pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +10 -6
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -2
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -6
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +24 -16
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +36 -0
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +6 -4
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +190 -63
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -6
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -26
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -6
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -6
- pulumi_vault/quota_rate_limit.py +4 -2
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -0
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -348,6 +348,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
348
348
|
|
349
349
|
## Example Usage
|
350
350
|
|
351
|
+
<!--Start PulumiCodeChooser -->
|
351
352
|
```python
|
352
353
|
import pulumi
|
353
354
|
import pulumi_vault as vault
|
@@ -363,6 +364,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
363
364
|
issuer="api",
|
364
365
|
disable_iss_validation=True)
|
365
366
|
```
|
367
|
+
<!--End PulumiCodeChooser -->
|
366
368
|
|
367
369
|
## Import
|
368
370
|
|
@@ -400,6 +402,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
400
402
|
|
401
403
|
## Example Usage
|
402
404
|
|
405
|
+
<!--Start PulumiCodeChooser -->
|
403
406
|
```python
|
404
407
|
import pulumi
|
405
408
|
import pulumi_vault as vault
|
@@ -415,6 +418,7 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
415
418
|
issuer="api",
|
416
419
|
disable_iss_validation=True)
|
417
420
|
```
|
421
|
+
<!--End PulumiCodeChooser -->
|
418
422
|
|
419
423
|
## Import
|
420
424
|
|
@@ -47,15 +47,31 @@ class AuthBackendRoleArgs:
|
|
47
47
|
The value should not contain leading or trailing forward slashes.
|
48
48
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
49
49
|
*Available only for Vault Enterprise*.
|
50
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
51
|
-
|
52
|
-
|
53
|
-
:param pulumi.Input[
|
54
|
-
|
55
|
-
|
56
|
-
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
51
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
52
|
+
as well.
|
53
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
54
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
55
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
56
|
+
`token_max_ttl` would otherwise allow a renewal.
|
57
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
58
|
+
Its current value will be referenced at renewal time.
|
59
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
60
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
61
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
62
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
63
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
64
|
+
token generated using this role should never expire. The token should be renewed within the
|
65
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
66
|
+
value of this field. Specified in seconds.
|
67
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
68
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
57
69
|
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
58
|
-
:param pulumi.Input[str] token_type: The type of token
|
70
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
71
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
72
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
73
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
74
|
+
requests a different type at generation time.
|
59
75
|
"""
|
60
76
|
pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
|
61
77
|
pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
|
@@ -183,7 +199,9 @@ class AuthBackendRoleArgs:
|
|
183
199
|
@pulumi.getter(name="tokenBoundCidrs")
|
184
200
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
185
201
|
"""
|
186
|
-
|
202
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
203
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
204
|
+
as well.
|
187
205
|
"""
|
188
206
|
return pulumi.get(self, "token_bound_cidrs")
|
189
207
|
|
@@ -195,7 +213,10 @@ class AuthBackendRoleArgs:
|
|
195
213
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
196
214
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
197
215
|
"""
|
198
|
-
|
216
|
+
If set, will encode an
|
217
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
218
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
219
|
+
`token_max_ttl` would otherwise allow a renewal.
|
199
220
|
"""
|
200
221
|
return pulumi.get(self, "token_explicit_max_ttl")
|
201
222
|
|
@@ -207,7 +228,8 @@ class AuthBackendRoleArgs:
|
|
207
228
|
@pulumi.getter(name="tokenMaxTtl")
|
208
229
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
209
230
|
"""
|
210
|
-
The maximum lifetime
|
231
|
+
The maximum lifetime for generated tokens in number of seconds.
|
232
|
+
Its current value will be referenced at renewal time.
|
211
233
|
"""
|
212
234
|
return pulumi.get(self, "token_max_ttl")
|
213
235
|
|
@@ -219,7 +241,8 @@ class AuthBackendRoleArgs:
|
|
219
241
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
220
242
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
221
243
|
"""
|
222
|
-
If
|
244
|
+
If set, the default policy will not be set on
|
245
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
223
246
|
"""
|
224
247
|
return pulumi.get(self, "token_no_default_policy")
|
225
248
|
|
@@ -231,7 +254,8 @@ class AuthBackendRoleArgs:
|
|
231
254
|
@pulumi.getter(name="tokenNumUses")
|
232
255
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
233
256
|
"""
|
234
|
-
The maximum number
|
257
|
+
The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
258
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
235
259
|
"""
|
236
260
|
return pulumi.get(self, "token_num_uses")
|
237
261
|
|
@@ -243,7 +267,10 @@ class AuthBackendRoleArgs:
|
|
243
267
|
@pulumi.getter(name="tokenPeriod")
|
244
268
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
245
269
|
"""
|
246
|
-
|
270
|
+
If set, indicates that the
|
271
|
+
token generated using this role should never expire. The token should be renewed within the
|
272
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
273
|
+
value of this field. Specified in seconds.
|
247
274
|
"""
|
248
275
|
return pulumi.get(self, "token_period")
|
249
276
|
|
@@ -255,7 +282,8 @@ class AuthBackendRoleArgs:
|
|
255
282
|
@pulumi.getter(name="tokenPolicies")
|
256
283
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
257
284
|
"""
|
258
|
-
|
285
|
+
List of policies to encode onto generated tokens. Depending
|
286
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
259
287
|
"""
|
260
288
|
return pulumi.get(self, "token_policies")
|
261
289
|
|
@@ -279,7 +307,11 @@ class AuthBackendRoleArgs:
|
|
279
307
|
@pulumi.getter(name="tokenType")
|
280
308
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
281
309
|
"""
|
282
|
-
The type of token
|
310
|
+
The type of token that should be generated. Can be `service`,
|
311
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
312
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
313
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
314
|
+
requests a different type at generation time.
|
283
315
|
"""
|
284
316
|
return pulumi.get(self, "token_type")
|
285
317
|
|
@@ -324,15 +356,31 @@ class _AuthBackendRoleState:
|
|
324
356
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
325
357
|
*Available only for Vault Enterprise*.
|
326
358
|
:param pulumi.Input[str] role_name: Name of the role.
|
327
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
328
|
-
|
329
|
-
|
330
|
-
:param pulumi.Input[
|
331
|
-
|
332
|
-
|
333
|
-
|
359
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
360
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
361
|
+
as well.
|
362
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
363
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
364
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
365
|
+
`token_max_ttl` would otherwise allow a renewal.
|
366
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
367
|
+
Its current value will be referenced at renewal time.
|
368
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
369
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
370
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
371
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
372
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
373
|
+
token generated using this role should never expire. The token should be renewed within the
|
374
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
375
|
+
value of this field. Specified in seconds.
|
376
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
377
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
334
378
|
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
335
|
-
:param pulumi.Input[str] token_type: The type of token
|
379
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
380
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
381
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
382
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
383
|
+
requests a different type at generation time.
|
336
384
|
"""
|
337
385
|
if alias_name_source is not None:
|
338
386
|
pulumi.set(__self__, "alias_name_source", alias_name_source)
|
@@ -463,7 +511,9 @@ class _AuthBackendRoleState:
|
|
463
511
|
@pulumi.getter(name="tokenBoundCidrs")
|
464
512
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
465
513
|
"""
|
466
|
-
|
514
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
515
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
516
|
+
as well.
|
467
517
|
"""
|
468
518
|
return pulumi.get(self, "token_bound_cidrs")
|
469
519
|
|
@@ -475,7 +525,10 @@ class _AuthBackendRoleState:
|
|
475
525
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
476
526
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
477
527
|
"""
|
478
|
-
|
528
|
+
If set, will encode an
|
529
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
530
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
531
|
+
`token_max_ttl` would otherwise allow a renewal.
|
479
532
|
"""
|
480
533
|
return pulumi.get(self, "token_explicit_max_ttl")
|
481
534
|
|
@@ -487,7 +540,8 @@ class _AuthBackendRoleState:
|
|
487
540
|
@pulumi.getter(name="tokenMaxTtl")
|
488
541
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
489
542
|
"""
|
490
|
-
The maximum lifetime
|
543
|
+
The maximum lifetime for generated tokens in number of seconds.
|
544
|
+
Its current value will be referenced at renewal time.
|
491
545
|
"""
|
492
546
|
return pulumi.get(self, "token_max_ttl")
|
493
547
|
|
@@ -499,7 +553,8 @@ class _AuthBackendRoleState:
|
|
499
553
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
500
554
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
501
555
|
"""
|
502
|
-
If
|
556
|
+
If set, the default policy will not be set on
|
557
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
503
558
|
"""
|
504
559
|
return pulumi.get(self, "token_no_default_policy")
|
505
560
|
|
@@ -511,7 +566,8 @@ class _AuthBackendRoleState:
|
|
511
566
|
@pulumi.getter(name="tokenNumUses")
|
512
567
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
513
568
|
"""
|
514
|
-
The maximum number
|
569
|
+
The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
570
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
515
571
|
"""
|
516
572
|
return pulumi.get(self, "token_num_uses")
|
517
573
|
|
@@ -523,7 +579,10 @@ class _AuthBackendRoleState:
|
|
523
579
|
@pulumi.getter(name="tokenPeriod")
|
524
580
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
525
581
|
"""
|
526
|
-
|
582
|
+
If set, indicates that the
|
583
|
+
token generated using this role should never expire. The token should be renewed within the
|
584
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
585
|
+
value of this field. Specified in seconds.
|
527
586
|
"""
|
528
587
|
return pulumi.get(self, "token_period")
|
529
588
|
|
@@ -535,7 +594,8 @@ class _AuthBackendRoleState:
|
|
535
594
|
@pulumi.getter(name="tokenPolicies")
|
536
595
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
537
596
|
"""
|
538
|
-
|
597
|
+
List of policies to encode onto generated tokens. Depending
|
598
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
539
599
|
"""
|
540
600
|
return pulumi.get(self, "token_policies")
|
541
601
|
|
@@ -559,7 +619,11 @@ class _AuthBackendRoleState:
|
|
559
619
|
@pulumi.getter(name="tokenType")
|
560
620
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
561
621
|
"""
|
562
|
-
The type of token
|
622
|
+
The type of token that should be generated. Can be `service`,
|
623
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
624
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
625
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
626
|
+
requests a different type at generation time.
|
563
627
|
"""
|
564
628
|
return pulumi.get(self, "token_type")
|
565
629
|
|
@@ -597,6 +661,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
597
661
|
|
598
662
|
## Example Usage
|
599
663
|
|
664
|
+
<!--Start PulumiCodeChooser -->
|
600
665
|
```python
|
601
666
|
import pulumi
|
602
667
|
import pulumi_vault as vault
|
@@ -615,6 +680,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
615
680
|
],
|
616
681
|
audience="vault")
|
617
682
|
```
|
683
|
+
<!--End PulumiCodeChooser -->
|
618
684
|
|
619
685
|
## Import
|
620
686
|
|
@@ -641,15 +707,31 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
641
707
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
642
708
|
*Available only for Vault Enterprise*.
|
643
709
|
:param pulumi.Input[str] role_name: Name of the role.
|
644
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
645
|
-
|
646
|
-
|
647
|
-
:param pulumi.Input[
|
648
|
-
|
649
|
-
|
650
|
-
|
710
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
711
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
712
|
+
as well.
|
713
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
714
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
715
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
716
|
+
`token_max_ttl` would otherwise allow a renewal.
|
717
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
718
|
+
Its current value will be referenced at renewal time.
|
719
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
720
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
721
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
722
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
723
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
724
|
+
token generated using this role should never expire. The token should be renewed within the
|
725
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
726
|
+
value of this field. Specified in seconds.
|
727
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
728
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
651
729
|
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
652
|
-
:param pulumi.Input[str] token_type: The type of token
|
730
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
731
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
732
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
733
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
734
|
+
requests a different type at generation time.
|
653
735
|
"""
|
654
736
|
...
|
655
737
|
@overload
|
@@ -664,6 +746,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
664
746
|
|
665
747
|
## Example Usage
|
666
748
|
|
749
|
+
<!--Start PulumiCodeChooser -->
|
667
750
|
```python
|
668
751
|
import pulumi
|
669
752
|
import pulumi_vault as vault
|
@@ -682,6 +765,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
682
765
|
],
|
683
766
|
audience="vault")
|
684
767
|
```
|
768
|
+
<!--End PulumiCodeChooser -->
|
685
769
|
|
686
770
|
## Import
|
687
771
|
|
@@ -801,15 +885,31 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
801
885
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
802
886
|
*Available only for Vault Enterprise*.
|
803
887
|
:param pulumi.Input[str] role_name: Name of the role.
|
804
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
805
|
-
|
806
|
-
|
807
|
-
:param pulumi.Input[
|
808
|
-
|
809
|
-
|
810
|
-
|
888
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
889
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
890
|
+
as well.
|
891
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
892
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
893
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
894
|
+
`token_max_ttl` would otherwise allow a renewal.
|
895
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
896
|
+
Its current value will be referenced at renewal time.
|
897
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
898
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
899
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
900
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
901
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
902
|
+
token generated using this role should never expire. The token should be renewed within the
|
903
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
904
|
+
value of this field. Specified in seconds.
|
905
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
906
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
811
907
|
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
812
|
-
:param pulumi.Input[str] token_type: The type of token
|
908
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
909
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
910
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
911
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
912
|
+
requests a different type at generation time.
|
813
913
|
"""
|
814
914
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
815
915
|
|
@@ -901,7 +1001,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
901
1001
|
@pulumi.getter(name="tokenBoundCidrs")
|
902
1002
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
903
1003
|
"""
|
904
|
-
|
1004
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
1005
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1006
|
+
as well.
|
905
1007
|
"""
|
906
1008
|
return pulumi.get(self, "token_bound_cidrs")
|
907
1009
|
|
@@ -909,7 +1011,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
909
1011
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
910
1012
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
911
1013
|
"""
|
912
|
-
|
1014
|
+
If set, will encode an
|
1015
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1016
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1017
|
+
`token_max_ttl` would otherwise allow a renewal.
|
913
1018
|
"""
|
914
1019
|
return pulumi.get(self, "token_explicit_max_ttl")
|
915
1020
|
|
@@ -917,7 +1022,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
917
1022
|
@pulumi.getter(name="tokenMaxTtl")
|
918
1023
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
919
1024
|
"""
|
920
|
-
The maximum lifetime
|
1025
|
+
The maximum lifetime for generated tokens in number of seconds.
|
1026
|
+
Its current value will be referenced at renewal time.
|
921
1027
|
"""
|
922
1028
|
return pulumi.get(self, "token_max_ttl")
|
923
1029
|
|
@@ -925,7 +1031,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
925
1031
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
926
1032
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
927
1033
|
"""
|
928
|
-
If
|
1034
|
+
If set, the default policy will not be set on
|
1035
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
929
1036
|
"""
|
930
1037
|
return pulumi.get(self, "token_no_default_policy")
|
931
1038
|
|
@@ -933,7 +1040,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
933
1040
|
@pulumi.getter(name="tokenNumUses")
|
934
1041
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
935
1042
|
"""
|
936
|
-
The maximum number
|
1043
|
+
The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
|
1044
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
937
1045
|
"""
|
938
1046
|
return pulumi.get(self, "token_num_uses")
|
939
1047
|
|
@@ -941,7 +1049,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
941
1049
|
@pulumi.getter(name="tokenPeriod")
|
942
1050
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
943
1051
|
"""
|
944
|
-
|
1052
|
+
If set, indicates that the
|
1053
|
+
token generated using this role should never expire. The token should be renewed within the
|
1054
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1055
|
+
value of this field. Specified in seconds.
|
945
1056
|
"""
|
946
1057
|
return pulumi.get(self, "token_period")
|
947
1058
|
|
@@ -949,7 +1060,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
949
1060
|
@pulumi.getter(name="tokenPolicies")
|
950
1061
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
951
1062
|
"""
|
952
|
-
|
1063
|
+
List of policies to encode onto generated tokens. Depending
|
1064
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
953
1065
|
"""
|
954
1066
|
return pulumi.get(self, "token_policies")
|
955
1067
|
|
@@ -965,7 +1077,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
965
1077
|
@pulumi.getter(name="tokenType")
|
966
1078
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
967
1079
|
"""
|
968
|
-
The type of token
|
1080
|
+
The type of token that should be generated. Can be `service`,
|
1081
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1082
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1083
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1084
|
+
requests a different type at generation time.
|
969
1085
|
"""
|
970
1086
|
return pulumi.get(self, "token_type")
|
971
1087
|
|
@@ -180,21 +180,20 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
180
180
|
"""
|
181
181
|
## Example Usage
|
182
182
|
|
183
|
+
<!--Start PulumiCodeChooser -->
|
183
184
|
```python
|
184
185
|
import pulumi
|
185
|
-
import pulumi_std as std
|
186
186
|
import pulumi_vault as vault
|
187
187
|
|
188
188
|
config = vault.kubernetes.SecretBackend("config",
|
189
189
|
path="kubernetes",
|
190
190
|
description="kubernetes secrets engine description",
|
191
191
|
kubernetes_host="https://127.0.0.1:61233",
|
192
|
-
kubernetes_ca_cert=
|
193
|
-
service_account_jwt=
|
192
|
+
kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
|
193
|
+
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
194
194
|
disable_local_ca_jwt=False)
|
195
195
|
role = vault.kubernetes.SecretBackendRole("role",
|
196
196
|
backend=config.path,
|
197
|
-
name="service-account-name-role",
|
198
197
|
allowed_kubernetes_namespaces=["*"],
|
199
198
|
token_max_ttl=43200,
|
200
199
|
token_default_ttl=21600,
|
@@ -213,6 +212,7 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
213
212
|
cluster_role_binding=False,
|
214
213
|
ttl="1h")
|
215
214
|
```
|
215
|
+
<!--End PulumiCodeChooser -->
|
216
216
|
|
217
217
|
|
218
218
|
:param str backend: The Kubernetes secret backend to generate service account
|
@@ -267,21 +267,20 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
267
267
|
"""
|
268
268
|
## Example Usage
|
269
269
|
|
270
|
+
<!--Start PulumiCodeChooser -->
|
270
271
|
```python
|
271
272
|
import pulumi
|
272
|
-
import pulumi_std as std
|
273
273
|
import pulumi_vault as vault
|
274
274
|
|
275
275
|
config = vault.kubernetes.SecretBackend("config",
|
276
276
|
path="kubernetes",
|
277
277
|
description="kubernetes secrets engine description",
|
278
278
|
kubernetes_host="https://127.0.0.1:61233",
|
279
|
-
kubernetes_ca_cert=
|
280
|
-
service_account_jwt=
|
279
|
+
kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
|
280
|
+
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
281
281
|
disable_local_ca_jwt=False)
|
282
282
|
role = vault.kubernetes.SecretBackendRole("role",
|
283
283
|
backend=config.path,
|
284
|
-
name="service-account-name-role",
|
285
284
|
allowed_kubernetes_namespaces=["*"],
|
286
285
|
token_max_ttl=43200,
|
287
286
|
token_default_ttl=21600,
|
@@ -300,6 +299,7 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
300
299
|
cluster_role_binding=False,
|
301
300
|
ttl="1h")
|
302
301
|
```
|
302
|
+
<!--End PulumiCodeChooser -->
|
303
303
|
|
304
304
|
|
305
305
|
:param str backend: The Kubernetes secret backend to generate service account
|
@@ -623,9 +623,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
623
623
|
"""
|
624
624
|
## Example Usage
|
625
625
|
|
626
|
+
<!--Start PulumiCodeChooser -->
|
626
627
|
```python
|
627
628
|
import pulumi
|
628
|
-
import pulumi_std as std
|
629
629
|
import pulumi_vault as vault
|
630
630
|
|
631
631
|
config = vault.kubernetes.SecretBackend("config",
|
@@ -634,10 +634,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
634
634
|
default_lease_ttl_seconds=43200,
|
635
635
|
max_lease_ttl_seconds=86400,
|
636
636
|
kubernetes_host="https://127.0.0.1:61233",
|
637
|
-
kubernetes_ca_cert=
|
638
|
-
service_account_jwt=
|
637
|
+
kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
|
638
|
+
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
639
639
|
disable_local_ca_jwt=False)
|
640
640
|
```
|
641
|
+
<!--End PulumiCodeChooser -->
|
641
642
|
|
642
643
|
## Import
|
643
644
|
|
@@ -686,9 +687,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
686
687
|
"""
|
687
688
|
## Example Usage
|
688
689
|
|
690
|
+
<!--Start PulumiCodeChooser -->
|
689
691
|
```python
|
690
692
|
import pulumi
|
691
|
-
import pulumi_std as std
|
692
693
|
import pulumi_vault as vault
|
693
694
|
|
694
695
|
config = vault.kubernetes.SecretBackend("config",
|
@@ -697,10 +698,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
697
698
|
default_lease_ttl_seconds=43200,
|
698
699
|
max_lease_ttl_seconds=86400,
|
699
700
|
kubernetes_host="https://127.0.0.1:61233",
|
700
|
-
kubernetes_ca_cert=
|
701
|
-
service_account_jwt=
|
701
|
+
kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
|
702
|
+
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
702
703
|
disable_local_ca_jwt=False)
|
703
704
|
```
|
705
|
+
<!--End PulumiCodeChooser -->
|
704
706
|
|
705
707
|
## Import
|
706
708
|
|