pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -58,32 +58,15 @@ class AuthBackendRoleArgs:
|
|
58
58
|
The value should not contain leading or trailing forward slashes.
|
59
59
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
60
60
|
*Available only for Vault Enterprise*.
|
61
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
62
|
-
|
63
|
-
|
64
|
-
:param pulumi.Input[
|
65
|
-
|
66
|
-
|
67
|
-
|
68
|
-
:param pulumi.Input[int]
|
69
|
-
|
70
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
71
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
72
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
|
73
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
74
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
75
|
-
token generated using this role should never expire. The token should be renewed within the
|
76
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
77
|
-
value of this field. Specified in seconds.
|
78
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
79
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
80
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
81
|
-
Its current value will be referenced at renewal time.
|
82
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
83
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
84
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
85
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
86
|
-
requests a different type at generation time.
|
61
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
62
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
63
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
64
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
65
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
66
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
67
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
68
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
69
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
87
70
|
"""
|
88
71
|
pulumi.set(__self__, "role", role)
|
89
72
|
if backend is not None:
|
@@ -248,9 +231,7 @@ class AuthBackendRoleArgs:
|
|
248
231
|
@pulumi.getter(name="tokenBoundCidrs")
|
249
232
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
250
233
|
"""
|
251
|
-
|
252
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
253
|
-
as well.
|
234
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
254
235
|
"""
|
255
236
|
return pulumi.get(self, "token_bound_cidrs")
|
256
237
|
|
@@ -262,10 +243,7 @@ class AuthBackendRoleArgs:
|
|
262
243
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
263
244
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
264
245
|
"""
|
265
|
-
|
266
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
267
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
268
|
-
`token_max_ttl` would otherwise allow a renewal.
|
246
|
+
Generated Token's Explicit Maximum TTL in seconds
|
269
247
|
"""
|
270
248
|
return pulumi.get(self, "token_explicit_max_ttl")
|
271
249
|
|
@@ -277,8 +255,7 @@ class AuthBackendRoleArgs:
|
|
277
255
|
@pulumi.getter(name="tokenMaxTtl")
|
278
256
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
279
257
|
"""
|
280
|
-
The maximum lifetime
|
281
|
-
Its current value will be referenced at renewal time.
|
258
|
+
The maximum lifetime of the generated token
|
282
259
|
"""
|
283
260
|
return pulumi.get(self, "token_max_ttl")
|
284
261
|
|
@@ -290,8 +267,7 @@ class AuthBackendRoleArgs:
|
|
290
267
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
291
268
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
292
269
|
"""
|
293
|
-
If
|
294
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
270
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
295
271
|
"""
|
296
272
|
return pulumi.get(self, "token_no_default_policy")
|
297
273
|
|
@@ -303,8 +279,7 @@ class AuthBackendRoleArgs:
|
|
303
279
|
@pulumi.getter(name="tokenNumUses")
|
304
280
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
305
281
|
"""
|
306
|
-
The
|
307
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
282
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
308
283
|
"""
|
309
284
|
return pulumi.get(self, "token_num_uses")
|
310
285
|
|
@@ -316,10 +291,7 @@ class AuthBackendRoleArgs:
|
|
316
291
|
@pulumi.getter(name="tokenPeriod")
|
317
292
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
318
293
|
"""
|
319
|
-
|
320
|
-
token generated using this role should never expire. The token should be renewed within the
|
321
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
322
|
-
value of this field. Specified in seconds.
|
294
|
+
Generated Token's Period
|
323
295
|
"""
|
324
296
|
return pulumi.get(self, "token_period")
|
325
297
|
|
@@ -331,8 +303,7 @@ class AuthBackendRoleArgs:
|
|
331
303
|
@pulumi.getter(name="tokenPolicies")
|
332
304
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
333
305
|
"""
|
334
|
-
|
335
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
306
|
+
Generated Token's Policies
|
336
307
|
"""
|
337
308
|
return pulumi.get(self, "token_policies")
|
338
309
|
|
@@ -344,8 +315,7 @@ class AuthBackendRoleArgs:
|
|
344
315
|
@pulumi.getter(name="tokenTtl")
|
345
316
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
346
317
|
"""
|
347
|
-
The
|
348
|
-
Its current value will be referenced at renewal time.
|
318
|
+
The initial ttl of the token to generate in seconds
|
349
319
|
"""
|
350
320
|
return pulumi.get(self, "token_ttl")
|
351
321
|
|
@@ -357,11 +327,7 @@ class AuthBackendRoleArgs:
|
|
357
327
|
@pulumi.getter(name="tokenType")
|
358
328
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
359
329
|
"""
|
360
|
-
The type of token
|
361
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
362
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
363
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
364
|
-
requests a different type at generation time.
|
330
|
+
The type of token to generate, service or batch
|
365
331
|
"""
|
366
332
|
return pulumi.get(self, "token_type")
|
367
333
|
|
@@ -417,32 +383,15 @@ class _AuthBackendRoleState:
|
|
417
383
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
418
384
|
*Available only for Vault Enterprise*.
|
419
385
|
:param pulumi.Input[str] role: The name of the role.
|
420
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
421
|
-
|
422
|
-
|
423
|
-
:param pulumi.Input[
|
424
|
-
|
425
|
-
|
426
|
-
|
427
|
-
:param pulumi.Input[int]
|
428
|
-
|
429
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
430
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
431
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
|
432
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
433
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
434
|
-
token generated using this role should never expire. The token should be renewed within the
|
435
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
436
|
-
value of this field. Specified in seconds.
|
437
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
438
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
439
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
440
|
-
Its current value will be referenced at renewal time.
|
441
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
442
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
443
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
444
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
445
|
-
requests a different type at generation time.
|
386
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
387
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
388
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
389
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
390
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
391
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
392
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
393
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
394
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
446
395
|
"""
|
447
396
|
if backend is not None:
|
448
397
|
pulumi.set(__self__, "backend", backend)
|
@@ -608,9 +557,7 @@ class _AuthBackendRoleState:
|
|
608
557
|
@pulumi.getter(name="tokenBoundCidrs")
|
609
558
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
610
559
|
"""
|
611
|
-
|
612
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
613
|
-
as well.
|
560
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
614
561
|
"""
|
615
562
|
return pulumi.get(self, "token_bound_cidrs")
|
616
563
|
|
@@ -622,10 +569,7 @@ class _AuthBackendRoleState:
|
|
622
569
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
623
570
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
624
571
|
"""
|
625
|
-
|
626
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
627
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
628
|
-
`token_max_ttl` would otherwise allow a renewal.
|
572
|
+
Generated Token's Explicit Maximum TTL in seconds
|
629
573
|
"""
|
630
574
|
return pulumi.get(self, "token_explicit_max_ttl")
|
631
575
|
|
@@ -637,8 +581,7 @@ class _AuthBackendRoleState:
|
|
637
581
|
@pulumi.getter(name="tokenMaxTtl")
|
638
582
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
639
583
|
"""
|
640
|
-
The maximum lifetime
|
641
|
-
Its current value will be referenced at renewal time.
|
584
|
+
The maximum lifetime of the generated token
|
642
585
|
"""
|
643
586
|
return pulumi.get(self, "token_max_ttl")
|
644
587
|
|
@@ -650,8 +593,7 @@ class _AuthBackendRoleState:
|
|
650
593
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
651
594
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
652
595
|
"""
|
653
|
-
If
|
654
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
596
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
655
597
|
"""
|
656
598
|
return pulumi.get(self, "token_no_default_policy")
|
657
599
|
|
@@ -663,8 +605,7 @@ class _AuthBackendRoleState:
|
|
663
605
|
@pulumi.getter(name="tokenNumUses")
|
664
606
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
665
607
|
"""
|
666
|
-
The
|
667
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
608
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
668
609
|
"""
|
669
610
|
return pulumi.get(self, "token_num_uses")
|
670
611
|
|
@@ -676,10 +617,7 @@ class _AuthBackendRoleState:
|
|
676
617
|
@pulumi.getter(name="tokenPeriod")
|
677
618
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
678
619
|
"""
|
679
|
-
|
680
|
-
token generated using this role should never expire. The token should be renewed within the
|
681
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
682
|
-
value of this field. Specified in seconds.
|
620
|
+
Generated Token's Period
|
683
621
|
"""
|
684
622
|
return pulumi.get(self, "token_period")
|
685
623
|
|
@@ -691,8 +629,7 @@ class _AuthBackendRoleState:
|
|
691
629
|
@pulumi.getter(name="tokenPolicies")
|
692
630
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
693
631
|
"""
|
694
|
-
|
695
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
632
|
+
Generated Token's Policies
|
696
633
|
"""
|
697
634
|
return pulumi.get(self, "token_policies")
|
698
635
|
|
@@ -704,8 +641,7 @@ class _AuthBackendRoleState:
|
|
704
641
|
@pulumi.getter(name="tokenTtl")
|
705
642
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
706
643
|
"""
|
707
|
-
The
|
708
|
-
Its current value will be referenced at renewal time.
|
644
|
+
The initial ttl of the token to generate in seconds
|
709
645
|
"""
|
710
646
|
return pulumi.get(self, "token_ttl")
|
711
647
|
|
@@ -717,11 +653,7 @@ class _AuthBackendRoleState:
|
|
717
653
|
@pulumi.getter(name="tokenType")
|
718
654
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
719
655
|
"""
|
720
|
-
The type of token
|
721
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
722
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
723
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
724
|
-
requests a different type at generation time.
|
656
|
+
The type of token to generate, service or batch
|
725
657
|
"""
|
726
658
|
return pulumi.get(self, "token_type")
|
727
659
|
|
@@ -763,7 +695,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
763
695
|
|
764
696
|
## Example Usage
|
765
697
|
|
766
|
-
<!--Start PulumiCodeChooser -->
|
767
698
|
```python
|
768
699
|
import pulumi
|
769
700
|
import pulumi_vault as vault
|
@@ -782,7 +713,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
782
713
|
"prod",
|
783
714
|
])
|
784
715
|
```
|
785
|
-
<!--End PulumiCodeChooser -->
|
786
716
|
|
787
717
|
## Import
|
788
718
|
|
@@ -818,32 +748,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
818
748
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
819
749
|
*Available only for Vault Enterprise*.
|
820
750
|
:param pulumi.Input[str] role: The name of the role.
|
821
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
822
|
-
|
823
|
-
|
824
|
-
:param pulumi.Input[
|
825
|
-
|
826
|
-
|
827
|
-
|
828
|
-
:param pulumi.Input[int]
|
829
|
-
|
830
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
831
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
832
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
|
833
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
834
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
835
|
-
token generated using this role should never expire. The token should be renewed within the
|
836
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
837
|
-
value of this field. Specified in seconds.
|
838
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
839
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
840
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
841
|
-
Its current value will be referenced at renewal time.
|
842
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
843
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
844
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
845
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
846
|
-
requests a different type at generation time.
|
751
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
752
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
753
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
754
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
755
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
756
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
757
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
758
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
759
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
847
760
|
"""
|
848
761
|
...
|
849
762
|
@overload
|
@@ -860,7 +773,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
860
773
|
|
861
774
|
## Example Usage
|
862
775
|
|
863
|
-
<!--Start PulumiCodeChooser -->
|
864
776
|
```python
|
865
777
|
import pulumi
|
866
778
|
import pulumi_vault as vault
|
@@ -879,7 +791,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
879
791
|
"prod",
|
880
792
|
])
|
881
793
|
```
|
882
|
-
<!--End PulumiCodeChooser -->
|
883
794
|
|
884
795
|
## Import
|
885
796
|
|
@@ -1010,32 +921,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1010
921
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1011
922
|
*Available only for Vault Enterprise*.
|
1012
923
|
:param pulumi.Input[str] role: The name of the role.
|
1013
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1014
|
-
|
1015
|
-
|
1016
|
-
:param pulumi.Input[
|
1017
|
-
|
1018
|
-
|
1019
|
-
|
1020
|
-
:param pulumi.Input[int]
|
1021
|
-
|
1022
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1023
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1024
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
|
1025
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1026
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1027
|
-
token generated using this role should never expire. The token should be renewed within the
|
1028
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1029
|
-
value of this field. Specified in seconds.
|
1030
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1031
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1032
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1033
|
-
Its current value will be referenced at renewal time.
|
1034
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1035
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1036
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1037
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1038
|
-
requests a different type at generation time.
|
924
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
925
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
926
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
927
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
928
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
929
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
930
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
931
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
932
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1039
933
|
"""
|
1040
934
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1041
935
|
|
@@ -1152,9 +1046,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1152
1046
|
@pulumi.getter(name="tokenBoundCidrs")
|
1153
1047
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1154
1048
|
"""
|
1155
|
-
|
1156
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1157
|
-
as well.
|
1049
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1158
1050
|
"""
|
1159
1051
|
return pulumi.get(self, "token_bound_cidrs")
|
1160
1052
|
|
@@ -1162,10 +1054,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1162
1054
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1163
1055
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1164
1056
|
"""
|
1165
|
-
|
1166
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1167
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1168
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1057
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1169
1058
|
"""
|
1170
1059
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1171
1060
|
|
@@ -1173,8 +1062,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1173
1062
|
@pulumi.getter(name="tokenMaxTtl")
|
1174
1063
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1175
1064
|
"""
|
1176
|
-
The maximum lifetime
|
1177
|
-
Its current value will be referenced at renewal time.
|
1065
|
+
The maximum lifetime of the generated token
|
1178
1066
|
"""
|
1179
1067
|
return pulumi.get(self, "token_max_ttl")
|
1180
1068
|
|
@@ -1182,8 +1070,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1182
1070
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1183
1071
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1184
1072
|
"""
|
1185
|
-
If
|
1186
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1073
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1187
1074
|
"""
|
1188
1075
|
return pulumi.get(self, "token_no_default_policy")
|
1189
1076
|
|
@@ -1191,8 +1078,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1191
1078
|
@pulumi.getter(name="tokenNumUses")
|
1192
1079
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1193
1080
|
"""
|
1194
|
-
The
|
1195
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1081
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1196
1082
|
"""
|
1197
1083
|
return pulumi.get(self, "token_num_uses")
|
1198
1084
|
|
@@ -1200,10 +1086,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1200
1086
|
@pulumi.getter(name="tokenPeriod")
|
1201
1087
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1202
1088
|
"""
|
1203
|
-
|
1204
|
-
token generated using this role should never expire. The token should be renewed within the
|
1205
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1206
|
-
value of this field. Specified in seconds.
|
1089
|
+
Generated Token's Period
|
1207
1090
|
"""
|
1208
1091
|
return pulumi.get(self, "token_period")
|
1209
1092
|
|
@@ -1211,8 +1094,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1211
1094
|
@pulumi.getter(name="tokenPolicies")
|
1212
1095
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1213
1096
|
"""
|
1214
|
-
|
1215
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1097
|
+
Generated Token's Policies
|
1216
1098
|
"""
|
1217
1099
|
return pulumi.get(self, "token_policies")
|
1218
1100
|
|
@@ -1220,8 +1102,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1220
1102
|
@pulumi.getter(name="tokenTtl")
|
1221
1103
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1222
1104
|
"""
|
1223
|
-
The
|
1224
|
-
Its current value will be referenced at renewal time.
|
1105
|
+
The initial ttl of the token to generate in seconds
|
1225
1106
|
"""
|
1226
1107
|
return pulumi.get(self, "token_ttl")
|
1227
1108
|
|
@@ -1229,11 +1110,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1229
1110
|
@pulumi.getter(name="tokenType")
|
1230
1111
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1231
1112
|
"""
|
1232
|
-
The type of token
|
1233
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1234
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1235
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1236
|
-
requests a different type at generation time.
|
1113
|
+
The type of token to generate, service or batch
|
1237
1114
|
"""
|
1238
1115
|
return pulumi.get(self, "token_type")
|
1239
1116
|
|
pulumi_vault/azure/backend.py
CHANGED
@@ -382,37 +382,33 @@ class Backend(pulumi.CustomResource):
|
|
382
382
|
|
383
383
|
### *Vault-1.9 And Above*
|
384
384
|
|
385
|
-
<!--Start PulumiCodeChooser -->
|
386
385
|
```python
|
387
386
|
import pulumi
|
388
387
|
import pulumi_vault as vault
|
389
388
|
|
390
389
|
azure = vault.azure.Backend("azure",
|
391
|
-
|
392
|
-
client_secret="12345678901234567890",
|
393
|
-
environment="AzurePublicCloud",
|
390
|
+
use_microsoft_graph_api=True,
|
394
391
|
subscription_id="11111111-2222-3333-4444-111111111111",
|
395
392
|
tenant_id="11111111-2222-3333-4444-222222222222",
|
396
|
-
|
393
|
+
client_id="11111111-2222-3333-4444-333333333333",
|
394
|
+
client_secret="12345678901234567890",
|
395
|
+
environment="AzurePublicCloud")
|
397
396
|
```
|
398
|
-
<!--End PulumiCodeChooser -->
|
399
397
|
|
400
398
|
### *Vault-1.8 And Below*
|
401
399
|
|
402
|
-
<!--Start PulumiCodeChooser -->
|
403
400
|
```python
|
404
401
|
import pulumi
|
405
402
|
import pulumi_vault as vault
|
406
403
|
|
407
404
|
azure = vault.azure.Backend("azure",
|
408
|
-
|
409
|
-
client_secret="12345678901234567890",
|
410
|
-
environment="AzurePublicCloud",
|
405
|
+
use_microsoft_graph_api=False,
|
411
406
|
subscription_id="11111111-2222-3333-4444-111111111111",
|
412
407
|
tenant_id="11111111-2222-3333-4444-222222222222",
|
413
|
-
|
408
|
+
client_id="11111111-2222-3333-4444-333333333333",
|
409
|
+
client_secret="12345678901234567890",
|
410
|
+
environment="AzurePublicCloud")
|
414
411
|
```
|
415
|
-
<!--End PulumiCodeChooser -->
|
416
412
|
|
417
413
|
:param str resource_name: The name of the resource.
|
418
414
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -442,37 +438,33 @@ class Backend(pulumi.CustomResource):
|
|
442
438
|
|
443
439
|
### *Vault-1.9 And Above*
|
444
440
|
|
445
|
-
<!--Start PulumiCodeChooser -->
|
446
441
|
```python
|
447
442
|
import pulumi
|
448
443
|
import pulumi_vault as vault
|
449
444
|
|
450
445
|
azure = vault.azure.Backend("azure",
|
451
|
-
|
452
|
-
client_secret="12345678901234567890",
|
453
|
-
environment="AzurePublicCloud",
|
446
|
+
use_microsoft_graph_api=True,
|
454
447
|
subscription_id="11111111-2222-3333-4444-111111111111",
|
455
448
|
tenant_id="11111111-2222-3333-4444-222222222222",
|
456
|
-
|
449
|
+
client_id="11111111-2222-3333-4444-333333333333",
|
450
|
+
client_secret="12345678901234567890",
|
451
|
+
environment="AzurePublicCloud")
|
457
452
|
```
|
458
|
-
<!--End PulumiCodeChooser -->
|
459
453
|
|
460
454
|
### *Vault-1.8 And Below*
|
461
455
|
|
462
|
-
<!--Start PulumiCodeChooser -->
|
463
456
|
```python
|
464
457
|
import pulumi
|
465
458
|
import pulumi_vault as vault
|
466
459
|
|
467
460
|
azure = vault.azure.Backend("azure",
|
468
|
-
|
469
|
-
client_secret="12345678901234567890",
|
470
|
-
environment="AzurePublicCloud",
|
461
|
+
use_microsoft_graph_api=False,
|
471
462
|
subscription_id="11111111-2222-3333-4444-111111111111",
|
472
463
|
tenant_id="11111111-2222-3333-4444-222222222222",
|
473
|
-
|
464
|
+
client_id="11111111-2222-3333-4444-333333333333",
|
465
|
+
client_secret="12345678901234567890",
|
466
|
+
environment="AzurePublicCloud")
|
474
467
|
```
|
475
|
-
<!--End PulumiCodeChooser -->
|
476
468
|
|
477
469
|
:param str resource_name: The name of the resource.
|
478
470
|
:param BackendArgs args: The arguments to use to populate this resource's properties.
|