pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +0 -4
- pulumi_vault/ad/secret_library.py +0 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +0 -8
- pulumi_vault/audit_request_header.py +0 -4
- pulumi_vault/aws/auth_backend_client.py +0 -4
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +0 -4
- pulumi_vault/aws/secret_backend_static_role.py +0 -4
- pulumi_vault/azure/auth_backend_config.py +0 -4
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +0 -8
- pulumi_vault/azure/backend_role.py +0 -4
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +63 -200
- pulumi_vault/consul/secret_backend.py +0 -8
- pulumi_vault/consul/secret_backend_role.py +0 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +0 -4
- pulumi_vault/database/secret_backend_role.py +0 -4
- pulumi_vault/database/secret_backend_static_role.py +0 -4
- pulumi_vault/database/secrets_mount.py +0 -4
- pulumi_vault/egp_policy.py +0 -4
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +0 -4
- pulumi_vault/gcp/secret_impersonated_account.py +0 -4
- pulumi_vault/gcp/secret_roleset.py +0 -4
- pulumi_vault/gcp/secret_static_account.py +0 -4
- pulumi_vault/generic/endpoint.py +0 -4
- pulumi_vault/generic/get_secret.py +0 -8
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +0 -8
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +0 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +0 -4
- pulumi_vault/github/user.py +0 -4
- pulumi_vault/identity/entity.py +0 -4
- pulumi_vault/identity/entity_alias.py +0 -4
- pulumi_vault/identity/entity_policies.py +0 -8
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +0 -4
- pulumi_vault/identity/get_oidc_openid_config.py +0 -4
- pulumi_vault/identity/get_oidc_public_keys.py +0 -4
- pulumi_vault/identity/group.py +0 -12
- pulumi_vault/identity/group_alias.py +0 -4
- pulumi_vault/identity/group_member_entity_ids.py +0 -8
- pulumi_vault/identity/group_member_group_ids.py +0 -8
- pulumi_vault/identity/group_policies.py +0 -8
- pulumi_vault/identity/mfa_duo.py +0 -4
- pulumi_vault/identity/mfa_login_enforcement.py +0 -4
- pulumi_vault/identity/mfa_okta.py +0 -4
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +0 -4
- pulumi_vault/identity/oidc_client.py +0 -4
- pulumi_vault/identity/oidc_key.py +0 -4
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
- pulumi_vault/identity/oidc_provider.py +0 -4
- pulumi_vault/identity/oidc_role.py +0 -8
- pulumi_vault/identity/oidc_scope.py +0 -4
- pulumi_vault/jwt/auth_backend.py +0 -12
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +0 -4
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +0 -4
- pulumi_vault/kubernetes/secret_backend.py +0 -4
- pulumi_vault/kubernetes/secret_backend_role.py +0 -12
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
- pulumi_vault/kv/get_secret_v2.py +0 -4
- pulumi_vault/kv/get_secrets_list.py +0 -4
- pulumi_vault/kv/get_secrets_list_v2.py +0 -4
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +0 -4
- pulumi_vault/ldap/auth_backend.py +56 -151
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +0 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +0 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +0 -4
- pulumi_vault/mfa_okta.py +0 -4
- pulumi_vault/mfa_pingid.py +0 -4
- pulumi_vault/mfa_totp.py +0 -4
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +0 -4
- pulumi_vault/mount.py +0 -16
- pulumi_vault/nomad_secret_backend.py +0 -4
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +0 -4
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +0 -4
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +0 -4
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
- pulumi_vault/quota_lease_count.py +0 -4
- pulumi_vault/quota_rate_limit.py +0 -4
- pulumi_vault/rabbitmq/secret_backend.py +0 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +91 -292
- pulumi_vault/rgp_policy.py +0 -4
- pulumi_vault/saml/auth_backend.py +0 -4
- pulumi_vault/saml/auth_backend_role.py +56 -172
- pulumi_vault/secrets/sync_association.py +0 -4
- pulumi_vault/secrets/sync_aws_destination.py +0 -4
- pulumi_vault/secrets/sync_azure_destination.py +0 -4
- pulumi_vault/secrets/sync_config.py +0 -4
- pulumi_vault/secrets/sync_gcp_destination.py +0 -4
- pulumi_vault/secrets/sync_gh_destination.py +0 -4
- pulumi_vault/secrets/sync_github_apps.py +0 -4
- pulumi_vault/secrets/sync_vercel_destination.py +0 -4
- pulumi_vault/ssh/_inputs.py +6 -20
- pulumi_vault/ssh/outputs.py +6 -20
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +0 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +0 -4
- pulumi_vault/terraformcloud/secret_role.py +0 -4
- pulumi_vault/token.py +0 -4
- pulumi_vault/tokenauth/auth_backend_role.py +56 -172
- pulumi_vault/transform/alphabet.py +0 -4
- pulumi_vault/transform/get_decode.py +0 -4
- pulumi_vault/transform/get_encode.py +0 -4
- pulumi_vault/transform/role.py +0 -4
- pulumi_vault/transform/template.py +0 -4
- pulumi_vault/transit/get_decrypt.py +0 -16
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +0 -4
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -134,7 +134,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
134
134
|
"""
|
135
135
|
## Example Usage
|
136
136
|
|
137
|
-
<!--Start PulumiCodeChooser -->
|
138
137
|
```python
|
139
138
|
import pulumi
|
140
139
|
import json
|
@@ -157,7 +156,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
157
156
|
test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
|
158
157
|
name=aws_secret.name)
|
159
158
|
```
|
160
|
-
<!--End PulumiCodeChooser -->
|
161
159
|
|
162
160
|
## Required Vault Capabilities
|
163
161
|
|
@@ -211,7 +209,6 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
211
209
|
"""
|
212
210
|
## Example Usage
|
213
211
|
|
214
|
-
<!--Start PulumiCodeChooser -->
|
215
212
|
```python
|
216
213
|
import pulumi
|
217
214
|
import json
|
@@ -234,7 +231,6 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
234
231
|
test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
|
235
232
|
name=aws_secret.name)
|
236
233
|
```
|
237
|
-
<!--End PulumiCodeChooser -->
|
238
234
|
|
239
235
|
## Required Vault Capabilities
|
240
236
|
|
pulumi_vault/kv/get_secret_v2.py
CHANGED
@@ -179,7 +179,6 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
179
179
|
"""
|
180
180
|
## Example Usage
|
181
181
|
|
182
|
-
<!--Start PulumiCodeChooser -->
|
183
182
|
```python
|
184
183
|
import pulumi
|
185
184
|
import json
|
@@ -204,7 +203,6 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
204
203
|
example = vault.kv.get_secret_v2_output(mount=kvv2.path,
|
205
204
|
name=example_secret_v2.name)
|
206
205
|
```
|
207
|
-
<!--End PulumiCodeChooser -->
|
208
206
|
|
209
207
|
## Required Vault Capabilities
|
210
208
|
|
@@ -254,7 +252,6 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
254
252
|
"""
|
255
253
|
## Example Usage
|
256
254
|
|
257
|
-
<!--Start PulumiCodeChooser -->
|
258
255
|
```python
|
259
256
|
import pulumi
|
260
257
|
import json
|
@@ -279,7 +276,6 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
279
276
|
example = vault.kv.get_secret_v2_output(mount=kvv2.path,
|
280
277
|
name=example_secret_v2.name)
|
281
278
|
```
|
282
|
-
<!--End PulumiCodeChooser -->
|
283
279
|
|
284
280
|
## Required Vault Capabilities
|
285
281
|
|
@@ -80,7 +80,6 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
80
80
|
"""
|
81
81
|
## Example Usage
|
82
82
|
|
83
|
-
<!--Start PulumiCodeChooser -->
|
84
83
|
```python
|
85
84
|
import pulumi
|
86
85
|
import json
|
@@ -105,7 +104,6 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
105
104
|
}))
|
106
105
|
secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
|
107
106
|
```
|
108
|
-
<!--End PulumiCodeChooser -->
|
109
107
|
|
110
108
|
## Required Vault Capabilities
|
111
109
|
|
@@ -138,7 +136,6 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
138
136
|
"""
|
139
137
|
## Example Usage
|
140
138
|
|
141
|
-
<!--Start PulumiCodeChooser -->
|
142
139
|
```python
|
143
140
|
import pulumi
|
144
141
|
import json
|
@@ -163,7 +160,6 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
163
160
|
}))
|
164
161
|
secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
|
165
162
|
```
|
166
|
-
<!--End PulumiCodeChooser -->
|
167
163
|
|
168
164
|
## Required Vault Capabilities
|
169
165
|
|
@@ -102,7 +102,6 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
102
102
|
"""
|
103
103
|
## Example Usage
|
104
104
|
|
105
|
-
<!--Start PulumiCodeChooser -->
|
106
105
|
```python
|
107
106
|
import pulumi
|
108
107
|
import json
|
@@ -137,7 +136,6 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
137
136
|
nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
|
138
137
|
name=test2["name"]))
|
139
138
|
```
|
140
|
-
<!--End PulumiCodeChooser -->
|
141
139
|
|
142
140
|
## Required Vault Capabilities
|
143
141
|
|
@@ -178,7 +176,6 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
178
176
|
"""
|
179
177
|
## Example Usage
|
180
178
|
|
181
|
-
<!--Start PulumiCodeChooser -->
|
182
179
|
```python
|
183
180
|
import pulumi
|
184
181
|
import json
|
@@ -213,7 +210,6 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
213
210
|
nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
|
214
211
|
name=test2["name"]))
|
215
212
|
```
|
216
|
-
<!--End PulumiCodeChooser -->
|
217
213
|
|
218
214
|
## Required Vault Capabilities
|
219
215
|
|
pulumi_vault/kv/secret.py
CHANGED
@@ -176,7 +176,6 @@ class Secret(pulumi.CustomResource):
|
|
176
176
|
|
177
177
|
## Example Usage
|
178
178
|
|
179
|
-
<!--Start PulumiCodeChooser -->
|
180
179
|
```python
|
181
180
|
import pulumi
|
182
181
|
import json
|
@@ -196,7 +195,6 @@ class Secret(pulumi.CustomResource):
|
|
196
195
|
"foo": "bar",
|
197
196
|
}))
|
198
197
|
```
|
199
|
-
<!--End PulumiCodeChooser -->
|
200
198
|
|
201
199
|
## Required Vault Capabilities
|
202
200
|
|
@@ -237,7 +235,6 @@ class Secret(pulumi.CustomResource):
|
|
237
235
|
|
238
236
|
## Example Usage
|
239
237
|
|
240
|
-
<!--Start PulumiCodeChooser -->
|
241
238
|
```python
|
242
239
|
import pulumi
|
243
240
|
import json
|
@@ -257,7 +254,6 @@ class Secret(pulumi.CustomResource):
|
|
257
254
|
"foo": "bar",
|
258
255
|
}))
|
259
256
|
```
|
260
|
-
<!--End PulumiCodeChooser -->
|
261
257
|
|
262
258
|
## Required Vault Capabilities
|
263
259
|
|
@@ -226,7 +226,6 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
226
226
|
|
227
227
|
## Example Usage
|
228
228
|
|
229
|
-
<!--Start PulumiCodeChooser -->
|
230
229
|
```python
|
231
230
|
import pulumi
|
232
231
|
import pulumi_vault as vault
|
@@ -244,7 +243,6 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
244
243
|
delete_version_after=12600,
|
245
244
|
cas_required=True)
|
246
245
|
```
|
247
|
-
<!--End PulumiCodeChooser -->
|
248
246
|
|
249
247
|
## Required Vault Capabilities
|
250
248
|
|
@@ -290,7 +288,6 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
290
288
|
|
291
289
|
## Example Usage
|
292
290
|
|
293
|
-
<!--Start PulumiCodeChooser -->
|
294
291
|
```python
|
295
292
|
import pulumi
|
296
293
|
import pulumi_vault as vault
|
@@ -308,7 +305,6 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
308
305
|
delete_version_after=12600,
|
309
306
|
cas_required=True)
|
310
307
|
```
|
311
|
-
<!--End PulumiCodeChooser -->
|
312
308
|
|
313
309
|
## Required Vault Capabilities
|
314
310
|
|
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -448,7 +448,6 @@ class SecretV2(pulumi.CustomResource):
|
|
448
448
|
|
449
449
|
## Example Usage
|
450
450
|
|
451
|
-
<!--Start PulumiCodeChooser -->
|
452
451
|
```python
|
453
452
|
import pulumi
|
454
453
|
import json
|
@@ -478,7 +477,6 @@ class SecretV2(pulumi.CustomResource):
|
|
478
477
|
},
|
479
478
|
))
|
480
479
|
```
|
481
|
-
<!--End PulumiCodeChooser -->
|
482
480
|
|
483
481
|
## Required Vault Capabilities
|
484
482
|
|
@@ -547,7 +545,6 @@ class SecretV2(pulumi.CustomResource):
|
|
547
545
|
|
548
546
|
## Example Usage
|
549
547
|
|
550
|
-
<!--Start PulumiCodeChooser -->
|
551
548
|
```python
|
552
549
|
import pulumi
|
553
550
|
import json
|
@@ -577,7 +574,6 @@ class SecretV2(pulumi.CustomResource):
|
|
577
574
|
},
|
578
575
|
))
|
579
576
|
```
|
580
|
-
<!--End PulumiCodeChooser -->
|
581
577
|
|
582
578
|
## Required Vault Capabilities
|
583
579
|
|
@@ -78,27 +78,14 @@ class AuthBackendArgs:
|
|
78
78
|
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
79
79
|
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
80
80
|
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
81
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
82
|
-
|
83
|
-
|
84
|
-
:param pulumi.Input[
|
85
|
-
|
86
|
-
|
87
|
-
|
88
|
-
:param pulumi.Input[int]
|
89
|
-
Its current value will be referenced at renewal time.
|
90
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
91
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
92
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
93
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
94
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
95
|
-
token generated using this role should never expire. The token should be renewed within the
|
96
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
97
|
-
value of this field. Specified in seconds.
|
98
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
99
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
100
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
101
|
-
Its current value will be referenced at renewal time.
|
81
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
82
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
83
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
84
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
85
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
86
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
87
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
88
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
102
89
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
103
90
|
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
104
91
|
:param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
@@ -448,9 +435,7 @@ class AuthBackendArgs:
|
|
448
435
|
@pulumi.getter(name="tokenBoundCidrs")
|
449
436
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
450
437
|
"""
|
451
|
-
|
452
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
453
|
-
as well.
|
438
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
454
439
|
"""
|
455
440
|
return pulumi.get(self, "token_bound_cidrs")
|
456
441
|
|
@@ -462,10 +447,7 @@ class AuthBackendArgs:
|
|
462
447
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
463
448
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
464
449
|
"""
|
465
|
-
|
466
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
467
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
468
|
-
`token_max_ttl` would otherwise allow a renewal.
|
450
|
+
Generated Token's Explicit Maximum TTL in seconds
|
469
451
|
"""
|
470
452
|
return pulumi.get(self, "token_explicit_max_ttl")
|
471
453
|
|
@@ -477,8 +459,7 @@ class AuthBackendArgs:
|
|
477
459
|
@pulumi.getter(name="tokenMaxTtl")
|
478
460
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
479
461
|
"""
|
480
|
-
The maximum lifetime
|
481
|
-
Its current value will be referenced at renewal time.
|
462
|
+
The maximum lifetime of the generated token
|
482
463
|
"""
|
483
464
|
return pulumi.get(self, "token_max_ttl")
|
484
465
|
|
@@ -490,8 +471,7 @@ class AuthBackendArgs:
|
|
490
471
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
491
472
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
492
473
|
"""
|
493
|
-
If
|
494
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
474
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
495
475
|
"""
|
496
476
|
return pulumi.get(self, "token_no_default_policy")
|
497
477
|
|
@@ -503,8 +483,7 @@ class AuthBackendArgs:
|
|
503
483
|
@pulumi.getter(name="tokenNumUses")
|
504
484
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
505
485
|
"""
|
506
|
-
The
|
507
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
486
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
508
487
|
"""
|
509
488
|
return pulumi.get(self, "token_num_uses")
|
510
489
|
|
@@ -516,10 +495,7 @@ class AuthBackendArgs:
|
|
516
495
|
@pulumi.getter(name="tokenPeriod")
|
517
496
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
518
497
|
"""
|
519
|
-
|
520
|
-
token generated using this role should never expire. The token should be renewed within the
|
521
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
522
|
-
value of this field. Specified in seconds.
|
498
|
+
Generated Token's Period
|
523
499
|
"""
|
524
500
|
return pulumi.get(self, "token_period")
|
525
501
|
|
@@ -531,8 +507,7 @@ class AuthBackendArgs:
|
|
531
507
|
@pulumi.getter(name="tokenPolicies")
|
532
508
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
533
509
|
"""
|
534
|
-
|
535
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
510
|
+
Generated Token's Policies
|
536
511
|
"""
|
537
512
|
return pulumi.get(self, "token_policies")
|
538
513
|
|
@@ -544,8 +519,7 @@ class AuthBackendArgs:
|
|
544
519
|
@pulumi.getter(name="tokenTtl")
|
545
520
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
546
521
|
"""
|
547
|
-
The
|
548
|
-
Its current value will be referenced at renewal time.
|
522
|
+
The initial ttl of the token to generate in seconds
|
549
523
|
"""
|
550
524
|
return pulumi.get(self, "token_ttl")
|
551
525
|
|
@@ -706,27 +680,14 @@ class _AuthBackendState:
|
|
706
680
|
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
707
681
|
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
708
682
|
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
709
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
710
|
-
|
711
|
-
|
712
|
-
:param pulumi.Input[
|
713
|
-
|
714
|
-
|
715
|
-
|
716
|
-
:param pulumi.Input[int]
|
717
|
-
Its current value will be referenced at renewal time.
|
718
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
719
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
720
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
721
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
722
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
723
|
-
token generated using this role should never expire. The token should be renewed within the
|
724
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
725
|
-
value of this field. Specified in seconds.
|
726
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
727
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
728
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
729
|
-
Its current value will be referenced at renewal time.
|
683
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
684
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
685
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
686
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
687
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
688
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
689
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
690
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
730
691
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
731
692
|
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
732
693
|
:param pulumi.Input[str] url: The URL of the LDAP server
|
@@ -1080,9 +1041,7 @@ class _AuthBackendState:
|
|
1080
1041
|
@pulumi.getter(name="tokenBoundCidrs")
|
1081
1042
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1082
1043
|
"""
|
1083
|
-
|
1084
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1085
|
-
as well.
|
1044
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1086
1045
|
"""
|
1087
1046
|
return pulumi.get(self, "token_bound_cidrs")
|
1088
1047
|
|
@@ -1094,10 +1053,7 @@ class _AuthBackendState:
|
|
1094
1053
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1095
1054
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1096
1055
|
"""
|
1097
|
-
|
1098
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1099
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1100
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1056
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1101
1057
|
"""
|
1102
1058
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1103
1059
|
|
@@ -1109,8 +1065,7 @@ class _AuthBackendState:
|
|
1109
1065
|
@pulumi.getter(name="tokenMaxTtl")
|
1110
1066
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1111
1067
|
"""
|
1112
|
-
The maximum lifetime
|
1113
|
-
Its current value will be referenced at renewal time.
|
1068
|
+
The maximum lifetime of the generated token
|
1114
1069
|
"""
|
1115
1070
|
return pulumi.get(self, "token_max_ttl")
|
1116
1071
|
|
@@ -1122,8 +1077,7 @@ class _AuthBackendState:
|
|
1122
1077
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1123
1078
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
1124
1079
|
"""
|
1125
|
-
If
|
1126
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1080
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1127
1081
|
"""
|
1128
1082
|
return pulumi.get(self, "token_no_default_policy")
|
1129
1083
|
|
@@ -1135,8 +1089,7 @@ class _AuthBackendState:
|
|
1135
1089
|
@pulumi.getter(name="tokenNumUses")
|
1136
1090
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
1137
1091
|
"""
|
1138
|
-
The
|
1139
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1092
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1140
1093
|
"""
|
1141
1094
|
return pulumi.get(self, "token_num_uses")
|
1142
1095
|
|
@@ -1148,10 +1101,7 @@ class _AuthBackendState:
|
|
1148
1101
|
@pulumi.getter(name="tokenPeriod")
|
1149
1102
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
1150
1103
|
"""
|
1151
|
-
|
1152
|
-
token generated using this role should never expire. The token should be renewed within the
|
1153
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1154
|
-
value of this field. Specified in seconds.
|
1104
|
+
Generated Token's Period
|
1155
1105
|
"""
|
1156
1106
|
return pulumi.get(self, "token_period")
|
1157
1107
|
|
@@ -1163,8 +1113,7 @@ class _AuthBackendState:
|
|
1163
1113
|
@pulumi.getter(name="tokenPolicies")
|
1164
1114
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1165
1115
|
"""
|
1166
|
-
|
1167
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1116
|
+
Generated Token's Policies
|
1168
1117
|
"""
|
1169
1118
|
return pulumi.get(self, "token_policies")
|
1170
1119
|
|
@@ -1176,8 +1125,7 @@ class _AuthBackendState:
|
|
1176
1125
|
@pulumi.getter(name="tokenTtl")
|
1177
1126
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
1178
1127
|
"""
|
1179
|
-
The
|
1180
|
-
Its current value will be referenced at renewal time.
|
1128
|
+
The initial ttl of the token to generate in seconds
|
1181
1129
|
"""
|
1182
1130
|
return pulumi.get(self, "token_ttl")
|
1183
1131
|
|
@@ -1330,7 +1278,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1330
1278
|
|
1331
1279
|
## Example Usage
|
1332
1280
|
|
1333
|
-
<!--Start PulumiCodeChooser -->
|
1334
1281
|
```python
|
1335
1282
|
import pulumi
|
1336
1283
|
import pulumi_vault as vault
|
@@ -1345,7 +1292,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1345
1292
|
groupdn="OU=Groups,DC=example,DC=org",
|
1346
1293
|
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
|
1347
1294
|
```
|
1348
|
-
<!--End PulumiCodeChooser -->
|
1349
1295
|
|
1350
1296
|
## Import
|
1351
1297
|
|
@@ -1381,27 +1327,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
1381
1327
|
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
1382
1328
|
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
1383
1329
|
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
1384
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1385
|
-
|
1386
|
-
|
1387
|
-
:param pulumi.Input[
|
1388
|
-
|
1389
|
-
|
1390
|
-
|
1391
|
-
:param pulumi.Input[int]
|
1392
|
-
Its current value will be referenced at renewal time.
|
1393
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1394
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1395
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
1396
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1397
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1398
|
-
token generated using this role should never expire. The token should be renewed within the
|
1399
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1400
|
-
value of this field. Specified in seconds.
|
1401
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1402
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1403
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1404
|
-
Its current value will be referenced at renewal time.
|
1330
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1331
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1332
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1333
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1334
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1335
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1336
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1337
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1405
1338
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1406
1339
|
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1407
1340
|
:param pulumi.Input[str] url: The URL of the LDAP server
|
@@ -1422,7 +1355,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1422
1355
|
|
1423
1356
|
## Example Usage
|
1424
1357
|
|
1425
|
-
<!--Start PulumiCodeChooser -->
|
1426
1358
|
```python
|
1427
1359
|
import pulumi
|
1428
1360
|
import pulumi_vault as vault
|
@@ -1437,7 +1369,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
1437
1369
|
groupdn="OU=Groups,DC=example,DC=org",
|
1438
1370
|
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
|
1439
1371
|
```
|
1440
|
-
<!--End PulumiCodeChooser -->
|
1441
1372
|
|
1442
1373
|
## Import
|
1443
1374
|
|
@@ -1630,27 +1561,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
1630
1561
|
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
1631
1562
|
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
1632
1563
|
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
1633
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1634
|
-
|
1635
|
-
|
1636
|
-
:param pulumi.Input[
|
1637
|
-
|
1638
|
-
|
1639
|
-
|
1640
|
-
:param pulumi.Input[int]
|
1641
|
-
Its current value will be referenced at renewal time.
|
1642
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1643
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1644
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
1645
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1646
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1647
|
-
token generated using this role should never expire. The token should be renewed within the
|
1648
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1649
|
-
value of this field. Specified in seconds.
|
1650
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1651
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1652
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1653
|
-
Its current value will be referenced at renewal time.
|
1564
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1565
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1566
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1567
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1568
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1569
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1570
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1571
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1654
1572
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1655
1573
|
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1656
1574
|
:param pulumi.Input[str] url: The URL of the LDAP server
|
@@ -1883,9 +1801,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1883
1801
|
@pulumi.getter(name="tokenBoundCidrs")
|
1884
1802
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1885
1803
|
"""
|
1886
|
-
|
1887
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1888
|
-
as well.
|
1804
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1889
1805
|
"""
|
1890
1806
|
return pulumi.get(self, "token_bound_cidrs")
|
1891
1807
|
|
@@ -1893,10 +1809,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1893
1809
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1894
1810
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1895
1811
|
"""
|
1896
|
-
|
1897
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1898
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1899
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1812
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1900
1813
|
"""
|
1901
1814
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1902
1815
|
|
@@ -1904,8 +1817,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1904
1817
|
@pulumi.getter(name="tokenMaxTtl")
|
1905
1818
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1906
1819
|
"""
|
1907
|
-
The maximum lifetime
|
1908
|
-
Its current value will be referenced at renewal time.
|
1820
|
+
The maximum lifetime of the generated token
|
1909
1821
|
"""
|
1910
1822
|
return pulumi.get(self, "token_max_ttl")
|
1911
1823
|
|
@@ -1913,8 +1825,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1913
1825
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1914
1826
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1915
1827
|
"""
|
1916
|
-
If
|
1917
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1828
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1918
1829
|
"""
|
1919
1830
|
return pulumi.get(self, "token_no_default_policy")
|
1920
1831
|
|
@@ -1922,8 +1833,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1922
1833
|
@pulumi.getter(name="tokenNumUses")
|
1923
1834
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1924
1835
|
"""
|
1925
|
-
The
|
1926
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1836
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1927
1837
|
"""
|
1928
1838
|
return pulumi.get(self, "token_num_uses")
|
1929
1839
|
|
@@ -1931,10 +1841,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1931
1841
|
@pulumi.getter(name="tokenPeriod")
|
1932
1842
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1933
1843
|
"""
|
1934
|
-
|
1935
|
-
token generated using this role should never expire. The token should be renewed within the
|
1936
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1937
|
-
value of this field. Specified in seconds.
|
1844
|
+
Generated Token's Period
|
1938
1845
|
"""
|
1939
1846
|
return pulumi.get(self, "token_period")
|
1940
1847
|
|
@@ -1942,8 +1849,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1942
1849
|
@pulumi.getter(name="tokenPolicies")
|
1943
1850
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1944
1851
|
"""
|
1945
|
-
|
1946
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1852
|
+
Generated Token's Policies
|
1947
1853
|
"""
|
1948
1854
|
return pulumi.get(self, "token_policies")
|
1949
1855
|
|
@@ -1951,8 +1857,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1951
1857
|
@pulumi.getter(name="tokenTtl")
|
1952
1858
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1953
1859
|
"""
|
1954
|
-
The
|
1955
|
-
Its current value will be referenced at renewal time.
|
1860
|
+
The initial ttl of the token to generate in seconds
|
1956
1861
|
"""
|
1957
1862
|
return pulumi.get(self, "token_ttl")
|
1958
1863
|
|