pulumi-vault 6.2.0a1713339773__py3-none-any.whl → 6.2.0a1713905519__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +2 -4
- pulumi_vault/terraformcloud/secret_role.py +2 -4
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1713905519.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713339773.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/top_level.txt +0 -0
@@ -231,7 +231,6 @@ class SecretCreds(pulumi.CustomResource):
|
|
231
231
|
"""
|
232
232
|
## Example Usage
|
233
233
|
|
234
|
-
<!--Start PulumiCodeChooser -->
|
235
234
|
```python
|
236
235
|
import pulumi
|
237
236
|
import pulumi_vault as vault
|
@@ -242,13 +241,13 @@ class SecretCreds(pulumi.CustomResource):
|
|
242
241
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
243
242
|
example = vault.terraformcloud.SecretRole("example",
|
244
243
|
backend=test.backend,
|
244
|
+
name="test-role",
|
245
245
|
organization="example-organization-name",
|
246
246
|
team_id="team-ieF4isC...")
|
247
247
|
token = vault.terraformcloud.SecretCreds("token",
|
248
248
|
backend=test.backend,
|
249
249
|
role=example.name)
|
250
250
|
```
|
251
|
-
<!--End PulumiCodeChooser -->
|
252
251
|
|
253
252
|
:param str resource_name: The name of the resource.
|
254
253
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -268,7 +267,6 @@ class SecretCreds(pulumi.CustomResource):
|
|
268
267
|
"""
|
269
268
|
## Example Usage
|
270
269
|
|
271
|
-
<!--Start PulumiCodeChooser -->
|
272
270
|
```python
|
273
271
|
import pulumi
|
274
272
|
import pulumi_vault as vault
|
@@ -279,13 +277,13 @@ class SecretCreds(pulumi.CustomResource):
|
|
279
277
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
280
278
|
example = vault.terraformcloud.SecretRole("example",
|
281
279
|
backend=test.backend,
|
280
|
+
name="test-role",
|
282
281
|
organization="example-organization-name",
|
283
282
|
team_id="team-ieF4isC...")
|
284
283
|
token = vault.terraformcloud.SecretCreds("token",
|
285
284
|
backend=test.backend,
|
286
285
|
role=example.name)
|
287
286
|
```
|
288
|
-
<!--End PulumiCodeChooser -->
|
289
287
|
|
290
288
|
:param str resource_name: The name of the resource.
|
291
289
|
:param SecretCredsArgs args: The arguments to use to populate this resource's properties.
|
@@ -312,7 +312,6 @@ class SecretRole(pulumi.CustomResource):
|
|
312
312
|
"""
|
313
313
|
## Example Usage
|
314
314
|
|
315
|
-
<!--Start PulumiCodeChooser -->
|
316
315
|
```python
|
317
316
|
import pulumi
|
318
317
|
import pulumi_vault as vault
|
@@ -323,10 +322,10 @@ class SecretRole(pulumi.CustomResource):
|
|
323
322
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
324
323
|
example = vault.terraformcloud.SecretRole("example",
|
325
324
|
backend=test.backend,
|
325
|
+
name="test-role",
|
326
326
|
organization="example-organization-name",
|
327
327
|
team_id="team-ieF4isC...")
|
328
328
|
```
|
329
|
-
<!--End PulumiCodeChooser -->
|
330
329
|
|
331
330
|
## Import
|
332
331
|
|
@@ -359,7 +358,6 @@ class SecretRole(pulumi.CustomResource):
|
|
359
358
|
"""
|
360
359
|
## Example Usage
|
361
360
|
|
362
|
-
<!--Start PulumiCodeChooser -->
|
363
361
|
```python
|
364
362
|
import pulumi
|
365
363
|
import pulumi_vault as vault
|
@@ -370,10 +368,10 @@ class SecretRole(pulumi.CustomResource):
|
|
370
368
|
token="V0idfhi2iksSDU234ucdbi2nidsi...")
|
371
369
|
example = vault.terraformcloud.SecretRole("example",
|
372
370
|
backend=test.backend,
|
371
|
+
name="test-role",
|
373
372
|
organization="example-organization-name",
|
374
373
|
team_id="team-ieF4isC...")
|
375
374
|
```
|
376
|
-
<!--End PulumiCodeChooser -->
|
377
375
|
|
378
376
|
## Import
|
379
377
|
|
pulumi_vault/token.py
CHANGED
@@ -623,26 +623,24 @@ class Token(pulumi.CustomResource):
|
|
623
623
|
"""
|
624
624
|
## Example Usage
|
625
625
|
|
626
|
-
<!--Start PulumiCodeChooser -->
|
627
626
|
```python
|
628
627
|
import pulumi
|
629
628
|
import pulumi_vault as vault
|
630
629
|
|
631
630
|
example = vault.Token("example",
|
632
|
-
|
633
|
-
"purpose": "service-account",
|
634
|
-
},
|
631
|
+
role_name="app",
|
635
632
|
policies=[
|
636
633
|
"policy1",
|
637
634
|
"policy2",
|
638
635
|
],
|
639
|
-
renew_increment=86400,
|
640
|
-
renew_min_lease=43200,
|
641
636
|
renewable=True,
|
642
|
-
|
643
|
-
|
637
|
+
ttl="24h",
|
638
|
+
renew_min_lease=43200,
|
639
|
+
renew_increment=86400,
|
640
|
+
metadata={
|
641
|
+
"purpose": "service-account",
|
642
|
+
})
|
644
643
|
```
|
645
|
-
<!--End PulumiCodeChooser -->
|
646
644
|
|
647
645
|
## Import
|
648
646
|
|
@@ -682,26 +680,24 @@ class Token(pulumi.CustomResource):
|
|
682
680
|
"""
|
683
681
|
## Example Usage
|
684
682
|
|
685
|
-
<!--Start PulumiCodeChooser -->
|
686
683
|
```python
|
687
684
|
import pulumi
|
688
685
|
import pulumi_vault as vault
|
689
686
|
|
690
687
|
example = vault.Token("example",
|
691
|
-
|
692
|
-
"purpose": "service-account",
|
693
|
-
},
|
688
|
+
role_name="app",
|
694
689
|
policies=[
|
695
690
|
"policy1",
|
696
691
|
"policy2",
|
697
692
|
],
|
698
|
-
renew_increment=86400,
|
699
|
-
renew_min_lease=43200,
|
700
693
|
renewable=True,
|
701
|
-
|
702
|
-
|
694
|
+
ttl="24h",
|
695
|
+
renew_min_lease=43200,
|
696
|
+
renew_increment=86400,
|
697
|
+
metadata={
|
698
|
+
"purpose": "service-account",
|
699
|
+
})
|
703
700
|
```
|
704
|
-
<!--End PulumiCodeChooser -->
|
705
701
|
|
706
702
|
## Import
|
707
703
|
|
@@ -50,31 +50,15 @@ class AuthBackendRoleArgs:
|
|
50
50
|
|
51
51
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
52
52
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
53
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
54
|
-
|
55
|
-
|
56
|
-
:param pulumi.Input[
|
57
|
-
|
58
|
-
|
59
|
-
`token_max_ttl` would otherwise allow a renewal.
|
60
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
61
|
-
Its current value will be referenced at renewal time.
|
62
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
63
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
64
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
65
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
66
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
67
|
-
token generated using this role should never expire. The token should be renewed within the
|
68
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
69
|
-
value of this field. Specified in seconds.
|
53
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
54
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
55
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
56
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
57
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
58
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
70
59
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
71
|
-
:param pulumi.Input[int] token_ttl: The
|
72
|
-
|
73
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
74
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
75
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
76
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
77
|
-
requests a different type at generation time.
|
60
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
61
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
78
62
|
"""
|
79
63
|
pulumi.set(__self__, "role_name", role_name)
|
80
64
|
if allowed_entity_aliases is not None:
|
@@ -243,9 +227,7 @@ class AuthBackendRoleArgs:
|
|
243
227
|
@pulumi.getter(name="tokenBoundCidrs")
|
244
228
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
245
229
|
"""
|
246
|
-
|
247
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
248
|
-
as well.
|
230
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
249
231
|
"""
|
250
232
|
return pulumi.get(self, "token_bound_cidrs")
|
251
233
|
|
@@ -257,10 +239,7 @@ class AuthBackendRoleArgs:
|
|
257
239
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
258
240
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
259
241
|
"""
|
260
|
-
|
261
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
262
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
263
|
-
`token_max_ttl` would otherwise allow a renewal.
|
242
|
+
Generated Token's Explicit Maximum TTL in seconds
|
264
243
|
"""
|
265
244
|
return pulumi.get(self, "token_explicit_max_ttl")
|
266
245
|
|
@@ -272,8 +251,7 @@ class AuthBackendRoleArgs:
|
|
272
251
|
@pulumi.getter(name="tokenMaxTtl")
|
273
252
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
274
253
|
"""
|
275
|
-
The maximum lifetime
|
276
|
-
Its current value will be referenced at renewal time.
|
254
|
+
The maximum lifetime of the generated token
|
277
255
|
"""
|
278
256
|
return pulumi.get(self, "token_max_ttl")
|
279
257
|
|
@@ -285,8 +263,7 @@ class AuthBackendRoleArgs:
|
|
285
263
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
286
264
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
287
265
|
"""
|
288
|
-
If
|
289
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
266
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
290
267
|
"""
|
291
268
|
return pulumi.get(self, "token_no_default_policy")
|
292
269
|
|
@@ -298,8 +275,7 @@ class AuthBackendRoleArgs:
|
|
298
275
|
@pulumi.getter(name="tokenNumUses")
|
299
276
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
300
277
|
"""
|
301
|
-
The
|
302
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
278
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
303
279
|
"""
|
304
280
|
return pulumi.get(self, "token_num_uses")
|
305
281
|
|
@@ -311,10 +287,7 @@ class AuthBackendRoleArgs:
|
|
311
287
|
@pulumi.getter(name="tokenPeriod")
|
312
288
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
313
289
|
"""
|
314
|
-
|
315
|
-
token generated using this role should never expire. The token should be renewed within the
|
316
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
317
|
-
value of this field. Specified in seconds.
|
290
|
+
Generated Token's Period
|
318
291
|
"""
|
319
292
|
return pulumi.get(self, "token_period")
|
320
293
|
|
@@ -338,8 +311,7 @@ class AuthBackendRoleArgs:
|
|
338
311
|
@pulumi.getter(name="tokenTtl")
|
339
312
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
340
313
|
"""
|
341
|
-
The
|
342
|
-
Its current value will be referenced at renewal time.
|
314
|
+
The initial ttl of the token to generate in seconds
|
343
315
|
"""
|
344
316
|
return pulumi.get(self, "token_ttl")
|
345
317
|
|
@@ -351,11 +323,7 @@ class AuthBackendRoleArgs:
|
|
351
323
|
@pulumi.getter(name="tokenType")
|
352
324
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
353
325
|
"""
|
354
|
-
The type of token
|
355
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
356
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
357
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
358
|
-
requests a different type at generation time.
|
326
|
+
The type of token to generate, service or batch
|
359
327
|
"""
|
360
328
|
return pulumi.get(self, "token_type")
|
361
329
|
|
@@ -403,31 +371,15 @@ class _AuthBackendRoleState:
|
|
403
371
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
404
372
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
405
373
|
:param pulumi.Input[str] role_name: The name of the role.
|
406
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
407
|
-
|
408
|
-
|
409
|
-
:param pulumi.Input[
|
410
|
-
|
411
|
-
|
412
|
-
`token_max_ttl` would otherwise allow a renewal.
|
413
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
414
|
-
Its current value will be referenced at renewal time.
|
415
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
416
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
417
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
418
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
419
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
420
|
-
token generated using this role should never expire. The token should be renewed within the
|
421
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
422
|
-
value of this field. Specified in seconds.
|
374
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
375
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
376
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
377
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
378
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
379
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
423
380
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
424
|
-
:param pulumi.Input[int] token_ttl: The
|
425
|
-
|
426
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
427
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
428
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
429
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
430
|
-
requests a different type at generation time.
|
381
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
382
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
431
383
|
"""
|
432
384
|
if allowed_entity_aliases is not None:
|
433
385
|
pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
|
@@ -597,9 +549,7 @@ class _AuthBackendRoleState:
|
|
597
549
|
@pulumi.getter(name="tokenBoundCidrs")
|
598
550
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
599
551
|
"""
|
600
|
-
|
601
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
602
|
-
as well.
|
552
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
603
553
|
"""
|
604
554
|
return pulumi.get(self, "token_bound_cidrs")
|
605
555
|
|
@@ -611,10 +561,7 @@ class _AuthBackendRoleState:
|
|
611
561
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
612
562
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
613
563
|
"""
|
614
|
-
|
615
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
616
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
617
|
-
`token_max_ttl` would otherwise allow a renewal.
|
564
|
+
Generated Token's Explicit Maximum TTL in seconds
|
618
565
|
"""
|
619
566
|
return pulumi.get(self, "token_explicit_max_ttl")
|
620
567
|
|
@@ -626,8 +573,7 @@ class _AuthBackendRoleState:
|
|
626
573
|
@pulumi.getter(name="tokenMaxTtl")
|
627
574
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
628
575
|
"""
|
629
|
-
The maximum lifetime
|
630
|
-
Its current value will be referenced at renewal time.
|
576
|
+
The maximum lifetime of the generated token
|
631
577
|
"""
|
632
578
|
return pulumi.get(self, "token_max_ttl")
|
633
579
|
|
@@ -639,8 +585,7 @@ class _AuthBackendRoleState:
|
|
639
585
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
640
586
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
641
587
|
"""
|
642
|
-
If
|
643
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
588
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
644
589
|
"""
|
645
590
|
return pulumi.get(self, "token_no_default_policy")
|
646
591
|
|
@@ -652,8 +597,7 @@ class _AuthBackendRoleState:
|
|
652
597
|
@pulumi.getter(name="tokenNumUses")
|
653
598
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
654
599
|
"""
|
655
|
-
The
|
656
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
600
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
657
601
|
"""
|
658
602
|
return pulumi.get(self, "token_num_uses")
|
659
603
|
|
@@ -665,10 +609,7 @@ class _AuthBackendRoleState:
|
|
665
609
|
@pulumi.getter(name="tokenPeriod")
|
666
610
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
667
611
|
"""
|
668
|
-
|
669
|
-
token generated using this role should never expire. The token should be renewed within the
|
670
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
671
|
-
value of this field. Specified in seconds.
|
612
|
+
Generated Token's Period
|
672
613
|
"""
|
673
614
|
return pulumi.get(self, "token_period")
|
674
615
|
|
@@ -692,8 +633,7 @@ class _AuthBackendRoleState:
|
|
692
633
|
@pulumi.getter(name="tokenTtl")
|
693
634
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
694
635
|
"""
|
695
|
-
The
|
696
|
-
Its current value will be referenced at renewal time.
|
636
|
+
The initial ttl of the token to generate in seconds
|
697
637
|
"""
|
698
638
|
return pulumi.get(self, "token_ttl")
|
699
639
|
|
@@ -705,11 +645,7 @@ class _AuthBackendRoleState:
|
|
705
645
|
@pulumi.getter(name="tokenType")
|
706
646
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
707
647
|
"""
|
708
|
-
The type of token
|
709
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
710
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
711
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
712
|
-
requests a different type at generation time.
|
648
|
+
The type of token to generate, service or batch
|
713
649
|
"""
|
714
650
|
return pulumi.get(self, "token_type")
|
715
651
|
|
@@ -750,26 +686,24 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
750
686
|
|
751
687
|
## Example Usage
|
752
688
|
|
753
|
-
<!--Start PulumiCodeChooser -->
|
754
689
|
```python
|
755
690
|
import pulumi
|
756
691
|
import pulumi_vault as vault
|
757
692
|
|
758
693
|
example = vault.tokenauth.AuthBackendRole("example",
|
759
|
-
|
694
|
+
role_name="my-role",
|
760
695
|
allowed_policies=[
|
761
696
|
"dev",
|
762
697
|
"test",
|
763
698
|
],
|
764
699
|
disallowed_policies=["default"],
|
700
|
+
allowed_entity_aliases=["test_entity"],
|
765
701
|
orphan=True,
|
766
|
-
|
702
|
+
token_period=86400,
|
767
703
|
renewable=True,
|
768
|
-
role_name="my-role",
|
769
704
|
token_explicit_max_ttl=115200,
|
770
|
-
|
705
|
+
path_suffix="path-suffix")
|
771
706
|
```
|
772
|
-
<!--End PulumiCodeChooser -->
|
773
707
|
|
774
708
|
## Import
|
775
709
|
|
@@ -796,31 +730,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
796
730
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
797
731
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
798
732
|
:param pulumi.Input[str] role_name: The name of the role.
|
799
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
800
|
-
|
801
|
-
|
802
|
-
:param pulumi.Input[
|
803
|
-
|
804
|
-
|
805
|
-
`token_max_ttl` would otherwise allow a renewal.
|
806
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
807
|
-
Its current value will be referenced at renewal time.
|
808
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
809
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
810
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
811
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
812
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
813
|
-
token generated using this role should never expire. The token should be renewed within the
|
814
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
815
|
-
value of this field. Specified in seconds.
|
733
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
734
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
735
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
736
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
737
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
738
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
816
739
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
817
|
-
:param pulumi.Input[int] token_ttl: The
|
818
|
-
|
819
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
820
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
821
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
822
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
823
|
-
requests a different type at generation time.
|
740
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
741
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
824
742
|
"""
|
825
743
|
...
|
826
744
|
@overload
|
@@ -835,26 +753,24 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
835
753
|
|
836
754
|
## Example Usage
|
837
755
|
|
838
|
-
<!--Start PulumiCodeChooser -->
|
839
756
|
```python
|
840
757
|
import pulumi
|
841
758
|
import pulumi_vault as vault
|
842
759
|
|
843
760
|
example = vault.tokenauth.AuthBackendRole("example",
|
844
|
-
|
761
|
+
role_name="my-role",
|
845
762
|
allowed_policies=[
|
846
763
|
"dev",
|
847
764
|
"test",
|
848
765
|
],
|
849
766
|
disallowed_policies=["default"],
|
767
|
+
allowed_entity_aliases=["test_entity"],
|
850
768
|
orphan=True,
|
851
|
-
|
769
|
+
token_period=86400,
|
852
770
|
renewable=True,
|
853
|
-
role_name="my-role",
|
854
771
|
token_explicit_max_ttl=115200,
|
855
|
-
|
772
|
+
path_suffix="path-suffix")
|
856
773
|
```
|
857
|
-
<!--End PulumiCodeChooser -->
|
858
774
|
|
859
775
|
## Import
|
860
776
|
|
@@ -979,31 +895,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
979
895
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
980
896
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
981
897
|
:param pulumi.Input[str] role_name: The name of the role.
|
982
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
983
|
-
|
984
|
-
|
985
|
-
:param pulumi.Input[
|
986
|
-
|
987
|
-
|
988
|
-
`token_max_ttl` would otherwise allow a renewal.
|
989
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
990
|
-
Its current value will be referenced at renewal time.
|
991
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
992
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
993
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
994
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
995
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
996
|
-
token generated using this role should never expire. The token should be renewed within the
|
997
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
998
|
-
value of this field. Specified in seconds.
|
898
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
899
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
900
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
901
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
902
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
903
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
999
904
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1000
|
-
:param pulumi.Input[int] token_ttl: The
|
1001
|
-
|
1002
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1003
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1004
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1005
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1006
|
-
requests a different type at generation time.
|
905
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
906
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1007
907
|
"""
|
1008
908
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1009
909
|
|
@@ -1119,9 +1019,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1119
1019
|
@pulumi.getter(name="tokenBoundCidrs")
|
1120
1020
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1121
1021
|
"""
|
1122
|
-
|
1123
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1124
|
-
as well.
|
1022
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1125
1023
|
"""
|
1126
1024
|
return pulumi.get(self, "token_bound_cidrs")
|
1127
1025
|
|
@@ -1129,10 +1027,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1129
1027
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1130
1028
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1131
1029
|
"""
|
1132
|
-
|
1133
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1134
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1135
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1030
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1136
1031
|
"""
|
1137
1032
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1138
1033
|
|
@@ -1140,8 +1035,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1140
1035
|
@pulumi.getter(name="tokenMaxTtl")
|
1141
1036
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1142
1037
|
"""
|
1143
|
-
The maximum lifetime
|
1144
|
-
Its current value will be referenced at renewal time.
|
1038
|
+
The maximum lifetime of the generated token
|
1145
1039
|
"""
|
1146
1040
|
return pulumi.get(self, "token_max_ttl")
|
1147
1041
|
|
@@ -1149,8 +1043,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1149
1043
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1150
1044
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1151
1045
|
"""
|
1152
|
-
If
|
1153
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1046
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1154
1047
|
"""
|
1155
1048
|
return pulumi.get(self, "token_no_default_policy")
|
1156
1049
|
|
@@ -1158,8 +1051,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1158
1051
|
@pulumi.getter(name="tokenNumUses")
|
1159
1052
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1160
1053
|
"""
|
1161
|
-
The
|
1162
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1054
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1163
1055
|
"""
|
1164
1056
|
return pulumi.get(self, "token_num_uses")
|
1165
1057
|
|
@@ -1167,10 +1059,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1167
1059
|
@pulumi.getter(name="tokenPeriod")
|
1168
1060
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1169
1061
|
"""
|
1170
|
-
|
1171
|
-
token generated using this role should never expire. The token should be renewed within the
|
1172
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1173
|
-
value of this field. Specified in seconds.
|
1062
|
+
Generated Token's Period
|
1174
1063
|
"""
|
1175
1064
|
return pulumi.get(self, "token_period")
|
1176
1065
|
|
@@ -1186,8 +1075,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1186
1075
|
@pulumi.getter(name="tokenTtl")
|
1187
1076
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1188
1077
|
"""
|
1189
|
-
The
|
1190
|
-
Its current value will be referenced at renewal time.
|
1078
|
+
The initial ttl of the token to generate in seconds
|
1191
1079
|
"""
|
1192
1080
|
return pulumi.get(self, "token_ttl")
|
1193
1081
|
|
@@ -1195,11 +1083,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1195
1083
|
@pulumi.getter(name="tokenType")
|
1196
1084
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1197
1085
|
"""
|
1198
|
-
The type of token
|
1199
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1200
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1201
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1202
|
-
requests a different type at generation time.
|
1086
|
+
The type of token to generate, service or batch
|
1203
1087
|
"""
|
1204
1088
|
return pulumi.get(self, "token_type")
|
1205
1089
|
|