pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -53,8 +53,9 @@ class AuthBackendRoleArgs:
|
|
53
53
|
Required for OIDC roles
|
54
54
|
:param pulumi.Input[str] backend: The unique name of the auth backend to configure.
|
55
55
|
Defaults to `jwt`.
|
56
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (
|
57
|
-
|
56
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
|
57
|
+
or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
|
58
|
+
Any match is sufficient.
|
58
59
|
:param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
|
59
60
|
A claim's value must be a string, which may contain one value or multiple
|
60
61
|
comma-separated values, e.g. `"red"` or `"red,green,blue"`.
|
@@ -70,7 +71,7 @@ class AuthBackendRoleArgs:
|
|
70
71
|
Only applicable with "jwt" roles.
|
71
72
|
:param pulumi.Input[bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
|
72
73
|
:param pulumi.Input[int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
|
73
|
-
clock skew, in seconds. Defaults to `
|
74
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
74
75
|
Only applicable with "jwt" roles.
|
75
76
|
:param pulumi.Input[str] groups_claim: The claim to use to uniquely identify
|
76
77
|
the set of groups to which the user belongs; this will be used as the names
|
@@ -83,20 +84,37 @@ class AuthBackendRoleArgs:
|
|
83
84
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
84
85
|
*Available only for Vault Enterprise*.
|
85
86
|
:param pulumi.Input[int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
|
86
|
-
clock skew, in seconds. Defaults to `
|
87
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
87
88
|
Only applicable with "jwt" roles.
|
88
89
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
|
89
90
|
The standard scope "openid" is automatically included and need not be specified.
|
90
91
|
:param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
|
91
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
92
|
-
|
93
|
-
|
94
|
-
:param pulumi.Input[
|
95
|
-
|
96
|
-
|
97
|
-
|
98
|
-
:param pulumi.Input[int]
|
99
|
-
|
92
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
93
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
94
|
+
as well.
|
95
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
96
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
97
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
98
|
+
`token_max_ttl` would otherwise allow a renewal.
|
99
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
100
|
+
Its current value will be referenced at renewal time.
|
101
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
102
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
103
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
104
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
105
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
106
|
+
token generated using this role should never expire. The token should be renewed within the
|
107
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
108
|
+
value of this field. Specified in seconds.
|
109
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
110
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
111
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
112
|
+
Its current value will be referenced at renewal time.
|
113
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
114
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
115
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
116
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
117
|
+
requests a different type at generation time.
|
100
118
|
:param pulumi.Input[bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
|
101
119
|
[JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
|
102
120
|
syntax for referencing claims. By default, the `user_claim` value will not use JSON pointer.
|
@@ -218,8 +236,9 @@ class AuthBackendRoleArgs:
|
|
218
236
|
@pulumi.getter(name="boundAudiences")
|
219
237
|
def bound_audiences(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
220
238
|
"""
|
221
|
-
(
|
222
|
-
|
239
|
+
(For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
|
240
|
+
or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
|
241
|
+
Any match is sufficient.
|
223
242
|
"""
|
224
243
|
return pulumi.get(self, "bound_audiences")
|
225
244
|
|
@@ -312,7 +331,7 @@ class AuthBackendRoleArgs:
|
|
312
331
|
def expiration_leeway(self) -> Optional[pulumi.Input[int]]:
|
313
332
|
"""
|
314
333
|
The amount of leeway to add to expiration (`exp`) claims to account for
|
315
|
-
clock skew, in seconds. Defaults to `
|
334
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
316
335
|
Only applicable with "jwt" roles.
|
317
336
|
"""
|
318
337
|
return pulumi.get(self, "expiration_leeway")
|
@@ -369,7 +388,7 @@ class AuthBackendRoleArgs:
|
|
369
388
|
def not_before_leeway(self) -> Optional[pulumi.Input[int]]:
|
370
389
|
"""
|
371
390
|
The amount of leeway to add to not before (`nbf`) claims to account for
|
372
|
-
clock skew, in seconds. Defaults to `
|
391
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
373
392
|
Only applicable with "jwt" roles.
|
374
393
|
"""
|
375
394
|
return pulumi.get(self, "not_before_leeway")
|
@@ -407,7 +426,9 @@ class AuthBackendRoleArgs:
|
|
407
426
|
@pulumi.getter(name="tokenBoundCidrs")
|
408
427
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
409
428
|
"""
|
410
|
-
|
429
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
430
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
431
|
+
as well.
|
411
432
|
"""
|
412
433
|
return pulumi.get(self, "token_bound_cidrs")
|
413
434
|
|
@@ -419,7 +440,10 @@ class AuthBackendRoleArgs:
|
|
419
440
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
420
441
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
421
442
|
"""
|
422
|
-
|
443
|
+
If set, will encode an
|
444
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
445
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
446
|
+
`token_max_ttl` would otherwise allow a renewal.
|
423
447
|
"""
|
424
448
|
return pulumi.get(self, "token_explicit_max_ttl")
|
425
449
|
|
@@ -431,7 +455,8 @@ class AuthBackendRoleArgs:
|
|
431
455
|
@pulumi.getter(name="tokenMaxTtl")
|
432
456
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
433
457
|
"""
|
434
|
-
The maximum lifetime
|
458
|
+
The maximum lifetime for generated tokens in number of seconds.
|
459
|
+
Its current value will be referenced at renewal time.
|
435
460
|
"""
|
436
461
|
return pulumi.get(self, "token_max_ttl")
|
437
462
|
|
@@ -443,7 +468,8 @@ class AuthBackendRoleArgs:
|
|
443
468
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
444
469
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
445
470
|
"""
|
446
|
-
If
|
471
|
+
If set, the default policy will not be set on
|
472
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
447
473
|
"""
|
448
474
|
return pulumi.get(self, "token_no_default_policy")
|
449
475
|
|
@@ -455,7 +481,8 @@ class AuthBackendRoleArgs:
|
|
455
481
|
@pulumi.getter(name="tokenNumUses")
|
456
482
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
457
483
|
"""
|
458
|
-
The maximum number
|
484
|
+
The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
485
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
459
486
|
"""
|
460
487
|
return pulumi.get(self, "token_num_uses")
|
461
488
|
|
@@ -467,7 +494,10 @@ class AuthBackendRoleArgs:
|
|
467
494
|
@pulumi.getter(name="tokenPeriod")
|
468
495
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
469
496
|
"""
|
470
|
-
|
497
|
+
If set, indicates that the
|
498
|
+
token generated using this role should never expire. The token should be renewed within the
|
499
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
500
|
+
value of this field. Specified in seconds.
|
471
501
|
"""
|
472
502
|
return pulumi.get(self, "token_period")
|
473
503
|
|
@@ -479,7 +509,8 @@ class AuthBackendRoleArgs:
|
|
479
509
|
@pulumi.getter(name="tokenPolicies")
|
480
510
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
481
511
|
"""
|
482
|
-
|
512
|
+
List of policies to encode onto generated tokens. Depending
|
513
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
483
514
|
"""
|
484
515
|
return pulumi.get(self, "token_policies")
|
485
516
|
|
@@ -491,7 +522,8 @@ class AuthBackendRoleArgs:
|
|
491
522
|
@pulumi.getter(name="tokenTtl")
|
492
523
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
493
524
|
"""
|
494
|
-
The
|
525
|
+
The incremental lifetime for generated tokens in number of seconds.
|
526
|
+
Its current value will be referenced at renewal time.
|
495
527
|
"""
|
496
528
|
return pulumi.get(self, "token_ttl")
|
497
529
|
|
@@ -503,7 +535,11 @@ class AuthBackendRoleArgs:
|
|
503
535
|
@pulumi.getter(name="tokenType")
|
504
536
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
505
537
|
"""
|
506
|
-
The type of token
|
538
|
+
The type of token that should be generated. Can be `service`,
|
539
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
540
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
541
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
542
|
+
requests a different type at generation time.
|
507
543
|
"""
|
508
544
|
return pulumi.get(self, "token_type")
|
509
545
|
|
@@ -579,8 +615,9 @@ class _AuthBackendRoleState:
|
|
579
615
|
Required for OIDC roles
|
580
616
|
:param pulumi.Input[str] backend: The unique name of the auth backend to configure.
|
581
617
|
Defaults to `jwt`.
|
582
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (
|
583
|
-
|
618
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
|
619
|
+
or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
|
620
|
+
Any match is sufficient.
|
584
621
|
:param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
|
585
622
|
A claim's value must be a string, which may contain one value or multiple
|
586
623
|
comma-separated values, e.g. `"red"` or `"red,green,blue"`.
|
@@ -596,7 +633,7 @@ class _AuthBackendRoleState:
|
|
596
633
|
Only applicable with "jwt" roles.
|
597
634
|
:param pulumi.Input[bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
|
598
635
|
:param pulumi.Input[int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
|
599
|
-
clock skew, in seconds. Defaults to `
|
636
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
600
637
|
Only applicable with "jwt" roles.
|
601
638
|
:param pulumi.Input[str] groups_claim: The claim to use to uniquely identify
|
602
639
|
the set of groups to which the user belongs; this will be used as the names
|
@@ -609,21 +646,38 @@ class _AuthBackendRoleState:
|
|
609
646
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
610
647
|
*Available only for Vault Enterprise*.
|
611
648
|
:param pulumi.Input[int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
|
612
|
-
clock skew, in seconds. Defaults to `
|
649
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
613
650
|
Only applicable with "jwt" roles.
|
614
651
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
|
615
652
|
The standard scope "openid" is automatically included and need not be specified.
|
616
653
|
:param pulumi.Input[str] role_name: The name of the role.
|
617
654
|
:param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
|
618
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
619
|
-
|
620
|
-
|
621
|
-
:param pulumi.Input[
|
622
|
-
|
623
|
-
|
624
|
-
|
625
|
-
:param pulumi.Input[int]
|
626
|
-
|
655
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
656
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
657
|
+
as well.
|
658
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
659
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
660
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
661
|
+
`token_max_ttl` would otherwise allow a renewal.
|
662
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
663
|
+
Its current value will be referenced at renewal time.
|
664
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
665
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
666
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
667
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
668
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
669
|
+
token generated using this role should never expire. The token should be renewed within the
|
670
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
671
|
+
value of this field. Specified in seconds.
|
672
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
673
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
674
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
675
|
+
Its current value will be referenced at renewal time.
|
676
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
677
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
678
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
679
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
680
|
+
requests a different type at generation time.
|
627
681
|
:param pulumi.Input[str] user_claim: The claim to use to uniquely identify
|
628
682
|
the user; this will be used as the name for the Identity entity alias created
|
629
683
|
due to a successful login.
|
@@ -724,8 +778,9 @@ class _AuthBackendRoleState:
|
|
724
778
|
@pulumi.getter(name="boundAudiences")
|
725
779
|
def bound_audiences(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
726
780
|
"""
|
727
|
-
(
|
728
|
-
|
781
|
+
(For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
|
782
|
+
or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
|
783
|
+
Any match is sufficient.
|
729
784
|
"""
|
730
785
|
return pulumi.get(self, "bound_audiences")
|
731
786
|
|
@@ -818,7 +873,7 @@ class _AuthBackendRoleState:
|
|
818
873
|
def expiration_leeway(self) -> Optional[pulumi.Input[int]]:
|
819
874
|
"""
|
820
875
|
The amount of leeway to add to expiration (`exp`) claims to account for
|
821
|
-
clock skew, in seconds. Defaults to `
|
876
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
822
877
|
Only applicable with "jwt" roles.
|
823
878
|
"""
|
824
879
|
return pulumi.get(self, "expiration_leeway")
|
@@ -875,7 +930,7 @@ class _AuthBackendRoleState:
|
|
875
930
|
def not_before_leeway(self) -> Optional[pulumi.Input[int]]:
|
876
931
|
"""
|
877
932
|
The amount of leeway to add to not before (`nbf`) claims to account for
|
878
|
-
clock skew, in seconds. Defaults to `
|
933
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
879
934
|
Only applicable with "jwt" roles.
|
880
935
|
"""
|
881
936
|
return pulumi.get(self, "not_before_leeway")
|
@@ -925,7 +980,9 @@ class _AuthBackendRoleState:
|
|
925
980
|
@pulumi.getter(name="tokenBoundCidrs")
|
926
981
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
927
982
|
"""
|
928
|
-
|
983
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
984
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
985
|
+
as well.
|
929
986
|
"""
|
930
987
|
return pulumi.get(self, "token_bound_cidrs")
|
931
988
|
|
@@ -937,7 +994,10 @@ class _AuthBackendRoleState:
|
|
937
994
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
938
995
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
939
996
|
"""
|
940
|
-
|
997
|
+
If set, will encode an
|
998
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
999
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1000
|
+
`token_max_ttl` would otherwise allow a renewal.
|
941
1001
|
"""
|
942
1002
|
return pulumi.get(self, "token_explicit_max_ttl")
|
943
1003
|
|
@@ -949,7 +1009,8 @@ class _AuthBackendRoleState:
|
|
949
1009
|
@pulumi.getter(name="tokenMaxTtl")
|
950
1010
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
951
1011
|
"""
|
952
|
-
The maximum lifetime
|
1012
|
+
The maximum lifetime for generated tokens in number of seconds.
|
1013
|
+
Its current value will be referenced at renewal time.
|
953
1014
|
"""
|
954
1015
|
return pulumi.get(self, "token_max_ttl")
|
955
1016
|
|
@@ -961,7 +1022,8 @@ class _AuthBackendRoleState:
|
|
961
1022
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
962
1023
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
963
1024
|
"""
|
964
|
-
If
|
1025
|
+
If set, the default policy will not be set on
|
1026
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
965
1027
|
"""
|
966
1028
|
return pulumi.get(self, "token_no_default_policy")
|
967
1029
|
|
@@ -973,7 +1035,8 @@ class _AuthBackendRoleState:
|
|
973
1035
|
@pulumi.getter(name="tokenNumUses")
|
974
1036
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
975
1037
|
"""
|
976
|
-
The maximum number
|
1038
|
+
The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
1039
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
977
1040
|
"""
|
978
1041
|
return pulumi.get(self, "token_num_uses")
|
979
1042
|
|
@@ -985,7 +1048,10 @@ class _AuthBackendRoleState:
|
|
985
1048
|
@pulumi.getter(name="tokenPeriod")
|
986
1049
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
987
1050
|
"""
|
988
|
-
|
1051
|
+
If set, indicates that the
|
1052
|
+
token generated using this role should never expire. The token should be renewed within the
|
1053
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1054
|
+
value of this field. Specified in seconds.
|
989
1055
|
"""
|
990
1056
|
return pulumi.get(self, "token_period")
|
991
1057
|
|
@@ -997,7 +1063,8 @@ class _AuthBackendRoleState:
|
|
997
1063
|
@pulumi.getter(name="tokenPolicies")
|
998
1064
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
999
1065
|
"""
|
1000
|
-
|
1066
|
+
List of policies to encode onto generated tokens. Depending
|
1067
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1001
1068
|
"""
|
1002
1069
|
return pulumi.get(self, "token_policies")
|
1003
1070
|
|
@@ -1009,7 +1076,8 @@ class _AuthBackendRoleState:
|
|
1009
1076
|
@pulumi.getter(name="tokenTtl")
|
1010
1077
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
1011
1078
|
"""
|
1012
|
-
The
|
1079
|
+
The incremental lifetime for generated tokens in number of seconds.
|
1080
|
+
Its current value will be referenced at renewal time.
|
1013
1081
|
"""
|
1014
1082
|
return pulumi.get(self, "token_ttl")
|
1015
1083
|
|
@@ -1021,7 +1089,11 @@ class _AuthBackendRoleState:
|
|
1021
1089
|
@pulumi.getter(name="tokenType")
|
1022
1090
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
1023
1091
|
"""
|
1024
|
-
The type of token
|
1092
|
+
The type of token that should be generated. Can be `service`,
|
1093
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1094
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1095
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1096
|
+
requests a different type at generation time.
|
1025
1097
|
"""
|
1026
1098
|
return pulumi.get(self, "token_type")
|
1027
1099
|
|
@@ -1117,6 +1189,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1117
1189
|
|
1118
1190
|
Role for JWT backend:
|
1119
1191
|
|
1192
|
+
<!--Start PulumiCodeChooser -->
|
1120
1193
|
```python
|
1121
1194
|
import pulumi
|
1122
1195
|
import pulumi_vault as vault
|
@@ -1137,9 +1210,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1137
1210
|
user_claim="https://vault/user",
|
1138
1211
|
role_type="jwt")
|
1139
1212
|
```
|
1213
|
+
<!--End PulumiCodeChooser -->
|
1140
1214
|
|
1141
1215
|
Role for OIDC backend:
|
1142
1216
|
|
1217
|
+
<!--Start PulumiCodeChooser -->
|
1143
1218
|
```python
|
1144
1219
|
import pulumi
|
1145
1220
|
import pulumi_vault as vault
|
@@ -1159,6 +1234,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1159
1234
|
role_type="oidc",
|
1160
1235
|
allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
|
1161
1236
|
```
|
1237
|
+
<!--End PulumiCodeChooser -->
|
1162
1238
|
|
1163
1239
|
## Import
|
1164
1240
|
|
@@ -1174,8 +1250,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1174
1250
|
Required for OIDC roles
|
1175
1251
|
:param pulumi.Input[str] backend: The unique name of the auth backend to configure.
|
1176
1252
|
Defaults to `jwt`.
|
1177
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (
|
1178
|
-
|
1253
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
|
1254
|
+
or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
|
1255
|
+
Any match is sufficient.
|
1179
1256
|
:param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
|
1180
1257
|
A claim's value must be a string, which may contain one value or multiple
|
1181
1258
|
comma-separated values, e.g. `"red"` or `"red,green,blue"`.
|
@@ -1191,7 +1268,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1191
1268
|
Only applicable with "jwt" roles.
|
1192
1269
|
:param pulumi.Input[bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
|
1193
1270
|
:param pulumi.Input[int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
|
1194
|
-
clock skew, in seconds. Defaults to `
|
1271
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
1195
1272
|
Only applicable with "jwt" roles.
|
1196
1273
|
:param pulumi.Input[str] groups_claim: The claim to use to uniquely identify
|
1197
1274
|
the set of groups to which the user belongs; this will be used as the names
|
@@ -1204,21 +1281,38 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1204
1281
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1205
1282
|
*Available only for Vault Enterprise*.
|
1206
1283
|
:param pulumi.Input[int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
|
1207
|
-
clock skew, in seconds. Defaults to `
|
1284
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
1208
1285
|
Only applicable with "jwt" roles.
|
1209
1286
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
|
1210
1287
|
The standard scope "openid" is automatically included and need not be specified.
|
1211
1288
|
:param pulumi.Input[str] role_name: The name of the role.
|
1212
1289
|
:param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
|
1213
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1214
|
-
|
1215
|
-
|
1216
|
-
:param pulumi.Input[
|
1217
|
-
|
1218
|
-
|
1219
|
-
|
1220
|
-
:param pulumi.Input[int]
|
1221
|
-
|
1290
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
1291
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1292
|
+
as well.
|
1293
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
1294
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1295
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1296
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1297
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
1298
|
+
Its current value will be referenced at renewal time.
|
1299
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1300
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1301
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
1302
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1303
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
1304
|
+
token generated using this role should never expire. The token should be renewed within the
|
1305
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1306
|
+
value of this field. Specified in seconds.
|
1307
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1308
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1309
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1310
|
+
Its current value will be referenced at renewal time.
|
1311
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1312
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1313
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1314
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1315
|
+
requests a different type at generation time.
|
1222
1316
|
:param pulumi.Input[str] user_claim: The claim to use to uniquely identify
|
1223
1317
|
the user; this will be used as the name for the Identity entity alias created
|
1224
1318
|
due to a successful login.
|
@@ -1245,6 +1339,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1245
1339
|
|
1246
1340
|
Role for JWT backend:
|
1247
1341
|
|
1342
|
+
<!--Start PulumiCodeChooser -->
|
1248
1343
|
```python
|
1249
1344
|
import pulumi
|
1250
1345
|
import pulumi_vault as vault
|
@@ -1265,9 +1360,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1265
1360
|
user_claim="https://vault/user",
|
1266
1361
|
role_type="jwt")
|
1267
1362
|
```
|
1363
|
+
<!--End PulumiCodeChooser -->
|
1268
1364
|
|
1269
1365
|
Role for OIDC backend:
|
1270
1366
|
|
1367
|
+
<!--Start PulumiCodeChooser -->
|
1271
1368
|
```python
|
1272
1369
|
import pulumi
|
1273
1370
|
import pulumi_vault as vault
|
@@ -1287,6 +1384,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1287
1384
|
role_type="oidc",
|
1288
1385
|
allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
|
1289
1386
|
```
|
1387
|
+
<!--End PulumiCodeChooser -->
|
1290
1388
|
|
1291
1389
|
## Import
|
1292
1390
|
|
@@ -1432,8 +1530,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1432
1530
|
Required for OIDC roles
|
1433
1531
|
:param pulumi.Input[str] backend: The unique name of the auth backend to configure.
|
1434
1532
|
Defaults to `jwt`.
|
1435
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (
|
1436
|
-
|
1533
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
|
1534
|
+
or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
|
1535
|
+
Any match is sufficient.
|
1437
1536
|
:param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
|
1438
1537
|
A claim's value must be a string, which may contain one value or multiple
|
1439
1538
|
comma-separated values, e.g. `"red"` or `"red,green,blue"`.
|
@@ -1449,7 +1548,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1449
1548
|
Only applicable with "jwt" roles.
|
1450
1549
|
:param pulumi.Input[bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
|
1451
1550
|
:param pulumi.Input[int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
|
1452
|
-
clock skew, in seconds. Defaults to `
|
1551
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
1453
1552
|
Only applicable with "jwt" roles.
|
1454
1553
|
:param pulumi.Input[str] groups_claim: The claim to use to uniquely identify
|
1455
1554
|
the set of groups to which the user belongs; this will be used as the names
|
@@ -1462,21 +1561,38 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1462
1561
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1463
1562
|
*Available only for Vault Enterprise*.
|
1464
1563
|
:param pulumi.Input[int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
|
1465
|
-
clock skew, in seconds. Defaults to `
|
1564
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
1466
1565
|
Only applicable with "jwt" roles.
|
1467
1566
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
|
1468
1567
|
The standard scope "openid" is automatically included and need not be specified.
|
1469
1568
|
:param pulumi.Input[str] role_name: The name of the role.
|
1470
1569
|
:param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
|
1471
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1472
|
-
|
1473
|
-
|
1474
|
-
:param pulumi.Input[
|
1475
|
-
|
1476
|
-
|
1477
|
-
|
1478
|
-
:param pulumi.Input[int]
|
1479
|
-
|
1570
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
1571
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1572
|
+
as well.
|
1573
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
1574
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1575
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1576
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1577
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
1578
|
+
Its current value will be referenced at renewal time.
|
1579
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1580
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1581
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
1582
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1583
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
1584
|
+
token generated using this role should never expire. The token should be renewed within the
|
1585
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1586
|
+
value of this field. Specified in seconds.
|
1587
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1588
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1589
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1590
|
+
Its current value will be referenced at renewal time.
|
1591
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1592
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1593
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1594
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1595
|
+
requests a different type at generation time.
|
1480
1596
|
:param pulumi.Input[str] user_claim: The claim to use to uniquely identify
|
1481
1597
|
the user; this will be used as the name for the Identity entity alias created
|
1482
1598
|
due to a successful login.
|
@@ -1545,8 +1661,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1545
1661
|
@pulumi.getter(name="boundAudiences")
|
1546
1662
|
def bound_audiences(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1547
1663
|
"""
|
1548
|
-
(
|
1549
|
-
|
1664
|
+
(For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
|
1665
|
+
or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
|
1666
|
+
Any match is sufficient.
|
1550
1667
|
"""
|
1551
1668
|
return pulumi.get(self, "bound_audiences")
|
1552
1669
|
|
@@ -1611,7 +1728,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1611
1728
|
def expiration_leeway(self) -> pulumi.Output[Optional[int]]:
|
1612
1729
|
"""
|
1613
1730
|
The amount of leeway to add to expiration (`exp`) claims to account for
|
1614
|
-
clock skew, in seconds. Defaults to `
|
1731
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
1615
1732
|
Only applicable with "jwt" roles.
|
1616
1733
|
"""
|
1617
1734
|
return pulumi.get(self, "expiration_leeway")
|
@@ -1652,7 +1769,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1652
1769
|
def not_before_leeway(self) -> pulumi.Output[Optional[int]]:
|
1653
1770
|
"""
|
1654
1771
|
The amount of leeway to add to not before (`nbf`) claims to account for
|
1655
|
-
clock skew, in seconds. Defaults to `
|
1772
|
+
clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
1656
1773
|
Only applicable with "jwt" roles.
|
1657
1774
|
"""
|
1658
1775
|
return pulumi.get(self, "not_before_leeway")
|
@@ -1686,7 +1803,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1686
1803
|
@pulumi.getter(name="tokenBoundCidrs")
|
1687
1804
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1688
1805
|
"""
|
1689
|
-
|
1806
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
1807
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1808
|
+
as well.
|
1690
1809
|
"""
|
1691
1810
|
return pulumi.get(self, "token_bound_cidrs")
|
1692
1811
|
|
@@ -1694,7 +1813,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1694
1813
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1695
1814
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1696
1815
|
"""
|
1697
|
-
|
1816
|
+
If set, will encode an
|
1817
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1818
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1819
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1698
1820
|
"""
|
1699
1821
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1700
1822
|
|
@@ -1702,7 +1824,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1702
1824
|
@pulumi.getter(name="tokenMaxTtl")
|
1703
1825
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1704
1826
|
"""
|
1705
|
-
The maximum lifetime
|
1827
|
+
The maximum lifetime for generated tokens in number of seconds.
|
1828
|
+
Its current value will be referenced at renewal time.
|
1706
1829
|
"""
|
1707
1830
|
return pulumi.get(self, "token_max_ttl")
|
1708
1831
|
|
@@ -1710,7 +1833,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1710
1833
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1711
1834
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1712
1835
|
"""
|
1713
|
-
If
|
1836
|
+
If set, the default policy will not be set on
|
1837
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1714
1838
|
"""
|
1715
1839
|
return pulumi.get(self, "token_no_default_policy")
|
1716
1840
|
|
@@ -1718,7 +1842,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1718
1842
|
@pulumi.getter(name="tokenNumUses")
|
1719
1843
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1720
1844
|
"""
|
1721
|
-
The maximum number
|
1845
|
+
The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
1846
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1722
1847
|
"""
|
1723
1848
|
return pulumi.get(self, "token_num_uses")
|
1724
1849
|
|
@@ -1726,7 +1851,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1726
1851
|
@pulumi.getter(name="tokenPeriod")
|
1727
1852
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1728
1853
|
"""
|
1729
|
-
|
1854
|
+
If set, indicates that the
|
1855
|
+
token generated using this role should never expire. The token should be renewed within the
|
1856
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1857
|
+
value of this field. Specified in seconds.
|
1730
1858
|
"""
|
1731
1859
|
return pulumi.get(self, "token_period")
|
1732
1860
|
|
@@ -1734,7 +1862,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1734
1862
|
@pulumi.getter(name="tokenPolicies")
|
1735
1863
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1736
1864
|
"""
|
1737
|
-
|
1865
|
+
List of policies to encode onto generated tokens. Depending
|
1866
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1738
1867
|
"""
|
1739
1868
|
return pulumi.get(self, "token_policies")
|
1740
1869
|
|
@@ -1742,7 +1871,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1742
1871
|
@pulumi.getter(name="tokenTtl")
|
1743
1872
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1744
1873
|
"""
|
1745
|
-
The
|
1874
|
+
The incremental lifetime for generated tokens in number of seconds.
|
1875
|
+
Its current value will be referenced at renewal time.
|
1746
1876
|
"""
|
1747
1877
|
return pulumi.get(self, "token_ttl")
|
1748
1878
|
|
@@ -1750,7 +1880,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1750
1880
|
@pulumi.getter(name="tokenType")
|
1751
1881
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1752
1882
|
"""
|
1753
|
-
The type of token
|
1883
|
+
The type of token that should be generated. Can be `service`,
|
1884
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1885
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1886
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1887
|
+
requests a different type at generation time.
|
1754
1888
|
"""
|
1755
1889
|
return pulumi.get(self, "token_type")
|
1756
1890
|
|