pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -40,32 +45,15 @@ class AuthBackendRoleArgs:
|
|
40
45
|
The value should not contain leading or trailing forward slashes.
|
41
46
|
The `namespace` is always relative to the provider's configured namespace.
|
42
47
|
*Available only for Vault Enterprise*.
|
43
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
44
|
-
|
45
|
-
|
46
|
-
:param pulumi.Input[
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
:param pulumi.Input[int]
|
51
|
-
|
52
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
53
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
54
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
55
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
56
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
57
|
-
token generated using this role should never expire. The token should be renewed within the
|
58
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
59
|
-
value of this field. Specified in seconds.
|
60
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
61
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
62
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
63
|
-
Its current value will be referenced at renewal time.
|
64
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
65
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
66
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
67
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
68
|
-
requests a different type at generation time.
|
48
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
49
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
50
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
51
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
52
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
53
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
54
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
55
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
56
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
69
57
|
"""
|
70
58
|
pulumi.set(__self__, "arn", arn)
|
71
59
|
pulumi.set(__self__, "role", role)
|
@@ -151,9 +139,7 @@ class AuthBackendRoleArgs:
|
|
151
139
|
@pulumi.getter(name="tokenBoundCidrs")
|
152
140
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
153
141
|
"""
|
154
|
-
|
155
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
156
|
-
as well.
|
142
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
157
143
|
"""
|
158
144
|
return pulumi.get(self, "token_bound_cidrs")
|
159
145
|
|
@@ -165,10 +151,7 @@ class AuthBackendRoleArgs:
|
|
165
151
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
166
152
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
167
153
|
"""
|
168
|
-
|
169
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
170
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
171
|
-
`token_max_ttl` would otherwise allow a renewal.
|
154
|
+
Generated Token's Explicit Maximum TTL in seconds
|
172
155
|
"""
|
173
156
|
return pulumi.get(self, "token_explicit_max_ttl")
|
174
157
|
|
@@ -180,8 +163,7 @@ class AuthBackendRoleArgs:
|
|
180
163
|
@pulumi.getter(name="tokenMaxTtl")
|
181
164
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
182
165
|
"""
|
183
|
-
The maximum lifetime
|
184
|
-
Its current value will be referenced at renewal time.
|
166
|
+
The maximum lifetime of the generated token
|
185
167
|
"""
|
186
168
|
return pulumi.get(self, "token_max_ttl")
|
187
169
|
|
@@ -193,8 +175,7 @@ class AuthBackendRoleArgs:
|
|
193
175
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
194
176
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
195
177
|
"""
|
196
|
-
If
|
197
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
178
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
198
179
|
"""
|
199
180
|
return pulumi.get(self, "token_no_default_policy")
|
200
181
|
|
@@ -206,8 +187,7 @@ class AuthBackendRoleArgs:
|
|
206
187
|
@pulumi.getter(name="tokenNumUses")
|
207
188
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
208
189
|
"""
|
209
|
-
The
|
210
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
190
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
211
191
|
"""
|
212
192
|
return pulumi.get(self, "token_num_uses")
|
213
193
|
|
@@ -219,10 +199,7 @@ class AuthBackendRoleArgs:
|
|
219
199
|
@pulumi.getter(name="tokenPeriod")
|
220
200
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
221
201
|
"""
|
222
|
-
|
223
|
-
token generated using this role should never expire. The token should be renewed within the
|
224
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
225
|
-
value of this field. Specified in seconds.
|
202
|
+
Generated Token's Period
|
226
203
|
"""
|
227
204
|
return pulumi.get(self, "token_period")
|
228
205
|
|
@@ -234,8 +211,7 @@ class AuthBackendRoleArgs:
|
|
234
211
|
@pulumi.getter(name="tokenPolicies")
|
235
212
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
236
213
|
"""
|
237
|
-
|
238
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
214
|
+
Generated Token's Policies
|
239
215
|
"""
|
240
216
|
return pulumi.get(self, "token_policies")
|
241
217
|
|
@@ -247,8 +223,7 @@ class AuthBackendRoleArgs:
|
|
247
223
|
@pulumi.getter(name="tokenTtl")
|
248
224
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
249
225
|
"""
|
250
|
-
The
|
251
|
-
Its current value will be referenced at renewal time.
|
226
|
+
The initial ttl of the token to generate in seconds
|
252
227
|
"""
|
253
228
|
return pulumi.get(self, "token_ttl")
|
254
229
|
|
@@ -260,11 +235,7 @@ class AuthBackendRoleArgs:
|
|
260
235
|
@pulumi.getter(name="tokenType")
|
261
236
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
262
237
|
"""
|
263
|
-
The type of token
|
264
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
265
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
266
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
267
|
-
requests a different type at generation time.
|
238
|
+
The type of token to generate, service or batch
|
268
239
|
"""
|
269
240
|
return pulumi.get(self, "token_type")
|
270
241
|
|
@@ -302,32 +273,15 @@ class _AuthBackendRoleState:
|
|
302
273
|
*Available only for Vault Enterprise*.
|
303
274
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
304
275
|
the role reflected in the arn.
|
305
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
306
|
-
|
307
|
-
|
308
|
-
:param pulumi.Input[
|
309
|
-
|
310
|
-
|
311
|
-
|
312
|
-
:param pulumi.Input[int]
|
313
|
-
|
314
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
315
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
316
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
317
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
318
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
319
|
-
token generated using this role should never expire. The token should be renewed within the
|
320
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
321
|
-
value of this field. Specified in seconds.
|
322
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
323
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
324
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
325
|
-
Its current value will be referenced at renewal time.
|
326
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
327
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
328
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
329
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
330
|
-
requests a different type at generation time.
|
276
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
277
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
278
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
279
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
280
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
281
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
282
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
283
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
284
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
331
285
|
"""
|
332
286
|
if arn is not None:
|
333
287
|
pulumi.set(__self__, "arn", arn)
|
@@ -415,9 +369,7 @@ class _AuthBackendRoleState:
|
|
415
369
|
@pulumi.getter(name="tokenBoundCidrs")
|
416
370
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
417
371
|
"""
|
418
|
-
|
419
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
420
|
-
as well.
|
372
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
421
373
|
"""
|
422
374
|
return pulumi.get(self, "token_bound_cidrs")
|
423
375
|
|
@@ -429,10 +381,7 @@ class _AuthBackendRoleState:
|
|
429
381
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
430
382
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
431
383
|
"""
|
432
|
-
|
433
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
434
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
435
|
-
`token_max_ttl` would otherwise allow a renewal.
|
384
|
+
Generated Token's Explicit Maximum TTL in seconds
|
436
385
|
"""
|
437
386
|
return pulumi.get(self, "token_explicit_max_ttl")
|
438
387
|
|
@@ -444,8 +393,7 @@ class _AuthBackendRoleState:
|
|
444
393
|
@pulumi.getter(name="tokenMaxTtl")
|
445
394
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
446
395
|
"""
|
447
|
-
The maximum lifetime
|
448
|
-
Its current value will be referenced at renewal time.
|
396
|
+
The maximum lifetime of the generated token
|
449
397
|
"""
|
450
398
|
return pulumi.get(self, "token_max_ttl")
|
451
399
|
|
@@ -457,8 +405,7 @@ class _AuthBackendRoleState:
|
|
457
405
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
458
406
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
459
407
|
"""
|
460
|
-
If
|
461
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
408
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
462
409
|
"""
|
463
410
|
return pulumi.get(self, "token_no_default_policy")
|
464
411
|
|
@@ -470,8 +417,7 @@ class _AuthBackendRoleState:
|
|
470
417
|
@pulumi.getter(name="tokenNumUses")
|
471
418
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
472
419
|
"""
|
473
|
-
The
|
474
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
420
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
475
421
|
"""
|
476
422
|
return pulumi.get(self, "token_num_uses")
|
477
423
|
|
@@ -483,10 +429,7 @@ class _AuthBackendRoleState:
|
|
483
429
|
@pulumi.getter(name="tokenPeriod")
|
484
430
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
485
431
|
"""
|
486
|
-
|
487
|
-
token generated using this role should never expire. The token should be renewed within the
|
488
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
489
|
-
value of this field. Specified in seconds.
|
432
|
+
Generated Token's Period
|
490
433
|
"""
|
491
434
|
return pulumi.get(self, "token_period")
|
492
435
|
|
@@ -498,8 +441,7 @@ class _AuthBackendRoleState:
|
|
498
441
|
@pulumi.getter(name="tokenPolicies")
|
499
442
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
500
443
|
"""
|
501
|
-
|
502
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
444
|
+
Generated Token's Policies
|
503
445
|
"""
|
504
446
|
return pulumi.get(self, "token_policies")
|
505
447
|
|
@@ -511,8 +453,7 @@ class _AuthBackendRoleState:
|
|
511
453
|
@pulumi.getter(name="tokenTtl")
|
512
454
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
513
455
|
"""
|
514
|
-
The
|
515
|
-
Its current value will be referenced at renewal time.
|
456
|
+
The initial ttl of the token to generate in seconds
|
516
457
|
"""
|
517
458
|
return pulumi.get(self, "token_ttl")
|
518
459
|
|
@@ -524,11 +465,7 @@ class _AuthBackendRoleState:
|
|
524
465
|
@pulumi.getter(name="tokenType")
|
525
466
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
526
467
|
"""
|
527
|
-
The type of token
|
528
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
529
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
530
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
531
|
-
requests a different type at generation time.
|
468
|
+
The type of token to generate, service or batch
|
532
469
|
"""
|
533
470
|
return pulumi.get(self, "token_type")
|
534
471
|
|
@@ -565,11 +502,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
565
502
|
import pulumi
|
566
503
|
import pulumi_vault as vault
|
567
504
|
|
568
|
-
|
505
|
+
alicloud = vault.AuthBackend("alicloud",
|
569
506
|
type="alicloud",
|
570
507
|
path="alicloud")
|
571
|
-
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("
|
572
|
-
backend=
|
508
|
+
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
|
509
|
+
backend=alicloud.path,
|
573
510
|
role="example",
|
574
511
|
arn="acs:ram:123456:tf:role/foobar")
|
575
512
|
```
|
@@ -579,7 +516,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
579
516
|
Alicloud authentication roles can be imported using the `path`, e.g.
|
580
517
|
|
581
518
|
```sh
|
582
|
-
|
519
|
+
$ pulumi import vault:alicloud/authBackendRole:AuthBackendRole my_role auth/alicloud/role/my_role
|
583
520
|
```
|
584
521
|
|
585
522
|
:param str resource_name: The name of the resource.
|
@@ -595,32 +532,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
595
532
|
*Available only for Vault Enterprise*.
|
596
533
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
597
534
|
the role reflected in the arn.
|
598
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
599
|
-
|
600
|
-
|
601
|
-
:param pulumi.Input[
|
602
|
-
|
603
|
-
|
604
|
-
|
605
|
-
:param pulumi.Input[int]
|
606
|
-
|
607
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
608
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
609
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
610
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
611
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
612
|
-
token generated using this role should never expire. The token should be renewed within the
|
613
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
614
|
-
value of this field. Specified in seconds.
|
615
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
616
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
617
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
618
|
-
Its current value will be referenced at renewal time.
|
619
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
620
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
621
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
622
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
623
|
-
requests a different type at generation time.
|
535
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
536
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
537
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
538
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
539
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
540
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
541
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
542
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
543
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
624
544
|
"""
|
625
545
|
...
|
626
546
|
@overload
|
@@ -637,11 +557,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
637
557
|
import pulumi
|
638
558
|
import pulumi_vault as vault
|
639
559
|
|
640
|
-
|
560
|
+
alicloud = vault.AuthBackend("alicloud",
|
641
561
|
type="alicloud",
|
642
562
|
path="alicloud")
|
643
|
-
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("
|
644
|
-
backend=
|
563
|
+
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
|
564
|
+
backend=alicloud.path,
|
645
565
|
role="example",
|
646
566
|
arn="acs:ram:123456:tf:role/foobar")
|
647
567
|
```
|
@@ -651,7 +571,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
651
571
|
Alicloud authentication roles can be imported using the `path`, e.g.
|
652
572
|
|
653
573
|
```sh
|
654
|
-
|
574
|
+
$ pulumi import vault:alicloud/authBackendRole:AuthBackendRole my_role auth/alicloud/role/my_role
|
655
575
|
```
|
656
576
|
|
657
577
|
:param str resource_name: The name of the resource.
|
@@ -749,32 +669,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
749
669
|
*Available only for Vault Enterprise*.
|
750
670
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
751
671
|
the role reflected in the arn.
|
752
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
753
|
-
|
754
|
-
|
755
|
-
:param pulumi.Input[
|
756
|
-
|
757
|
-
|
758
|
-
|
759
|
-
:param pulumi.Input[int]
|
760
|
-
|
761
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
762
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
763
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
764
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
765
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
766
|
-
token generated using this role should never expire. The token should be renewed within the
|
767
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
768
|
-
value of this field. Specified in seconds.
|
769
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
770
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
771
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
772
|
-
Its current value will be referenced at renewal time.
|
773
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
774
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
775
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
776
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
777
|
-
requests a different type at generation time.
|
672
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
673
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
674
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
675
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
676
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
677
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
678
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
679
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
680
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
778
681
|
"""
|
779
682
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
780
683
|
|
@@ -838,9 +741,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
838
741
|
@pulumi.getter(name="tokenBoundCidrs")
|
839
742
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
840
743
|
"""
|
841
|
-
|
842
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
843
|
-
as well.
|
744
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
844
745
|
"""
|
845
746
|
return pulumi.get(self, "token_bound_cidrs")
|
846
747
|
|
@@ -848,10 +749,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
848
749
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
849
750
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
850
751
|
"""
|
851
|
-
|
852
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
853
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
854
|
-
`token_max_ttl` would otherwise allow a renewal.
|
752
|
+
Generated Token's Explicit Maximum TTL in seconds
|
855
753
|
"""
|
856
754
|
return pulumi.get(self, "token_explicit_max_ttl")
|
857
755
|
|
@@ -859,8 +757,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
859
757
|
@pulumi.getter(name="tokenMaxTtl")
|
860
758
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
861
759
|
"""
|
862
|
-
The maximum lifetime
|
863
|
-
Its current value will be referenced at renewal time.
|
760
|
+
The maximum lifetime of the generated token
|
864
761
|
"""
|
865
762
|
return pulumi.get(self, "token_max_ttl")
|
866
763
|
|
@@ -868,8 +765,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
868
765
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
869
766
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
870
767
|
"""
|
871
|
-
If
|
872
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
768
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
873
769
|
"""
|
874
770
|
return pulumi.get(self, "token_no_default_policy")
|
875
771
|
|
@@ -877,8 +773,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
877
773
|
@pulumi.getter(name="tokenNumUses")
|
878
774
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
879
775
|
"""
|
880
|
-
The
|
881
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
776
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
882
777
|
"""
|
883
778
|
return pulumi.get(self, "token_num_uses")
|
884
779
|
|
@@ -886,10 +781,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
886
781
|
@pulumi.getter(name="tokenPeriod")
|
887
782
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
888
783
|
"""
|
889
|
-
|
890
|
-
token generated using this role should never expire. The token should be renewed within the
|
891
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
892
|
-
value of this field. Specified in seconds.
|
784
|
+
Generated Token's Period
|
893
785
|
"""
|
894
786
|
return pulumi.get(self, "token_period")
|
895
787
|
|
@@ -897,8 +789,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
897
789
|
@pulumi.getter(name="tokenPolicies")
|
898
790
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
899
791
|
"""
|
900
|
-
|
901
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
792
|
+
Generated Token's Policies
|
902
793
|
"""
|
903
794
|
return pulumi.get(self, "token_policies")
|
904
795
|
|
@@ -906,8 +797,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
906
797
|
@pulumi.getter(name="tokenTtl")
|
907
798
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
908
799
|
"""
|
909
|
-
The
|
910
|
-
Its current value will be referenced at renewal time.
|
800
|
+
The initial ttl of the token to generate in seconds
|
911
801
|
"""
|
912
802
|
return pulumi.get(self, "token_ttl")
|
913
803
|
|
@@ -915,11 +805,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
915
805
|
@pulumi.getter(name="tokenType")
|
916
806
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
917
807
|
"""
|
918
|
-
The type of token
|
919
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
920
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
921
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
922
|
-
requests a different type at generation time.
|
808
|
+
The type of token to generate, service or batch
|
923
809
|
"""
|
924
810
|
return pulumi.get(self, "token_type")
|
925
811
|
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
|
@@ -24,7 +29,7 @@ class AuthBackendLoginArgs:
|
|
24
29
|
:param pulumi.Input[str] backend: The unique path of the Vault backend to log in with.
|
25
30
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
26
31
|
The value should not contain leading or trailing forward slashes.
|
27
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
32
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
28
33
|
*Available only for Vault Enterprise*.
|
29
34
|
:param pulumi.Input[str] secret_id: The secret ID of the role to log in with. Required
|
30
35
|
unless `bind_secret_id` is set to false on the role.
|
@@ -67,7 +72,7 @@ class AuthBackendLoginArgs:
|
|
67
72
|
"""
|
68
73
|
The namespace to provision the resource in.
|
69
74
|
The value should not contain leading or trailing forward slashes.
|
70
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
75
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
71
76
|
*Available only for Vault Enterprise*.
|
72
77
|
"""
|
73
78
|
return pulumi.get(self, "namespace")
|
@@ -114,7 +119,7 @@ class _AuthBackendLoginState:
|
|
114
119
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: The metadata associated with the token.
|
115
120
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
116
121
|
The value should not contain leading or trailing forward slashes.
|
117
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
122
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
118
123
|
*Available only for Vault Enterprise*.
|
119
124
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies applied to the token.
|
120
125
|
:param pulumi.Input[bool] renewable: Whether the token is renewable or not.
|
@@ -223,7 +228,7 @@ class _AuthBackendLoginState:
|
|
223
228
|
"""
|
224
229
|
The namespace to provision the resource in.
|
225
230
|
The value should not contain leading or trailing forward slashes.
|
226
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
231
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
227
232
|
*Available only for Vault Enterprise*.
|
228
233
|
"""
|
229
234
|
return pulumi.get(self, "namespace")
|
@@ -326,7 +331,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
326
331
|
:param pulumi.Input[str] backend: The unique path of the Vault backend to log in with.
|
327
332
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
328
333
|
The value should not contain leading or trailing forward slashes.
|
329
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
334
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
330
335
|
*Available only for Vault Enterprise*.
|
331
336
|
:param pulumi.Input[str] role_id: The ID of the role to log in with.
|
332
337
|
:param pulumi.Input[str] secret_id: The secret ID of the role to log in with. Required
|
@@ -446,7 +451,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
446
451
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: The metadata associated with the token.
|
447
452
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
448
453
|
The value should not contain leading or trailing forward slashes.
|
449
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
454
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
450
455
|
*Available only for Vault Enterprise*.
|
451
456
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies applied to the token.
|
452
457
|
:param pulumi.Input[bool] renewable: Whether the token is renewable or not.
|
@@ -525,7 +530,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
525
530
|
"""
|
526
531
|
The namespace to provision the resource in.
|
527
532
|
The value should not contain leading or trailing forward slashes.
|
528
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
533
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
529
534
|
*Available only for Vault Enterprise*.
|
530
535
|
"""
|
531
536
|
return pulumi.get(self, "namespace")
|