pulumi-vault 6.2.0a1718953130__py3-none-any.whl → 6.3.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +26 -0
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/_utilities.py +40 -4
- pulumi_vault/auth_backend.py +47 -0
- pulumi_vault/aws/auth_backend_client.py +247 -7
- pulumi_vault/aws/secret_backend_role.py +169 -0
- pulumi_vault/azure/auth_backend_config.py +133 -0
- pulumi_vault/azure/backend.py +197 -0
- pulumi_vault/database/secrets_mount.py +282 -0
- pulumi_vault/gcp/auth_backend.py +244 -0
- pulumi_vault/gcp/secret_backend.py +271 -3
- pulumi_vault/generic/endpoint.py +6 -6
- pulumi_vault/identity/get_entity.py +2 -2
- pulumi_vault/jwt/auth_backend_role.py +28 -35
- pulumi_vault/kubernetes/secret_backend.py +282 -0
- pulumi_vault/ldap/secret_backend.py +282 -0
- pulumi_vault/mount.py +331 -0
- pulumi_vault/okta/auth_backend.py +441 -0
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/pkisecret/__init__.py +2 -0
- pulumi_vault/pkisecret/_inputs.py +40 -0
- pulumi_vault/pkisecret/backend_config_est.py +614 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +233 -0
- pulumi_vault/pkisecret/outputs.py +64 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +2 -2
- pulumi_vault/pkisecret/secret_backend_config_ca.py +2 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +2 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2 -2
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2 -2
- pulumi_vault/pkisecret/secret_backend_sign.py +2 -2
- pulumi_vault/plugin.py +590 -0
- pulumi_vault/plugin_pinned_version.py +293 -0
- pulumi_vault/provider.py +1 -3
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +47 -0
- pulumi_vault/quota_rate_limit.py +47 -0
- pulumi_vault/ssh/secret_backend_ca.py +94 -0
- {pulumi_vault-6.2.0a1718953130.dist-info → pulumi_vault-6.3.0.dist-info}/METADATA +1 -1
- {pulumi_vault-6.2.0a1718953130.dist-info → pulumi_vault-6.3.0.dist-info}/RECORD +41 -37
- {pulumi_vault-6.2.0a1718953130.dist-info → pulumi_vault-6.3.0.dist-info}/WHEEL +1 -1
- {pulumi_vault-6.2.0a1718953130.dist-info → pulumi_vault-6.3.0.dist-info}/top_level.txt +0 -0
@@ -26,6 +26,15 @@ class AuthBackendArgs:
|
|
26
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
27
27
|
path: Optional[pulumi.Input[str]] = None,
|
28
28
|
token: Optional[pulumi.Input[str]] = None,
|
29
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
+
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
31
|
+
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
32
|
+
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
33
|
+
token_num_uses: Optional[pulumi.Input[int]] = None,
|
34
|
+
token_period: Optional[pulumi.Input[int]] = None,
|
35
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
36
|
+
token_ttl: Optional[pulumi.Input[int]] = None,
|
37
|
+
token_type: Optional[pulumi.Input[str]] = None,
|
29
38
|
ttl: Optional[pulumi.Input[str]] = None,
|
30
39
|
users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
|
31
40
|
"""
|
@@ -47,6 +56,15 @@ class AuthBackendArgs:
|
|
47
56
|
:param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
48
57
|
:param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
|
49
58
|
If this is not supplied only locally configured groups will be enabled.
|
59
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
60
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
61
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
62
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
63
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
64
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
65
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
66
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
67
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
50
68
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
51
69
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
52
70
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
|
@@ -63,6 +81,9 @@ class AuthBackendArgs:
|
|
63
81
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
64
82
|
if groups is not None:
|
65
83
|
pulumi.set(__self__, "groups", groups)
|
84
|
+
if max_ttl is not None:
|
85
|
+
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
86
|
+
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
66
87
|
if max_ttl is not None:
|
67
88
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
68
89
|
if namespace is not None:
|
@@ -71,6 +92,27 @@ class AuthBackendArgs:
|
|
71
92
|
pulumi.set(__self__, "path", path)
|
72
93
|
if token is not None:
|
73
94
|
pulumi.set(__self__, "token", token)
|
95
|
+
if token_bound_cidrs is not None:
|
96
|
+
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
97
|
+
if token_explicit_max_ttl is not None:
|
98
|
+
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
99
|
+
if token_max_ttl is not None:
|
100
|
+
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
101
|
+
if token_no_default_policy is not None:
|
102
|
+
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
103
|
+
if token_num_uses is not None:
|
104
|
+
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
105
|
+
if token_period is not None:
|
106
|
+
pulumi.set(__self__, "token_period", token_period)
|
107
|
+
if token_policies is not None:
|
108
|
+
pulumi.set(__self__, "token_policies", token_policies)
|
109
|
+
if token_ttl is not None:
|
110
|
+
pulumi.set(__self__, "token_ttl", token_ttl)
|
111
|
+
if token_type is not None:
|
112
|
+
pulumi.set(__self__, "token_type", token_type)
|
113
|
+
if ttl is not None:
|
114
|
+
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
115
|
+
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
74
116
|
if ttl is not None:
|
75
117
|
pulumi.set(__self__, "ttl", ttl)
|
76
118
|
if users is not None:
|
@@ -152,6 +194,7 @@ class AuthBackendArgs:
|
|
152
194
|
|
153
195
|
@property
|
154
196
|
@pulumi.getter(name="maxTtl")
|
197
|
+
@_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
|
155
198
|
def max_ttl(self) -> Optional[pulumi.Input[str]]:
|
156
199
|
"""
|
157
200
|
Maximum duration after which authentication will be expired
|
@@ -203,8 +246,117 @@ class AuthBackendArgs:
|
|
203
246
|
def token(self, value: Optional[pulumi.Input[str]]):
|
204
247
|
pulumi.set(self, "token", value)
|
205
248
|
|
249
|
+
@property
|
250
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
251
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
252
|
+
"""
|
253
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
254
|
+
"""
|
255
|
+
return pulumi.get(self, "token_bound_cidrs")
|
256
|
+
|
257
|
+
@token_bound_cidrs.setter
|
258
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
259
|
+
pulumi.set(self, "token_bound_cidrs", value)
|
260
|
+
|
261
|
+
@property
|
262
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
263
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
264
|
+
"""
|
265
|
+
Generated Token's Explicit Maximum TTL in seconds
|
266
|
+
"""
|
267
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
268
|
+
|
269
|
+
@token_explicit_max_ttl.setter
|
270
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
271
|
+
pulumi.set(self, "token_explicit_max_ttl", value)
|
272
|
+
|
273
|
+
@property
|
274
|
+
@pulumi.getter(name="tokenMaxTtl")
|
275
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
276
|
+
"""
|
277
|
+
The maximum lifetime of the generated token
|
278
|
+
"""
|
279
|
+
return pulumi.get(self, "token_max_ttl")
|
280
|
+
|
281
|
+
@token_max_ttl.setter
|
282
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
283
|
+
pulumi.set(self, "token_max_ttl", value)
|
284
|
+
|
285
|
+
@property
|
286
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
287
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
288
|
+
"""
|
289
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
290
|
+
"""
|
291
|
+
return pulumi.get(self, "token_no_default_policy")
|
292
|
+
|
293
|
+
@token_no_default_policy.setter
|
294
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
|
295
|
+
pulumi.set(self, "token_no_default_policy", value)
|
296
|
+
|
297
|
+
@property
|
298
|
+
@pulumi.getter(name="tokenNumUses")
|
299
|
+
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
300
|
+
"""
|
301
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
302
|
+
"""
|
303
|
+
return pulumi.get(self, "token_num_uses")
|
304
|
+
|
305
|
+
@token_num_uses.setter
|
306
|
+
def token_num_uses(self, value: Optional[pulumi.Input[int]]):
|
307
|
+
pulumi.set(self, "token_num_uses", value)
|
308
|
+
|
309
|
+
@property
|
310
|
+
@pulumi.getter(name="tokenPeriod")
|
311
|
+
def token_period(self) -> Optional[pulumi.Input[int]]:
|
312
|
+
"""
|
313
|
+
Generated Token's Period
|
314
|
+
"""
|
315
|
+
return pulumi.get(self, "token_period")
|
316
|
+
|
317
|
+
@token_period.setter
|
318
|
+
def token_period(self, value: Optional[pulumi.Input[int]]):
|
319
|
+
pulumi.set(self, "token_period", value)
|
320
|
+
|
321
|
+
@property
|
322
|
+
@pulumi.getter(name="tokenPolicies")
|
323
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
324
|
+
"""
|
325
|
+
Generated Token's Policies
|
326
|
+
"""
|
327
|
+
return pulumi.get(self, "token_policies")
|
328
|
+
|
329
|
+
@token_policies.setter
|
330
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
331
|
+
pulumi.set(self, "token_policies", value)
|
332
|
+
|
333
|
+
@property
|
334
|
+
@pulumi.getter(name="tokenTtl")
|
335
|
+
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
336
|
+
"""
|
337
|
+
The initial ttl of the token to generate in seconds
|
338
|
+
"""
|
339
|
+
return pulumi.get(self, "token_ttl")
|
340
|
+
|
341
|
+
@token_ttl.setter
|
342
|
+
def token_ttl(self, value: Optional[pulumi.Input[int]]):
|
343
|
+
pulumi.set(self, "token_ttl", value)
|
344
|
+
|
345
|
+
@property
|
346
|
+
@pulumi.getter(name="tokenType")
|
347
|
+
def token_type(self) -> Optional[pulumi.Input[str]]:
|
348
|
+
"""
|
349
|
+
The type of token to generate, service or batch
|
350
|
+
"""
|
351
|
+
return pulumi.get(self, "token_type")
|
352
|
+
|
353
|
+
@token_type.setter
|
354
|
+
def token_type(self, value: Optional[pulumi.Input[str]]):
|
355
|
+
pulumi.set(self, "token_type", value)
|
356
|
+
|
206
357
|
@property
|
207
358
|
@pulumi.getter
|
359
|
+
@_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
|
208
360
|
def ttl(self) -> Optional[pulumi.Input[str]]:
|
209
361
|
"""
|
210
362
|
Duration after which authentication will be expired.
|
@@ -244,6 +396,15 @@ class _AuthBackendState:
|
|
244
396
|
organization: Optional[pulumi.Input[str]] = None,
|
245
397
|
path: Optional[pulumi.Input[str]] = None,
|
246
398
|
token: Optional[pulumi.Input[str]] = None,
|
399
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
400
|
+
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
401
|
+
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
402
|
+
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
403
|
+
token_num_uses: Optional[pulumi.Input[int]] = None,
|
404
|
+
token_period: Optional[pulumi.Input[int]] = None,
|
405
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
406
|
+
token_ttl: Optional[pulumi.Input[int]] = None,
|
407
|
+
token_type: Optional[pulumi.Input[str]] = None,
|
247
408
|
ttl: Optional[pulumi.Input[str]] = None,
|
248
409
|
users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
|
249
410
|
"""
|
@@ -266,6 +427,15 @@ class _AuthBackendState:
|
|
266
427
|
:param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
267
428
|
:param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
|
268
429
|
If this is not supplied only locally configured groups will be enabled.
|
430
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
431
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
432
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
433
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
434
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
435
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
436
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
437
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
438
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
269
439
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
270
440
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
271
441
|
:param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
|
@@ -283,6 +453,9 @@ class _AuthBackendState:
|
|
283
453
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
284
454
|
if groups is not None:
|
285
455
|
pulumi.set(__self__, "groups", groups)
|
456
|
+
if max_ttl is not None:
|
457
|
+
warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
|
458
|
+
pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
|
286
459
|
if max_ttl is not None:
|
287
460
|
pulumi.set(__self__, "max_ttl", max_ttl)
|
288
461
|
if namespace is not None:
|
@@ -293,6 +466,27 @@ class _AuthBackendState:
|
|
293
466
|
pulumi.set(__self__, "path", path)
|
294
467
|
if token is not None:
|
295
468
|
pulumi.set(__self__, "token", token)
|
469
|
+
if token_bound_cidrs is not None:
|
470
|
+
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
471
|
+
if token_explicit_max_ttl is not None:
|
472
|
+
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
473
|
+
if token_max_ttl is not None:
|
474
|
+
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
475
|
+
if token_no_default_policy is not None:
|
476
|
+
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
477
|
+
if token_num_uses is not None:
|
478
|
+
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
479
|
+
if token_period is not None:
|
480
|
+
pulumi.set(__self__, "token_period", token_period)
|
481
|
+
if token_policies is not None:
|
482
|
+
pulumi.set(__self__, "token_policies", token_policies)
|
483
|
+
if token_ttl is not None:
|
484
|
+
pulumi.set(__self__, "token_ttl", token_ttl)
|
485
|
+
if token_type is not None:
|
486
|
+
pulumi.set(__self__, "token_type", token_type)
|
487
|
+
if ttl is not None:
|
488
|
+
warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
|
489
|
+
pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
|
296
490
|
if ttl is not None:
|
297
491
|
pulumi.set(__self__, "ttl", ttl)
|
298
492
|
if users is not None:
|
@@ -374,6 +568,7 @@ class _AuthBackendState:
|
|
374
568
|
|
375
569
|
@property
|
376
570
|
@pulumi.getter(name="maxTtl")
|
571
|
+
@_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
|
377
572
|
def max_ttl(self) -> Optional[pulumi.Input[str]]:
|
378
573
|
"""
|
379
574
|
Maximum duration after which authentication will be expired
|
@@ -437,8 +632,117 @@ class _AuthBackendState:
|
|
437
632
|
def token(self, value: Optional[pulumi.Input[str]]):
|
438
633
|
pulumi.set(self, "token", value)
|
439
634
|
|
635
|
+
@property
|
636
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
637
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
638
|
+
"""
|
639
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
640
|
+
"""
|
641
|
+
return pulumi.get(self, "token_bound_cidrs")
|
642
|
+
|
643
|
+
@token_bound_cidrs.setter
|
644
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
645
|
+
pulumi.set(self, "token_bound_cidrs", value)
|
646
|
+
|
647
|
+
@property
|
648
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
649
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
650
|
+
"""
|
651
|
+
Generated Token's Explicit Maximum TTL in seconds
|
652
|
+
"""
|
653
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
654
|
+
|
655
|
+
@token_explicit_max_ttl.setter
|
656
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
657
|
+
pulumi.set(self, "token_explicit_max_ttl", value)
|
658
|
+
|
659
|
+
@property
|
660
|
+
@pulumi.getter(name="tokenMaxTtl")
|
661
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
662
|
+
"""
|
663
|
+
The maximum lifetime of the generated token
|
664
|
+
"""
|
665
|
+
return pulumi.get(self, "token_max_ttl")
|
666
|
+
|
667
|
+
@token_max_ttl.setter
|
668
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
669
|
+
pulumi.set(self, "token_max_ttl", value)
|
670
|
+
|
671
|
+
@property
|
672
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
673
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
674
|
+
"""
|
675
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
676
|
+
"""
|
677
|
+
return pulumi.get(self, "token_no_default_policy")
|
678
|
+
|
679
|
+
@token_no_default_policy.setter
|
680
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
|
681
|
+
pulumi.set(self, "token_no_default_policy", value)
|
682
|
+
|
683
|
+
@property
|
684
|
+
@pulumi.getter(name="tokenNumUses")
|
685
|
+
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
686
|
+
"""
|
687
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
688
|
+
"""
|
689
|
+
return pulumi.get(self, "token_num_uses")
|
690
|
+
|
691
|
+
@token_num_uses.setter
|
692
|
+
def token_num_uses(self, value: Optional[pulumi.Input[int]]):
|
693
|
+
pulumi.set(self, "token_num_uses", value)
|
694
|
+
|
695
|
+
@property
|
696
|
+
@pulumi.getter(name="tokenPeriod")
|
697
|
+
def token_period(self) -> Optional[pulumi.Input[int]]:
|
698
|
+
"""
|
699
|
+
Generated Token's Period
|
700
|
+
"""
|
701
|
+
return pulumi.get(self, "token_period")
|
702
|
+
|
703
|
+
@token_period.setter
|
704
|
+
def token_period(self, value: Optional[pulumi.Input[int]]):
|
705
|
+
pulumi.set(self, "token_period", value)
|
706
|
+
|
707
|
+
@property
|
708
|
+
@pulumi.getter(name="tokenPolicies")
|
709
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
710
|
+
"""
|
711
|
+
Generated Token's Policies
|
712
|
+
"""
|
713
|
+
return pulumi.get(self, "token_policies")
|
714
|
+
|
715
|
+
@token_policies.setter
|
716
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
717
|
+
pulumi.set(self, "token_policies", value)
|
718
|
+
|
719
|
+
@property
|
720
|
+
@pulumi.getter(name="tokenTtl")
|
721
|
+
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
722
|
+
"""
|
723
|
+
The initial ttl of the token to generate in seconds
|
724
|
+
"""
|
725
|
+
return pulumi.get(self, "token_ttl")
|
726
|
+
|
727
|
+
@token_ttl.setter
|
728
|
+
def token_ttl(self, value: Optional[pulumi.Input[int]]):
|
729
|
+
pulumi.set(self, "token_ttl", value)
|
730
|
+
|
731
|
+
@property
|
732
|
+
@pulumi.getter(name="tokenType")
|
733
|
+
def token_type(self) -> Optional[pulumi.Input[str]]:
|
734
|
+
"""
|
735
|
+
The type of token to generate, service or batch
|
736
|
+
"""
|
737
|
+
return pulumi.get(self, "token_type")
|
738
|
+
|
739
|
+
@token_type.setter
|
740
|
+
def token_type(self, value: Optional[pulumi.Input[str]]):
|
741
|
+
pulumi.set(self, "token_type", value)
|
742
|
+
|
440
743
|
@property
|
441
744
|
@pulumi.getter
|
745
|
+
@_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
|
442
746
|
def ttl(self) -> Optional[pulumi.Input[str]]:
|
443
747
|
"""
|
444
748
|
Duration after which authentication will be expired.
|
@@ -479,6 +783,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
479
783
|
organization: Optional[pulumi.Input[str]] = None,
|
480
784
|
path: Optional[pulumi.Input[str]] = None,
|
481
785
|
token: Optional[pulumi.Input[str]] = None,
|
786
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
787
|
+
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
788
|
+
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
789
|
+
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
790
|
+
token_num_uses: Optional[pulumi.Input[int]] = None,
|
791
|
+
token_period: Optional[pulumi.Input[int]] = None,
|
792
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
793
|
+
token_ttl: Optional[pulumi.Input[int]] = None,
|
794
|
+
token_type: Optional[pulumi.Input[str]] = None,
|
482
795
|
ttl: Optional[pulumi.Input[str]] = None,
|
483
796
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None,
|
484
797
|
__props__=None):
|
@@ -536,6 +849,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
536
849
|
:param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
537
850
|
:param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
|
538
851
|
If this is not supplied only locally configured groups will be enabled.
|
852
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
853
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
854
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
855
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
856
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
857
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
858
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
859
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
860
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
539
861
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
540
862
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
541
863
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]] users: Associate Okta users with groups or policies within Vault.
|
@@ -607,6 +929,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
607
929
|
organization: Optional[pulumi.Input[str]] = None,
|
608
930
|
path: Optional[pulumi.Input[str]] = None,
|
609
931
|
token: Optional[pulumi.Input[str]] = None,
|
932
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
933
|
+
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
934
|
+
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
935
|
+
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
936
|
+
token_num_uses: Optional[pulumi.Input[int]] = None,
|
937
|
+
token_period: Optional[pulumi.Input[int]] = None,
|
938
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
939
|
+
token_ttl: Optional[pulumi.Input[int]] = None,
|
940
|
+
token_type: Optional[pulumi.Input[str]] = None,
|
610
941
|
ttl: Optional[pulumi.Input[str]] = None,
|
611
942
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None,
|
612
943
|
__props__=None):
|
@@ -630,6 +961,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
630
961
|
__props__.__dict__["organization"] = organization
|
631
962
|
__props__.__dict__["path"] = path
|
632
963
|
__props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
|
964
|
+
__props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
|
965
|
+
__props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
|
966
|
+
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
967
|
+
__props__.__dict__["token_no_default_policy"] = token_no_default_policy
|
968
|
+
__props__.__dict__["token_num_uses"] = token_num_uses
|
969
|
+
__props__.__dict__["token_period"] = token_period
|
970
|
+
__props__.__dict__["token_policies"] = token_policies
|
971
|
+
__props__.__dict__["token_ttl"] = token_ttl
|
972
|
+
__props__.__dict__["token_type"] = token_type
|
633
973
|
__props__.__dict__["ttl"] = ttl
|
634
974
|
__props__.__dict__["users"] = users
|
635
975
|
__props__.__dict__["accessor"] = None
|
@@ -656,6 +996,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
656
996
|
organization: Optional[pulumi.Input[str]] = None,
|
657
997
|
path: Optional[pulumi.Input[str]] = None,
|
658
998
|
token: Optional[pulumi.Input[str]] = None,
|
999
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1000
|
+
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
1001
|
+
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
1002
|
+
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
1003
|
+
token_num_uses: Optional[pulumi.Input[int]] = None,
|
1004
|
+
token_period: Optional[pulumi.Input[int]] = None,
|
1005
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1006
|
+
token_ttl: Optional[pulumi.Input[int]] = None,
|
1007
|
+
token_type: Optional[pulumi.Input[str]] = None,
|
659
1008
|
ttl: Optional[pulumi.Input[str]] = None,
|
660
1009
|
users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None) -> 'AuthBackend':
|
661
1010
|
"""
|
@@ -683,6 +1032,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
683
1032
|
:param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
|
684
1033
|
:param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
|
685
1034
|
If this is not supplied only locally configured groups will be enabled.
|
1035
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1036
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1037
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1038
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1039
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1040
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1041
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1042
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1043
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
686
1044
|
:param pulumi.Input[str] ttl: Duration after which authentication will be expired.
|
687
1045
|
[See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
688
1046
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]] users: Associate Okta users with groups or policies within Vault.
|
@@ -703,6 +1061,15 @@ class AuthBackend(pulumi.CustomResource):
|
|
703
1061
|
__props__.__dict__["organization"] = organization
|
704
1062
|
__props__.__dict__["path"] = path
|
705
1063
|
__props__.__dict__["token"] = token
|
1064
|
+
__props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
|
1065
|
+
__props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
|
1066
|
+
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
1067
|
+
__props__.__dict__["token_no_default_policy"] = token_no_default_policy
|
1068
|
+
__props__.__dict__["token_num_uses"] = token_num_uses
|
1069
|
+
__props__.__dict__["token_period"] = token_period
|
1070
|
+
__props__.__dict__["token_policies"] = token_policies
|
1071
|
+
__props__.__dict__["token_ttl"] = token_ttl
|
1072
|
+
__props__.__dict__["token_type"] = token_type
|
706
1073
|
__props__.__dict__["ttl"] = ttl
|
707
1074
|
__props__.__dict__["users"] = users
|
708
1075
|
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
@@ -759,6 +1126,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
759
1126
|
|
760
1127
|
@property
|
761
1128
|
@pulumi.getter(name="maxTtl")
|
1129
|
+
@_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
|
762
1130
|
def max_ttl(self) -> pulumi.Output[Optional[str]]:
|
763
1131
|
"""
|
764
1132
|
Maximum duration after which authentication will be expired
|
@@ -802,8 +1170,81 @@ class AuthBackend(pulumi.CustomResource):
|
|
802
1170
|
"""
|
803
1171
|
return pulumi.get(self, "token")
|
804
1172
|
|
1173
|
+
@property
|
1174
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
1175
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1176
|
+
"""
|
1177
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1178
|
+
"""
|
1179
|
+
return pulumi.get(self, "token_bound_cidrs")
|
1180
|
+
|
1181
|
+
@property
|
1182
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1183
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1184
|
+
"""
|
1185
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1186
|
+
"""
|
1187
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
1188
|
+
|
1189
|
+
@property
|
1190
|
+
@pulumi.getter(name="tokenMaxTtl")
|
1191
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1192
|
+
"""
|
1193
|
+
The maximum lifetime of the generated token
|
1194
|
+
"""
|
1195
|
+
return pulumi.get(self, "token_max_ttl")
|
1196
|
+
|
1197
|
+
@property
|
1198
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1199
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1200
|
+
"""
|
1201
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1202
|
+
"""
|
1203
|
+
return pulumi.get(self, "token_no_default_policy")
|
1204
|
+
|
1205
|
+
@property
|
1206
|
+
@pulumi.getter(name="tokenNumUses")
|
1207
|
+
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1208
|
+
"""
|
1209
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1210
|
+
"""
|
1211
|
+
return pulumi.get(self, "token_num_uses")
|
1212
|
+
|
1213
|
+
@property
|
1214
|
+
@pulumi.getter(name="tokenPeriod")
|
1215
|
+
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1216
|
+
"""
|
1217
|
+
Generated Token's Period
|
1218
|
+
"""
|
1219
|
+
return pulumi.get(self, "token_period")
|
1220
|
+
|
1221
|
+
@property
|
1222
|
+
@pulumi.getter(name="tokenPolicies")
|
1223
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1224
|
+
"""
|
1225
|
+
Generated Token's Policies
|
1226
|
+
"""
|
1227
|
+
return pulumi.get(self, "token_policies")
|
1228
|
+
|
1229
|
+
@property
|
1230
|
+
@pulumi.getter(name="tokenTtl")
|
1231
|
+
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1232
|
+
"""
|
1233
|
+
The initial ttl of the token to generate in seconds
|
1234
|
+
"""
|
1235
|
+
return pulumi.get(self, "token_ttl")
|
1236
|
+
|
1237
|
+
@property
|
1238
|
+
@pulumi.getter(name="tokenType")
|
1239
|
+
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1240
|
+
"""
|
1241
|
+
The type of token to generate, service or batch
|
1242
|
+
"""
|
1243
|
+
return pulumi.get(self, "token_type")
|
1244
|
+
|
805
1245
|
@property
|
806
1246
|
@pulumi.getter
|
1247
|
+
@_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
|
807
1248
|
def ttl(self) -> pulumi.Output[Optional[str]]:
|
808
1249
|
"""
|
809
1250
|
Duration after which authentication will be expired.
|
pulumi_vault/outputs.py
CHANGED
@@ -277,17 +277,27 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
277
277
|
def __init__(__self__, *,
|
278
278
|
key: str,
|
279
279
|
values: Sequence[str]):
|
280
|
+
"""
|
281
|
+
:param str key: name of permitted or denied parameter.
|
282
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
283
|
+
"""
|
280
284
|
pulumi.set(__self__, "key", key)
|
281
285
|
pulumi.set(__self__, "values", values)
|
282
286
|
|
283
287
|
@property
|
284
288
|
@pulumi.getter
|
285
289
|
def key(self) -> str:
|
290
|
+
"""
|
291
|
+
name of permitted or denied parameter.
|
292
|
+
"""
|
286
293
|
return pulumi.get(self, "key")
|
287
294
|
|
288
295
|
@property
|
289
296
|
@pulumi.getter
|
290
297
|
def values(self) -> Sequence[str]:
|
298
|
+
"""
|
299
|
+
list of values what are permitted or denied by policy rule.
|
300
|
+
"""
|
291
301
|
return pulumi.get(self, "values")
|
292
302
|
|
293
303
|
|
@@ -296,17 +306,27 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
296
306
|
def __init__(__self__, *,
|
297
307
|
key: str,
|
298
308
|
values: Sequence[str]):
|
309
|
+
"""
|
310
|
+
:param str key: name of permitted or denied parameter.
|
311
|
+
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
312
|
+
"""
|
299
313
|
pulumi.set(__self__, "key", key)
|
300
314
|
pulumi.set(__self__, "values", values)
|
301
315
|
|
302
316
|
@property
|
303
317
|
@pulumi.getter
|
304
318
|
def key(self) -> str:
|
319
|
+
"""
|
320
|
+
name of permitted or denied parameter.
|
321
|
+
"""
|
305
322
|
return pulumi.get(self, "key")
|
306
323
|
|
307
324
|
@property
|
308
325
|
@pulumi.getter
|
309
326
|
def values(self) -> Sequence[str]:
|
327
|
+
"""
|
328
|
+
list of values what are permitted or denied by policy rule.
|
329
|
+
"""
|
310
330
|
return pulumi.get(self, "values")
|
311
331
|
|
312
332
|
|
@@ -6,6 +6,8 @@ from .. import _utilities
|
|
6
6
|
import typing
|
7
7
|
# Export this package's modules as members:
|
8
8
|
from .backend_config_cluster import *
|
9
|
+
from .backend_config_est import *
|
10
|
+
from .get_backend_config_est import *
|
9
11
|
from .get_backend_issuer import *
|
10
12
|
from .get_backend_issuers import *
|
11
13
|
from .get_backend_key import *
|