pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -40,32 +40,15 @@ class AuthBackendRoleArgs:
|
|
40
40
|
The value should not contain leading or trailing forward slashes.
|
41
41
|
The `namespace` is always relative to the provider's configured namespace.
|
42
42
|
*Available only for Vault Enterprise*.
|
43
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
44
|
-
|
45
|
-
|
46
|
-
:param pulumi.Input[
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
:param pulumi.Input[int]
|
51
|
-
|
52
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
53
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
54
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
55
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
56
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
57
|
-
token generated using this role should never expire. The token should be renewed within the
|
58
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
59
|
-
value of this field. Specified in seconds.
|
60
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
61
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
62
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
63
|
-
Its current value will be referenced at renewal time.
|
64
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
65
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
66
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
67
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
68
|
-
requests a different type at generation time.
|
43
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
44
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
45
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
46
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
47
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
48
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
49
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
50
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
51
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
69
52
|
"""
|
70
53
|
pulumi.set(__self__, "arn", arn)
|
71
54
|
pulumi.set(__self__, "role", role)
|
@@ -151,9 +134,7 @@ class AuthBackendRoleArgs:
|
|
151
134
|
@pulumi.getter(name="tokenBoundCidrs")
|
152
135
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
153
136
|
"""
|
154
|
-
|
155
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
156
|
-
as well.
|
137
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
157
138
|
"""
|
158
139
|
return pulumi.get(self, "token_bound_cidrs")
|
159
140
|
|
@@ -165,10 +146,7 @@ class AuthBackendRoleArgs:
|
|
165
146
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
166
147
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
167
148
|
"""
|
168
|
-
|
169
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
170
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
171
|
-
`token_max_ttl` would otherwise allow a renewal.
|
149
|
+
Generated Token's Explicit Maximum TTL in seconds
|
172
150
|
"""
|
173
151
|
return pulumi.get(self, "token_explicit_max_ttl")
|
174
152
|
|
@@ -180,8 +158,7 @@ class AuthBackendRoleArgs:
|
|
180
158
|
@pulumi.getter(name="tokenMaxTtl")
|
181
159
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
182
160
|
"""
|
183
|
-
The maximum lifetime
|
184
|
-
Its current value will be referenced at renewal time.
|
161
|
+
The maximum lifetime of the generated token
|
185
162
|
"""
|
186
163
|
return pulumi.get(self, "token_max_ttl")
|
187
164
|
|
@@ -193,8 +170,7 @@ class AuthBackendRoleArgs:
|
|
193
170
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
194
171
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
195
172
|
"""
|
196
|
-
If
|
197
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
173
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
198
174
|
"""
|
199
175
|
return pulumi.get(self, "token_no_default_policy")
|
200
176
|
|
@@ -206,8 +182,7 @@ class AuthBackendRoleArgs:
|
|
206
182
|
@pulumi.getter(name="tokenNumUses")
|
207
183
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
208
184
|
"""
|
209
|
-
The
|
210
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
185
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
211
186
|
"""
|
212
187
|
return pulumi.get(self, "token_num_uses")
|
213
188
|
|
@@ -219,10 +194,7 @@ class AuthBackendRoleArgs:
|
|
219
194
|
@pulumi.getter(name="tokenPeriod")
|
220
195
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
221
196
|
"""
|
222
|
-
|
223
|
-
token generated using this role should never expire. The token should be renewed within the
|
224
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
225
|
-
value of this field. Specified in seconds.
|
197
|
+
Generated Token's Period
|
226
198
|
"""
|
227
199
|
return pulumi.get(self, "token_period")
|
228
200
|
|
@@ -234,8 +206,7 @@ class AuthBackendRoleArgs:
|
|
234
206
|
@pulumi.getter(name="tokenPolicies")
|
235
207
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
236
208
|
"""
|
237
|
-
|
238
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
209
|
+
Generated Token's Policies
|
239
210
|
"""
|
240
211
|
return pulumi.get(self, "token_policies")
|
241
212
|
|
@@ -247,8 +218,7 @@ class AuthBackendRoleArgs:
|
|
247
218
|
@pulumi.getter(name="tokenTtl")
|
248
219
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
249
220
|
"""
|
250
|
-
The
|
251
|
-
Its current value will be referenced at renewal time.
|
221
|
+
The initial ttl of the token to generate in seconds
|
252
222
|
"""
|
253
223
|
return pulumi.get(self, "token_ttl")
|
254
224
|
|
@@ -260,11 +230,7 @@ class AuthBackendRoleArgs:
|
|
260
230
|
@pulumi.getter(name="tokenType")
|
261
231
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
262
232
|
"""
|
263
|
-
The type of token
|
264
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
265
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
266
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
267
|
-
requests a different type at generation time.
|
233
|
+
The type of token to generate, service or batch
|
268
234
|
"""
|
269
235
|
return pulumi.get(self, "token_type")
|
270
236
|
|
@@ -302,32 +268,15 @@ class _AuthBackendRoleState:
|
|
302
268
|
*Available only for Vault Enterprise*.
|
303
269
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
304
270
|
the role reflected in the arn.
|
305
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
306
|
-
|
307
|
-
|
308
|
-
:param pulumi.Input[
|
309
|
-
|
310
|
-
|
311
|
-
|
312
|
-
:param pulumi.Input[int]
|
313
|
-
|
314
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
315
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
316
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
317
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
318
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
319
|
-
token generated using this role should never expire. The token should be renewed within the
|
320
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
321
|
-
value of this field. Specified in seconds.
|
322
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
323
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
324
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
325
|
-
Its current value will be referenced at renewal time.
|
326
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
327
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
328
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
329
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
330
|
-
requests a different type at generation time.
|
271
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
272
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
273
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
274
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
275
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
276
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
277
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
278
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
279
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
331
280
|
"""
|
332
281
|
if arn is not None:
|
333
282
|
pulumi.set(__self__, "arn", arn)
|
@@ -415,9 +364,7 @@ class _AuthBackendRoleState:
|
|
415
364
|
@pulumi.getter(name="tokenBoundCidrs")
|
416
365
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
417
366
|
"""
|
418
|
-
|
419
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
420
|
-
as well.
|
367
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
421
368
|
"""
|
422
369
|
return pulumi.get(self, "token_bound_cidrs")
|
423
370
|
|
@@ -429,10 +376,7 @@ class _AuthBackendRoleState:
|
|
429
376
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
430
377
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
431
378
|
"""
|
432
|
-
|
433
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
434
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
435
|
-
`token_max_ttl` would otherwise allow a renewal.
|
379
|
+
Generated Token's Explicit Maximum TTL in seconds
|
436
380
|
"""
|
437
381
|
return pulumi.get(self, "token_explicit_max_ttl")
|
438
382
|
|
@@ -444,8 +388,7 @@ class _AuthBackendRoleState:
|
|
444
388
|
@pulumi.getter(name="tokenMaxTtl")
|
445
389
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
446
390
|
"""
|
447
|
-
The maximum lifetime
|
448
|
-
Its current value will be referenced at renewal time.
|
391
|
+
The maximum lifetime of the generated token
|
449
392
|
"""
|
450
393
|
return pulumi.get(self, "token_max_ttl")
|
451
394
|
|
@@ -457,8 +400,7 @@ class _AuthBackendRoleState:
|
|
457
400
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
458
401
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
459
402
|
"""
|
460
|
-
If
|
461
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
403
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
462
404
|
"""
|
463
405
|
return pulumi.get(self, "token_no_default_policy")
|
464
406
|
|
@@ -470,8 +412,7 @@ class _AuthBackendRoleState:
|
|
470
412
|
@pulumi.getter(name="tokenNumUses")
|
471
413
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
472
414
|
"""
|
473
|
-
The
|
474
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
415
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
475
416
|
"""
|
476
417
|
return pulumi.get(self, "token_num_uses")
|
477
418
|
|
@@ -483,10 +424,7 @@ class _AuthBackendRoleState:
|
|
483
424
|
@pulumi.getter(name="tokenPeriod")
|
484
425
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
485
426
|
"""
|
486
|
-
|
487
|
-
token generated using this role should never expire. The token should be renewed within the
|
488
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
489
|
-
value of this field. Specified in seconds.
|
427
|
+
Generated Token's Period
|
490
428
|
"""
|
491
429
|
return pulumi.get(self, "token_period")
|
492
430
|
|
@@ -498,8 +436,7 @@ class _AuthBackendRoleState:
|
|
498
436
|
@pulumi.getter(name="tokenPolicies")
|
499
437
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
500
438
|
"""
|
501
|
-
|
502
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
439
|
+
Generated Token's Policies
|
503
440
|
"""
|
504
441
|
return pulumi.get(self, "token_policies")
|
505
442
|
|
@@ -511,8 +448,7 @@ class _AuthBackendRoleState:
|
|
511
448
|
@pulumi.getter(name="tokenTtl")
|
512
449
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
513
450
|
"""
|
514
|
-
The
|
515
|
-
Its current value will be referenced at renewal time.
|
451
|
+
The initial ttl of the token to generate in seconds
|
516
452
|
"""
|
517
453
|
return pulumi.get(self, "token_ttl")
|
518
454
|
|
@@ -524,11 +460,7 @@ class _AuthBackendRoleState:
|
|
524
460
|
@pulumi.getter(name="tokenType")
|
525
461
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
526
462
|
"""
|
527
|
-
The type of token
|
528
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
529
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
530
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
531
|
-
requests a different type at generation time.
|
463
|
+
The type of token to generate, service or batch
|
532
464
|
"""
|
533
465
|
return pulumi.get(self, "token_type")
|
534
466
|
|
@@ -561,20 +493,18 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
561
493
|
|
562
494
|
## Example Usage
|
563
495
|
|
564
|
-
<!--Start PulumiCodeChooser -->
|
565
496
|
```python
|
566
497
|
import pulumi
|
567
498
|
import pulumi_vault as vault
|
568
499
|
|
569
|
-
|
500
|
+
alicloud = vault.AuthBackend("alicloud",
|
570
501
|
type="alicloud",
|
571
502
|
path="alicloud")
|
572
|
-
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("
|
573
|
-
backend=
|
503
|
+
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
|
504
|
+
backend=alicloud.path,
|
574
505
|
role="example",
|
575
506
|
arn="acs:ram:123456:tf:role/foobar")
|
576
507
|
```
|
577
|
-
<!--End PulumiCodeChooser -->
|
578
508
|
|
579
509
|
## Import
|
580
510
|
|
@@ -597,32 +527,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
597
527
|
*Available only for Vault Enterprise*.
|
598
528
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
599
529
|
the role reflected in the arn.
|
600
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
601
|
-
|
602
|
-
|
603
|
-
:param pulumi.Input[
|
604
|
-
|
605
|
-
|
606
|
-
|
607
|
-
:param pulumi.Input[int]
|
608
|
-
|
609
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
610
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
611
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
612
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
613
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
614
|
-
token generated using this role should never expire. The token should be renewed within the
|
615
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
616
|
-
value of this field. Specified in seconds.
|
617
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
618
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
619
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
620
|
-
Its current value will be referenced at renewal time.
|
621
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
622
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
623
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
624
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
625
|
-
requests a different type at generation time.
|
530
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
531
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
532
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
533
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
534
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
535
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
536
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
537
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
538
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
626
539
|
"""
|
627
540
|
...
|
628
541
|
@overload
|
@@ -635,20 +548,18 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
635
548
|
|
636
549
|
## Example Usage
|
637
550
|
|
638
|
-
<!--Start PulumiCodeChooser -->
|
639
551
|
```python
|
640
552
|
import pulumi
|
641
553
|
import pulumi_vault as vault
|
642
554
|
|
643
|
-
|
555
|
+
alicloud = vault.AuthBackend("alicloud",
|
644
556
|
type="alicloud",
|
645
557
|
path="alicloud")
|
646
|
-
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("
|
647
|
-
backend=
|
558
|
+
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
|
559
|
+
backend=alicloud.path,
|
648
560
|
role="example",
|
649
561
|
arn="acs:ram:123456:tf:role/foobar")
|
650
562
|
```
|
651
|
-
<!--End PulumiCodeChooser -->
|
652
563
|
|
653
564
|
## Import
|
654
565
|
|
@@ -753,32 +664,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
753
664
|
*Available only for Vault Enterprise*.
|
754
665
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
755
666
|
the role reflected in the arn.
|
756
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
757
|
-
|
758
|
-
|
759
|
-
:param pulumi.Input[
|
760
|
-
|
761
|
-
|
762
|
-
|
763
|
-
:param pulumi.Input[int]
|
764
|
-
|
765
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
766
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
767
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
768
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
769
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
770
|
-
token generated using this role should never expire. The token should be renewed within the
|
771
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
772
|
-
value of this field. Specified in seconds.
|
773
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
774
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
775
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
776
|
-
Its current value will be referenced at renewal time.
|
777
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
778
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
779
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
780
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
781
|
-
requests a different type at generation time.
|
667
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
668
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
669
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
670
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
671
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
672
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
673
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
674
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
675
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
782
676
|
"""
|
783
677
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
784
678
|
|
@@ -842,9 +736,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
842
736
|
@pulumi.getter(name="tokenBoundCidrs")
|
843
737
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
844
738
|
"""
|
845
|
-
|
846
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
847
|
-
as well.
|
739
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
848
740
|
"""
|
849
741
|
return pulumi.get(self, "token_bound_cidrs")
|
850
742
|
|
@@ -852,10 +744,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
852
744
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
853
745
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
854
746
|
"""
|
855
|
-
|
856
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
857
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
858
|
-
`token_max_ttl` would otherwise allow a renewal.
|
747
|
+
Generated Token's Explicit Maximum TTL in seconds
|
859
748
|
"""
|
860
749
|
return pulumi.get(self, "token_explicit_max_ttl")
|
861
750
|
|
@@ -863,8 +752,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
863
752
|
@pulumi.getter(name="tokenMaxTtl")
|
864
753
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
865
754
|
"""
|
866
|
-
The maximum lifetime
|
867
|
-
Its current value will be referenced at renewal time.
|
755
|
+
The maximum lifetime of the generated token
|
868
756
|
"""
|
869
757
|
return pulumi.get(self, "token_max_ttl")
|
870
758
|
|
@@ -872,8 +760,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
872
760
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
873
761
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
874
762
|
"""
|
875
|
-
If
|
876
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
763
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
877
764
|
"""
|
878
765
|
return pulumi.get(self, "token_no_default_policy")
|
879
766
|
|
@@ -881,8 +768,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
881
768
|
@pulumi.getter(name="tokenNumUses")
|
882
769
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
883
770
|
"""
|
884
|
-
The
|
885
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
771
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
886
772
|
"""
|
887
773
|
return pulumi.get(self, "token_num_uses")
|
888
774
|
|
@@ -890,10 +776,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
890
776
|
@pulumi.getter(name="tokenPeriod")
|
891
777
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
892
778
|
"""
|
893
|
-
|
894
|
-
token generated using this role should never expire. The token should be renewed within the
|
895
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
896
|
-
value of this field. Specified in seconds.
|
779
|
+
Generated Token's Period
|
897
780
|
"""
|
898
781
|
return pulumi.get(self, "token_period")
|
899
782
|
|
@@ -901,8 +784,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
901
784
|
@pulumi.getter(name="tokenPolicies")
|
902
785
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
903
786
|
"""
|
904
|
-
|
905
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
787
|
+
Generated Token's Policies
|
906
788
|
"""
|
907
789
|
return pulumi.get(self, "token_policies")
|
908
790
|
|
@@ -910,8 +792,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
910
792
|
@pulumi.getter(name="tokenTtl")
|
911
793
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
912
794
|
"""
|
913
|
-
The
|
914
|
-
Its current value will be referenced at renewal time.
|
795
|
+
The initial ttl of the token to generate in seconds
|
915
796
|
"""
|
916
797
|
return pulumi.get(self, "token_ttl")
|
917
798
|
|
@@ -919,11 +800,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
919
800
|
@pulumi.getter(name="tokenType")
|
920
801
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
921
802
|
"""
|
922
|
-
The type of token
|
923
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
924
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
925
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
926
|
-
requests a different type at generation time.
|
803
|
+
The type of token to generate, service or batch
|
927
804
|
"""
|
928
805
|
return pulumi.get(self, "token_type")
|
929
806
|
|
@@ -299,7 +299,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
299
299
|
|
300
300
|
## Example Usage
|
301
301
|
|
302
|
-
<!--Start PulumiCodeChooser -->
|
303
302
|
```python
|
304
303
|
import pulumi
|
305
304
|
import pulumi_vault as vault
|
@@ -321,7 +320,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
321
320
|
role_id=example.role_id,
|
322
321
|
secret_id=id.secret_id)
|
323
322
|
```
|
324
|
-
<!--End PulumiCodeChooser -->
|
325
323
|
|
326
324
|
:param str resource_name: The name of the resource.
|
327
325
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -347,7 +345,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
347
345
|
|
348
346
|
## Example Usage
|
349
347
|
|
350
|
-
<!--Start PulumiCodeChooser -->
|
351
348
|
```python
|
352
349
|
import pulumi
|
353
350
|
import pulumi_vault as vault
|
@@ -369,7 +366,6 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
369
366
|
role_id=example.role_id,
|
370
367
|
secret_id=id.secret_id)
|
371
368
|
```
|
372
|
-
<!--End PulumiCodeChooser -->
|
373
369
|
|
374
370
|
:param str resource_name: The name of the resource.
|
375
371
|
:param AuthBackendLoginArgs args: The arguments to use to populate this resource's properties.
|