAAC,cAAc;QACrC,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAlBD,oDAkBC;AA4DD,SAAgB,0BAA0B,CAAC,IAAqC,EAAE,IAA2B;IACzG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
|
|
@@ -25,82 +25,82 @@ export interface GetAuthBackendRoleArgs {
|
|
|
25
25
|
/**
|
|
26
26
|
* (Optional) Audience claim to verify in the JWT.
|
|
27
27
|
*/
|
|
28
|
-
|
|
28
|
+
audience?: string;
|
|
29
29
|
/**
|
|
30
30
|
* The unique name for the Kubernetes backend the role to
|
|
31
31
|
* retrieve Role attributes for resides in. Defaults to "kubernetes".
|
|
32
32
|
*/
|
|
33
|
-
|
|
33
|
+
backend?: string;
|
|
34
34
|
/**
|
|
35
35
|
* @deprecated use `token_bound_cidrs` instead if you are running Vault >= 1.2
|
|
36
36
|
*/
|
|
37
|
-
|
|
37
|
+
boundCidrs?: string[];
|
|
38
38
|
/**
|
|
39
39
|
* @deprecated use `token_max_ttl` instead if you are running Vault >= 1.2
|
|
40
40
|
*/
|
|
41
|
-
|
|
41
|
+
maxTtl?: number;
|
|
42
42
|
/**
|
|
43
43
|
* @deprecated use `token_num_uses` instead if you are running Vault >= 1.2
|
|
44
44
|
*/
|
|
45
|
-
|
|
45
|
+
numUses?: number;
|
|
46
46
|
/**
|
|
47
47
|
* @deprecated use `token_period` instead if you are running Vault >= 1.2
|
|
48
48
|
*/
|
|
49
|
-
|
|
49
|
+
period?: number;
|
|
50
50
|
/**
|
|
51
51
|
* @deprecated use `token_policies` instead if you are running Vault >= 1.2
|
|
52
52
|
*/
|
|
53
|
-
|
|
53
|
+
policies?: string[];
|
|
54
54
|
/**
|
|
55
55
|
* The name of the role to retrieve the Role attributes for.
|
|
56
56
|
*/
|
|
57
|
-
|
|
57
|
+
roleName: string;
|
|
58
58
|
/**
|
|
59
59
|
* List of CIDR blocks; if set, specifies blocks of IP
|
|
60
60
|
* addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
61
61
|
* as well.
|
|
62
62
|
*/
|
|
63
|
-
|
|
63
|
+
tokenBoundCidrs?: string[];
|
|
64
64
|
/**
|
|
65
65
|
* If set, will encode an
|
|
66
66
|
* [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
67
67
|
* onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
|
|
68
68
|
* `tokenMaxTtl` would otherwise allow a renewal.
|
|
69
69
|
*/
|
|
70
|
-
|
|
70
|
+
tokenExplicitMaxTtl?: number;
|
|
71
71
|
/**
|
|
72
72
|
* The maximum lifetime for generated tokens in number of seconds.
|
|
73
73
|
* Its current value will be referenced at renewal time.
|
|
74
74
|
*/
|
|
75
|
-
|
|
75
|
+
tokenMaxTtl?: number;
|
|
76
76
|
/**
|
|
77
77
|
* If set, the default policy will not be set on
|
|
78
78
|
* generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
79
79
|
*/
|
|
80
|
-
|
|
80
|
+
tokenNoDefaultPolicy?: boolean;
|
|
81
81
|
/**
|
|
82
82
|
* The
|
|
83
83
|
* [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
|
84
84
|
* if any, in number of seconds to set on the token.
|
|
85
85
|
*/
|
|
86
|
-
|
|
86
|
+
tokenNumUses?: number;
|
|
87
87
|
/**
|
|
88
88
|
* (Optional) If set, indicates that the
|
|
89
89
|
* token generated using this role should never expire. The token should be renewed within the
|
|
90
90
|
* duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
91
91
|
* value of this field. Specified in seconds.
|
|
92
92
|
*/
|
|
93
|
-
|
|
93
|
+
tokenPeriod?: number;
|
|
94
94
|
/**
|
|
95
95
|
* List of policies to encode onto generated tokens. Depending
|
|
96
96
|
* on the auth method, this list may be supplemented by user/group/other values.
|
|
97
97
|
*/
|
|
98
|
-
|
|
98
|
+
tokenPolicies?: string[];
|
|
99
99
|
/**
|
|
100
100
|
* The incremental lifetime for generated tokens in number of seconds.
|
|
101
101
|
* Its current value will be referenced at renewal time.
|
|
102
102
|
*/
|
|
103
|
-
|
|
103
|
+
tokenTtl?: number;
|
|
104
104
|
/**
|
|
105
105
|
* The type of token that should be generated. Can be `service`,
|
|
106
106
|
* `batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
@@ -108,11 +108,11 @@ export interface GetAuthBackendRoleArgs {
|
|
|
108
108
|
* `default-service` and `default-batch` which specify the type to return unless the client
|
|
109
109
|
* requests a different type at generation time.
|
|
110
110
|
*/
|
|
111
|
-
|
|
111
|
+
tokenType?: string;
|
|
112
112
|
/**
|
|
113
113
|
* @deprecated use `token_ttl` instead if you are running Vault >= 1.2
|
|
114
114
|
*/
|
|
115
|
-
|
|
115
|
+
ttl?: number;
|
|
116
116
|
}
|
|
117
117
|
/**
|
|
118
118
|
* A collection of values returned by getAuthBackendRole.
|
|
@@ -215,3 +215,100 @@ export interface GetAuthBackendRoleResult {
|
|
|
215
215
|
*/
|
|
216
216
|
readonly ttl?: number;
|
|
217
217
|
}
|
|
218
|
+
export declare function getAuthBackendRoleOutput(args: GetAuthBackendRoleOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetAuthBackendRoleResult>;
|
|
219
|
+
/**
|
|
220
|
+
* A collection of arguments for invoking getAuthBackendRole.
|
|
221
|
+
*/
|
|
222
|
+
export interface GetAuthBackendRoleOutputArgs {
|
|
223
|
+
/**
|
|
224
|
+
* (Optional) Audience claim to verify in the JWT.
|
|
225
|
+
*/
|
|
226
|
+
audience?: pulumi.Input<string>;
|
|
227
|
+
/**
|
|
228
|
+
* The unique name for the Kubernetes backend the role to
|
|
229
|
+
* retrieve Role attributes for resides in. Defaults to "kubernetes".
|
|
230
|
+
*/
|
|
231
|
+
backend?: pulumi.Input<string>;
|
|
232
|
+
/**
|
|
233
|
+
* @deprecated use `token_bound_cidrs` instead if you are running Vault >= 1.2
|
|
234
|
+
*/
|
|
235
|
+
boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
236
|
+
/**
|
|
237
|
+
* @deprecated use `token_max_ttl` instead if you are running Vault >= 1.2
|
|
238
|
+
*/
|
|
239
|
+
maxTtl?: pulumi.Input<number>;
|
|
240
|
+
/**
|
|
241
|
+
* @deprecated use `token_num_uses` instead if you are running Vault >= 1.2
|
|
242
|
+
*/
|
|
243
|
+
numUses?: pulumi.Input<number>;
|
|
244
|
+
/**
|
|
245
|
+
* @deprecated use `token_period` instead if you are running Vault >= 1.2
|
|
246
|
+
*/
|
|
247
|
+
period?: pulumi.Input<number>;
|
|
248
|
+
/**
|
|
249
|
+
* @deprecated use `token_policies` instead if you are running Vault >= 1.2
|
|
250
|
+
*/
|
|
251
|
+
policies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
252
|
+
/**
|
|
253
|
+
* The name of the role to retrieve the Role attributes for.
|
|
254
|
+
*/
|
|
255
|
+
roleName: pulumi.Input<string>;
|
|
256
|
+
/**
|
|
257
|
+
* List of CIDR blocks; if set, specifies blocks of IP
|
|
258
|
+
* addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
259
|
+
* as well.
|
|
260
|
+
*/
|
|
261
|
+
tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
262
|
+
/**
|
|
263
|
+
* If set, will encode an
|
|
264
|
+
* [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
265
|
+
* onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
|
|
266
|
+
* `tokenMaxTtl` would otherwise allow a renewal.
|
|
267
|
+
*/
|
|
268
|
+
tokenExplicitMaxTtl?: pulumi.Input<number>;
|
|
269
|
+
/**
|
|
270
|
+
* The maximum lifetime for generated tokens in number of seconds.
|
|
271
|
+
* Its current value will be referenced at renewal time.
|
|
272
|
+
*/
|
|
273
|
+
tokenMaxTtl?: pulumi.Input<number>;
|
|
274
|
+
/**
|
|
275
|
+
* If set, the default policy will not be set on
|
|
276
|
+
* generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
277
|
+
*/
|
|
278
|
+
tokenNoDefaultPolicy?: pulumi.Input<boolean>;
|
|
279
|
+
/**
|
|
280
|
+
* The
|
|
281
|
+
* [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
|
282
|
+
* if any, in number of seconds to set on the token.
|
|
283
|
+
*/
|
|
284
|
+
tokenNumUses?: pulumi.Input<number>;
|
|
285
|
+
/**
|
|
286
|
+
* (Optional) If set, indicates that the
|
|
287
|
+
* token generated using this role should never expire. The token should be renewed within the
|
|
288
|
+
* duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
289
|
+
* value of this field. Specified in seconds.
|
|
290
|
+
*/
|
|
291
|
+
tokenPeriod?: pulumi.Input<number>;
|
|
292
|
+
/**
|
|
293
|
+
* List of policies to encode onto generated tokens. Depending
|
|
294
|
+
* on the auth method, this list may be supplemented by user/group/other values.
|
|
295
|
+
*/
|
|
296
|
+
tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
297
|
+
/**
|
|
298
|
+
* The incremental lifetime for generated tokens in number of seconds.
|
|
299
|
+
* Its current value will be referenced at renewal time.
|
|
300
|
+
*/
|
|
301
|
+
tokenTtl?: pulumi.Input<number>;
|
|
302
|
+
/**
|
|
303
|
+
* The type of token that should be generated. Can be `service`,
|
|
304
|
+
* `batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
305
|
+
* `service` tokens). For token store roles, there are two additional possibilities:
|
|
306
|
+
* `default-service` and `default-batch` which specify the type to return unless the client
|
|
307
|
+
* requests a different type at generation time.
|
|
308
|
+
*/
|
|
309
|
+
tokenType?: pulumi.Input<string>;
|
|
310
|
+
/**
|
|
311
|
+
* @deprecated use `token_ttl` instead if you are running Vault >= 1.2
|
|
312
|
+
*/
|
|
313
|
+
ttl?: pulumi.Input<number>;
|
|
314
|
+
}
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getAuthBackendRoleOutput = exports.getAuthBackendRole = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
/**
|
|
@@ -51,4 +52,8 @@ function getAuthBackendRole(args, opts) {
|
|
|
51
52
|
}, opts);
|
|
52
53
|
}
|
|
53
54
|
exports.getAuthBackendRole = getAuthBackendRole;
|
|
55
|
+
function getAuthBackendRoleOutput(args, opts) {
|
|
56
|
+
return pulumi.output(args).apply(a => getAuthBackendRole(a, opts));
|
|
57
|
+
}
|
|
58
|
+
exports.getAuthBackendRoleOutput = getAuthBackendRoleOutput;
|
|
54
59
|
//# sourceMappingURL=getAuthBackendRole.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getAuthBackendRole.js","sourceRoot":"","sources":["../../kubernetes/getAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"getAuthBackendRole.js","sourceRoot":"","sources":["../../kubernetes/getAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;GAiBG;AACH,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,iBAAiB,EAAE,IAAI,CAAC,eAAe;QACvC,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,KAAK,EAAE,IAAI,CAAC,GAAG;KAClB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AA5BD,gDA4BC;AAyMD,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
|