pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -117,15 +117,32 @@ class AuthBackendRoleArgs:
|
|
117
117
|
for this field should be the key of the tag on the EC2 instance. `auth_type`
|
118
118
|
must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
|
119
119
|
to use this constraint.
|
120
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
121
|
-
|
122
|
-
|
123
|
-
:param pulumi.Input[
|
124
|
-
|
125
|
-
|
126
|
-
|
127
|
-
:param pulumi.Input[int]
|
128
|
-
|
120
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
121
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
122
|
+
as well.
|
123
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
124
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
125
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
126
|
+
`token_max_ttl` would otherwise allow a renewal.
|
127
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
128
|
+
Its current value will be referenced at renewal time.
|
129
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
130
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
131
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
|
132
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
133
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
134
|
+
token generated using this role should never expire. The token should be renewed within the
|
135
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
136
|
+
value of this field. Specified in seconds.
|
137
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
138
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
139
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
140
|
+
Its current value will be referenced at renewal time.
|
141
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
142
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
143
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
144
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
145
|
+
requests a different type at generation time.
|
129
146
|
"""
|
130
147
|
pulumi.set(__self__, "role", role)
|
131
148
|
if allow_instance_migration is not None:
|
@@ -469,7 +486,9 @@ class AuthBackendRoleArgs:
|
|
469
486
|
@pulumi.getter(name="tokenBoundCidrs")
|
470
487
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
471
488
|
"""
|
472
|
-
|
489
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
490
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
491
|
+
as well.
|
473
492
|
"""
|
474
493
|
return pulumi.get(self, "token_bound_cidrs")
|
475
494
|
|
@@ -481,7 +500,10 @@ class AuthBackendRoleArgs:
|
|
481
500
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
482
501
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
483
502
|
"""
|
484
|
-
|
503
|
+
If set, will encode an
|
504
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
505
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
506
|
+
`token_max_ttl` would otherwise allow a renewal.
|
485
507
|
"""
|
486
508
|
return pulumi.get(self, "token_explicit_max_ttl")
|
487
509
|
|
@@ -493,7 +515,8 @@ class AuthBackendRoleArgs:
|
|
493
515
|
@pulumi.getter(name="tokenMaxTtl")
|
494
516
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
495
517
|
"""
|
496
|
-
The maximum lifetime
|
518
|
+
The maximum lifetime for generated tokens in number of seconds.
|
519
|
+
Its current value will be referenced at renewal time.
|
497
520
|
"""
|
498
521
|
return pulumi.get(self, "token_max_ttl")
|
499
522
|
|
@@ -505,7 +528,8 @@ class AuthBackendRoleArgs:
|
|
505
528
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
506
529
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
507
530
|
"""
|
508
|
-
If
|
531
|
+
If set, the default policy will not be set on
|
532
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
509
533
|
"""
|
510
534
|
return pulumi.get(self, "token_no_default_policy")
|
511
535
|
|
@@ -517,7 +541,8 @@ class AuthBackendRoleArgs:
|
|
517
541
|
@pulumi.getter(name="tokenNumUses")
|
518
542
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
519
543
|
"""
|
520
|
-
The maximum number
|
544
|
+
The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
|
545
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
521
546
|
"""
|
522
547
|
return pulumi.get(self, "token_num_uses")
|
523
548
|
|
@@ -529,7 +554,10 @@ class AuthBackendRoleArgs:
|
|
529
554
|
@pulumi.getter(name="tokenPeriod")
|
530
555
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
531
556
|
"""
|
532
|
-
|
557
|
+
If set, indicates that the
|
558
|
+
token generated using this role should never expire. The token should be renewed within the
|
559
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
560
|
+
value of this field. Specified in seconds.
|
533
561
|
"""
|
534
562
|
return pulumi.get(self, "token_period")
|
535
563
|
|
@@ -541,7 +569,8 @@ class AuthBackendRoleArgs:
|
|
541
569
|
@pulumi.getter(name="tokenPolicies")
|
542
570
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
543
571
|
"""
|
544
|
-
|
572
|
+
List of policies to encode onto generated tokens. Depending
|
573
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
545
574
|
"""
|
546
575
|
return pulumi.get(self, "token_policies")
|
547
576
|
|
@@ -553,7 +582,8 @@ class AuthBackendRoleArgs:
|
|
553
582
|
@pulumi.getter(name="tokenTtl")
|
554
583
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
555
584
|
"""
|
556
|
-
The
|
585
|
+
The incremental lifetime for generated tokens in number of seconds.
|
586
|
+
Its current value will be referenced at renewal time.
|
557
587
|
"""
|
558
588
|
return pulumi.get(self, "token_ttl")
|
559
589
|
|
@@ -565,7 +595,11 @@ class AuthBackendRoleArgs:
|
|
565
595
|
@pulumi.getter(name="tokenType")
|
566
596
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
567
597
|
"""
|
568
|
-
The type of token
|
598
|
+
The type of token that should be generated. Can be `service`,
|
599
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
600
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
601
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
602
|
+
requests a different type at generation time.
|
569
603
|
"""
|
570
604
|
return pulumi.get(self, "token_type")
|
571
605
|
|
@@ -682,15 +716,32 @@ class _AuthBackendRoleState:
|
|
682
716
|
for this field should be the key of the tag on the EC2 instance. `auth_type`
|
683
717
|
must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
|
684
718
|
to use this constraint.
|
685
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
686
|
-
|
687
|
-
|
688
|
-
:param pulumi.Input[
|
689
|
-
|
690
|
-
|
691
|
-
|
692
|
-
:param pulumi.Input[int]
|
693
|
-
|
719
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
720
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
721
|
+
as well.
|
722
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
723
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
724
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
725
|
+
`token_max_ttl` would otherwise allow a renewal.
|
726
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
727
|
+
Its current value will be referenced at renewal time.
|
728
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
729
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
730
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
|
731
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
732
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
733
|
+
token generated using this role should never expire. The token should be renewed within the
|
734
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
735
|
+
value of this field. Specified in seconds.
|
736
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
737
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
738
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
739
|
+
Its current value will be referenced at renewal time.
|
740
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
741
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
742
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
743
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
744
|
+
requests a different type at generation time.
|
694
745
|
"""
|
695
746
|
if allow_instance_migration is not None:
|
696
747
|
pulumi.set(__self__, "allow_instance_migration", allow_instance_migration)
|
@@ -1049,7 +1100,9 @@ class _AuthBackendRoleState:
|
|
1049
1100
|
@pulumi.getter(name="tokenBoundCidrs")
|
1050
1101
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1051
1102
|
"""
|
1052
|
-
|
1103
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
1104
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1105
|
+
as well.
|
1053
1106
|
"""
|
1054
1107
|
return pulumi.get(self, "token_bound_cidrs")
|
1055
1108
|
|
@@ -1061,7 +1114,10 @@ class _AuthBackendRoleState:
|
|
1061
1114
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1062
1115
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1063
1116
|
"""
|
1064
|
-
|
1117
|
+
If set, will encode an
|
1118
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1119
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1120
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1065
1121
|
"""
|
1066
1122
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1067
1123
|
|
@@ -1073,7 +1129,8 @@ class _AuthBackendRoleState:
|
|
1073
1129
|
@pulumi.getter(name="tokenMaxTtl")
|
1074
1130
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1075
1131
|
"""
|
1076
|
-
The maximum lifetime
|
1132
|
+
The maximum lifetime for generated tokens in number of seconds.
|
1133
|
+
Its current value will be referenced at renewal time.
|
1077
1134
|
"""
|
1078
1135
|
return pulumi.get(self, "token_max_ttl")
|
1079
1136
|
|
@@ -1085,7 +1142,8 @@ class _AuthBackendRoleState:
|
|
1085
1142
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1086
1143
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
1087
1144
|
"""
|
1088
|
-
If
|
1145
|
+
If set, the default policy will not be set on
|
1146
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1089
1147
|
"""
|
1090
1148
|
return pulumi.get(self, "token_no_default_policy")
|
1091
1149
|
|
@@ -1097,7 +1155,8 @@ class _AuthBackendRoleState:
|
|
1097
1155
|
@pulumi.getter(name="tokenNumUses")
|
1098
1156
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
1099
1157
|
"""
|
1100
|
-
The maximum number
|
1158
|
+
The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
|
1159
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1101
1160
|
"""
|
1102
1161
|
return pulumi.get(self, "token_num_uses")
|
1103
1162
|
|
@@ -1109,7 +1168,10 @@ class _AuthBackendRoleState:
|
|
1109
1168
|
@pulumi.getter(name="tokenPeriod")
|
1110
1169
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
1111
1170
|
"""
|
1112
|
-
|
1171
|
+
If set, indicates that the
|
1172
|
+
token generated using this role should never expire. The token should be renewed within the
|
1173
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1174
|
+
value of this field. Specified in seconds.
|
1113
1175
|
"""
|
1114
1176
|
return pulumi.get(self, "token_period")
|
1115
1177
|
|
@@ -1121,7 +1183,8 @@ class _AuthBackendRoleState:
|
|
1121
1183
|
@pulumi.getter(name="tokenPolicies")
|
1122
1184
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1123
1185
|
"""
|
1124
|
-
|
1186
|
+
List of policies to encode onto generated tokens. Depending
|
1187
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1125
1188
|
"""
|
1126
1189
|
return pulumi.get(self, "token_policies")
|
1127
1190
|
|
@@ -1133,7 +1196,8 @@ class _AuthBackendRoleState:
|
|
1133
1196
|
@pulumi.getter(name="tokenTtl")
|
1134
1197
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
1135
1198
|
"""
|
1136
|
-
The
|
1199
|
+
The incremental lifetime for generated tokens in number of seconds.
|
1200
|
+
Its current value will be referenced at renewal time.
|
1137
1201
|
"""
|
1138
1202
|
return pulumi.get(self, "token_ttl")
|
1139
1203
|
|
@@ -1145,7 +1209,11 @@ class _AuthBackendRoleState:
|
|
1145
1209
|
@pulumi.getter(name="tokenType")
|
1146
1210
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
1147
1211
|
"""
|
1148
|
-
The type of token
|
1212
|
+
The type of token that should be generated. Can be `service`,
|
1213
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1214
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1215
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1216
|
+
requests a different type at generation time.
|
1149
1217
|
"""
|
1150
1218
|
return pulumi.get(self, "token_type")
|
1151
1219
|
|
@@ -1197,6 +1265,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1197
1265
|
|
1198
1266
|
## Example Usage
|
1199
1267
|
|
1268
|
+
<!--Start PulumiCodeChooser -->
|
1200
1269
|
```python
|
1201
1270
|
import pulumi
|
1202
1271
|
import pulumi_vault as vault
|
@@ -1222,6 +1291,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1222
1291
|
"prod",
|
1223
1292
|
])
|
1224
1293
|
```
|
1294
|
+
<!--End PulumiCodeChooser -->
|
1225
1295
|
|
1226
1296
|
## Import
|
1227
1297
|
|
@@ -1306,15 +1376,32 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1306
1376
|
for this field should be the key of the tag on the EC2 instance. `auth_type`
|
1307
1377
|
must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
|
1308
1378
|
to use this constraint.
|
1309
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1310
|
-
|
1311
|
-
|
1312
|
-
:param pulumi.Input[
|
1313
|
-
|
1314
|
-
|
1315
|
-
|
1316
|
-
:param pulumi.Input[int]
|
1317
|
-
|
1379
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
1380
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1381
|
+
as well.
|
1382
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
1383
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1384
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1385
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1386
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
1387
|
+
Its current value will be referenced at renewal time.
|
1388
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1389
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1390
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
|
1391
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1392
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
1393
|
+
token generated using this role should never expire. The token should be renewed within the
|
1394
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1395
|
+
value of this field. Specified in seconds.
|
1396
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1397
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1398
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1399
|
+
Its current value will be referenced at renewal time.
|
1400
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1401
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1402
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1403
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1404
|
+
requests a different type at generation time.
|
1318
1405
|
"""
|
1319
1406
|
...
|
1320
1407
|
@overload
|
@@ -1331,6 +1418,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1331
1418
|
|
1332
1419
|
## Example Usage
|
1333
1420
|
|
1421
|
+
<!--Start PulumiCodeChooser -->
|
1334
1422
|
```python
|
1335
1423
|
import pulumi
|
1336
1424
|
import pulumi_vault as vault
|
@@ -1356,6 +1444,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1356
1444
|
"prod",
|
1357
1445
|
])
|
1358
1446
|
```
|
1447
|
+
<!--End PulumiCodeChooser -->
|
1359
1448
|
|
1360
1449
|
## Import
|
1361
1450
|
|
@@ -1568,15 +1657,32 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1568
1657
|
for this field should be the key of the tag on the EC2 instance. `auth_type`
|
1569
1658
|
must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
|
1570
1659
|
to use this constraint.
|
1571
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1572
|
-
|
1573
|
-
|
1574
|
-
:param pulumi.Input[
|
1575
|
-
|
1576
|
-
|
1577
|
-
|
1578
|
-
:param pulumi.Input[int]
|
1579
|
-
|
1660
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
1661
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1662
|
+
as well.
|
1663
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
1664
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1665
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1666
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1667
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
1668
|
+
Its current value will be referenced at renewal time.
|
1669
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1670
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1671
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
|
1672
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1673
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
1674
|
+
token generated using this role should never expire. The token should be renewed within the
|
1675
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1676
|
+
value of this field. Specified in seconds.
|
1677
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1678
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1679
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1680
|
+
Its current value will be referenced at renewal time.
|
1681
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1682
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1683
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1684
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1685
|
+
requests a different type at generation time.
|
1580
1686
|
"""
|
1581
1687
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1582
1688
|
|
@@ -1831,7 +1937,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1831
1937
|
@pulumi.getter(name="tokenBoundCidrs")
|
1832
1938
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1833
1939
|
"""
|
1834
|
-
|
1940
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
1941
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1942
|
+
as well.
|
1835
1943
|
"""
|
1836
1944
|
return pulumi.get(self, "token_bound_cidrs")
|
1837
1945
|
|
@@ -1839,7 +1947,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1839
1947
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1840
1948
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1841
1949
|
"""
|
1842
|
-
|
1950
|
+
If set, will encode an
|
1951
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1952
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1953
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1843
1954
|
"""
|
1844
1955
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1845
1956
|
|
@@ -1847,7 +1958,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1847
1958
|
@pulumi.getter(name="tokenMaxTtl")
|
1848
1959
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1849
1960
|
"""
|
1850
|
-
The maximum lifetime
|
1961
|
+
The maximum lifetime for generated tokens in number of seconds.
|
1962
|
+
Its current value will be referenced at renewal time.
|
1851
1963
|
"""
|
1852
1964
|
return pulumi.get(self, "token_max_ttl")
|
1853
1965
|
|
@@ -1855,7 +1967,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1855
1967
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1856
1968
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1857
1969
|
"""
|
1858
|
-
If
|
1970
|
+
If set, the default policy will not be set on
|
1971
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1859
1972
|
"""
|
1860
1973
|
return pulumi.get(self, "token_no_default_policy")
|
1861
1974
|
|
@@ -1863,7 +1976,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1863
1976
|
@pulumi.getter(name="tokenNumUses")
|
1864
1977
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1865
1978
|
"""
|
1866
|
-
The maximum number
|
1979
|
+
The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
|
1980
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1867
1981
|
"""
|
1868
1982
|
return pulumi.get(self, "token_num_uses")
|
1869
1983
|
|
@@ -1871,7 +1985,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1871
1985
|
@pulumi.getter(name="tokenPeriod")
|
1872
1986
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1873
1987
|
"""
|
1874
|
-
|
1988
|
+
If set, indicates that the
|
1989
|
+
token generated using this role should never expire. The token should be renewed within the
|
1990
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1991
|
+
value of this field. Specified in seconds.
|
1875
1992
|
"""
|
1876
1993
|
return pulumi.get(self, "token_period")
|
1877
1994
|
|
@@ -1879,7 +1996,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1879
1996
|
@pulumi.getter(name="tokenPolicies")
|
1880
1997
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1881
1998
|
"""
|
1882
|
-
|
1999
|
+
List of policies to encode onto generated tokens. Depending
|
2000
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1883
2001
|
"""
|
1884
2002
|
return pulumi.get(self, "token_policies")
|
1885
2003
|
|
@@ -1887,7 +2005,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1887
2005
|
@pulumi.getter(name="tokenTtl")
|
1888
2006
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1889
2007
|
"""
|
1890
|
-
The
|
2008
|
+
The incremental lifetime for generated tokens in number of seconds.
|
2009
|
+
Its current value will be referenced at renewal time.
|
1891
2010
|
"""
|
1892
2011
|
return pulumi.get(self, "token_ttl")
|
1893
2012
|
|
@@ -1895,7 +2014,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1895
2014
|
@pulumi.getter(name="tokenType")
|
1896
2015
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1897
2016
|
"""
|
1898
|
-
The type of token
|
2017
|
+
The type of token that should be generated. Can be `service`,
|
2018
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
2019
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
2020
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
2021
|
+
requests a different type at generation time.
|
1899
2022
|
"""
|
1900
2023
|
return pulumi.get(self, "token_type")
|
1901
2024
|
|
@@ -197,15 +197,17 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
197
197
|
|
198
198
|
## Example Usage
|
199
199
|
|
200
|
+
<!--Start PulumiCodeChooser -->
|
200
201
|
```python
|
201
202
|
import pulumi
|
202
203
|
import pulumi_vault as vault
|
203
204
|
|
204
|
-
|
205
|
-
example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("
|
206
|
-
backend=
|
205
|
+
example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
|
206
|
+
example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("exampleAuthBackendRoletagBlacklist",
|
207
|
+
backend=example_auth_backend.path,
|
207
208
|
safety_buffer=360)
|
208
209
|
```
|
210
|
+
<!--End PulumiCodeChooser -->
|
209
211
|
|
210
212
|
:param str resource_name: The name of the resource.
|
211
213
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -232,15 +234,17 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
|
|
232
234
|
|
233
235
|
## Example Usage
|
234
236
|
|
237
|
+
<!--Start PulumiCodeChooser -->
|
235
238
|
```python
|
236
239
|
import pulumi
|
237
240
|
import pulumi_vault as vault
|
238
241
|
|
239
|
-
|
240
|
-
example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("
|
241
|
-
backend=
|
242
|
+
example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
|
243
|
+
example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("exampleAuthBackendRoletagBlacklist",
|
244
|
+
backend=example_auth_backend.path,
|
242
245
|
safety_buffer=360)
|
243
246
|
```
|
247
|
+
<!--End PulumiCodeChooser -->
|
244
248
|
|
245
249
|
:param str resource_name: The name of the resource.
|
246
250
|
:param AuthBackendRoletagBlacklistArgs args: The arguments to use to populate this resource's properties.
|
@@ -186,6 +186,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
186
186
|
"""
|
187
187
|
## Example Usage
|
188
188
|
|
189
|
+
<!--Start PulumiCodeChooser -->
|
189
190
|
```python
|
190
191
|
import pulumi
|
191
192
|
import pulumi_vault as vault
|
@@ -196,6 +197,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
196
197
|
account_id="1234567890",
|
197
198
|
sts_role="arn:aws:iam::1234567890:role/my-role")
|
198
199
|
```
|
200
|
+
<!--End PulumiCodeChooser -->
|
199
201
|
|
200
202
|
## Import
|
201
203
|
|
@@ -226,6 +228,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
226
228
|
"""
|
227
229
|
## Example Usage
|
228
230
|
|
231
|
+
<!--Start PulumiCodeChooser -->
|
229
232
|
```python
|
230
233
|
import pulumi
|
231
234
|
import pulumi_vault as vault
|
@@ -236,6 +239,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
|
|
236
239
|
account_id="1234567890",
|
237
240
|
sts_role="arn:aws:iam::1234567890:role/my-role")
|
238
241
|
```
|
242
|
+
<!--End PulumiCodeChooser -->
|
239
243
|
|
240
244
|
## Import
|
241
245
|
|