pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1a1717550614__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/top_level.txt +0 -0
@@ -40,45 +40,22 @@ class AuthBackendRoleArgs:
|
|
40
40
|
The set of arguments for constructing a AuthBackendRole resource.
|
41
41
|
:param pulumi.Input[str] role: Name of the GCP role
|
42
42
|
:param pulumi.Input[str] type: Type of GCP authentication role (either `gce` or `iam`)
|
43
|
-
:param pulumi.Input[bool] allow_gce_inference: A flag to determine if this role should allow GCE instances to authenticate by inferring service accounts from the GCE identity metadata token.
|
44
43
|
:param pulumi.Input[str] backend: Path to the mounted GCP auth backend
|
45
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_instance_groups: The instance groups that an authorized instance must belong to in order to be authenticated. If specified, either `bound_zones` or `bound_regions` must be set too.
|
46
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_labels: A comma-separated list of GCP labels formatted as `"key:value"` strings that must be set on authorized GCE instances. Because GCP labels are not currently ACL'd, we recommend that this be used in conjunction with other restrictions.
|
47
44
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_projects: An array of GCP project IDs. Only entities belonging to this project can authenticate under the role.
|
48
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_regions: The list of regions that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a regional group and the group must belong to this region. If bound_zones are provided, this attribute is ignored.
|
49
45
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_service_accounts: GCP Service Accounts allowed to issue tokens under this role. (Note: **Required** if role is `iam`)
|
50
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_zones: The list of zones that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a zonal group and the group must belong to this zone.
|
51
|
-
:param pulumi.Input[str] max_jwt_exp: The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
52
46
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
53
47
|
The value should not contain leading or trailing forward slashes.
|
54
48
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
55
49
|
*Available only for Vault Enterprise*.
|
56
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
57
|
-
|
58
|
-
|
59
|
-
:param pulumi.Input[
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
:param pulumi.Input[int]
|
64
|
-
|
65
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
66
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
67
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/gcp#token_num_uses)
|
68
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
69
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
70
|
-
token generated using this role should never expire. The token should be renewed within the
|
71
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
72
|
-
value of this field. Specified in seconds.
|
73
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
74
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
75
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
76
|
-
Its current value will be referenced at renewal time.
|
77
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
78
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
79
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
80
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
81
|
-
requests a different type at generation time.
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
51
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
52
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
53
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
54
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
55
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
56
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
57
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
58
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
82
59
|
"""
|
83
60
|
pulumi.set(__self__, "role", role)
|
84
61
|
pulumi.set(__self__, "type", type)
|
@@ -159,9 +136,6 @@ class AuthBackendRoleArgs:
|
|
159
136
|
@property
|
160
137
|
@pulumi.getter(name="allowGceInference")
|
161
138
|
def allow_gce_inference(self) -> Optional[pulumi.Input[bool]]:
|
162
|
-
"""
|
163
|
-
A flag to determine if this role should allow GCE instances to authenticate by inferring service accounts from the GCE identity metadata token.
|
164
|
-
"""
|
165
139
|
return pulumi.get(self, "allow_gce_inference")
|
166
140
|
|
167
141
|
@allow_gce_inference.setter
|
@@ -183,9 +157,6 @@ class AuthBackendRoleArgs:
|
|
183
157
|
@property
|
184
158
|
@pulumi.getter(name="boundInstanceGroups")
|
185
159
|
def bound_instance_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
186
|
-
"""
|
187
|
-
The instance groups that an authorized instance must belong to in order to be authenticated. If specified, either `bound_zones` or `bound_regions` must be set too.
|
188
|
-
"""
|
189
160
|
return pulumi.get(self, "bound_instance_groups")
|
190
161
|
|
191
162
|
@bound_instance_groups.setter
|
@@ -195,9 +166,6 @@ class AuthBackendRoleArgs:
|
|
195
166
|
@property
|
196
167
|
@pulumi.getter(name="boundLabels")
|
197
168
|
def bound_labels(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
198
|
-
"""
|
199
|
-
A comma-separated list of GCP labels formatted as `"key:value"` strings that must be set on authorized GCE instances. Because GCP labels are not currently ACL'd, we recommend that this be used in conjunction with other restrictions.
|
200
|
-
"""
|
201
169
|
return pulumi.get(self, "bound_labels")
|
202
170
|
|
203
171
|
@bound_labels.setter
|
@@ -219,9 +187,6 @@ class AuthBackendRoleArgs:
|
|
219
187
|
@property
|
220
188
|
@pulumi.getter(name="boundRegions")
|
221
189
|
def bound_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
222
|
-
"""
|
223
|
-
The list of regions that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a regional group and the group must belong to this region. If bound_zones are provided, this attribute is ignored.
|
224
|
-
"""
|
225
190
|
return pulumi.get(self, "bound_regions")
|
226
191
|
|
227
192
|
@bound_regions.setter
|
@@ -243,9 +208,6 @@ class AuthBackendRoleArgs:
|
|
243
208
|
@property
|
244
209
|
@pulumi.getter(name="boundZones")
|
245
210
|
def bound_zones(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
246
|
-
"""
|
247
|
-
The list of zones that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a zonal group and the group must belong to this zone.
|
248
|
-
"""
|
249
211
|
return pulumi.get(self, "bound_zones")
|
250
212
|
|
251
213
|
@bound_zones.setter
|
@@ -255,9 +217,6 @@ class AuthBackendRoleArgs:
|
|
255
217
|
@property
|
256
218
|
@pulumi.getter(name="maxJwtExp")
|
257
219
|
def max_jwt_exp(self) -> Optional[pulumi.Input[str]]:
|
258
|
-
"""
|
259
|
-
The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
260
|
-
"""
|
261
220
|
return pulumi.get(self, "max_jwt_exp")
|
262
221
|
|
263
222
|
@max_jwt_exp.setter
|
@@ -283,9 +242,7 @@ class AuthBackendRoleArgs:
|
|
283
242
|
@pulumi.getter(name="tokenBoundCidrs")
|
284
243
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
285
244
|
"""
|
286
|
-
|
287
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
288
|
-
as well.
|
245
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
289
246
|
"""
|
290
247
|
return pulumi.get(self, "token_bound_cidrs")
|
291
248
|
|
@@ -297,10 +254,7 @@ class AuthBackendRoleArgs:
|
|
297
254
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
298
255
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
299
256
|
"""
|
300
|
-
|
301
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
302
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
303
|
-
`token_max_ttl` would otherwise allow a renewal.
|
257
|
+
Generated Token's Explicit Maximum TTL in seconds
|
304
258
|
"""
|
305
259
|
return pulumi.get(self, "token_explicit_max_ttl")
|
306
260
|
|
@@ -312,8 +266,7 @@ class AuthBackendRoleArgs:
|
|
312
266
|
@pulumi.getter(name="tokenMaxTtl")
|
313
267
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
314
268
|
"""
|
315
|
-
The maximum lifetime
|
316
|
-
Its current value will be referenced at renewal time.
|
269
|
+
The maximum lifetime of the generated token
|
317
270
|
"""
|
318
271
|
return pulumi.get(self, "token_max_ttl")
|
319
272
|
|
@@ -325,8 +278,7 @@ class AuthBackendRoleArgs:
|
|
325
278
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
326
279
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
327
280
|
"""
|
328
|
-
If
|
329
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
281
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
330
282
|
"""
|
331
283
|
return pulumi.get(self, "token_no_default_policy")
|
332
284
|
|
@@ -338,8 +290,7 @@ class AuthBackendRoleArgs:
|
|
338
290
|
@pulumi.getter(name="tokenNumUses")
|
339
291
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
340
292
|
"""
|
341
|
-
The
|
342
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
293
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
343
294
|
"""
|
344
295
|
return pulumi.get(self, "token_num_uses")
|
345
296
|
|
@@ -351,10 +302,7 @@ class AuthBackendRoleArgs:
|
|
351
302
|
@pulumi.getter(name="tokenPeriod")
|
352
303
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
353
304
|
"""
|
354
|
-
|
355
|
-
token generated using this role should never expire. The token should be renewed within the
|
356
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
357
|
-
value of this field. Specified in seconds.
|
305
|
+
Generated Token's Period
|
358
306
|
"""
|
359
307
|
return pulumi.get(self, "token_period")
|
360
308
|
|
@@ -366,8 +314,7 @@ class AuthBackendRoleArgs:
|
|
366
314
|
@pulumi.getter(name="tokenPolicies")
|
367
315
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
368
316
|
"""
|
369
|
-
|
370
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
317
|
+
Generated Token's Policies
|
371
318
|
"""
|
372
319
|
return pulumi.get(self, "token_policies")
|
373
320
|
|
@@ -379,8 +326,7 @@ class AuthBackendRoleArgs:
|
|
379
326
|
@pulumi.getter(name="tokenTtl")
|
380
327
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
381
328
|
"""
|
382
|
-
The
|
383
|
-
Its current value will be referenced at renewal time.
|
329
|
+
The initial ttl of the token to generate in seconds
|
384
330
|
"""
|
385
331
|
return pulumi.get(self, "token_ttl")
|
386
332
|
|
@@ -392,11 +338,7 @@ class AuthBackendRoleArgs:
|
|
392
338
|
@pulumi.getter(name="tokenType")
|
393
339
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
394
340
|
"""
|
395
|
-
The type of token
|
396
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
397
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
398
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
399
|
-
requests a different type at generation time.
|
341
|
+
The type of token to generate, service or batch
|
400
342
|
"""
|
401
343
|
return pulumi.get(self, "token_type")
|
402
344
|
|
@@ -432,46 +374,23 @@ class _AuthBackendRoleState:
|
|
432
374
|
type: Optional[pulumi.Input[str]] = None):
|
433
375
|
"""
|
434
376
|
Input properties used for looking up and filtering AuthBackendRole resources.
|
435
|
-
:param pulumi.Input[bool] allow_gce_inference: A flag to determine if this role should allow GCE instances to authenticate by inferring service accounts from the GCE identity metadata token.
|
436
377
|
:param pulumi.Input[str] backend: Path to the mounted GCP auth backend
|
437
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_instance_groups: The instance groups that an authorized instance must belong to in order to be authenticated. If specified, either `bound_zones` or `bound_regions` must be set too.
|
438
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_labels: A comma-separated list of GCP labels formatted as `"key:value"` strings that must be set on authorized GCE instances. Because GCP labels are not currently ACL'd, we recommend that this be used in conjunction with other restrictions.
|
439
378
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_projects: An array of GCP project IDs. Only entities belonging to this project can authenticate under the role.
|
440
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_regions: The list of regions that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a regional group and the group must belong to this region. If bound_zones are provided, this attribute is ignored.
|
441
379
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_service_accounts: GCP Service Accounts allowed to issue tokens under this role. (Note: **Required** if role is `iam`)
|
442
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_zones: The list of zones that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a zonal group and the group must belong to this zone.
|
443
|
-
:param pulumi.Input[str] max_jwt_exp: The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
444
380
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
445
381
|
The value should not contain leading or trailing forward slashes.
|
446
382
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
447
383
|
*Available only for Vault Enterprise*.
|
448
384
|
:param pulumi.Input[str] role: Name of the GCP role
|
449
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
450
|
-
|
451
|
-
|
452
|
-
:param pulumi.Input[
|
453
|
-
|
454
|
-
|
455
|
-
|
456
|
-
:param pulumi.Input[int]
|
457
|
-
|
458
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
459
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
460
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/gcp#token_num_uses)
|
461
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
462
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
463
|
-
token generated using this role should never expire. The token should be renewed within the
|
464
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
465
|
-
value of this field. Specified in seconds.
|
466
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
467
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
468
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
469
|
-
Its current value will be referenced at renewal time.
|
470
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
471
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
472
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
473
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
474
|
-
requests a different type at generation time.
|
385
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
386
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
387
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
388
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
389
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
390
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
391
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
392
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
393
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
475
394
|
:param pulumi.Input[str] type: Type of GCP authentication role (either `gce` or `iam`)
|
476
395
|
"""
|
477
396
|
if add_group_aliases is not None:
|
@@ -531,9 +450,6 @@ class _AuthBackendRoleState:
|
|
531
450
|
@property
|
532
451
|
@pulumi.getter(name="allowGceInference")
|
533
452
|
def allow_gce_inference(self) -> Optional[pulumi.Input[bool]]:
|
534
|
-
"""
|
535
|
-
A flag to determine if this role should allow GCE instances to authenticate by inferring service accounts from the GCE identity metadata token.
|
536
|
-
"""
|
537
453
|
return pulumi.get(self, "allow_gce_inference")
|
538
454
|
|
539
455
|
@allow_gce_inference.setter
|
@@ -555,9 +471,6 @@ class _AuthBackendRoleState:
|
|
555
471
|
@property
|
556
472
|
@pulumi.getter(name="boundInstanceGroups")
|
557
473
|
def bound_instance_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
558
|
-
"""
|
559
|
-
The instance groups that an authorized instance must belong to in order to be authenticated. If specified, either `bound_zones` or `bound_regions` must be set too.
|
560
|
-
"""
|
561
474
|
return pulumi.get(self, "bound_instance_groups")
|
562
475
|
|
563
476
|
@bound_instance_groups.setter
|
@@ -567,9 +480,6 @@ class _AuthBackendRoleState:
|
|
567
480
|
@property
|
568
481
|
@pulumi.getter(name="boundLabels")
|
569
482
|
def bound_labels(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
570
|
-
"""
|
571
|
-
A comma-separated list of GCP labels formatted as `"key:value"` strings that must be set on authorized GCE instances. Because GCP labels are not currently ACL'd, we recommend that this be used in conjunction with other restrictions.
|
572
|
-
"""
|
573
483
|
return pulumi.get(self, "bound_labels")
|
574
484
|
|
575
485
|
@bound_labels.setter
|
@@ -591,9 +501,6 @@ class _AuthBackendRoleState:
|
|
591
501
|
@property
|
592
502
|
@pulumi.getter(name="boundRegions")
|
593
503
|
def bound_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
594
|
-
"""
|
595
|
-
The list of regions that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a regional group and the group must belong to this region. If bound_zones are provided, this attribute is ignored.
|
596
|
-
"""
|
597
504
|
return pulumi.get(self, "bound_regions")
|
598
505
|
|
599
506
|
@bound_regions.setter
|
@@ -615,9 +522,6 @@ class _AuthBackendRoleState:
|
|
615
522
|
@property
|
616
523
|
@pulumi.getter(name="boundZones")
|
617
524
|
def bound_zones(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
618
|
-
"""
|
619
|
-
The list of zones that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a zonal group and the group must belong to this zone.
|
620
|
-
"""
|
621
525
|
return pulumi.get(self, "bound_zones")
|
622
526
|
|
623
527
|
@bound_zones.setter
|
@@ -627,9 +531,6 @@ class _AuthBackendRoleState:
|
|
627
531
|
@property
|
628
532
|
@pulumi.getter(name="maxJwtExp")
|
629
533
|
def max_jwt_exp(self) -> Optional[pulumi.Input[str]]:
|
630
|
-
"""
|
631
|
-
The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
632
|
-
"""
|
633
534
|
return pulumi.get(self, "max_jwt_exp")
|
634
535
|
|
635
536
|
@max_jwt_exp.setter
|
@@ -667,9 +568,7 @@ class _AuthBackendRoleState:
|
|
667
568
|
@pulumi.getter(name="tokenBoundCidrs")
|
668
569
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
669
570
|
"""
|
670
|
-
|
671
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
672
|
-
as well.
|
571
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
673
572
|
"""
|
674
573
|
return pulumi.get(self, "token_bound_cidrs")
|
675
574
|
|
@@ -681,10 +580,7 @@ class _AuthBackendRoleState:
|
|
681
580
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
682
581
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
683
582
|
"""
|
684
|
-
|
685
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
686
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
687
|
-
`token_max_ttl` would otherwise allow a renewal.
|
583
|
+
Generated Token's Explicit Maximum TTL in seconds
|
688
584
|
"""
|
689
585
|
return pulumi.get(self, "token_explicit_max_ttl")
|
690
586
|
|
@@ -696,8 +592,7 @@ class _AuthBackendRoleState:
|
|
696
592
|
@pulumi.getter(name="tokenMaxTtl")
|
697
593
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
698
594
|
"""
|
699
|
-
The maximum lifetime
|
700
|
-
Its current value will be referenced at renewal time.
|
595
|
+
The maximum lifetime of the generated token
|
701
596
|
"""
|
702
597
|
return pulumi.get(self, "token_max_ttl")
|
703
598
|
|
@@ -709,8 +604,7 @@ class _AuthBackendRoleState:
|
|
709
604
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
710
605
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
711
606
|
"""
|
712
|
-
If
|
713
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
607
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
714
608
|
"""
|
715
609
|
return pulumi.get(self, "token_no_default_policy")
|
716
610
|
|
@@ -722,8 +616,7 @@ class _AuthBackendRoleState:
|
|
722
616
|
@pulumi.getter(name="tokenNumUses")
|
723
617
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
724
618
|
"""
|
725
|
-
The
|
726
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
619
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
727
620
|
"""
|
728
621
|
return pulumi.get(self, "token_num_uses")
|
729
622
|
|
@@ -735,10 +628,7 @@ class _AuthBackendRoleState:
|
|
735
628
|
@pulumi.getter(name="tokenPeriod")
|
736
629
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
737
630
|
"""
|
738
|
-
|
739
|
-
token generated using this role should never expire. The token should be renewed within the
|
740
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
741
|
-
value of this field. Specified in seconds.
|
631
|
+
Generated Token's Period
|
742
632
|
"""
|
743
633
|
return pulumi.get(self, "token_period")
|
744
634
|
|
@@ -750,8 +640,7 @@ class _AuthBackendRoleState:
|
|
750
640
|
@pulumi.getter(name="tokenPolicies")
|
751
641
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
752
642
|
"""
|
753
|
-
|
754
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
643
|
+
Generated Token's Policies
|
755
644
|
"""
|
756
645
|
return pulumi.get(self, "token_policies")
|
757
646
|
|
@@ -763,8 +652,7 @@ class _AuthBackendRoleState:
|
|
763
652
|
@pulumi.getter(name="tokenTtl")
|
764
653
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
765
654
|
"""
|
766
|
-
The
|
767
|
-
Its current value will be referenced at renewal time.
|
655
|
+
The initial ttl of the token to generate in seconds
|
768
656
|
"""
|
769
657
|
return pulumi.get(self, "token_ttl")
|
770
658
|
|
@@ -776,11 +664,7 @@ class _AuthBackendRoleState:
|
|
776
664
|
@pulumi.getter(name="tokenType")
|
777
665
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
778
666
|
"""
|
779
|
-
The type of token
|
780
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
781
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
782
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
783
|
-
requests a different type at generation time.
|
667
|
+
The type of token to generate, service or batch
|
784
668
|
"""
|
785
669
|
return pulumi.get(self, "token_type")
|
786
670
|
|
@@ -834,7 +718,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
834
718
|
|
835
719
|
## Example Usage
|
836
720
|
|
837
|
-
<!--Start PulumiCodeChooser -->
|
838
721
|
```python
|
839
722
|
import pulumi
|
840
723
|
import pulumi_vault as vault
|
@@ -856,7 +739,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
856
739
|
],
|
857
740
|
add_group_aliases=True)
|
858
741
|
```
|
859
|
-
<!--End PulumiCodeChooser -->
|
860
742
|
|
861
743
|
## Import
|
862
744
|
|
@@ -868,46 +750,23 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
868
750
|
|
869
751
|
:param str resource_name: The name of the resource.
|
870
752
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
871
|
-
:param pulumi.Input[bool] allow_gce_inference: A flag to determine if this role should allow GCE instances to authenticate by inferring service accounts from the GCE identity metadata token.
|
872
753
|
:param pulumi.Input[str] backend: Path to the mounted GCP auth backend
|
873
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_instance_groups: The instance groups that an authorized instance must belong to in order to be authenticated. If specified, either `bound_zones` or `bound_regions` must be set too.
|
874
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_labels: A comma-separated list of GCP labels formatted as `"key:value"` strings that must be set on authorized GCE instances. Because GCP labels are not currently ACL'd, we recommend that this be used in conjunction with other restrictions.
|
875
754
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_projects: An array of GCP project IDs. Only entities belonging to this project can authenticate under the role.
|
876
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_regions: The list of regions that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a regional group and the group must belong to this region. If bound_zones are provided, this attribute is ignored.
|
877
755
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_service_accounts: GCP Service Accounts allowed to issue tokens under this role. (Note: **Required** if role is `iam`)
|
878
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_zones: The list of zones that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a zonal group and the group must belong to this zone.
|
879
|
-
:param pulumi.Input[str] max_jwt_exp: The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
880
756
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
881
757
|
The value should not contain leading or trailing forward slashes.
|
882
758
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
883
759
|
*Available only for Vault Enterprise*.
|
884
760
|
:param pulumi.Input[str] role: Name of the GCP role
|
885
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
886
|
-
|
887
|
-
|
888
|
-
:param pulumi.Input[
|
889
|
-
|
890
|
-
|
891
|
-
|
892
|
-
:param pulumi.Input[int]
|
893
|
-
|
894
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
895
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
896
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/gcp#token_num_uses)
|
897
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
898
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
899
|
-
token generated using this role should never expire. The token should be renewed within the
|
900
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
901
|
-
value of this field. Specified in seconds.
|
902
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
903
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
904
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
905
|
-
Its current value will be referenced at renewal time.
|
906
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
907
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
908
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
909
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
910
|
-
requests a different type at generation time.
|
761
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
762
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
763
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
764
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
765
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
766
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
767
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
768
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
769
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
911
770
|
:param pulumi.Input[str] type: Type of GCP authentication role (either `gce` or `iam`)
|
912
771
|
"""
|
913
772
|
...
|
@@ -921,7 +780,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
921
780
|
|
922
781
|
## Example Usage
|
923
782
|
|
924
|
-
<!--Start PulumiCodeChooser -->
|
925
783
|
```python
|
926
784
|
import pulumi
|
927
785
|
import pulumi_vault as vault
|
@@ -943,7 +801,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
943
801
|
],
|
944
802
|
add_group_aliases=True)
|
945
803
|
```
|
946
|
-
<!--End PulumiCodeChooser -->
|
947
804
|
|
948
805
|
## Import
|
949
806
|
|
@@ -1064,46 +921,23 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1064
921
|
:param str resource_name: The unique name of the resulting resource.
|
1065
922
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1066
923
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1067
|
-
:param pulumi.Input[bool] allow_gce_inference: A flag to determine if this role should allow GCE instances to authenticate by inferring service accounts from the GCE identity metadata token.
|
1068
924
|
:param pulumi.Input[str] backend: Path to the mounted GCP auth backend
|
1069
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_instance_groups: The instance groups that an authorized instance must belong to in order to be authenticated. If specified, either `bound_zones` or `bound_regions` must be set too.
|
1070
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_labels: A comma-separated list of GCP labels formatted as `"key:value"` strings that must be set on authorized GCE instances. Because GCP labels are not currently ACL'd, we recommend that this be used in conjunction with other restrictions.
|
1071
925
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_projects: An array of GCP project IDs. Only entities belonging to this project can authenticate under the role.
|
1072
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_regions: The list of regions that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a regional group and the group must belong to this region. If bound_zones are provided, this attribute is ignored.
|
1073
926
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_service_accounts: GCP Service Accounts allowed to issue tokens under this role. (Note: **Required** if role is `iam`)
|
1074
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_zones: The list of zones that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a zonal group and the group must belong to this zone.
|
1075
|
-
:param pulumi.Input[str] max_jwt_exp: The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
1076
927
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1077
928
|
The value should not contain leading or trailing forward slashes.
|
1078
929
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1079
930
|
*Available only for Vault Enterprise*.
|
1080
931
|
:param pulumi.Input[str] role: Name of the GCP role
|
1081
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1082
|
-
|
1083
|
-
|
1084
|
-
:param pulumi.Input[
|
1085
|
-
|
1086
|
-
|
1087
|
-
|
1088
|
-
:param pulumi.Input[int]
|
1089
|
-
|
1090
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1091
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1092
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/gcp#token_num_uses)
|
1093
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1094
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1095
|
-
token generated using this role should never expire. The token should be renewed within the
|
1096
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1097
|
-
value of this field. Specified in seconds.
|
1098
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1099
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1100
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1101
|
-
Its current value will be referenced at renewal time.
|
1102
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1103
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1104
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1105
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1106
|
-
requests a different type at generation time.
|
932
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
933
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
934
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
935
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
936
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
937
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
938
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
939
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
940
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1107
941
|
:param pulumi.Input[str] type: Type of GCP authentication role (either `gce` or `iam`)
|
1108
942
|
"""
|
1109
943
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -1142,9 +976,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1142
976
|
@property
|
1143
977
|
@pulumi.getter(name="allowGceInference")
|
1144
978
|
def allow_gce_inference(self) -> pulumi.Output[bool]:
|
1145
|
-
"""
|
1146
|
-
A flag to determine if this role should allow GCE instances to authenticate by inferring service accounts from the GCE identity metadata token.
|
1147
|
-
"""
|
1148
979
|
return pulumi.get(self, "allow_gce_inference")
|
1149
980
|
|
1150
981
|
@property
|
@@ -1158,17 +989,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1158
989
|
@property
|
1159
990
|
@pulumi.getter(name="boundInstanceGroups")
|
1160
991
|
def bound_instance_groups(self) -> pulumi.Output[Sequence[str]]:
|
1161
|
-
"""
|
1162
|
-
The instance groups that an authorized instance must belong to in order to be authenticated. If specified, either `bound_zones` or `bound_regions` must be set too.
|
1163
|
-
"""
|
1164
992
|
return pulumi.get(self, "bound_instance_groups")
|
1165
993
|
|
1166
994
|
@property
|
1167
995
|
@pulumi.getter(name="boundLabels")
|
1168
996
|
def bound_labels(self) -> pulumi.Output[Sequence[str]]:
|
1169
|
-
"""
|
1170
|
-
A comma-separated list of GCP labels formatted as `"key:value"` strings that must be set on authorized GCE instances. Because GCP labels are not currently ACL'd, we recommend that this be used in conjunction with other restrictions.
|
1171
|
-
"""
|
1172
997
|
return pulumi.get(self, "bound_labels")
|
1173
998
|
|
1174
999
|
@property
|
@@ -1182,9 +1007,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1182
1007
|
@property
|
1183
1008
|
@pulumi.getter(name="boundRegions")
|
1184
1009
|
def bound_regions(self) -> pulumi.Output[Sequence[str]]:
|
1185
|
-
"""
|
1186
|
-
The list of regions that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a regional group and the group must belong to this region. If bound_zones are provided, this attribute is ignored.
|
1187
|
-
"""
|
1188
1010
|
return pulumi.get(self, "bound_regions")
|
1189
1011
|
|
1190
1012
|
@property
|
@@ -1198,17 +1020,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1198
1020
|
@property
|
1199
1021
|
@pulumi.getter(name="boundZones")
|
1200
1022
|
def bound_zones(self) -> pulumi.Output[Sequence[str]]:
|
1201
|
-
"""
|
1202
|
-
The list of zones that a GCE instance must belong to in order to be authenticated. If bound_instance_groups is provided, it is assumed to be a zonal group and the group must belong to this zone.
|
1203
|
-
"""
|
1204
1023
|
return pulumi.get(self, "bound_zones")
|
1205
1024
|
|
1206
1025
|
@property
|
1207
1026
|
@pulumi.getter(name="maxJwtExp")
|
1208
1027
|
def max_jwt_exp(self) -> pulumi.Output[str]:
|
1209
|
-
"""
|
1210
|
-
The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
1211
|
-
"""
|
1212
1028
|
return pulumi.get(self, "max_jwt_exp")
|
1213
1029
|
|
1214
1030
|
@property
|
@@ -1234,9 +1050,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1234
1050
|
@pulumi.getter(name="tokenBoundCidrs")
|
1235
1051
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1236
1052
|
"""
|
1237
|
-
|
1238
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1239
|
-
as well.
|
1053
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1240
1054
|
"""
|
1241
1055
|
return pulumi.get(self, "token_bound_cidrs")
|
1242
1056
|
|
@@ -1244,10 +1058,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1244
1058
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1245
1059
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1246
1060
|
"""
|
1247
|
-
|
1248
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1249
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1250
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1061
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1251
1062
|
"""
|
1252
1063
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1253
1064
|
|
@@ -1255,8 +1066,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1255
1066
|
@pulumi.getter(name="tokenMaxTtl")
|
1256
1067
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1257
1068
|
"""
|
1258
|
-
The maximum lifetime
|
1259
|
-
Its current value will be referenced at renewal time.
|
1069
|
+
The maximum lifetime of the generated token
|
1260
1070
|
"""
|
1261
1071
|
return pulumi.get(self, "token_max_ttl")
|
1262
1072
|
|
@@ -1264,8 +1074,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1264
1074
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1265
1075
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1266
1076
|
"""
|
1267
|
-
If
|
1268
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1077
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1269
1078
|
"""
|
1270
1079
|
return pulumi.get(self, "token_no_default_policy")
|
1271
1080
|
|
@@ -1273,8 +1082,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1273
1082
|
@pulumi.getter(name="tokenNumUses")
|
1274
1083
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1275
1084
|
"""
|
1276
|
-
The
|
1277
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1085
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1278
1086
|
"""
|
1279
1087
|
return pulumi.get(self, "token_num_uses")
|
1280
1088
|
|
@@ -1282,10 +1090,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1282
1090
|
@pulumi.getter(name="tokenPeriod")
|
1283
1091
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1284
1092
|
"""
|
1285
|
-
|
1286
|
-
token generated using this role should never expire. The token should be renewed within the
|
1287
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1288
|
-
value of this field. Specified in seconds.
|
1093
|
+
Generated Token's Period
|
1289
1094
|
"""
|
1290
1095
|
return pulumi.get(self, "token_period")
|
1291
1096
|
|
@@ -1293,8 +1098,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1293
1098
|
@pulumi.getter(name="tokenPolicies")
|
1294
1099
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1295
1100
|
"""
|
1296
|
-
|
1297
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1101
|
+
Generated Token's Policies
|
1298
1102
|
"""
|
1299
1103
|
return pulumi.get(self, "token_policies")
|
1300
1104
|
|
@@ -1302,8 +1106,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1302
1106
|
@pulumi.getter(name="tokenTtl")
|
1303
1107
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1304
1108
|
"""
|
1305
|
-
The
|
1306
|
-
Its current value will be referenced at renewal time.
|
1109
|
+
The initial ttl of the token to generate in seconds
|
1307
1110
|
"""
|
1308
1111
|
return pulumi.get(self, "token_ttl")
|
1309
1112
|
|
@@ -1311,11 +1114,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1311
1114
|
@pulumi.getter(name="tokenType")
|
1312
1115
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1313
1116
|
"""
|
1314
|
-
The type of token
|
1315
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1316
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1317
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1318
|
-
requests a different type at generation time.
|
1117
|
+
The type of token to generate, service or batch
|
1319
1118
|
"""
|
1320
1119
|
return pulumi.get(self, "token_type")
|
1321
1120
|
|