pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
@@ -40,15 +40,32 @@ class AuthBackendRoleArgs:
|
|
40
40
|
The value should not contain leading or trailing forward slashes.
|
41
41
|
The `namespace` is always relative to the provider's configured namespace.
|
42
42
|
*Available only for Vault Enterprise*.
|
43
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
44
|
-
|
45
|
-
|
46
|
-
:param pulumi.Input[
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
:param pulumi.Input[int]
|
51
|
-
|
43
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
44
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
45
|
+
as well.
|
46
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
47
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
48
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
49
|
+
`token_max_ttl` would otherwise allow a renewal.
|
50
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
51
|
+
Its current value will be referenced at renewal time.
|
52
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
53
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
54
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
55
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
56
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
57
|
+
token generated using this role should never expire. The token should be renewed within the
|
58
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
59
|
+
value of this field. Specified in seconds.
|
60
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
61
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
62
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
63
|
+
Its current value will be referenced at renewal time.
|
64
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
65
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
66
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
67
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
68
|
+
requests a different type at generation time.
|
52
69
|
"""
|
53
70
|
pulumi.set(__self__, "arn", arn)
|
54
71
|
pulumi.set(__self__, "role", role)
|
@@ -134,7 +151,9 @@ class AuthBackendRoleArgs:
|
|
134
151
|
@pulumi.getter(name="tokenBoundCidrs")
|
135
152
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
136
153
|
"""
|
137
|
-
|
154
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
155
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
156
|
+
as well.
|
138
157
|
"""
|
139
158
|
return pulumi.get(self, "token_bound_cidrs")
|
140
159
|
|
@@ -146,7 +165,10 @@ class AuthBackendRoleArgs:
|
|
146
165
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
147
166
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
148
167
|
"""
|
149
|
-
|
168
|
+
If set, will encode an
|
169
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
170
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
171
|
+
`token_max_ttl` would otherwise allow a renewal.
|
150
172
|
"""
|
151
173
|
return pulumi.get(self, "token_explicit_max_ttl")
|
152
174
|
|
@@ -158,7 +180,8 @@ class AuthBackendRoleArgs:
|
|
158
180
|
@pulumi.getter(name="tokenMaxTtl")
|
159
181
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
160
182
|
"""
|
161
|
-
The maximum lifetime
|
183
|
+
The maximum lifetime for generated tokens in number of seconds.
|
184
|
+
Its current value will be referenced at renewal time.
|
162
185
|
"""
|
163
186
|
return pulumi.get(self, "token_max_ttl")
|
164
187
|
|
@@ -170,7 +193,8 @@ class AuthBackendRoleArgs:
|
|
170
193
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
171
194
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
172
195
|
"""
|
173
|
-
If
|
196
|
+
If set, the default policy will not be set on
|
197
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
174
198
|
"""
|
175
199
|
return pulumi.get(self, "token_no_default_policy")
|
176
200
|
|
@@ -182,7 +206,8 @@ class AuthBackendRoleArgs:
|
|
182
206
|
@pulumi.getter(name="tokenNumUses")
|
183
207
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
184
208
|
"""
|
185
|
-
The maximum number
|
209
|
+
The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
210
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
186
211
|
"""
|
187
212
|
return pulumi.get(self, "token_num_uses")
|
188
213
|
|
@@ -194,7 +219,10 @@ class AuthBackendRoleArgs:
|
|
194
219
|
@pulumi.getter(name="tokenPeriod")
|
195
220
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
196
221
|
"""
|
197
|
-
|
222
|
+
If set, indicates that the
|
223
|
+
token generated using this role should never expire. The token should be renewed within the
|
224
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
225
|
+
value of this field. Specified in seconds.
|
198
226
|
"""
|
199
227
|
return pulumi.get(self, "token_period")
|
200
228
|
|
@@ -206,7 +234,8 @@ class AuthBackendRoleArgs:
|
|
206
234
|
@pulumi.getter(name="tokenPolicies")
|
207
235
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
208
236
|
"""
|
209
|
-
|
237
|
+
List of policies to encode onto generated tokens. Depending
|
238
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
210
239
|
"""
|
211
240
|
return pulumi.get(self, "token_policies")
|
212
241
|
|
@@ -218,7 +247,8 @@ class AuthBackendRoleArgs:
|
|
218
247
|
@pulumi.getter(name="tokenTtl")
|
219
248
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
220
249
|
"""
|
221
|
-
The
|
250
|
+
The incremental lifetime for generated tokens in number of seconds.
|
251
|
+
Its current value will be referenced at renewal time.
|
222
252
|
"""
|
223
253
|
return pulumi.get(self, "token_ttl")
|
224
254
|
|
@@ -230,7 +260,11 @@ class AuthBackendRoleArgs:
|
|
230
260
|
@pulumi.getter(name="tokenType")
|
231
261
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
232
262
|
"""
|
233
|
-
The type of token
|
263
|
+
The type of token that should be generated. Can be `service`,
|
264
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
265
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
266
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
267
|
+
requests a different type at generation time.
|
234
268
|
"""
|
235
269
|
return pulumi.get(self, "token_type")
|
236
270
|
|
@@ -268,15 +302,32 @@ class _AuthBackendRoleState:
|
|
268
302
|
*Available only for Vault Enterprise*.
|
269
303
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
270
304
|
the role reflected in the arn.
|
271
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
272
|
-
|
273
|
-
|
274
|
-
:param pulumi.Input[
|
275
|
-
|
276
|
-
|
277
|
-
|
278
|
-
:param pulumi.Input[int]
|
279
|
-
|
305
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
306
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
307
|
+
as well.
|
308
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
309
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
310
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
311
|
+
`token_max_ttl` would otherwise allow a renewal.
|
312
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
313
|
+
Its current value will be referenced at renewal time.
|
314
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
315
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
316
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
317
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
318
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
319
|
+
token generated using this role should never expire. The token should be renewed within the
|
320
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
321
|
+
value of this field. Specified in seconds.
|
322
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
323
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
324
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
325
|
+
Its current value will be referenced at renewal time.
|
326
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
327
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
328
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
329
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
330
|
+
requests a different type at generation time.
|
280
331
|
"""
|
281
332
|
if arn is not None:
|
282
333
|
pulumi.set(__self__, "arn", arn)
|
@@ -364,7 +415,9 @@ class _AuthBackendRoleState:
|
|
364
415
|
@pulumi.getter(name="tokenBoundCidrs")
|
365
416
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
366
417
|
"""
|
367
|
-
|
418
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
419
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
420
|
+
as well.
|
368
421
|
"""
|
369
422
|
return pulumi.get(self, "token_bound_cidrs")
|
370
423
|
|
@@ -376,7 +429,10 @@ class _AuthBackendRoleState:
|
|
376
429
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
377
430
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
378
431
|
"""
|
379
|
-
|
432
|
+
If set, will encode an
|
433
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
434
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
435
|
+
`token_max_ttl` would otherwise allow a renewal.
|
380
436
|
"""
|
381
437
|
return pulumi.get(self, "token_explicit_max_ttl")
|
382
438
|
|
@@ -388,7 +444,8 @@ class _AuthBackendRoleState:
|
|
388
444
|
@pulumi.getter(name="tokenMaxTtl")
|
389
445
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
390
446
|
"""
|
391
|
-
The maximum lifetime
|
447
|
+
The maximum lifetime for generated tokens in number of seconds.
|
448
|
+
Its current value will be referenced at renewal time.
|
392
449
|
"""
|
393
450
|
return pulumi.get(self, "token_max_ttl")
|
394
451
|
|
@@ -400,7 +457,8 @@ class _AuthBackendRoleState:
|
|
400
457
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
401
458
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
402
459
|
"""
|
403
|
-
If
|
460
|
+
If set, the default policy will not be set on
|
461
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
404
462
|
"""
|
405
463
|
return pulumi.get(self, "token_no_default_policy")
|
406
464
|
|
@@ -412,7 +470,8 @@ class _AuthBackendRoleState:
|
|
412
470
|
@pulumi.getter(name="tokenNumUses")
|
413
471
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
414
472
|
"""
|
415
|
-
The maximum number
|
473
|
+
The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
474
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
416
475
|
"""
|
417
476
|
return pulumi.get(self, "token_num_uses")
|
418
477
|
|
@@ -424,7 +483,10 @@ class _AuthBackendRoleState:
|
|
424
483
|
@pulumi.getter(name="tokenPeriod")
|
425
484
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
426
485
|
"""
|
427
|
-
|
486
|
+
If set, indicates that the
|
487
|
+
token generated using this role should never expire. The token should be renewed within the
|
488
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
489
|
+
value of this field. Specified in seconds.
|
428
490
|
"""
|
429
491
|
return pulumi.get(self, "token_period")
|
430
492
|
|
@@ -436,7 +498,8 @@ class _AuthBackendRoleState:
|
|
436
498
|
@pulumi.getter(name="tokenPolicies")
|
437
499
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
438
500
|
"""
|
439
|
-
|
501
|
+
List of policies to encode onto generated tokens. Depending
|
502
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
440
503
|
"""
|
441
504
|
return pulumi.get(self, "token_policies")
|
442
505
|
|
@@ -448,7 +511,8 @@ class _AuthBackendRoleState:
|
|
448
511
|
@pulumi.getter(name="tokenTtl")
|
449
512
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
450
513
|
"""
|
451
|
-
The
|
514
|
+
The incremental lifetime for generated tokens in number of seconds.
|
515
|
+
Its current value will be referenced at renewal time.
|
452
516
|
"""
|
453
517
|
return pulumi.get(self, "token_ttl")
|
454
518
|
|
@@ -460,7 +524,11 @@ class _AuthBackendRoleState:
|
|
460
524
|
@pulumi.getter(name="tokenType")
|
461
525
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
462
526
|
"""
|
463
|
-
The type of token
|
527
|
+
The type of token that should be generated. Can be `service`,
|
528
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
529
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
530
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
531
|
+
requests a different type at generation time.
|
464
532
|
"""
|
465
533
|
return pulumi.get(self, "token_type")
|
466
534
|
|
@@ -493,18 +561,20 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
493
561
|
|
494
562
|
## Example Usage
|
495
563
|
|
564
|
+
<!--Start PulumiCodeChooser -->
|
496
565
|
```python
|
497
566
|
import pulumi
|
498
567
|
import pulumi_vault as vault
|
499
568
|
|
500
|
-
|
569
|
+
alicloud_auth_backend = vault.AuthBackend("alicloudAuthBackend",
|
501
570
|
type="alicloud",
|
502
571
|
path="alicloud")
|
503
|
-
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("
|
504
|
-
backend=
|
572
|
+
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloudAuthBackendRole",
|
573
|
+
backend=alicloud_auth_backend.path,
|
505
574
|
role="example",
|
506
575
|
arn="acs:ram:123456:tf:role/foobar")
|
507
576
|
```
|
577
|
+
<!--End PulumiCodeChooser -->
|
508
578
|
|
509
579
|
## Import
|
510
580
|
|
@@ -527,15 +597,32 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
527
597
|
*Available only for Vault Enterprise*.
|
528
598
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
529
599
|
the role reflected in the arn.
|
530
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
531
|
-
|
532
|
-
|
533
|
-
:param pulumi.Input[
|
534
|
-
|
535
|
-
|
536
|
-
|
537
|
-
:param pulumi.Input[int]
|
538
|
-
|
600
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
601
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
602
|
+
as well.
|
603
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
604
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
605
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
606
|
+
`token_max_ttl` would otherwise allow a renewal.
|
607
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
608
|
+
Its current value will be referenced at renewal time.
|
609
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
610
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
611
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
612
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
613
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
614
|
+
token generated using this role should never expire. The token should be renewed within the
|
615
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
616
|
+
value of this field. Specified in seconds.
|
617
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
618
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
619
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
620
|
+
Its current value will be referenced at renewal time.
|
621
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
622
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
623
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
624
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
625
|
+
requests a different type at generation time.
|
539
626
|
"""
|
540
627
|
...
|
541
628
|
@overload
|
@@ -548,18 +635,20 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
548
635
|
|
549
636
|
## Example Usage
|
550
637
|
|
638
|
+
<!--Start PulumiCodeChooser -->
|
551
639
|
```python
|
552
640
|
import pulumi
|
553
641
|
import pulumi_vault as vault
|
554
642
|
|
555
|
-
|
643
|
+
alicloud_auth_backend = vault.AuthBackend("alicloudAuthBackend",
|
556
644
|
type="alicloud",
|
557
645
|
path="alicloud")
|
558
|
-
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("
|
559
|
-
backend=
|
646
|
+
alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloudAuthBackendRole",
|
647
|
+
backend=alicloud_auth_backend.path,
|
560
648
|
role="example",
|
561
649
|
arn="acs:ram:123456:tf:role/foobar")
|
562
650
|
```
|
651
|
+
<!--End PulumiCodeChooser -->
|
563
652
|
|
564
653
|
## Import
|
565
654
|
|
@@ -664,15 +753,32 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
664
753
|
*Available only for Vault Enterprise*.
|
665
754
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
666
755
|
the role reflected in the arn.
|
667
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
668
|
-
|
669
|
-
|
670
|
-
:param pulumi.Input[
|
671
|
-
|
672
|
-
|
673
|
-
|
674
|
-
:param pulumi.Input[int]
|
675
|
-
|
756
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
757
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
758
|
+
as well.
|
759
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
760
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
761
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
762
|
+
`token_max_ttl` would otherwise allow a renewal.
|
763
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
764
|
+
Its current value will be referenced at renewal time.
|
765
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
766
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
767
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
768
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
769
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
770
|
+
token generated using this role should never expire. The token should be renewed within the
|
771
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
772
|
+
value of this field. Specified in seconds.
|
773
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
774
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
775
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
776
|
+
Its current value will be referenced at renewal time.
|
777
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
778
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
779
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
780
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
781
|
+
requests a different type at generation time.
|
676
782
|
"""
|
677
783
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
678
784
|
|
@@ -736,7 +842,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
736
842
|
@pulumi.getter(name="tokenBoundCidrs")
|
737
843
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
738
844
|
"""
|
739
|
-
|
845
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
846
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
847
|
+
as well.
|
740
848
|
"""
|
741
849
|
return pulumi.get(self, "token_bound_cidrs")
|
742
850
|
|
@@ -744,7 +852,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
744
852
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
745
853
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
746
854
|
"""
|
747
|
-
|
855
|
+
If set, will encode an
|
856
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
857
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
858
|
+
`token_max_ttl` would otherwise allow a renewal.
|
748
859
|
"""
|
749
860
|
return pulumi.get(self, "token_explicit_max_ttl")
|
750
861
|
|
@@ -752,7 +863,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
752
863
|
@pulumi.getter(name="tokenMaxTtl")
|
753
864
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
754
865
|
"""
|
755
|
-
The maximum lifetime
|
866
|
+
The maximum lifetime for generated tokens in number of seconds.
|
867
|
+
Its current value will be referenced at renewal time.
|
756
868
|
"""
|
757
869
|
return pulumi.get(self, "token_max_ttl")
|
758
870
|
|
@@ -760,7 +872,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
760
872
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
761
873
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
762
874
|
"""
|
763
|
-
If
|
875
|
+
If set, the default policy will not be set on
|
876
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
764
877
|
"""
|
765
878
|
return pulumi.get(self, "token_no_default_policy")
|
766
879
|
|
@@ -768,7 +881,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
768
881
|
@pulumi.getter(name="tokenNumUses")
|
769
882
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
770
883
|
"""
|
771
|
-
The maximum number
|
884
|
+
The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
885
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
772
886
|
"""
|
773
887
|
return pulumi.get(self, "token_num_uses")
|
774
888
|
|
@@ -776,7 +890,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
776
890
|
@pulumi.getter(name="tokenPeriod")
|
777
891
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
778
892
|
"""
|
779
|
-
|
893
|
+
If set, indicates that the
|
894
|
+
token generated using this role should never expire. The token should be renewed within the
|
895
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
896
|
+
value of this field. Specified in seconds.
|
780
897
|
"""
|
781
898
|
return pulumi.get(self, "token_period")
|
782
899
|
|
@@ -784,7 +901,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
784
901
|
@pulumi.getter(name="tokenPolicies")
|
785
902
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
786
903
|
"""
|
787
|
-
|
904
|
+
List of policies to encode onto generated tokens. Depending
|
905
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
788
906
|
"""
|
789
907
|
return pulumi.get(self, "token_policies")
|
790
908
|
|
@@ -792,7 +910,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
792
910
|
@pulumi.getter(name="tokenTtl")
|
793
911
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
794
912
|
"""
|
795
|
-
The
|
913
|
+
The incremental lifetime for generated tokens in number of seconds.
|
914
|
+
Its current value will be referenced at renewal time.
|
796
915
|
"""
|
797
916
|
return pulumi.get(self, "token_ttl")
|
798
917
|
|
@@ -800,7 +919,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
800
919
|
@pulumi.getter(name="tokenType")
|
801
920
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
802
921
|
"""
|
803
|
-
The type of token
|
922
|
+
The type of token that should be generated. Can be `service`,
|
923
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
924
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
925
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
926
|
+
requests a different type at generation time.
|
804
927
|
"""
|
805
928
|
return pulumi.get(self, "token_type")
|
806
929
|
|
@@ -299,6 +299,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
299
299
|
|
300
300
|
## Example Usage
|
301
301
|
|
302
|
+
<!--Start PulumiCodeChooser -->
|
302
303
|
```python
|
303
304
|
import pulumi
|
304
305
|
import pulumi_vault as vault
|
@@ -320,6 +321,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
320
321
|
role_id=example.role_id,
|
321
322
|
secret_id=id.secret_id)
|
322
323
|
```
|
324
|
+
<!--End PulumiCodeChooser -->
|
323
325
|
|
324
326
|
:param str resource_name: The name of the resource.
|
325
327
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -345,6 +347,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
345
347
|
|
346
348
|
## Example Usage
|
347
349
|
|
350
|
+
<!--Start PulumiCodeChooser -->
|
348
351
|
```python
|
349
352
|
import pulumi
|
350
353
|
import pulumi_vault as vault
|
@@ -366,6 +369,7 @@ class AuthBackendLogin(pulumi.CustomResource):
|
|
366
369
|
role_id=example.role_id,
|
367
370
|
secret_id=id.secret_id)
|
368
371
|
```
|
372
|
+
<!--End PulumiCodeChooser -->
|
369
373
|
|
370
374
|
:param str resource_name: The name of the resource.
|
371
375
|
:param AuthBackendLoginArgs args: The arguments to use to populate this resource's properties.
|