pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +0 -4
- pulumi_vault/ad/secret_library.py +0 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +0 -8
- pulumi_vault/audit_request_header.py +0 -4
- pulumi_vault/aws/auth_backend_client.py +0 -4
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +0 -4
- pulumi_vault/aws/secret_backend_static_role.py +0 -4
- pulumi_vault/azure/auth_backend_config.py +0 -4
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +0 -8
- pulumi_vault/azure/backend_role.py +0 -4
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +63 -200
- pulumi_vault/consul/secret_backend.py +0 -8
- pulumi_vault/consul/secret_backend_role.py +0 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +0 -4
- pulumi_vault/database/secret_backend_role.py +0 -4
- pulumi_vault/database/secret_backend_static_role.py +0 -4
- pulumi_vault/database/secrets_mount.py +0 -4
- pulumi_vault/egp_policy.py +0 -4
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +0 -4
- pulumi_vault/gcp/secret_impersonated_account.py +0 -4
- pulumi_vault/gcp/secret_roleset.py +0 -4
- pulumi_vault/gcp/secret_static_account.py +0 -4
- pulumi_vault/generic/endpoint.py +0 -4
- pulumi_vault/generic/get_secret.py +0 -8
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +0 -8
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +0 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +0 -4
- pulumi_vault/github/user.py +0 -4
- pulumi_vault/identity/entity.py +0 -4
- pulumi_vault/identity/entity_alias.py +0 -4
- pulumi_vault/identity/entity_policies.py +0 -8
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +0 -4
- pulumi_vault/identity/get_oidc_openid_config.py +0 -4
- pulumi_vault/identity/get_oidc_public_keys.py +0 -4
- pulumi_vault/identity/group.py +0 -12
- pulumi_vault/identity/group_alias.py +0 -4
- pulumi_vault/identity/group_member_entity_ids.py +0 -8
- pulumi_vault/identity/group_member_group_ids.py +0 -8
- pulumi_vault/identity/group_policies.py +0 -8
- pulumi_vault/identity/mfa_duo.py +0 -4
- pulumi_vault/identity/mfa_login_enforcement.py +0 -4
- pulumi_vault/identity/mfa_okta.py +0 -4
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +0 -4
- pulumi_vault/identity/oidc_client.py +0 -4
- pulumi_vault/identity/oidc_key.py +0 -4
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
- pulumi_vault/identity/oidc_provider.py +0 -4
- pulumi_vault/identity/oidc_role.py +0 -8
- pulumi_vault/identity/oidc_scope.py +0 -4
- pulumi_vault/jwt/auth_backend.py +0 -12
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +0 -4
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +0 -4
- pulumi_vault/kubernetes/secret_backend.py +0 -4
- pulumi_vault/kubernetes/secret_backend_role.py +0 -12
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
- pulumi_vault/kv/get_secret_v2.py +0 -4
- pulumi_vault/kv/get_secrets_list.py +0 -4
- pulumi_vault/kv/get_secrets_list_v2.py +0 -4
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +0 -4
- pulumi_vault/ldap/auth_backend.py +56 -151
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +0 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +0 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +0 -4
- pulumi_vault/mfa_okta.py +0 -4
- pulumi_vault/mfa_pingid.py +0 -4
- pulumi_vault/mfa_totp.py +0 -4
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +0 -4
- pulumi_vault/mount.py +0 -16
- pulumi_vault/nomad_secret_backend.py +0 -4
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +0 -4
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +0 -4
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +0 -4
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
- pulumi_vault/quota_lease_count.py +0 -4
- pulumi_vault/quota_rate_limit.py +0 -4
- pulumi_vault/rabbitmq/secret_backend.py +0 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +91 -292
- pulumi_vault/rgp_policy.py +0 -4
- pulumi_vault/saml/auth_backend.py +0 -4
- pulumi_vault/saml/auth_backend_role.py +56 -172
- pulumi_vault/secrets/sync_association.py +0 -4
- pulumi_vault/secrets/sync_aws_destination.py +0 -4
- pulumi_vault/secrets/sync_azure_destination.py +0 -4
- pulumi_vault/secrets/sync_config.py +0 -4
- pulumi_vault/secrets/sync_gcp_destination.py +0 -4
- pulumi_vault/secrets/sync_gh_destination.py +0 -4
- pulumi_vault/secrets/sync_github_apps.py +0 -4
- pulumi_vault/secrets/sync_vercel_destination.py +0 -4
- pulumi_vault/ssh/_inputs.py +6 -20
- pulumi_vault/ssh/outputs.py +6 -20
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +0 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +0 -4
- pulumi_vault/terraformcloud/secret_role.py +0 -4
- pulumi_vault/token.py +0 -4
- pulumi_vault/tokenauth/auth_backend_role.py +56 -172
- pulumi_vault/transform/alphabet.py +0 -4
- pulumi_vault/transform/get_decode.py +0 -4
- pulumi_vault/transform/get_encode.py +0 -4
- pulumi_vault/transform/role.py +0 -4
- pulumi_vault/transform/template.py +0 -4
- pulumi_vault/transit/get_decrypt.py +0 -16
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +0 -4
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
pulumi_vault/_inputs.py
CHANGED
@@ -1844,19 +1844,12 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
1844
1844
|
def __init__(__self__, *,
|
1845
1845
|
key: str,
|
1846
1846
|
values: Sequence[str]):
|
1847
|
-
"""
|
1848
|
-
:param str key: name of permitted or denied parameter.
|
1849
|
-
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
1850
|
-
"""
|
1851
1847
|
pulumi.set(__self__, "key", key)
|
1852
1848
|
pulumi.set(__self__, "values", values)
|
1853
1849
|
|
1854
1850
|
@property
|
1855
1851
|
@pulumi.getter
|
1856
1852
|
def key(self) -> str:
|
1857
|
-
"""
|
1858
|
-
name of permitted or denied parameter.
|
1859
|
-
"""
|
1860
1853
|
return pulumi.get(self, "key")
|
1861
1854
|
|
1862
1855
|
@key.setter
|
@@ -1866,9 +1859,6 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
1866
1859
|
@property
|
1867
1860
|
@pulumi.getter
|
1868
1861
|
def values(self) -> Sequence[str]:
|
1869
|
-
"""
|
1870
|
-
list of values what are permitted or denied by policy rule.
|
1871
|
-
"""
|
1872
1862
|
return pulumi.get(self, "values")
|
1873
1863
|
|
1874
1864
|
@values.setter
|
@@ -1881,19 +1871,12 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
1881
1871
|
def __init__(__self__, *,
|
1882
1872
|
key: str,
|
1883
1873
|
values: Sequence[str]):
|
1884
|
-
"""
|
1885
|
-
:param str key: name of permitted or denied parameter.
|
1886
|
-
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
1887
|
-
"""
|
1888
1874
|
pulumi.set(__self__, "key", key)
|
1889
1875
|
pulumi.set(__self__, "values", values)
|
1890
1876
|
|
1891
1877
|
@property
|
1892
1878
|
@pulumi.getter
|
1893
1879
|
def key(self) -> str:
|
1894
|
-
"""
|
1895
|
-
name of permitted or denied parameter.
|
1896
|
-
"""
|
1897
1880
|
return pulumi.get(self, "key")
|
1898
1881
|
|
1899
1882
|
@key.setter
|
@@ -1903,9 +1886,6 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
1903
1886
|
@property
|
1904
1887
|
@pulumi.getter
|
1905
1888
|
def values(self) -> Sequence[str]:
|
1906
|
-
"""
|
1907
|
-
list of values what are permitted or denied by policy rule.
|
1908
|
-
"""
|
1909
1889
|
return pulumi.get(self, "values")
|
1910
1890
|
|
1911
1891
|
@values.setter
|
@@ -1252,7 +1252,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1252
1252
|
"""
|
1253
1253
|
## Example Usage
|
1254
1254
|
|
1255
|
-
<!--Start PulumiCodeChooser -->
|
1256
1255
|
```python
|
1257
1256
|
import pulumi
|
1258
1257
|
import pulumi_vault as vault
|
@@ -1265,7 +1264,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1265
1264
|
insecure_tls=True,
|
1266
1265
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1267
1266
|
```
|
1268
|
-
<!--End PulumiCodeChooser -->
|
1269
1267
|
|
1270
1268
|
## Import
|
1271
1269
|
|
@@ -1345,7 +1343,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1345
1343
|
"""
|
1346
1344
|
## Example Usage
|
1347
1345
|
|
1348
|
-
<!--Start PulumiCodeChooser -->
|
1349
1346
|
```python
|
1350
1347
|
import pulumi
|
1351
1348
|
import pulumi_vault as vault
|
@@ -1358,7 +1355,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1358
1355
|
insecure_tls=True,
|
1359
1356
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1360
1357
|
```
|
1361
|
-
<!--End PulumiCodeChooser -->
|
1362
1358
|
|
1363
1359
|
## Import
|
1364
1360
|
|
@@ -293,7 +293,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
293
293
|
"""
|
294
294
|
## Example Usage
|
295
295
|
|
296
|
-
<!--Start PulumiCodeChooser -->
|
297
296
|
```python
|
298
297
|
import pulumi
|
299
298
|
import pulumi_vault as vault
|
@@ -316,7 +315,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
316
315
|
disable_check_in_enforcement=True,
|
317
316
|
max_ttl=120)
|
318
317
|
```
|
319
|
-
<!--End PulumiCodeChooser -->
|
320
318
|
|
321
319
|
## Import
|
322
320
|
|
@@ -352,7 +350,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
352
350
|
"""
|
353
351
|
## Example Usage
|
354
352
|
|
355
|
-
<!--Start PulumiCodeChooser -->
|
356
353
|
```python
|
357
354
|
import pulumi
|
358
355
|
import pulumi_vault as vault
|
@@ -375,7 +372,6 @@ class SecretLibrary(pulumi.CustomResource):
|
|
375
372
|
disable_check_in_enforcement=True,
|
376
373
|
max_ttl=120)
|
377
374
|
```
|
378
|
-
<!--End PulumiCodeChooser -->
|
379
375
|
|
380
376
|
## Import
|
381
377
|
|
pulumi_vault/ad/secret_role.py
CHANGED
@@ -258,7 +258,6 @@ class SecretRole(pulumi.CustomResource):
|
|
258
258
|
"""
|
259
259
|
## Example Usage
|
260
260
|
|
261
|
-
<!--Start PulumiCodeChooser -->
|
262
261
|
```python
|
263
262
|
import pulumi
|
264
263
|
import pulumi_vault as vault
|
@@ -276,7 +275,6 @@ class SecretRole(pulumi.CustomResource):
|
|
276
275
|
service_account_name="Bob",
|
277
276
|
ttl=60)
|
278
277
|
```
|
279
|
-
<!--End PulumiCodeChooser -->
|
280
278
|
|
281
279
|
## Import
|
282
280
|
|
@@ -310,7 +308,6 @@ class SecretRole(pulumi.CustomResource):
|
|
310
308
|
"""
|
311
309
|
## Example Usage
|
312
310
|
|
313
|
-
<!--Start PulumiCodeChooser -->
|
314
311
|
```python
|
315
312
|
import pulumi
|
316
313
|
import pulumi_vault as vault
|
@@ -328,7 +325,6 @@ class SecretRole(pulumi.CustomResource):
|
|
328
325
|
service_account_name="Bob",
|
329
326
|
ttl=60)
|
330
327
|
```
|
331
|
-
<!--End PulumiCodeChooser -->
|
332
328
|
|
333
329
|
## Import
|
334
330
|
|
@@ -40,32 +40,15 @@ class AuthBackendRoleArgs:
|
|
40
40
|
The value should not contain leading or trailing forward slashes.
|
41
41
|
The `namespace` is always relative to the provider's configured namespace.
|
42
42
|
*Available only for Vault Enterprise*.
|
43
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
44
|
-
|
45
|
-
|
46
|
-
:param pulumi.Input[
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
:param pulumi.Input[int]
|
51
|
-
|
52
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
53
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
54
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
55
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
56
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
57
|
-
token generated using this role should never expire. The token should be renewed within the
|
58
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
59
|
-
value of this field. Specified in seconds.
|
60
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
61
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
62
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
63
|
-
Its current value will be referenced at renewal time.
|
64
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
65
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
66
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
67
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
68
|
-
requests a different type at generation time.
|
43
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
44
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
45
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
46
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
47
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
48
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
49
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
50
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
51
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
69
52
|
"""
|
70
53
|
pulumi.set(__self__, "arn", arn)
|
71
54
|
pulumi.set(__self__, "role", role)
|
@@ -151,9 +134,7 @@ class AuthBackendRoleArgs:
|
|
151
134
|
@pulumi.getter(name="tokenBoundCidrs")
|
152
135
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
153
136
|
"""
|
154
|
-
|
155
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
156
|
-
as well.
|
137
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
157
138
|
"""
|
158
139
|
return pulumi.get(self, "token_bound_cidrs")
|
159
140
|
|
@@ -165,10 +146,7 @@ class AuthBackendRoleArgs:
|
|
165
146
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
166
147
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
167
148
|
"""
|
168
|
-
|
169
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
170
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
171
|
-
`token_max_ttl` would otherwise allow a renewal.
|
149
|
+
Generated Token's Explicit Maximum TTL in seconds
|
172
150
|
"""
|
173
151
|
return pulumi.get(self, "token_explicit_max_ttl")
|
174
152
|
|
@@ -180,8 +158,7 @@ class AuthBackendRoleArgs:
|
|
180
158
|
@pulumi.getter(name="tokenMaxTtl")
|
181
159
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
182
160
|
"""
|
183
|
-
The maximum lifetime
|
184
|
-
Its current value will be referenced at renewal time.
|
161
|
+
The maximum lifetime of the generated token
|
185
162
|
"""
|
186
163
|
return pulumi.get(self, "token_max_ttl")
|
187
164
|
|
@@ -193,8 +170,7 @@ class AuthBackendRoleArgs:
|
|
193
170
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
194
171
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
195
172
|
"""
|
196
|
-
If
|
197
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
173
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
198
174
|
"""
|
199
175
|
return pulumi.get(self, "token_no_default_policy")
|
200
176
|
|
@@ -206,8 +182,7 @@ class AuthBackendRoleArgs:
|
|
206
182
|
@pulumi.getter(name="tokenNumUses")
|
207
183
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
208
184
|
"""
|
209
|
-
The
|
210
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
185
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
211
186
|
"""
|
212
187
|
return pulumi.get(self, "token_num_uses")
|
213
188
|
|
@@ -219,10 +194,7 @@ class AuthBackendRoleArgs:
|
|
219
194
|
@pulumi.getter(name="tokenPeriod")
|
220
195
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
221
196
|
"""
|
222
|
-
|
223
|
-
token generated using this role should never expire. The token should be renewed within the
|
224
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
225
|
-
value of this field. Specified in seconds.
|
197
|
+
Generated Token's Period
|
226
198
|
"""
|
227
199
|
return pulumi.get(self, "token_period")
|
228
200
|
|
@@ -234,8 +206,7 @@ class AuthBackendRoleArgs:
|
|
234
206
|
@pulumi.getter(name="tokenPolicies")
|
235
207
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
236
208
|
"""
|
237
|
-
|
238
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
209
|
+
Generated Token's Policies
|
239
210
|
"""
|
240
211
|
return pulumi.get(self, "token_policies")
|
241
212
|
|
@@ -247,8 +218,7 @@ class AuthBackendRoleArgs:
|
|
247
218
|
@pulumi.getter(name="tokenTtl")
|
248
219
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
249
220
|
"""
|
250
|
-
The
|
251
|
-
Its current value will be referenced at renewal time.
|
221
|
+
The initial ttl of the token to generate in seconds
|
252
222
|
"""
|
253
223
|
return pulumi.get(self, "token_ttl")
|
254
224
|
|
@@ -260,11 +230,7 @@ class AuthBackendRoleArgs:
|
|
260
230
|
@pulumi.getter(name="tokenType")
|
261
231
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
262
232
|
"""
|
263
|
-
The type of token
|
264
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
265
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
266
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
267
|
-
requests a different type at generation time.
|
233
|
+
The type of token to generate, service or batch
|
268
234
|
"""
|
269
235
|
return pulumi.get(self, "token_type")
|
270
236
|
|
@@ -302,32 +268,15 @@ class _AuthBackendRoleState:
|
|
302
268
|
*Available only for Vault Enterprise*.
|
303
269
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
304
270
|
the role reflected in the arn.
|
305
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
306
|
-
|
307
|
-
|
308
|
-
:param pulumi.Input[
|
309
|
-
|
310
|
-
|
311
|
-
|
312
|
-
:param pulumi.Input[int]
|
313
|
-
|
314
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
315
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
316
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
317
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
318
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
319
|
-
token generated using this role should never expire. The token should be renewed within the
|
320
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
321
|
-
value of this field. Specified in seconds.
|
322
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
323
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
324
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
325
|
-
Its current value will be referenced at renewal time.
|
326
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
327
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
328
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
329
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
330
|
-
requests a different type at generation time.
|
271
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
272
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
273
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
274
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
275
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
276
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
277
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
278
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
279
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
331
280
|
"""
|
332
281
|
if arn is not None:
|
333
282
|
pulumi.set(__self__, "arn", arn)
|
@@ -415,9 +364,7 @@ class _AuthBackendRoleState:
|
|
415
364
|
@pulumi.getter(name="tokenBoundCidrs")
|
416
365
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
417
366
|
"""
|
418
|
-
|
419
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
420
|
-
as well.
|
367
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
421
368
|
"""
|
422
369
|
return pulumi.get(self, "token_bound_cidrs")
|
423
370
|
|
@@ -429,10 +376,7 @@ class _AuthBackendRoleState:
|
|
429
376
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
430
377
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
431
378
|
"""
|
432
|
-
|
433
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
434
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
435
|
-
`token_max_ttl` would otherwise allow a renewal.
|
379
|
+
Generated Token's Explicit Maximum TTL in seconds
|
436
380
|
"""
|
437
381
|
return pulumi.get(self, "token_explicit_max_ttl")
|
438
382
|
|
@@ -444,8 +388,7 @@ class _AuthBackendRoleState:
|
|
444
388
|
@pulumi.getter(name="tokenMaxTtl")
|
445
389
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
446
390
|
"""
|
447
|
-
The maximum lifetime
|
448
|
-
Its current value will be referenced at renewal time.
|
391
|
+
The maximum lifetime of the generated token
|
449
392
|
"""
|
450
393
|
return pulumi.get(self, "token_max_ttl")
|
451
394
|
|
@@ -457,8 +400,7 @@ class _AuthBackendRoleState:
|
|
457
400
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
458
401
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
459
402
|
"""
|
460
|
-
If
|
461
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
403
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
462
404
|
"""
|
463
405
|
return pulumi.get(self, "token_no_default_policy")
|
464
406
|
|
@@ -470,8 +412,7 @@ class _AuthBackendRoleState:
|
|
470
412
|
@pulumi.getter(name="tokenNumUses")
|
471
413
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
472
414
|
"""
|
473
|
-
The
|
474
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
415
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
475
416
|
"""
|
476
417
|
return pulumi.get(self, "token_num_uses")
|
477
418
|
|
@@ -483,10 +424,7 @@ class _AuthBackendRoleState:
|
|
483
424
|
@pulumi.getter(name="tokenPeriod")
|
484
425
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
485
426
|
"""
|
486
|
-
|
487
|
-
token generated using this role should never expire. The token should be renewed within the
|
488
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
489
|
-
value of this field. Specified in seconds.
|
427
|
+
Generated Token's Period
|
490
428
|
"""
|
491
429
|
return pulumi.get(self, "token_period")
|
492
430
|
|
@@ -498,8 +436,7 @@ class _AuthBackendRoleState:
|
|
498
436
|
@pulumi.getter(name="tokenPolicies")
|
499
437
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
500
438
|
"""
|
501
|
-
|
502
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
439
|
+
Generated Token's Policies
|
503
440
|
"""
|
504
441
|
return pulumi.get(self, "token_policies")
|
505
442
|
|
@@ -511,8 +448,7 @@ class _AuthBackendRoleState:
|
|
511
448
|
@pulumi.getter(name="tokenTtl")
|
512
449
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
513
450
|
"""
|
514
|
-
The
|
515
|
-
Its current value will be referenced at renewal time.
|
451
|
+
The initial ttl of the token to generate in seconds
|
516
452
|
"""
|
517
453
|
return pulumi.get(self, "token_ttl")
|
518
454
|
|
@@ -524,11 +460,7 @@ class _AuthBackendRoleState:
|
|
524
460
|
@pulumi.getter(name="tokenType")
|
525
461
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
526
462
|
"""
|
527
|
-
The type of token
|
528
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
529
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
530
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
531
|
-
requests a different type at generation time.
|
463
|
+
The type of token to generate, service or batch
|
532
464
|
"""
|
533
465
|
return pulumi.get(self, "token_type")
|
534
466
|
|
@@ -561,7 +493,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
561
493
|
|
562
494
|
## Example Usage
|
563
495
|
|
564
|
-
<!--Start PulumiCodeChooser -->
|
565
496
|
```python
|
566
497
|
import pulumi
|
567
498
|
import pulumi_vault as vault
|
@@ -574,7 +505,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
574
505
|
role="example",
|
575
506
|
arn="acs:ram:123456:tf:role/foobar")
|
576
507
|
```
|
577
|
-
<!--End PulumiCodeChooser -->
|
578
508
|
|
579
509
|
## Import
|
580
510
|
|
@@ -597,32 +527,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
597
527
|
*Available only for Vault Enterprise*.
|
598
528
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
599
529
|
the role reflected in the arn.
|
600
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
601
|
-
|
602
|
-
|
603
|
-
:param pulumi.Input[
|
604
|
-
|
605
|
-
|
606
|
-
|
607
|
-
:param pulumi.Input[int]
|
608
|
-
|
609
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
610
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
611
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
612
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
613
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
614
|
-
token generated using this role should never expire. The token should be renewed within the
|
615
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
616
|
-
value of this field. Specified in seconds.
|
617
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
618
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
619
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
620
|
-
Its current value will be referenced at renewal time.
|
621
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
622
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
623
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
624
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
625
|
-
requests a different type at generation time.
|
530
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
531
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
532
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
533
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
534
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
535
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
536
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
537
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
538
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
626
539
|
"""
|
627
540
|
...
|
628
541
|
@overload
|
@@ -635,7 +548,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
635
548
|
|
636
549
|
## Example Usage
|
637
550
|
|
638
|
-
<!--Start PulumiCodeChooser -->
|
639
551
|
```python
|
640
552
|
import pulumi
|
641
553
|
import pulumi_vault as vault
|
@@ -648,7 +560,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
648
560
|
role="example",
|
649
561
|
arn="acs:ram:123456:tf:role/foobar")
|
650
562
|
```
|
651
|
-
<!--End PulumiCodeChooser -->
|
652
563
|
|
653
564
|
## Import
|
654
565
|
|
@@ -753,32 +664,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
753
664
|
*Available only for Vault Enterprise*.
|
754
665
|
:param pulumi.Input[str] role: Name of the role. Must correspond with the name of
|
755
666
|
the role reflected in the arn.
|
756
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
757
|
-
|
758
|
-
|
759
|
-
:param pulumi.Input[
|
760
|
-
|
761
|
-
|
762
|
-
|
763
|
-
:param pulumi.Input[int]
|
764
|
-
|
765
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
766
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
767
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
|
768
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
769
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
770
|
-
token generated using this role should never expire. The token should be renewed within the
|
771
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
772
|
-
value of this field. Specified in seconds.
|
773
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
774
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
775
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
776
|
-
Its current value will be referenced at renewal time.
|
777
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
778
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
779
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
780
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
781
|
-
requests a different type at generation time.
|
667
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
668
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
669
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
670
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
671
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
672
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
673
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
674
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
675
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
782
676
|
"""
|
783
677
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
784
678
|
|
@@ -842,9 +736,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
842
736
|
@pulumi.getter(name="tokenBoundCidrs")
|
843
737
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
844
738
|
"""
|
845
|
-
|
846
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
847
|
-
as well.
|
739
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
848
740
|
"""
|
849
741
|
return pulumi.get(self, "token_bound_cidrs")
|
850
742
|
|
@@ -852,10 +744,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
852
744
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
853
745
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
854
746
|
"""
|
855
|
-
|
856
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
857
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
858
|
-
`token_max_ttl` would otherwise allow a renewal.
|
747
|
+
Generated Token's Explicit Maximum TTL in seconds
|
859
748
|
"""
|
860
749
|
return pulumi.get(self, "token_explicit_max_ttl")
|
861
750
|
|
@@ -863,8 +752,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
863
752
|
@pulumi.getter(name="tokenMaxTtl")
|
864
753
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
865
754
|
"""
|
866
|
-
The maximum lifetime
|
867
|
-
Its current value will be referenced at renewal time.
|
755
|
+
The maximum lifetime of the generated token
|
868
756
|
"""
|
869
757
|
return pulumi.get(self, "token_max_ttl")
|
870
758
|
|
@@ -872,8 +760,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
872
760
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
873
761
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
874
762
|
"""
|
875
|
-
If
|
876
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
763
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
877
764
|
"""
|
878
765
|
return pulumi.get(self, "token_no_default_policy")
|
879
766
|
|
@@ -881,8 +768,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
881
768
|
@pulumi.getter(name="tokenNumUses")
|
882
769
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
883
770
|
"""
|
884
|
-
The
|
885
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
771
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
886
772
|
"""
|
887
773
|
return pulumi.get(self, "token_num_uses")
|
888
774
|
|
@@ -890,10 +776,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
890
776
|
@pulumi.getter(name="tokenPeriod")
|
891
777
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
892
778
|
"""
|
893
|
-
|
894
|
-
token generated using this role should never expire. The token should be renewed within the
|
895
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
896
|
-
value of this field. Specified in seconds.
|
779
|
+
Generated Token's Period
|
897
780
|
"""
|
898
781
|
return pulumi.get(self, "token_period")
|
899
782
|
|
@@ -901,8 +784,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
901
784
|
@pulumi.getter(name="tokenPolicies")
|
902
785
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
903
786
|
"""
|
904
|
-
|
905
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
787
|
+
Generated Token's Policies
|
906
788
|
"""
|
907
789
|
return pulumi.get(self, "token_policies")
|
908
790
|
|
@@ -910,8 +792,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
910
792
|
@pulumi.getter(name="tokenTtl")
|
911
793
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
912
794
|
"""
|
913
|
-
The
|
914
|
-
Its current value will be referenced at renewal time.
|
795
|
+
The initial ttl of the token to generate in seconds
|
915
796
|
"""
|
916
797
|
return pulumi.get(self, "token_ttl")
|
917
798
|
|
@@ -919,11 +800,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
919
800
|
@pulumi.getter(name="tokenType")
|
920
801
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
921
802
|
"""
|
922
|
-
The type of token
|
923
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
924
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
925
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
926
|
-
requests a different type at generation time.
|
803
|
+
The type of token to generate, service or batch
|
927
804
|
"""
|
928
805
|
return pulumi.get(self, "token_type")
|
929
806
|
|