pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -117,32 +117,15 @@ class AuthBackendRoleArgs:
|
|
117
117
|
for this field should be the key of the tag on the EC2 instance. `auth_type`
|
118
118
|
must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
|
119
119
|
to use this constraint.
|
120
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
121
|
-
|
122
|
-
|
123
|
-
:param pulumi.Input[
|
124
|
-
|
125
|
-
|
126
|
-
|
127
|
-
:param pulumi.Input[int]
|
128
|
-
|
129
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
130
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
131
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
|
132
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
133
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
134
|
-
token generated using this role should never expire. The token should be renewed within the
|
135
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
136
|
-
value of this field. Specified in seconds.
|
137
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
138
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
139
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
140
|
-
Its current value will be referenced at renewal time.
|
141
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
142
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
143
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
144
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
145
|
-
requests a different type at generation time.
|
120
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
121
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
122
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
123
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
124
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
125
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
126
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
127
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
128
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
146
129
|
"""
|
147
130
|
pulumi.set(__self__, "role", role)
|
148
131
|
if allow_instance_migration is not None:
|
@@ -486,9 +469,7 @@ class AuthBackendRoleArgs:
|
|
486
469
|
@pulumi.getter(name="tokenBoundCidrs")
|
487
470
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
488
471
|
"""
|
489
|
-
|
490
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
491
|
-
as well.
|
472
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
492
473
|
"""
|
493
474
|
return pulumi.get(self, "token_bound_cidrs")
|
494
475
|
|
@@ -500,10 +481,7 @@ class AuthBackendRoleArgs:
|
|
500
481
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
501
482
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
502
483
|
"""
|
503
|
-
|
504
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
505
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
506
|
-
`token_max_ttl` would otherwise allow a renewal.
|
484
|
+
Generated Token's Explicit Maximum TTL in seconds
|
507
485
|
"""
|
508
486
|
return pulumi.get(self, "token_explicit_max_ttl")
|
509
487
|
|
@@ -515,8 +493,7 @@ class AuthBackendRoleArgs:
|
|
515
493
|
@pulumi.getter(name="tokenMaxTtl")
|
516
494
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
517
495
|
"""
|
518
|
-
The maximum lifetime
|
519
|
-
Its current value will be referenced at renewal time.
|
496
|
+
The maximum lifetime of the generated token
|
520
497
|
"""
|
521
498
|
return pulumi.get(self, "token_max_ttl")
|
522
499
|
|
@@ -528,8 +505,7 @@ class AuthBackendRoleArgs:
|
|
528
505
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
529
506
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
530
507
|
"""
|
531
|
-
If
|
532
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
508
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
533
509
|
"""
|
534
510
|
return pulumi.get(self, "token_no_default_policy")
|
535
511
|
|
@@ -541,8 +517,7 @@ class AuthBackendRoleArgs:
|
|
541
517
|
@pulumi.getter(name="tokenNumUses")
|
542
518
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
543
519
|
"""
|
544
|
-
The
|
545
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
520
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
546
521
|
"""
|
547
522
|
return pulumi.get(self, "token_num_uses")
|
548
523
|
|
@@ -554,10 +529,7 @@ class AuthBackendRoleArgs:
|
|
554
529
|
@pulumi.getter(name="tokenPeriod")
|
555
530
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
556
531
|
"""
|
557
|
-
|
558
|
-
token generated using this role should never expire. The token should be renewed within the
|
559
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
560
|
-
value of this field. Specified in seconds.
|
532
|
+
Generated Token's Period
|
561
533
|
"""
|
562
534
|
return pulumi.get(self, "token_period")
|
563
535
|
|
@@ -569,8 +541,7 @@ class AuthBackendRoleArgs:
|
|
569
541
|
@pulumi.getter(name="tokenPolicies")
|
570
542
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
571
543
|
"""
|
572
|
-
|
573
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
544
|
+
Generated Token's Policies
|
574
545
|
"""
|
575
546
|
return pulumi.get(self, "token_policies")
|
576
547
|
|
@@ -582,8 +553,7 @@ class AuthBackendRoleArgs:
|
|
582
553
|
@pulumi.getter(name="tokenTtl")
|
583
554
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
584
555
|
"""
|
585
|
-
The
|
586
|
-
Its current value will be referenced at renewal time.
|
556
|
+
The initial ttl of the token to generate in seconds
|
587
557
|
"""
|
588
558
|
return pulumi.get(self, "token_ttl")
|
589
559
|
|
@@ -595,11 +565,7 @@ class AuthBackendRoleArgs:
|
|
595
565
|
@pulumi.getter(name="tokenType")
|
596
566
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
597
567
|
"""
|
598
|
-
The type of token
|
599
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
600
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
601
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
602
|
-
requests a different type at generation time.
|
568
|
+
The type of token to generate, service or batch
|
603
569
|
"""
|
604
570
|
return pulumi.get(self, "token_type")
|
605
571
|
|
@@ -716,32 +682,15 @@ class _AuthBackendRoleState:
|
|
716
682
|
for this field should be the key of the tag on the EC2 instance. `auth_type`
|
717
683
|
must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
|
718
684
|
to use this constraint.
|
719
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
720
|
-
|
721
|
-
|
722
|
-
:param pulumi.Input[
|
723
|
-
|
724
|
-
|
725
|
-
|
726
|
-
:param pulumi.Input[int]
|
727
|
-
|
728
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
729
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
730
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
|
731
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
732
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
733
|
-
token generated using this role should never expire. The token should be renewed within the
|
734
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
735
|
-
value of this field. Specified in seconds.
|
736
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
737
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
738
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
739
|
-
Its current value will be referenced at renewal time.
|
740
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
741
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
742
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
743
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
744
|
-
requests a different type at generation time.
|
685
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
686
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
687
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
688
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
689
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
690
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
691
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
692
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
693
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
745
694
|
"""
|
746
695
|
if allow_instance_migration is not None:
|
747
696
|
pulumi.set(__self__, "allow_instance_migration", allow_instance_migration)
|
@@ -1100,9 +1049,7 @@ class _AuthBackendRoleState:
|
|
1100
1049
|
@pulumi.getter(name="tokenBoundCidrs")
|
1101
1050
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1102
1051
|
"""
|
1103
|
-
|
1104
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1105
|
-
as well.
|
1052
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1106
1053
|
"""
|
1107
1054
|
return pulumi.get(self, "token_bound_cidrs")
|
1108
1055
|
|
@@ -1114,10 +1061,7 @@ class _AuthBackendRoleState:
|
|
1114
1061
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1115
1062
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1116
1063
|
"""
|
1117
|
-
|
1118
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1119
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1120
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1064
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1121
1065
|
"""
|
1122
1066
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1123
1067
|
|
@@ -1129,8 +1073,7 @@ class _AuthBackendRoleState:
|
|
1129
1073
|
@pulumi.getter(name="tokenMaxTtl")
|
1130
1074
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1131
1075
|
"""
|
1132
|
-
The maximum lifetime
|
1133
|
-
Its current value will be referenced at renewal time.
|
1076
|
+
The maximum lifetime of the generated token
|
1134
1077
|
"""
|
1135
1078
|
return pulumi.get(self, "token_max_ttl")
|
1136
1079
|
|
@@ -1142,8 +1085,7 @@ class _AuthBackendRoleState:
|
|
1142
1085
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1143
1086
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
1144
1087
|
"""
|
1145
|
-
If
|
1146
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1088
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1147
1089
|
"""
|
1148
1090
|
return pulumi.get(self, "token_no_default_policy")
|
1149
1091
|
|
@@ -1155,8 +1097,7 @@ class _AuthBackendRoleState:
|
|
1155
1097
|
@pulumi.getter(name="tokenNumUses")
|
1156
1098
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
1157
1099
|
"""
|
1158
|
-
The
|
1159
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1100
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1160
1101
|
"""
|
1161
1102
|
return pulumi.get(self, "token_num_uses")
|
1162
1103
|
|
@@ -1168,10 +1109,7 @@ class _AuthBackendRoleState:
|
|
1168
1109
|
@pulumi.getter(name="tokenPeriod")
|
1169
1110
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
1170
1111
|
"""
|
1171
|
-
|
1172
|
-
token generated using this role should never expire. The token should be renewed within the
|
1173
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1174
|
-
value of this field. Specified in seconds.
|
1112
|
+
Generated Token's Period
|
1175
1113
|
"""
|
1176
1114
|
return pulumi.get(self, "token_period")
|
1177
1115
|
|
@@ -1183,8 +1121,7 @@ class _AuthBackendRoleState:
|
|
1183
1121
|
@pulumi.getter(name="tokenPolicies")
|
1184
1122
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1185
1123
|
"""
|
1186
|
-
|
1187
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1124
|
+
Generated Token's Policies
|
1188
1125
|
"""
|
1189
1126
|
return pulumi.get(self, "token_policies")
|
1190
1127
|
|
@@ -1196,8 +1133,7 @@ class _AuthBackendRoleState:
|
|
1196
1133
|
@pulumi.getter(name="tokenTtl")
|
1197
1134
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
1198
1135
|
"""
|
1199
|
-
The
|
1200
|
-
Its current value will be referenced at renewal time.
|
1136
|
+
The initial ttl of the token to generate in seconds
|
1201
1137
|
"""
|
1202
1138
|
return pulumi.get(self, "token_ttl")
|
1203
1139
|
|
@@ -1209,11 +1145,7 @@ class _AuthBackendRoleState:
|
|
1209
1145
|
@pulumi.getter(name="tokenType")
|
1210
1146
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
1211
1147
|
"""
|
1212
|
-
The type of token
|
1213
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1214
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1215
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1216
|
-
requests a different type at generation time.
|
1148
|
+
The type of token to generate, service or batch
|
1217
1149
|
"""
|
1218
1150
|
return pulumi.get(self, "token_type")
|
1219
1151
|
|
@@ -1265,7 +1197,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1265
1197
|
|
1266
1198
|
## Example Usage
|
1267
1199
|
|
1268
|
-
<!--Start PulumiCodeChooser -->
|
1269
1200
|
```python
|
1270
1201
|
import pulumi
|
1271
1202
|
import pulumi_vault as vault
|
@@ -1291,7 +1222,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1291
1222
|
"prod",
|
1292
1223
|
])
|
1293
1224
|
```
|
1294
|
-
<!--End PulumiCodeChooser -->
|
1295
1225
|
|
1296
1226
|
## Import
|
1297
1227
|
|
@@ -1376,32 +1306,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1376
1306
|
for this field should be the key of the tag on the EC2 instance. `auth_type`
|
1377
1307
|
must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
|
1378
1308
|
to use this constraint.
|
1379
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1380
|
-
|
1381
|
-
|
1382
|
-
:param pulumi.Input[
|
1383
|
-
|
1384
|
-
|
1385
|
-
|
1386
|
-
:param pulumi.Input[int]
|
1387
|
-
|
1388
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1389
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1390
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
|
1391
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1392
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1393
|
-
token generated using this role should never expire. The token should be renewed within the
|
1394
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1395
|
-
value of this field. Specified in seconds.
|
1396
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1397
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1398
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1399
|
-
Its current value will be referenced at renewal time.
|
1400
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1401
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1402
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1403
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1404
|
-
requests a different type at generation time.
|
1309
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1310
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1311
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1312
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1313
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1314
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1315
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1316
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1317
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1405
1318
|
"""
|
1406
1319
|
...
|
1407
1320
|
@overload
|
@@ -1418,7 +1331,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1418
1331
|
|
1419
1332
|
## Example Usage
|
1420
1333
|
|
1421
|
-
<!--Start PulumiCodeChooser -->
|
1422
1334
|
```python
|
1423
1335
|
import pulumi
|
1424
1336
|
import pulumi_vault as vault
|
@@ -1444,7 +1356,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1444
1356
|
"prod",
|
1445
1357
|
])
|
1446
1358
|
```
|
1447
|
-
<!--End PulumiCodeChooser -->
|
1448
1359
|
|
1449
1360
|
## Import
|
1450
1361
|
|
@@ -1657,32 +1568,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1657
1568
|
for this field should be the key of the tag on the EC2 instance. `auth_type`
|
1658
1569
|
must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
|
1659
1570
|
to use this constraint.
|
1660
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1661
|
-
|
1662
|
-
|
1663
|
-
:param pulumi.Input[
|
1664
|
-
|
1665
|
-
|
1666
|
-
|
1667
|
-
:param pulumi.Input[int]
|
1668
|
-
|
1669
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1670
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1671
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
|
1672
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1673
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1674
|
-
token generated using this role should never expire. The token should be renewed within the
|
1675
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1676
|
-
value of this field. Specified in seconds.
|
1677
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1678
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1679
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1680
|
-
Its current value will be referenced at renewal time.
|
1681
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1682
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1683
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1684
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1685
|
-
requests a different type at generation time.
|
1571
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1572
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1573
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1574
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1575
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1576
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1577
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1578
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1579
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1686
1580
|
"""
|
1687
1581
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1688
1582
|
|
@@ -1937,9 +1831,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1937
1831
|
@pulumi.getter(name="tokenBoundCidrs")
|
1938
1832
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1939
1833
|
"""
|
1940
|
-
|
1941
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1942
|
-
as well.
|
1834
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1943
1835
|
"""
|
1944
1836
|
return pulumi.get(self, "token_bound_cidrs")
|
1945
1837
|
|
@@ -1947,10 +1839,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1947
1839
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1948
1840
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1949
1841
|
"""
|
1950
|
-
|
1951
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1952
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1953
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1842
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1954
1843
|
"""
|
1955
1844
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1956
1845
|
|
@@ -1958,8 +1847,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1958
1847
|
@pulumi.getter(name="tokenMaxTtl")
|
1959
1848
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1960
1849
|
"""
|
1961
|
-
The maximum lifetime
|
1962
|
-
Its current value will be referenced at renewal time.
|
1850
|
+
The maximum lifetime of the generated token
|
1963
1851
|
"""
|
1964
1852
|
return pulumi.get(self, "token_max_ttl")
|
1965
1853
|
|
@@ -1967,8 +1855,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1967
1855
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1968
1856
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1969
1857
|
"""
|
1970
|
-
If
|
1971
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1858
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1972
1859
|
"""
|
1973
1860
|
return pulumi.get(self, "token_no_default_policy")
|
1974
1861
|
|
@@ -1976,8 +1863,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1976
1863
|
@pulumi.getter(name="tokenNumUses")
|
1977
1864
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1978
1865
|
"""
|
1979
|
-
The
|
1980
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1866
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1981
1867
|
"""
|
1982
1868
|
return pulumi.get(self, "token_num_uses")
|
1983
1869
|
|
@@ -1985,10 +1871,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1985
1871
|
@pulumi.getter(name="tokenPeriod")
|
1986
1872
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1987
1873
|
"""
|
1988
|
-
|
1989
|
-
token generated using this role should never expire. The token should be renewed within the
|
1990
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1991
|
-
value of this field. Specified in seconds.
|
1874
|
+
Generated Token's Period
|
1992
1875
|
"""
|
1993
1876
|
return pulumi.get(self, "token_period")
|
1994
1877
|
|
@@ -1996,8 +1879,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1996
1879
|
@pulumi.getter(name="tokenPolicies")
|
1997
1880
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1998
1881
|
"""
|
1999
|
-
|
2000
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1882
|
+
Generated Token's Policies
|
2001
1883
|
"""
|
2002
1884
|
return pulumi.get(self, "token_policies")
|
2003
1885
|
|
@@ -2005,8 +1887,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
2005
1887
|
@pulumi.getter(name="tokenTtl")
|
2006
1888
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
2007
1889
|
"""
|
2008
|
-
The
|
2009
|
-
Its current value will be referenced at renewal time.
|
1890
|
+
The initial ttl of the token to generate in seconds
|
2010
1891
|
"""
|
2011
1892
|
return pulumi.get(self, "token_ttl")
|
2012
1893
|
|
@@ -2014,11 +1895,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
2014
1895
|
@pulumi.getter(name="tokenType")
|
2015
1896
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
2016
1897
|
"""
|
2017
|
-
The type of token
|
2018
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
2019
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
2020
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
2021
|
-
requests a different type at generation time.
|
1898
|
+
The type of token to generate, service or batch
|
2022
1899
|
"""
|
2023
1900
|
return pulumi.get(self, "token_type")
|
2024
1901
|
|
@@ -197,17 +197,15 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
197
197
|
|
198
198
|
## Example Usage
|
199
199
|
|
200
|
-
<!--Start PulumiCodeChooser -->
|
201
200
|
```python
|
202
201
|
import pulumi
|
203
202
|
import pulumi_vault as vault
|
204
203
|
|
205
|
-
|
206
|
-
example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("
|
207
|
-
backend=
|
204
|
+
example = vault.AuthBackend("example", type="aws")
|
205
|
+
example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("example",
|
206
|
+
backend=example.path,
|
208
207
|
safety_buffer=360)
|
209
208
|
```
|
210
|
-
<!--End PulumiCodeChooser -->
|
211
209
|
|
212
210
|
:param str resource_name: The name of the resource.
|
213
211
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -234,17 +232,15 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
234
232
|
|
235
233
|
## Example Usage
|
236
234
|
|
237
|
-
<!--Start PulumiCodeChooser -->
|
238
235
|
```python
|
239
236
|
import pulumi
|
240
237
|
import pulumi_vault as vault
|
241
238
|
|
242
|
-
|
243
|
-
example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("
|
244
|
-
backend=
|
239
|
+
example = vault.AuthBackend("example", type="aws")
|
240
|
+
example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("example",
|
241
|
+
backend=example.path,
|
245
242
|
safety_buffer=360)
|
246
243
|
```
|
247
|
-
<!--End PulumiCodeChooser -->
|
248
244
|
|
249
245
|
:param str resource_name: The name of the resource.
|
250
246
|
:param AuthBackendRoletagBlacklistArgs args: The arguments to use to populate this resource's properties.
|
@@ -186,7 +186,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
186
186
|
"""
|
187
187
|
## Example Usage
|
188
188
|
|
189
|
-
<!--Start PulumiCodeChooser -->
|
190
189
|
```python
|
191
190
|
import pulumi
|
192
191
|
import pulumi_vault as vault
|
@@ -197,7 +196,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
197
196
|
account_id="1234567890",
|
198
197
|
sts_role="arn:aws:iam::1234567890:role/my-role")
|
199
198
|
```
|
200
|
-
<!--End PulumiCodeChooser -->
|
201
199
|
|
202
200
|
## Import
|
203
201
|
|
@@ -228,7 +226,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
228
226
|
"""
|
229
227
|
## Example Usage
|
230
228
|
|
231
|
-
<!--Start PulumiCodeChooser -->
|
232
229
|
```python
|
233
230
|
import pulumi
|
234
231
|
import pulumi_vault as vault
|
@@ -239,7 +236,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
239
236
|
account_id="1234567890",
|
240
237
|
sts_role="arn:aws:iam::1234567890:role/my-role")
|
241
238
|
```
|
242
|
-
<!--End PulumiCodeChooser -->
|
243
239
|
|
244
240
|
## Import
|
245
241
|
|