pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -50,15 +50,31 @@ class AuthBackendRoleArgs:
|
|
50
50
|
|
51
51
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
52
52
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
53
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
54
|
-
|
55
|
-
|
56
|
-
:param pulumi.Input[
|
57
|
-
|
58
|
-
|
53
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
54
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
55
|
+
as well.
|
56
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
57
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
58
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
59
|
+
`token_max_ttl` would otherwise allow a renewal.
|
60
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
61
|
+
Its current value will be referenced at renewal time.
|
62
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
63
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
64
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
65
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
66
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
67
|
+
token generated using this role should never expire. The token should be renewed within the
|
68
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
69
|
+
value of this field. Specified in seconds.
|
59
70
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
60
|
-
:param pulumi.Input[int] token_ttl: The
|
61
|
-
|
71
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
72
|
+
Its current value will be referenced at renewal time.
|
73
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
74
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
75
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
76
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
77
|
+
requests a different type at generation time.
|
62
78
|
"""
|
63
79
|
pulumi.set(__self__, "role_name", role_name)
|
64
80
|
if allowed_entity_aliases is not None:
|
@@ -227,7 +243,9 @@ class AuthBackendRoleArgs:
|
|
227
243
|
@pulumi.getter(name="tokenBoundCidrs")
|
228
244
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
229
245
|
"""
|
230
|
-
|
246
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
247
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
248
|
+
as well.
|
231
249
|
"""
|
232
250
|
return pulumi.get(self, "token_bound_cidrs")
|
233
251
|
|
@@ -239,7 +257,10 @@ class AuthBackendRoleArgs:
|
|
239
257
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
240
258
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
241
259
|
"""
|
242
|
-
|
260
|
+
If set, will encode an
|
261
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
262
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
263
|
+
`token_max_ttl` would otherwise allow a renewal.
|
243
264
|
"""
|
244
265
|
return pulumi.get(self, "token_explicit_max_ttl")
|
245
266
|
|
@@ -251,7 +272,8 @@ class AuthBackendRoleArgs:
|
|
251
272
|
@pulumi.getter(name="tokenMaxTtl")
|
252
273
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
253
274
|
"""
|
254
|
-
The maximum lifetime
|
275
|
+
The maximum lifetime for generated tokens in number of seconds.
|
276
|
+
Its current value will be referenced at renewal time.
|
255
277
|
"""
|
256
278
|
return pulumi.get(self, "token_max_ttl")
|
257
279
|
|
@@ -263,7 +285,8 @@ class AuthBackendRoleArgs:
|
|
263
285
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
264
286
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
265
287
|
"""
|
266
|
-
If
|
288
|
+
If set, the default policy will not be set on
|
289
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
267
290
|
"""
|
268
291
|
return pulumi.get(self, "token_no_default_policy")
|
269
292
|
|
@@ -275,7 +298,8 @@ class AuthBackendRoleArgs:
|
|
275
298
|
@pulumi.getter(name="tokenNumUses")
|
276
299
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
277
300
|
"""
|
278
|
-
The maximum number
|
301
|
+
The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
302
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
279
303
|
"""
|
280
304
|
return pulumi.get(self, "token_num_uses")
|
281
305
|
|
@@ -287,7 +311,10 @@ class AuthBackendRoleArgs:
|
|
287
311
|
@pulumi.getter(name="tokenPeriod")
|
288
312
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
289
313
|
"""
|
290
|
-
|
314
|
+
If set, indicates that the
|
315
|
+
token generated using this role should never expire. The token should be renewed within the
|
316
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
317
|
+
value of this field. Specified in seconds.
|
291
318
|
"""
|
292
319
|
return pulumi.get(self, "token_period")
|
293
320
|
|
@@ -311,7 +338,8 @@ class AuthBackendRoleArgs:
|
|
311
338
|
@pulumi.getter(name="tokenTtl")
|
312
339
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
313
340
|
"""
|
314
|
-
The
|
341
|
+
The incremental lifetime for generated tokens in number of seconds.
|
342
|
+
Its current value will be referenced at renewal time.
|
315
343
|
"""
|
316
344
|
return pulumi.get(self, "token_ttl")
|
317
345
|
|
@@ -323,7 +351,11 @@ class AuthBackendRoleArgs:
|
|
323
351
|
@pulumi.getter(name="tokenType")
|
324
352
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
325
353
|
"""
|
326
|
-
The type of token
|
354
|
+
The type of token that should be generated. Can be `service`,
|
355
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
356
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
357
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
358
|
+
requests a different type at generation time.
|
327
359
|
"""
|
328
360
|
return pulumi.get(self, "token_type")
|
329
361
|
|
@@ -371,15 +403,31 @@ class _AuthBackendRoleState:
|
|
371
403
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
372
404
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
373
405
|
:param pulumi.Input[str] role_name: The name of the role.
|
374
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
375
|
-
|
376
|
-
|
377
|
-
:param pulumi.Input[
|
378
|
-
|
379
|
-
|
406
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
407
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
408
|
+
as well.
|
409
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
410
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
411
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
412
|
+
`token_max_ttl` would otherwise allow a renewal.
|
413
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
414
|
+
Its current value will be referenced at renewal time.
|
415
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
416
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
417
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
418
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
419
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
420
|
+
token generated using this role should never expire. The token should be renewed within the
|
421
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
422
|
+
value of this field. Specified in seconds.
|
380
423
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
381
|
-
:param pulumi.Input[int] token_ttl: The
|
382
|
-
|
424
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
425
|
+
Its current value will be referenced at renewal time.
|
426
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
427
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
428
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
429
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
430
|
+
requests a different type at generation time.
|
383
431
|
"""
|
384
432
|
if allowed_entity_aliases is not None:
|
385
433
|
pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
|
@@ -549,7 +597,9 @@ class _AuthBackendRoleState:
|
|
549
597
|
@pulumi.getter(name="tokenBoundCidrs")
|
550
598
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
551
599
|
"""
|
552
|
-
|
600
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
601
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
602
|
+
as well.
|
553
603
|
"""
|
554
604
|
return pulumi.get(self, "token_bound_cidrs")
|
555
605
|
|
@@ -561,7 +611,10 @@ class _AuthBackendRoleState:
|
|
561
611
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
562
612
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
563
613
|
"""
|
564
|
-
|
614
|
+
If set, will encode an
|
615
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
616
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
617
|
+
`token_max_ttl` would otherwise allow a renewal.
|
565
618
|
"""
|
566
619
|
return pulumi.get(self, "token_explicit_max_ttl")
|
567
620
|
|
@@ -573,7 +626,8 @@ class _AuthBackendRoleState:
|
|
573
626
|
@pulumi.getter(name="tokenMaxTtl")
|
574
627
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
575
628
|
"""
|
576
|
-
The maximum lifetime
|
629
|
+
The maximum lifetime for generated tokens in number of seconds.
|
630
|
+
Its current value will be referenced at renewal time.
|
577
631
|
"""
|
578
632
|
return pulumi.get(self, "token_max_ttl")
|
579
633
|
|
@@ -585,7 +639,8 @@ class _AuthBackendRoleState:
|
|
585
639
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
586
640
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
587
641
|
"""
|
588
|
-
If
|
642
|
+
If set, the default policy will not be set on
|
643
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
589
644
|
"""
|
590
645
|
return pulumi.get(self, "token_no_default_policy")
|
591
646
|
|
@@ -597,7 +652,8 @@ class _AuthBackendRoleState:
|
|
597
652
|
@pulumi.getter(name="tokenNumUses")
|
598
653
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
599
654
|
"""
|
600
|
-
The maximum number
|
655
|
+
The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
656
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
601
657
|
"""
|
602
658
|
return pulumi.get(self, "token_num_uses")
|
603
659
|
|
@@ -609,7 +665,10 @@ class _AuthBackendRoleState:
|
|
609
665
|
@pulumi.getter(name="tokenPeriod")
|
610
666
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
611
667
|
"""
|
612
|
-
|
668
|
+
If set, indicates that the
|
669
|
+
token generated using this role should never expire. The token should be renewed within the
|
670
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
671
|
+
value of this field. Specified in seconds.
|
613
672
|
"""
|
614
673
|
return pulumi.get(self, "token_period")
|
615
674
|
|
@@ -633,7 +692,8 @@ class _AuthBackendRoleState:
|
|
633
692
|
@pulumi.getter(name="tokenTtl")
|
634
693
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
635
694
|
"""
|
636
|
-
The
|
695
|
+
The incremental lifetime for generated tokens in number of seconds.
|
696
|
+
Its current value will be referenced at renewal time.
|
637
697
|
"""
|
638
698
|
return pulumi.get(self, "token_ttl")
|
639
699
|
|
@@ -645,7 +705,11 @@ class _AuthBackendRoleState:
|
|
645
705
|
@pulumi.getter(name="tokenType")
|
646
706
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
647
707
|
"""
|
648
|
-
The type of token
|
708
|
+
The type of token that should be generated. Can be `service`,
|
709
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
710
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
711
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
712
|
+
requests a different type at generation time.
|
649
713
|
"""
|
650
714
|
return pulumi.get(self, "token_type")
|
651
715
|
|
@@ -686,24 +750,26 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
686
750
|
|
687
751
|
## Example Usage
|
688
752
|
|
753
|
+
<!--Start PulumiCodeChooser -->
|
689
754
|
```python
|
690
755
|
import pulumi
|
691
756
|
import pulumi_vault as vault
|
692
757
|
|
693
758
|
example = vault.tokenauth.AuthBackendRole("example",
|
694
|
-
|
759
|
+
allowed_entity_aliases=["test_entity"],
|
695
760
|
allowed_policies=[
|
696
761
|
"dev",
|
697
762
|
"test",
|
698
763
|
],
|
699
764
|
disallowed_policies=["default"],
|
700
|
-
allowed_entity_aliases=["test_entity"],
|
701
765
|
orphan=True,
|
702
|
-
|
766
|
+
path_suffix="path-suffix",
|
703
767
|
renewable=True,
|
768
|
+
role_name="my-role",
|
704
769
|
token_explicit_max_ttl=115200,
|
705
|
-
|
770
|
+
token_period=86400)
|
706
771
|
```
|
772
|
+
<!--End PulumiCodeChooser -->
|
707
773
|
|
708
774
|
## Import
|
709
775
|
|
@@ -730,15 +796,31 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
730
796
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
731
797
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
732
798
|
:param pulumi.Input[str] role_name: The name of the role.
|
733
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
734
|
-
|
735
|
-
|
736
|
-
:param pulumi.Input[
|
737
|
-
|
738
|
-
|
799
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
800
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
801
|
+
as well.
|
802
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
803
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
804
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
805
|
+
`token_max_ttl` would otherwise allow a renewal.
|
806
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
807
|
+
Its current value will be referenced at renewal time.
|
808
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
809
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
810
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
811
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
812
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
813
|
+
token generated using this role should never expire. The token should be renewed within the
|
814
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
815
|
+
value of this field. Specified in seconds.
|
739
816
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
740
|
-
:param pulumi.Input[int] token_ttl: The
|
741
|
-
|
817
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
818
|
+
Its current value will be referenced at renewal time.
|
819
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
820
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
821
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
822
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
823
|
+
requests a different type at generation time.
|
742
824
|
"""
|
743
825
|
...
|
744
826
|
@overload
|
@@ -753,24 +835,26 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
753
835
|
|
754
836
|
## Example Usage
|
755
837
|
|
838
|
+
<!--Start PulumiCodeChooser -->
|
756
839
|
```python
|
757
840
|
import pulumi
|
758
841
|
import pulumi_vault as vault
|
759
842
|
|
760
843
|
example = vault.tokenauth.AuthBackendRole("example",
|
761
|
-
|
844
|
+
allowed_entity_aliases=["test_entity"],
|
762
845
|
allowed_policies=[
|
763
846
|
"dev",
|
764
847
|
"test",
|
765
848
|
],
|
766
849
|
disallowed_policies=["default"],
|
767
|
-
allowed_entity_aliases=["test_entity"],
|
768
850
|
orphan=True,
|
769
|
-
|
851
|
+
path_suffix="path-suffix",
|
770
852
|
renewable=True,
|
853
|
+
role_name="my-role",
|
771
854
|
token_explicit_max_ttl=115200,
|
772
|
-
|
855
|
+
token_period=86400)
|
773
856
|
```
|
857
|
+
<!--End PulumiCodeChooser -->
|
774
858
|
|
775
859
|
## Import
|
776
860
|
|
@@ -895,15 +979,31 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
895
979
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
896
980
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
897
981
|
:param pulumi.Input[str] role_name: The name of the role.
|
898
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
899
|
-
|
900
|
-
|
901
|
-
:param pulumi.Input[
|
902
|
-
|
903
|
-
|
982
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
983
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
984
|
+
as well.
|
985
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
986
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
987
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
988
|
+
`token_max_ttl` would otherwise allow a renewal.
|
989
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
990
|
+
Its current value will be referenced at renewal time.
|
991
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
992
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
993
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
994
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
995
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
996
|
+
token generated using this role should never expire. The token should be renewed within the
|
997
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
998
|
+
value of this field. Specified in seconds.
|
904
999
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
905
|
-
:param pulumi.Input[int] token_ttl: The
|
906
|
-
|
1000
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1001
|
+
Its current value will be referenced at renewal time.
|
1002
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1003
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1004
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1005
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1006
|
+
requests a different type at generation time.
|
907
1007
|
"""
|
908
1008
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
909
1009
|
|
@@ -1019,7 +1119,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1019
1119
|
@pulumi.getter(name="tokenBoundCidrs")
|
1020
1120
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1021
1121
|
"""
|
1022
|
-
|
1122
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
1123
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1124
|
+
as well.
|
1023
1125
|
"""
|
1024
1126
|
return pulumi.get(self, "token_bound_cidrs")
|
1025
1127
|
|
@@ -1027,7 +1129,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1027
1129
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1028
1130
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1029
1131
|
"""
|
1030
|
-
|
1132
|
+
If set, will encode an
|
1133
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1134
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1135
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1031
1136
|
"""
|
1032
1137
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1033
1138
|
|
@@ -1035,7 +1140,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1035
1140
|
@pulumi.getter(name="tokenMaxTtl")
|
1036
1141
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1037
1142
|
"""
|
1038
|
-
The maximum lifetime
|
1143
|
+
The maximum lifetime for generated tokens in number of seconds.
|
1144
|
+
Its current value will be referenced at renewal time.
|
1039
1145
|
"""
|
1040
1146
|
return pulumi.get(self, "token_max_ttl")
|
1041
1147
|
|
@@ -1043,7 +1149,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1043
1149
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1044
1150
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1045
1151
|
"""
|
1046
|
-
If
|
1152
|
+
If set, the default policy will not be set on
|
1153
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1047
1154
|
"""
|
1048
1155
|
return pulumi.get(self, "token_no_default_policy")
|
1049
1156
|
|
@@ -1051,7 +1158,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1051
1158
|
@pulumi.getter(name="tokenNumUses")
|
1052
1159
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1053
1160
|
"""
|
1054
|
-
The maximum number
|
1161
|
+
The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
1162
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1055
1163
|
"""
|
1056
1164
|
return pulumi.get(self, "token_num_uses")
|
1057
1165
|
|
@@ -1059,7 +1167,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1059
1167
|
@pulumi.getter(name="tokenPeriod")
|
1060
1168
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1061
1169
|
"""
|
1062
|
-
|
1170
|
+
If set, indicates that the
|
1171
|
+
token generated using this role should never expire. The token should be renewed within the
|
1172
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1173
|
+
value of this field. Specified in seconds.
|
1063
1174
|
"""
|
1064
1175
|
return pulumi.get(self, "token_period")
|
1065
1176
|
|
@@ -1075,7 +1186,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1075
1186
|
@pulumi.getter(name="tokenTtl")
|
1076
1187
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1077
1188
|
"""
|
1078
|
-
The
|
1189
|
+
The incremental lifetime for generated tokens in number of seconds.
|
1190
|
+
Its current value will be referenced at renewal time.
|
1079
1191
|
"""
|
1080
1192
|
return pulumi.get(self, "token_ttl")
|
1081
1193
|
|
@@ -1083,7 +1195,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1083
1195
|
@pulumi.getter(name="tokenType")
|
1084
1196
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1085
1197
|
"""
|
1086
|
-
The type of token
|
1198
|
+
The type of token that should be generated. Can be `service`,
|
1199
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1200
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1201
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1202
|
+
requests a different type at generation time.
|
1087
1203
|
"""
|
1088
1204
|
return pulumi.get(self, "token_type")
|
1089
1205
|
|
@@ -183,18 +183,19 @@ class Alphabet(pulumi.CustomResource):
|
|
183
183
|
|
184
184
|
## Example Usage
|
185
185
|
|
186
|
+
<!--Start PulumiCodeChooser -->
|
186
187
|
```python
|
187
188
|
import pulumi
|
188
189
|
import pulumi_vault as vault
|
189
190
|
|
190
|
-
mount_transform = vault.Mount("
|
191
|
+
mount_transform = vault.Mount("mountTransform",
|
191
192
|
path="transform",
|
192
193
|
type="transform")
|
193
194
|
test = vault.transform.Alphabet("test",
|
194
195
|
path=mount_transform.path,
|
195
|
-
name="numerics",
|
196
196
|
alphabet="0123456789")
|
197
197
|
```
|
198
|
+
<!--End PulumiCodeChooser -->
|
198
199
|
|
199
200
|
:param str resource_name: The name of the resource.
|
200
201
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -219,18 +220,19 @@ class Alphabet(pulumi.CustomResource):
|
|
219
220
|
|
220
221
|
## Example Usage
|
221
222
|
|
223
|
+
<!--Start PulumiCodeChooser -->
|
222
224
|
```python
|
223
225
|
import pulumi
|
224
226
|
import pulumi_vault as vault
|
225
227
|
|
226
|
-
mount_transform = vault.Mount("
|
228
|
+
mount_transform = vault.Mount("mountTransform",
|
227
229
|
path="transform",
|
228
230
|
type="transform")
|
229
231
|
test = vault.transform.Alphabet("test",
|
230
232
|
path=mount_transform.path,
|
231
|
-
name="numerics",
|
232
233
|
alphabet="0123456789")
|
233
234
|
```
|
235
|
+
<!--End PulumiCodeChooser -->
|
234
236
|
|
235
237
|
:param str resource_name: The name of the resource.
|
236
238
|
:param AlphabetArgs args: The arguments to use to populate this resource's properties.
|
@@ -142,6 +142,7 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
142
142
|
|
143
143
|
## Example Usage
|
144
144
|
|
145
|
+
<!--Start PulumiCodeChooser -->
|
145
146
|
```python
|
146
147
|
import pulumi
|
147
148
|
import pulumi_vault as vault
|
@@ -151,19 +152,18 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
151
152
|
type="transform")
|
152
153
|
ccn_fpe = vault.transform.Transformation("ccn-fpe",
|
153
154
|
path=transform.path,
|
154
|
-
name="ccn-fpe",
|
155
155
|
type="fpe",
|
156
156
|
template="builtin/creditcardnumber",
|
157
157
|
tweak_source="internal",
|
158
158
|
allowed_roles=["payments"])
|
159
159
|
payments = vault.transform.Role("payments",
|
160
160
|
path=ccn_fpe.path,
|
161
|
-
name="payments",
|
162
161
|
transformations=["ccn-fpe"])
|
163
162
|
test = vault.transform.get_decode_output(path=payments.path,
|
164
163
|
role_name="payments",
|
165
164
|
value="9300-3376-4943-8903")
|
166
165
|
```
|
166
|
+
<!--End PulumiCodeChooser -->
|
167
167
|
|
168
168
|
|
169
169
|
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|
@@ -223,6 +223,7 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
223
223
|
|
224
224
|
## Example Usage
|
225
225
|
|
226
|
+
<!--Start PulumiCodeChooser -->
|
226
227
|
```python
|
227
228
|
import pulumi
|
228
229
|
import pulumi_vault as vault
|
@@ -232,19 +233,18 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
232
233
|
type="transform")
|
233
234
|
ccn_fpe = vault.transform.Transformation("ccn-fpe",
|
234
235
|
path=transform.path,
|
235
|
-
name="ccn-fpe",
|
236
236
|
type="fpe",
|
237
237
|
template="builtin/creditcardnumber",
|
238
238
|
tweak_source="internal",
|
239
239
|
allowed_roles=["payments"])
|
240
240
|
payments = vault.transform.Role("payments",
|
241
241
|
path=ccn_fpe.path,
|
242
|
-
name="payments",
|
243
242
|
transformations=["ccn-fpe"])
|
244
243
|
test = vault.transform.get_decode_output(path=payments.path,
|
245
244
|
role_name="payments",
|
246
245
|
value="9300-3376-4943-8903")
|
247
246
|
```
|
247
|
+
<!--End PulumiCodeChooser -->
|
248
248
|
|
249
249
|
|
250
250
|
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|
@@ -142,6 +142,7 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
142
142
|
|
143
143
|
## Example Usage
|
144
144
|
|
145
|
+
<!--Start PulumiCodeChooser -->
|
145
146
|
```python
|
146
147
|
import pulumi
|
147
148
|
import pulumi_vault as vault
|
@@ -151,14 +152,12 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
151
152
|
type="transform")
|
152
153
|
ccn_fpe = vault.transform.Transformation("ccn-fpe",
|
153
154
|
path=transform.path,
|
154
|
-
name="ccn-fpe",
|
155
155
|
type="fpe",
|
156
156
|
template="builtin/creditcardnumber",
|
157
157
|
tweak_source="internal",
|
158
158
|
allowed_roles=["payments"])
|
159
159
|
payments = vault.transform.Role("payments",
|
160
160
|
path=ccn_fpe.path,
|
161
|
-
name="payments",
|
162
161
|
transformations=["ccn-fpe"])
|
163
162
|
test = vault.transform.get_encode_output(path=payments.path,
|
164
163
|
role_name="payments",
|
@@ -166,6 +165,7 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
166
165
|
"value": "1111-2222-3333-4444",
|
167
166
|
}])
|
168
167
|
```
|
168
|
+
<!--End PulumiCodeChooser -->
|
169
169
|
|
170
170
|
|
171
171
|
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|
@@ -225,6 +225,7 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
225
225
|
|
226
226
|
## Example Usage
|
227
227
|
|
228
|
+
<!--Start PulumiCodeChooser -->
|
228
229
|
```python
|
229
230
|
import pulumi
|
230
231
|
import pulumi_vault as vault
|
@@ -234,14 +235,12 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
234
235
|
type="transform")
|
235
236
|
ccn_fpe = vault.transform.Transformation("ccn-fpe",
|
236
237
|
path=transform.path,
|
237
|
-
name="ccn-fpe",
|
238
238
|
type="fpe",
|
239
239
|
template="builtin/creditcardnumber",
|
240
240
|
tweak_source="internal",
|
241
241
|
allowed_roles=["payments"])
|
242
242
|
payments = vault.transform.Role("payments",
|
243
243
|
path=ccn_fpe.path,
|
244
|
-
name="payments",
|
245
244
|
transformations=["ccn-fpe"])
|
246
245
|
test = vault.transform.get_encode_output(path=payments.path,
|
247
246
|
role_name="payments",
|
@@ -249,6 +248,7 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
249
248
|
"value": "1111-2222-3333-4444",
|
250
249
|
}])
|
251
250
|
```
|
251
|
+
<!--End PulumiCodeChooser -->
|
252
252
|
|
253
253
|
|
254
254
|
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|