pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -21,62 +22,62 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
|
|
21
22
|
@pulumi.input_type
|
22
23
|
class AuthBackendArgs:
|
23
24
|
def __init__(__self__, *,
|
24
|
-
organization: pulumi.Input[str],
|
25
|
-
base_url: Optional[pulumi.Input[str]] = None,
|
26
|
-
description: Optional[pulumi.Input[str]] = None,
|
27
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
28
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
29
|
-
organization_id: Optional[pulumi.Input[int]] = None,
|
30
|
-
path: Optional[pulumi.Input[str]] = None,
|
31
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
32
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
33
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
34
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
35
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
36
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
37
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
38
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
39
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
25
|
+
organization: pulumi.Input[builtins.str],
|
26
|
+
base_url: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
29
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
organization_id: Optional[pulumi.Input[builtins.int]] = None,
|
31
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
32
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
33
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
34
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
35
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
36
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
37
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
38
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
39
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
40
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
40
41
|
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
|
41
42
|
"""
|
42
43
|
The set of arguments for constructing a AuthBackend resource.
|
43
|
-
:param pulumi.Input[str] organization: The organization configured users must be part of.
|
44
|
-
:param pulumi.Input[str] base_url: The API endpoint to use. Useful if you
|
44
|
+
:param pulumi.Input[builtins.str] organization: The organization configured users must be part of.
|
45
|
+
:param pulumi.Input[builtins.str] base_url: The API endpoint to use. Useful if you
|
45
46
|
are running GitHub Enterprise or an API-compatible authentication server.
|
46
|
-
:param pulumi.Input[str] description: Specifies the description of the mount.
|
47
|
+
:param pulumi.Input[builtins.str] description: Specifies the description of the mount.
|
47
48
|
This overrides the current stored value, if any.
|
48
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
49
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
49
50
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
50
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
51
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
51
52
|
The value should not contain leading or trailing forward slashes.
|
52
53
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
53
54
|
*Available only for Vault Enterprise*.
|
54
|
-
:param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
|
55
|
+
:param pulumi.Input[builtins.int] organization_id: The ID of the organization users must be part of.
|
55
56
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
56
|
-
:param pulumi.Input[str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
57
|
+
:param pulumi.Input[builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
57
58
|
if not specified.
|
58
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
59
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
59
60
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
60
61
|
as well.
|
61
|
-
:param pulumi.Input[int] token_explicit_max_ttl: (Optional) If set, will encode an
|
62
|
+
:param pulumi.Input[builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
|
62
63
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
63
64
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
64
65
|
`token_max_ttl` would otherwise allow a renewal.
|
65
|
-
:param pulumi.Input[int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
66
|
+
:param pulumi.Input[builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
66
67
|
Its current value will be referenced at renewal time.
|
67
|
-
:param pulumi.Input[bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
68
|
+
:param pulumi.Input[builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
68
69
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
69
|
-
:param pulumi.Input[int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
70
|
+
:param pulumi.Input[builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
70
71
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
71
|
-
:param pulumi.Input[int] token_period: (Optional) If set, indicates that the
|
72
|
+
:param pulumi.Input[builtins.int] token_period: (Optional) If set, indicates that the
|
72
73
|
token generated using this role should never expire. The token should be renewed within the
|
73
74
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
74
75
|
value of this field. Specified in seconds.
|
75
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
76
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
76
77
|
on the auth method, this list may be supplemented by user/group/other values.
|
77
|
-
:param pulumi.Input[int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
78
|
+
:param pulumi.Input[builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
78
79
|
Its current value will be referenced at renewal time.
|
79
|
-
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
80
|
+
:param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
|
80
81
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
81
82
|
:param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
82
83
|
|
@@ -118,19 +119,19 @@ class AuthBackendArgs:
|
|
118
119
|
|
119
120
|
@property
|
120
121
|
@pulumi.getter
|
121
|
-
def organization(self) -> pulumi.Input[str]:
|
122
|
+
def organization(self) -> pulumi.Input[builtins.str]:
|
122
123
|
"""
|
123
124
|
The organization configured users must be part of.
|
124
125
|
"""
|
125
126
|
return pulumi.get(self, "organization")
|
126
127
|
|
127
128
|
@organization.setter
|
128
|
-
def organization(self, value: pulumi.Input[str]):
|
129
|
+
def organization(self, value: pulumi.Input[builtins.str]):
|
129
130
|
pulumi.set(self, "organization", value)
|
130
131
|
|
131
132
|
@property
|
132
133
|
@pulumi.getter(name="baseUrl")
|
133
|
-
def base_url(self) -> Optional[pulumi.Input[str]]:
|
134
|
+
def base_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
134
135
|
"""
|
135
136
|
The API endpoint to use. Useful if you
|
136
137
|
are running GitHub Enterprise or an API-compatible authentication server.
|
@@ -138,12 +139,12 @@ class AuthBackendArgs:
|
|
138
139
|
return pulumi.get(self, "base_url")
|
139
140
|
|
140
141
|
@base_url.setter
|
141
|
-
def base_url(self, value: Optional[pulumi.Input[str]]):
|
142
|
+
def base_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
142
143
|
pulumi.set(self, "base_url", value)
|
143
144
|
|
144
145
|
@property
|
145
146
|
@pulumi.getter
|
146
|
-
def description(self) -> Optional[pulumi.Input[str]]:
|
147
|
+
def description(self) -> Optional[pulumi.Input[builtins.str]]:
|
147
148
|
"""
|
148
149
|
Specifies the description of the mount.
|
149
150
|
This overrides the current stored value, if any.
|
@@ -151,12 +152,12 @@ class AuthBackendArgs:
|
|
151
152
|
return pulumi.get(self, "description")
|
152
153
|
|
153
154
|
@description.setter
|
154
|
-
def description(self, value: Optional[pulumi.Input[str]]):
|
155
|
+
def description(self, value: Optional[pulumi.Input[builtins.str]]):
|
155
156
|
pulumi.set(self, "description", value)
|
156
157
|
|
157
158
|
@property
|
158
159
|
@pulumi.getter(name="disableRemount")
|
159
|
-
def disable_remount(self) -> Optional[pulumi.Input[bool]]:
|
160
|
+
def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
|
160
161
|
"""
|
161
162
|
If set, opts out of mount migration on path updates.
|
162
163
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -164,12 +165,12 @@ class AuthBackendArgs:
|
|
164
165
|
return pulumi.get(self, "disable_remount")
|
165
166
|
|
166
167
|
@disable_remount.setter
|
167
|
-
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
168
|
+
def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
|
168
169
|
pulumi.set(self, "disable_remount", value)
|
169
170
|
|
170
171
|
@property
|
171
172
|
@pulumi.getter
|
172
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
173
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
173
174
|
"""
|
174
175
|
The namespace to provision the resource in.
|
175
176
|
The value should not contain leading or trailing forward slashes.
|
@@ -179,12 +180,12 @@ class AuthBackendArgs:
|
|
179
180
|
return pulumi.get(self, "namespace")
|
180
181
|
|
181
182
|
@namespace.setter
|
182
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
183
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
183
184
|
pulumi.set(self, "namespace", value)
|
184
185
|
|
185
186
|
@property
|
186
187
|
@pulumi.getter(name="organizationId")
|
187
|
-
def organization_id(self) -> Optional[pulumi.Input[int]]:
|
188
|
+
def organization_id(self) -> Optional[pulumi.Input[builtins.int]]:
|
188
189
|
"""
|
189
190
|
The ID of the organization users must be part of.
|
190
191
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
@@ -192,12 +193,12 @@ class AuthBackendArgs:
|
|
192
193
|
return pulumi.get(self, "organization_id")
|
193
194
|
|
194
195
|
@organization_id.setter
|
195
|
-
def organization_id(self, value: Optional[pulumi.Input[int]]):
|
196
|
+
def organization_id(self, value: Optional[pulumi.Input[builtins.int]]):
|
196
197
|
pulumi.set(self, "organization_id", value)
|
197
198
|
|
198
199
|
@property
|
199
200
|
@pulumi.getter
|
200
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
201
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
201
202
|
"""
|
202
203
|
Path where the auth backend is mounted. Defaults to `auth/github`
|
203
204
|
if not specified.
|
@@ -205,12 +206,12 @@ class AuthBackendArgs:
|
|
205
206
|
return pulumi.get(self, "path")
|
206
207
|
|
207
208
|
@path.setter
|
208
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
209
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
209
210
|
pulumi.set(self, "path", value)
|
210
211
|
|
211
212
|
@property
|
212
213
|
@pulumi.getter(name="tokenBoundCidrs")
|
213
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
214
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
214
215
|
"""
|
215
216
|
(Optional) List of CIDR blocks; if set, specifies blocks of IP
|
216
217
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
@@ -219,12 +220,12 @@ class AuthBackendArgs:
|
|
219
220
|
return pulumi.get(self, "token_bound_cidrs")
|
220
221
|
|
221
222
|
@token_bound_cidrs.setter
|
222
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
223
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
223
224
|
pulumi.set(self, "token_bound_cidrs", value)
|
224
225
|
|
225
226
|
@property
|
226
227
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
227
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
228
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
228
229
|
"""
|
229
230
|
(Optional) If set, will encode an
|
230
231
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
@@ -234,12 +235,12 @@ class AuthBackendArgs:
|
|
234
235
|
return pulumi.get(self, "token_explicit_max_ttl")
|
235
236
|
|
236
237
|
@token_explicit_max_ttl.setter
|
237
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
238
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
238
239
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
239
240
|
|
240
241
|
@property
|
241
242
|
@pulumi.getter(name="tokenMaxTtl")
|
242
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
243
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
243
244
|
"""
|
244
245
|
(Optional) The maximum lifetime for generated tokens in number of seconds.
|
245
246
|
Its current value will be referenced at renewal time.
|
@@ -247,12 +248,12 @@ class AuthBackendArgs:
|
|
247
248
|
return pulumi.get(self, "token_max_ttl")
|
248
249
|
|
249
250
|
@token_max_ttl.setter
|
250
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
251
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
251
252
|
pulumi.set(self, "token_max_ttl", value)
|
252
253
|
|
253
254
|
@property
|
254
255
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
255
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
256
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
|
256
257
|
"""
|
257
258
|
(Optional) If set, the default policy will not be set on
|
258
259
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
@@ -260,12 +261,12 @@ class AuthBackendArgs:
|
|
260
261
|
return pulumi.get(self, "token_no_default_policy")
|
261
262
|
|
262
263
|
@token_no_default_policy.setter
|
263
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
|
264
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
|
264
265
|
pulumi.set(self, "token_no_default_policy", value)
|
265
266
|
|
266
267
|
@property
|
267
268
|
@pulumi.getter(name="tokenNumUses")
|
268
|
-
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
269
|
+
def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
|
269
270
|
"""
|
270
271
|
(Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
271
272
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
@@ -273,12 +274,12 @@ class AuthBackendArgs:
|
|
273
274
|
return pulumi.get(self, "token_num_uses")
|
274
275
|
|
275
276
|
@token_num_uses.setter
|
276
|
-
def token_num_uses(self, value: Optional[pulumi.Input[int]]):
|
277
|
+
def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
|
277
278
|
pulumi.set(self, "token_num_uses", value)
|
278
279
|
|
279
280
|
@property
|
280
281
|
@pulumi.getter(name="tokenPeriod")
|
281
|
-
def token_period(self) -> Optional[pulumi.Input[int]]:
|
282
|
+
def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
282
283
|
"""
|
283
284
|
(Optional) If set, indicates that the
|
284
285
|
token generated using this role should never expire. The token should be renewed within the
|
@@ -288,12 +289,12 @@ class AuthBackendArgs:
|
|
288
289
|
return pulumi.get(self, "token_period")
|
289
290
|
|
290
291
|
@token_period.setter
|
291
|
-
def token_period(self, value: Optional[pulumi.Input[int]]):
|
292
|
+
def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
292
293
|
pulumi.set(self, "token_period", value)
|
293
294
|
|
294
295
|
@property
|
295
296
|
@pulumi.getter(name="tokenPolicies")
|
296
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
297
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
297
298
|
"""
|
298
299
|
(Optional) List of policies to encode onto generated tokens. Depending
|
299
300
|
on the auth method, this list may be supplemented by user/group/other values.
|
@@ -301,12 +302,12 @@ class AuthBackendArgs:
|
|
301
302
|
return pulumi.get(self, "token_policies")
|
302
303
|
|
303
304
|
@token_policies.setter
|
304
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
305
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
305
306
|
pulumi.set(self, "token_policies", value)
|
306
307
|
|
307
308
|
@property
|
308
309
|
@pulumi.getter(name="tokenTtl")
|
309
|
-
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
310
|
+
def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
310
311
|
"""
|
311
312
|
(Optional) The incremental lifetime for generated tokens in number of seconds.
|
312
313
|
Its current value will be referenced at renewal time.
|
@@ -314,12 +315,12 @@ class AuthBackendArgs:
|
|
314
315
|
return pulumi.get(self, "token_ttl")
|
315
316
|
|
316
317
|
@token_ttl.setter
|
317
|
-
def token_ttl(self, value: Optional[pulumi.Input[int]]):
|
318
|
+
def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
318
319
|
pulumi.set(self, "token_ttl", value)
|
319
320
|
|
320
321
|
@property
|
321
322
|
@pulumi.getter(name="tokenType")
|
322
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
323
|
+
def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
323
324
|
"""
|
324
325
|
Specifies the type of tokens that should be returned by
|
325
326
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -327,7 +328,7 @@ class AuthBackendArgs:
|
|
327
328
|
return pulumi.get(self, "token_type")
|
328
329
|
|
329
330
|
@token_type.setter
|
330
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
331
|
+
def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
331
332
|
pulumi.set(self, "token_type", value)
|
332
333
|
|
333
334
|
@property
|
@@ -348,64 +349,64 @@ class AuthBackendArgs:
|
|
348
349
|
@pulumi.input_type
|
349
350
|
class _AuthBackendState:
|
350
351
|
def __init__(__self__, *,
|
351
|
-
accessor: Optional[pulumi.Input[str]] = None,
|
352
|
-
base_url: Optional[pulumi.Input[str]] = None,
|
353
|
-
description: Optional[pulumi.Input[str]] = None,
|
354
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
355
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
356
|
-
organization: Optional[pulumi.Input[str]] = None,
|
357
|
-
organization_id: Optional[pulumi.Input[int]] = None,
|
358
|
-
path: Optional[pulumi.Input[str]] = None,
|
359
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
360
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
361
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
362
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
363
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
364
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
365
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
366
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
367
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
352
|
+
accessor: Optional[pulumi.Input[builtins.str]] = None,
|
353
|
+
base_url: Optional[pulumi.Input[builtins.str]] = None,
|
354
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
355
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
356
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
357
|
+
organization: Optional[pulumi.Input[builtins.str]] = None,
|
358
|
+
organization_id: Optional[pulumi.Input[builtins.int]] = None,
|
359
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
360
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
361
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
362
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
363
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
364
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
365
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
366
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
367
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
368
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
368
369
|
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
|
369
370
|
"""
|
370
371
|
Input properties used for looking up and filtering AuthBackend resources.
|
371
|
-
:param pulumi.Input[str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
372
|
-
:param pulumi.Input[str] base_url: The API endpoint to use. Useful if you
|
372
|
+
:param pulumi.Input[builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
373
|
+
:param pulumi.Input[builtins.str] base_url: The API endpoint to use. Useful if you
|
373
374
|
are running GitHub Enterprise or an API-compatible authentication server.
|
374
|
-
:param pulumi.Input[str] description: Specifies the description of the mount.
|
375
|
+
:param pulumi.Input[builtins.str] description: Specifies the description of the mount.
|
375
376
|
This overrides the current stored value, if any.
|
376
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
377
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
377
378
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
378
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
379
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
379
380
|
The value should not contain leading or trailing forward slashes.
|
380
381
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
381
382
|
*Available only for Vault Enterprise*.
|
382
|
-
:param pulumi.Input[str] organization: The organization configured users must be part of.
|
383
|
-
:param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
|
383
|
+
:param pulumi.Input[builtins.str] organization: The organization configured users must be part of.
|
384
|
+
:param pulumi.Input[builtins.int] organization_id: The ID of the organization users must be part of.
|
384
385
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
385
|
-
:param pulumi.Input[str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
386
|
+
:param pulumi.Input[builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
386
387
|
if not specified.
|
387
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
388
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
388
389
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
389
390
|
as well.
|
390
|
-
:param pulumi.Input[int] token_explicit_max_ttl: (Optional) If set, will encode an
|
391
|
+
:param pulumi.Input[builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
|
391
392
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
392
393
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
393
394
|
`token_max_ttl` would otherwise allow a renewal.
|
394
|
-
:param pulumi.Input[int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
395
|
+
:param pulumi.Input[builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
395
396
|
Its current value will be referenced at renewal time.
|
396
|
-
:param pulumi.Input[bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
397
|
+
:param pulumi.Input[builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
397
398
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
398
|
-
:param pulumi.Input[int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
399
|
+
:param pulumi.Input[builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
399
400
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
400
|
-
:param pulumi.Input[int] token_period: (Optional) If set, indicates that the
|
401
|
+
:param pulumi.Input[builtins.int] token_period: (Optional) If set, indicates that the
|
401
402
|
token generated using this role should never expire. The token should be renewed within the
|
402
403
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
403
404
|
value of this field. Specified in seconds.
|
404
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
405
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
405
406
|
on the auth method, this list may be supplemented by user/group/other values.
|
406
|
-
:param pulumi.Input[int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
407
|
+
:param pulumi.Input[builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
407
408
|
Its current value will be referenced at renewal time.
|
408
|
-
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
409
|
+
:param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
|
409
410
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
410
411
|
:param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
411
412
|
|
@@ -450,19 +451,19 @@ class _AuthBackendState:
|
|
450
451
|
|
451
452
|
@property
|
452
453
|
@pulumi.getter
|
453
|
-
def accessor(self) -> Optional[pulumi.Input[str]]:
|
454
|
+
def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
|
454
455
|
"""
|
455
456
|
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
456
457
|
"""
|
457
458
|
return pulumi.get(self, "accessor")
|
458
459
|
|
459
460
|
@accessor.setter
|
460
|
-
def accessor(self, value: Optional[pulumi.Input[str]]):
|
461
|
+
def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
|
461
462
|
pulumi.set(self, "accessor", value)
|
462
463
|
|
463
464
|
@property
|
464
465
|
@pulumi.getter(name="baseUrl")
|
465
|
-
def base_url(self) -> Optional[pulumi.Input[str]]:
|
466
|
+
def base_url(self) -> Optional[pulumi.Input[builtins.str]]:
|
466
467
|
"""
|
467
468
|
The API endpoint to use. Useful if you
|
468
469
|
are running GitHub Enterprise or an API-compatible authentication server.
|
@@ -470,12 +471,12 @@ class _AuthBackendState:
|
|
470
471
|
return pulumi.get(self, "base_url")
|
471
472
|
|
472
473
|
@base_url.setter
|
473
|
-
def base_url(self, value: Optional[pulumi.Input[str]]):
|
474
|
+
def base_url(self, value: Optional[pulumi.Input[builtins.str]]):
|
474
475
|
pulumi.set(self, "base_url", value)
|
475
476
|
|
476
477
|
@property
|
477
478
|
@pulumi.getter
|
478
|
-
def description(self) -> Optional[pulumi.Input[str]]:
|
479
|
+
def description(self) -> Optional[pulumi.Input[builtins.str]]:
|
479
480
|
"""
|
480
481
|
Specifies the description of the mount.
|
481
482
|
This overrides the current stored value, if any.
|
@@ -483,12 +484,12 @@ class _AuthBackendState:
|
|
483
484
|
return pulumi.get(self, "description")
|
484
485
|
|
485
486
|
@description.setter
|
486
|
-
def description(self, value: Optional[pulumi.Input[str]]):
|
487
|
+
def description(self, value: Optional[pulumi.Input[builtins.str]]):
|
487
488
|
pulumi.set(self, "description", value)
|
488
489
|
|
489
490
|
@property
|
490
491
|
@pulumi.getter(name="disableRemount")
|
491
|
-
def disable_remount(self) -> Optional[pulumi.Input[bool]]:
|
492
|
+
def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
|
492
493
|
"""
|
493
494
|
If set, opts out of mount migration on path updates.
|
494
495
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -496,12 +497,12 @@ class _AuthBackendState:
|
|
496
497
|
return pulumi.get(self, "disable_remount")
|
497
498
|
|
498
499
|
@disable_remount.setter
|
499
|
-
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
500
|
+
def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
|
500
501
|
pulumi.set(self, "disable_remount", value)
|
501
502
|
|
502
503
|
@property
|
503
504
|
@pulumi.getter
|
504
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
505
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
505
506
|
"""
|
506
507
|
The namespace to provision the resource in.
|
507
508
|
The value should not contain leading or trailing forward slashes.
|
@@ -511,24 +512,24 @@ class _AuthBackendState:
|
|
511
512
|
return pulumi.get(self, "namespace")
|
512
513
|
|
513
514
|
@namespace.setter
|
514
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
515
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
515
516
|
pulumi.set(self, "namespace", value)
|
516
517
|
|
517
518
|
@property
|
518
519
|
@pulumi.getter
|
519
|
-
def organization(self) -> Optional[pulumi.Input[str]]:
|
520
|
+
def organization(self) -> Optional[pulumi.Input[builtins.str]]:
|
520
521
|
"""
|
521
522
|
The organization configured users must be part of.
|
522
523
|
"""
|
523
524
|
return pulumi.get(self, "organization")
|
524
525
|
|
525
526
|
@organization.setter
|
526
|
-
def organization(self, value: Optional[pulumi.Input[str]]):
|
527
|
+
def organization(self, value: Optional[pulumi.Input[builtins.str]]):
|
527
528
|
pulumi.set(self, "organization", value)
|
528
529
|
|
529
530
|
@property
|
530
531
|
@pulumi.getter(name="organizationId")
|
531
|
-
def organization_id(self) -> Optional[pulumi.Input[int]]:
|
532
|
+
def organization_id(self) -> Optional[pulumi.Input[builtins.int]]:
|
532
533
|
"""
|
533
534
|
The ID of the organization users must be part of.
|
534
535
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
@@ -536,12 +537,12 @@ class _AuthBackendState:
|
|
536
537
|
return pulumi.get(self, "organization_id")
|
537
538
|
|
538
539
|
@organization_id.setter
|
539
|
-
def organization_id(self, value: Optional[pulumi.Input[int]]):
|
540
|
+
def organization_id(self, value: Optional[pulumi.Input[builtins.int]]):
|
540
541
|
pulumi.set(self, "organization_id", value)
|
541
542
|
|
542
543
|
@property
|
543
544
|
@pulumi.getter
|
544
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
545
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
545
546
|
"""
|
546
547
|
Path where the auth backend is mounted. Defaults to `auth/github`
|
547
548
|
if not specified.
|
@@ -549,12 +550,12 @@ class _AuthBackendState:
|
|
549
550
|
return pulumi.get(self, "path")
|
550
551
|
|
551
552
|
@path.setter
|
552
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
553
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
553
554
|
pulumi.set(self, "path", value)
|
554
555
|
|
555
556
|
@property
|
556
557
|
@pulumi.getter(name="tokenBoundCidrs")
|
557
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
558
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
558
559
|
"""
|
559
560
|
(Optional) List of CIDR blocks; if set, specifies blocks of IP
|
560
561
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
@@ -563,12 +564,12 @@ class _AuthBackendState:
|
|
563
564
|
return pulumi.get(self, "token_bound_cidrs")
|
564
565
|
|
565
566
|
@token_bound_cidrs.setter
|
566
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
567
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
567
568
|
pulumi.set(self, "token_bound_cidrs", value)
|
568
569
|
|
569
570
|
@property
|
570
571
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
571
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
572
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
572
573
|
"""
|
573
574
|
(Optional) If set, will encode an
|
574
575
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
@@ -578,12 +579,12 @@ class _AuthBackendState:
|
|
578
579
|
return pulumi.get(self, "token_explicit_max_ttl")
|
579
580
|
|
580
581
|
@token_explicit_max_ttl.setter
|
581
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
582
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
582
583
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
583
584
|
|
584
585
|
@property
|
585
586
|
@pulumi.getter(name="tokenMaxTtl")
|
586
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
587
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
587
588
|
"""
|
588
589
|
(Optional) The maximum lifetime for generated tokens in number of seconds.
|
589
590
|
Its current value will be referenced at renewal time.
|
@@ -591,12 +592,12 @@ class _AuthBackendState:
|
|
591
592
|
return pulumi.get(self, "token_max_ttl")
|
592
593
|
|
593
594
|
@token_max_ttl.setter
|
594
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
595
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
595
596
|
pulumi.set(self, "token_max_ttl", value)
|
596
597
|
|
597
598
|
@property
|
598
599
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
599
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
600
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
|
600
601
|
"""
|
601
602
|
(Optional) If set, the default policy will not be set on
|
602
603
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
@@ -604,12 +605,12 @@ class _AuthBackendState:
|
|
604
605
|
return pulumi.get(self, "token_no_default_policy")
|
605
606
|
|
606
607
|
@token_no_default_policy.setter
|
607
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
|
608
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
|
608
609
|
pulumi.set(self, "token_no_default_policy", value)
|
609
610
|
|
610
611
|
@property
|
611
612
|
@pulumi.getter(name="tokenNumUses")
|
612
|
-
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
613
|
+
def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
|
613
614
|
"""
|
614
615
|
(Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
615
616
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
@@ -617,12 +618,12 @@ class _AuthBackendState:
|
|
617
618
|
return pulumi.get(self, "token_num_uses")
|
618
619
|
|
619
620
|
@token_num_uses.setter
|
620
|
-
def token_num_uses(self, value: Optional[pulumi.Input[int]]):
|
621
|
+
def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
|
621
622
|
pulumi.set(self, "token_num_uses", value)
|
622
623
|
|
623
624
|
@property
|
624
625
|
@pulumi.getter(name="tokenPeriod")
|
625
|
-
def token_period(self) -> Optional[pulumi.Input[int]]:
|
626
|
+
def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
626
627
|
"""
|
627
628
|
(Optional) If set, indicates that the
|
628
629
|
token generated using this role should never expire. The token should be renewed within the
|
@@ -632,12 +633,12 @@ class _AuthBackendState:
|
|
632
633
|
return pulumi.get(self, "token_period")
|
633
634
|
|
634
635
|
@token_period.setter
|
635
|
-
def token_period(self, value: Optional[pulumi.Input[int]]):
|
636
|
+
def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
636
637
|
pulumi.set(self, "token_period", value)
|
637
638
|
|
638
639
|
@property
|
639
640
|
@pulumi.getter(name="tokenPolicies")
|
640
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
641
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
641
642
|
"""
|
642
643
|
(Optional) List of policies to encode onto generated tokens. Depending
|
643
644
|
on the auth method, this list may be supplemented by user/group/other values.
|
@@ -645,12 +646,12 @@ class _AuthBackendState:
|
|
645
646
|
return pulumi.get(self, "token_policies")
|
646
647
|
|
647
648
|
@token_policies.setter
|
648
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
649
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
649
650
|
pulumi.set(self, "token_policies", value)
|
650
651
|
|
651
652
|
@property
|
652
653
|
@pulumi.getter(name="tokenTtl")
|
653
|
-
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
654
|
+
def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
654
655
|
"""
|
655
656
|
(Optional) The incremental lifetime for generated tokens in number of seconds.
|
656
657
|
Its current value will be referenced at renewal time.
|
@@ -658,12 +659,12 @@ class _AuthBackendState:
|
|
658
659
|
return pulumi.get(self, "token_ttl")
|
659
660
|
|
660
661
|
@token_ttl.setter
|
661
|
-
def token_ttl(self, value: Optional[pulumi.Input[int]]):
|
662
|
+
def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
662
663
|
pulumi.set(self, "token_ttl", value)
|
663
664
|
|
664
665
|
@property
|
665
666
|
@pulumi.getter(name="tokenType")
|
666
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
667
|
+
def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
667
668
|
"""
|
668
669
|
Specifies the type of tokens that should be returned by
|
669
670
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -671,7 +672,7 @@ class _AuthBackendState:
|
|
671
672
|
return pulumi.get(self, "token_type")
|
672
673
|
|
673
674
|
@token_type.setter
|
674
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
675
|
+
def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
675
676
|
pulumi.set(self, "token_type", value)
|
676
677
|
|
677
678
|
@property
|
@@ -694,22 +695,22 @@ class AuthBackend(pulumi.CustomResource):
|
|
694
695
|
def __init__(__self__,
|
695
696
|
resource_name: str,
|
696
697
|
opts: Optional[pulumi.ResourceOptions] = None,
|
697
|
-
base_url: Optional[pulumi.Input[str]] = None,
|
698
|
-
description: Optional[pulumi.Input[str]] = None,
|
699
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
700
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
701
|
-
organization: Optional[pulumi.Input[str]] = None,
|
702
|
-
organization_id: Optional[pulumi.Input[int]] = None,
|
703
|
-
path: Optional[pulumi.Input[str]] = None,
|
704
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
705
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
706
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
707
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
708
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
709
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
710
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
711
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
712
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
698
|
+
base_url: Optional[pulumi.Input[builtins.str]] = None,
|
699
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
700
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
701
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
702
|
+
organization: Optional[pulumi.Input[builtins.str]] = None,
|
703
|
+
organization_id: Optional[pulumi.Input[builtins.int]] = None,
|
704
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
705
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
706
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
707
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
708
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
709
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
710
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
711
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
712
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
713
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
713
714
|
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
714
715
|
__props__=None):
|
715
716
|
"""
|
@@ -736,43 +737,43 @@ class AuthBackend(pulumi.CustomResource):
|
|
736
737
|
|
737
738
|
:param str resource_name: The name of the resource.
|
738
739
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
739
|
-
:param pulumi.Input[str] base_url: The API endpoint to use. Useful if you
|
740
|
+
:param pulumi.Input[builtins.str] base_url: The API endpoint to use. Useful if you
|
740
741
|
are running GitHub Enterprise or an API-compatible authentication server.
|
741
|
-
:param pulumi.Input[str] description: Specifies the description of the mount.
|
742
|
+
:param pulumi.Input[builtins.str] description: Specifies the description of the mount.
|
742
743
|
This overrides the current stored value, if any.
|
743
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
744
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
744
745
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
745
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
746
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
746
747
|
The value should not contain leading or trailing forward slashes.
|
747
748
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
748
749
|
*Available only for Vault Enterprise*.
|
749
|
-
:param pulumi.Input[str] organization: The organization configured users must be part of.
|
750
|
-
:param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
|
750
|
+
:param pulumi.Input[builtins.str] organization: The organization configured users must be part of.
|
751
|
+
:param pulumi.Input[builtins.int] organization_id: The ID of the organization users must be part of.
|
751
752
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
752
|
-
:param pulumi.Input[str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
753
|
+
:param pulumi.Input[builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
753
754
|
if not specified.
|
754
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
755
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
755
756
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
756
757
|
as well.
|
757
|
-
:param pulumi.Input[int] token_explicit_max_ttl: (Optional) If set, will encode an
|
758
|
+
:param pulumi.Input[builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
|
758
759
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
759
760
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
760
761
|
`token_max_ttl` would otherwise allow a renewal.
|
761
|
-
:param pulumi.Input[int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
762
|
+
:param pulumi.Input[builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
762
763
|
Its current value will be referenced at renewal time.
|
763
|
-
:param pulumi.Input[bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
764
|
+
:param pulumi.Input[builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
764
765
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
765
|
-
:param pulumi.Input[int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
766
|
+
:param pulumi.Input[builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
766
767
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
767
|
-
:param pulumi.Input[int] token_period: (Optional) If set, indicates that the
|
768
|
+
:param pulumi.Input[builtins.int] token_period: (Optional) If set, indicates that the
|
768
769
|
token generated using this role should never expire. The token should be renewed within the
|
769
770
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
770
771
|
value of this field. Specified in seconds.
|
771
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
772
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
772
773
|
on the auth method, this list may be supplemented by user/group/other values.
|
773
|
-
:param pulumi.Input[int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
774
|
+
:param pulumi.Input[builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
774
775
|
Its current value will be referenced at renewal time.
|
775
|
-
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
776
|
+
:param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
|
776
777
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
777
778
|
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
778
779
|
|
@@ -821,22 +822,22 @@ class AuthBackend(pulumi.CustomResource):
|
|
821
822
|
def _internal_init(__self__,
|
822
823
|
resource_name: str,
|
823
824
|
opts: Optional[pulumi.ResourceOptions] = None,
|
824
|
-
base_url: Optional[pulumi.Input[str]] = None,
|
825
|
-
description: Optional[pulumi.Input[str]] = None,
|
826
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
827
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
828
|
-
organization: Optional[pulumi.Input[str]] = None,
|
829
|
-
organization_id: Optional[pulumi.Input[int]] = None,
|
830
|
-
path: Optional[pulumi.Input[str]] = None,
|
831
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
832
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
833
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
834
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
835
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
836
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
837
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
838
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
839
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
825
|
+
base_url: Optional[pulumi.Input[builtins.str]] = None,
|
826
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
827
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
828
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
829
|
+
organization: Optional[pulumi.Input[builtins.str]] = None,
|
830
|
+
organization_id: Optional[pulumi.Input[builtins.int]] = None,
|
831
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
832
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
833
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
834
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
835
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
836
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
837
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
838
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
839
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
840
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
840
841
|
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
841
842
|
__props__=None):
|
842
843
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -877,23 +878,23 @@ class AuthBackend(pulumi.CustomResource):
|
|
877
878
|
def get(resource_name: str,
|
878
879
|
id: pulumi.Input[str],
|
879
880
|
opts: Optional[pulumi.ResourceOptions] = None,
|
880
|
-
accessor: Optional[pulumi.Input[str]] = None,
|
881
|
-
base_url: Optional[pulumi.Input[str]] = None,
|
882
|
-
description: Optional[pulumi.Input[str]] = None,
|
883
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
884
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
885
|
-
organization: Optional[pulumi.Input[str]] = None,
|
886
|
-
organization_id: Optional[pulumi.Input[int]] = None,
|
887
|
-
path: Optional[pulumi.Input[str]] = None,
|
888
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
889
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
890
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
891
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
892
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
893
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
894
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
895
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
896
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
881
|
+
accessor: Optional[pulumi.Input[builtins.str]] = None,
|
882
|
+
base_url: Optional[pulumi.Input[builtins.str]] = None,
|
883
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
884
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
885
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
886
|
+
organization: Optional[pulumi.Input[builtins.str]] = None,
|
887
|
+
organization_id: Optional[pulumi.Input[builtins.int]] = None,
|
888
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
889
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
890
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
891
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
892
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
893
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
894
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
895
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
896
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
897
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
897
898
|
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
|
898
899
|
"""
|
899
900
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
@@ -902,44 +903,44 @@ class AuthBackend(pulumi.CustomResource):
|
|
902
903
|
:param str resource_name: The unique name of the resulting resource.
|
903
904
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
904
905
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
905
|
-
:param pulumi.Input[str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
906
|
-
:param pulumi.Input[str] base_url: The API endpoint to use. Useful if you
|
906
|
+
:param pulumi.Input[builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
907
|
+
:param pulumi.Input[builtins.str] base_url: The API endpoint to use. Useful if you
|
907
908
|
are running GitHub Enterprise or an API-compatible authentication server.
|
908
|
-
:param pulumi.Input[str] description: Specifies the description of the mount.
|
909
|
+
:param pulumi.Input[builtins.str] description: Specifies the description of the mount.
|
909
910
|
This overrides the current stored value, if any.
|
910
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
911
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
911
912
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
912
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
913
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
913
914
|
The value should not contain leading or trailing forward slashes.
|
914
915
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
915
916
|
*Available only for Vault Enterprise*.
|
916
|
-
:param pulumi.Input[str] organization: The organization configured users must be part of.
|
917
|
-
:param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
|
917
|
+
:param pulumi.Input[builtins.str] organization: The organization configured users must be part of.
|
918
|
+
:param pulumi.Input[builtins.int] organization_id: The ID of the organization users must be part of.
|
918
919
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
919
|
-
:param pulumi.Input[str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
920
|
+
:param pulumi.Input[builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
920
921
|
if not specified.
|
921
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
922
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
922
923
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
923
924
|
as well.
|
924
|
-
:param pulumi.Input[int] token_explicit_max_ttl: (Optional) If set, will encode an
|
925
|
+
:param pulumi.Input[builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
|
925
926
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
926
927
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
927
928
|
`token_max_ttl` would otherwise allow a renewal.
|
928
|
-
:param pulumi.Input[int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
929
|
+
:param pulumi.Input[builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
929
930
|
Its current value will be referenced at renewal time.
|
930
|
-
:param pulumi.Input[bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
931
|
+
:param pulumi.Input[builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
931
932
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
932
|
-
:param pulumi.Input[int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
933
|
+
:param pulumi.Input[builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
933
934
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
934
|
-
:param pulumi.Input[int] token_period: (Optional) If set, indicates that the
|
935
|
+
:param pulumi.Input[builtins.int] token_period: (Optional) If set, indicates that the
|
935
936
|
token generated using this role should never expire. The token should be renewed within the
|
936
937
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
937
938
|
value of this field. Specified in seconds.
|
938
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
939
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
939
940
|
on the auth method, this list may be supplemented by user/group/other values.
|
940
|
-
:param pulumi.Input[int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
941
|
+
:param pulumi.Input[builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
941
942
|
Its current value will be referenced at renewal time.
|
942
|
-
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
943
|
+
:param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
|
943
944
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
944
945
|
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
945
946
|
|
@@ -971,7 +972,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
971
972
|
|
972
973
|
@property
|
973
974
|
@pulumi.getter
|
974
|
-
def accessor(self) -> pulumi.Output[str]:
|
975
|
+
def accessor(self) -> pulumi.Output[builtins.str]:
|
975
976
|
"""
|
976
977
|
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
977
978
|
"""
|
@@ -979,7 +980,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
979
980
|
|
980
981
|
@property
|
981
982
|
@pulumi.getter(name="baseUrl")
|
982
|
-
def base_url(self) -> pulumi.Output[Optional[str]]:
|
983
|
+
def base_url(self) -> pulumi.Output[Optional[builtins.str]]:
|
983
984
|
"""
|
984
985
|
The API endpoint to use. Useful if you
|
985
986
|
are running GitHub Enterprise or an API-compatible authentication server.
|
@@ -988,7 +989,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
988
989
|
|
989
990
|
@property
|
990
991
|
@pulumi.getter
|
991
|
-
def description(self) -> pulumi.Output[Optional[str]]:
|
992
|
+
def description(self) -> pulumi.Output[Optional[builtins.str]]:
|
992
993
|
"""
|
993
994
|
Specifies the description of the mount.
|
994
995
|
This overrides the current stored value, if any.
|
@@ -997,7 +998,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
997
998
|
|
998
999
|
@property
|
999
1000
|
@pulumi.getter(name="disableRemount")
|
1000
|
-
def disable_remount(self) -> pulumi.Output[Optional[bool]]:
|
1001
|
+
def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
|
1001
1002
|
"""
|
1002
1003
|
If set, opts out of mount migration on path updates.
|
1003
1004
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -1006,7 +1007,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1006
1007
|
|
1007
1008
|
@property
|
1008
1009
|
@pulumi.getter
|
1009
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
1010
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
1010
1011
|
"""
|
1011
1012
|
The namespace to provision the resource in.
|
1012
1013
|
The value should not contain leading or trailing forward slashes.
|
@@ -1017,7 +1018,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1017
1018
|
|
1018
1019
|
@property
|
1019
1020
|
@pulumi.getter
|
1020
|
-
def organization(self) -> pulumi.Output[str]:
|
1021
|
+
def organization(self) -> pulumi.Output[builtins.str]:
|
1021
1022
|
"""
|
1022
1023
|
The organization configured users must be part of.
|
1023
1024
|
"""
|
@@ -1025,7 +1026,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1025
1026
|
|
1026
1027
|
@property
|
1027
1028
|
@pulumi.getter(name="organizationId")
|
1028
|
-
def organization_id(self) -> pulumi.Output[int]:
|
1029
|
+
def organization_id(self) -> pulumi.Output[builtins.int]:
|
1029
1030
|
"""
|
1030
1031
|
The ID of the organization users must be part of.
|
1031
1032
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
@@ -1034,7 +1035,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1034
1035
|
|
1035
1036
|
@property
|
1036
1037
|
@pulumi.getter
|
1037
|
-
def path(self) -> pulumi.Output[Optional[str]]:
|
1038
|
+
def path(self) -> pulumi.Output[Optional[builtins.str]]:
|
1038
1039
|
"""
|
1039
1040
|
Path where the auth backend is mounted. Defaults to `auth/github`
|
1040
1041
|
if not specified.
|
@@ -1043,7 +1044,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1043
1044
|
|
1044
1045
|
@property
|
1045
1046
|
@pulumi.getter(name="tokenBoundCidrs")
|
1046
|
-
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1047
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
1047
1048
|
"""
|
1048
1049
|
(Optional) List of CIDR blocks; if set, specifies blocks of IP
|
1049
1050
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
@@ -1053,7 +1054,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1053
1054
|
|
1054
1055
|
@property
|
1055
1056
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1056
|
-
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1057
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
1057
1058
|
"""
|
1058
1059
|
(Optional) If set, will encode an
|
1059
1060
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
@@ -1064,7 +1065,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1064
1065
|
|
1065
1066
|
@property
|
1066
1067
|
@pulumi.getter(name="tokenMaxTtl")
|
1067
|
-
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1068
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
1068
1069
|
"""
|
1069
1070
|
(Optional) The maximum lifetime for generated tokens in number of seconds.
|
1070
1071
|
Its current value will be referenced at renewal time.
|
@@ -1073,7 +1074,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1073
1074
|
|
1074
1075
|
@property
|
1075
1076
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1076
|
-
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1077
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
|
1077
1078
|
"""
|
1078
1079
|
(Optional) If set, the default policy will not be set on
|
1079
1080
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
@@ -1082,7 +1083,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1082
1083
|
|
1083
1084
|
@property
|
1084
1085
|
@pulumi.getter(name="tokenNumUses")
|
1085
|
-
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1086
|
+
def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
|
1086
1087
|
"""
|
1087
1088
|
(Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
1088
1089
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
@@ -1091,7 +1092,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1091
1092
|
|
1092
1093
|
@property
|
1093
1094
|
@pulumi.getter(name="tokenPeriod")
|
1094
|
-
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1095
|
+
def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
|
1095
1096
|
"""
|
1096
1097
|
(Optional) If set, indicates that the
|
1097
1098
|
token generated using this role should never expire. The token should be renewed within the
|
@@ -1102,7 +1103,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1102
1103
|
|
1103
1104
|
@property
|
1104
1105
|
@pulumi.getter(name="tokenPolicies")
|
1105
|
-
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1106
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
1106
1107
|
"""
|
1107
1108
|
(Optional) List of policies to encode onto generated tokens. Depending
|
1108
1109
|
on the auth method, this list may be supplemented by user/group/other values.
|
@@ -1111,7 +1112,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1111
1112
|
|
1112
1113
|
@property
|
1113
1114
|
@pulumi.getter(name="tokenTtl")
|
1114
|
-
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1115
|
+
def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
1115
1116
|
"""
|
1116
1117
|
(Optional) The incremental lifetime for generated tokens in number of seconds.
|
1117
1118
|
Its current value will be referenced at renewal time.
|
@@ -1120,7 +1121,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1120
1121
|
|
1121
1122
|
@property
|
1122
1123
|
@pulumi.getter(name="tokenType")
|
1123
|
-
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1124
|
+
def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
|
1124
1125
|
"""
|
1125
1126
|
Specifies the type of tokens that should be returned by
|
1126
1127
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|