pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1713905519__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +0 -4
- pulumi_vault/ad/secret_library.py +0 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +0 -8
- pulumi_vault/audit_request_header.py +0 -4
- pulumi_vault/aws/auth_backend_client.py +0 -4
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +0 -4
- pulumi_vault/aws/secret_backend_static_role.py +0 -4
- pulumi_vault/azure/auth_backend_config.py +0 -4
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +0 -8
- pulumi_vault/azure/backend_role.py +0 -4
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +63 -200
- pulumi_vault/consul/secret_backend.py +0 -8
- pulumi_vault/consul/secret_backend_role.py +0 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +0 -4
- pulumi_vault/database/secret_backend_role.py +0 -4
- pulumi_vault/database/secret_backend_static_role.py +0 -4
- pulumi_vault/database/secrets_mount.py +0 -4
- pulumi_vault/egp_policy.py +0 -4
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +0 -4
- pulumi_vault/gcp/secret_impersonated_account.py +0 -4
- pulumi_vault/gcp/secret_roleset.py +0 -4
- pulumi_vault/gcp/secret_static_account.py +0 -4
- pulumi_vault/generic/endpoint.py +0 -4
- pulumi_vault/generic/get_secret.py +0 -8
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +0 -8
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +0 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +0 -4
- pulumi_vault/github/user.py +0 -4
- pulumi_vault/identity/entity.py +0 -4
- pulumi_vault/identity/entity_alias.py +0 -4
- pulumi_vault/identity/entity_policies.py +0 -8
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +0 -4
- pulumi_vault/identity/get_oidc_openid_config.py +0 -4
- pulumi_vault/identity/get_oidc_public_keys.py +0 -4
- pulumi_vault/identity/group.py +0 -12
- pulumi_vault/identity/group_alias.py +0 -4
- pulumi_vault/identity/group_member_entity_ids.py +0 -8
- pulumi_vault/identity/group_member_group_ids.py +0 -8
- pulumi_vault/identity/group_policies.py +0 -8
- pulumi_vault/identity/mfa_duo.py +0 -4
- pulumi_vault/identity/mfa_login_enforcement.py +0 -4
- pulumi_vault/identity/mfa_okta.py +0 -4
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +0 -4
- pulumi_vault/identity/oidc_client.py +0 -4
- pulumi_vault/identity/oidc_key.py +0 -4
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
- pulumi_vault/identity/oidc_provider.py +0 -4
- pulumi_vault/identity/oidc_role.py +0 -8
- pulumi_vault/identity/oidc_scope.py +0 -4
- pulumi_vault/jwt/auth_backend.py +0 -12
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +0 -4
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +0 -4
- pulumi_vault/kubernetes/secret_backend.py +0 -4
- pulumi_vault/kubernetes/secret_backend_role.py +0 -12
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
- pulumi_vault/kv/get_secret_v2.py +0 -4
- pulumi_vault/kv/get_secrets_list.py +0 -4
- pulumi_vault/kv/get_secrets_list_v2.py +0 -4
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +0 -4
- pulumi_vault/ldap/auth_backend.py +56 -151
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +0 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +0 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +0 -4
- pulumi_vault/mfa_okta.py +0 -4
- pulumi_vault/mfa_pingid.py +0 -4
- pulumi_vault/mfa_totp.py +0 -4
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +0 -4
- pulumi_vault/mount.py +0 -16
- pulumi_vault/nomad_secret_backend.py +0 -4
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +0 -4
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +0 -4
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +0 -4
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
- pulumi_vault/quota_lease_count.py +0 -4
- pulumi_vault/quota_rate_limit.py +0 -4
- pulumi_vault/rabbitmq/secret_backend.py +0 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +91 -292
- pulumi_vault/rgp_policy.py +0 -4
- pulumi_vault/saml/auth_backend.py +0 -4
- pulumi_vault/saml/auth_backend_role.py +56 -172
- pulumi_vault/secrets/sync_association.py +0 -4
- pulumi_vault/secrets/sync_aws_destination.py +0 -4
- pulumi_vault/secrets/sync_azure_destination.py +0 -4
- pulumi_vault/secrets/sync_config.py +0 -4
- pulumi_vault/secrets/sync_gcp_destination.py +0 -4
- pulumi_vault/secrets/sync_gh_destination.py +0 -4
- pulumi_vault/secrets/sync_github_apps.py +0 -4
- pulumi_vault/secrets/sync_vercel_destination.py +0 -4
- pulumi_vault/ssh/_inputs.py +6 -20
- pulumi_vault/ssh/outputs.py +6 -20
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +0 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +0 -4
- pulumi_vault/terraformcloud/secret_role.py +0 -4
- pulumi_vault/token.py +0 -4
- pulumi_vault/tokenauth/auth_backend_role.py +56 -172
- pulumi_vault/transform/alphabet.py +0 -4
- pulumi_vault/transform/get_decode.py +0 -4
- pulumi_vault/transform/get_encode.py +0 -4
- pulumi_vault/transform/role.py +0 -4
- pulumi_vault/transform/template.py +0 -4
- pulumi_vault/transit/get_decrypt.py +0 -16
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +0 -4
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1713905519.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/top_level.txt +0 -0
pulumi_vault/azure/backend.py
CHANGED
@@ -382,7 +382,6 @@ class Backend(pulumi.CustomResource):
|
|
382
382
|
|
383
383
|
### *Vault-1.9 And Above*
|
384
384
|
|
385
|
-
<!--Start PulumiCodeChooser -->
|
386
385
|
```python
|
387
386
|
import pulumi
|
388
387
|
import pulumi_vault as vault
|
@@ -395,11 +394,9 @@ class Backend(pulumi.CustomResource):
|
|
395
394
|
client_secret="12345678901234567890",
|
396
395
|
environment="AzurePublicCloud")
|
397
396
|
```
|
398
|
-
<!--End PulumiCodeChooser -->
|
399
397
|
|
400
398
|
### *Vault-1.8 And Below*
|
401
399
|
|
402
|
-
<!--Start PulumiCodeChooser -->
|
403
400
|
```python
|
404
401
|
import pulumi
|
405
402
|
import pulumi_vault as vault
|
@@ -412,7 +409,6 @@ class Backend(pulumi.CustomResource):
|
|
412
409
|
client_secret="12345678901234567890",
|
413
410
|
environment="AzurePublicCloud")
|
414
411
|
```
|
415
|
-
<!--End PulumiCodeChooser -->
|
416
412
|
|
417
413
|
:param str resource_name: The name of the resource.
|
418
414
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -442,7 +438,6 @@ class Backend(pulumi.CustomResource):
|
|
442
438
|
|
443
439
|
### *Vault-1.9 And Above*
|
444
440
|
|
445
|
-
<!--Start PulumiCodeChooser -->
|
446
441
|
```python
|
447
442
|
import pulumi
|
448
443
|
import pulumi_vault as vault
|
@@ -455,11 +450,9 @@ class Backend(pulumi.CustomResource):
|
|
455
450
|
client_secret="12345678901234567890",
|
456
451
|
environment="AzurePublicCloud")
|
457
452
|
```
|
458
|
-
<!--End PulumiCodeChooser -->
|
459
453
|
|
460
454
|
### *Vault-1.8 And Below*
|
461
455
|
|
462
|
-
<!--Start PulumiCodeChooser -->
|
463
456
|
```python
|
464
457
|
import pulumi
|
465
458
|
import pulumi_vault as vault
|
@@ -472,7 +465,6 @@ class Backend(pulumi.CustomResource):
|
|
472
465
|
client_secret="12345678901234567890",
|
473
466
|
environment="AzurePublicCloud")
|
474
467
|
```
|
475
|
-
<!--End PulumiCodeChooser -->
|
476
468
|
|
477
469
|
:param str resource_name: The name of the resource.
|
478
470
|
:param BackendArgs args: The arguments to use to populate this resource's properties.
|
@@ -465,7 +465,6 @@ class BackendRole(pulumi.CustomResource):
|
|
465
465
|
"""
|
466
466
|
## Example Usage
|
467
467
|
|
468
|
-
<!--Start PulumiCodeChooser -->
|
469
468
|
```python
|
470
469
|
import pulumi
|
471
470
|
import pulumi_vault as vault
|
@@ -496,7 +495,6 @@ class BackendRole(pulumi.CustomResource):
|
|
496
495
|
ttl="300",
|
497
496
|
max_ttl="600")
|
498
497
|
```
|
499
|
-
<!--End PulumiCodeChooser -->
|
500
498
|
|
501
499
|
:param str resource_name: The name of the resource.
|
502
500
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -530,7 +528,6 @@ class BackendRole(pulumi.CustomResource):
|
|
530
528
|
"""
|
531
529
|
## Example Usage
|
532
530
|
|
533
|
-
<!--Start PulumiCodeChooser -->
|
534
531
|
```python
|
535
532
|
import pulumi
|
536
533
|
import pulumi_vault as vault
|
@@ -561,7 +558,6 @@ class BackendRole(pulumi.CustomResource):
|
|
561
558
|
ttl="300",
|
562
559
|
max_ttl="600")
|
563
560
|
```
|
564
|
-
<!--End PulumiCodeChooser -->
|
565
561
|
|
566
562
|
:param str resource_name: The name of the resource.
|
567
563
|
:param BackendRoleArgs args: The arguments to use to populate this resource's properties.
|
@@ -216,7 +216,6 @@ def get_access_credentials(backend: Optional[str] = None,
|
|
216
216
|
"""
|
217
217
|
## Example Usage
|
218
218
|
|
219
|
-
<!--Start PulumiCodeChooser -->
|
220
219
|
```python
|
221
220
|
import pulumi
|
222
221
|
import pulumi_vault as vault
|
@@ -227,7 +226,6 @@ def get_access_credentials(backend: Optional[str] = None,
|
|
227
226
|
num_seconds_between_tests=1,
|
228
227
|
max_cred_validation_seconds=300)
|
229
228
|
```
|
230
|
-
<!--End PulumiCodeChooser -->
|
231
229
|
|
232
230
|
## Caveats
|
233
231
|
|
@@ -317,7 +315,6 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
317
315
|
"""
|
318
316
|
## Example Usage
|
319
317
|
|
320
|
-
<!--Start PulumiCodeChooser -->
|
321
318
|
```python
|
322
319
|
import pulumi
|
323
320
|
import pulumi_vault as vault
|
@@ -328,7 +325,6 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
328
325
|
num_seconds_between_tests=1,
|
329
326
|
max_cred_validation_seconds=300)
|
330
327
|
```
|
331
|
-
<!--End PulumiCodeChooser -->
|
332
328
|
|
333
329
|
## Caveats
|
334
330
|
|
@@ -75,34 +75,15 @@ class CertAuthBackendRoleArgs:
|
|
75
75
|
Requires Vault version 1.13+.
|
76
76
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
|
77
77
|
client certificates
|
78
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
79
|
-
|
80
|
-
|
81
|
-
:param pulumi.Input[
|
82
|
-
|
83
|
-
|
84
|
-
|
85
|
-
:param pulumi.Input[int]
|
86
|
-
|
87
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
88
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
89
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
90
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
91
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
92
|
-
token generated using this role should never expire. The token should be renewed within the
|
93
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
94
|
-
value of this field. Specified in seconds.
|
95
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
96
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
97
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
98
|
-
Its current value will be referenced at renewal time.
|
99
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
100
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
101
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
102
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
103
|
-
requests a different type at generation time.
|
104
|
-
|
105
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
78
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
79
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
80
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
81
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
82
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
83
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
84
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
85
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
86
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
106
87
|
"""
|
107
88
|
pulumi.set(__self__, "certificate", certificate)
|
108
89
|
if allowed_common_names is not None:
|
@@ -380,9 +361,7 @@ class CertAuthBackendRoleArgs:
|
|
380
361
|
@pulumi.getter(name="tokenBoundCidrs")
|
381
362
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
382
363
|
"""
|
383
|
-
|
384
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
385
|
-
as well.
|
364
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
386
365
|
"""
|
387
366
|
return pulumi.get(self, "token_bound_cidrs")
|
388
367
|
|
@@ -394,10 +373,7 @@ class CertAuthBackendRoleArgs:
|
|
394
373
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
395
374
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
396
375
|
"""
|
397
|
-
|
398
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
399
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
400
|
-
`token_max_ttl` would otherwise allow a renewal.
|
376
|
+
Generated Token's Explicit Maximum TTL in seconds
|
401
377
|
"""
|
402
378
|
return pulumi.get(self, "token_explicit_max_ttl")
|
403
379
|
|
@@ -409,8 +385,7 @@ class CertAuthBackendRoleArgs:
|
|
409
385
|
@pulumi.getter(name="tokenMaxTtl")
|
410
386
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
411
387
|
"""
|
412
|
-
The maximum lifetime
|
413
|
-
Its current value will be referenced at renewal time.
|
388
|
+
The maximum lifetime of the generated token
|
414
389
|
"""
|
415
390
|
return pulumi.get(self, "token_max_ttl")
|
416
391
|
|
@@ -422,8 +397,7 @@ class CertAuthBackendRoleArgs:
|
|
422
397
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
423
398
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
424
399
|
"""
|
425
|
-
If
|
426
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
400
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
427
401
|
"""
|
428
402
|
return pulumi.get(self, "token_no_default_policy")
|
429
403
|
|
@@ -435,8 +409,7 @@ class CertAuthBackendRoleArgs:
|
|
435
409
|
@pulumi.getter(name="tokenNumUses")
|
436
410
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
437
411
|
"""
|
438
|
-
The
|
439
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
412
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
440
413
|
"""
|
441
414
|
return pulumi.get(self, "token_num_uses")
|
442
415
|
|
@@ -448,10 +421,7 @@ class CertAuthBackendRoleArgs:
|
|
448
421
|
@pulumi.getter(name="tokenPeriod")
|
449
422
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
450
423
|
"""
|
451
|
-
|
452
|
-
token generated using this role should never expire. The token should be renewed within the
|
453
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
454
|
-
value of this field. Specified in seconds.
|
424
|
+
Generated Token's Period
|
455
425
|
"""
|
456
426
|
return pulumi.get(self, "token_period")
|
457
427
|
|
@@ -463,8 +433,7 @@ class CertAuthBackendRoleArgs:
|
|
463
433
|
@pulumi.getter(name="tokenPolicies")
|
464
434
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
465
435
|
"""
|
466
|
-
|
467
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
436
|
+
Generated Token's Policies
|
468
437
|
"""
|
469
438
|
return pulumi.get(self, "token_policies")
|
470
439
|
|
@@ -476,8 +445,7 @@ class CertAuthBackendRoleArgs:
|
|
476
445
|
@pulumi.getter(name="tokenTtl")
|
477
446
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
478
447
|
"""
|
479
|
-
The
|
480
|
-
Its current value will be referenced at renewal time.
|
448
|
+
The initial ttl of the token to generate in seconds
|
481
449
|
"""
|
482
450
|
return pulumi.get(self, "token_ttl")
|
483
451
|
|
@@ -489,13 +457,7 @@ class CertAuthBackendRoleArgs:
|
|
489
457
|
@pulumi.getter(name="tokenType")
|
490
458
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
491
459
|
"""
|
492
|
-
The type of token
|
493
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
494
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
495
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
496
|
-
requests a different type at generation time.
|
497
|
-
|
498
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
460
|
+
The type of token to generate, service or batch
|
499
461
|
"""
|
500
462
|
return pulumi.get(self, "token_type")
|
501
463
|
|
@@ -568,34 +530,15 @@ class _CertAuthBackendRoleState:
|
|
568
530
|
Requires Vault version 1.13+.
|
569
531
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
|
570
532
|
client certificates
|
571
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
572
|
-
|
573
|
-
|
574
|
-
:param pulumi.Input[
|
575
|
-
|
576
|
-
|
577
|
-
|
578
|
-
:param pulumi.Input[int]
|
579
|
-
|
580
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
581
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
582
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
583
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
584
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
585
|
-
token generated using this role should never expire. The token should be renewed within the
|
586
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
587
|
-
value of this field. Specified in seconds.
|
588
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
589
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
590
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
591
|
-
Its current value will be referenced at renewal time.
|
592
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
593
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
594
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
595
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
596
|
-
requests a different type at generation time.
|
597
|
-
|
598
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
533
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
534
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
535
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
536
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
537
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
538
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
539
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
540
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
541
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
599
542
|
"""
|
600
543
|
if allowed_common_names is not None:
|
601
544
|
pulumi.set(__self__, "allowed_common_names", allowed_common_names)
|
@@ -874,9 +817,7 @@ class _CertAuthBackendRoleState:
|
|
874
817
|
@pulumi.getter(name="tokenBoundCidrs")
|
875
818
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
876
819
|
"""
|
877
|
-
|
878
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
879
|
-
as well.
|
820
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
880
821
|
"""
|
881
822
|
return pulumi.get(self, "token_bound_cidrs")
|
882
823
|
|
@@ -888,10 +829,7 @@ class _CertAuthBackendRoleState:
|
|
888
829
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
889
830
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
890
831
|
"""
|
891
|
-
|
892
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
893
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
894
|
-
`token_max_ttl` would otherwise allow a renewal.
|
832
|
+
Generated Token's Explicit Maximum TTL in seconds
|
895
833
|
"""
|
896
834
|
return pulumi.get(self, "token_explicit_max_ttl")
|
897
835
|
|
@@ -903,8 +841,7 @@ class _CertAuthBackendRoleState:
|
|
903
841
|
@pulumi.getter(name="tokenMaxTtl")
|
904
842
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
905
843
|
"""
|
906
|
-
The maximum lifetime
|
907
|
-
Its current value will be referenced at renewal time.
|
844
|
+
The maximum lifetime of the generated token
|
908
845
|
"""
|
909
846
|
return pulumi.get(self, "token_max_ttl")
|
910
847
|
|
@@ -916,8 +853,7 @@ class _CertAuthBackendRoleState:
|
|
916
853
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
917
854
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
918
855
|
"""
|
919
|
-
If
|
920
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
856
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
921
857
|
"""
|
922
858
|
return pulumi.get(self, "token_no_default_policy")
|
923
859
|
|
@@ -929,8 +865,7 @@ class _CertAuthBackendRoleState:
|
|
929
865
|
@pulumi.getter(name="tokenNumUses")
|
930
866
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
931
867
|
"""
|
932
|
-
The
|
933
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
868
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
934
869
|
"""
|
935
870
|
return pulumi.get(self, "token_num_uses")
|
936
871
|
|
@@ -942,10 +877,7 @@ class _CertAuthBackendRoleState:
|
|
942
877
|
@pulumi.getter(name="tokenPeriod")
|
943
878
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
944
879
|
"""
|
945
|
-
|
946
|
-
token generated using this role should never expire. The token should be renewed within the
|
947
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
948
|
-
value of this field. Specified in seconds.
|
880
|
+
Generated Token's Period
|
949
881
|
"""
|
950
882
|
return pulumi.get(self, "token_period")
|
951
883
|
|
@@ -957,8 +889,7 @@ class _CertAuthBackendRoleState:
|
|
957
889
|
@pulumi.getter(name="tokenPolicies")
|
958
890
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
959
891
|
"""
|
960
|
-
|
961
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
892
|
+
Generated Token's Policies
|
962
893
|
"""
|
963
894
|
return pulumi.get(self, "token_policies")
|
964
895
|
|
@@ -970,8 +901,7 @@ class _CertAuthBackendRoleState:
|
|
970
901
|
@pulumi.getter(name="tokenTtl")
|
971
902
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
972
903
|
"""
|
973
|
-
The
|
974
|
-
Its current value will be referenced at renewal time.
|
904
|
+
The initial ttl of the token to generate in seconds
|
975
905
|
"""
|
976
906
|
return pulumi.get(self, "token_ttl")
|
977
907
|
|
@@ -983,13 +913,7 @@ class _CertAuthBackendRoleState:
|
|
983
913
|
@pulumi.getter(name="tokenType")
|
984
914
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
985
915
|
"""
|
986
|
-
The type of token
|
987
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
988
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
989
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
990
|
-
requests a different type at generation time.
|
991
|
-
|
992
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
916
|
+
The type of token to generate, service or batch
|
993
917
|
"""
|
994
918
|
return pulumi.get(self, "token_type")
|
995
919
|
|
@@ -1035,7 +959,6 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1035
959
|
|
1036
960
|
## Example Usage
|
1037
961
|
|
1038
|
-
<!--Start PulumiCodeChooser -->
|
1039
962
|
```python
|
1040
963
|
import pulumi
|
1041
964
|
import pulumi_std as std
|
@@ -1056,7 +979,6 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1056
979
|
token_max_ttl=600,
|
1057
980
|
token_policies=["foo"])
|
1058
981
|
```
|
1059
|
-
<!--End PulumiCodeChooser -->
|
1060
982
|
|
1061
983
|
:param str resource_name: The name of the resource.
|
1062
984
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -1093,34 +1015,15 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1093
1015
|
Requires Vault version 1.13+.
|
1094
1016
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
|
1095
1017
|
client certificates
|
1096
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1097
|
-
|
1098
|
-
|
1099
|
-
:param pulumi.Input[
|
1100
|
-
|
1101
|
-
|
1102
|
-
|
1103
|
-
:param pulumi.Input[int]
|
1104
|
-
|
1105
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1106
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1107
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
1108
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1109
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1110
|
-
token generated using this role should never expire. The token should be renewed within the
|
1111
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1112
|
-
value of this field. Specified in seconds.
|
1113
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1114
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1115
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1116
|
-
Its current value will be referenced at renewal time.
|
1117
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1118
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1119
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1120
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1121
|
-
requests a different type at generation time.
|
1122
|
-
|
1123
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
1018
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1019
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1020
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1021
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1022
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1023
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1024
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1025
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1026
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1124
1027
|
"""
|
1125
1028
|
...
|
1126
1029
|
@overload
|
@@ -1133,7 +1036,6 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1133
1036
|
|
1134
1037
|
## Example Usage
|
1135
1038
|
|
1136
|
-
<!--Start PulumiCodeChooser -->
|
1137
1039
|
```python
|
1138
1040
|
import pulumi
|
1139
1041
|
import pulumi_std as std
|
@@ -1154,7 +1056,6 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1154
1056
|
token_max_ttl=600,
|
1155
1057
|
token_policies=["foo"])
|
1156
1058
|
```
|
1157
|
-
<!--End PulumiCodeChooser -->
|
1158
1059
|
|
1159
1060
|
:param str resource_name: The name of the resource.
|
1160
1061
|
:param CertAuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
|
@@ -1310,34 +1211,15 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1310
1211
|
Requires Vault version 1.13+.
|
1311
1212
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
|
1312
1213
|
client certificates
|
1313
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1314
|
-
|
1315
|
-
|
1316
|
-
:param pulumi.Input[
|
1317
|
-
|
1318
|
-
|
1319
|
-
|
1320
|
-
:param pulumi.Input[int]
|
1321
|
-
|
1322
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1323
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1324
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
1325
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1326
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1327
|
-
token generated using this role should never expire. The token should be renewed within the
|
1328
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1329
|
-
value of this field. Specified in seconds.
|
1330
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1331
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1332
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1333
|
-
Its current value will be referenced at renewal time.
|
1334
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1335
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1336
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1337
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1338
|
-
requests a different type at generation time.
|
1339
|
-
|
1340
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
1214
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1215
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1216
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1217
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1218
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1219
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1220
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1221
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1222
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1341
1223
|
"""
|
1342
1224
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1343
1225
|
|
@@ -1527,9 +1409,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1527
1409
|
@pulumi.getter(name="tokenBoundCidrs")
|
1528
1410
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1529
1411
|
"""
|
1530
|
-
|
1531
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1532
|
-
as well.
|
1412
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1533
1413
|
"""
|
1534
1414
|
return pulumi.get(self, "token_bound_cidrs")
|
1535
1415
|
|
@@ -1537,10 +1417,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1537
1417
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1538
1418
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1539
1419
|
"""
|
1540
|
-
|
1541
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1542
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1543
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1420
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1544
1421
|
"""
|
1545
1422
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1546
1423
|
|
@@ -1548,8 +1425,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1548
1425
|
@pulumi.getter(name="tokenMaxTtl")
|
1549
1426
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1550
1427
|
"""
|
1551
|
-
The maximum lifetime
|
1552
|
-
Its current value will be referenced at renewal time.
|
1428
|
+
The maximum lifetime of the generated token
|
1553
1429
|
"""
|
1554
1430
|
return pulumi.get(self, "token_max_ttl")
|
1555
1431
|
|
@@ -1557,8 +1433,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1557
1433
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1558
1434
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1559
1435
|
"""
|
1560
|
-
If
|
1561
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1436
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1562
1437
|
"""
|
1563
1438
|
return pulumi.get(self, "token_no_default_policy")
|
1564
1439
|
|
@@ -1566,8 +1441,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1566
1441
|
@pulumi.getter(name="tokenNumUses")
|
1567
1442
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1568
1443
|
"""
|
1569
|
-
The
|
1570
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1444
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1571
1445
|
"""
|
1572
1446
|
return pulumi.get(self, "token_num_uses")
|
1573
1447
|
|
@@ -1575,10 +1449,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1575
1449
|
@pulumi.getter(name="tokenPeriod")
|
1576
1450
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1577
1451
|
"""
|
1578
|
-
|
1579
|
-
token generated using this role should never expire. The token should be renewed within the
|
1580
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1581
|
-
value of this field. Specified in seconds.
|
1452
|
+
Generated Token's Period
|
1582
1453
|
"""
|
1583
1454
|
return pulumi.get(self, "token_period")
|
1584
1455
|
|
@@ -1586,8 +1457,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1586
1457
|
@pulumi.getter(name="tokenPolicies")
|
1587
1458
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1588
1459
|
"""
|
1589
|
-
|
1590
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1460
|
+
Generated Token's Policies
|
1591
1461
|
"""
|
1592
1462
|
return pulumi.get(self, "token_policies")
|
1593
1463
|
|
@@ -1595,8 +1465,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1595
1465
|
@pulumi.getter(name="tokenTtl")
|
1596
1466
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1597
1467
|
"""
|
1598
|
-
The
|
1599
|
-
Its current value will be referenced at renewal time.
|
1468
|
+
The initial ttl of the token to generate in seconds
|
1600
1469
|
"""
|
1601
1470
|
return pulumi.get(self, "token_ttl")
|
1602
1471
|
|
@@ -1604,13 +1473,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1604
1473
|
@pulumi.getter(name="tokenType")
|
1605
1474
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1606
1475
|
"""
|
1607
|
-
The type of token
|
1608
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1609
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1610
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1611
|
-
requests a different type at generation time.
|
1612
|
-
|
1613
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
1476
|
+
The type of token to generate, service or batch
|
1614
1477
|
"""
|
1615
1478
|
return pulumi.get(self, "token_type")
|
1616
1479
|
|