pulumi-vault 6.1.1__py3-none-any.whl → 6.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +26 -0
- pulumi_vault/auth_backend.py +47 -0
- pulumi_vault/aws/auth_backend_client.py +247 -7
- pulumi_vault/aws/secret_backend_role.py +54 -0
- pulumi_vault/azure/auth_backend_config.py +133 -0
- pulumi_vault/azure/backend.py +203 -0
- pulumi_vault/database/secrets_mount.py +282 -0
- pulumi_vault/gcp/auth_backend.py +244 -0
- pulumi_vault/gcp/secret_backend.py +271 -3
- pulumi_vault/jwt/auth_backend_role.py +28 -35
- pulumi_vault/kubernetes/secret_backend.py +282 -0
- pulumi_vault/ldap/secret_backend.py +282 -0
- pulumi_vault/mount.py +324 -0
- pulumi_vault/okta/auth_backend.py +453 -0
- pulumi_vault/pkisecret/__init__.py +2 -0
- pulumi_vault/pkisecret/_inputs.py +30 -0
- pulumi_vault/pkisecret/backend_config_est.py +614 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +233 -0
- pulumi_vault/pkisecret/outputs.py +54 -0
- pulumi_vault/plugin.py +590 -0
- pulumi_vault/plugin_pinned_version.py +293 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +47 -0
- pulumi_vault/quota_rate_limit.py +47 -0
- pulumi_vault/ssh/secret_backend_ca.py +94 -0
- {pulumi_vault-6.1.1.dist-info → pulumi_vault-6.2.0.dist-info}/METADATA +1 -1
- {pulumi_vault-6.1.1.dist-info → pulumi_vault-6.2.0.dist-info}/RECORD +29 -25
- {pulumi_vault-6.1.1.dist-info → pulumi_vault-6.2.0.dist-info}/WHEEL +1 -1
- {pulumi_vault-6.1.1.dist-info → pulumi_vault-6.2.0.dist-info}/top_level.txt +0 -0
@@ -26,6 +26,15 @@ class AuthBackendArgs:
|
|
26
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
27
27
|
path: Optional[pulumi.Input[str]] = None,
|
28
28
|
token: Optional[pulumi.Input[str]] = None,
|
29
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
+
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
31
|
+
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
32
|
+
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
33
|
+
token_num_uses: Optional[pulumi.Input[int]] = None,
|
34
|
+
token_period: Optional[pulumi.Input[int]] = None,
|
35
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
36
|
+
token_ttl: Optional[pulumi.Input[int]] = None,
|
37
|
+
token_type: Optional[pulumi.Input[str]] = None,
|
29
38
|
ttl: Optional[pulumi.Input[str]] = None,
|
30
39
|
users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
|
31
40
|
"""
|
@@ -47,6 +56,15 @@ class AuthBackendArgs:
|
|
47
56
|
:param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
48
57
|
:param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
|
49
58
|
If this is not supplied only locally configured groups will be enabled.
|
59
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
60
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
61
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
62
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
63
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
64
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
65
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
66
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
67
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
50
68
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
51
69
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
52
70
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
|
@@ -63,6 +81,9 @@ class AuthBackendArgs:
|
|
63
81
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
64
82
|
if groups is not None:
|
65
83
|
pulumi.set(__self__, "groups", groups)
|
84
|
+
if max_ttl is not None:
|
85
|
+
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
86
|
+
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
66
87
|
if max_ttl is not None:
|
67
88
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
68
89
|
if namespace is not None:
|
@@ -71,6 +92,27 @@ class AuthBackendArgs:
|
|
71
92
|
pulumi.set(__self__, "path", path)
|
72
93
|
if token is not None:
|
73
94
|
pulumi.set(__self__, "token", token)
|
95
|
+
if token_bound_cidrs is not None:
|
96
|
+
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
97
|
+
if token_explicit_max_ttl is not None:
|
98
|
+
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
99
|
+
if token_max_ttl is not None:
|
100
|
+
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
101
|
+
if token_no_default_policy is not None:
|
102
|
+
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
103
|
+
if token_num_uses is not None:
|
104
|
+
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
105
|
+
if token_period is not None:
|
106
|
+
pulumi.set(__self__, "token_period", token_period)
|
107
|
+
if token_policies is not None:
|
108
|
+
pulumi.set(__self__, "token_policies", token_policies)
|
109
|
+
if token_ttl is not None:
|
110
|
+
pulumi.set(__self__, "token_ttl", token_ttl)
|
111
|
+
if token_type is not None:
|
112
|
+
pulumi.set(__self__, "token_type", token_type)
|
113
|
+
if ttl is not None:
|
114
|
+
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
115
|
+
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
74
116
|
if ttl is not None:
|
75
117
|
pulumi.set(__self__, "ttl", ttl)
|
76
118
|
if users is not None:
|
@@ -157,6 +199,9 @@ class AuthBackendArgs:
|
|
157
199
|
Maximum duration after which authentication will be expired
|
158
200
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
159
201
|
"""
|
202
|
+
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
203
|
+
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
204
|
+
|
160
205
|
return pulumi.get(self, "max_ttl")
|
161
206
|
|
162
207
|
@max_ttl.setter
|
@@ -203,6 +248,114 @@ class AuthBackendArgs:
|
|
203
248
|
def token(self, value: Optional[pulumi.Input[str]]):
|
204
249
|
pulumi.set(self, "token", value)
|
205
250
|
|
251
|
+
@property
|
252
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
253
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
254
|
+
"""
|
255
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
256
|
+
"""
|
257
|
+
return pulumi.get(self, "token_bound_cidrs")
|
258
|
+
|
259
|
+
@token_bound_cidrs.setter
|
260
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
261
|
+
pulumi.set(self, "token_bound_cidrs", value)
|
262
|
+
|
263
|
+
@property
|
264
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
265
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
266
|
+
"""
|
267
|
+
Generated Token's Explicit Maximum TTL in seconds
|
268
|
+
"""
|
269
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
270
|
+
|
271
|
+
@token_explicit_max_ttl.setter
|
272
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
273
|
+
pulumi.set(self, "token_explicit_max_ttl", value)
|
274
|
+
|
275
|
+
@property
|
276
|
+
@pulumi.getter(name="tokenMaxTtl")
|
277
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
278
|
+
"""
|
279
|
+
The maximum lifetime of the generated token
|
280
|
+
"""
|
281
|
+
return pulumi.get(self, "token_max_ttl")
|
282
|
+
|
283
|
+
@token_max_ttl.setter
|
284
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
285
|
+
pulumi.set(self, "token_max_ttl", value)
|
286
|
+
|
287
|
+
@property
|
288
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
289
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
290
|
+
"""
|
291
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
292
|
+
"""
|
293
|
+
return pulumi.get(self, "token_no_default_policy")
|
294
|
+
|
295
|
+
@token_no_default_policy.setter
|
296
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
|
297
|
+
pulumi.set(self, "token_no_default_policy", value)
|
298
|
+
|
299
|
+
@property
|
300
|
+
@pulumi.getter(name="tokenNumUses")
|
301
|
+
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
302
|
+
"""
|
303
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
304
|
+
"""
|
305
|
+
return pulumi.get(self, "token_num_uses")
|
306
|
+
|
307
|
+
@token_num_uses.setter
|
308
|
+
def token_num_uses(self, value: Optional[pulumi.Input[int]]):
|
309
|
+
pulumi.set(self, "token_num_uses", value)
|
310
|
+
|
311
|
+
@property
|
312
|
+
@pulumi.getter(name="tokenPeriod")
|
313
|
+
def token_period(self) -> Optional[pulumi.Input[int]]:
|
314
|
+
"""
|
315
|
+
Generated Token's Period
|
316
|
+
"""
|
317
|
+
return pulumi.get(self, "token_period")
|
318
|
+
|
319
|
+
@token_period.setter
|
320
|
+
def token_period(self, value: Optional[pulumi.Input[int]]):
|
321
|
+
pulumi.set(self, "token_period", value)
|
322
|
+
|
323
|
+
@property
|
324
|
+
@pulumi.getter(name="tokenPolicies")
|
325
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
326
|
+
"""
|
327
|
+
Generated Token's Policies
|
328
|
+
"""
|
329
|
+
return pulumi.get(self, "token_policies")
|
330
|
+
|
331
|
+
@token_policies.setter
|
332
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
333
|
+
pulumi.set(self, "token_policies", value)
|
334
|
+
|
335
|
+
@property
|
336
|
+
@pulumi.getter(name="tokenTtl")
|
337
|
+
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
338
|
+
"""
|
339
|
+
The initial ttl of the token to generate in seconds
|
340
|
+
"""
|
341
|
+
return pulumi.get(self, "token_ttl")
|
342
|
+
|
343
|
+
@token_ttl.setter
|
344
|
+
def token_ttl(self, value: Optional[pulumi.Input[int]]):
|
345
|
+
pulumi.set(self, "token_ttl", value)
|
346
|
+
|
347
|
+
@property
|
348
|
+
@pulumi.getter(name="tokenType")
|
349
|
+
def token_type(self) -> Optional[pulumi.Input[str]]:
|
350
|
+
"""
|
351
|
+
The type of token to generate, service or batch
|
352
|
+
"""
|
353
|
+
return pulumi.get(self, "token_type")
|
354
|
+
|
355
|
+
@token_type.setter
|
356
|
+
def token_type(self, value: Optional[pulumi.Input[str]]):
|
357
|
+
pulumi.set(self, "token_type", value)
|
358
|
+
|
206
359
|
@property
|
207
360
|
@pulumi.getter
|
208
361
|
def ttl(self) -> Optional[pulumi.Input[str]]:
|
@@ -210,6 +363,9 @@ class AuthBackendArgs:
|
|
210
363
|
Duration after which authentication will be expired.
|
211
364
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
212
365
|
"""
|
366
|
+
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
367
|
+
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
368
|
+
|
213
369
|
return pulumi.get(self, "ttl")
|
214
370
|
|
215
371
|
@ttl.setter
|
@@ -244,6 +400,15 @@ class _AuthBackendState:
|
|
244
400
|
organization: Optional[pulumi.Input[str]] = None,
|
245
401
|
path: Optional[pulumi.Input[str]] = None,
|
246
402
|
token: Optional[pulumi.Input[str]] = None,
|
403
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
404
|
+
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
405
|
+
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
406
|
+
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
407
|
+
token_num_uses: Optional[pulumi.Input[int]] = None,
|
408
|
+
token_period: Optional[pulumi.Input[int]] = None,
|
409
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
410
|
+
token_ttl: Optional[pulumi.Input[int]] = None,
|
411
|
+
token_type: Optional[pulumi.Input[str]] = None,
|
247
412
|
ttl: Optional[pulumi.Input[str]] = None,
|
248
413
|
users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
|
249
414
|
"""
|
@@ -266,6 +431,15 @@ class _AuthBackendState:
|
|
266
431
|
:param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
267
432
|
:param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
|
268
433
|
If this is not supplied only locally configured groups will be enabled.
|
434
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
435
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
436
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
437
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
438
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
439
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
440
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
441
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
442
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
269
443
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
270
444
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
271
445
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
|
@@ -283,6 +457,9 @@ class _AuthBackendState:
|
|
283
457
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
284
458
|
if groups is not None:
|
285
459
|
pulumi.set(__self__, "groups", groups)
|
460
|
+
if max_ttl is not None:
|
461
|
+
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
462
|
+
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
286
463
|
if max_ttl is not None:
|
287
464
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
288
465
|
if namespace is not None:
|
@@ -293,6 +470,27 @@ class _AuthBackendState:
|
|
293
470
|
pulumi.set(__self__, "path", path)
|
294
471
|
if token is not None:
|
295
472
|
pulumi.set(__self__, "token", token)
|
473
|
+
if token_bound_cidrs is not None:
|
474
|
+
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
475
|
+
if token_explicit_max_ttl is not None:
|
476
|
+
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
477
|
+
if token_max_ttl is not None:
|
478
|
+
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
479
|
+
if token_no_default_policy is not None:
|
480
|
+
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
481
|
+
if token_num_uses is not None:
|
482
|
+
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
483
|
+
if token_period is not None:
|
484
|
+
pulumi.set(__self__, "token_period", token_period)
|
485
|
+
if token_policies is not None:
|
486
|
+
pulumi.set(__self__, "token_policies", token_policies)
|
487
|
+
if token_ttl is not None:
|
488
|
+
pulumi.set(__self__, "token_ttl", token_ttl)
|
489
|
+
if token_type is not None:
|
490
|
+
pulumi.set(__self__, "token_type", token_type)
|
491
|
+
if ttl is not None:
|
492
|
+
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
493
|
+
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
296
494
|
if ttl is not None:
|
297
495
|
pulumi.set(__self__, "ttl", ttl)
|
298
496
|
if users is not None:
|
@@ -379,6 +577,9 @@ class _AuthBackendState:
|
|
379
577
|
Maximum duration after which authentication will be expired
|
380
578
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
381
579
|
"""
|
580
|
+
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
581
|
+
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
582
|
+
|
382
583
|
return pulumi.get(self, "max_ttl")
|
383
584
|
|
384
585
|
@max_ttl.setter
|
@@ -437,6 +638,114 @@ class _AuthBackendState:
|
|
437
638
|
def token(self, value: Optional[pulumi.Input[str]]):
|
438
639
|
pulumi.set(self, "token", value)
|
439
640
|
|
641
|
+
@property
|
642
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
643
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
644
|
+
"""
|
645
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
646
|
+
"""
|
647
|
+
return pulumi.get(self, "token_bound_cidrs")
|
648
|
+
|
649
|
+
@token_bound_cidrs.setter
|
650
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
651
|
+
pulumi.set(self, "token_bound_cidrs", value)
|
652
|
+
|
653
|
+
@property
|
654
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
655
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
656
|
+
"""
|
657
|
+
Generated Token's Explicit Maximum TTL in seconds
|
658
|
+
"""
|
659
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
660
|
+
|
661
|
+
@token_explicit_max_ttl.setter
|
662
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
663
|
+
pulumi.set(self, "token_explicit_max_ttl", value)
|
664
|
+
|
665
|
+
@property
|
666
|
+
@pulumi.getter(name="tokenMaxTtl")
|
667
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
668
|
+
"""
|
669
|
+
The maximum lifetime of the generated token
|
670
|
+
"""
|
671
|
+
return pulumi.get(self, "token_max_ttl")
|
672
|
+
|
673
|
+
@token_max_ttl.setter
|
674
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
675
|
+
pulumi.set(self, "token_max_ttl", value)
|
676
|
+
|
677
|
+
@property
|
678
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
679
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
680
|
+
"""
|
681
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
682
|
+
"""
|
683
|
+
return pulumi.get(self, "token_no_default_policy")
|
684
|
+
|
685
|
+
@token_no_default_policy.setter
|
686
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
|
687
|
+
pulumi.set(self, "token_no_default_policy", value)
|
688
|
+
|
689
|
+
@property
|
690
|
+
@pulumi.getter(name="tokenNumUses")
|
691
|
+
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
692
|
+
"""
|
693
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
694
|
+
"""
|
695
|
+
return pulumi.get(self, "token_num_uses")
|
696
|
+
|
697
|
+
@token_num_uses.setter
|
698
|
+
def token_num_uses(self, value: Optional[pulumi.Input[int]]):
|
699
|
+
pulumi.set(self, "token_num_uses", value)
|
700
|
+
|
701
|
+
@property
|
702
|
+
@pulumi.getter(name="tokenPeriod")
|
703
|
+
def token_period(self) -> Optional[pulumi.Input[int]]:
|
704
|
+
"""
|
705
|
+
Generated Token's Period
|
706
|
+
"""
|
707
|
+
return pulumi.get(self, "token_period")
|
708
|
+
|
709
|
+
@token_period.setter
|
710
|
+
def token_period(self, value: Optional[pulumi.Input[int]]):
|
711
|
+
pulumi.set(self, "token_period", value)
|
712
|
+
|
713
|
+
@property
|
714
|
+
@pulumi.getter(name="tokenPolicies")
|
715
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
716
|
+
"""
|
717
|
+
Generated Token's Policies
|
718
|
+
"""
|
719
|
+
return pulumi.get(self, "token_policies")
|
720
|
+
|
721
|
+
@token_policies.setter
|
722
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
723
|
+
pulumi.set(self, "token_policies", value)
|
724
|
+
|
725
|
+
@property
|
726
|
+
@pulumi.getter(name="tokenTtl")
|
727
|
+
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
728
|
+
"""
|
729
|
+
The initial ttl of the token to generate in seconds
|
730
|
+
"""
|
731
|
+
return pulumi.get(self, "token_ttl")
|
732
|
+
|
733
|
+
@token_ttl.setter
|
734
|
+
def token_ttl(self, value: Optional[pulumi.Input[int]]):
|
735
|
+
pulumi.set(self, "token_ttl", value)
|
736
|
+
|
737
|
+
@property
|
738
|
+
@pulumi.getter(name="tokenType")
|
739
|
+
def token_type(self) -> Optional[pulumi.Input[str]]:
|
740
|
+
"""
|
741
|
+
The type of token to generate, service or batch
|
742
|
+
"""
|
743
|
+
return pulumi.get(self, "token_type")
|
744
|
+
|
745
|
+
@token_type.setter
|
746
|
+
def token_type(self, value: Optional[pulumi.Input[str]]):
|
747
|
+
pulumi.set(self, "token_type", value)
|
748
|
+
|
440
749
|
@property
|
441
750
|
@pulumi.getter
|
442
751
|
def ttl(self) -> Optional[pulumi.Input[str]]:
|
@@ -444,6 +753,9 @@ class _AuthBackendState:
|
|
444
753
|
Duration after which authentication will be expired.
|
445
754
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
446
755
|
"""
|
756
|
+
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
757
|
+
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
758
|
+
|
447
759
|
return pulumi.get(self, "ttl")
|
448
760
|
|
449
761
|
@ttl.setter
|
@@ -479,6 +791,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
479
791
|
organization: Optional[pulumi.Input[str]] = None,
|
480
792
|
path: Optional[pulumi.Input[str]] = None,
|
481
793
|
token: Optional[pulumi.Input[str]] = None,
|
794
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
795
|
+
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
796
|
+
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
797
|
+
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
798
|
+
token_num_uses: Optional[pulumi.Input[int]] = None,
|
799
|
+
token_period: Optional[pulumi.Input[int]] = None,
|
800
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
801
|
+
token_ttl: Optional[pulumi.Input[int]] = None,
|
802
|
+
token_type: Optional[pulumi.Input[str]] = None,
|
482
803
|
ttl: Optional[pulumi.Input[str]] = None,
|
483
804
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None,
|
484
805
|
__props__=None):
|
@@ -536,6 +857,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
536
857
|
:param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
537
858
|
:param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
|
538
859
|
If this is not supplied only locally configured groups will be enabled.
|
860
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
861
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
862
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
863
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
864
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
865
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
866
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
867
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
868
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
539
869
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
540
870
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
541
871
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]] users: Associate Okta users with groups or policies within Vault.
|
@@ -607,6 +937,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
607
937
|
organization: Optional[pulumi.Input[str]] = None,
|
608
938
|
path: Optional[pulumi.Input[str]] = None,
|
609
939
|
token: Optional[pulumi.Input[str]] = None,
|
940
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
941
|
+
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
942
|
+
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
943
|
+
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
944
|
+
token_num_uses: Optional[pulumi.Input[int]] = None,
|
945
|
+
token_period: Optional[pulumi.Input[int]] = None,
|
946
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
947
|
+
token_ttl: Optional[pulumi.Input[int]] = None,
|
948
|
+
token_type: Optional[pulumi.Input[str]] = None,
|
610
949
|
ttl: Optional[pulumi.Input[str]] = None,
|
611
950
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None,
|
612
951
|
__props__=None):
|
@@ -630,6 +969,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
630
969
|
__props__.__dict__["organization"] = organization
|
631
970
|
__props__.__dict__["path"] = path
|
632
971
|
__props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
|
972
|
+
__props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
|
973
|
+
__props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
|
974
|
+
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
975
|
+
__props__.__dict__["token_no_default_policy"] = token_no_default_policy
|
976
|
+
__props__.__dict__["token_num_uses"] = token_num_uses
|
977
|
+
__props__.__dict__["token_period"] = token_period
|
978
|
+
__props__.__dict__["token_policies"] = token_policies
|
979
|
+
__props__.__dict__["token_ttl"] = token_ttl
|
980
|
+
__props__.__dict__["token_type"] = token_type
|
633
981
|
__props__.__dict__["ttl"] = ttl
|
634
982
|
__props__.__dict__["users"] = users
|
635
983
|
__props__.__dict__["accessor"] = None
|
@@ -656,6 +1004,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
656
1004
|
organization: Optional[pulumi.Input[str]] = None,
|
657
1005
|
path: Optional[pulumi.Input[str]] = None,
|
658
1006
|
token: Optional[pulumi.Input[str]] = None,
|
1007
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1008
|
+
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
1009
|
+
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
1010
|
+
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
1011
|
+
token_num_uses: Optional[pulumi.Input[int]] = None,
|
1012
|
+
token_period: Optional[pulumi.Input[int]] = None,
|
1013
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1014
|
+
token_ttl: Optional[pulumi.Input[int]] = None,
|
1015
|
+
token_type: Optional[pulumi.Input[str]] = None,
|
659
1016
|
ttl: Optional[pulumi.Input[str]] = None,
|
660
1017
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None) -> 'AuthBackend':
|
661
1018
|
"""
|
@@ -683,6 +1040,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
683
1040
|
:param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
684
1041
|
:param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
|
685
1042
|
If this is not supplied only locally configured groups will be enabled.
|
1043
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1044
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1045
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1046
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1047
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1048
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1049
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1050
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1051
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
686
1052
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
687
1053
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
688
1054
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]] users: Associate Okta users with groups or policies within Vault.
|
@@ -703,6 +1069,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
703
1069
|
__props__.__dict__["organization"] = organization
|
704
1070
|
__props__.__dict__["path"] = path
|
705
1071
|
__props__.__dict__["token"] = token
|
1072
|
+
__props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
|
1073
|
+
__props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
|
1074
|
+
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
1075
|
+
__props__.__dict__["token_no_default_policy"] = token_no_default_policy
|
1076
|
+
__props__.__dict__["token_num_uses"] = token_num_uses
|
1077
|
+
__props__.__dict__["token_period"] = token_period
|
1078
|
+
__props__.__dict__["token_policies"] = token_policies
|
1079
|
+
__props__.__dict__["token_ttl"] = token_ttl
|
1080
|
+
__props__.__dict__["token_type"] = token_type
|
706
1081
|
__props__.__dict__["ttl"] = ttl
|
707
1082
|
__props__.__dict__["users"] = users
|
708
1083
|
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
@@ -764,6 +1139,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
764
1139
|
Maximum duration after which authentication will be expired
|
765
1140
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
766
1141
|
"""
|
1142
|
+
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
1143
|
+
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
1144
|
+
|
767
1145
|
return pulumi.get(self, "max_ttl")
|
768
1146
|
|
769
1147
|
@property
|
@@ -802,6 +1180,78 @@ class AuthBackend(pulumi.CustomResource):
|
|
802
1180
|
"""
|
803
1181
|
return pulumi.get(self, "token")
|
804
1182
|
|
1183
|
+
@property
|
1184
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
1185
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1186
|
+
"""
|
1187
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1188
|
+
"""
|
1189
|
+
return pulumi.get(self, "token_bound_cidrs")
|
1190
|
+
|
1191
|
+
@property
|
1192
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1193
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1194
|
+
"""
|
1195
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1196
|
+
"""
|
1197
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
1198
|
+
|
1199
|
+
@property
|
1200
|
+
@pulumi.getter(name="tokenMaxTtl")
|
1201
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1202
|
+
"""
|
1203
|
+
The maximum lifetime of the generated token
|
1204
|
+
"""
|
1205
|
+
return pulumi.get(self, "token_max_ttl")
|
1206
|
+
|
1207
|
+
@property
|
1208
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1209
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1210
|
+
"""
|
1211
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1212
|
+
"""
|
1213
|
+
return pulumi.get(self, "token_no_default_policy")
|
1214
|
+
|
1215
|
+
@property
|
1216
|
+
@pulumi.getter(name="tokenNumUses")
|
1217
|
+
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1218
|
+
"""
|
1219
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1220
|
+
"""
|
1221
|
+
return pulumi.get(self, "token_num_uses")
|
1222
|
+
|
1223
|
+
@property
|
1224
|
+
@pulumi.getter(name="tokenPeriod")
|
1225
|
+
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1226
|
+
"""
|
1227
|
+
Generated Token's Period
|
1228
|
+
"""
|
1229
|
+
return pulumi.get(self, "token_period")
|
1230
|
+
|
1231
|
+
@property
|
1232
|
+
@pulumi.getter(name="tokenPolicies")
|
1233
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1234
|
+
"""
|
1235
|
+
Generated Token's Policies
|
1236
|
+
"""
|
1237
|
+
return pulumi.get(self, "token_policies")
|
1238
|
+
|
1239
|
+
@property
|
1240
|
+
@pulumi.getter(name="tokenTtl")
|
1241
|
+
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1242
|
+
"""
|
1243
|
+
The initial ttl of the token to generate in seconds
|
1244
|
+
"""
|
1245
|
+
return pulumi.get(self, "token_ttl")
|
1246
|
+
|
1247
|
+
@property
|
1248
|
+
@pulumi.getter(name="tokenType")
|
1249
|
+
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1250
|
+
"""
|
1251
|
+
The type of token to generate, service or batch
|
1252
|
+
"""
|
1253
|
+
return pulumi.get(self, "token_type")
|
1254
|
+
|
805
1255
|
@property
|
806
1256
|
@pulumi.getter
|
807
1257
|
def ttl(self) -> pulumi.Output[Optional[str]]:
|
@@ -809,6 +1259,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
809
1259
|
Duration after which authentication will be expired.
|
810
1260
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
811
1261
|
"""
|
1262
|
+
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
1263
|
+
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
1264
|
+
|
812
1265
|
return pulumi.get(self, "ttl")
|
813
1266
|
|
814
1267
|
@property
|
@@ -6,6 +6,8 @@ from .. import _utilities
|
|
6
6
|
import typing
|
7
7
|
# Export this package's modules as members:
|
8
8
|
from .backend_config_cluster import *
|
9
|
+
from .backend_config_est import *
|
10
|
+
from .get_backend_config_est import *
|
9
11
|
from .get_backend_issuer import *
|
10
12
|
from .get_backend_issuers import *
|
11
13
|
from .get_backend_key import *
|
@@ -10,9 +10,39 @@ from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
10
10
|
from .. import _utilities
|
11
11
|
|
12
12
|
__all__ = [
|
13
|
+
'BackendConfigEstAuthenticatorsArgs',
|
13
14
|
'SecretBackendRolePolicyIdentifierArgs',
|
14
15
|
]
|
15
16
|
|
17
|
+
@pulumi.input_type
|
18
|
+
class BackendConfigEstAuthenticatorsArgs:
|
19
|
+
def __init__(__self__, *,
|
20
|
+
cert: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
21
|
+
userpass: Optional[pulumi.Input[Mapping[str, Any]]] = None):
|
22
|
+
if cert is not None:
|
23
|
+
pulumi.set(__self__, "cert", cert)
|
24
|
+
if userpass is not None:
|
25
|
+
pulumi.set(__self__, "userpass", userpass)
|
26
|
+
|
27
|
+
@property
|
28
|
+
@pulumi.getter
|
29
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
30
|
+
return pulumi.get(self, "cert")
|
31
|
+
|
32
|
+
@cert.setter
|
33
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
34
|
+
pulumi.set(self, "cert", value)
|
35
|
+
|
36
|
+
@property
|
37
|
+
@pulumi.getter
|
38
|
+
def userpass(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
39
|
+
return pulumi.get(self, "userpass")
|
40
|
+
|
41
|
+
@userpass.setter
|
42
|
+
def userpass(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
43
|
+
pulumi.set(self, "userpass", value)
|
44
|
+
|
45
|
+
|
16
46
|
@pulumi.input_type
|
17
47
|
class SecretBackendRolePolicyIdentifierArgs:
|
18
48
|
def __init__(__self__, *,
|