pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -50,31 +50,15 @@ class AuthBackendRoleArgs:
|
|
50
50
|
|
51
51
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
52
52
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
53
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
54
|
-
|
55
|
-
|
56
|
-
:param pulumi.Input[
|
57
|
-
|
58
|
-
|
59
|
-
`token_max_ttl` would otherwise allow a renewal.
|
60
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
61
|
-
Its current value will be referenced at renewal time.
|
62
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
63
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
64
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
65
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
66
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
67
|
-
token generated using this role should never expire. The token should be renewed within the
|
68
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
69
|
-
value of this field. Specified in seconds.
|
53
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
54
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
55
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
56
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
57
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
58
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
70
59
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
71
|
-
:param pulumi.Input[int] token_ttl: The
|
72
|
-
|
73
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
74
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
75
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
76
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
77
|
-
requests a different type at generation time.
|
60
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
61
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
78
62
|
"""
|
79
63
|
pulumi.set(__self__, "role_name", role_name)
|
80
64
|
if allowed_entity_aliases is not None:
|
@@ -243,9 +227,7 @@ class AuthBackendRoleArgs:
|
|
243
227
|
@pulumi.getter(name="tokenBoundCidrs")
|
244
228
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
245
229
|
"""
|
246
|
-
|
247
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
248
|
-
as well.
|
230
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
249
231
|
"""
|
250
232
|
return pulumi.get(self, "token_bound_cidrs")
|
251
233
|
|
@@ -257,10 +239,7 @@ class AuthBackendRoleArgs:
|
|
257
239
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
258
240
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
259
241
|
"""
|
260
|
-
|
261
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
262
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
263
|
-
`token_max_ttl` would otherwise allow a renewal.
|
242
|
+
Generated Token's Explicit Maximum TTL in seconds
|
264
243
|
"""
|
265
244
|
return pulumi.get(self, "token_explicit_max_ttl")
|
266
245
|
|
@@ -272,8 +251,7 @@ class AuthBackendRoleArgs:
|
|
272
251
|
@pulumi.getter(name="tokenMaxTtl")
|
273
252
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
274
253
|
"""
|
275
|
-
The maximum lifetime
|
276
|
-
Its current value will be referenced at renewal time.
|
254
|
+
The maximum lifetime of the generated token
|
277
255
|
"""
|
278
256
|
return pulumi.get(self, "token_max_ttl")
|
279
257
|
|
@@ -285,8 +263,7 @@ class AuthBackendRoleArgs:
|
|
285
263
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
286
264
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
287
265
|
"""
|
288
|
-
If
|
289
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
266
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
290
267
|
"""
|
291
268
|
return pulumi.get(self, "token_no_default_policy")
|
292
269
|
|
@@ -298,8 +275,7 @@ class AuthBackendRoleArgs:
|
|
298
275
|
@pulumi.getter(name="tokenNumUses")
|
299
276
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
300
277
|
"""
|
301
|
-
The
|
302
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
278
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
303
279
|
"""
|
304
280
|
return pulumi.get(self, "token_num_uses")
|
305
281
|
|
@@ -311,10 +287,7 @@ class AuthBackendRoleArgs:
|
|
311
287
|
@pulumi.getter(name="tokenPeriod")
|
312
288
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
313
289
|
"""
|
314
|
-
|
315
|
-
token generated using this role should never expire. The token should be renewed within the
|
316
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
317
|
-
value of this field. Specified in seconds.
|
290
|
+
Generated Token's Period
|
318
291
|
"""
|
319
292
|
return pulumi.get(self, "token_period")
|
320
293
|
|
@@ -338,8 +311,7 @@ class AuthBackendRoleArgs:
|
|
338
311
|
@pulumi.getter(name="tokenTtl")
|
339
312
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
340
313
|
"""
|
341
|
-
The
|
342
|
-
Its current value will be referenced at renewal time.
|
314
|
+
The initial ttl of the token to generate in seconds
|
343
315
|
"""
|
344
316
|
return pulumi.get(self, "token_ttl")
|
345
317
|
|
@@ -351,11 +323,7 @@ class AuthBackendRoleArgs:
|
|
351
323
|
@pulumi.getter(name="tokenType")
|
352
324
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
353
325
|
"""
|
354
|
-
The type of token
|
355
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
356
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
357
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
358
|
-
requests a different type at generation time.
|
326
|
+
The type of token to generate, service or batch
|
359
327
|
"""
|
360
328
|
return pulumi.get(self, "token_type")
|
361
329
|
|
@@ -403,31 +371,15 @@ class _AuthBackendRoleState:
|
|
403
371
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
404
372
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
405
373
|
:param pulumi.Input[str] role_name: The name of the role.
|
406
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
407
|
-
|
408
|
-
|
409
|
-
:param pulumi.Input[
|
410
|
-
|
411
|
-
|
412
|
-
`token_max_ttl` would otherwise allow a renewal.
|
413
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
414
|
-
Its current value will be referenced at renewal time.
|
415
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
416
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
417
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
418
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
419
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
420
|
-
token generated using this role should never expire. The token should be renewed within the
|
421
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
422
|
-
value of this field. Specified in seconds.
|
374
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
375
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
376
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
377
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
378
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
379
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
423
380
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
424
|
-
:param pulumi.Input[int] token_ttl: The
|
425
|
-
|
426
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
427
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
428
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
429
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
430
|
-
requests a different type at generation time.
|
381
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
382
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
431
383
|
"""
|
432
384
|
if allowed_entity_aliases is not None:
|
433
385
|
pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
|
@@ -597,9 +549,7 @@ class _AuthBackendRoleState:
|
|
597
549
|
@pulumi.getter(name="tokenBoundCidrs")
|
598
550
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
599
551
|
"""
|
600
|
-
|
601
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
602
|
-
as well.
|
552
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
603
553
|
"""
|
604
554
|
return pulumi.get(self, "token_bound_cidrs")
|
605
555
|
|
@@ -611,10 +561,7 @@ class _AuthBackendRoleState:
|
|
611
561
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
612
562
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
613
563
|
"""
|
614
|
-
|
615
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
616
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
617
|
-
`token_max_ttl` would otherwise allow a renewal.
|
564
|
+
Generated Token's Explicit Maximum TTL in seconds
|
618
565
|
"""
|
619
566
|
return pulumi.get(self, "token_explicit_max_ttl")
|
620
567
|
|
@@ -626,8 +573,7 @@ class _AuthBackendRoleState:
|
|
626
573
|
@pulumi.getter(name="tokenMaxTtl")
|
627
574
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
628
575
|
"""
|
629
|
-
The maximum lifetime
|
630
|
-
Its current value will be referenced at renewal time.
|
576
|
+
The maximum lifetime of the generated token
|
631
577
|
"""
|
632
578
|
return pulumi.get(self, "token_max_ttl")
|
633
579
|
|
@@ -639,8 +585,7 @@ class _AuthBackendRoleState:
|
|
639
585
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
640
586
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
641
587
|
"""
|
642
|
-
If
|
643
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
588
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
644
589
|
"""
|
645
590
|
return pulumi.get(self, "token_no_default_policy")
|
646
591
|
|
@@ -652,8 +597,7 @@ class _AuthBackendRoleState:
|
|
652
597
|
@pulumi.getter(name="tokenNumUses")
|
653
598
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
654
599
|
"""
|
655
|
-
The
|
656
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
600
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
657
601
|
"""
|
658
602
|
return pulumi.get(self, "token_num_uses")
|
659
603
|
|
@@ -665,10 +609,7 @@ class _AuthBackendRoleState:
|
|
665
609
|
@pulumi.getter(name="tokenPeriod")
|
666
610
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
667
611
|
"""
|
668
|
-
|
669
|
-
token generated using this role should never expire. The token should be renewed within the
|
670
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
671
|
-
value of this field. Specified in seconds.
|
612
|
+
Generated Token's Period
|
672
613
|
"""
|
673
614
|
return pulumi.get(self, "token_period")
|
674
615
|
|
@@ -692,8 +633,7 @@ class _AuthBackendRoleState:
|
|
692
633
|
@pulumi.getter(name="tokenTtl")
|
693
634
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
694
635
|
"""
|
695
|
-
The
|
696
|
-
Its current value will be referenced at renewal time.
|
636
|
+
The initial ttl of the token to generate in seconds
|
697
637
|
"""
|
698
638
|
return pulumi.get(self, "token_ttl")
|
699
639
|
|
@@ -705,11 +645,7 @@ class _AuthBackendRoleState:
|
|
705
645
|
@pulumi.getter(name="tokenType")
|
706
646
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
707
647
|
"""
|
708
|
-
The type of token
|
709
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
710
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
711
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
712
|
-
requests a different type at generation time.
|
648
|
+
The type of token to generate, service or batch
|
713
649
|
"""
|
714
650
|
return pulumi.get(self, "token_type")
|
715
651
|
|
@@ -750,26 +686,24 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
750
686
|
|
751
687
|
## Example Usage
|
752
688
|
|
753
|
-
<!--Start PulumiCodeChooser -->
|
754
689
|
```python
|
755
690
|
import pulumi
|
756
691
|
import pulumi_vault as vault
|
757
692
|
|
758
693
|
example = vault.tokenauth.AuthBackendRole("example",
|
759
|
-
|
694
|
+
role_name="my-role",
|
760
695
|
allowed_policies=[
|
761
696
|
"dev",
|
762
697
|
"test",
|
763
698
|
],
|
764
699
|
disallowed_policies=["default"],
|
700
|
+
allowed_entity_aliases=["test_entity"],
|
765
701
|
orphan=True,
|
766
|
-
|
702
|
+
token_period=86400,
|
767
703
|
renewable=True,
|
768
|
-
role_name="my-role",
|
769
704
|
token_explicit_max_ttl=115200,
|
770
|
-
|
705
|
+
path_suffix="path-suffix")
|
771
706
|
```
|
772
|
-
<!--End PulumiCodeChooser -->
|
773
707
|
|
774
708
|
## Import
|
775
709
|
|
@@ -796,31 +730,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
796
730
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
797
731
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
798
732
|
:param pulumi.Input[str] role_name: The name of the role.
|
799
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
800
|
-
|
801
|
-
|
802
|
-
:param pulumi.Input[
|
803
|
-
|
804
|
-
|
805
|
-
`token_max_ttl` would otherwise allow a renewal.
|
806
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
807
|
-
Its current value will be referenced at renewal time.
|
808
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
809
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
810
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
811
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
812
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
813
|
-
token generated using this role should never expire. The token should be renewed within the
|
814
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
815
|
-
value of this field. Specified in seconds.
|
733
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
734
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
735
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
736
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
737
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
738
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
816
739
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
817
|
-
:param pulumi.Input[int] token_ttl: The
|
818
|
-
|
819
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
820
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
821
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
822
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
823
|
-
requests a different type at generation time.
|
740
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
741
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
824
742
|
"""
|
825
743
|
...
|
826
744
|
@overload
|
@@ -835,26 +753,24 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
835
753
|
|
836
754
|
## Example Usage
|
837
755
|
|
838
|
-
<!--Start PulumiCodeChooser -->
|
839
756
|
```python
|
840
757
|
import pulumi
|
841
758
|
import pulumi_vault as vault
|
842
759
|
|
843
760
|
example = vault.tokenauth.AuthBackendRole("example",
|
844
|
-
|
761
|
+
role_name="my-role",
|
845
762
|
allowed_policies=[
|
846
763
|
"dev",
|
847
764
|
"test",
|
848
765
|
],
|
849
766
|
disallowed_policies=["default"],
|
767
|
+
allowed_entity_aliases=["test_entity"],
|
850
768
|
orphan=True,
|
851
|
-
|
769
|
+
token_period=86400,
|
852
770
|
renewable=True,
|
853
|
-
role_name="my-role",
|
854
771
|
token_explicit_max_ttl=115200,
|
855
|
-
|
772
|
+
path_suffix="path-suffix")
|
856
773
|
```
|
857
|
-
<!--End PulumiCodeChooser -->
|
858
774
|
|
859
775
|
## Import
|
860
776
|
|
@@ -979,31 +895,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
979
895
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
980
896
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
981
897
|
:param pulumi.Input[str] role_name: The name of the role.
|
982
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
983
|
-
|
984
|
-
|
985
|
-
:param pulumi.Input[
|
986
|
-
|
987
|
-
|
988
|
-
`token_max_ttl` would otherwise allow a renewal.
|
989
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
990
|
-
Its current value will be referenced at renewal time.
|
991
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
992
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
993
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
994
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
995
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
996
|
-
token generated using this role should never expire. The token should be renewed within the
|
997
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
998
|
-
value of this field. Specified in seconds.
|
898
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
899
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
900
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
901
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
902
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
903
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
999
904
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1000
|
-
:param pulumi.Input[int] token_ttl: The
|
1001
|
-
|
1002
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1003
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1004
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1005
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1006
|
-
requests a different type at generation time.
|
905
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
906
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1007
907
|
"""
|
1008
908
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1009
909
|
|
@@ -1119,9 +1019,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1119
1019
|
@pulumi.getter(name="tokenBoundCidrs")
|
1120
1020
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1121
1021
|
"""
|
1122
|
-
|
1123
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1124
|
-
as well.
|
1022
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1125
1023
|
"""
|
1126
1024
|
return pulumi.get(self, "token_bound_cidrs")
|
1127
1025
|
|
@@ -1129,10 +1027,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1129
1027
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1130
1028
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1131
1029
|
"""
|
1132
|
-
|
1133
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1134
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1135
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1030
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1136
1031
|
"""
|
1137
1032
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1138
1033
|
|
@@ -1140,8 +1035,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1140
1035
|
@pulumi.getter(name="tokenMaxTtl")
|
1141
1036
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1142
1037
|
"""
|
1143
|
-
The maximum lifetime
|
1144
|
-
Its current value will be referenced at renewal time.
|
1038
|
+
The maximum lifetime of the generated token
|
1145
1039
|
"""
|
1146
1040
|
return pulumi.get(self, "token_max_ttl")
|
1147
1041
|
|
@@ -1149,8 +1043,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1149
1043
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1150
1044
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1151
1045
|
"""
|
1152
|
-
If
|
1153
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1046
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1154
1047
|
"""
|
1155
1048
|
return pulumi.get(self, "token_no_default_policy")
|
1156
1049
|
|
@@ -1158,8 +1051,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1158
1051
|
@pulumi.getter(name="tokenNumUses")
|
1159
1052
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1160
1053
|
"""
|
1161
|
-
The
|
1162
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1054
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1163
1055
|
"""
|
1164
1056
|
return pulumi.get(self, "token_num_uses")
|
1165
1057
|
|
@@ -1167,10 +1059,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1167
1059
|
@pulumi.getter(name="tokenPeriod")
|
1168
1060
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1169
1061
|
"""
|
1170
|
-
|
1171
|
-
token generated using this role should never expire. The token should be renewed within the
|
1172
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1173
|
-
value of this field. Specified in seconds.
|
1062
|
+
Generated Token's Period
|
1174
1063
|
"""
|
1175
1064
|
return pulumi.get(self, "token_period")
|
1176
1065
|
|
@@ -1186,8 +1075,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1186
1075
|
@pulumi.getter(name="tokenTtl")
|
1187
1076
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1188
1077
|
"""
|
1189
|
-
The
|
1190
|
-
Its current value will be referenced at renewal time.
|
1078
|
+
The initial ttl of the token to generate in seconds
|
1191
1079
|
"""
|
1192
1080
|
return pulumi.get(self, "token_ttl")
|
1193
1081
|
|
@@ -1195,11 +1083,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1195
1083
|
@pulumi.getter(name="tokenType")
|
1196
1084
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1197
1085
|
"""
|
1198
|
-
The type of token
|
1199
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1200
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1201
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1202
|
-
requests a different type at generation time.
|
1086
|
+
The type of token to generate, service or batch
|
1203
1087
|
"""
|
1204
1088
|
return pulumi.get(self, "token_type")
|
1205
1089
|
|
@@ -183,19 +183,18 @@ class Alphabet(pulumi.CustomResource):
|
|
183
183
|
|
184
184
|
## Example Usage
|
185
185
|
|
186
|
-
<!--Start PulumiCodeChooser -->
|
187
186
|
```python
|
188
187
|
import pulumi
|
189
188
|
import pulumi_vault as vault
|
190
189
|
|
191
|
-
mount_transform = vault.Mount("
|
190
|
+
mount_transform = vault.Mount("mount_transform",
|
192
191
|
path="transform",
|
193
192
|
type="transform")
|
194
193
|
test = vault.transform.Alphabet("test",
|
195
194
|
path=mount_transform.path,
|
195
|
+
name="numerics",
|
196
196
|
alphabet="0123456789")
|
197
197
|
```
|
198
|
-
<!--End PulumiCodeChooser -->
|
199
198
|
|
200
199
|
:param str resource_name: The name of the resource.
|
201
200
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -220,19 +219,18 @@ class Alphabet(pulumi.CustomResource):
|
|
220
219
|
|
221
220
|
## Example Usage
|
222
221
|
|
223
|
-
<!--Start PulumiCodeChooser -->
|
224
222
|
```python
|
225
223
|
import pulumi
|
226
224
|
import pulumi_vault as vault
|
227
225
|
|
228
|
-
mount_transform = vault.Mount("
|
226
|
+
mount_transform = vault.Mount("mount_transform",
|
229
227
|
path="transform",
|
230
228
|
type="transform")
|
231
229
|
test = vault.transform.Alphabet("test",
|
232
230
|
path=mount_transform.path,
|
231
|
+
name="numerics",
|
233
232
|
alphabet="0123456789")
|
234
233
|
```
|
235
|
-
<!--End PulumiCodeChooser -->
|
236
234
|
|
237
235
|
:param str resource_name: The name of the resource.
|
238
236
|
:param AlphabetArgs args: The arguments to use to populate this resource's properties.
|
@@ -142,7 +142,6 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
142
142
|
|
143
143
|
## Example Usage
|
144
144
|
|
145
|
-
<!--Start PulumiCodeChooser -->
|
146
145
|
```python
|
147
146
|
import pulumi
|
148
147
|
import pulumi_vault as vault
|
@@ -152,18 +151,19 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
152
151
|
type="transform")
|
153
152
|
ccn_fpe = vault.transform.Transformation("ccn-fpe",
|
154
153
|
path=transform.path,
|
154
|
+
name="ccn-fpe",
|
155
155
|
type="fpe",
|
156
156
|
template="builtin/creditcardnumber",
|
157
157
|
tweak_source="internal",
|
158
158
|
allowed_roles=["payments"])
|
159
159
|
payments = vault.transform.Role("payments",
|
160
160
|
path=ccn_fpe.path,
|
161
|
+
name="payments",
|
161
162
|
transformations=["ccn-fpe"])
|
162
163
|
test = vault.transform.get_decode_output(path=payments.path,
|
163
164
|
role_name="payments",
|
164
165
|
value="9300-3376-4943-8903")
|
165
166
|
```
|
166
|
-
<!--End PulumiCodeChooser -->
|
167
167
|
|
168
168
|
|
169
169
|
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|
@@ -223,7 +223,6 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
223
223
|
|
224
224
|
## Example Usage
|
225
225
|
|
226
|
-
<!--Start PulumiCodeChooser -->
|
227
226
|
```python
|
228
227
|
import pulumi
|
229
228
|
import pulumi_vault as vault
|
@@ -233,18 +232,19 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
233
232
|
type="transform")
|
234
233
|
ccn_fpe = vault.transform.Transformation("ccn-fpe",
|
235
234
|
path=transform.path,
|
235
|
+
name="ccn-fpe",
|
236
236
|
type="fpe",
|
237
237
|
template="builtin/creditcardnumber",
|
238
238
|
tweak_source="internal",
|
239
239
|
allowed_roles=["payments"])
|
240
240
|
payments = vault.transform.Role("payments",
|
241
241
|
path=ccn_fpe.path,
|
242
|
+
name="payments",
|
242
243
|
transformations=["ccn-fpe"])
|
243
244
|
test = vault.transform.get_decode_output(path=payments.path,
|
244
245
|
role_name="payments",
|
245
246
|
value="9300-3376-4943-8903")
|
246
247
|
```
|
247
|
-
<!--End PulumiCodeChooser -->
|
248
248
|
|
249
249
|
|
250
250
|
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|
@@ -142,7 +142,6 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
142
142
|
|
143
143
|
## Example Usage
|
144
144
|
|
145
|
-
<!--Start PulumiCodeChooser -->
|
146
145
|
```python
|
147
146
|
import pulumi
|
148
147
|
import pulumi_vault as vault
|
@@ -152,12 +151,14 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
152
151
|
type="transform")
|
153
152
|
ccn_fpe = vault.transform.Transformation("ccn-fpe",
|
154
153
|
path=transform.path,
|
154
|
+
name="ccn-fpe",
|
155
155
|
type="fpe",
|
156
156
|
template="builtin/creditcardnumber",
|
157
157
|
tweak_source="internal",
|
158
158
|
allowed_roles=["payments"])
|
159
159
|
payments = vault.transform.Role("payments",
|
160
160
|
path=ccn_fpe.path,
|
161
|
+
name="payments",
|
161
162
|
transformations=["ccn-fpe"])
|
162
163
|
test = vault.transform.get_encode_output(path=payments.path,
|
163
164
|
role_name="payments",
|
@@ -165,7 +166,6 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
165
166
|
"value": "1111-2222-3333-4444",
|
166
167
|
}])
|
167
168
|
```
|
168
|
-
<!--End PulumiCodeChooser -->
|
169
169
|
|
170
170
|
|
171
171
|
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|
@@ -225,7 +225,6 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
225
225
|
|
226
226
|
## Example Usage
|
227
227
|
|
228
|
-
<!--Start PulumiCodeChooser -->
|
229
228
|
```python
|
230
229
|
import pulumi
|
231
230
|
import pulumi_vault as vault
|
@@ -235,12 +234,14 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
235
234
|
type="transform")
|
236
235
|
ccn_fpe = vault.transform.Transformation("ccn-fpe",
|
237
236
|
path=transform.path,
|
237
|
+
name="ccn-fpe",
|
238
238
|
type="fpe",
|
239
239
|
template="builtin/creditcardnumber",
|
240
240
|
tweak_source="internal",
|
241
241
|
allowed_roles=["payments"])
|
242
242
|
payments = vault.transform.Role("payments",
|
243
243
|
path=ccn_fpe.path,
|
244
|
+
name="payments",
|
244
245
|
transformations=["ccn-fpe"])
|
245
246
|
test = vault.transform.get_encode_output(path=payments.path,
|
246
247
|
role_name="payments",
|
@@ -248,7 +249,6 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
248
249
|
"value": "1111-2222-3333-4444",
|
249
250
|
}])
|
250
251
|
```
|
251
|
-
<!--End PulumiCodeChooser -->
|
252
252
|
|
253
253
|
|
254
254
|
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|