pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,29 +20,29 @@ __all__ = ['AuthBackendRoleTagArgs', 'AuthBackendRoleTag']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendRoleTagArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
role: pulumi.Input[str],
|
23
|
-
allow_instance_migration: Optional[pulumi.Input[bool]] = None,
|
24
|
-
backend: Optional[pulumi.Input[str]] = None,
|
25
|
-
disallow_reauthentication: Optional[pulumi.Input[bool]] = None,
|
26
|
-
instance_id: Optional[pulumi.Input[str]] = None,
|
27
|
-
max_ttl: Optional[pulumi.Input[str]] = None,
|
28
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
29
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
23
|
+
role: pulumi.Input[builtins.str],
|
24
|
+
allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
|
25
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
|
27
|
+
instance_id: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
|
30
31
|
"""
|
31
32
|
The set of arguments for constructing a AuthBackendRoleTag resource.
|
32
|
-
:param pulumi.Input[str] role: The name of the AWS auth backend role to read
|
33
|
+
:param pulumi.Input[builtins.str] role: The name of the AWS auth backend role to read
|
33
34
|
role tags from, with no leading or trailing `/`s.
|
34
|
-
:param pulumi.Input[bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
|
35
|
-
:param pulumi.Input[str] backend: The path to the AWS auth backend to
|
35
|
+
:param pulumi.Input[builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
|
36
|
+
:param pulumi.Input[builtins.str] backend: The path to the AWS auth backend to
|
36
37
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
37
|
-
:param pulumi.Input[bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
|
38
|
-
:param pulumi.Input[str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
39
|
-
:param pulumi.Input[str] max_ttl: The maximum TTL of the tokens issued using this role.
|
40
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
38
|
+
:param pulumi.Input[builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
|
39
|
+
:param pulumi.Input[builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
40
|
+
:param pulumi.Input[builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
|
41
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
41
42
|
The value should not contain leading or trailing forward slashes.
|
42
43
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
43
44
|
*Available only for Vault Enterprise*.
|
44
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
45
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
45
46
|
"""
|
46
47
|
pulumi.set(__self__, "role", role)
|
47
48
|
if allow_instance_migration is not None:
|
@@ -61,7 +62,7 @@ class AuthBackendRoleTagArgs:
|
|
61
62
|
|
62
63
|
@property
|
63
64
|
@pulumi.getter
|
64
|
-
def role(self) -> pulumi.Input[str]:
|
65
|
+
def role(self) -> pulumi.Input[builtins.str]:
|
65
66
|
"""
|
66
67
|
The name of the AWS auth backend role to read
|
67
68
|
role tags from, with no leading or trailing `/`s.
|
@@ -69,24 +70,24 @@ class AuthBackendRoleTagArgs:
|
|
69
70
|
return pulumi.get(self, "role")
|
70
71
|
|
71
72
|
@role.setter
|
72
|
-
def role(self, value: pulumi.Input[str]):
|
73
|
+
def role(self, value: pulumi.Input[builtins.str]):
|
73
74
|
pulumi.set(self, "role", value)
|
74
75
|
|
75
76
|
@property
|
76
77
|
@pulumi.getter(name="allowInstanceMigration")
|
77
|
-
def allow_instance_migration(self) -> Optional[pulumi.Input[bool]]:
|
78
|
+
def allow_instance_migration(self) -> Optional[pulumi.Input[builtins.bool]]:
|
78
79
|
"""
|
79
80
|
If set, allows migration of the underlying instances where the client resides. Use with caution.
|
80
81
|
"""
|
81
82
|
return pulumi.get(self, "allow_instance_migration")
|
82
83
|
|
83
84
|
@allow_instance_migration.setter
|
84
|
-
def allow_instance_migration(self, value: Optional[pulumi.Input[bool]]):
|
85
|
+
def allow_instance_migration(self, value: Optional[pulumi.Input[builtins.bool]]):
|
85
86
|
pulumi.set(self, "allow_instance_migration", value)
|
86
87
|
|
87
88
|
@property
|
88
89
|
@pulumi.getter
|
89
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
90
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
90
91
|
"""
|
91
92
|
The path to the AWS auth backend to
|
92
93
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
@@ -94,48 +95,48 @@ class AuthBackendRoleTagArgs:
|
|
94
95
|
return pulumi.get(self, "backend")
|
95
96
|
|
96
97
|
@backend.setter
|
97
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
98
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
98
99
|
pulumi.set(self, "backend", value)
|
99
100
|
|
100
101
|
@property
|
101
102
|
@pulumi.getter(name="disallowReauthentication")
|
102
|
-
def disallow_reauthentication(self) -> Optional[pulumi.Input[bool]]:
|
103
|
+
def disallow_reauthentication(self) -> Optional[pulumi.Input[builtins.bool]]:
|
103
104
|
"""
|
104
105
|
If set, only allows a single token to be granted per instance ID.
|
105
106
|
"""
|
106
107
|
return pulumi.get(self, "disallow_reauthentication")
|
107
108
|
|
108
109
|
@disallow_reauthentication.setter
|
109
|
-
def disallow_reauthentication(self, value: Optional[pulumi.Input[bool]]):
|
110
|
+
def disallow_reauthentication(self, value: Optional[pulumi.Input[builtins.bool]]):
|
110
111
|
pulumi.set(self, "disallow_reauthentication", value)
|
111
112
|
|
112
113
|
@property
|
113
114
|
@pulumi.getter(name="instanceId")
|
114
|
-
def instance_id(self) -> Optional[pulumi.Input[str]]:
|
115
|
+
def instance_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
115
116
|
"""
|
116
117
|
Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
117
118
|
"""
|
118
119
|
return pulumi.get(self, "instance_id")
|
119
120
|
|
120
121
|
@instance_id.setter
|
121
|
-
def instance_id(self, value: Optional[pulumi.Input[str]]):
|
122
|
+
def instance_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
122
123
|
pulumi.set(self, "instance_id", value)
|
123
124
|
|
124
125
|
@property
|
125
126
|
@pulumi.getter(name="maxTtl")
|
126
|
-
def max_ttl(self) -> Optional[pulumi.Input[str]]:
|
127
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
127
128
|
"""
|
128
129
|
The maximum TTL of the tokens issued using this role.
|
129
130
|
"""
|
130
131
|
return pulumi.get(self, "max_ttl")
|
131
132
|
|
132
133
|
@max_ttl.setter
|
133
|
-
def max_ttl(self, value: Optional[pulumi.Input[str]]):
|
134
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
134
135
|
pulumi.set(self, "max_ttl", value)
|
135
136
|
|
136
137
|
@property
|
137
138
|
@pulumi.getter
|
138
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
139
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
139
140
|
"""
|
140
141
|
The namespace to provision the resource in.
|
141
142
|
The value should not contain leading or trailing forward slashes.
|
@@ -145,52 +146,52 @@ class AuthBackendRoleTagArgs:
|
|
145
146
|
return pulumi.get(self, "namespace")
|
146
147
|
|
147
148
|
@namespace.setter
|
148
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
149
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
149
150
|
pulumi.set(self, "namespace", value)
|
150
151
|
|
151
152
|
@property
|
152
153
|
@pulumi.getter
|
153
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
154
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
154
155
|
"""
|
155
156
|
The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
156
157
|
"""
|
157
158
|
return pulumi.get(self, "policies")
|
158
159
|
|
159
160
|
@policies.setter
|
160
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
161
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
161
162
|
pulumi.set(self, "policies", value)
|
162
163
|
|
163
164
|
|
164
165
|
@pulumi.input_type
|
165
166
|
class _AuthBackendRoleTagState:
|
166
167
|
def __init__(__self__, *,
|
167
|
-
allow_instance_migration: Optional[pulumi.Input[bool]] = None,
|
168
|
-
backend: Optional[pulumi.Input[str]] = None,
|
169
|
-
disallow_reauthentication: Optional[pulumi.Input[bool]] = None,
|
170
|
-
instance_id: Optional[pulumi.Input[str]] = None,
|
171
|
-
max_ttl: Optional[pulumi.Input[str]] = None,
|
172
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
173
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
174
|
-
role: Optional[pulumi.Input[str]] = None,
|
175
|
-
tag_key: Optional[pulumi.Input[str]] = None,
|
176
|
-
tag_value: Optional[pulumi.Input[str]] = None):
|
168
|
+
allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
|
169
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
170
|
+
disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
|
171
|
+
instance_id: Optional[pulumi.Input[builtins.str]] = None,
|
172
|
+
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
173
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
174
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
175
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
176
|
+
tag_key: Optional[pulumi.Input[builtins.str]] = None,
|
177
|
+
tag_value: Optional[pulumi.Input[builtins.str]] = None):
|
177
178
|
"""
|
178
179
|
Input properties used for looking up and filtering AuthBackendRoleTag resources.
|
179
|
-
:param pulumi.Input[bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
|
180
|
-
:param pulumi.Input[str] backend: The path to the AWS auth backend to
|
180
|
+
:param pulumi.Input[builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
|
181
|
+
:param pulumi.Input[builtins.str] backend: The path to the AWS auth backend to
|
181
182
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
182
|
-
:param pulumi.Input[bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
|
183
|
-
:param pulumi.Input[str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
184
|
-
:param pulumi.Input[str] max_ttl: The maximum TTL of the tokens issued using this role.
|
185
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
183
|
+
:param pulumi.Input[builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
|
184
|
+
:param pulumi.Input[builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
185
|
+
:param pulumi.Input[builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
|
186
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
186
187
|
The value should not contain leading or trailing forward slashes.
|
187
188
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
188
189
|
*Available only for Vault Enterprise*.
|
189
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
190
|
-
:param pulumi.Input[str] role: The name of the AWS auth backend role to read
|
190
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
191
|
+
:param pulumi.Input[builtins.str] role: The name of the AWS auth backend role to read
|
191
192
|
role tags from, with no leading or trailing `/`s.
|
192
|
-
:param pulumi.Input[str] tag_key: The key of the role tag.
|
193
|
-
:param pulumi.Input[str] tag_value: The value to set the role key.
|
193
|
+
:param pulumi.Input[builtins.str] tag_key: The key of the role tag.
|
194
|
+
:param pulumi.Input[builtins.str] tag_value: The value to set the role key.
|
194
195
|
"""
|
195
196
|
if allow_instance_migration is not None:
|
196
197
|
pulumi.set(__self__, "allow_instance_migration", allow_instance_migration)
|
@@ -215,19 +216,19 @@ class _AuthBackendRoleTagState:
|
|
215
216
|
|
216
217
|
@property
|
217
218
|
@pulumi.getter(name="allowInstanceMigration")
|
218
|
-
def allow_instance_migration(self) -> Optional[pulumi.Input[bool]]:
|
219
|
+
def allow_instance_migration(self) -> Optional[pulumi.Input[builtins.bool]]:
|
219
220
|
"""
|
220
221
|
If set, allows migration of the underlying instances where the client resides. Use with caution.
|
221
222
|
"""
|
222
223
|
return pulumi.get(self, "allow_instance_migration")
|
223
224
|
|
224
225
|
@allow_instance_migration.setter
|
225
|
-
def allow_instance_migration(self, value: Optional[pulumi.Input[bool]]):
|
226
|
+
def allow_instance_migration(self, value: Optional[pulumi.Input[builtins.bool]]):
|
226
227
|
pulumi.set(self, "allow_instance_migration", value)
|
227
228
|
|
228
229
|
@property
|
229
230
|
@pulumi.getter
|
230
|
-
def backend(self) -> Optional[pulumi.Input[str]]:
|
231
|
+
def backend(self) -> Optional[pulumi.Input[builtins.str]]:
|
231
232
|
"""
|
232
233
|
The path to the AWS auth backend to
|
233
234
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
@@ -235,48 +236,48 @@ class _AuthBackendRoleTagState:
|
|
235
236
|
return pulumi.get(self, "backend")
|
236
237
|
|
237
238
|
@backend.setter
|
238
|
-
def backend(self, value: Optional[pulumi.Input[str]]):
|
239
|
+
def backend(self, value: Optional[pulumi.Input[builtins.str]]):
|
239
240
|
pulumi.set(self, "backend", value)
|
240
241
|
|
241
242
|
@property
|
242
243
|
@pulumi.getter(name="disallowReauthentication")
|
243
|
-
def disallow_reauthentication(self) -> Optional[pulumi.Input[bool]]:
|
244
|
+
def disallow_reauthentication(self) -> Optional[pulumi.Input[builtins.bool]]:
|
244
245
|
"""
|
245
246
|
If set, only allows a single token to be granted per instance ID.
|
246
247
|
"""
|
247
248
|
return pulumi.get(self, "disallow_reauthentication")
|
248
249
|
|
249
250
|
@disallow_reauthentication.setter
|
250
|
-
def disallow_reauthentication(self, value: Optional[pulumi.Input[bool]]):
|
251
|
+
def disallow_reauthentication(self, value: Optional[pulumi.Input[builtins.bool]]):
|
251
252
|
pulumi.set(self, "disallow_reauthentication", value)
|
252
253
|
|
253
254
|
@property
|
254
255
|
@pulumi.getter(name="instanceId")
|
255
|
-
def instance_id(self) -> Optional[pulumi.Input[str]]:
|
256
|
+
def instance_id(self) -> Optional[pulumi.Input[builtins.str]]:
|
256
257
|
"""
|
257
258
|
Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
258
259
|
"""
|
259
260
|
return pulumi.get(self, "instance_id")
|
260
261
|
|
261
262
|
@instance_id.setter
|
262
|
-
def instance_id(self, value: Optional[pulumi.Input[str]]):
|
263
|
+
def instance_id(self, value: Optional[pulumi.Input[builtins.str]]):
|
263
264
|
pulumi.set(self, "instance_id", value)
|
264
265
|
|
265
266
|
@property
|
266
267
|
@pulumi.getter(name="maxTtl")
|
267
|
-
def max_ttl(self) -> Optional[pulumi.Input[str]]:
|
268
|
+
def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
|
268
269
|
"""
|
269
270
|
The maximum TTL of the tokens issued using this role.
|
270
271
|
"""
|
271
272
|
return pulumi.get(self, "max_ttl")
|
272
273
|
|
273
274
|
@max_ttl.setter
|
274
|
-
def max_ttl(self, value: Optional[pulumi.Input[str]]):
|
275
|
+
def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
|
275
276
|
pulumi.set(self, "max_ttl", value)
|
276
277
|
|
277
278
|
@property
|
278
279
|
@pulumi.getter
|
279
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
280
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
280
281
|
"""
|
281
282
|
The namespace to provision the resource in.
|
282
283
|
The value should not contain leading or trailing forward slashes.
|
@@ -286,24 +287,24 @@ class _AuthBackendRoleTagState:
|
|
286
287
|
return pulumi.get(self, "namespace")
|
287
288
|
|
288
289
|
@namespace.setter
|
289
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
290
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
290
291
|
pulumi.set(self, "namespace", value)
|
291
292
|
|
292
293
|
@property
|
293
294
|
@pulumi.getter
|
294
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
295
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
295
296
|
"""
|
296
297
|
The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
297
298
|
"""
|
298
299
|
return pulumi.get(self, "policies")
|
299
300
|
|
300
301
|
@policies.setter
|
301
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
302
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
302
303
|
pulumi.set(self, "policies", value)
|
303
304
|
|
304
305
|
@property
|
305
306
|
@pulumi.getter
|
306
|
-
def role(self) -> Optional[pulumi.Input[str]]:
|
307
|
+
def role(self) -> Optional[pulumi.Input[builtins.str]]:
|
307
308
|
"""
|
308
309
|
The name of the AWS auth backend role to read
|
309
310
|
role tags from, with no leading or trailing `/`s.
|
@@ -311,31 +312,31 @@ class _AuthBackendRoleTagState:
|
|
311
312
|
return pulumi.get(self, "role")
|
312
313
|
|
313
314
|
@role.setter
|
314
|
-
def role(self, value: Optional[pulumi.Input[str]]):
|
315
|
+
def role(self, value: Optional[pulumi.Input[builtins.str]]):
|
315
316
|
pulumi.set(self, "role", value)
|
316
317
|
|
317
318
|
@property
|
318
319
|
@pulumi.getter(name="tagKey")
|
319
|
-
def tag_key(self) -> Optional[pulumi.Input[str]]:
|
320
|
+
def tag_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
320
321
|
"""
|
321
322
|
The key of the role tag.
|
322
323
|
"""
|
323
324
|
return pulumi.get(self, "tag_key")
|
324
325
|
|
325
326
|
@tag_key.setter
|
326
|
-
def tag_key(self, value: Optional[pulumi.Input[str]]):
|
327
|
+
def tag_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
327
328
|
pulumi.set(self, "tag_key", value)
|
328
329
|
|
329
330
|
@property
|
330
331
|
@pulumi.getter(name="tagValue")
|
331
|
-
def tag_value(self) -> Optional[pulumi.Input[str]]:
|
332
|
+
def tag_value(self) -> Optional[pulumi.Input[builtins.str]]:
|
332
333
|
"""
|
333
334
|
The value to set the role key.
|
334
335
|
"""
|
335
336
|
return pulumi.get(self, "tag_value")
|
336
337
|
|
337
338
|
@tag_value.setter
|
338
|
-
def tag_value(self, value: Optional[pulumi.Input[str]]):
|
339
|
+
def tag_value(self, value: Optional[pulumi.Input[builtins.str]]):
|
339
340
|
pulumi.set(self, "tag_value", value)
|
340
341
|
|
341
342
|
|
@@ -344,32 +345,32 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
344
345
|
def __init__(__self__,
|
345
346
|
resource_name: str,
|
346
347
|
opts: Optional[pulumi.ResourceOptions] = None,
|
347
|
-
allow_instance_migration: Optional[pulumi.Input[bool]] = None,
|
348
|
-
backend: Optional[pulumi.Input[str]] = None,
|
349
|
-
disallow_reauthentication: Optional[pulumi.Input[bool]] = None,
|
350
|
-
instance_id: Optional[pulumi.Input[str]] = None,
|
351
|
-
max_ttl: Optional[pulumi.Input[str]] = None,
|
352
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
353
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
354
|
-
role: Optional[pulumi.Input[str]] = None,
|
348
|
+
allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
|
349
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
350
|
+
disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
|
351
|
+
instance_id: Optional[pulumi.Input[builtins.str]] = None,
|
352
|
+
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
353
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
354
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
355
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
355
356
|
__props__=None):
|
356
357
|
"""
|
357
358
|
Reads role tag information from an AWS auth backend in Vault.
|
358
359
|
|
359
360
|
:param str resource_name: The name of the resource.
|
360
361
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
361
|
-
:param pulumi.Input[bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
|
362
|
-
:param pulumi.Input[str] backend: The path to the AWS auth backend to
|
362
|
+
:param pulumi.Input[builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
|
363
|
+
:param pulumi.Input[builtins.str] backend: The path to the AWS auth backend to
|
363
364
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
364
|
-
:param pulumi.Input[bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
|
365
|
-
:param pulumi.Input[str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
366
|
-
:param pulumi.Input[str] max_ttl: The maximum TTL of the tokens issued using this role.
|
367
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
365
|
+
:param pulumi.Input[builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
|
366
|
+
:param pulumi.Input[builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
367
|
+
:param pulumi.Input[builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
|
368
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
368
369
|
The value should not contain leading or trailing forward slashes.
|
369
370
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
370
371
|
*Available only for Vault Enterprise*.
|
371
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
372
|
-
:param pulumi.Input[str] role: The name of the AWS auth backend role to read
|
372
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
373
|
+
:param pulumi.Input[builtins.str] role: The name of the AWS auth backend role to read
|
373
374
|
role tags from, with no leading or trailing `/`s.
|
374
375
|
"""
|
375
376
|
...
|
@@ -396,14 +397,14 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
396
397
|
def _internal_init(__self__,
|
397
398
|
resource_name: str,
|
398
399
|
opts: Optional[pulumi.ResourceOptions] = None,
|
399
|
-
allow_instance_migration: Optional[pulumi.Input[bool]] = None,
|
400
|
-
backend: Optional[pulumi.Input[str]] = None,
|
401
|
-
disallow_reauthentication: Optional[pulumi.Input[bool]] = None,
|
402
|
-
instance_id: Optional[pulumi.Input[str]] = None,
|
403
|
-
max_ttl: Optional[pulumi.Input[str]] = None,
|
404
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
405
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
406
|
-
role: Optional[pulumi.Input[str]] = None,
|
400
|
+
allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
|
401
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
402
|
+
disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
|
403
|
+
instance_id: Optional[pulumi.Input[builtins.str]] = None,
|
404
|
+
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
405
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
406
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
407
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
407
408
|
__props__=None):
|
408
409
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
409
410
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -435,16 +436,16 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
435
436
|
def get(resource_name: str,
|
436
437
|
id: pulumi.Input[str],
|
437
438
|
opts: Optional[pulumi.ResourceOptions] = None,
|
438
|
-
allow_instance_migration: Optional[pulumi.Input[bool]] = None,
|
439
|
-
backend: Optional[pulumi.Input[str]] = None,
|
440
|
-
disallow_reauthentication: Optional[pulumi.Input[bool]] = None,
|
441
|
-
instance_id: Optional[pulumi.Input[str]] = None,
|
442
|
-
max_ttl: Optional[pulumi.Input[str]] = None,
|
443
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
444
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
445
|
-
role: Optional[pulumi.Input[str]] = None,
|
446
|
-
tag_key: Optional[pulumi.Input[str]] = None,
|
447
|
-
tag_value: Optional[pulumi.Input[str]] = None) -> 'AuthBackendRoleTag':
|
439
|
+
allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
|
440
|
+
backend: Optional[pulumi.Input[builtins.str]] = None,
|
441
|
+
disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
|
442
|
+
instance_id: Optional[pulumi.Input[builtins.str]] = None,
|
443
|
+
max_ttl: Optional[pulumi.Input[builtins.str]] = None,
|
444
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
445
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
446
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
447
|
+
tag_key: Optional[pulumi.Input[builtins.str]] = None,
|
448
|
+
tag_value: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendRoleTag':
|
448
449
|
"""
|
449
450
|
Get an existing AuthBackendRoleTag resource's state with the given name, id, and optional extra
|
450
451
|
properties used to qualify the lookup.
|
@@ -452,21 +453,21 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
452
453
|
:param str resource_name: The unique name of the resulting resource.
|
453
454
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
454
455
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
455
|
-
:param pulumi.Input[bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
|
456
|
-
:param pulumi.Input[str] backend: The path to the AWS auth backend to
|
456
|
+
:param pulumi.Input[builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
|
457
|
+
:param pulumi.Input[builtins.str] backend: The path to the AWS auth backend to
|
457
458
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
458
|
-
:param pulumi.Input[bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
|
459
|
-
:param pulumi.Input[str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
460
|
-
:param pulumi.Input[str] max_ttl: The maximum TTL of the tokens issued using this role.
|
461
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
459
|
+
:param pulumi.Input[builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
|
460
|
+
:param pulumi.Input[builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
461
|
+
:param pulumi.Input[builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
|
462
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
462
463
|
The value should not contain leading or trailing forward slashes.
|
463
464
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
464
465
|
*Available only for Vault Enterprise*.
|
465
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
466
|
-
:param pulumi.Input[str] role: The name of the AWS auth backend role to read
|
466
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
467
|
+
:param pulumi.Input[builtins.str] role: The name of the AWS auth backend role to read
|
467
468
|
role tags from, with no leading or trailing `/`s.
|
468
|
-
:param pulumi.Input[str] tag_key: The key of the role tag.
|
469
|
-
:param pulumi.Input[str] tag_value: The value to set the role key.
|
469
|
+
:param pulumi.Input[builtins.str] tag_key: The key of the role tag.
|
470
|
+
:param pulumi.Input[builtins.str] tag_value: The value to set the role key.
|
470
471
|
"""
|
471
472
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
472
473
|
|
@@ -486,7 +487,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
486
487
|
|
487
488
|
@property
|
488
489
|
@pulumi.getter(name="allowInstanceMigration")
|
489
|
-
def allow_instance_migration(self) -> pulumi.Output[Optional[bool]]:
|
490
|
+
def allow_instance_migration(self) -> pulumi.Output[Optional[builtins.bool]]:
|
490
491
|
"""
|
491
492
|
If set, allows migration of the underlying instances where the client resides. Use with caution.
|
492
493
|
"""
|
@@ -494,7 +495,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
494
495
|
|
495
496
|
@property
|
496
497
|
@pulumi.getter
|
497
|
-
def backend(self) -> pulumi.Output[Optional[str]]:
|
498
|
+
def backend(self) -> pulumi.Output[Optional[builtins.str]]:
|
498
499
|
"""
|
499
500
|
The path to the AWS auth backend to
|
500
501
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
@@ -503,7 +504,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
503
504
|
|
504
505
|
@property
|
505
506
|
@pulumi.getter(name="disallowReauthentication")
|
506
|
-
def disallow_reauthentication(self) -> pulumi.Output[Optional[bool]]:
|
507
|
+
def disallow_reauthentication(self) -> pulumi.Output[Optional[builtins.bool]]:
|
507
508
|
"""
|
508
509
|
If set, only allows a single token to be granted per instance ID.
|
509
510
|
"""
|
@@ -511,7 +512,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
511
512
|
|
512
513
|
@property
|
513
514
|
@pulumi.getter(name="instanceId")
|
514
|
-
def instance_id(self) -> pulumi.Output[Optional[str]]:
|
515
|
+
def instance_id(self) -> pulumi.Output[Optional[builtins.str]]:
|
515
516
|
"""
|
516
517
|
Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
517
518
|
"""
|
@@ -519,7 +520,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
519
520
|
|
520
521
|
@property
|
521
522
|
@pulumi.getter(name="maxTtl")
|
522
|
-
def max_ttl(self) -> pulumi.Output[Optional[str]]:
|
523
|
+
def max_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
|
523
524
|
"""
|
524
525
|
The maximum TTL of the tokens issued using this role.
|
525
526
|
"""
|
@@ -527,7 +528,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
527
528
|
|
528
529
|
@property
|
529
530
|
@pulumi.getter
|
530
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
531
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
531
532
|
"""
|
532
533
|
The namespace to provision the resource in.
|
533
534
|
The value should not contain leading or trailing forward slashes.
|
@@ -538,7 +539,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
538
539
|
|
539
540
|
@property
|
540
541
|
@pulumi.getter
|
541
|
-
def policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
542
|
+
def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
542
543
|
"""
|
543
544
|
The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
544
545
|
"""
|
@@ -546,7 +547,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
546
547
|
|
547
548
|
@property
|
548
549
|
@pulumi.getter
|
549
|
-
def role(self) -> pulumi.Output[str]:
|
550
|
+
def role(self) -> pulumi.Output[builtins.str]:
|
550
551
|
"""
|
551
552
|
The name of the AWS auth backend role to read
|
552
553
|
role tags from, with no leading or trailing `/`s.
|
@@ -555,7 +556,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
555
556
|
|
556
557
|
@property
|
557
558
|
@pulumi.getter(name="tagKey")
|
558
|
-
def tag_key(self) -> pulumi.Output[str]:
|
559
|
+
def tag_key(self) -> pulumi.Output[builtins.str]:
|
559
560
|
"""
|
560
561
|
The key of the role tag.
|
561
562
|
"""
|
@@ -563,7 +564,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
563
564
|
|
564
565
|
@property
|
565
566
|
@pulumi.getter(name="tagValue")
|
566
|
-
def tag_value(self) -> pulumi.Output[str]:
|
567
|
+
def tag_value(self) -> pulumi.Output[builtins.str]:
|
567
568
|
"""
|
568
569
|
The value to set the role key.
|
569
570
|
"""
|