pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1a1717550614__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/top_level.txt +0 -0
pulumi_vault/rgp_policy.py
CHANGED
@@ -182,20 +182,18 @@ class RgpPolicy(pulumi.CustomResource):
|
|
182
182
|
|
183
183
|
## Example Usage
|
184
184
|
|
185
|
-
<!--Start PulumiCodeChooser -->
|
186
185
|
```python
|
187
186
|
import pulumi
|
188
187
|
import pulumi_vault as vault
|
189
188
|
|
190
189
|
allow_all = vault.RgpPolicy("allow-all",
|
190
|
+
name="allow-all",
|
191
191
|
enforcement_level="soft-mandatory",
|
192
192
|
policy=\"\"\"main = rule {
|
193
193
|
true
|
194
194
|
}
|
195
|
-
|
196
195
|
\"\"\")
|
197
196
|
```
|
198
|
-
<!--End PulumiCodeChooser -->
|
199
197
|
|
200
198
|
:param str resource_name: The name of the resource.
|
201
199
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -220,20 +218,18 @@ class RgpPolicy(pulumi.CustomResource):
|
|
220
218
|
|
221
219
|
## Example Usage
|
222
220
|
|
223
|
-
<!--Start PulumiCodeChooser -->
|
224
221
|
```python
|
225
222
|
import pulumi
|
226
223
|
import pulumi_vault as vault
|
227
224
|
|
228
225
|
allow_all = vault.RgpPolicy("allow-all",
|
226
|
+
name="allow-all",
|
229
227
|
enforcement_level="soft-mandatory",
|
230
228
|
policy=\"\"\"main = rule {
|
231
229
|
true
|
232
230
|
}
|
233
|
-
|
234
231
|
\"\"\")
|
235
232
|
```
|
236
|
-
<!--End PulumiCodeChooser -->
|
237
233
|
|
238
234
|
:param str resource_name: The name of the resource.
|
239
235
|
:param RgpPolicyArgs args: The arguments to use to populate this resource's properties.
|
@@ -445,19 +445,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
445
445
|
|
446
446
|
## Example Usage
|
447
447
|
|
448
|
-
<!--Start PulumiCodeChooser -->
|
449
448
|
```python
|
450
449
|
import pulumi
|
451
450
|
import pulumi_vault as vault
|
452
451
|
|
453
452
|
test = vault.saml.AuthBackend("test",
|
454
|
-
|
455
|
-
default_role="admin",
|
456
|
-
entity_id="https://my.vault/v1/auth/saml",
|
453
|
+
path="saml",
|
457
454
|
idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
|
458
|
-
|
455
|
+
entity_id="https://my.vault/v1/auth/saml",
|
456
|
+
acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
|
457
|
+
default_role="admin")
|
459
458
|
```
|
460
|
-
<!--End PulumiCodeChooser -->
|
461
459
|
|
462
460
|
## Import
|
463
461
|
|
@@ -505,19 +503,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
505
503
|
|
506
504
|
## Example Usage
|
507
505
|
|
508
|
-
<!--Start PulumiCodeChooser -->
|
509
506
|
```python
|
510
507
|
import pulumi
|
511
508
|
import pulumi_vault as vault
|
512
509
|
|
513
510
|
test = vault.saml.AuthBackend("test",
|
514
|
-
|
515
|
-
default_role="admin",
|
516
|
-
entity_id="https://my.vault/v1/auth/saml",
|
511
|
+
path="saml",
|
517
512
|
idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
|
518
|
-
|
513
|
+
entity_id="https://my.vault/v1/auth/saml",
|
514
|
+
acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
|
515
|
+
default_role="admin")
|
519
516
|
```
|
520
|
-
<!--End PulumiCodeChooser -->
|
521
517
|
|
522
518
|
## Import
|
523
519
|
|
@@ -47,31 +47,15 @@ class AuthBackendRoleArgs:
|
|
47
47
|
The value should not contain leading or trailing forward slashes.
|
48
48
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
49
49
|
*Available only for Vault Enterprise*.
|
50
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
51
|
-
|
52
|
-
|
53
|
-
:param pulumi.Input[
|
54
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
55
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
56
|
-
`token_max_ttl` would otherwise allow a renewal.
|
57
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
58
|
-
Its current value will be referenced at renewal time.
|
59
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
60
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
51
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
52
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
53
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
61
54
|
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
62
|
-
:param pulumi.Input[int] token_period:
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
67
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
68
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
69
|
-
Its current value will be referenced at renewal time.
|
70
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
71
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
72
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
73
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
74
|
-
requests a different type at generation time.
|
55
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
56
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
57
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
58
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
75
59
|
"""
|
76
60
|
pulumi.set(__self__, "path", path)
|
77
61
|
if bound_attributes is not None:
|
@@ -213,9 +197,7 @@ class AuthBackendRoleArgs:
|
|
213
197
|
@pulumi.getter(name="tokenBoundCidrs")
|
214
198
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
215
199
|
"""
|
216
|
-
|
217
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
218
|
-
as well.
|
200
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
219
201
|
"""
|
220
202
|
return pulumi.get(self, "token_bound_cidrs")
|
221
203
|
|
@@ -227,10 +209,7 @@ class AuthBackendRoleArgs:
|
|
227
209
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
228
210
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
229
211
|
"""
|
230
|
-
|
231
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
232
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
233
|
-
`token_max_ttl` would otherwise allow a renewal.
|
212
|
+
Generated Token's Explicit Maximum TTL in seconds
|
234
213
|
"""
|
235
214
|
return pulumi.get(self, "token_explicit_max_ttl")
|
236
215
|
|
@@ -242,8 +221,7 @@ class AuthBackendRoleArgs:
|
|
242
221
|
@pulumi.getter(name="tokenMaxTtl")
|
243
222
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
244
223
|
"""
|
245
|
-
The maximum lifetime
|
246
|
-
Its current value will be referenced at renewal time.
|
224
|
+
The maximum lifetime of the generated token
|
247
225
|
"""
|
248
226
|
return pulumi.get(self, "token_max_ttl")
|
249
227
|
|
@@ -255,8 +233,7 @@ class AuthBackendRoleArgs:
|
|
255
233
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
256
234
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
257
235
|
"""
|
258
|
-
If
|
259
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
236
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
260
237
|
"""
|
261
238
|
return pulumi.get(self, "token_no_default_policy")
|
262
239
|
|
@@ -280,10 +257,7 @@ class AuthBackendRoleArgs:
|
|
280
257
|
@pulumi.getter(name="tokenPeriod")
|
281
258
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
282
259
|
"""
|
283
|
-
|
284
|
-
token generated using this role should never expire. The token should be renewed within the
|
285
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
286
|
-
value of this field. Specified in seconds.
|
260
|
+
Generated Token's Period
|
287
261
|
"""
|
288
262
|
return pulumi.get(self, "token_period")
|
289
263
|
|
@@ -295,8 +269,7 @@ class AuthBackendRoleArgs:
|
|
295
269
|
@pulumi.getter(name="tokenPolicies")
|
296
270
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
297
271
|
"""
|
298
|
-
|
299
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
272
|
+
Generated Token's Policies
|
300
273
|
"""
|
301
274
|
return pulumi.get(self, "token_policies")
|
302
275
|
|
@@ -308,8 +281,7 @@ class AuthBackendRoleArgs:
|
|
308
281
|
@pulumi.getter(name="tokenTtl")
|
309
282
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
310
283
|
"""
|
311
|
-
The
|
312
|
-
Its current value will be referenced at renewal time.
|
284
|
+
The initial ttl of the token to generate in seconds
|
313
285
|
"""
|
314
286
|
return pulumi.get(self, "token_ttl")
|
315
287
|
|
@@ -321,11 +293,7 @@ class AuthBackendRoleArgs:
|
|
321
293
|
@pulumi.getter(name="tokenType")
|
322
294
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
323
295
|
"""
|
324
|
-
The type of token
|
325
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
326
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
327
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
328
|
-
requests a different type at generation time.
|
296
|
+
The type of token to generate, service or batch
|
329
297
|
"""
|
330
298
|
return pulumi.get(self, "token_type")
|
331
299
|
|
@@ -370,31 +338,15 @@ class _AuthBackendRoleState:
|
|
370
338
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
371
339
|
*Available only for Vault Enterprise*.
|
372
340
|
:param pulumi.Input[str] path: Path where the auth backend is mounted.
|
373
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
374
|
-
|
375
|
-
|
376
|
-
:param pulumi.Input[
|
377
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
378
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
379
|
-
`token_max_ttl` would otherwise allow a renewal.
|
380
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
381
|
-
Its current value will be referenced at renewal time.
|
382
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
383
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
341
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
342
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
343
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
344
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
384
345
|
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
385
|
-
:param pulumi.Input[int] token_period:
|
386
|
-
|
387
|
-
|
388
|
-
|
389
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
390
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
391
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
392
|
-
Its current value will be referenced at renewal time.
|
393
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
394
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
395
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
396
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
397
|
-
requests a different type at generation time.
|
346
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
347
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
348
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
349
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
398
350
|
"""
|
399
351
|
if bound_attributes is not None:
|
400
352
|
pulumi.set(__self__, "bound_attributes", bound_attributes)
|
@@ -537,9 +489,7 @@ class _AuthBackendRoleState:
|
|
537
489
|
@pulumi.getter(name="tokenBoundCidrs")
|
538
490
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
539
491
|
"""
|
540
|
-
|
541
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
542
|
-
as well.
|
492
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
543
493
|
"""
|
544
494
|
return pulumi.get(self, "token_bound_cidrs")
|
545
495
|
|
@@ -551,10 +501,7 @@ class _AuthBackendRoleState:
|
|
551
501
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
552
502
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
553
503
|
"""
|
554
|
-
|
555
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
556
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
557
|
-
`token_max_ttl` would otherwise allow a renewal.
|
504
|
+
Generated Token's Explicit Maximum TTL in seconds
|
558
505
|
"""
|
559
506
|
return pulumi.get(self, "token_explicit_max_ttl")
|
560
507
|
|
@@ -566,8 +513,7 @@ class _AuthBackendRoleState:
|
|
566
513
|
@pulumi.getter(name="tokenMaxTtl")
|
567
514
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
568
515
|
"""
|
569
|
-
The maximum lifetime
|
570
|
-
Its current value will be referenced at renewal time.
|
516
|
+
The maximum lifetime of the generated token
|
571
517
|
"""
|
572
518
|
return pulumi.get(self, "token_max_ttl")
|
573
519
|
|
@@ -579,8 +525,7 @@ class _AuthBackendRoleState:
|
|
579
525
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
580
526
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
581
527
|
"""
|
582
|
-
If
|
583
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
528
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
584
529
|
"""
|
585
530
|
return pulumi.get(self, "token_no_default_policy")
|
586
531
|
|
@@ -604,10 +549,7 @@ class _AuthBackendRoleState:
|
|
604
549
|
@pulumi.getter(name="tokenPeriod")
|
605
550
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
606
551
|
"""
|
607
|
-
|
608
|
-
token generated using this role should never expire. The token should be renewed within the
|
609
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
610
|
-
value of this field. Specified in seconds.
|
552
|
+
Generated Token's Period
|
611
553
|
"""
|
612
554
|
return pulumi.get(self, "token_period")
|
613
555
|
|
@@ -619,8 +561,7 @@ class _AuthBackendRoleState:
|
|
619
561
|
@pulumi.getter(name="tokenPolicies")
|
620
562
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
621
563
|
"""
|
622
|
-
|
623
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
564
|
+
Generated Token's Policies
|
624
565
|
"""
|
625
566
|
return pulumi.get(self, "token_policies")
|
626
567
|
|
@@ -632,8 +573,7 @@ class _AuthBackendRoleState:
|
|
632
573
|
@pulumi.getter(name="tokenTtl")
|
633
574
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
634
575
|
"""
|
635
|
-
The
|
636
|
-
Its current value will be referenced at renewal time.
|
576
|
+
The initial ttl of the token to generate in seconds
|
637
577
|
"""
|
638
578
|
return pulumi.get(self, "token_ttl")
|
639
579
|
|
@@ -645,11 +585,7 @@ class _AuthBackendRoleState:
|
|
645
585
|
@pulumi.getter(name="tokenType")
|
646
586
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
647
587
|
"""
|
648
|
-
The type of token
|
649
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
650
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
651
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
652
|
-
requests a different type at generation time.
|
588
|
+
The type of token to generate, service or batch
|
653
589
|
"""
|
654
590
|
return pulumi.get(self, "token_type")
|
655
591
|
|
@@ -688,19 +624,19 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
688
624
|
|
689
625
|
## Example Usage
|
690
626
|
|
691
|
-
<!--Start PulumiCodeChooser -->
|
692
627
|
```python
|
693
628
|
import pulumi
|
694
629
|
import pulumi_vault as vault
|
695
630
|
|
696
|
-
|
631
|
+
example = vault.saml.AuthBackend("example",
|
697
632
|
path="saml",
|
698
633
|
idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
|
699
634
|
entity_id="https://my.vault/v1/auth/saml",
|
700
635
|
acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
|
701
636
|
default_role="default-role")
|
702
|
-
example_auth_backend_role = vault.saml.AuthBackendRole("
|
703
|
-
path=
|
637
|
+
example_auth_backend_role = vault.saml.AuthBackendRole("example",
|
638
|
+
path=example.path,
|
639
|
+
name="my-role",
|
704
640
|
groups_attribute="groups",
|
705
641
|
bound_attributes={
|
706
642
|
"group": "admin",
|
@@ -709,7 +645,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
709
645
|
token_policies=["writer"],
|
710
646
|
token_ttl=86400)
|
711
647
|
```
|
712
|
-
<!--End PulumiCodeChooser -->
|
713
648
|
|
714
649
|
## Import
|
715
650
|
|
@@ -735,31 +670,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
735
670
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
736
671
|
*Available only for Vault Enterprise*.
|
737
672
|
:param pulumi.Input[str] path: Path where the auth backend is mounted.
|
738
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
739
|
-
|
740
|
-
|
741
|
-
:param pulumi.Input[
|
742
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
743
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
744
|
-
`token_max_ttl` would otherwise allow a renewal.
|
745
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
746
|
-
Its current value will be referenced at renewal time.
|
747
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
748
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
673
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
674
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
675
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
676
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
749
677
|
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
750
|
-
:param pulumi.Input[int] token_period:
|
751
|
-
|
752
|
-
|
753
|
-
|
754
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
755
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
756
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
757
|
-
Its current value will be referenced at renewal time.
|
758
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
759
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
760
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
761
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
762
|
-
requests a different type at generation time.
|
678
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
679
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
680
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
681
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
763
682
|
"""
|
764
683
|
...
|
765
684
|
@overload
|
@@ -774,19 +693,19 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
774
693
|
|
775
694
|
## Example Usage
|
776
695
|
|
777
|
-
<!--Start PulumiCodeChooser -->
|
778
696
|
```python
|
779
697
|
import pulumi
|
780
698
|
import pulumi_vault as vault
|
781
699
|
|
782
|
-
|
700
|
+
example = vault.saml.AuthBackend("example",
|
783
701
|
path="saml",
|
784
702
|
idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
|
785
703
|
entity_id="https://my.vault/v1/auth/saml",
|
786
704
|
acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
|
787
705
|
default_role="default-role")
|
788
|
-
example_auth_backend_role = vault.saml.AuthBackendRole("
|
789
|
-
path=
|
706
|
+
example_auth_backend_role = vault.saml.AuthBackendRole("example",
|
707
|
+
path=example.path,
|
708
|
+
name="my-role",
|
790
709
|
groups_attribute="groups",
|
791
710
|
bound_attributes={
|
792
711
|
"group": "admin",
|
@@ -795,7 +714,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
795
714
|
token_policies=["writer"],
|
796
715
|
token_ttl=86400)
|
797
716
|
```
|
798
|
-
<!--End PulumiCodeChooser -->
|
799
717
|
|
800
718
|
## Import
|
801
719
|
|
@@ -913,31 +831,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
913
831
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
914
832
|
*Available only for Vault Enterprise*.
|
915
833
|
:param pulumi.Input[str] path: Path where the auth backend is mounted.
|
916
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
917
|
-
|
918
|
-
|
919
|
-
:param pulumi.Input[
|
920
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
921
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
922
|
-
`token_max_ttl` would otherwise allow a renewal.
|
923
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
924
|
-
Its current value will be referenced at renewal time.
|
925
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
926
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
834
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
835
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
836
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
837
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
927
838
|
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
928
|
-
:param pulumi.Input[int] token_period:
|
929
|
-
|
930
|
-
|
931
|
-
|
932
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
933
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
934
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
935
|
-
Its current value will be referenced at renewal time.
|
936
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
937
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
938
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
939
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
940
|
-
requests a different type at generation time.
|
839
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
840
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
841
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
842
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
941
843
|
"""
|
942
844
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
943
845
|
|
@@ -1036,9 +938,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1036
938
|
@pulumi.getter(name="tokenBoundCidrs")
|
1037
939
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1038
940
|
"""
|
1039
|
-
|
1040
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1041
|
-
as well.
|
941
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1042
942
|
"""
|
1043
943
|
return pulumi.get(self, "token_bound_cidrs")
|
1044
944
|
|
@@ -1046,10 +946,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1046
946
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1047
947
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1048
948
|
"""
|
1049
|
-
|
1050
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1051
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1052
|
-
`token_max_ttl` would otherwise allow a renewal.
|
949
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1053
950
|
"""
|
1054
951
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1055
952
|
|
@@ -1057,8 +954,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1057
954
|
@pulumi.getter(name="tokenMaxTtl")
|
1058
955
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1059
956
|
"""
|
1060
|
-
The maximum lifetime
|
1061
|
-
Its current value will be referenced at renewal time.
|
957
|
+
The maximum lifetime of the generated token
|
1062
958
|
"""
|
1063
959
|
return pulumi.get(self, "token_max_ttl")
|
1064
960
|
|
@@ -1066,8 +962,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1066
962
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1067
963
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1068
964
|
"""
|
1069
|
-
If
|
1070
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
965
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1071
966
|
"""
|
1072
967
|
return pulumi.get(self, "token_no_default_policy")
|
1073
968
|
|
@@ -1083,10 +978,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1083
978
|
@pulumi.getter(name="tokenPeriod")
|
1084
979
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1085
980
|
"""
|
1086
|
-
|
1087
|
-
token generated using this role should never expire. The token should be renewed within the
|
1088
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1089
|
-
value of this field. Specified in seconds.
|
981
|
+
Generated Token's Period
|
1090
982
|
"""
|
1091
983
|
return pulumi.get(self, "token_period")
|
1092
984
|
|
@@ -1094,8 +986,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1094
986
|
@pulumi.getter(name="tokenPolicies")
|
1095
987
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1096
988
|
"""
|
1097
|
-
|
1098
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
989
|
+
Generated Token's Policies
|
1099
990
|
"""
|
1100
991
|
return pulumi.get(self, "token_policies")
|
1101
992
|
|
@@ -1103,8 +994,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1103
994
|
@pulumi.getter(name="tokenTtl")
|
1104
995
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1105
996
|
"""
|
1106
|
-
The
|
1107
|
-
Its current value will be referenced at renewal time.
|
997
|
+
The initial ttl of the token to generate in seconds
|
1108
998
|
"""
|
1109
999
|
return pulumi.get(self, "token_ttl")
|
1110
1000
|
|
@@ -1112,11 +1002,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1112
1002
|
@pulumi.getter(name="tokenType")
|
1113
1003
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1114
1004
|
"""
|
1115
|
-
The type of token
|
1116
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1117
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1118
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1119
|
-
requests a different type at generation time.
|
1005
|
+
The type of token to generate, service or batch
|
1120
1006
|
"""
|
1121
1007
|
return pulumi.get(self, "token_type")
|
1122
1008
|
|