pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
@@ -40,32 +45,15 @@ class AuthBackendRoleArgs:
|
|
40
45
|
The value should not contain leading or trailing forward slashes.
|
41
46
|
The `namespace` is always relative to the provider's configured namespace.
|
42
47
|
*Available only for Vault Enterprise*.
|
43
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
44
|
-
|
45
|
-
|
46
|
-
:param pulumi.Input[
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
:param pulumi.Input[int]
|
51
|
-
|
52
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
53
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
54
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
55
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
56
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
57
|
-
token generated using this role should never expire. The token should be renewed within the
|
58
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
59
|
-
value of this field. Specified in seconds.
|
60
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
61
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
62
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
63
|
-
Its current value will be referenced at renewal time.
|
64
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
65
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
66
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
67
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
68
|
-
requests a different type at generation time.
|
48
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
49
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
50
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
51
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
52
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
53
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
54
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
55
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
56
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
69
57
|
"""
|
70
58
|
pulumi.set(__self__, "arn", arn)
|
71
59
|
pulumi.set(__self__, "role", role)
|
@@ -151,9 +139,7 @@ class AuthBackendRoleArgs:
|
|
151
139
|
@pulumi.getter(name="tokenBoundCidrs")
|
152
140
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
153
141
|
"""
|
154
|
-
|
155
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
156
|
-
as well.
|
142
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
157
143
|
"""
|
158
144
|
return pulumi.get(self, "token_bound_cidrs")
|
159
145
|
|
@@ -165,10 +151,7 @@ class AuthBackendRoleArgs:
|
|
165
151
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
166
152
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
167
153
|
"""
|
168
|
-
|
169
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
170
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
171
|
-
`token_max_ttl` would otherwise allow a renewal.
|
154
|
+
Generated Token's Explicit Maximum TTL in seconds
|
172
155
|
"""
|
173
156
|
return pulumi.get(self, "token_explicit_max_ttl")
|
174
157
|
|
@@ -180,8 +163,7 @@ class AuthBackendRoleArgs:
|
|
180
163
|
@pulumi.getter(name="tokenMaxTtl")
|
181
164
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
182
165
|
"""
|
183
|
-
The maximum lifetime
|
184
|
-
Its current value will be referenced at renewal time.
|
166
|
+
The maximum lifetime of the generated token
|
185
167
|
"""
|
186
168
|
return pulumi.get(self, "token_max_ttl")
|
187
169
|
|
@@ -193,8 +175,7 @@ class AuthBackendRoleArgs:
|
|
193
175
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
194
176
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
195
177
|
"""
|
196
|
-
If
|
197
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
178
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
198
179
|
"""
|
199
180
|
return pulumi.get(self, "token_no_default_policy")
|
200
181
|
|
@@ -206,8 +187,7 @@ class AuthBackendRoleArgs:
|
|
206
187
|
@pulumi.getter(name="tokenNumUses")
|
207
188
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
208
189
|
"""
|
209
|
-
The
|
210
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
190
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
211
191
|
"""
|
212
192
|
return pulumi.get(self, "token_num_uses")
|
213
193
|
|
@@ -219,10 +199,7 @@ class AuthBackendRoleArgs:
|
|
219
199
|
@pulumi.getter(name="tokenPeriod")
|
220
200
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
221
201
|
"""
|
222
|
-
|
223
|
-
token generated using this role should never expire. The token should be renewed within the
|
224
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
225
|
-
value of this field. Specified in seconds.
|
202
|
+
Generated Token's Period
|
226
203
|
"""
|
227
204
|
return pulumi.get(self, "token_period")
|
228
205
|
|
@@ -234,8 +211,7 @@ class AuthBackendRoleArgs:
|
|
234
211
|
@pulumi.getter(name="tokenPolicies")
|
235
212
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
236
213
|
"""
|
237
|
-
|
238
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
214
|
+
Generated Token's Policies
|
239
215
|
"""
|
240
216
|
return pulumi.get(self, "token_policies")
|
241
217
|
|
@@ -247,8 +223,7 @@ class AuthBackendRoleArgs:
|
|
247
223
|
@pulumi.getter(name="tokenTtl")
|
248
224
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
249
225
|
"""
|
250
|
-
The
|
251
|
-
Its current value will be referenced at renewal time.
|
226
|
+
The initial ttl of the token to generate in seconds
|
252
227
|
"""
|
253
228
|
return pulumi.get(self, "token_ttl")
|
254
229
|
|
@@ -260,11 +235,7 @@ class AuthBackendRoleArgs:
|
|
260
235
|
@pulumi.getter(name="tokenType")
|
261
236
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
262
237
|
"""
|
263
|
-
The type of token
|
264
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
265
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
266
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
267
|
-
requests a different type at generation time.
|
238
|
+
The type of token to generate, service or batch
|
268
239
|
"""
|
269
240
|
return pulumi.get(self, "token_type")
|
270
241
|
|
@@ -302,32 +273,15 @@ class _AuthBackendRoleState:
|
|
302
273
|
*Available only for Vault Enterprise*.
|
303
274
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
304
275
|
the role reflected in the arn.
|
305
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
306
|
-
|
307
|
-
|
308
|
-
:param pulumi.Input[
|
309
|
-
|
310
|
-
|
311
|
-
|
312
|
-
:param pulumi.Input[int]
|
313
|
-
|
314
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
315
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
316
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
317
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
318
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
319
|
-
token generated using this role should never expire. The token should be renewed within the
|
320
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
321
|
-
value of this field. Specified in seconds.
|
322
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
323
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
324
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
325
|
-
Its current value will be referenced at renewal time.
|
326
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
327
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
328
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
329
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
330
|
-
requests a different type at generation time.
|
276
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
277
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
278
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
279
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
280
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
281
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
282
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
283
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
284
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
331
285
|
"""
|
332
286
|
if arn is not None:
|
333
287
|
pulumi.set(__self__, "arn", arn)
|
@@ -415,9 +369,7 @@ class _AuthBackendRoleState:
|
|
415
369
|
@pulumi.getter(name="tokenBoundCidrs")
|
416
370
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
417
371
|
"""
|
418
|
-
|
419
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
420
|
-
as well.
|
372
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
421
373
|
"""
|
422
374
|
return pulumi.get(self, "token_bound_cidrs")
|
423
375
|
|
@@ -429,10 +381,7 @@ class _AuthBackendRoleState:
|
|
429
381
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
430
382
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
431
383
|
"""
|
432
|
-
|
433
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
434
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
435
|
-
`token_max_ttl` would otherwise allow a renewal.
|
384
|
+
Generated Token's Explicit Maximum TTL in seconds
|
436
385
|
"""
|
437
386
|
return pulumi.get(self, "token_explicit_max_ttl")
|
438
387
|
|
@@ -444,8 +393,7 @@ class _AuthBackendRoleState:
|
|
444
393
|
@pulumi.getter(name="tokenMaxTtl")
|
445
394
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
446
395
|
"""
|
447
|
-
The maximum lifetime
|
448
|
-
Its current value will be referenced at renewal time.
|
396
|
+
The maximum lifetime of the generated token
|
449
397
|
"""
|
450
398
|
return pulumi.get(self, "token_max_ttl")
|
451
399
|
|
@@ -457,8 +405,7 @@ class _AuthBackendRoleState:
|
|
457
405
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
458
406
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
459
407
|
"""
|
460
|
-
If
|
461
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
408
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
462
409
|
"""
|
463
410
|
return pulumi.get(self, "token_no_default_policy")
|
464
411
|
|
@@ -470,8 +417,7 @@ class _AuthBackendRoleState:
|
|
470
417
|
@pulumi.getter(name="tokenNumUses")
|
471
418
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
472
419
|
"""
|
473
|
-
The
|
474
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
420
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
475
421
|
"""
|
476
422
|
return pulumi.get(self, "token_num_uses")
|
477
423
|
|
@@ -483,10 +429,7 @@ class _AuthBackendRoleState:
|
|
483
429
|
@pulumi.getter(name="tokenPeriod")
|
484
430
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
485
431
|
"""
|
486
|
-
|
487
|
-
token generated using this role should never expire. The token should be renewed within the
|
488
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
489
|
-
value of this field. Specified in seconds.
|
432
|
+
Generated Token's Period
|
490
433
|
"""
|
491
434
|
return pulumi.get(self, "token_period")
|
492
435
|
|
@@ -498,8 +441,7 @@ class _AuthBackendRoleState:
|
|
498
441
|
@pulumi.getter(name="tokenPolicies")
|
499
442
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
500
443
|
"""
|
501
|
-
|
502
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
444
|
+
Generated Token's Policies
|
503
445
|
"""
|
504
446
|
return pulumi.get(self, "token_policies")
|
505
447
|
|
@@ -511,8 +453,7 @@ class _AuthBackendRoleState:
|
|
511
453
|
@pulumi.getter(name="tokenTtl")
|
512
454
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
513
455
|
"""
|
514
|
-
The
|
515
|
-
Its current value will be referenced at renewal time.
|
456
|
+
The initial ttl of the token to generate in seconds
|
516
457
|
"""
|
517
458
|
return pulumi.get(self, "token_ttl")
|
518
459
|
|
@@ -524,11 +465,7 @@ class _AuthBackendRoleState:
|
|
524
465
|
@pulumi.getter(name="tokenType")
|
525
466
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
526
467
|
"""
|
527
|
-
The type of token
|
528
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
529
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
530
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
531
|
-
requests a different type at generation time.
|
468
|
+
The type of token to generate, service or batch
|
532
469
|
"""
|
533
470
|
return pulumi.get(self, "token_type")
|
534
471
|
|
@@ -561,20 +498,18 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
561
498
|
|
562
499
|
## Example Usage
|
563
500
|
|
564
|
-
<!--Start PulumiCodeChooser -->
|
565
501
|
```python
|
566
502
|
import pulumi
|
567
503
|
import pulumi_vault as vault
|
568
504
|
|
569
|
-
|
505
|
+
alicloud = vault.AuthBackend("alicloud",
|
570
506
|
type="alicloud",
|
571
507
|
path="alicloud")
|
572
|
-
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("
|
573
|
-
backend=
|
508
|
+
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
|
509
|
+
backend=alicloud.path,
|
574
510
|
role="example",
|
575
511
|
arn="acs:ram:123456:tf:role/foobar")
|
576
512
|
```
|
577
|
-
<!--End PulumiCodeChooser -->
|
578
513
|
|
579
514
|
## Import
|
580
515
|
|
@@ -597,32 +532,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
597
532
|
*Available only for Vault Enterprise*.
|
598
533
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
599
534
|
the role reflected in the arn.
|
600
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
601
|
-
|
602
|
-
|
603
|
-
:param pulumi.Input[
|
604
|
-
|
605
|
-
|
606
|
-
|
607
|
-
:param pulumi.Input[int]
|
608
|
-
|
609
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
610
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
611
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
612
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
613
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
614
|
-
token generated using this role should never expire. The token should be renewed within the
|
615
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
616
|
-
value of this field. Specified in seconds.
|
617
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
618
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
619
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
620
|
-
Its current value will be referenced at renewal time.
|
621
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
622
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
623
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
624
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
625
|
-
requests a different type at generation time.
|
535
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
536
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
537
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
538
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
539
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
540
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
541
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
542
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
543
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
626
544
|
"""
|
627
545
|
...
|
628
546
|
@overload
|
@@ -635,20 +553,18 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
635
553
|
|
636
554
|
## Example Usage
|
637
555
|
|
638
|
-
<!--Start PulumiCodeChooser -->
|
639
556
|
```python
|
640
557
|
import pulumi
|
641
558
|
import pulumi_vault as vault
|
642
559
|
|
643
|
-
|
560
|
+
alicloud = vault.AuthBackend("alicloud",
|
644
561
|
type="alicloud",
|
645
562
|
path="alicloud")
|
646
|
-
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("
|
647
|
-
backend=
|
563
|
+
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
|
564
|
+
backend=alicloud.path,
|
648
565
|
role="example",
|
649
566
|
arn="acs:ram:123456:tf:role/foobar")
|
650
567
|
```
|
651
|
-
<!--End PulumiCodeChooser -->
|
652
568
|
|
653
569
|
## Import
|
654
570
|
|
@@ -753,32 +669,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
753
669
|
*Available only for Vault Enterprise*.
|
754
670
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
755
671
|
the role reflected in the arn.
|
756
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
757
|
-
|
758
|
-
|
759
|
-
:param pulumi.Input[
|
760
|
-
|
761
|
-
|
762
|
-
|
763
|
-
:param pulumi.Input[int]
|
764
|
-
|
765
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
766
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
767
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
768
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
769
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
770
|
-
token generated using this role should never expire. The token should be renewed within the
|
771
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
772
|
-
value of this field. Specified in seconds.
|
773
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
774
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
775
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
776
|
-
Its current value will be referenced at renewal time.
|
777
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
778
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
779
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
780
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
781
|
-
requests a different type at generation time.
|
672
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
673
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
674
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
675
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
676
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
677
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
678
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
679
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
680
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
782
681
|
"""
|
783
682
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
784
683
|
|
@@ -842,9 +741,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
842
741
|
@pulumi.getter(name="tokenBoundCidrs")
|
843
742
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
844
743
|
"""
|
845
|
-
|
846
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
847
|
-
as well.
|
744
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
848
745
|
"""
|
849
746
|
return pulumi.get(self, "token_bound_cidrs")
|
850
747
|
|
@@ -852,10 +749,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
852
749
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
853
750
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
854
751
|
"""
|
855
|
-
|
856
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
857
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
858
|
-
`token_max_ttl` would otherwise allow a renewal.
|
752
|
+
Generated Token's Explicit Maximum TTL in seconds
|
859
753
|
"""
|
860
754
|
return pulumi.get(self, "token_explicit_max_ttl")
|
861
755
|
|
@@ -863,8 +757,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
863
757
|
@pulumi.getter(name="tokenMaxTtl")
|
864
758
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
865
759
|
"""
|
866
|
-
The maximum lifetime
|
867
|
-
Its current value will be referenced at renewal time.
|
760
|
+
The maximum lifetime of the generated token
|
868
761
|
"""
|
869
762
|
return pulumi.get(self, "token_max_ttl")
|
870
763
|
|
@@ -872,8 +765,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
872
765
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
873
766
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
874
767
|
"""
|
875
|
-
If
|
876
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
768
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
877
769
|
"""
|
878
770
|
return pulumi.get(self, "token_no_default_policy")
|
879
771
|
|
@@ -881,8 +773,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
881
773
|
@pulumi.getter(name="tokenNumUses")
|
882
774
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
883
775
|
"""
|
884
|
-
The
|
885
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
776
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
886
777
|
"""
|
887
778
|
return pulumi.get(self, "token_num_uses")
|
888
779
|
|
@@ -890,10 +781,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
890
781
|
@pulumi.getter(name="tokenPeriod")
|
891
782
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
892
783
|
"""
|
893
|
-
|
894
|
-
token generated using this role should never expire. The token should be renewed within the
|
895
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
896
|
-
value of this field. Specified in seconds.
|
784
|
+
Generated Token's Period
|
897
785
|
"""
|
898
786
|
return pulumi.get(self, "token_period")
|
899
787
|
|
@@ -901,8 +789,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
901
789
|
@pulumi.getter(name="tokenPolicies")
|
902
790
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
903
791
|
"""
|
904
|
-
|
905
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
792
|
+
Generated Token's Policies
|
906
793
|
"""
|
907
794
|
return pulumi.get(self, "token_policies")
|
908
795
|
|
@@ -910,8 +797,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
910
797
|
@pulumi.getter(name="tokenTtl")
|
911
798
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
912
799
|
"""
|
913
|
-
The
|
914
|
-
Its current value will be referenced at renewal time.
|
800
|
+
The initial ttl of the token to generate in seconds
|
915
801
|
"""
|
916
802
|
return pulumi.get(self, "token_ttl")
|
917
803
|
|
@@ -919,11 +805,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
919
805
|
@pulumi.getter(name="tokenType")
|
920
806
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
921
807
|
"""
|
922
|
-
The type of token
|
923
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
924
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
925
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
926
|
-
requests a different type at generation time.
|
808
|
+
The type of token to generate, service or batch
|
927
809
|
"""
|
928
810
|
return pulumi.get(self, "token_type")
|
929
811
|
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
|
@@ -24,7 +29,7 @@ class AuthBackendLoginArgs:
|
|
24
29
|
:param pulumi.Input[str] backend: The unique path of the Vault backend to log in with.
|
25
30
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
26
31
|
The value should not contain leading or trailing forward slashes.
|
27
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
32
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
28
33
|
*Available only for Vault Enterprise*.
|
29
34
|
:param pulumi.Input[str] secret_id: The secret ID of the role to log in with. Required
|
30
35
|
unless `bind_secret_id` is set to false on the role.
|
@@ -67,7 +72,7 @@ class AuthBackendLoginArgs:
|
|
67
72
|
"""
|
68
73
|
The namespace to provision the resource in.
|
69
74
|
The value should not contain leading or trailing forward slashes.
|
70
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
75
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
71
76
|
*Available only for Vault Enterprise*.
|
72
77
|
"""
|
73
78
|
return pulumi.get(self, "namespace")
|
@@ -114,7 +119,7 @@ class _AuthBackendLoginState:
|
|
114
119
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: The metadata associated with the token.
|
115
120
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
116
121
|
The value should not contain leading or trailing forward slashes.
|
117
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
122
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
118
123
|
*Available only for Vault Enterprise*.
|
119
124
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies applied to the token.
|
120
125
|
:param pulumi.Input[bool] renewable: Whether the token is renewable or not.
|
@@ -223,7 +228,7 @@ class _AuthBackendLoginState:
|
|
223
228
|
"""
|
224
229
|
The namespace to provision the resource in.
|
225
230
|
The value should not contain leading or trailing forward slashes.
|
226
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
231
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
227
232
|
*Available only for Vault Enterprise*.
|
228
233
|
"""
|
229
234
|
return pulumi.get(self, "namespace")
|
@@ -299,7 +304,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
299
304
|
|
300
305
|
## Example Usage
|
301
306
|
|
302
|
-
<!--Start PulumiCodeChooser -->
|
303
307
|
```python
|
304
308
|
import pulumi
|
305
309
|
import pulumi_vault as vault
|
@@ -321,14 +325,13 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
321
325
|
role_id=example.role_id,
|
322
326
|
secret_id=id.secret_id)
|
323
327
|
```
|
324
|
-
<!--End PulumiCodeChooser -->
|
325
328
|
|
326
329
|
:param str resource_name: The name of the resource.
|
327
330
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
328
331
|
:param pulumi.Input[str] backend: The unique path of the Vault backend to log in with.
|
329
332
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
330
333
|
The value should not contain leading or trailing forward slashes.
|
331
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
334
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
332
335
|
*Available only for Vault Enterprise*.
|
333
336
|
:param pulumi.Input[str] role_id: The ID of the role to log in with.
|
334
337
|
:param pulumi.Input[str] secret_id: The secret ID of the role to log in with. Required
|
@@ -347,7 +350,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
347
350
|
|
348
351
|
## Example Usage
|
349
352
|
|
350
|
-
<!--Start PulumiCodeChooser -->
|
351
353
|
```python
|
352
354
|
import pulumi
|
353
355
|
import pulumi_vault as vault
|
@@ -369,7 +371,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
369
371
|
role_id=example.role_id,
|
370
372
|
secret_id=id.secret_id)
|
371
373
|
```
|
372
|
-
<!--End PulumiCodeChooser -->
|
373
374
|
|
374
375
|
:param str resource_name: The name of the resource.
|
375
376
|
:param AuthBackendLoginArgs args: The arguments to use to populate this resource's properties.
|
@@ -450,7 +451,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
450
451
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: The metadata associated with the token.
|
451
452
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
452
453
|
The value should not contain leading or trailing forward slashes.
|
453
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
454
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
454
455
|
*Available only for Vault Enterprise*.
|
455
456
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies applied to the token.
|
456
457
|
:param pulumi.Input[bool] renewable: Whether the token is renewable or not.
|
@@ -529,7 +530,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
529
530
|
"""
|
530
531
|
The namespace to provision the resource in.
|
531
532
|
The value should not contain leading or trailing forward slashes.
|
532
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
533
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
533
534
|
*Available only for Vault Enterprise*.
|
534
535
|
"""
|
535
536
|
return pulumi.get(self, "namespace")
|