pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -26,15 +26,6 @@ class AuthBackendArgs:
|
|
26
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
27
27
|
path: Optional[pulumi.Input[str]] = None,
|
28
28
|
token: Optional[pulumi.Input[str]] = None,
|
29
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
31
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
32
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
33
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
34
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
35
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
36
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
37
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
38
29
|
ttl: Optional[pulumi.Input[str]] = None,
|
39
30
|
users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
|
40
31
|
"""
|
@@ -56,15 +47,6 @@ class AuthBackendArgs:
|
|
56
47
|
:param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
57
48
|
:param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
|
58
49
|
If this is not supplied only locally configured groups will be enabled.
|
59
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
60
|
-
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
61
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
62
|
-
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
63
|
-
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
64
|
-
:param pulumi.Input[int] token_period: Generated Token's Period
|
65
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
66
|
-
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
67
|
-
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
68
50
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
69
51
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
70
52
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
|
@@ -81,9 +63,6 @@ class AuthBackendArgs:
|
|
81
63
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
82
64
|
if groups is not None:
|
83
65
|
pulumi.set(__self__, "groups", groups)
|
84
|
-
if max_ttl is not None:
|
85
|
-
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
86
|
-
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
87
66
|
if max_ttl is not None:
|
88
67
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
89
68
|
if namespace is not None:
|
@@ -92,27 +71,6 @@ class AuthBackendArgs:
|
|
92
71
|
pulumi.set(__self__, "path", path)
|
93
72
|
if token is not None:
|
94
73
|
pulumi.set(__self__, "token", token)
|
95
|
-
if token_bound_cidrs is not None:
|
96
|
-
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
97
|
-
if token_explicit_max_ttl is not None:
|
98
|
-
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
99
|
-
if token_max_ttl is not None:
|
100
|
-
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
101
|
-
if token_no_default_policy is not None:
|
102
|
-
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
103
|
-
if token_num_uses is not None:
|
104
|
-
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
105
|
-
if token_period is not None:
|
106
|
-
pulumi.set(__self__, "token_period", token_period)
|
107
|
-
if token_policies is not None:
|
108
|
-
pulumi.set(__self__, "token_policies", token_policies)
|
109
|
-
if token_ttl is not None:
|
110
|
-
pulumi.set(__self__, "token_ttl", token_ttl)
|
111
|
-
if token_type is not None:
|
112
|
-
pulumi.set(__self__, "token_type", token_type)
|
113
|
-
if ttl is not None:
|
114
|
-
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
115
|
-
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
116
74
|
if ttl is not None:
|
117
75
|
pulumi.set(__self__, "ttl", ttl)
|
118
76
|
if users is not None:
|
@@ -199,9 +157,6 @@ class AuthBackendArgs:
|
|
199
157
|
Maximum duration after which authentication will be expired
|
200
158
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
201
159
|
"""
|
202
|
-
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
203
|
-
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
204
|
-
|
205
160
|
return pulumi.get(self, "max_ttl")
|
206
161
|
|
207
162
|
@max_ttl.setter
|
@@ -248,114 +203,6 @@ class AuthBackendArgs:
|
|
248
203
|
def token(self, value: Optional[pulumi.Input[str]]):
|
249
204
|
pulumi.set(self, "token", value)
|
250
205
|
|
251
|
-
@property
|
252
|
-
@pulumi.getter(name="tokenBoundCidrs")
|
253
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
254
|
-
"""
|
255
|
-
Specifies the blocks of IP addresses which are allowed to use the generated token
|
256
|
-
"""
|
257
|
-
return pulumi.get(self, "token_bound_cidrs")
|
258
|
-
|
259
|
-
@token_bound_cidrs.setter
|
260
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
261
|
-
pulumi.set(self, "token_bound_cidrs", value)
|
262
|
-
|
263
|
-
@property
|
264
|
-
@pulumi.getter(name="tokenExplicitMaxTtl")
|
265
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
266
|
-
"""
|
267
|
-
Generated Token's Explicit Maximum TTL in seconds
|
268
|
-
"""
|
269
|
-
return pulumi.get(self, "token_explicit_max_ttl")
|
270
|
-
|
271
|
-
@token_explicit_max_ttl.setter
|
272
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
273
|
-
pulumi.set(self, "token_explicit_max_ttl", value)
|
274
|
-
|
275
|
-
@property
|
276
|
-
@pulumi.getter(name="tokenMaxTtl")
|
277
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
278
|
-
"""
|
279
|
-
The maximum lifetime of the generated token
|
280
|
-
"""
|
281
|
-
return pulumi.get(self, "token_max_ttl")
|
282
|
-
|
283
|
-
@token_max_ttl.setter
|
284
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
285
|
-
pulumi.set(self, "token_max_ttl", value)
|
286
|
-
|
287
|
-
@property
|
288
|
-
@pulumi.getter(name="tokenNoDefaultPolicy")
|
289
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
290
|
-
"""
|
291
|
-
If true, the 'default' policy will not automatically be added to generated tokens
|
292
|
-
"""
|
293
|
-
return pulumi.get(self, "token_no_default_policy")
|
294
|
-
|
295
|
-
@token_no_default_policy.setter
|
296
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
|
297
|
-
pulumi.set(self, "token_no_default_policy", value)
|
298
|
-
|
299
|
-
@property
|
300
|
-
@pulumi.getter(name="tokenNumUses")
|
301
|
-
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
302
|
-
"""
|
303
|
-
The maximum number of times a token may be used, a value of zero means unlimited
|
304
|
-
"""
|
305
|
-
return pulumi.get(self, "token_num_uses")
|
306
|
-
|
307
|
-
@token_num_uses.setter
|
308
|
-
def token_num_uses(self, value: Optional[pulumi.Input[int]]):
|
309
|
-
pulumi.set(self, "token_num_uses", value)
|
310
|
-
|
311
|
-
@property
|
312
|
-
@pulumi.getter(name="tokenPeriod")
|
313
|
-
def token_period(self) -> Optional[pulumi.Input[int]]:
|
314
|
-
"""
|
315
|
-
Generated Token's Period
|
316
|
-
"""
|
317
|
-
return pulumi.get(self, "token_period")
|
318
|
-
|
319
|
-
@token_period.setter
|
320
|
-
def token_period(self, value: Optional[pulumi.Input[int]]):
|
321
|
-
pulumi.set(self, "token_period", value)
|
322
|
-
|
323
|
-
@property
|
324
|
-
@pulumi.getter(name="tokenPolicies")
|
325
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
326
|
-
"""
|
327
|
-
Generated Token's Policies
|
328
|
-
"""
|
329
|
-
return pulumi.get(self, "token_policies")
|
330
|
-
|
331
|
-
@token_policies.setter
|
332
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
333
|
-
pulumi.set(self, "token_policies", value)
|
334
|
-
|
335
|
-
@property
|
336
|
-
@pulumi.getter(name="tokenTtl")
|
337
|
-
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
338
|
-
"""
|
339
|
-
The initial ttl of the token to generate in seconds
|
340
|
-
"""
|
341
|
-
return pulumi.get(self, "token_ttl")
|
342
|
-
|
343
|
-
@token_ttl.setter
|
344
|
-
def token_ttl(self, value: Optional[pulumi.Input[int]]):
|
345
|
-
pulumi.set(self, "token_ttl", value)
|
346
|
-
|
347
|
-
@property
|
348
|
-
@pulumi.getter(name="tokenType")
|
349
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
350
|
-
"""
|
351
|
-
The type of token to generate, service or batch
|
352
|
-
"""
|
353
|
-
return pulumi.get(self, "token_type")
|
354
|
-
|
355
|
-
@token_type.setter
|
356
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
357
|
-
pulumi.set(self, "token_type", value)
|
358
|
-
|
359
206
|
@property
|
360
207
|
@pulumi.getter
|
361
208
|
def ttl(self) -> Optional[pulumi.Input[str]]:
|
@@ -363,9 +210,6 @@ class AuthBackendArgs:
|
|
363
210
|
Duration after which authentication will be expired.
|
364
211
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
365
212
|
"""
|
366
|
-
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
367
|
-
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
368
|
-
|
369
213
|
return pulumi.get(self, "ttl")
|
370
214
|
|
371
215
|
@ttl.setter
|
@@ -400,15 +244,6 @@ class _AuthBackendState:
|
|
400
244
|
organization: Optional[pulumi.Input[str]] = None,
|
401
245
|
path: Optional[pulumi.Input[str]] = None,
|
402
246
|
token: Optional[pulumi.Input[str]] = None,
|
403
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
404
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
405
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
406
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
407
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
408
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
409
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
410
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
411
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
412
247
|
ttl: Optional[pulumi.Input[str]] = None,
|
413
248
|
users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
|
414
249
|
"""
|
@@ -431,15 +266,6 @@ class _AuthBackendState:
|
|
431
266
|
:param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
432
267
|
:param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
|
433
268
|
If this is not supplied only locally configured groups will be enabled.
|
434
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
435
|
-
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
436
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
437
|
-
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
438
|
-
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
439
|
-
:param pulumi.Input[int] token_period: Generated Token's Period
|
440
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
441
|
-
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
442
|
-
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
443
269
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
444
270
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
445
271
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
|
@@ -457,9 +283,6 @@ class _AuthBackendState:
|
|
457
283
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
458
284
|
if groups is not None:
|
459
285
|
pulumi.set(__self__, "groups", groups)
|
460
|
-
if max_ttl is not None:
|
461
|
-
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
462
|
-
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
463
286
|
if max_ttl is not None:
|
464
287
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
465
288
|
if namespace is not None:
|
@@ -470,27 +293,6 @@ class _AuthBackendState:
|
|
470
293
|
pulumi.set(__self__, "path", path)
|
471
294
|
if token is not None:
|
472
295
|
pulumi.set(__self__, "token", token)
|
473
|
-
if token_bound_cidrs is not None:
|
474
|
-
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
475
|
-
if token_explicit_max_ttl is not None:
|
476
|
-
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
477
|
-
if token_max_ttl is not None:
|
478
|
-
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
479
|
-
if token_no_default_policy is not None:
|
480
|
-
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
481
|
-
if token_num_uses is not None:
|
482
|
-
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
483
|
-
if token_period is not None:
|
484
|
-
pulumi.set(__self__, "token_period", token_period)
|
485
|
-
if token_policies is not None:
|
486
|
-
pulumi.set(__self__, "token_policies", token_policies)
|
487
|
-
if token_ttl is not None:
|
488
|
-
pulumi.set(__self__, "token_ttl", token_ttl)
|
489
|
-
if token_type is not None:
|
490
|
-
pulumi.set(__self__, "token_type", token_type)
|
491
|
-
if ttl is not None:
|
492
|
-
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
493
|
-
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
494
296
|
if ttl is not None:
|
495
297
|
pulumi.set(__self__, "ttl", ttl)
|
496
298
|
if users is not None:
|
@@ -577,9 +379,6 @@ class _AuthBackendState:
|
|
577
379
|
Maximum duration after which authentication will be expired
|
578
380
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
579
381
|
"""
|
580
|
-
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
581
|
-
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
582
|
-
|
583
382
|
return pulumi.get(self, "max_ttl")
|
584
383
|
|
585
384
|
@max_ttl.setter
|
@@ -638,114 +437,6 @@ class _AuthBackendState:
|
|
638
437
|
def token(self, value: Optional[pulumi.Input[str]]):
|
639
438
|
pulumi.set(self, "token", value)
|
640
439
|
|
641
|
-
@property
|
642
|
-
@pulumi.getter(name="tokenBoundCidrs")
|
643
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
644
|
-
"""
|
645
|
-
Specifies the blocks of IP addresses which are allowed to use the generated token
|
646
|
-
"""
|
647
|
-
return pulumi.get(self, "token_bound_cidrs")
|
648
|
-
|
649
|
-
@token_bound_cidrs.setter
|
650
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
651
|
-
pulumi.set(self, "token_bound_cidrs", value)
|
652
|
-
|
653
|
-
@property
|
654
|
-
@pulumi.getter(name="tokenExplicitMaxTtl")
|
655
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
656
|
-
"""
|
657
|
-
Generated Token's Explicit Maximum TTL in seconds
|
658
|
-
"""
|
659
|
-
return pulumi.get(self, "token_explicit_max_ttl")
|
660
|
-
|
661
|
-
@token_explicit_max_ttl.setter
|
662
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
663
|
-
pulumi.set(self, "token_explicit_max_ttl", value)
|
664
|
-
|
665
|
-
@property
|
666
|
-
@pulumi.getter(name="tokenMaxTtl")
|
667
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
668
|
-
"""
|
669
|
-
The maximum lifetime of the generated token
|
670
|
-
"""
|
671
|
-
return pulumi.get(self, "token_max_ttl")
|
672
|
-
|
673
|
-
@token_max_ttl.setter
|
674
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
675
|
-
pulumi.set(self, "token_max_ttl", value)
|
676
|
-
|
677
|
-
@property
|
678
|
-
@pulumi.getter(name="tokenNoDefaultPolicy")
|
679
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
680
|
-
"""
|
681
|
-
If true, the 'default' policy will not automatically be added to generated tokens
|
682
|
-
"""
|
683
|
-
return pulumi.get(self, "token_no_default_policy")
|
684
|
-
|
685
|
-
@token_no_default_policy.setter
|
686
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
|
687
|
-
pulumi.set(self, "token_no_default_policy", value)
|
688
|
-
|
689
|
-
@property
|
690
|
-
@pulumi.getter(name="tokenNumUses")
|
691
|
-
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
692
|
-
"""
|
693
|
-
The maximum number of times a token may be used, a value of zero means unlimited
|
694
|
-
"""
|
695
|
-
return pulumi.get(self, "token_num_uses")
|
696
|
-
|
697
|
-
@token_num_uses.setter
|
698
|
-
def token_num_uses(self, value: Optional[pulumi.Input[int]]):
|
699
|
-
pulumi.set(self, "token_num_uses", value)
|
700
|
-
|
701
|
-
@property
|
702
|
-
@pulumi.getter(name="tokenPeriod")
|
703
|
-
def token_period(self) -> Optional[pulumi.Input[int]]:
|
704
|
-
"""
|
705
|
-
Generated Token's Period
|
706
|
-
"""
|
707
|
-
return pulumi.get(self, "token_period")
|
708
|
-
|
709
|
-
@token_period.setter
|
710
|
-
def token_period(self, value: Optional[pulumi.Input[int]]):
|
711
|
-
pulumi.set(self, "token_period", value)
|
712
|
-
|
713
|
-
@property
|
714
|
-
@pulumi.getter(name="tokenPolicies")
|
715
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
716
|
-
"""
|
717
|
-
Generated Token's Policies
|
718
|
-
"""
|
719
|
-
return pulumi.get(self, "token_policies")
|
720
|
-
|
721
|
-
@token_policies.setter
|
722
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
723
|
-
pulumi.set(self, "token_policies", value)
|
724
|
-
|
725
|
-
@property
|
726
|
-
@pulumi.getter(name="tokenTtl")
|
727
|
-
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
728
|
-
"""
|
729
|
-
The initial ttl of the token to generate in seconds
|
730
|
-
"""
|
731
|
-
return pulumi.get(self, "token_ttl")
|
732
|
-
|
733
|
-
@token_ttl.setter
|
734
|
-
def token_ttl(self, value: Optional[pulumi.Input[int]]):
|
735
|
-
pulumi.set(self, "token_ttl", value)
|
736
|
-
|
737
|
-
@property
|
738
|
-
@pulumi.getter(name="tokenType")
|
739
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
740
|
-
"""
|
741
|
-
The type of token to generate, service or batch
|
742
|
-
"""
|
743
|
-
return pulumi.get(self, "token_type")
|
744
|
-
|
745
|
-
@token_type.setter
|
746
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
747
|
-
pulumi.set(self, "token_type", value)
|
748
|
-
|
749
440
|
@property
|
750
441
|
@pulumi.getter
|
751
442
|
def ttl(self) -> Optional[pulumi.Input[str]]:
|
@@ -753,9 +444,6 @@ class _AuthBackendState:
|
|
753
444
|
Duration after which authentication will be expired.
|
754
445
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
755
446
|
"""
|
756
|
-
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
757
|
-
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
758
|
-
|
759
447
|
return pulumi.get(self, "ttl")
|
760
448
|
|
761
449
|
@ttl.setter
|
@@ -791,15 +479,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
791
479
|
organization: Optional[pulumi.Input[str]] = None,
|
792
480
|
path: Optional[pulumi.Input[str]] = None,
|
793
481
|
token: Optional[pulumi.Input[str]] = None,
|
794
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
795
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
796
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
797
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
798
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
799
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
800
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
801
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
802
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
803
482
|
ttl: Optional[pulumi.Input[str]] = None,
|
804
483
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None,
|
805
484
|
__props__=None):
|
@@ -809,14 +488,13 @@ class AuthBackend(pulumi.CustomResource):
|
|
809
488
|
|
810
489
|
## Example Usage
|
811
490
|
|
491
|
+
<!--Start PulumiCodeChooser -->
|
812
492
|
```python
|
813
493
|
import pulumi
|
814
494
|
import pulumi_vault as vault
|
815
495
|
|
816
496
|
example = vault.okta.AuthBackend("example",
|
817
497
|
description="Demonstration of the Terraform Okta auth backend",
|
818
|
-
organization="example",
|
819
|
-
token="something that should be kept secret",
|
820
498
|
groups=[vault.okta.AuthBackendGroupArgs(
|
821
499
|
group_name="foo",
|
822
500
|
policies=[
|
@@ -824,11 +502,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
824
502
|
"two",
|
825
503
|
],
|
826
504
|
)],
|
505
|
+
organization="example",
|
506
|
+
token="something that should be kept secret",
|
827
507
|
users=[vault.okta.AuthBackendUserArgs(
|
828
|
-
username="bar",
|
829
508
|
groups=["foo"],
|
509
|
+
username="bar",
|
830
510
|
)])
|
831
511
|
```
|
512
|
+
<!--End PulumiCodeChooser -->
|
832
513
|
|
833
514
|
## Import
|
834
515
|
|
@@ -857,15 +538,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
857
538
|
:param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
858
539
|
:param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
|
859
540
|
If this is not supplied only locally configured groups will be enabled.
|
860
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
861
|
-
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
862
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
863
|
-
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
864
|
-
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
865
|
-
:param pulumi.Input[int] token_period: Generated Token's Period
|
866
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
867
|
-
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
868
|
-
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
869
541
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
870
542
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
871
543
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]] users: Associate Okta users with groups or policies within Vault.
|
@@ -883,14 +555,13 @@ class AuthBackend(pulumi.CustomResource):
|
|
883
555
|
|
884
556
|
## Example Usage
|
885
557
|
|
558
|
+
<!--Start PulumiCodeChooser -->
|
886
559
|
```python
|
887
560
|
import pulumi
|
888
561
|
import pulumi_vault as vault
|
889
562
|
|
890
563
|
example = vault.okta.AuthBackend("example",
|
891
564
|
description="Demonstration of the Terraform Okta auth backend",
|
892
|
-
organization="example",
|
893
|
-
token="something that should be kept secret",
|
894
565
|
groups=[vault.okta.AuthBackendGroupArgs(
|
895
566
|
group_name="foo",
|
896
567
|
policies=[
|
@@ -898,11 +569,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
898
569
|
"two",
|
899
570
|
],
|
900
571
|
)],
|
572
|
+
organization="example",
|
573
|
+
token="something that should be kept secret",
|
901
574
|
users=[vault.okta.AuthBackendUserArgs(
|
902
|
-
username="bar",
|
903
575
|
groups=["foo"],
|
576
|
+
username="bar",
|
904
577
|
)])
|
905
578
|
```
|
579
|
+
<!--End PulumiCodeChooser -->
|
906
580
|
|
907
581
|
## Import
|
908
582
|
|
@@ -937,15 +611,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
937
611
|
organization: Optional[pulumi.Input[str]] = None,
|
938
612
|
path: Optional[pulumi.Input[str]] = None,
|
939
613
|
token: Optional[pulumi.Input[str]] = None,
|
940
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
941
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
942
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
943
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
944
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
945
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
946
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
947
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
948
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
949
614
|
ttl: Optional[pulumi.Input[str]] = None,
|
950
615
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None,
|
951
616
|
__props__=None):
|
@@ -969,15 +634,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
969
634
|
__props__.__dict__["organization"] = organization
|
970
635
|
__props__.__dict__["path"] = path
|
971
636
|
__props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
|
972
|
-
__props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
|
973
|
-
__props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
|
974
|
-
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
975
|
-
__props__.__dict__["token_no_default_policy"] = token_no_default_policy
|
976
|
-
__props__.__dict__["token_num_uses"] = token_num_uses
|
977
|
-
__props__.__dict__["token_period"] = token_period
|
978
|
-
__props__.__dict__["token_policies"] = token_policies
|
979
|
-
__props__.__dict__["token_ttl"] = token_ttl
|
980
|
-
__props__.__dict__["token_type"] = token_type
|
981
637
|
__props__.__dict__["ttl"] = ttl
|
982
638
|
__props__.__dict__["users"] = users
|
983
639
|
__props__.__dict__["accessor"] = None
|
@@ -1004,15 +660,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1004
660
|
organization: Optional[pulumi.Input[str]] = None,
|
1005
661
|
path: Optional[pulumi.Input[str]] = None,
|
1006
662
|
token: Optional[pulumi.Input[str]] = None,
|
1007
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1008
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
1009
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
1010
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
1011
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
1012
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
1013
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1014
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
1015
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
1016
663
|
ttl: Optional[pulumi.Input[str]] = None,
|
1017
664
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None) -> 'AuthBackend':
|
1018
665
|
"""
|
@@ -1040,15 +687,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1040
687
|
:param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
1041
688
|
:param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
|
1042
689
|
If this is not supplied only locally configured groups will be enabled.
|
1043
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1044
|
-
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1045
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1046
|
-
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1047
|
-
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1048
|
-
:param pulumi.Input[int] token_period: Generated Token's Period
|
1049
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1050
|
-
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1051
|
-
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1052
690
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
1053
691
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
1054
692
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]] users: Associate Okta users with groups or policies within Vault.
|
@@ -1069,15 +707,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1069
707
|
__props__.__dict__["organization"] = organization
|
1070
708
|
__props__.__dict__["path"] = path
|
1071
709
|
__props__.__dict__["token"] = token
|
1072
|
-
__props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
|
1073
|
-
__props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
|
1074
|
-
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
1075
|
-
__props__.__dict__["token_no_default_policy"] = token_no_default_policy
|
1076
|
-
__props__.__dict__["token_num_uses"] = token_num_uses
|
1077
|
-
__props__.__dict__["token_period"] = token_period
|
1078
|
-
__props__.__dict__["token_policies"] = token_policies
|
1079
|
-
__props__.__dict__["token_ttl"] = token_ttl
|
1080
|
-
__props__.__dict__["token_type"] = token_type
|
1081
710
|
__props__.__dict__["ttl"] = ttl
|
1082
711
|
__props__.__dict__["users"] = users
|
1083
712
|
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
@@ -1139,9 +768,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1139
768
|
Maximum duration after which authentication will be expired
|
1140
769
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
1141
770
|
"""
|
1142
|
-
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
1143
|
-
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
1144
|
-
|
1145
771
|
return pulumi.get(self, "max_ttl")
|
1146
772
|
|
1147
773
|
@property
|
@@ -1180,78 +806,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1180
806
|
"""
|
1181
807
|
return pulumi.get(self, "token")
|
1182
808
|
|
1183
|
-
@property
|
1184
|
-
@pulumi.getter(name="tokenBoundCidrs")
|
1185
|
-
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1186
|
-
"""
|
1187
|
-
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1188
|
-
"""
|
1189
|
-
return pulumi.get(self, "token_bound_cidrs")
|
1190
|
-
|
1191
|
-
@property
|
1192
|
-
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1193
|
-
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1194
|
-
"""
|
1195
|
-
Generated Token's Explicit Maximum TTL in seconds
|
1196
|
-
"""
|
1197
|
-
return pulumi.get(self, "token_explicit_max_ttl")
|
1198
|
-
|
1199
|
-
@property
|
1200
|
-
@pulumi.getter(name="tokenMaxTtl")
|
1201
|
-
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1202
|
-
"""
|
1203
|
-
The maximum lifetime of the generated token
|
1204
|
-
"""
|
1205
|
-
return pulumi.get(self, "token_max_ttl")
|
1206
|
-
|
1207
|
-
@property
|
1208
|
-
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1209
|
-
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1210
|
-
"""
|
1211
|
-
If true, the 'default' policy will not automatically be added to generated tokens
|
1212
|
-
"""
|
1213
|
-
return pulumi.get(self, "token_no_default_policy")
|
1214
|
-
|
1215
|
-
@property
|
1216
|
-
@pulumi.getter(name="tokenNumUses")
|
1217
|
-
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1218
|
-
"""
|
1219
|
-
The maximum number of times a token may be used, a value of zero means unlimited
|
1220
|
-
"""
|
1221
|
-
return pulumi.get(self, "token_num_uses")
|
1222
|
-
|
1223
|
-
@property
|
1224
|
-
@pulumi.getter(name="tokenPeriod")
|
1225
|
-
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1226
|
-
"""
|
1227
|
-
Generated Token's Period
|
1228
|
-
"""
|
1229
|
-
return pulumi.get(self, "token_period")
|
1230
|
-
|
1231
|
-
@property
|
1232
|
-
@pulumi.getter(name="tokenPolicies")
|
1233
|
-
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1234
|
-
"""
|
1235
|
-
Generated Token's Policies
|
1236
|
-
"""
|
1237
|
-
return pulumi.get(self, "token_policies")
|
1238
|
-
|
1239
|
-
@property
|
1240
|
-
@pulumi.getter(name="tokenTtl")
|
1241
|
-
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1242
|
-
"""
|
1243
|
-
The initial ttl of the token to generate in seconds
|
1244
|
-
"""
|
1245
|
-
return pulumi.get(self, "token_ttl")
|
1246
|
-
|
1247
|
-
@property
|
1248
|
-
@pulumi.getter(name="tokenType")
|
1249
|
-
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1250
|
-
"""
|
1251
|
-
The type of token to generate, service or batch
|
1252
|
-
"""
|
1253
|
-
return pulumi.get(self, "token_type")
|
1254
|
-
|
1255
809
|
@property
|
1256
810
|
@pulumi.getter
|
1257
811
|
def ttl(self) -> pulumi.Output[Optional[str]]:
|
@@ -1259,9 +813,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1259
813
|
Duration after which authentication will be expired.
|
1260
814
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
1261
815
|
"""
|
1262
|
-
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
1263
|
-
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
1264
|
-
|
1265
816
|
return pulumi.get(self, "ttl")
|
1266
817
|
|
1267
818
|
@property
|