pulumi-vault 6.6.0a1741415971__py3-none-any.whl → 6.7.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +9 -0
- pulumi_vault/_inputs.py +583 -562
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +425 -200
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +523 -306
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +288 -70
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +383 -130
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +432 -186
- pulumi_vault/azure/backend_role.py +188 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +3857 -2200
- pulumi_vault/database/outputs.py +2483 -1330
- pulumi_vault/database/secret_backend_connection.py +333 -112
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +283 -140
- pulumi_vault/database/secrets_mount.py +275 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +426 -205
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +420 -179
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +68 -18
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +754 -533
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +720 -499
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +73 -60
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +31 -36
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +174 -126
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1377 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +152 -104
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +278 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +35 -17
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +139 -25
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -31
- pulumi_vault/pkisecret/secret_backend_cert.py +439 -297
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +237 -182
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +520 -378
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +441 -175
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +894 -644
- pulumi_vault/pkisecret/secret_backend_root_cert.py +851 -427
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +936 -357
- pulumi_vault/pkisecret/secret_backend_sign.py +347 -252
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +2 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +295 -0
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +96 -95
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +3 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +325 -0
- pulumi_vault/transit/get_verify.py +355 -0
- pulumi_vault/transit/secret_backend_key.py +394 -231
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.7.0.dist-info/RECORD +265 -0
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
- pulumi_vault-6.6.0a1741415971.dist-info/RECORD +0 -260
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,49 +20,49 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendRoleArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
role_name: pulumi.Input[str],
|
23
|
-
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
24
|
-
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
|
-
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
26
|
-
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
27
|
-
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
28
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
29
|
-
orphan: Optional[pulumi.Input[bool]] = None,
|
30
|
-
path_suffix: Optional[pulumi.Input[str]] = None,
|
31
|
-
renewable: Optional[pulumi.Input[bool]] = None,
|
32
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
33
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
34
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
35
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
36
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
37
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
38
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
39
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
40
|
-
token_type: Optional[pulumi.Input[str]] = None):
|
23
|
+
role_name: pulumi.Input[builtins.str],
|
24
|
+
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
25
|
+
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
26
|
+
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
27
|
+
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
28
|
+
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
29
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
orphan: Optional[pulumi.Input[builtins.bool]] = None,
|
31
|
+
path_suffix: Optional[pulumi.Input[builtins.str]] = None,
|
32
|
+
renewable: Optional[pulumi.Input[builtins.bool]] = None,
|
33
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
34
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
35
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
36
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
37
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
38
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
39
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
40
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
41
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None):
|
41
42
|
"""
|
42
43
|
The set of arguments for constructing a AuthBackendRole resource.
|
43
|
-
:param pulumi.Input[str] role_name: The name of the role.
|
44
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_entity_aliases: List of allowed entity aliases.
|
45
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies: List of allowed policies for given role.
|
46
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
|
47
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies: List of disallowed policies for given role.
|
48
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
49
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
44
|
+
:param pulumi.Input[builtins.str] role_name: The name of the role.
|
45
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
|
46
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies: List of allowed policies for given role.
|
47
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
|
48
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies: List of disallowed policies for given role.
|
49
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
50
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
50
51
|
The value should not contain leading or trailing forward slashes.
|
51
52
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
52
53
|
*Available only for Vault Enterprise*.
|
53
|
-
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
54
|
-
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
55
|
-
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
56
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
57
|
-
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
58
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
59
|
-
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
60
|
-
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
61
|
-
:param pulumi.Input[int] token_period: Generated Token's Period
|
62
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
63
|
-
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
64
|
-
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
54
|
+
:param pulumi.Input[builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
55
|
+
:param pulumi.Input[builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
56
|
+
:param pulumi.Input[builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
57
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
58
|
+
:param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
59
|
+
:param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
60
|
+
:param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
61
|
+
:param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
62
|
+
:param pulumi.Input[builtins.int] token_period: Generated Token's Period
|
63
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
|
64
|
+
:param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
65
|
+
:param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
|
65
66
|
"""
|
66
67
|
pulumi.set(__self__, "role_name", role_name)
|
67
68
|
if allowed_entity_aliases is not None:
|
@@ -103,79 +104,79 @@ class AuthBackendRoleArgs:
|
|
103
104
|
|
104
105
|
@property
|
105
106
|
@pulumi.getter(name="roleName")
|
106
|
-
def role_name(self) -> pulumi.Input[str]:
|
107
|
+
def role_name(self) -> pulumi.Input[builtins.str]:
|
107
108
|
"""
|
108
109
|
The name of the role.
|
109
110
|
"""
|
110
111
|
return pulumi.get(self, "role_name")
|
111
112
|
|
112
113
|
@role_name.setter
|
113
|
-
def role_name(self, value: pulumi.Input[str]):
|
114
|
+
def role_name(self, value: pulumi.Input[builtins.str]):
|
114
115
|
pulumi.set(self, "role_name", value)
|
115
116
|
|
116
117
|
@property
|
117
118
|
@pulumi.getter(name="allowedEntityAliases")
|
118
|
-
def allowed_entity_aliases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
119
|
+
def allowed_entity_aliases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
119
120
|
"""
|
120
121
|
List of allowed entity aliases.
|
121
122
|
"""
|
122
123
|
return pulumi.get(self, "allowed_entity_aliases")
|
123
124
|
|
124
125
|
@allowed_entity_aliases.setter
|
125
|
-
def allowed_entity_aliases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
126
|
+
def allowed_entity_aliases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
126
127
|
pulumi.set(self, "allowed_entity_aliases", value)
|
127
128
|
|
128
129
|
@property
|
129
130
|
@pulumi.getter(name="allowedPolicies")
|
130
|
-
def allowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
131
|
+
def allowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
131
132
|
"""
|
132
133
|
List of allowed policies for given role.
|
133
134
|
"""
|
134
135
|
return pulumi.get(self, "allowed_policies")
|
135
136
|
|
136
137
|
@allowed_policies.setter
|
137
|
-
def allowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
138
|
+
def allowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
138
139
|
pulumi.set(self, "allowed_policies", value)
|
139
140
|
|
140
141
|
@property
|
141
142
|
@pulumi.getter(name="allowedPoliciesGlobs")
|
142
|
-
def allowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
143
|
+
def allowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
143
144
|
"""
|
144
145
|
Set of allowed policies with glob match for given role.
|
145
146
|
"""
|
146
147
|
return pulumi.get(self, "allowed_policies_globs")
|
147
148
|
|
148
149
|
@allowed_policies_globs.setter
|
149
|
-
def allowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
150
|
+
def allowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
150
151
|
pulumi.set(self, "allowed_policies_globs", value)
|
151
152
|
|
152
153
|
@property
|
153
154
|
@pulumi.getter(name="disallowedPolicies")
|
154
|
-
def disallowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
155
|
+
def disallowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
155
156
|
"""
|
156
157
|
List of disallowed policies for given role.
|
157
158
|
"""
|
158
159
|
return pulumi.get(self, "disallowed_policies")
|
159
160
|
|
160
161
|
@disallowed_policies.setter
|
161
|
-
def disallowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
162
|
+
def disallowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
162
163
|
pulumi.set(self, "disallowed_policies", value)
|
163
164
|
|
164
165
|
@property
|
165
166
|
@pulumi.getter(name="disallowedPoliciesGlobs")
|
166
|
-
def disallowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
167
|
+
def disallowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
167
168
|
"""
|
168
169
|
Set of disallowed policies with glob match for given role.
|
169
170
|
"""
|
170
171
|
return pulumi.get(self, "disallowed_policies_globs")
|
171
172
|
|
172
173
|
@disallowed_policies_globs.setter
|
173
|
-
def disallowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
174
|
+
def disallowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
174
175
|
pulumi.set(self, "disallowed_policies_globs", value)
|
175
176
|
|
176
177
|
@property
|
177
178
|
@pulumi.getter
|
178
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
179
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
179
180
|
"""
|
180
181
|
The namespace to provision the resource in.
|
181
182
|
The value should not contain leading or trailing forward slashes.
|
@@ -185,200 +186,200 @@ class AuthBackendRoleArgs:
|
|
185
186
|
return pulumi.get(self, "namespace")
|
186
187
|
|
187
188
|
@namespace.setter
|
188
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
189
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
189
190
|
pulumi.set(self, "namespace", value)
|
190
191
|
|
191
192
|
@property
|
192
193
|
@pulumi.getter
|
193
|
-
def orphan(self) -> Optional[pulumi.Input[bool]]:
|
194
|
+
def orphan(self) -> Optional[pulumi.Input[builtins.bool]]:
|
194
195
|
"""
|
195
196
|
If true, tokens created against this policy will be orphan tokens.
|
196
197
|
"""
|
197
198
|
return pulumi.get(self, "orphan")
|
198
199
|
|
199
200
|
@orphan.setter
|
200
|
-
def orphan(self, value: Optional[pulumi.Input[bool]]):
|
201
|
+
def orphan(self, value: Optional[pulumi.Input[builtins.bool]]):
|
201
202
|
pulumi.set(self, "orphan", value)
|
202
203
|
|
203
204
|
@property
|
204
205
|
@pulumi.getter(name="pathSuffix")
|
205
|
-
def path_suffix(self) -> Optional[pulumi.Input[str]]:
|
206
|
+
def path_suffix(self) -> Optional[pulumi.Input[builtins.str]]:
|
206
207
|
"""
|
207
208
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
208
209
|
"""
|
209
210
|
return pulumi.get(self, "path_suffix")
|
210
211
|
|
211
212
|
@path_suffix.setter
|
212
|
-
def path_suffix(self, value: Optional[pulumi.Input[str]]):
|
213
|
+
def path_suffix(self, value: Optional[pulumi.Input[builtins.str]]):
|
213
214
|
pulumi.set(self, "path_suffix", value)
|
214
215
|
|
215
216
|
@property
|
216
217
|
@pulumi.getter
|
217
|
-
def renewable(self) -> Optional[pulumi.Input[bool]]:
|
218
|
+
def renewable(self) -> Optional[pulumi.Input[builtins.bool]]:
|
218
219
|
"""
|
219
220
|
Whether to disable the ability of the token to be renewed past its initial TTL.
|
220
221
|
"""
|
221
222
|
return pulumi.get(self, "renewable")
|
222
223
|
|
223
224
|
@renewable.setter
|
224
|
-
def renewable(self, value: Optional[pulumi.Input[bool]]):
|
225
|
+
def renewable(self, value: Optional[pulumi.Input[builtins.bool]]):
|
225
226
|
pulumi.set(self, "renewable", value)
|
226
227
|
|
227
228
|
@property
|
228
229
|
@pulumi.getter(name="tokenBoundCidrs")
|
229
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
230
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
230
231
|
"""
|
231
232
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
232
233
|
"""
|
233
234
|
return pulumi.get(self, "token_bound_cidrs")
|
234
235
|
|
235
236
|
@token_bound_cidrs.setter
|
236
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
237
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
237
238
|
pulumi.set(self, "token_bound_cidrs", value)
|
238
239
|
|
239
240
|
@property
|
240
241
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
241
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
242
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
242
243
|
"""
|
243
244
|
Generated Token's Explicit Maximum TTL in seconds
|
244
245
|
"""
|
245
246
|
return pulumi.get(self, "token_explicit_max_ttl")
|
246
247
|
|
247
248
|
@token_explicit_max_ttl.setter
|
248
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
249
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
249
250
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
250
251
|
|
251
252
|
@property
|
252
253
|
@pulumi.getter(name="tokenMaxTtl")
|
253
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
254
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
254
255
|
"""
|
255
256
|
The maximum lifetime of the generated token
|
256
257
|
"""
|
257
258
|
return pulumi.get(self, "token_max_ttl")
|
258
259
|
|
259
260
|
@token_max_ttl.setter
|
260
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
261
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
261
262
|
pulumi.set(self, "token_max_ttl", value)
|
262
263
|
|
263
264
|
@property
|
264
265
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
265
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
266
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
|
266
267
|
"""
|
267
268
|
If true, the 'default' policy will not automatically be added to generated tokens
|
268
269
|
"""
|
269
270
|
return pulumi.get(self, "token_no_default_policy")
|
270
271
|
|
271
272
|
@token_no_default_policy.setter
|
272
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
|
273
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
|
273
274
|
pulumi.set(self, "token_no_default_policy", value)
|
274
275
|
|
275
276
|
@property
|
276
277
|
@pulumi.getter(name="tokenNumUses")
|
277
|
-
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
278
|
+
def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
|
278
279
|
"""
|
279
280
|
The maximum number of times a token may be used, a value of zero means unlimited
|
280
281
|
"""
|
281
282
|
return pulumi.get(self, "token_num_uses")
|
282
283
|
|
283
284
|
@token_num_uses.setter
|
284
|
-
def token_num_uses(self, value: Optional[pulumi.Input[int]]):
|
285
|
+
def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
|
285
286
|
pulumi.set(self, "token_num_uses", value)
|
286
287
|
|
287
288
|
@property
|
288
289
|
@pulumi.getter(name="tokenPeriod")
|
289
|
-
def token_period(self) -> Optional[pulumi.Input[int]]:
|
290
|
+
def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
290
291
|
"""
|
291
292
|
Generated Token's Period
|
292
293
|
"""
|
293
294
|
return pulumi.get(self, "token_period")
|
294
295
|
|
295
296
|
@token_period.setter
|
296
|
-
def token_period(self, value: Optional[pulumi.Input[int]]):
|
297
|
+
def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
297
298
|
pulumi.set(self, "token_period", value)
|
298
299
|
|
299
300
|
@property
|
300
301
|
@pulumi.getter(name="tokenPolicies")
|
301
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
302
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
302
303
|
"""
|
303
304
|
Generated Token's Policies
|
304
305
|
"""
|
305
306
|
return pulumi.get(self, "token_policies")
|
306
307
|
|
307
308
|
@token_policies.setter
|
308
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
309
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
309
310
|
pulumi.set(self, "token_policies", value)
|
310
311
|
|
311
312
|
@property
|
312
313
|
@pulumi.getter(name="tokenTtl")
|
313
|
-
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
314
|
+
def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
314
315
|
"""
|
315
316
|
The initial ttl of the token to generate in seconds
|
316
317
|
"""
|
317
318
|
return pulumi.get(self, "token_ttl")
|
318
319
|
|
319
320
|
@token_ttl.setter
|
320
|
-
def token_ttl(self, value: Optional[pulumi.Input[int]]):
|
321
|
+
def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
321
322
|
pulumi.set(self, "token_ttl", value)
|
322
323
|
|
323
324
|
@property
|
324
325
|
@pulumi.getter(name="tokenType")
|
325
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
326
|
+
def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
326
327
|
"""
|
327
328
|
The type of token to generate, service or batch
|
328
329
|
"""
|
329
330
|
return pulumi.get(self, "token_type")
|
330
331
|
|
331
332
|
@token_type.setter
|
332
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
333
|
+
def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
333
334
|
pulumi.set(self, "token_type", value)
|
334
335
|
|
335
336
|
|
336
337
|
@pulumi.input_type
|
337
338
|
class _AuthBackendRoleState:
|
338
339
|
def __init__(__self__, *,
|
339
|
-
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
340
|
-
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
341
|
-
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
342
|
-
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
343
|
-
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
344
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
345
|
-
orphan: Optional[pulumi.Input[bool]] = None,
|
346
|
-
path_suffix: Optional[pulumi.Input[str]] = None,
|
347
|
-
renewable: Optional[pulumi.Input[bool]] = None,
|
348
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
349
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
350
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
351
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
352
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
353
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
354
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
355
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
356
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
357
|
-
token_type: Optional[pulumi.Input[str]] = None):
|
340
|
+
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
341
|
+
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
342
|
+
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
343
|
+
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
344
|
+
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
345
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
346
|
+
orphan: Optional[pulumi.Input[builtins.bool]] = None,
|
347
|
+
path_suffix: Optional[pulumi.Input[builtins.str]] = None,
|
348
|
+
renewable: Optional[pulumi.Input[builtins.bool]] = None,
|
349
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
350
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
351
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
352
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
353
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
354
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
355
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
356
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
357
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
358
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None):
|
358
359
|
"""
|
359
360
|
Input properties used for looking up and filtering AuthBackendRole resources.
|
360
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_entity_aliases: List of allowed entity aliases.
|
361
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies: List of allowed policies for given role.
|
362
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
|
363
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies: List of disallowed policies for given role.
|
364
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
365
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
361
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
|
362
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies: List of allowed policies for given role.
|
363
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
|
364
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies: List of disallowed policies for given role.
|
365
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
366
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
366
367
|
The value should not contain leading or trailing forward slashes.
|
367
368
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
368
369
|
*Available only for Vault Enterprise*.
|
369
|
-
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
370
|
-
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
371
|
-
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
372
|
-
:param pulumi.Input[str] role_name: The name of the role.
|
373
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
374
|
-
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
375
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
376
|
-
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
377
|
-
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
378
|
-
:param pulumi.Input[int] token_period: Generated Token's Period
|
379
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
380
|
-
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
381
|
-
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
370
|
+
:param pulumi.Input[builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
371
|
+
:param pulumi.Input[builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
372
|
+
:param pulumi.Input[builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
373
|
+
:param pulumi.Input[builtins.str] role_name: The name of the role.
|
374
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
375
|
+
:param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
376
|
+
:param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
377
|
+
:param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
378
|
+
:param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
379
|
+
:param pulumi.Input[builtins.int] token_period: Generated Token's Period
|
380
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
|
381
|
+
:param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
382
|
+
:param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
|
382
383
|
"""
|
383
384
|
if allowed_entity_aliases is not None:
|
384
385
|
pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
|
@@ -421,67 +422,67 @@ class _AuthBackendRoleState:
|
|
421
422
|
|
422
423
|
@property
|
423
424
|
@pulumi.getter(name="allowedEntityAliases")
|
424
|
-
def allowed_entity_aliases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
425
|
+
def allowed_entity_aliases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
425
426
|
"""
|
426
427
|
List of allowed entity aliases.
|
427
428
|
"""
|
428
429
|
return pulumi.get(self, "allowed_entity_aliases")
|
429
430
|
|
430
431
|
@allowed_entity_aliases.setter
|
431
|
-
def allowed_entity_aliases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
432
|
+
def allowed_entity_aliases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
432
433
|
pulumi.set(self, "allowed_entity_aliases", value)
|
433
434
|
|
434
435
|
@property
|
435
436
|
@pulumi.getter(name="allowedPolicies")
|
436
|
-
def allowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
437
|
+
def allowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
437
438
|
"""
|
438
439
|
List of allowed policies for given role.
|
439
440
|
"""
|
440
441
|
return pulumi.get(self, "allowed_policies")
|
441
442
|
|
442
443
|
@allowed_policies.setter
|
443
|
-
def allowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
444
|
+
def allowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
444
445
|
pulumi.set(self, "allowed_policies", value)
|
445
446
|
|
446
447
|
@property
|
447
448
|
@pulumi.getter(name="allowedPoliciesGlobs")
|
448
|
-
def allowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
449
|
+
def allowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
449
450
|
"""
|
450
451
|
Set of allowed policies with glob match for given role.
|
451
452
|
"""
|
452
453
|
return pulumi.get(self, "allowed_policies_globs")
|
453
454
|
|
454
455
|
@allowed_policies_globs.setter
|
455
|
-
def allowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
456
|
+
def allowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
456
457
|
pulumi.set(self, "allowed_policies_globs", value)
|
457
458
|
|
458
459
|
@property
|
459
460
|
@pulumi.getter(name="disallowedPolicies")
|
460
|
-
def disallowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
461
|
+
def disallowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
461
462
|
"""
|
462
463
|
List of disallowed policies for given role.
|
463
464
|
"""
|
464
465
|
return pulumi.get(self, "disallowed_policies")
|
465
466
|
|
466
467
|
@disallowed_policies.setter
|
467
|
-
def disallowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
468
|
+
def disallowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
468
469
|
pulumi.set(self, "disallowed_policies", value)
|
469
470
|
|
470
471
|
@property
|
471
472
|
@pulumi.getter(name="disallowedPoliciesGlobs")
|
472
|
-
def disallowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
473
|
+
def disallowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
473
474
|
"""
|
474
475
|
Set of disallowed policies with glob match for given role.
|
475
476
|
"""
|
476
477
|
return pulumi.get(self, "disallowed_policies_globs")
|
477
478
|
|
478
479
|
@disallowed_policies_globs.setter
|
479
|
-
def disallowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
480
|
+
def disallowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
480
481
|
pulumi.set(self, "disallowed_policies_globs", value)
|
481
482
|
|
482
483
|
@property
|
483
484
|
@pulumi.getter
|
484
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
485
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
485
486
|
"""
|
486
487
|
The namespace to provision the resource in.
|
487
488
|
The value should not contain leading or trailing forward slashes.
|
@@ -491,163 +492,163 @@ class _AuthBackendRoleState:
|
|
491
492
|
return pulumi.get(self, "namespace")
|
492
493
|
|
493
494
|
@namespace.setter
|
494
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
495
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
495
496
|
pulumi.set(self, "namespace", value)
|
496
497
|
|
497
498
|
@property
|
498
499
|
@pulumi.getter
|
499
|
-
def orphan(self) -> Optional[pulumi.Input[bool]]:
|
500
|
+
def orphan(self) -> Optional[pulumi.Input[builtins.bool]]:
|
500
501
|
"""
|
501
502
|
If true, tokens created against this policy will be orphan tokens.
|
502
503
|
"""
|
503
504
|
return pulumi.get(self, "orphan")
|
504
505
|
|
505
506
|
@orphan.setter
|
506
|
-
def orphan(self, value: Optional[pulumi.Input[bool]]):
|
507
|
+
def orphan(self, value: Optional[pulumi.Input[builtins.bool]]):
|
507
508
|
pulumi.set(self, "orphan", value)
|
508
509
|
|
509
510
|
@property
|
510
511
|
@pulumi.getter(name="pathSuffix")
|
511
|
-
def path_suffix(self) -> Optional[pulumi.Input[str]]:
|
512
|
+
def path_suffix(self) -> Optional[pulumi.Input[builtins.str]]:
|
512
513
|
"""
|
513
514
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
514
515
|
"""
|
515
516
|
return pulumi.get(self, "path_suffix")
|
516
517
|
|
517
518
|
@path_suffix.setter
|
518
|
-
def path_suffix(self, value: Optional[pulumi.Input[str]]):
|
519
|
+
def path_suffix(self, value: Optional[pulumi.Input[builtins.str]]):
|
519
520
|
pulumi.set(self, "path_suffix", value)
|
520
521
|
|
521
522
|
@property
|
522
523
|
@pulumi.getter
|
523
|
-
def renewable(self) -> Optional[pulumi.Input[bool]]:
|
524
|
+
def renewable(self) -> Optional[pulumi.Input[builtins.bool]]:
|
524
525
|
"""
|
525
526
|
Whether to disable the ability of the token to be renewed past its initial TTL.
|
526
527
|
"""
|
527
528
|
return pulumi.get(self, "renewable")
|
528
529
|
|
529
530
|
@renewable.setter
|
530
|
-
def renewable(self, value: Optional[pulumi.Input[bool]]):
|
531
|
+
def renewable(self, value: Optional[pulumi.Input[builtins.bool]]):
|
531
532
|
pulumi.set(self, "renewable", value)
|
532
533
|
|
533
534
|
@property
|
534
535
|
@pulumi.getter(name="roleName")
|
535
|
-
def role_name(self) -> Optional[pulumi.Input[str]]:
|
536
|
+
def role_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
536
537
|
"""
|
537
538
|
The name of the role.
|
538
539
|
"""
|
539
540
|
return pulumi.get(self, "role_name")
|
540
541
|
|
541
542
|
@role_name.setter
|
542
|
-
def role_name(self, value: Optional[pulumi.Input[str]]):
|
543
|
+
def role_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
543
544
|
pulumi.set(self, "role_name", value)
|
544
545
|
|
545
546
|
@property
|
546
547
|
@pulumi.getter(name="tokenBoundCidrs")
|
547
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
548
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
548
549
|
"""
|
549
550
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
550
551
|
"""
|
551
552
|
return pulumi.get(self, "token_bound_cidrs")
|
552
553
|
|
553
554
|
@token_bound_cidrs.setter
|
554
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
555
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
555
556
|
pulumi.set(self, "token_bound_cidrs", value)
|
556
557
|
|
557
558
|
@property
|
558
559
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
559
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
560
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
560
561
|
"""
|
561
562
|
Generated Token's Explicit Maximum TTL in seconds
|
562
563
|
"""
|
563
564
|
return pulumi.get(self, "token_explicit_max_ttl")
|
564
565
|
|
565
566
|
@token_explicit_max_ttl.setter
|
566
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
567
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
567
568
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
568
569
|
|
569
570
|
@property
|
570
571
|
@pulumi.getter(name="tokenMaxTtl")
|
571
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
572
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
572
573
|
"""
|
573
574
|
The maximum lifetime of the generated token
|
574
575
|
"""
|
575
576
|
return pulumi.get(self, "token_max_ttl")
|
576
577
|
|
577
578
|
@token_max_ttl.setter
|
578
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
579
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
579
580
|
pulumi.set(self, "token_max_ttl", value)
|
580
581
|
|
581
582
|
@property
|
582
583
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
583
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
584
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
|
584
585
|
"""
|
585
586
|
If true, the 'default' policy will not automatically be added to generated tokens
|
586
587
|
"""
|
587
588
|
return pulumi.get(self, "token_no_default_policy")
|
588
589
|
|
589
590
|
@token_no_default_policy.setter
|
590
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
|
591
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
|
591
592
|
pulumi.set(self, "token_no_default_policy", value)
|
592
593
|
|
593
594
|
@property
|
594
595
|
@pulumi.getter(name="tokenNumUses")
|
595
|
-
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
596
|
+
def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
|
596
597
|
"""
|
597
598
|
The maximum number of times a token may be used, a value of zero means unlimited
|
598
599
|
"""
|
599
600
|
return pulumi.get(self, "token_num_uses")
|
600
601
|
|
601
602
|
@token_num_uses.setter
|
602
|
-
def token_num_uses(self, value: Optional[pulumi.Input[int]]):
|
603
|
+
def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
|
603
604
|
pulumi.set(self, "token_num_uses", value)
|
604
605
|
|
605
606
|
@property
|
606
607
|
@pulumi.getter(name="tokenPeriod")
|
607
|
-
def token_period(self) -> Optional[pulumi.Input[int]]:
|
608
|
+
def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
608
609
|
"""
|
609
610
|
Generated Token's Period
|
610
611
|
"""
|
611
612
|
return pulumi.get(self, "token_period")
|
612
613
|
|
613
614
|
@token_period.setter
|
614
|
-
def token_period(self, value: Optional[pulumi.Input[int]]):
|
615
|
+
def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
615
616
|
pulumi.set(self, "token_period", value)
|
616
617
|
|
617
618
|
@property
|
618
619
|
@pulumi.getter(name="tokenPolicies")
|
619
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
620
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
620
621
|
"""
|
621
622
|
Generated Token's Policies
|
622
623
|
"""
|
623
624
|
return pulumi.get(self, "token_policies")
|
624
625
|
|
625
626
|
@token_policies.setter
|
626
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
627
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
627
628
|
pulumi.set(self, "token_policies", value)
|
628
629
|
|
629
630
|
@property
|
630
631
|
@pulumi.getter(name="tokenTtl")
|
631
|
-
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
632
|
+
def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
632
633
|
"""
|
633
634
|
The initial ttl of the token to generate in seconds
|
634
635
|
"""
|
635
636
|
return pulumi.get(self, "token_ttl")
|
636
637
|
|
637
638
|
@token_ttl.setter
|
638
|
-
def token_ttl(self, value: Optional[pulumi.Input[int]]):
|
639
|
+
def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
639
640
|
pulumi.set(self, "token_ttl", value)
|
640
641
|
|
641
642
|
@property
|
642
643
|
@pulumi.getter(name="tokenType")
|
643
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
644
|
+
def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
644
645
|
"""
|
645
646
|
The type of token to generate, service or batch
|
646
647
|
"""
|
647
648
|
return pulumi.get(self, "token_type")
|
648
649
|
|
649
650
|
@token_type.setter
|
650
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
651
|
+
def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
651
652
|
pulumi.set(self, "token_type", value)
|
652
653
|
|
653
654
|
|
@@ -656,25 +657,25 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
656
657
|
def __init__(__self__,
|
657
658
|
resource_name: str,
|
658
659
|
opts: Optional[pulumi.ResourceOptions] = None,
|
659
|
-
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
660
|
-
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
661
|
-
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
662
|
-
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
663
|
-
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
664
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
665
|
-
orphan: Optional[pulumi.Input[bool]] = None,
|
666
|
-
path_suffix: Optional[pulumi.Input[str]] = None,
|
667
|
-
renewable: Optional[pulumi.Input[bool]] = None,
|
668
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
669
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
670
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
671
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
672
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
673
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
674
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
675
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
676
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
677
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
660
|
+
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
661
|
+
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
662
|
+
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
663
|
+
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
664
|
+
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
665
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
666
|
+
orphan: Optional[pulumi.Input[builtins.bool]] = None,
|
667
|
+
path_suffix: Optional[pulumi.Input[builtins.str]] = None,
|
668
|
+
renewable: Optional[pulumi.Input[builtins.bool]] = None,
|
669
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
670
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
671
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
672
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
673
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
674
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
675
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
676
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
677
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
678
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
678
679
|
__props__=None):
|
679
680
|
"""
|
680
681
|
Manages Token auth backend role in a Vault server. See the [Vault
|
@@ -712,28 +713,28 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
712
713
|
|
713
714
|
:param str resource_name: The name of the resource.
|
714
715
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
715
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_entity_aliases: List of allowed entity aliases.
|
716
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies: List of allowed policies for given role.
|
717
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
|
718
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies: List of disallowed policies for given role.
|
719
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
720
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
716
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
|
717
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies: List of allowed policies for given role.
|
718
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
|
719
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies: List of disallowed policies for given role.
|
720
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
721
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
721
722
|
The value should not contain leading or trailing forward slashes.
|
722
723
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
723
724
|
*Available only for Vault Enterprise*.
|
724
|
-
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
725
|
-
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
726
|
-
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
727
|
-
:param pulumi.Input[str] role_name: The name of the role.
|
728
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
729
|
-
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
730
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
731
|
-
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
732
|
-
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
733
|
-
:param pulumi.Input[int] token_period: Generated Token's Period
|
734
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
735
|
-
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
736
|
-
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
725
|
+
:param pulumi.Input[builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
726
|
+
:param pulumi.Input[builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
727
|
+
:param pulumi.Input[builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
728
|
+
:param pulumi.Input[builtins.str] role_name: The name of the role.
|
729
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
730
|
+
:param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
731
|
+
:param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
732
|
+
:param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
733
|
+
:param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
734
|
+
:param pulumi.Input[builtins.int] token_period: Generated Token's Period
|
735
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
|
736
|
+
:param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
737
|
+
:param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
|
737
738
|
"""
|
738
739
|
...
|
739
740
|
@overload
|
@@ -790,25 +791,25 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
790
791
|
def _internal_init(__self__,
|
791
792
|
resource_name: str,
|
792
793
|
opts: Optional[pulumi.ResourceOptions] = None,
|
793
|
-
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
794
|
-
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
795
|
-
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
796
|
-
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
797
|
-
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
798
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
799
|
-
orphan: Optional[pulumi.Input[bool]] = None,
|
800
|
-
path_suffix: Optional[pulumi.Input[str]] = None,
|
801
|
-
renewable: Optional[pulumi.Input[bool]] = None,
|
802
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
803
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
804
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
805
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
806
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
807
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
808
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
809
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
810
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
811
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
794
|
+
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
795
|
+
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
796
|
+
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
797
|
+
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
798
|
+
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
799
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
800
|
+
orphan: Optional[pulumi.Input[builtins.bool]] = None,
|
801
|
+
path_suffix: Optional[pulumi.Input[builtins.str]] = None,
|
802
|
+
renewable: Optional[pulumi.Input[builtins.bool]] = None,
|
803
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
804
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
805
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
806
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
807
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
808
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
809
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
810
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
811
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
812
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
812
813
|
__props__=None):
|
813
814
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
814
815
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -849,25 +850,25 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
849
850
|
def get(resource_name: str,
|
850
851
|
id: pulumi.Input[str],
|
851
852
|
opts: Optional[pulumi.ResourceOptions] = None,
|
852
|
-
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
853
|
-
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
854
|
-
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
855
|
-
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
856
|
-
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
857
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
858
|
-
orphan: Optional[pulumi.Input[bool]] = None,
|
859
|
-
path_suffix: Optional[pulumi.Input[str]] = None,
|
860
|
-
renewable: Optional[pulumi.Input[bool]] = None,
|
861
|
-
role_name: Optional[pulumi.Input[str]] = None,
|
862
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
863
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
864
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
865
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
866
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
867
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
868
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
869
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
870
|
-
token_type: Optional[pulumi.Input[str]] = None) -> 'AuthBackendRole':
|
853
|
+
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
854
|
+
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
855
|
+
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
856
|
+
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
857
|
+
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
858
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
859
|
+
orphan: Optional[pulumi.Input[builtins.bool]] = None,
|
860
|
+
path_suffix: Optional[pulumi.Input[builtins.str]] = None,
|
861
|
+
renewable: Optional[pulumi.Input[builtins.bool]] = None,
|
862
|
+
role_name: Optional[pulumi.Input[builtins.str]] = None,
|
863
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
864
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
865
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
866
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
867
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
868
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
869
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
870
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
871
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendRole':
|
871
872
|
"""
|
872
873
|
Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
|
873
874
|
properties used to qualify the lookup.
|
@@ -875,28 +876,28 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
875
876
|
:param str resource_name: The unique name of the resulting resource.
|
876
877
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
877
878
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
878
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_entity_aliases: List of allowed entity aliases.
|
879
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies: List of allowed policies for given role.
|
880
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
|
881
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies: List of disallowed policies for given role.
|
882
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
883
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
879
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
|
880
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies: List of allowed policies for given role.
|
881
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
|
882
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies: List of disallowed policies for given role.
|
883
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
884
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
884
885
|
The value should not contain leading or trailing forward slashes.
|
885
886
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
886
887
|
*Available only for Vault Enterprise*.
|
887
|
-
:param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
888
|
-
:param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
889
|
-
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
890
|
-
:param pulumi.Input[str] role_name: The name of the role.
|
891
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
892
|
-
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
893
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
894
|
-
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
895
|
-
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
896
|
-
:param pulumi.Input[int] token_period: Generated Token's Period
|
897
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
898
|
-
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
899
|
-
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
888
|
+
:param pulumi.Input[builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
889
|
+
:param pulumi.Input[builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
890
|
+
:param pulumi.Input[builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
891
|
+
:param pulumi.Input[builtins.str] role_name: The name of the role.
|
892
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
893
|
+
:param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
894
|
+
:param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
895
|
+
:param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
896
|
+
:param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
897
|
+
:param pulumi.Input[builtins.int] token_period: Generated Token's Period
|
898
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
|
899
|
+
:param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
900
|
+
:param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
|
900
901
|
"""
|
901
902
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
902
903
|
|
@@ -925,7 +926,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
925
926
|
|
926
927
|
@property
|
927
928
|
@pulumi.getter(name="allowedEntityAliases")
|
928
|
-
def allowed_entity_aliases(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
929
|
+
def allowed_entity_aliases(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
929
930
|
"""
|
930
931
|
List of allowed entity aliases.
|
931
932
|
"""
|
@@ -933,7 +934,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
933
934
|
|
934
935
|
@property
|
935
936
|
@pulumi.getter(name="allowedPolicies")
|
936
|
-
def allowed_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
937
|
+
def allowed_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
937
938
|
"""
|
938
939
|
List of allowed policies for given role.
|
939
940
|
"""
|
@@ -941,7 +942,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
941
942
|
|
942
943
|
@property
|
943
944
|
@pulumi.getter(name="allowedPoliciesGlobs")
|
944
|
-
def allowed_policies_globs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
945
|
+
def allowed_policies_globs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
945
946
|
"""
|
946
947
|
Set of allowed policies with glob match for given role.
|
947
948
|
"""
|
@@ -949,7 +950,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
949
950
|
|
950
951
|
@property
|
951
952
|
@pulumi.getter(name="disallowedPolicies")
|
952
|
-
def disallowed_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
953
|
+
def disallowed_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
953
954
|
"""
|
954
955
|
List of disallowed policies for given role.
|
955
956
|
"""
|
@@ -957,7 +958,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
957
958
|
|
958
959
|
@property
|
959
960
|
@pulumi.getter(name="disallowedPoliciesGlobs")
|
960
|
-
def disallowed_policies_globs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
961
|
+
def disallowed_policies_globs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
961
962
|
"""
|
962
963
|
Set of disallowed policies with glob match for given role.
|
963
964
|
"""
|
@@ -965,7 +966,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
965
966
|
|
966
967
|
@property
|
967
968
|
@pulumi.getter
|
968
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
969
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
969
970
|
"""
|
970
971
|
The namespace to provision the resource in.
|
971
972
|
The value should not contain leading or trailing forward slashes.
|
@@ -976,7 +977,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
976
977
|
|
977
978
|
@property
|
978
979
|
@pulumi.getter
|
979
|
-
def orphan(self) -> pulumi.Output[Optional[bool]]:
|
980
|
+
def orphan(self) -> pulumi.Output[Optional[builtins.bool]]:
|
980
981
|
"""
|
981
982
|
If true, tokens created against this policy will be orphan tokens.
|
982
983
|
"""
|
@@ -984,7 +985,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
984
985
|
|
985
986
|
@property
|
986
987
|
@pulumi.getter(name="pathSuffix")
|
987
|
-
def path_suffix(self) -> pulumi.Output[Optional[str]]:
|
988
|
+
def path_suffix(self) -> pulumi.Output[Optional[builtins.str]]:
|
988
989
|
"""
|
989
990
|
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
990
991
|
"""
|
@@ -992,7 +993,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
992
993
|
|
993
994
|
@property
|
994
995
|
@pulumi.getter
|
995
|
-
def renewable(self) -> pulumi.Output[Optional[bool]]:
|
996
|
+
def renewable(self) -> pulumi.Output[Optional[builtins.bool]]:
|
996
997
|
"""
|
997
998
|
Whether to disable the ability of the token to be renewed past its initial TTL.
|
998
999
|
"""
|
@@ -1000,7 +1001,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1000
1001
|
|
1001
1002
|
@property
|
1002
1003
|
@pulumi.getter(name="roleName")
|
1003
|
-
def role_name(self) -> pulumi.Output[str]:
|
1004
|
+
def role_name(self) -> pulumi.Output[builtins.str]:
|
1004
1005
|
"""
|
1005
1006
|
The name of the role.
|
1006
1007
|
"""
|
@@ -1008,7 +1009,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1008
1009
|
|
1009
1010
|
@property
|
1010
1011
|
@pulumi.getter(name="tokenBoundCidrs")
|
1011
|
-
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1012
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
1012
1013
|
"""
|
1013
1014
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1014
1015
|
"""
|
@@ -1016,7 +1017,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1016
1017
|
|
1017
1018
|
@property
|
1018
1019
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1019
|
-
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1020
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
1020
1021
|
"""
|
1021
1022
|
Generated Token's Explicit Maximum TTL in seconds
|
1022
1023
|
"""
|
@@ -1024,7 +1025,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1024
1025
|
|
1025
1026
|
@property
|
1026
1027
|
@pulumi.getter(name="tokenMaxTtl")
|
1027
|
-
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1028
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
1028
1029
|
"""
|
1029
1030
|
The maximum lifetime of the generated token
|
1030
1031
|
"""
|
@@ -1032,7 +1033,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1032
1033
|
|
1033
1034
|
@property
|
1034
1035
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1035
|
-
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1036
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
|
1036
1037
|
"""
|
1037
1038
|
If true, the 'default' policy will not automatically be added to generated tokens
|
1038
1039
|
"""
|
@@ -1040,7 +1041,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1040
1041
|
|
1041
1042
|
@property
|
1042
1043
|
@pulumi.getter(name="tokenNumUses")
|
1043
|
-
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1044
|
+
def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
|
1044
1045
|
"""
|
1045
1046
|
The maximum number of times a token may be used, a value of zero means unlimited
|
1046
1047
|
"""
|
@@ -1048,7 +1049,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1048
1049
|
|
1049
1050
|
@property
|
1050
1051
|
@pulumi.getter(name="tokenPeriod")
|
1051
|
-
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1052
|
+
def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
|
1052
1053
|
"""
|
1053
1054
|
Generated Token's Period
|
1054
1055
|
"""
|
@@ -1056,7 +1057,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1056
1057
|
|
1057
1058
|
@property
|
1058
1059
|
@pulumi.getter(name="tokenPolicies")
|
1059
|
-
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1060
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
1060
1061
|
"""
|
1061
1062
|
Generated Token's Policies
|
1062
1063
|
"""
|
@@ -1064,7 +1065,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1064
1065
|
|
1065
1066
|
@property
|
1066
1067
|
@pulumi.getter(name="tokenTtl")
|
1067
|
-
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1068
|
+
def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
1068
1069
|
"""
|
1069
1070
|
The initial ttl of the token to generate in seconds
|
1070
1071
|
"""
|
@@ -1072,7 +1073,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1072
1073
|
|
1073
1074
|
@property
|
1074
1075
|
@pulumi.getter(name="tokenType")
|
1075
|
-
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1076
|
+
def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
|
1076
1077
|
"""
|
1077
1078
|
The type of token to generate, service or batch
|
1078
1079
|
"""
|