pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,99 +20,99 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class AuthBackendArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
url: pulumi.Input[str],
|
23
|
-
binddn: Optional[pulumi.Input[str]] = None,
|
24
|
-
bindpass: Optional[pulumi.Input[str]] = None,
|
25
|
-
case_sensitive_names: Optional[pulumi.Input[bool]] = None,
|
26
|
-
certificate: Optional[pulumi.Input[str]] = None,
|
27
|
-
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
28
|
-
client_tls_key: Optional[pulumi.Input[str]] = None,
|
29
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
30
|
-
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
31
|
-
description: Optional[pulumi.Input[str]] = None,
|
32
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
33
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
34
|
-
discoverdn: Optional[pulumi.Input[bool]] = None,
|
35
|
-
groupattr: Optional[pulumi.Input[str]] = None,
|
36
|
-
groupdn: Optional[pulumi.Input[str]] = None,
|
37
|
-
groupfilter: Optional[pulumi.Input[str]] = None,
|
38
|
-
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
39
|
-
local: Optional[pulumi.Input[bool]] = None,
|
40
|
-
max_page_size: Optional[pulumi.Input[int]] = None,
|
41
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
42
|
-
path: Optional[pulumi.Input[str]] = None,
|
43
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
44
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
45
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
46
|
-
starttls: Optional[pulumi.Input[bool]] = None,
|
47
|
-
tls_max_version: Optional[pulumi.Input[str]] = None,
|
48
|
-
tls_min_version: Optional[pulumi.Input[str]] = None,
|
49
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
50
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
51
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
52
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
53
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
54
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
55
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
56
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
57
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
58
|
-
upndomain: Optional[pulumi.Input[str]] = None,
|
59
|
-
use_token_groups: Optional[pulumi.Input[bool]] = None,
|
60
|
-
userattr: Optional[pulumi.Input[str]] = None,
|
61
|
-
userdn: Optional[pulumi.Input[str]] = None,
|
62
|
-
userfilter: Optional[pulumi.Input[str]] = None,
|
63
|
-
username_as_alias: Optional[pulumi.Input[bool]] = None):
|
23
|
+
url: pulumi.Input[builtins.str],
|
24
|
+
binddn: Optional[pulumi.Input[builtins.str]] = None,
|
25
|
+
bindpass: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
|
27
|
+
certificate: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
|
29
|
+
client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
|
30
|
+
connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
|
31
|
+
deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
|
32
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
33
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
34
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
35
|
+
discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
|
36
|
+
groupattr: Optional[pulumi.Input[builtins.str]] = None,
|
37
|
+
groupdn: Optional[pulumi.Input[builtins.str]] = None,
|
38
|
+
groupfilter: Optional[pulumi.Input[builtins.str]] = None,
|
39
|
+
insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
|
40
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
41
|
+
max_page_size: Optional[pulumi.Input[builtins.int]] = None,
|
42
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
43
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
44
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
45
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
46
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
47
|
+
starttls: Optional[pulumi.Input[builtins.bool]] = None,
|
48
|
+
tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
|
49
|
+
tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
|
50
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
51
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
52
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
53
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
54
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
55
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
56
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
57
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
58
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
59
|
+
upndomain: Optional[pulumi.Input[builtins.str]] = None,
|
60
|
+
use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
|
61
|
+
userattr: Optional[pulumi.Input[builtins.str]] = None,
|
62
|
+
userdn: Optional[pulumi.Input[builtins.str]] = None,
|
63
|
+
userfilter: Optional[pulumi.Input[builtins.str]] = None,
|
64
|
+
username_as_alias: Optional[pulumi.Input[builtins.bool]] = None):
|
64
65
|
"""
|
65
66
|
The set of arguments for constructing a AuthBackend resource.
|
66
|
-
:param pulumi.Input[str] url: The URL of the LDAP server
|
67
|
-
:param pulumi.Input[str] binddn: DN of object to bind when performing user search
|
68
|
-
:param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
|
69
|
-
:param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
70
|
-
:param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
|
71
|
-
:param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
72
|
-
:param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
73
|
-
:param pulumi.Input[str] description: Description for the LDAP auth backend mount
|
74
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
75
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
67
|
+
:param pulumi.Input[builtins.str] url: The URL of the LDAP server
|
68
|
+
:param pulumi.Input[builtins.str] binddn: DN of object to bind when performing user search
|
69
|
+
:param pulumi.Input[builtins.str] bindpass: Password to use with `binddn` when performing user search
|
70
|
+
:param pulumi.Input[builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
71
|
+
:param pulumi.Input[builtins.str] certificate: Trusted CA to validate TLS certificate
|
72
|
+
:param pulumi.Input[builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
73
|
+
:param pulumi.Input[builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
74
|
+
:param pulumi.Input[builtins.str] description: Description for the LDAP auth backend mount
|
75
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
76
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
76
77
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
77
|
-
:param pulumi.Input[bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
|
78
|
-
:param pulumi.Input[str] groupattr: LDAP attribute to follow on objects returned by groupfilter
|
79
|
-
:param pulumi.Input[str] groupdn: Base DN under which to perform group search
|
80
|
-
:param pulumi.Input[str] groupfilter: Go template used to construct group membership query
|
81
|
-
:param pulumi.Input[bool] insecure_tls: Control whether or TLS certificates must be validated
|
82
|
-
:param pulumi.Input[bool] local: Specifies if the auth method is local only.
|
83
|
-
:param pulumi.Input[int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
|
78
|
+
:param pulumi.Input[builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
|
79
|
+
:param pulumi.Input[builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
|
80
|
+
:param pulumi.Input[builtins.str] groupdn: Base DN under which to perform group search
|
81
|
+
:param pulumi.Input[builtins.str] groupfilter: Go template used to construct group membership query
|
82
|
+
:param pulumi.Input[builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
|
83
|
+
:param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
|
84
|
+
:param pulumi.Input[builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
|
84
85
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
85
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
86
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
86
87
|
The value should not contain leading or trailing forward slashes.
|
87
88
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
88
89
|
*Available only for Vault Enterprise*.
|
89
|
-
:param pulumi.Input[str] path: Path to mount the LDAP auth backend under
|
90
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
90
|
+
:param pulumi.Input[builtins.str] path: Path to mount the LDAP auth backend under
|
91
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
91
92
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
92
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
93
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
93
94
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
94
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
95
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
95
96
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
96
97
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
97
|
-
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
98
|
-
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
99
|
-
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
100
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
101
|
-
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
102
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
103
|
-
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
104
|
-
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
105
|
-
:param pulumi.Input[int] token_period: Generated Token's Period
|
106
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
107
|
-
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
108
|
-
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
109
|
-
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
110
|
-
:param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
111
|
-
:param pulumi.Input[str] userattr: Attribute on user object matching username passed in
|
112
|
-
:param pulumi.Input[str] userdn: Base DN under which to perform user search
|
113
|
-
:param pulumi.Input[str] userfilter: LDAP user search filter
|
114
|
-
:param pulumi.Input[bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
|
98
|
+
:param pulumi.Input[builtins.bool] starttls: Control use of TLS when conecting to LDAP
|
99
|
+
:param pulumi.Input[builtins.str] tls_max_version: Maximum acceptable version of TLS
|
100
|
+
:param pulumi.Input[builtins.str] tls_min_version: Minimum acceptable version of TLS
|
101
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
102
|
+
:param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
103
|
+
:param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
104
|
+
:param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
105
|
+
:param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
106
|
+
:param pulumi.Input[builtins.int] token_period: Generated Token's Period
|
107
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
|
108
|
+
:param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
109
|
+
:param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
|
110
|
+
:param pulumi.Input[builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
111
|
+
:param pulumi.Input[builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
112
|
+
:param pulumi.Input[builtins.str] userattr: Attribute on user object matching username passed in
|
113
|
+
:param pulumi.Input[builtins.str] userdn: Base DN under which to perform user search
|
114
|
+
:param pulumi.Input[builtins.str] userfilter: LDAP user search filter
|
115
|
+
:param pulumi.Input[builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
|
115
116
|
"""
|
116
117
|
pulumi.set(__self__, "url", url)
|
117
118
|
if binddn is not None:
|
@@ -199,133 +200,133 @@ class AuthBackendArgs:
|
|
199
200
|
|
200
201
|
@property
|
201
202
|
@pulumi.getter
|
202
|
-
def url(self) -> pulumi.Input[str]:
|
203
|
+
def url(self) -> pulumi.Input[builtins.str]:
|
203
204
|
"""
|
204
205
|
The URL of the LDAP server
|
205
206
|
"""
|
206
207
|
return pulumi.get(self, "url")
|
207
208
|
|
208
209
|
@url.setter
|
209
|
-
def url(self, value: pulumi.Input[str]):
|
210
|
+
def url(self, value: pulumi.Input[builtins.str]):
|
210
211
|
pulumi.set(self, "url", value)
|
211
212
|
|
212
213
|
@property
|
213
214
|
@pulumi.getter
|
214
|
-
def binddn(self) -> Optional[pulumi.Input[str]]:
|
215
|
+
def binddn(self) -> Optional[pulumi.Input[builtins.str]]:
|
215
216
|
"""
|
216
217
|
DN of object to bind when performing user search
|
217
218
|
"""
|
218
219
|
return pulumi.get(self, "binddn")
|
219
220
|
|
220
221
|
@binddn.setter
|
221
|
-
def binddn(self, value: Optional[pulumi.Input[str]]):
|
222
|
+
def binddn(self, value: Optional[pulumi.Input[builtins.str]]):
|
222
223
|
pulumi.set(self, "binddn", value)
|
223
224
|
|
224
225
|
@property
|
225
226
|
@pulumi.getter
|
226
|
-
def bindpass(self) -> Optional[pulumi.Input[str]]:
|
227
|
+
def bindpass(self) -> Optional[pulumi.Input[builtins.str]]:
|
227
228
|
"""
|
228
229
|
Password to use with `binddn` when performing user search
|
229
230
|
"""
|
230
231
|
return pulumi.get(self, "bindpass")
|
231
232
|
|
232
233
|
@bindpass.setter
|
233
|
-
def bindpass(self, value: Optional[pulumi.Input[str]]):
|
234
|
+
def bindpass(self, value: Optional[pulumi.Input[builtins.str]]):
|
234
235
|
pulumi.set(self, "bindpass", value)
|
235
236
|
|
236
237
|
@property
|
237
238
|
@pulumi.getter(name="caseSensitiveNames")
|
238
|
-
def case_sensitive_names(self) -> Optional[pulumi.Input[bool]]:
|
239
|
+
def case_sensitive_names(self) -> Optional[pulumi.Input[builtins.bool]]:
|
239
240
|
"""
|
240
241
|
Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
241
242
|
"""
|
242
243
|
return pulumi.get(self, "case_sensitive_names")
|
243
244
|
|
244
245
|
@case_sensitive_names.setter
|
245
|
-
def case_sensitive_names(self, value: Optional[pulumi.Input[bool]]):
|
246
|
+
def case_sensitive_names(self, value: Optional[pulumi.Input[builtins.bool]]):
|
246
247
|
pulumi.set(self, "case_sensitive_names", value)
|
247
248
|
|
248
249
|
@property
|
249
250
|
@pulumi.getter
|
250
|
-
def certificate(self) -> Optional[pulumi.Input[str]]:
|
251
|
+
def certificate(self) -> Optional[pulumi.Input[builtins.str]]:
|
251
252
|
"""
|
252
253
|
Trusted CA to validate TLS certificate
|
253
254
|
"""
|
254
255
|
return pulumi.get(self, "certificate")
|
255
256
|
|
256
257
|
@certificate.setter
|
257
|
-
def certificate(self, value: Optional[pulumi.Input[str]]):
|
258
|
+
def certificate(self, value: Optional[pulumi.Input[builtins.str]]):
|
258
259
|
pulumi.set(self, "certificate", value)
|
259
260
|
|
260
261
|
@property
|
261
262
|
@pulumi.getter(name="clientTlsCert")
|
262
|
-
def client_tls_cert(self) -> Optional[pulumi.Input[str]]:
|
263
|
+
def client_tls_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
263
264
|
return pulumi.get(self, "client_tls_cert")
|
264
265
|
|
265
266
|
@client_tls_cert.setter
|
266
|
-
def client_tls_cert(self, value: Optional[pulumi.Input[str]]):
|
267
|
+
def client_tls_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
267
268
|
pulumi.set(self, "client_tls_cert", value)
|
268
269
|
|
269
270
|
@property
|
270
271
|
@pulumi.getter(name="clientTlsKey")
|
271
|
-
def client_tls_key(self) -> Optional[pulumi.Input[str]]:
|
272
|
+
def client_tls_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
272
273
|
return pulumi.get(self, "client_tls_key")
|
273
274
|
|
274
275
|
@client_tls_key.setter
|
275
|
-
def client_tls_key(self, value: Optional[pulumi.Input[str]]):
|
276
|
+
def client_tls_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
276
277
|
pulumi.set(self, "client_tls_key", value)
|
277
278
|
|
278
279
|
@property
|
279
280
|
@pulumi.getter(name="connectionTimeout")
|
280
|
-
def connection_timeout(self) -> Optional[pulumi.Input[int]]:
|
281
|
+
def connection_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
|
281
282
|
"""
|
282
283
|
Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
283
284
|
"""
|
284
285
|
return pulumi.get(self, "connection_timeout")
|
285
286
|
|
286
287
|
@connection_timeout.setter
|
287
|
-
def connection_timeout(self, value: Optional[pulumi.Input[int]]):
|
288
|
+
def connection_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
|
288
289
|
pulumi.set(self, "connection_timeout", value)
|
289
290
|
|
290
291
|
@property
|
291
292
|
@pulumi.getter(name="denyNullBind")
|
292
|
-
def deny_null_bind(self) -> Optional[pulumi.Input[bool]]:
|
293
|
+
def deny_null_bind(self) -> Optional[pulumi.Input[builtins.bool]]:
|
293
294
|
"""
|
294
295
|
Prevents users from bypassing authentication when providing an empty password.
|
295
296
|
"""
|
296
297
|
return pulumi.get(self, "deny_null_bind")
|
297
298
|
|
298
299
|
@deny_null_bind.setter
|
299
|
-
def deny_null_bind(self, value: Optional[pulumi.Input[bool]]):
|
300
|
+
def deny_null_bind(self, value: Optional[pulumi.Input[builtins.bool]]):
|
300
301
|
pulumi.set(self, "deny_null_bind", value)
|
301
302
|
|
302
303
|
@property
|
303
304
|
@pulumi.getter
|
304
|
-
def description(self) -> Optional[pulumi.Input[str]]:
|
305
|
+
def description(self) -> Optional[pulumi.Input[builtins.str]]:
|
305
306
|
"""
|
306
307
|
Description for the LDAP auth backend mount
|
307
308
|
"""
|
308
309
|
return pulumi.get(self, "description")
|
309
310
|
|
310
311
|
@description.setter
|
311
|
-
def description(self, value: Optional[pulumi.Input[str]]):
|
312
|
+
def description(self, value: Optional[pulumi.Input[builtins.str]]):
|
312
313
|
pulumi.set(self, "description", value)
|
313
314
|
|
314
315
|
@property
|
315
316
|
@pulumi.getter(name="disableAutomatedRotation")
|
316
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
317
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
317
318
|
"""
|
318
319
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
319
320
|
"""
|
320
321
|
return pulumi.get(self, "disable_automated_rotation")
|
321
322
|
|
322
323
|
@disable_automated_rotation.setter
|
323
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
324
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
324
325
|
pulumi.set(self, "disable_automated_rotation", value)
|
325
326
|
|
326
327
|
@property
|
327
328
|
@pulumi.getter(name="disableRemount")
|
328
|
-
def disable_remount(self) -> Optional[pulumi.Input[bool]]:
|
329
|
+
def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
|
329
330
|
"""
|
330
331
|
If set, opts out of mount migration on path updates.
|
331
332
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -333,84 +334,84 @@ class AuthBackendArgs:
|
|
333
334
|
return pulumi.get(self, "disable_remount")
|
334
335
|
|
335
336
|
@disable_remount.setter
|
336
|
-
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
337
|
+
def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
|
337
338
|
pulumi.set(self, "disable_remount", value)
|
338
339
|
|
339
340
|
@property
|
340
341
|
@pulumi.getter
|
341
|
-
def discoverdn(self) -> Optional[pulumi.Input[bool]]:
|
342
|
+
def discoverdn(self) -> Optional[pulumi.Input[builtins.bool]]:
|
342
343
|
"""
|
343
344
|
Use anonymous bind to discover the bind DN of a user.
|
344
345
|
"""
|
345
346
|
return pulumi.get(self, "discoverdn")
|
346
347
|
|
347
348
|
@discoverdn.setter
|
348
|
-
def discoverdn(self, value: Optional[pulumi.Input[bool]]):
|
349
|
+
def discoverdn(self, value: Optional[pulumi.Input[builtins.bool]]):
|
349
350
|
pulumi.set(self, "discoverdn", value)
|
350
351
|
|
351
352
|
@property
|
352
353
|
@pulumi.getter
|
353
|
-
def groupattr(self) -> Optional[pulumi.Input[str]]:
|
354
|
+
def groupattr(self) -> Optional[pulumi.Input[builtins.str]]:
|
354
355
|
"""
|
355
356
|
LDAP attribute to follow on objects returned by groupfilter
|
356
357
|
"""
|
357
358
|
return pulumi.get(self, "groupattr")
|
358
359
|
|
359
360
|
@groupattr.setter
|
360
|
-
def groupattr(self, value: Optional[pulumi.Input[str]]):
|
361
|
+
def groupattr(self, value: Optional[pulumi.Input[builtins.str]]):
|
361
362
|
pulumi.set(self, "groupattr", value)
|
362
363
|
|
363
364
|
@property
|
364
365
|
@pulumi.getter
|
365
|
-
def groupdn(self) -> Optional[pulumi.Input[str]]:
|
366
|
+
def groupdn(self) -> Optional[pulumi.Input[builtins.str]]:
|
366
367
|
"""
|
367
368
|
Base DN under which to perform group search
|
368
369
|
"""
|
369
370
|
return pulumi.get(self, "groupdn")
|
370
371
|
|
371
372
|
@groupdn.setter
|
372
|
-
def groupdn(self, value: Optional[pulumi.Input[str]]):
|
373
|
+
def groupdn(self, value: Optional[pulumi.Input[builtins.str]]):
|
373
374
|
pulumi.set(self, "groupdn", value)
|
374
375
|
|
375
376
|
@property
|
376
377
|
@pulumi.getter
|
377
|
-
def groupfilter(self) -> Optional[pulumi.Input[str]]:
|
378
|
+
def groupfilter(self) -> Optional[pulumi.Input[builtins.str]]:
|
378
379
|
"""
|
379
380
|
Go template used to construct group membership query
|
380
381
|
"""
|
381
382
|
return pulumi.get(self, "groupfilter")
|
382
383
|
|
383
384
|
@groupfilter.setter
|
384
|
-
def groupfilter(self, value: Optional[pulumi.Input[str]]):
|
385
|
+
def groupfilter(self, value: Optional[pulumi.Input[builtins.str]]):
|
385
386
|
pulumi.set(self, "groupfilter", value)
|
386
387
|
|
387
388
|
@property
|
388
389
|
@pulumi.getter(name="insecureTls")
|
389
|
-
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
390
|
+
def insecure_tls(self) -> Optional[pulumi.Input[builtins.bool]]:
|
390
391
|
"""
|
391
392
|
Control whether or TLS certificates must be validated
|
392
393
|
"""
|
393
394
|
return pulumi.get(self, "insecure_tls")
|
394
395
|
|
395
396
|
@insecure_tls.setter
|
396
|
-
def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
|
397
|
+
def insecure_tls(self, value: Optional[pulumi.Input[builtins.bool]]):
|
397
398
|
pulumi.set(self, "insecure_tls", value)
|
398
399
|
|
399
400
|
@property
|
400
401
|
@pulumi.getter
|
401
|
-
def local(self) -> Optional[pulumi.Input[bool]]:
|
402
|
+
def local(self) -> Optional[pulumi.Input[builtins.bool]]:
|
402
403
|
"""
|
403
404
|
Specifies if the auth method is local only.
|
404
405
|
"""
|
405
406
|
return pulumi.get(self, "local")
|
406
407
|
|
407
408
|
@local.setter
|
408
|
-
def local(self, value: Optional[pulumi.Input[bool]]):
|
409
|
+
def local(self, value: Optional[pulumi.Input[builtins.bool]]):
|
409
410
|
pulumi.set(self, "local", value)
|
410
411
|
|
411
412
|
@property
|
412
413
|
@pulumi.getter(name="maxPageSize")
|
413
|
-
def max_page_size(self) -> Optional[pulumi.Input[int]]:
|
414
|
+
def max_page_size(self) -> Optional[pulumi.Input[builtins.int]]:
|
414
415
|
"""
|
415
416
|
Sets the max page size for LDAP lookups, by default it's set to -1.
|
416
417
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
@@ -418,12 +419,12 @@ class AuthBackendArgs:
|
|
418
419
|
return pulumi.get(self, "max_page_size")
|
419
420
|
|
420
421
|
@max_page_size.setter
|
421
|
-
def max_page_size(self, value: Optional[pulumi.Input[int]]):
|
422
|
+
def max_page_size(self, value: Optional[pulumi.Input[builtins.int]]):
|
422
423
|
pulumi.set(self, "max_page_size", value)
|
423
424
|
|
424
425
|
@property
|
425
426
|
@pulumi.getter
|
426
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
427
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
427
428
|
"""
|
428
429
|
The namespace to provision the resource in.
|
429
430
|
The value should not contain leading or trailing forward slashes.
|
@@ -433,24 +434,24 @@ class AuthBackendArgs:
|
|
433
434
|
return pulumi.get(self, "namespace")
|
434
435
|
|
435
436
|
@namespace.setter
|
436
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
437
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
437
438
|
pulumi.set(self, "namespace", value)
|
438
439
|
|
439
440
|
@property
|
440
441
|
@pulumi.getter
|
441
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
442
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
442
443
|
"""
|
443
444
|
Path to mount the LDAP auth backend under
|
444
445
|
"""
|
445
446
|
return pulumi.get(self, "path")
|
446
447
|
|
447
448
|
@path.setter
|
448
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
449
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
449
450
|
pulumi.set(self, "path", value)
|
450
451
|
|
451
452
|
@property
|
452
453
|
@pulumi.getter(name="rotationPeriod")
|
453
|
-
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
454
|
+
def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
454
455
|
"""
|
455
456
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
456
457
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -458,12 +459,12 @@ class AuthBackendArgs:
|
|
458
459
|
return pulumi.get(self, "rotation_period")
|
459
460
|
|
460
461
|
@rotation_period.setter
|
461
|
-
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
462
|
+
def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
462
463
|
pulumi.set(self, "rotation_period", value)
|
463
464
|
|
464
465
|
@property
|
465
466
|
@pulumi.getter(name="rotationSchedule")
|
466
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
467
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
|
467
468
|
"""
|
468
469
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
469
470
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -471,12 +472,12 @@ class AuthBackendArgs:
|
|
471
472
|
return pulumi.get(self, "rotation_schedule")
|
472
473
|
|
473
474
|
@rotation_schedule.setter
|
474
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
475
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
|
475
476
|
pulumi.set(self, "rotation_schedule", value)
|
476
477
|
|
477
478
|
@property
|
478
479
|
@pulumi.getter(name="rotationWindow")
|
479
|
-
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
480
|
+
def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
|
480
481
|
"""
|
481
482
|
The maximum amount of time in seconds allowed to complete
|
482
483
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -485,324 +486,324 @@ class AuthBackendArgs:
|
|
485
486
|
return pulumi.get(self, "rotation_window")
|
486
487
|
|
487
488
|
@rotation_window.setter
|
488
|
-
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
489
|
+
def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
|
489
490
|
pulumi.set(self, "rotation_window", value)
|
490
491
|
|
491
492
|
@property
|
492
493
|
@pulumi.getter
|
493
|
-
def starttls(self) -> Optional[pulumi.Input[bool]]:
|
494
|
+
def starttls(self) -> Optional[pulumi.Input[builtins.bool]]:
|
494
495
|
"""
|
495
496
|
Control use of TLS when conecting to LDAP
|
496
497
|
"""
|
497
498
|
return pulumi.get(self, "starttls")
|
498
499
|
|
499
500
|
@starttls.setter
|
500
|
-
def starttls(self, value: Optional[pulumi.Input[bool]]):
|
501
|
+
def starttls(self, value: Optional[pulumi.Input[builtins.bool]]):
|
501
502
|
pulumi.set(self, "starttls", value)
|
502
503
|
|
503
504
|
@property
|
504
505
|
@pulumi.getter(name="tlsMaxVersion")
|
505
|
-
def tls_max_version(self) -> Optional[pulumi.Input[str]]:
|
506
|
+
def tls_max_version(self) -> Optional[pulumi.Input[builtins.str]]:
|
506
507
|
"""
|
507
508
|
Maximum acceptable version of TLS
|
508
509
|
"""
|
509
510
|
return pulumi.get(self, "tls_max_version")
|
510
511
|
|
511
512
|
@tls_max_version.setter
|
512
|
-
def tls_max_version(self, value: Optional[pulumi.Input[str]]):
|
513
|
+
def tls_max_version(self, value: Optional[pulumi.Input[builtins.str]]):
|
513
514
|
pulumi.set(self, "tls_max_version", value)
|
514
515
|
|
515
516
|
@property
|
516
517
|
@pulumi.getter(name="tlsMinVersion")
|
517
|
-
def tls_min_version(self) -> Optional[pulumi.Input[str]]:
|
518
|
+
def tls_min_version(self) -> Optional[pulumi.Input[builtins.str]]:
|
518
519
|
"""
|
519
520
|
Minimum acceptable version of TLS
|
520
521
|
"""
|
521
522
|
return pulumi.get(self, "tls_min_version")
|
522
523
|
|
523
524
|
@tls_min_version.setter
|
524
|
-
def tls_min_version(self, value: Optional[pulumi.Input[str]]):
|
525
|
+
def tls_min_version(self, value: Optional[pulumi.Input[builtins.str]]):
|
525
526
|
pulumi.set(self, "tls_min_version", value)
|
526
527
|
|
527
528
|
@property
|
528
529
|
@pulumi.getter(name="tokenBoundCidrs")
|
529
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
530
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
530
531
|
"""
|
531
532
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
532
533
|
"""
|
533
534
|
return pulumi.get(self, "token_bound_cidrs")
|
534
535
|
|
535
536
|
@token_bound_cidrs.setter
|
536
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
537
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
537
538
|
pulumi.set(self, "token_bound_cidrs", value)
|
538
539
|
|
539
540
|
@property
|
540
541
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
541
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
542
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
542
543
|
"""
|
543
544
|
Generated Token's Explicit Maximum TTL in seconds
|
544
545
|
"""
|
545
546
|
return pulumi.get(self, "token_explicit_max_ttl")
|
546
547
|
|
547
548
|
@token_explicit_max_ttl.setter
|
548
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
549
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
549
550
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
550
551
|
|
551
552
|
@property
|
552
553
|
@pulumi.getter(name="tokenMaxTtl")
|
553
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
554
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
554
555
|
"""
|
555
556
|
The maximum lifetime of the generated token
|
556
557
|
"""
|
557
558
|
return pulumi.get(self, "token_max_ttl")
|
558
559
|
|
559
560
|
@token_max_ttl.setter
|
560
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
561
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
561
562
|
pulumi.set(self, "token_max_ttl", value)
|
562
563
|
|
563
564
|
@property
|
564
565
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
565
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
566
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
|
566
567
|
"""
|
567
568
|
If true, the 'default' policy will not automatically be added to generated tokens
|
568
569
|
"""
|
569
570
|
return pulumi.get(self, "token_no_default_policy")
|
570
571
|
|
571
572
|
@token_no_default_policy.setter
|
572
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
|
573
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
|
573
574
|
pulumi.set(self, "token_no_default_policy", value)
|
574
575
|
|
575
576
|
@property
|
576
577
|
@pulumi.getter(name="tokenNumUses")
|
577
|
-
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
578
|
+
def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
|
578
579
|
"""
|
579
580
|
The maximum number of times a token may be used, a value of zero means unlimited
|
580
581
|
"""
|
581
582
|
return pulumi.get(self, "token_num_uses")
|
582
583
|
|
583
584
|
@token_num_uses.setter
|
584
|
-
def token_num_uses(self, value: Optional[pulumi.Input[int]]):
|
585
|
+
def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
|
585
586
|
pulumi.set(self, "token_num_uses", value)
|
586
587
|
|
587
588
|
@property
|
588
589
|
@pulumi.getter(name="tokenPeriod")
|
589
|
-
def token_period(self) -> Optional[pulumi.Input[int]]:
|
590
|
+
def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
590
591
|
"""
|
591
592
|
Generated Token's Period
|
592
593
|
"""
|
593
594
|
return pulumi.get(self, "token_period")
|
594
595
|
|
595
596
|
@token_period.setter
|
596
|
-
def token_period(self, value: Optional[pulumi.Input[int]]):
|
597
|
+
def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
597
598
|
pulumi.set(self, "token_period", value)
|
598
599
|
|
599
600
|
@property
|
600
601
|
@pulumi.getter(name="tokenPolicies")
|
601
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
602
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
602
603
|
"""
|
603
604
|
Generated Token's Policies
|
604
605
|
"""
|
605
606
|
return pulumi.get(self, "token_policies")
|
606
607
|
|
607
608
|
@token_policies.setter
|
608
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
609
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
609
610
|
pulumi.set(self, "token_policies", value)
|
610
611
|
|
611
612
|
@property
|
612
613
|
@pulumi.getter(name="tokenTtl")
|
613
|
-
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
614
|
+
def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
614
615
|
"""
|
615
616
|
The initial ttl of the token to generate in seconds
|
616
617
|
"""
|
617
618
|
return pulumi.get(self, "token_ttl")
|
618
619
|
|
619
620
|
@token_ttl.setter
|
620
|
-
def token_ttl(self, value: Optional[pulumi.Input[int]]):
|
621
|
+
def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
621
622
|
pulumi.set(self, "token_ttl", value)
|
622
623
|
|
623
624
|
@property
|
624
625
|
@pulumi.getter(name="tokenType")
|
625
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
626
|
+
def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
626
627
|
"""
|
627
628
|
The type of token to generate, service or batch
|
628
629
|
"""
|
629
630
|
return pulumi.get(self, "token_type")
|
630
631
|
|
631
632
|
@token_type.setter
|
632
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
633
|
+
def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
633
634
|
pulumi.set(self, "token_type", value)
|
634
635
|
|
635
636
|
@property
|
636
637
|
@pulumi.getter
|
637
|
-
def upndomain(self) -> Optional[pulumi.Input[str]]:
|
638
|
+
def upndomain(self) -> Optional[pulumi.Input[builtins.str]]:
|
638
639
|
"""
|
639
640
|
The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
640
641
|
"""
|
641
642
|
return pulumi.get(self, "upndomain")
|
642
643
|
|
643
644
|
@upndomain.setter
|
644
|
-
def upndomain(self, value: Optional[pulumi.Input[str]]):
|
645
|
+
def upndomain(self, value: Optional[pulumi.Input[builtins.str]]):
|
645
646
|
pulumi.set(self, "upndomain", value)
|
646
647
|
|
647
648
|
@property
|
648
649
|
@pulumi.getter(name="useTokenGroups")
|
649
|
-
def use_token_groups(self) -> Optional[pulumi.Input[bool]]:
|
650
|
+
def use_token_groups(self) -> Optional[pulumi.Input[builtins.bool]]:
|
650
651
|
"""
|
651
652
|
Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
652
653
|
"""
|
653
654
|
return pulumi.get(self, "use_token_groups")
|
654
655
|
|
655
656
|
@use_token_groups.setter
|
656
|
-
def use_token_groups(self, value: Optional[pulumi.Input[bool]]):
|
657
|
+
def use_token_groups(self, value: Optional[pulumi.Input[builtins.bool]]):
|
657
658
|
pulumi.set(self, "use_token_groups", value)
|
658
659
|
|
659
660
|
@property
|
660
661
|
@pulumi.getter
|
661
|
-
def userattr(self) -> Optional[pulumi.Input[str]]:
|
662
|
+
def userattr(self) -> Optional[pulumi.Input[builtins.str]]:
|
662
663
|
"""
|
663
664
|
Attribute on user object matching username passed in
|
664
665
|
"""
|
665
666
|
return pulumi.get(self, "userattr")
|
666
667
|
|
667
668
|
@userattr.setter
|
668
|
-
def userattr(self, value: Optional[pulumi.Input[str]]):
|
669
|
+
def userattr(self, value: Optional[pulumi.Input[builtins.str]]):
|
669
670
|
pulumi.set(self, "userattr", value)
|
670
671
|
|
671
672
|
@property
|
672
673
|
@pulumi.getter
|
673
|
-
def userdn(self) -> Optional[pulumi.Input[str]]:
|
674
|
+
def userdn(self) -> Optional[pulumi.Input[builtins.str]]:
|
674
675
|
"""
|
675
676
|
Base DN under which to perform user search
|
676
677
|
"""
|
677
678
|
return pulumi.get(self, "userdn")
|
678
679
|
|
679
680
|
@userdn.setter
|
680
|
-
def userdn(self, value: Optional[pulumi.Input[str]]):
|
681
|
+
def userdn(self, value: Optional[pulumi.Input[builtins.str]]):
|
681
682
|
pulumi.set(self, "userdn", value)
|
682
683
|
|
683
684
|
@property
|
684
685
|
@pulumi.getter
|
685
|
-
def userfilter(self) -> Optional[pulumi.Input[str]]:
|
686
|
+
def userfilter(self) -> Optional[pulumi.Input[builtins.str]]:
|
686
687
|
"""
|
687
688
|
LDAP user search filter
|
688
689
|
"""
|
689
690
|
return pulumi.get(self, "userfilter")
|
690
691
|
|
691
692
|
@userfilter.setter
|
692
|
-
def userfilter(self, value: Optional[pulumi.Input[str]]):
|
693
|
+
def userfilter(self, value: Optional[pulumi.Input[builtins.str]]):
|
693
694
|
pulumi.set(self, "userfilter", value)
|
694
695
|
|
695
696
|
@property
|
696
697
|
@pulumi.getter(name="usernameAsAlias")
|
697
|
-
def username_as_alias(self) -> Optional[pulumi.Input[bool]]:
|
698
|
+
def username_as_alias(self) -> Optional[pulumi.Input[builtins.bool]]:
|
698
699
|
"""
|
699
700
|
Force the auth method to use the username passed by the user as the alias name.
|
700
701
|
"""
|
701
702
|
return pulumi.get(self, "username_as_alias")
|
702
703
|
|
703
704
|
@username_as_alias.setter
|
704
|
-
def username_as_alias(self, value: Optional[pulumi.Input[bool]]):
|
705
|
+
def username_as_alias(self, value: Optional[pulumi.Input[builtins.bool]]):
|
705
706
|
pulumi.set(self, "username_as_alias", value)
|
706
707
|
|
707
708
|
|
708
709
|
@pulumi.input_type
|
709
710
|
class _AuthBackendState:
|
710
711
|
def __init__(__self__, *,
|
711
|
-
accessor: Optional[pulumi.Input[str]] = None,
|
712
|
-
binddn: Optional[pulumi.Input[str]] = None,
|
713
|
-
bindpass: Optional[pulumi.Input[str]] = None,
|
714
|
-
case_sensitive_names: Optional[pulumi.Input[bool]] = None,
|
715
|
-
certificate: Optional[pulumi.Input[str]] = None,
|
716
|
-
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
717
|
-
client_tls_key: Optional[pulumi.Input[str]] = None,
|
718
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
719
|
-
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
720
|
-
description: Optional[pulumi.Input[str]] = None,
|
721
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
722
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
723
|
-
discoverdn: Optional[pulumi.Input[bool]] = None,
|
724
|
-
groupattr: Optional[pulumi.Input[str]] = None,
|
725
|
-
groupdn: Optional[pulumi.Input[str]] = None,
|
726
|
-
groupfilter: Optional[pulumi.Input[str]] = None,
|
727
|
-
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
728
|
-
local: Optional[pulumi.Input[bool]] = None,
|
729
|
-
max_page_size: Optional[pulumi.Input[int]] = None,
|
730
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
731
|
-
path: Optional[pulumi.Input[str]] = None,
|
732
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
733
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
734
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
735
|
-
starttls: Optional[pulumi.Input[bool]] = None,
|
736
|
-
tls_max_version: Optional[pulumi.Input[str]] = None,
|
737
|
-
tls_min_version: Optional[pulumi.Input[str]] = None,
|
738
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
739
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
740
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
741
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
742
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
743
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
744
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
745
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
746
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
747
|
-
upndomain: Optional[pulumi.Input[str]] = None,
|
748
|
-
url: Optional[pulumi.Input[str]] = None,
|
749
|
-
use_token_groups: Optional[pulumi.Input[bool]] = None,
|
750
|
-
userattr: Optional[pulumi.Input[str]] = None,
|
751
|
-
userdn: Optional[pulumi.Input[str]] = None,
|
752
|
-
userfilter: Optional[pulumi.Input[str]] = None,
|
753
|
-
username_as_alias: Optional[pulumi.Input[bool]] = None):
|
712
|
+
accessor: Optional[pulumi.Input[builtins.str]] = None,
|
713
|
+
binddn: Optional[pulumi.Input[builtins.str]] = None,
|
714
|
+
bindpass: Optional[pulumi.Input[builtins.str]] = None,
|
715
|
+
case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
|
716
|
+
certificate: Optional[pulumi.Input[builtins.str]] = None,
|
717
|
+
client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
|
718
|
+
client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
|
719
|
+
connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
|
720
|
+
deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
|
721
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
722
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
723
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
724
|
+
discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
|
725
|
+
groupattr: Optional[pulumi.Input[builtins.str]] = None,
|
726
|
+
groupdn: Optional[pulumi.Input[builtins.str]] = None,
|
727
|
+
groupfilter: Optional[pulumi.Input[builtins.str]] = None,
|
728
|
+
insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
|
729
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
730
|
+
max_page_size: Optional[pulumi.Input[builtins.int]] = None,
|
731
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
732
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
733
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
734
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
735
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
736
|
+
starttls: Optional[pulumi.Input[builtins.bool]] = None,
|
737
|
+
tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
|
738
|
+
tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
|
739
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
740
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
741
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
742
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
743
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
744
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
745
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
746
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
747
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
748
|
+
upndomain: Optional[pulumi.Input[builtins.str]] = None,
|
749
|
+
url: Optional[pulumi.Input[builtins.str]] = None,
|
750
|
+
use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
|
751
|
+
userattr: Optional[pulumi.Input[builtins.str]] = None,
|
752
|
+
userdn: Optional[pulumi.Input[builtins.str]] = None,
|
753
|
+
userfilter: Optional[pulumi.Input[builtins.str]] = None,
|
754
|
+
username_as_alias: Optional[pulumi.Input[builtins.bool]] = None):
|
754
755
|
"""
|
755
756
|
Input properties used for looking up and filtering AuthBackend resources.
|
756
|
-
:param pulumi.Input[str] accessor: The accessor for this auth mount.
|
757
|
-
:param pulumi.Input[str] binddn: DN of object to bind when performing user search
|
758
|
-
:param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
|
759
|
-
:param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
760
|
-
:param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
|
761
|
-
:param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
762
|
-
:param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
763
|
-
:param pulumi.Input[str] description: Description for the LDAP auth backend mount
|
764
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
765
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
757
|
+
:param pulumi.Input[builtins.str] accessor: The accessor for this auth mount.
|
758
|
+
:param pulumi.Input[builtins.str] binddn: DN of object to bind when performing user search
|
759
|
+
:param pulumi.Input[builtins.str] bindpass: Password to use with `binddn` when performing user search
|
760
|
+
:param pulumi.Input[builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
761
|
+
:param pulumi.Input[builtins.str] certificate: Trusted CA to validate TLS certificate
|
762
|
+
:param pulumi.Input[builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
763
|
+
:param pulumi.Input[builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
764
|
+
:param pulumi.Input[builtins.str] description: Description for the LDAP auth backend mount
|
765
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
766
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
766
767
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
767
|
-
:param pulumi.Input[bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
|
768
|
-
:param pulumi.Input[str] groupattr: LDAP attribute to follow on objects returned by groupfilter
|
769
|
-
:param pulumi.Input[str] groupdn: Base DN under which to perform group search
|
770
|
-
:param pulumi.Input[str] groupfilter: Go template used to construct group membership query
|
771
|
-
:param pulumi.Input[bool] insecure_tls: Control whether or TLS certificates must be validated
|
772
|
-
:param pulumi.Input[bool] local: Specifies if the auth method is local only.
|
773
|
-
:param pulumi.Input[int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
|
768
|
+
:param pulumi.Input[builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
|
769
|
+
:param pulumi.Input[builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
|
770
|
+
:param pulumi.Input[builtins.str] groupdn: Base DN under which to perform group search
|
771
|
+
:param pulumi.Input[builtins.str] groupfilter: Go template used to construct group membership query
|
772
|
+
:param pulumi.Input[builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
|
773
|
+
:param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
|
774
|
+
:param pulumi.Input[builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
|
774
775
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
775
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
776
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
776
777
|
The value should not contain leading or trailing forward slashes.
|
777
778
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
778
779
|
*Available only for Vault Enterprise*.
|
779
|
-
:param pulumi.Input[str] path: Path to mount the LDAP auth backend under
|
780
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
780
|
+
:param pulumi.Input[builtins.str] path: Path to mount the LDAP auth backend under
|
781
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
781
782
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
782
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
783
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
783
784
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
784
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
785
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
785
786
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
786
787
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
787
|
-
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
788
|
-
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
789
|
-
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
790
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
791
|
-
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
792
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
793
|
-
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
794
|
-
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
795
|
-
:param pulumi.Input[int] token_period: Generated Token's Period
|
796
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
797
|
-
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
798
|
-
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
799
|
-
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
800
|
-
:param pulumi.Input[str] url: The URL of the LDAP server
|
801
|
-
:param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
802
|
-
:param pulumi.Input[str] userattr: Attribute on user object matching username passed in
|
803
|
-
:param pulumi.Input[str] userdn: Base DN under which to perform user search
|
804
|
-
:param pulumi.Input[str] userfilter: LDAP user search filter
|
805
|
-
:param pulumi.Input[bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
|
788
|
+
:param pulumi.Input[builtins.bool] starttls: Control use of TLS when conecting to LDAP
|
789
|
+
:param pulumi.Input[builtins.str] tls_max_version: Maximum acceptable version of TLS
|
790
|
+
:param pulumi.Input[builtins.str] tls_min_version: Minimum acceptable version of TLS
|
791
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
792
|
+
:param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
793
|
+
:param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
794
|
+
:param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
795
|
+
:param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
796
|
+
:param pulumi.Input[builtins.int] token_period: Generated Token's Period
|
797
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
|
798
|
+
:param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
799
|
+
:param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
|
800
|
+
:param pulumi.Input[builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
801
|
+
:param pulumi.Input[builtins.str] url: The URL of the LDAP server
|
802
|
+
:param pulumi.Input[builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
803
|
+
:param pulumi.Input[builtins.str] userattr: Attribute on user object matching username passed in
|
804
|
+
:param pulumi.Input[builtins.str] userdn: Base DN under which to perform user search
|
805
|
+
:param pulumi.Input[builtins.str] userfilter: LDAP user search filter
|
806
|
+
:param pulumi.Input[builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
|
806
807
|
"""
|
807
808
|
if accessor is not None:
|
808
809
|
pulumi.set(__self__, "accessor", accessor)
|
@@ -893,133 +894,133 @@ class _AuthBackendState:
|
|
893
894
|
|
894
895
|
@property
|
895
896
|
@pulumi.getter
|
896
|
-
def accessor(self) -> Optional[pulumi.Input[str]]:
|
897
|
+
def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
|
897
898
|
"""
|
898
899
|
The accessor for this auth mount.
|
899
900
|
"""
|
900
901
|
return pulumi.get(self, "accessor")
|
901
902
|
|
902
903
|
@accessor.setter
|
903
|
-
def accessor(self, value: Optional[pulumi.Input[str]]):
|
904
|
+
def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
|
904
905
|
pulumi.set(self, "accessor", value)
|
905
906
|
|
906
907
|
@property
|
907
908
|
@pulumi.getter
|
908
|
-
def binddn(self) -> Optional[pulumi.Input[str]]:
|
909
|
+
def binddn(self) -> Optional[pulumi.Input[builtins.str]]:
|
909
910
|
"""
|
910
911
|
DN of object to bind when performing user search
|
911
912
|
"""
|
912
913
|
return pulumi.get(self, "binddn")
|
913
914
|
|
914
915
|
@binddn.setter
|
915
|
-
def binddn(self, value: Optional[pulumi.Input[str]]):
|
916
|
+
def binddn(self, value: Optional[pulumi.Input[builtins.str]]):
|
916
917
|
pulumi.set(self, "binddn", value)
|
917
918
|
|
918
919
|
@property
|
919
920
|
@pulumi.getter
|
920
|
-
def bindpass(self) -> Optional[pulumi.Input[str]]:
|
921
|
+
def bindpass(self) -> Optional[pulumi.Input[builtins.str]]:
|
921
922
|
"""
|
922
923
|
Password to use with `binddn` when performing user search
|
923
924
|
"""
|
924
925
|
return pulumi.get(self, "bindpass")
|
925
926
|
|
926
927
|
@bindpass.setter
|
927
|
-
def bindpass(self, value: Optional[pulumi.Input[str]]):
|
928
|
+
def bindpass(self, value: Optional[pulumi.Input[builtins.str]]):
|
928
929
|
pulumi.set(self, "bindpass", value)
|
929
930
|
|
930
931
|
@property
|
931
932
|
@pulumi.getter(name="caseSensitiveNames")
|
932
|
-
def case_sensitive_names(self) -> Optional[pulumi.Input[bool]]:
|
933
|
+
def case_sensitive_names(self) -> Optional[pulumi.Input[builtins.bool]]:
|
933
934
|
"""
|
934
935
|
Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
935
936
|
"""
|
936
937
|
return pulumi.get(self, "case_sensitive_names")
|
937
938
|
|
938
939
|
@case_sensitive_names.setter
|
939
|
-
def case_sensitive_names(self, value: Optional[pulumi.Input[bool]]):
|
940
|
+
def case_sensitive_names(self, value: Optional[pulumi.Input[builtins.bool]]):
|
940
941
|
pulumi.set(self, "case_sensitive_names", value)
|
941
942
|
|
942
943
|
@property
|
943
944
|
@pulumi.getter
|
944
|
-
def certificate(self) -> Optional[pulumi.Input[str]]:
|
945
|
+
def certificate(self) -> Optional[pulumi.Input[builtins.str]]:
|
945
946
|
"""
|
946
947
|
Trusted CA to validate TLS certificate
|
947
948
|
"""
|
948
949
|
return pulumi.get(self, "certificate")
|
949
950
|
|
950
951
|
@certificate.setter
|
951
|
-
def certificate(self, value: Optional[pulumi.Input[str]]):
|
952
|
+
def certificate(self, value: Optional[pulumi.Input[builtins.str]]):
|
952
953
|
pulumi.set(self, "certificate", value)
|
953
954
|
|
954
955
|
@property
|
955
956
|
@pulumi.getter(name="clientTlsCert")
|
956
|
-
def client_tls_cert(self) -> Optional[pulumi.Input[str]]:
|
957
|
+
def client_tls_cert(self) -> Optional[pulumi.Input[builtins.str]]:
|
957
958
|
return pulumi.get(self, "client_tls_cert")
|
958
959
|
|
959
960
|
@client_tls_cert.setter
|
960
|
-
def client_tls_cert(self, value: Optional[pulumi.Input[str]]):
|
961
|
+
def client_tls_cert(self, value: Optional[pulumi.Input[builtins.str]]):
|
961
962
|
pulumi.set(self, "client_tls_cert", value)
|
962
963
|
|
963
964
|
@property
|
964
965
|
@pulumi.getter(name="clientTlsKey")
|
965
|
-
def client_tls_key(self) -> Optional[pulumi.Input[str]]:
|
966
|
+
def client_tls_key(self) -> Optional[pulumi.Input[builtins.str]]:
|
966
967
|
return pulumi.get(self, "client_tls_key")
|
967
968
|
|
968
969
|
@client_tls_key.setter
|
969
|
-
def client_tls_key(self, value: Optional[pulumi.Input[str]]):
|
970
|
+
def client_tls_key(self, value: Optional[pulumi.Input[builtins.str]]):
|
970
971
|
pulumi.set(self, "client_tls_key", value)
|
971
972
|
|
972
973
|
@property
|
973
974
|
@pulumi.getter(name="connectionTimeout")
|
974
|
-
def connection_timeout(self) -> Optional[pulumi.Input[int]]:
|
975
|
+
def connection_timeout(self) -> Optional[pulumi.Input[builtins.int]]:
|
975
976
|
"""
|
976
977
|
Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
977
978
|
"""
|
978
979
|
return pulumi.get(self, "connection_timeout")
|
979
980
|
|
980
981
|
@connection_timeout.setter
|
981
|
-
def connection_timeout(self, value: Optional[pulumi.Input[int]]):
|
982
|
+
def connection_timeout(self, value: Optional[pulumi.Input[builtins.int]]):
|
982
983
|
pulumi.set(self, "connection_timeout", value)
|
983
984
|
|
984
985
|
@property
|
985
986
|
@pulumi.getter(name="denyNullBind")
|
986
|
-
def deny_null_bind(self) -> Optional[pulumi.Input[bool]]:
|
987
|
+
def deny_null_bind(self) -> Optional[pulumi.Input[builtins.bool]]:
|
987
988
|
"""
|
988
989
|
Prevents users from bypassing authentication when providing an empty password.
|
989
990
|
"""
|
990
991
|
return pulumi.get(self, "deny_null_bind")
|
991
992
|
|
992
993
|
@deny_null_bind.setter
|
993
|
-
def deny_null_bind(self, value: Optional[pulumi.Input[bool]]):
|
994
|
+
def deny_null_bind(self, value: Optional[pulumi.Input[builtins.bool]]):
|
994
995
|
pulumi.set(self, "deny_null_bind", value)
|
995
996
|
|
996
997
|
@property
|
997
998
|
@pulumi.getter
|
998
|
-
def description(self) -> Optional[pulumi.Input[str]]:
|
999
|
+
def description(self) -> Optional[pulumi.Input[builtins.str]]:
|
999
1000
|
"""
|
1000
1001
|
Description for the LDAP auth backend mount
|
1001
1002
|
"""
|
1002
1003
|
return pulumi.get(self, "description")
|
1003
1004
|
|
1004
1005
|
@description.setter
|
1005
|
-
def description(self, value: Optional[pulumi.Input[str]]):
|
1006
|
+
def description(self, value: Optional[pulumi.Input[builtins.str]]):
|
1006
1007
|
pulumi.set(self, "description", value)
|
1007
1008
|
|
1008
1009
|
@property
|
1009
1010
|
@pulumi.getter(name="disableAutomatedRotation")
|
1010
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
|
1011
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1011
1012
|
"""
|
1012
1013
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1013
1014
|
"""
|
1014
1015
|
return pulumi.get(self, "disable_automated_rotation")
|
1015
1016
|
|
1016
1017
|
@disable_automated_rotation.setter
|
1017
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
|
1018
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1018
1019
|
pulumi.set(self, "disable_automated_rotation", value)
|
1019
1020
|
|
1020
1021
|
@property
|
1021
1022
|
@pulumi.getter(name="disableRemount")
|
1022
|
-
def disable_remount(self) -> Optional[pulumi.Input[bool]]:
|
1023
|
+
def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1023
1024
|
"""
|
1024
1025
|
If set, opts out of mount migration on path updates.
|
1025
1026
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -1027,84 +1028,84 @@ class _AuthBackendState:
|
|
1027
1028
|
return pulumi.get(self, "disable_remount")
|
1028
1029
|
|
1029
1030
|
@disable_remount.setter
|
1030
|
-
def disable_remount(self, value: Optional[pulumi.Input[bool]]):
|
1031
|
+
def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1031
1032
|
pulumi.set(self, "disable_remount", value)
|
1032
1033
|
|
1033
1034
|
@property
|
1034
1035
|
@pulumi.getter
|
1035
|
-
def discoverdn(self) -> Optional[pulumi.Input[bool]]:
|
1036
|
+
def discoverdn(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1036
1037
|
"""
|
1037
1038
|
Use anonymous bind to discover the bind DN of a user.
|
1038
1039
|
"""
|
1039
1040
|
return pulumi.get(self, "discoverdn")
|
1040
1041
|
|
1041
1042
|
@discoverdn.setter
|
1042
|
-
def discoverdn(self, value: Optional[pulumi.Input[bool]]):
|
1043
|
+
def discoverdn(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1043
1044
|
pulumi.set(self, "discoverdn", value)
|
1044
1045
|
|
1045
1046
|
@property
|
1046
1047
|
@pulumi.getter
|
1047
|
-
def groupattr(self) -> Optional[pulumi.Input[str]]:
|
1048
|
+
def groupattr(self) -> Optional[pulumi.Input[builtins.str]]:
|
1048
1049
|
"""
|
1049
1050
|
LDAP attribute to follow on objects returned by groupfilter
|
1050
1051
|
"""
|
1051
1052
|
return pulumi.get(self, "groupattr")
|
1052
1053
|
|
1053
1054
|
@groupattr.setter
|
1054
|
-
def groupattr(self, value: Optional[pulumi.Input[str]]):
|
1055
|
+
def groupattr(self, value: Optional[pulumi.Input[builtins.str]]):
|
1055
1056
|
pulumi.set(self, "groupattr", value)
|
1056
1057
|
|
1057
1058
|
@property
|
1058
1059
|
@pulumi.getter
|
1059
|
-
def groupdn(self) -> Optional[pulumi.Input[str]]:
|
1060
|
+
def groupdn(self) -> Optional[pulumi.Input[builtins.str]]:
|
1060
1061
|
"""
|
1061
1062
|
Base DN under which to perform group search
|
1062
1063
|
"""
|
1063
1064
|
return pulumi.get(self, "groupdn")
|
1064
1065
|
|
1065
1066
|
@groupdn.setter
|
1066
|
-
def groupdn(self, value: Optional[pulumi.Input[str]]):
|
1067
|
+
def groupdn(self, value: Optional[pulumi.Input[builtins.str]]):
|
1067
1068
|
pulumi.set(self, "groupdn", value)
|
1068
1069
|
|
1069
1070
|
@property
|
1070
1071
|
@pulumi.getter
|
1071
|
-
def groupfilter(self) -> Optional[pulumi.Input[str]]:
|
1072
|
+
def groupfilter(self) -> Optional[pulumi.Input[builtins.str]]:
|
1072
1073
|
"""
|
1073
1074
|
Go template used to construct group membership query
|
1074
1075
|
"""
|
1075
1076
|
return pulumi.get(self, "groupfilter")
|
1076
1077
|
|
1077
1078
|
@groupfilter.setter
|
1078
|
-
def groupfilter(self, value: Optional[pulumi.Input[str]]):
|
1079
|
+
def groupfilter(self, value: Optional[pulumi.Input[builtins.str]]):
|
1079
1080
|
pulumi.set(self, "groupfilter", value)
|
1080
1081
|
|
1081
1082
|
@property
|
1082
1083
|
@pulumi.getter(name="insecureTls")
|
1083
|
-
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
1084
|
+
def insecure_tls(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1084
1085
|
"""
|
1085
1086
|
Control whether or TLS certificates must be validated
|
1086
1087
|
"""
|
1087
1088
|
return pulumi.get(self, "insecure_tls")
|
1088
1089
|
|
1089
1090
|
@insecure_tls.setter
|
1090
|
-
def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
|
1091
|
+
def insecure_tls(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1091
1092
|
pulumi.set(self, "insecure_tls", value)
|
1092
1093
|
|
1093
1094
|
@property
|
1094
1095
|
@pulumi.getter
|
1095
|
-
def local(self) -> Optional[pulumi.Input[bool]]:
|
1096
|
+
def local(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1096
1097
|
"""
|
1097
1098
|
Specifies if the auth method is local only.
|
1098
1099
|
"""
|
1099
1100
|
return pulumi.get(self, "local")
|
1100
1101
|
|
1101
1102
|
@local.setter
|
1102
|
-
def local(self, value: Optional[pulumi.Input[bool]]):
|
1103
|
+
def local(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1103
1104
|
pulumi.set(self, "local", value)
|
1104
1105
|
|
1105
1106
|
@property
|
1106
1107
|
@pulumi.getter(name="maxPageSize")
|
1107
|
-
def max_page_size(self) -> Optional[pulumi.Input[int]]:
|
1108
|
+
def max_page_size(self) -> Optional[pulumi.Input[builtins.int]]:
|
1108
1109
|
"""
|
1109
1110
|
Sets the max page size for LDAP lookups, by default it's set to -1.
|
1110
1111
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
@@ -1112,12 +1113,12 @@ class _AuthBackendState:
|
|
1112
1113
|
return pulumi.get(self, "max_page_size")
|
1113
1114
|
|
1114
1115
|
@max_page_size.setter
|
1115
|
-
def max_page_size(self, value: Optional[pulumi.Input[int]]):
|
1116
|
+
def max_page_size(self, value: Optional[pulumi.Input[builtins.int]]):
|
1116
1117
|
pulumi.set(self, "max_page_size", value)
|
1117
1118
|
|
1118
1119
|
@property
|
1119
1120
|
@pulumi.getter
|
1120
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
1121
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
1121
1122
|
"""
|
1122
1123
|
The namespace to provision the resource in.
|
1123
1124
|
The value should not contain leading or trailing forward slashes.
|
@@ -1127,24 +1128,24 @@ class _AuthBackendState:
|
|
1127
1128
|
return pulumi.get(self, "namespace")
|
1128
1129
|
|
1129
1130
|
@namespace.setter
|
1130
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
1131
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
1131
1132
|
pulumi.set(self, "namespace", value)
|
1132
1133
|
|
1133
1134
|
@property
|
1134
1135
|
@pulumi.getter
|
1135
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
1136
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
1136
1137
|
"""
|
1137
1138
|
Path to mount the LDAP auth backend under
|
1138
1139
|
"""
|
1139
1140
|
return pulumi.get(self, "path")
|
1140
1141
|
|
1141
1142
|
@path.setter
|
1142
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
1143
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
1143
1144
|
pulumi.set(self, "path", value)
|
1144
1145
|
|
1145
1146
|
@property
|
1146
1147
|
@pulumi.getter(name="rotationPeriod")
|
1147
|
-
def rotation_period(self) -> Optional[pulumi.Input[int]]:
|
1148
|
+
def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
1148
1149
|
"""
|
1149
1150
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
1150
1151
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -1152,12 +1153,12 @@ class _AuthBackendState:
|
|
1152
1153
|
return pulumi.get(self, "rotation_period")
|
1153
1154
|
|
1154
1155
|
@rotation_period.setter
|
1155
|
-
def rotation_period(self, value: Optional[pulumi.Input[int]]):
|
1156
|
+
def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
1156
1157
|
pulumi.set(self, "rotation_period", value)
|
1157
1158
|
|
1158
1159
|
@property
|
1159
1160
|
@pulumi.getter(name="rotationSchedule")
|
1160
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
|
1161
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
|
1161
1162
|
"""
|
1162
1163
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1163
1164
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -1165,12 +1166,12 @@ class _AuthBackendState:
|
|
1165
1166
|
return pulumi.get(self, "rotation_schedule")
|
1166
1167
|
|
1167
1168
|
@rotation_schedule.setter
|
1168
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
|
1169
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
|
1169
1170
|
pulumi.set(self, "rotation_schedule", value)
|
1170
1171
|
|
1171
1172
|
@property
|
1172
1173
|
@pulumi.getter(name="rotationWindow")
|
1173
|
-
def rotation_window(self) -> Optional[pulumi.Input[int]]:
|
1174
|
+
def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
|
1174
1175
|
"""
|
1175
1176
|
The maximum amount of time in seconds allowed to complete
|
1176
1177
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -1179,235 +1180,235 @@ class _AuthBackendState:
|
|
1179
1180
|
return pulumi.get(self, "rotation_window")
|
1180
1181
|
|
1181
1182
|
@rotation_window.setter
|
1182
|
-
def rotation_window(self, value: Optional[pulumi.Input[int]]):
|
1183
|
+
def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
|
1183
1184
|
pulumi.set(self, "rotation_window", value)
|
1184
1185
|
|
1185
1186
|
@property
|
1186
1187
|
@pulumi.getter
|
1187
|
-
def starttls(self) -> Optional[pulumi.Input[bool]]:
|
1188
|
+
def starttls(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1188
1189
|
"""
|
1189
1190
|
Control use of TLS when conecting to LDAP
|
1190
1191
|
"""
|
1191
1192
|
return pulumi.get(self, "starttls")
|
1192
1193
|
|
1193
1194
|
@starttls.setter
|
1194
|
-
def starttls(self, value: Optional[pulumi.Input[bool]]):
|
1195
|
+
def starttls(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1195
1196
|
pulumi.set(self, "starttls", value)
|
1196
1197
|
|
1197
1198
|
@property
|
1198
1199
|
@pulumi.getter(name="tlsMaxVersion")
|
1199
|
-
def tls_max_version(self) -> Optional[pulumi.Input[str]]:
|
1200
|
+
def tls_max_version(self) -> Optional[pulumi.Input[builtins.str]]:
|
1200
1201
|
"""
|
1201
1202
|
Maximum acceptable version of TLS
|
1202
1203
|
"""
|
1203
1204
|
return pulumi.get(self, "tls_max_version")
|
1204
1205
|
|
1205
1206
|
@tls_max_version.setter
|
1206
|
-
def tls_max_version(self, value: Optional[pulumi.Input[str]]):
|
1207
|
+
def tls_max_version(self, value: Optional[pulumi.Input[builtins.str]]):
|
1207
1208
|
pulumi.set(self, "tls_max_version", value)
|
1208
1209
|
|
1209
1210
|
@property
|
1210
1211
|
@pulumi.getter(name="tlsMinVersion")
|
1211
|
-
def tls_min_version(self) -> Optional[pulumi.Input[str]]:
|
1212
|
+
def tls_min_version(self) -> Optional[pulumi.Input[builtins.str]]:
|
1212
1213
|
"""
|
1213
1214
|
Minimum acceptable version of TLS
|
1214
1215
|
"""
|
1215
1216
|
return pulumi.get(self, "tls_min_version")
|
1216
1217
|
|
1217
1218
|
@tls_min_version.setter
|
1218
|
-
def tls_min_version(self, value: Optional[pulumi.Input[str]]):
|
1219
|
+
def tls_min_version(self, value: Optional[pulumi.Input[builtins.str]]):
|
1219
1220
|
pulumi.set(self, "tls_min_version", value)
|
1220
1221
|
|
1221
1222
|
@property
|
1222
1223
|
@pulumi.getter(name="tokenBoundCidrs")
|
1223
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1224
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
1224
1225
|
"""
|
1225
1226
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1226
1227
|
"""
|
1227
1228
|
return pulumi.get(self, "token_bound_cidrs")
|
1228
1229
|
|
1229
1230
|
@token_bound_cidrs.setter
|
1230
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
1231
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
1231
1232
|
pulumi.set(self, "token_bound_cidrs", value)
|
1232
1233
|
|
1233
1234
|
@property
|
1234
1235
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1235
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1236
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
1236
1237
|
"""
|
1237
1238
|
Generated Token's Explicit Maximum TTL in seconds
|
1238
1239
|
"""
|
1239
1240
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1240
1241
|
|
1241
1242
|
@token_explicit_max_ttl.setter
|
1242
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
1243
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
1243
1244
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
1244
1245
|
|
1245
1246
|
@property
|
1246
1247
|
@pulumi.getter(name="tokenMaxTtl")
|
1247
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1248
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
1248
1249
|
"""
|
1249
1250
|
The maximum lifetime of the generated token
|
1250
1251
|
"""
|
1251
1252
|
return pulumi.get(self, "token_max_ttl")
|
1252
1253
|
|
1253
1254
|
@token_max_ttl.setter
|
1254
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
|
1255
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
1255
1256
|
pulumi.set(self, "token_max_ttl", value)
|
1256
1257
|
|
1257
1258
|
@property
|
1258
1259
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1259
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
1260
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1260
1261
|
"""
|
1261
1262
|
If true, the 'default' policy will not automatically be added to generated tokens
|
1262
1263
|
"""
|
1263
1264
|
return pulumi.get(self, "token_no_default_policy")
|
1264
1265
|
|
1265
1266
|
@token_no_default_policy.setter
|
1266
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
|
1267
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1267
1268
|
pulumi.set(self, "token_no_default_policy", value)
|
1268
1269
|
|
1269
1270
|
@property
|
1270
1271
|
@pulumi.getter(name="tokenNumUses")
|
1271
|
-
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
1272
|
+
def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
|
1272
1273
|
"""
|
1273
1274
|
The maximum number of times a token may be used, a value of zero means unlimited
|
1274
1275
|
"""
|
1275
1276
|
return pulumi.get(self, "token_num_uses")
|
1276
1277
|
|
1277
1278
|
@token_num_uses.setter
|
1278
|
-
def token_num_uses(self, value: Optional[pulumi.Input[int]]):
|
1279
|
+
def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
|
1279
1280
|
pulumi.set(self, "token_num_uses", value)
|
1280
1281
|
|
1281
1282
|
@property
|
1282
1283
|
@pulumi.getter(name="tokenPeriod")
|
1283
|
-
def token_period(self) -> Optional[pulumi.Input[int]]:
|
1284
|
+
def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
|
1284
1285
|
"""
|
1285
1286
|
Generated Token's Period
|
1286
1287
|
"""
|
1287
1288
|
return pulumi.get(self, "token_period")
|
1288
1289
|
|
1289
1290
|
@token_period.setter
|
1290
|
-
def token_period(self, value: Optional[pulumi.Input[int]]):
|
1291
|
+
def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
|
1291
1292
|
pulumi.set(self, "token_period", value)
|
1292
1293
|
|
1293
1294
|
@property
|
1294
1295
|
@pulumi.getter(name="tokenPolicies")
|
1295
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1296
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
|
1296
1297
|
"""
|
1297
1298
|
Generated Token's Policies
|
1298
1299
|
"""
|
1299
1300
|
return pulumi.get(self, "token_policies")
|
1300
1301
|
|
1301
1302
|
@token_policies.setter
|
1302
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
1303
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
|
1303
1304
|
pulumi.set(self, "token_policies", value)
|
1304
1305
|
|
1305
1306
|
@property
|
1306
1307
|
@pulumi.getter(name="tokenTtl")
|
1307
|
-
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
1308
|
+
def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
|
1308
1309
|
"""
|
1309
1310
|
The initial ttl of the token to generate in seconds
|
1310
1311
|
"""
|
1311
1312
|
return pulumi.get(self, "token_ttl")
|
1312
1313
|
|
1313
1314
|
@token_ttl.setter
|
1314
|
-
def token_ttl(self, value: Optional[pulumi.Input[int]]):
|
1315
|
+
def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
|
1315
1316
|
pulumi.set(self, "token_ttl", value)
|
1316
1317
|
|
1317
1318
|
@property
|
1318
1319
|
@pulumi.getter(name="tokenType")
|
1319
|
-
def token_type(self) -> Optional[pulumi.Input[str]]:
|
1320
|
+
def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
|
1320
1321
|
"""
|
1321
1322
|
The type of token to generate, service or batch
|
1322
1323
|
"""
|
1323
1324
|
return pulumi.get(self, "token_type")
|
1324
1325
|
|
1325
1326
|
@token_type.setter
|
1326
|
-
def token_type(self, value: Optional[pulumi.Input[str]]):
|
1327
|
+
def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
|
1327
1328
|
pulumi.set(self, "token_type", value)
|
1328
1329
|
|
1329
1330
|
@property
|
1330
1331
|
@pulumi.getter
|
1331
|
-
def upndomain(self) -> Optional[pulumi.Input[str]]:
|
1332
|
+
def upndomain(self) -> Optional[pulumi.Input[builtins.str]]:
|
1332
1333
|
"""
|
1333
1334
|
The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1334
1335
|
"""
|
1335
1336
|
return pulumi.get(self, "upndomain")
|
1336
1337
|
|
1337
1338
|
@upndomain.setter
|
1338
|
-
def upndomain(self, value: Optional[pulumi.Input[str]]):
|
1339
|
+
def upndomain(self, value: Optional[pulumi.Input[builtins.str]]):
|
1339
1340
|
pulumi.set(self, "upndomain", value)
|
1340
1341
|
|
1341
1342
|
@property
|
1342
1343
|
@pulumi.getter
|
1343
|
-
def url(self) -> Optional[pulumi.Input[str]]:
|
1344
|
+
def url(self) -> Optional[pulumi.Input[builtins.str]]:
|
1344
1345
|
"""
|
1345
1346
|
The URL of the LDAP server
|
1346
1347
|
"""
|
1347
1348
|
return pulumi.get(self, "url")
|
1348
1349
|
|
1349
1350
|
@url.setter
|
1350
|
-
def url(self, value: Optional[pulumi.Input[str]]):
|
1351
|
+
def url(self, value: Optional[pulumi.Input[builtins.str]]):
|
1351
1352
|
pulumi.set(self, "url", value)
|
1352
1353
|
|
1353
1354
|
@property
|
1354
1355
|
@pulumi.getter(name="useTokenGroups")
|
1355
|
-
def use_token_groups(self) -> Optional[pulumi.Input[bool]]:
|
1356
|
+
def use_token_groups(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1356
1357
|
"""
|
1357
1358
|
Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
1358
1359
|
"""
|
1359
1360
|
return pulumi.get(self, "use_token_groups")
|
1360
1361
|
|
1361
1362
|
@use_token_groups.setter
|
1362
|
-
def use_token_groups(self, value: Optional[pulumi.Input[bool]]):
|
1363
|
+
def use_token_groups(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1363
1364
|
pulumi.set(self, "use_token_groups", value)
|
1364
1365
|
|
1365
1366
|
@property
|
1366
1367
|
@pulumi.getter
|
1367
|
-
def userattr(self) -> Optional[pulumi.Input[str]]:
|
1368
|
+
def userattr(self) -> Optional[pulumi.Input[builtins.str]]:
|
1368
1369
|
"""
|
1369
1370
|
Attribute on user object matching username passed in
|
1370
1371
|
"""
|
1371
1372
|
return pulumi.get(self, "userattr")
|
1372
1373
|
|
1373
1374
|
@userattr.setter
|
1374
|
-
def userattr(self, value: Optional[pulumi.Input[str]]):
|
1375
|
+
def userattr(self, value: Optional[pulumi.Input[builtins.str]]):
|
1375
1376
|
pulumi.set(self, "userattr", value)
|
1376
1377
|
|
1377
1378
|
@property
|
1378
1379
|
@pulumi.getter
|
1379
|
-
def userdn(self) -> Optional[pulumi.Input[str]]:
|
1380
|
+
def userdn(self) -> Optional[pulumi.Input[builtins.str]]:
|
1380
1381
|
"""
|
1381
1382
|
Base DN under which to perform user search
|
1382
1383
|
"""
|
1383
1384
|
return pulumi.get(self, "userdn")
|
1384
1385
|
|
1385
1386
|
@userdn.setter
|
1386
|
-
def userdn(self, value: Optional[pulumi.Input[str]]):
|
1387
|
+
def userdn(self, value: Optional[pulumi.Input[builtins.str]]):
|
1387
1388
|
pulumi.set(self, "userdn", value)
|
1388
1389
|
|
1389
1390
|
@property
|
1390
1391
|
@pulumi.getter
|
1391
|
-
def userfilter(self) -> Optional[pulumi.Input[str]]:
|
1392
|
+
def userfilter(self) -> Optional[pulumi.Input[builtins.str]]:
|
1392
1393
|
"""
|
1393
1394
|
LDAP user search filter
|
1394
1395
|
"""
|
1395
1396
|
return pulumi.get(self, "userfilter")
|
1396
1397
|
|
1397
1398
|
@userfilter.setter
|
1398
|
-
def userfilter(self, value: Optional[pulumi.Input[str]]):
|
1399
|
+
def userfilter(self, value: Optional[pulumi.Input[builtins.str]]):
|
1399
1400
|
pulumi.set(self, "userfilter", value)
|
1400
1401
|
|
1401
1402
|
@property
|
1402
1403
|
@pulumi.getter(name="usernameAsAlias")
|
1403
|
-
def username_as_alias(self) -> Optional[pulumi.Input[bool]]:
|
1404
|
+
def username_as_alias(self) -> Optional[pulumi.Input[builtins.bool]]:
|
1404
1405
|
"""
|
1405
1406
|
Force the auth method to use the username passed by the user as the alias name.
|
1406
1407
|
"""
|
1407
1408
|
return pulumi.get(self, "username_as_alias")
|
1408
1409
|
|
1409
1410
|
@username_as_alias.setter
|
1410
|
-
def username_as_alias(self, value: Optional[pulumi.Input[bool]]):
|
1411
|
+
def username_as_alias(self, value: Optional[pulumi.Input[builtins.bool]]):
|
1411
1412
|
pulumi.set(self, "username_as_alias", value)
|
1412
1413
|
|
1413
1414
|
|
@@ -1416,48 +1417,48 @@ class AuthBackend(pulumi.CustomResource):
|
|
1416
1417
|
def __init__(__self__,
|
1417
1418
|
resource_name: str,
|
1418
1419
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1419
|
-
binddn: Optional[pulumi.Input[str]] = None,
|
1420
|
-
bindpass: Optional[pulumi.Input[str]] = None,
|
1421
|
-
case_sensitive_names: Optional[pulumi.Input[bool]] = None,
|
1422
|
-
certificate: Optional[pulumi.Input[str]] = None,
|
1423
|
-
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
1424
|
-
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1425
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1426
|
-
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
1427
|
-
description: Optional[pulumi.Input[str]] = None,
|
1428
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
1429
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
1430
|
-
discoverdn: Optional[pulumi.Input[bool]] = None,
|
1431
|
-
groupattr: Optional[pulumi.Input[str]] = None,
|
1432
|
-
groupdn: Optional[pulumi.Input[str]] = None,
|
1433
|
-
groupfilter: Optional[pulumi.Input[str]] = None,
|
1434
|
-
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
1435
|
-
local: Optional[pulumi.Input[bool]] = None,
|
1436
|
-
max_page_size: Optional[pulumi.Input[int]] = None,
|
1437
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1438
|
-
path: Optional[pulumi.Input[str]] = None,
|
1439
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
1440
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
1441
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
1442
|
-
starttls: Optional[pulumi.Input[bool]] = None,
|
1443
|
-
tls_max_version: Optional[pulumi.Input[str]] = None,
|
1444
|
-
tls_min_version: Optional[pulumi.Input[str]] = None,
|
1445
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1446
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
1447
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
1448
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
1449
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
1450
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
1451
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1452
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
1453
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
1454
|
-
upndomain: Optional[pulumi.Input[str]] = None,
|
1455
|
-
url: Optional[pulumi.Input[str]] = None,
|
1456
|
-
use_token_groups: Optional[pulumi.Input[bool]] = None,
|
1457
|
-
userattr: Optional[pulumi.Input[str]] = None,
|
1458
|
-
userdn: Optional[pulumi.Input[str]] = None,
|
1459
|
-
userfilter: Optional[pulumi.Input[str]] = None,
|
1460
|
-
username_as_alias: Optional[pulumi.Input[bool]] = None,
|
1420
|
+
binddn: Optional[pulumi.Input[builtins.str]] = None,
|
1421
|
+
bindpass: Optional[pulumi.Input[builtins.str]] = None,
|
1422
|
+
case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
|
1423
|
+
certificate: Optional[pulumi.Input[builtins.str]] = None,
|
1424
|
+
client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
|
1425
|
+
client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
|
1426
|
+
connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
|
1427
|
+
deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
|
1428
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
1429
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
1430
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
1431
|
+
discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
|
1432
|
+
groupattr: Optional[pulumi.Input[builtins.str]] = None,
|
1433
|
+
groupdn: Optional[pulumi.Input[builtins.str]] = None,
|
1434
|
+
groupfilter: Optional[pulumi.Input[builtins.str]] = None,
|
1435
|
+
insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
|
1436
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
1437
|
+
max_page_size: Optional[pulumi.Input[builtins.int]] = None,
|
1438
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1439
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
1440
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
1441
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
1442
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
1443
|
+
starttls: Optional[pulumi.Input[builtins.bool]] = None,
|
1444
|
+
tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
|
1445
|
+
tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
|
1446
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1447
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
1448
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
1449
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
1450
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
1451
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
1452
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1453
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
1454
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
1455
|
+
upndomain: Optional[pulumi.Input[builtins.str]] = None,
|
1456
|
+
url: Optional[pulumi.Input[builtins.str]] = None,
|
1457
|
+
use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
|
1458
|
+
userattr: Optional[pulumi.Input[builtins.str]] = None,
|
1459
|
+
userdn: Optional[pulumi.Input[builtins.str]] = None,
|
1460
|
+
userfilter: Optional[pulumi.Input[builtins.str]] = None,
|
1461
|
+
username_as_alias: Optional[pulumi.Input[builtins.bool]] = None,
|
1461
1462
|
__props__=None):
|
1462
1463
|
"""
|
1463
1464
|
Provides a resource for managing an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
|
@@ -1491,55 +1492,55 @@ class AuthBackend(pulumi.CustomResource):
|
|
1491
1492
|
|
1492
1493
|
:param str resource_name: The name of the resource.
|
1493
1494
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1494
|
-
:param pulumi.Input[str] binddn: DN of object to bind when performing user search
|
1495
|
-
:param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
|
1496
|
-
:param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
1497
|
-
:param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
|
1498
|
-
:param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1499
|
-
:param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
1500
|
-
:param pulumi.Input[str] description: Description for the LDAP auth backend mount
|
1501
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1502
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
1495
|
+
:param pulumi.Input[builtins.str] binddn: DN of object to bind when performing user search
|
1496
|
+
:param pulumi.Input[builtins.str] bindpass: Password to use with `binddn` when performing user search
|
1497
|
+
:param pulumi.Input[builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
1498
|
+
:param pulumi.Input[builtins.str] certificate: Trusted CA to validate TLS certificate
|
1499
|
+
:param pulumi.Input[builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1500
|
+
:param pulumi.Input[builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
1501
|
+
:param pulumi.Input[builtins.str] description: Description for the LDAP auth backend mount
|
1502
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1503
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
1503
1504
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1504
|
-
:param pulumi.Input[bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
|
1505
|
-
:param pulumi.Input[str] groupattr: LDAP attribute to follow on objects returned by groupfilter
|
1506
|
-
:param pulumi.Input[str] groupdn: Base DN under which to perform group search
|
1507
|
-
:param pulumi.Input[str] groupfilter: Go template used to construct group membership query
|
1508
|
-
:param pulumi.Input[bool] insecure_tls: Control whether or TLS certificates must be validated
|
1509
|
-
:param pulumi.Input[bool] local: Specifies if the auth method is local only.
|
1510
|
-
:param pulumi.Input[int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
|
1505
|
+
:param pulumi.Input[builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
|
1506
|
+
:param pulumi.Input[builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
|
1507
|
+
:param pulumi.Input[builtins.str] groupdn: Base DN under which to perform group search
|
1508
|
+
:param pulumi.Input[builtins.str] groupfilter: Go template used to construct group membership query
|
1509
|
+
:param pulumi.Input[builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
|
1510
|
+
:param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
|
1511
|
+
:param pulumi.Input[builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
|
1511
1512
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
1512
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1513
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
1513
1514
|
The value should not contain leading or trailing forward slashes.
|
1514
1515
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1515
1516
|
*Available only for Vault Enterprise*.
|
1516
|
-
:param pulumi.Input[str] path: Path to mount the LDAP auth backend under
|
1517
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1517
|
+
:param pulumi.Input[builtins.str] path: Path to mount the LDAP auth backend under
|
1518
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1518
1519
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1519
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1520
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1520
1521
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1521
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1522
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1522
1523
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1523
1524
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1524
|
-
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
1525
|
-
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
1526
|
-
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
1527
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1528
|
-
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1529
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1530
|
-
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1531
|
-
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1532
|
-
:param pulumi.Input[int] token_period: Generated Token's Period
|
1533
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1534
|
-
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1535
|
-
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1536
|
-
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1537
|
-
:param pulumi.Input[str] url: The URL of the LDAP server
|
1538
|
-
:param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
1539
|
-
:param pulumi.Input[str] userattr: Attribute on user object matching username passed in
|
1540
|
-
:param pulumi.Input[str] userdn: Base DN under which to perform user search
|
1541
|
-
:param pulumi.Input[str] userfilter: LDAP user search filter
|
1542
|
-
:param pulumi.Input[bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
|
1525
|
+
:param pulumi.Input[builtins.bool] starttls: Control use of TLS when conecting to LDAP
|
1526
|
+
:param pulumi.Input[builtins.str] tls_max_version: Maximum acceptable version of TLS
|
1527
|
+
:param pulumi.Input[builtins.str] tls_min_version: Minimum acceptable version of TLS
|
1528
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1529
|
+
:param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1530
|
+
:param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
1531
|
+
:param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1532
|
+
:param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1533
|
+
:param pulumi.Input[builtins.int] token_period: Generated Token's Period
|
1534
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
|
1535
|
+
:param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
1536
|
+
:param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
|
1537
|
+
:param pulumi.Input[builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1538
|
+
:param pulumi.Input[builtins.str] url: The URL of the LDAP server
|
1539
|
+
:param pulumi.Input[builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
1540
|
+
:param pulumi.Input[builtins.str] userattr: Attribute on user object matching username passed in
|
1541
|
+
:param pulumi.Input[builtins.str] userdn: Base DN under which to perform user search
|
1542
|
+
:param pulumi.Input[builtins.str] userfilter: LDAP user search filter
|
1543
|
+
:param pulumi.Input[builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
|
1543
1544
|
"""
|
1544
1545
|
...
|
1545
1546
|
@overload
|
@@ -1592,48 +1593,48 @@ class AuthBackend(pulumi.CustomResource):
|
|
1592
1593
|
def _internal_init(__self__,
|
1593
1594
|
resource_name: str,
|
1594
1595
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1595
|
-
binddn: Optional[pulumi.Input[str]] = None,
|
1596
|
-
bindpass: Optional[pulumi.Input[str]] = None,
|
1597
|
-
case_sensitive_names: Optional[pulumi.Input[bool]] = None,
|
1598
|
-
certificate: Optional[pulumi.Input[str]] = None,
|
1599
|
-
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
1600
|
-
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1601
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1602
|
-
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
1603
|
-
description: Optional[pulumi.Input[str]] = None,
|
1604
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
1605
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
1606
|
-
discoverdn: Optional[pulumi.Input[bool]] = None,
|
1607
|
-
groupattr: Optional[pulumi.Input[str]] = None,
|
1608
|
-
groupdn: Optional[pulumi.Input[str]] = None,
|
1609
|
-
groupfilter: Optional[pulumi.Input[str]] = None,
|
1610
|
-
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
1611
|
-
local: Optional[pulumi.Input[bool]] = None,
|
1612
|
-
max_page_size: Optional[pulumi.Input[int]] = None,
|
1613
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1614
|
-
path: Optional[pulumi.Input[str]] = None,
|
1615
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
1616
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
1617
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
1618
|
-
starttls: Optional[pulumi.Input[bool]] = None,
|
1619
|
-
tls_max_version: Optional[pulumi.Input[str]] = None,
|
1620
|
-
tls_min_version: Optional[pulumi.Input[str]] = None,
|
1621
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1622
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
1623
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
1624
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
1625
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
1626
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
1627
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1628
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
1629
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
1630
|
-
upndomain: Optional[pulumi.Input[str]] = None,
|
1631
|
-
url: Optional[pulumi.Input[str]] = None,
|
1632
|
-
use_token_groups: Optional[pulumi.Input[bool]] = None,
|
1633
|
-
userattr: Optional[pulumi.Input[str]] = None,
|
1634
|
-
userdn: Optional[pulumi.Input[str]] = None,
|
1635
|
-
userfilter: Optional[pulumi.Input[str]] = None,
|
1636
|
-
username_as_alias: Optional[pulumi.Input[bool]] = None,
|
1596
|
+
binddn: Optional[pulumi.Input[builtins.str]] = None,
|
1597
|
+
bindpass: Optional[pulumi.Input[builtins.str]] = None,
|
1598
|
+
case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
|
1599
|
+
certificate: Optional[pulumi.Input[builtins.str]] = None,
|
1600
|
+
client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
|
1601
|
+
client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
|
1602
|
+
connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
|
1603
|
+
deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
|
1604
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
1605
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
1606
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
1607
|
+
discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
|
1608
|
+
groupattr: Optional[pulumi.Input[builtins.str]] = None,
|
1609
|
+
groupdn: Optional[pulumi.Input[builtins.str]] = None,
|
1610
|
+
groupfilter: Optional[pulumi.Input[builtins.str]] = None,
|
1611
|
+
insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
|
1612
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
1613
|
+
max_page_size: Optional[pulumi.Input[builtins.int]] = None,
|
1614
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1615
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
1616
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
1617
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
1618
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
1619
|
+
starttls: Optional[pulumi.Input[builtins.bool]] = None,
|
1620
|
+
tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
|
1621
|
+
tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
|
1622
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1623
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
1624
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
1625
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
1626
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
1627
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
1628
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1629
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
1630
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
1631
|
+
upndomain: Optional[pulumi.Input[builtins.str]] = None,
|
1632
|
+
url: Optional[pulumi.Input[builtins.str]] = None,
|
1633
|
+
use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
|
1634
|
+
userattr: Optional[pulumi.Input[builtins.str]] = None,
|
1635
|
+
userdn: Optional[pulumi.Input[builtins.str]] = None,
|
1636
|
+
userfilter: Optional[pulumi.Input[builtins.str]] = None,
|
1637
|
+
username_as_alias: Optional[pulumi.Input[builtins.bool]] = None,
|
1637
1638
|
__props__=None):
|
1638
1639
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
1639
1640
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -1700,49 +1701,49 @@ class AuthBackend(pulumi.CustomResource):
|
|
1700
1701
|
def get(resource_name: str,
|
1701
1702
|
id: pulumi.Input[str],
|
1702
1703
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1703
|
-
accessor: Optional[pulumi.Input[str]] = None,
|
1704
|
-
binddn: Optional[pulumi.Input[str]] = None,
|
1705
|
-
bindpass: Optional[pulumi.Input[str]] = None,
|
1706
|
-
case_sensitive_names: Optional[pulumi.Input[bool]] = None,
|
1707
|
-
certificate: Optional[pulumi.Input[str]] = None,
|
1708
|
-
client_tls_cert: Optional[pulumi.Input[str]] = None,
|
1709
|
-
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1710
|
-
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1711
|
-
deny_null_bind: Optional[pulumi.Input[bool]] = None,
|
1712
|
-
description: Optional[pulumi.Input[str]] = None,
|
1713
|
-
disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
|
1714
|
-
disable_remount: Optional[pulumi.Input[bool]] = None,
|
1715
|
-
discoverdn: Optional[pulumi.Input[bool]] = None,
|
1716
|
-
groupattr: Optional[pulumi.Input[str]] = None,
|
1717
|
-
groupdn: Optional[pulumi.Input[str]] = None,
|
1718
|
-
groupfilter: Optional[pulumi.Input[str]] = None,
|
1719
|
-
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
1720
|
-
local: Optional[pulumi.Input[bool]] = None,
|
1721
|
-
max_page_size: Optional[pulumi.Input[int]] = None,
|
1722
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
1723
|
-
path: Optional[pulumi.Input[str]] = None,
|
1724
|
-
rotation_period: Optional[pulumi.Input[int]] = None,
|
1725
|
-
rotation_schedule: Optional[pulumi.Input[str]] = None,
|
1726
|
-
rotation_window: Optional[pulumi.Input[int]] = None,
|
1727
|
-
starttls: Optional[pulumi.Input[bool]] = None,
|
1728
|
-
tls_max_version: Optional[pulumi.Input[str]] = None,
|
1729
|
-
tls_min_version: Optional[pulumi.Input[str]] = None,
|
1730
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1731
|
-
token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
|
1732
|
-
token_max_ttl: Optional[pulumi.Input[int]] = None,
|
1733
|
-
token_no_default_policy: Optional[pulumi.Input[bool]] = None,
|
1734
|
-
token_num_uses: Optional[pulumi.Input[int]] = None,
|
1735
|
-
token_period: Optional[pulumi.Input[int]] = None,
|
1736
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1737
|
-
token_ttl: Optional[pulumi.Input[int]] = None,
|
1738
|
-
token_type: Optional[pulumi.Input[str]] = None,
|
1739
|
-
upndomain: Optional[pulumi.Input[str]] = None,
|
1740
|
-
url: Optional[pulumi.Input[str]] = None,
|
1741
|
-
use_token_groups: Optional[pulumi.Input[bool]] = None,
|
1742
|
-
userattr: Optional[pulumi.Input[str]] = None,
|
1743
|
-
userdn: Optional[pulumi.Input[str]] = None,
|
1744
|
-
userfilter: Optional[pulumi.Input[str]] = None,
|
1745
|
-
username_as_alias: Optional[pulumi.Input[bool]] = None) -> 'AuthBackend':
|
1704
|
+
accessor: Optional[pulumi.Input[builtins.str]] = None,
|
1705
|
+
binddn: Optional[pulumi.Input[builtins.str]] = None,
|
1706
|
+
bindpass: Optional[pulumi.Input[builtins.str]] = None,
|
1707
|
+
case_sensitive_names: Optional[pulumi.Input[builtins.bool]] = None,
|
1708
|
+
certificate: Optional[pulumi.Input[builtins.str]] = None,
|
1709
|
+
client_tls_cert: Optional[pulumi.Input[builtins.str]] = None,
|
1710
|
+
client_tls_key: Optional[pulumi.Input[builtins.str]] = None,
|
1711
|
+
connection_timeout: Optional[pulumi.Input[builtins.int]] = None,
|
1712
|
+
deny_null_bind: Optional[pulumi.Input[builtins.bool]] = None,
|
1713
|
+
description: Optional[pulumi.Input[builtins.str]] = None,
|
1714
|
+
disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
|
1715
|
+
disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
|
1716
|
+
discoverdn: Optional[pulumi.Input[builtins.bool]] = None,
|
1717
|
+
groupattr: Optional[pulumi.Input[builtins.str]] = None,
|
1718
|
+
groupdn: Optional[pulumi.Input[builtins.str]] = None,
|
1719
|
+
groupfilter: Optional[pulumi.Input[builtins.str]] = None,
|
1720
|
+
insecure_tls: Optional[pulumi.Input[builtins.bool]] = None,
|
1721
|
+
local: Optional[pulumi.Input[builtins.bool]] = None,
|
1722
|
+
max_page_size: Optional[pulumi.Input[builtins.int]] = None,
|
1723
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
1724
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
1725
|
+
rotation_period: Optional[pulumi.Input[builtins.int]] = None,
|
1726
|
+
rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
|
1727
|
+
rotation_window: Optional[pulumi.Input[builtins.int]] = None,
|
1728
|
+
starttls: Optional[pulumi.Input[builtins.bool]] = None,
|
1729
|
+
tls_max_version: Optional[pulumi.Input[builtins.str]] = None,
|
1730
|
+
tls_min_version: Optional[pulumi.Input[builtins.str]] = None,
|
1731
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1732
|
+
token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
1733
|
+
token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
1734
|
+
token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
|
1735
|
+
token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
|
1736
|
+
token_period: Optional[pulumi.Input[builtins.int]] = None,
|
1737
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
|
1738
|
+
token_ttl: Optional[pulumi.Input[builtins.int]] = None,
|
1739
|
+
token_type: Optional[pulumi.Input[builtins.str]] = None,
|
1740
|
+
upndomain: Optional[pulumi.Input[builtins.str]] = None,
|
1741
|
+
url: Optional[pulumi.Input[builtins.str]] = None,
|
1742
|
+
use_token_groups: Optional[pulumi.Input[builtins.bool]] = None,
|
1743
|
+
userattr: Optional[pulumi.Input[builtins.str]] = None,
|
1744
|
+
userdn: Optional[pulumi.Input[builtins.str]] = None,
|
1745
|
+
userfilter: Optional[pulumi.Input[builtins.str]] = None,
|
1746
|
+
username_as_alias: Optional[pulumi.Input[builtins.bool]] = None) -> 'AuthBackend':
|
1746
1747
|
"""
|
1747
1748
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
1748
1749
|
properties used to qualify the lookup.
|
@@ -1750,56 +1751,56 @@ class AuthBackend(pulumi.CustomResource):
|
|
1750
1751
|
:param str resource_name: The unique name of the resulting resource.
|
1751
1752
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1752
1753
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1753
|
-
:param pulumi.Input[str] accessor: The accessor for this auth mount.
|
1754
|
-
:param pulumi.Input[str] binddn: DN of object to bind when performing user search
|
1755
|
-
:param pulumi.Input[str] bindpass: Password to use with `binddn` when performing user search
|
1756
|
-
:param pulumi.Input[bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
1757
|
-
:param pulumi.Input[str] certificate: Trusted CA to validate TLS certificate
|
1758
|
-
:param pulumi.Input[int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1759
|
-
:param pulumi.Input[bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
1760
|
-
:param pulumi.Input[str] description: Description for the LDAP auth backend mount
|
1761
|
-
:param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1762
|
-
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
1754
|
+
:param pulumi.Input[builtins.str] accessor: The accessor for this auth mount.
|
1755
|
+
:param pulumi.Input[builtins.str] binddn: DN of object to bind when performing user search
|
1756
|
+
:param pulumi.Input[builtins.str] bindpass: Password to use with `binddn` when performing user search
|
1757
|
+
:param pulumi.Input[builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
1758
|
+
:param pulumi.Input[builtins.str] certificate: Trusted CA to validate TLS certificate
|
1759
|
+
:param pulumi.Input[builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1760
|
+
:param pulumi.Input[builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
1761
|
+
:param pulumi.Input[builtins.str] description: Description for the LDAP auth backend mount
|
1762
|
+
:param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1763
|
+
:param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
1763
1764
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1764
|
-
:param pulumi.Input[bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
|
1765
|
-
:param pulumi.Input[str] groupattr: LDAP attribute to follow on objects returned by groupfilter
|
1766
|
-
:param pulumi.Input[str] groupdn: Base DN under which to perform group search
|
1767
|
-
:param pulumi.Input[str] groupfilter: Go template used to construct group membership query
|
1768
|
-
:param pulumi.Input[bool] insecure_tls: Control whether or TLS certificates must be validated
|
1769
|
-
:param pulumi.Input[bool] local: Specifies if the auth method is local only.
|
1770
|
-
:param pulumi.Input[int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
|
1765
|
+
:param pulumi.Input[builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
|
1766
|
+
:param pulumi.Input[builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
|
1767
|
+
:param pulumi.Input[builtins.str] groupdn: Base DN under which to perform group search
|
1768
|
+
:param pulumi.Input[builtins.str] groupfilter: Go template used to construct group membership query
|
1769
|
+
:param pulumi.Input[builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
|
1770
|
+
:param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
|
1771
|
+
:param pulumi.Input[builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
|
1771
1772
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
1772
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
1773
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
1773
1774
|
The value should not contain leading or trailing forward slashes.
|
1774
1775
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1775
1776
|
*Available only for Vault Enterprise*.
|
1776
|
-
:param pulumi.Input[str] path: Path to mount the LDAP auth backend under
|
1777
|
-
:param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1777
|
+
:param pulumi.Input[builtins.str] path: Path to mount the LDAP auth backend under
|
1778
|
+
:param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1778
1779
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1779
|
-
:param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1780
|
+
:param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1780
1781
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1781
|
-
:param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1782
|
+
:param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1782
1783
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1783
1784
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1784
|
-
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
1785
|
-
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
1786
|
-
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
1787
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1788
|
-
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1789
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1790
|
-
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1791
|
-
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1792
|
-
:param pulumi.Input[int] token_period: Generated Token's Period
|
1793
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1794
|
-
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1795
|
-
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1796
|
-
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1797
|
-
:param pulumi.Input[str] url: The URL of the LDAP server
|
1798
|
-
:param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
1799
|
-
:param pulumi.Input[str] userattr: Attribute on user object matching username passed in
|
1800
|
-
:param pulumi.Input[str] userdn: Base DN under which to perform user search
|
1801
|
-
:param pulumi.Input[str] userfilter: LDAP user search filter
|
1802
|
-
:param pulumi.Input[bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
|
1785
|
+
:param pulumi.Input[builtins.bool] starttls: Control use of TLS when conecting to LDAP
|
1786
|
+
:param pulumi.Input[builtins.str] tls_max_version: Maximum acceptable version of TLS
|
1787
|
+
:param pulumi.Input[builtins.str] tls_min_version: Minimum acceptable version of TLS
|
1788
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1789
|
+
:param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1790
|
+
:param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
1791
|
+
:param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1792
|
+
:param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1793
|
+
:param pulumi.Input[builtins.int] token_period: Generated Token's Period
|
1794
|
+
:param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
|
1795
|
+
:param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
1796
|
+
:param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
|
1797
|
+
:param pulumi.Input[builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1798
|
+
:param pulumi.Input[builtins.str] url: The URL of the LDAP server
|
1799
|
+
:param pulumi.Input[builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
1800
|
+
:param pulumi.Input[builtins.str] userattr: Attribute on user object matching username passed in
|
1801
|
+
:param pulumi.Input[builtins.str] userdn: Base DN under which to perform user search
|
1802
|
+
:param pulumi.Input[builtins.str] userfilter: LDAP user search filter
|
1803
|
+
:param pulumi.Input[builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
|
1803
1804
|
"""
|
1804
1805
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1805
1806
|
|
@@ -1852,7 +1853,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1852
1853
|
|
1853
1854
|
@property
|
1854
1855
|
@pulumi.getter
|
1855
|
-
def accessor(self) -> pulumi.Output[str]:
|
1856
|
+
def accessor(self) -> pulumi.Output[builtins.str]:
|
1856
1857
|
"""
|
1857
1858
|
The accessor for this auth mount.
|
1858
1859
|
"""
|
@@ -1860,7 +1861,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1860
1861
|
|
1861
1862
|
@property
|
1862
1863
|
@pulumi.getter
|
1863
|
-
def binddn(self) -> pulumi.Output[str]:
|
1864
|
+
def binddn(self) -> pulumi.Output[builtins.str]:
|
1864
1865
|
"""
|
1865
1866
|
DN of object to bind when performing user search
|
1866
1867
|
"""
|
@@ -1868,7 +1869,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1868
1869
|
|
1869
1870
|
@property
|
1870
1871
|
@pulumi.getter
|
1871
|
-
def bindpass(self) -> pulumi.Output[str]:
|
1872
|
+
def bindpass(self) -> pulumi.Output[builtins.str]:
|
1872
1873
|
"""
|
1873
1874
|
Password to use with `binddn` when performing user search
|
1874
1875
|
"""
|
@@ -1876,7 +1877,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1876
1877
|
|
1877
1878
|
@property
|
1878
1879
|
@pulumi.getter(name="caseSensitiveNames")
|
1879
|
-
def case_sensitive_names(self) -> pulumi.Output[bool]:
|
1880
|
+
def case_sensitive_names(self) -> pulumi.Output[builtins.bool]:
|
1880
1881
|
"""
|
1881
1882
|
Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
1882
1883
|
"""
|
@@ -1884,7 +1885,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1884
1885
|
|
1885
1886
|
@property
|
1886
1887
|
@pulumi.getter
|
1887
|
-
def certificate(self) -> pulumi.Output[str]:
|
1888
|
+
def certificate(self) -> pulumi.Output[builtins.str]:
|
1888
1889
|
"""
|
1889
1890
|
Trusted CA to validate TLS certificate
|
1890
1891
|
"""
|
@@ -1892,17 +1893,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
1892
1893
|
|
1893
1894
|
@property
|
1894
1895
|
@pulumi.getter(name="clientTlsCert")
|
1895
|
-
def client_tls_cert(self) -> pulumi.Output[str]:
|
1896
|
+
def client_tls_cert(self) -> pulumi.Output[builtins.str]:
|
1896
1897
|
return pulumi.get(self, "client_tls_cert")
|
1897
1898
|
|
1898
1899
|
@property
|
1899
1900
|
@pulumi.getter(name="clientTlsKey")
|
1900
|
-
def client_tls_key(self) -> pulumi.Output[str]:
|
1901
|
+
def client_tls_key(self) -> pulumi.Output[builtins.str]:
|
1901
1902
|
return pulumi.get(self, "client_tls_key")
|
1902
1903
|
|
1903
1904
|
@property
|
1904
1905
|
@pulumi.getter(name="connectionTimeout")
|
1905
|
-
def connection_timeout(self) -> pulumi.Output[int]:
|
1906
|
+
def connection_timeout(self) -> pulumi.Output[builtins.int]:
|
1906
1907
|
"""
|
1907
1908
|
Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1908
1909
|
"""
|
@@ -1910,7 +1911,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1910
1911
|
|
1911
1912
|
@property
|
1912
1913
|
@pulumi.getter(name="denyNullBind")
|
1913
|
-
def deny_null_bind(self) -> pulumi.Output[bool]:
|
1914
|
+
def deny_null_bind(self) -> pulumi.Output[builtins.bool]:
|
1914
1915
|
"""
|
1915
1916
|
Prevents users from bypassing authentication when providing an empty password.
|
1916
1917
|
"""
|
@@ -1918,7 +1919,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1918
1919
|
|
1919
1920
|
@property
|
1920
1921
|
@pulumi.getter
|
1921
|
-
def description(self) -> pulumi.Output[str]:
|
1922
|
+
def description(self) -> pulumi.Output[builtins.str]:
|
1922
1923
|
"""
|
1923
1924
|
Description for the LDAP auth backend mount
|
1924
1925
|
"""
|
@@ -1926,7 +1927,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1926
1927
|
|
1927
1928
|
@property
|
1928
1929
|
@pulumi.getter(name="disableAutomatedRotation")
|
1929
|
-
def disable_automated_rotation(self) -> pulumi.Output[Optional[bool]]:
|
1930
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
|
1930
1931
|
"""
|
1931
1932
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1932
1933
|
"""
|
@@ -1934,7 +1935,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1934
1935
|
|
1935
1936
|
@property
|
1936
1937
|
@pulumi.getter(name="disableRemount")
|
1937
|
-
def disable_remount(self) -> pulumi.Output[Optional[bool]]:
|
1938
|
+
def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
|
1938
1939
|
"""
|
1939
1940
|
If set, opts out of mount migration on path updates.
|
1940
1941
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -1943,7 +1944,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1943
1944
|
|
1944
1945
|
@property
|
1945
1946
|
@pulumi.getter
|
1946
|
-
def discoverdn(self) -> pulumi.Output[bool]:
|
1947
|
+
def discoverdn(self) -> pulumi.Output[builtins.bool]:
|
1947
1948
|
"""
|
1948
1949
|
Use anonymous bind to discover the bind DN of a user.
|
1949
1950
|
"""
|
@@ -1951,7 +1952,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1951
1952
|
|
1952
1953
|
@property
|
1953
1954
|
@pulumi.getter
|
1954
|
-
def groupattr(self) -> pulumi.Output[str]:
|
1955
|
+
def groupattr(self) -> pulumi.Output[builtins.str]:
|
1955
1956
|
"""
|
1956
1957
|
LDAP attribute to follow on objects returned by groupfilter
|
1957
1958
|
"""
|
@@ -1959,7 +1960,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1959
1960
|
|
1960
1961
|
@property
|
1961
1962
|
@pulumi.getter
|
1962
|
-
def groupdn(self) -> pulumi.Output[str]:
|
1963
|
+
def groupdn(self) -> pulumi.Output[builtins.str]:
|
1963
1964
|
"""
|
1964
1965
|
Base DN under which to perform group search
|
1965
1966
|
"""
|
@@ -1967,7 +1968,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1967
1968
|
|
1968
1969
|
@property
|
1969
1970
|
@pulumi.getter
|
1970
|
-
def groupfilter(self) -> pulumi.Output[str]:
|
1971
|
+
def groupfilter(self) -> pulumi.Output[builtins.str]:
|
1971
1972
|
"""
|
1972
1973
|
Go template used to construct group membership query
|
1973
1974
|
"""
|
@@ -1975,7 +1976,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1975
1976
|
|
1976
1977
|
@property
|
1977
1978
|
@pulumi.getter(name="insecureTls")
|
1978
|
-
def insecure_tls(self) -> pulumi.Output[bool]:
|
1979
|
+
def insecure_tls(self) -> pulumi.Output[builtins.bool]:
|
1979
1980
|
"""
|
1980
1981
|
Control whether or TLS certificates must be validated
|
1981
1982
|
"""
|
@@ -1983,7 +1984,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1983
1984
|
|
1984
1985
|
@property
|
1985
1986
|
@pulumi.getter
|
1986
|
-
def local(self) -> pulumi.Output[Optional[bool]]:
|
1987
|
+
def local(self) -> pulumi.Output[Optional[builtins.bool]]:
|
1987
1988
|
"""
|
1988
1989
|
Specifies if the auth method is local only.
|
1989
1990
|
"""
|
@@ -1991,7 +1992,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1991
1992
|
|
1992
1993
|
@property
|
1993
1994
|
@pulumi.getter(name="maxPageSize")
|
1994
|
-
def max_page_size(self) -> pulumi.Output[Optional[int]]:
|
1995
|
+
def max_page_size(self) -> pulumi.Output[Optional[builtins.int]]:
|
1995
1996
|
"""
|
1996
1997
|
Sets the max page size for LDAP lookups, by default it's set to -1.
|
1997
1998
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
@@ -2000,7 +2001,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2000
2001
|
|
2001
2002
|
@property
|
2002
2003
|
@pulumi.getter
|
2003
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
2004
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
2004
2005
|
"""
|
2005
2006
|
The namespace to provision the resource in.
|
2006
2007
|
The value should not contain leading or trailing forward slashes.
|
@@ -2011,7 +2012,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2011
2012
|
|
2012
2013
|
@property
|
2013
2014
|
@pulumi.getter
|
2014
|
-
def path(self) -> pulumi.Output[Optional[str]]:
|
2015
|
+
def path(self) -> pulumi.Output[Optional[builtins.str]]:
|
2015
2016
|
"""
|
2016
2017
|
Path to mount the LDAP auth backend under
|
2017
2018
|
"""
|
@@ -2019,7 +2020,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2019
2020
|
|
2020
2021
|
@property
|
2021
2022
|
@pulumi.getter(name="rotationPeriod")
|
2022
|
-
def rotation_period(self) -> pulumi.Output[Optional[int]]:
|
2023
|
+
def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
|
2023
2024
|
"""
|
2024
2025
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
2025
2026
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -2028,7 +2029,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2028
2029
|
|
2029
2030
|
@property
|
2030
2031
|
@pulumi.getter(name="rotationSchedule")
|
2031
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[str]]:
|
2032
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
|
2032
2033
|
"""
|
2033
2034
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
2034
2035
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -2037,7 +2038,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2037
2038
|
|
2038
2039
|
@property
|
2039
2040
|
@pulumi.getter(name="rotationWindow")
|
2040
|
-
def rotation_window(self) -> pulumi.Output[Optional[int]]:
|
2041
|
+
def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
|
2041
2042
|
"""
|
2042
2043
|
The maximum amount of time in seconds allowed to complete
|
2043
2044
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -2047,7 +2048,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2047
2048
|
|
2048
2049
|
@property
|
2049
2050
|
@pulumi.getter
|
2050
|
-
def starttls(self) -> pulumi.Output[bool]:
|
2051
|
+
def starttls(self) -> pulumi.Output[builtins.bool]:
|
2051
2052
|
"""
|
2052
2053
|
Control use of TLS when conecting to LDAP
|
2053
2054
|
"""
|
@@ -2055,7 +2056,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2055
2056
|
|
2056
2057
|
@property
|
2057
2058
|
@pulumi.getter(name="tlsMaxVersion")
|
2058
|
-
def tls_max_version(self) -> pulumi.Output[str]:
|
2059
|
+
def tls_max_version(self) -> pulumi.Output[builtins.str]:
|
2059
2060
|
"""
|
2060
2061
|
Maximum acceptable version of TLS
|
2061
2062
|
"""
|
@@ -2063,7 +2064,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2063
2064
|
|
2064
2065
|
@property
|
2065
2066
|
@pulumi.getter(name="tlsMinVersion")
|
2066
|
-
def tls_min_version(self) -> pulumi.Output[str]:
|
2067
|
+
def tls_min_version(self) -> pulumi.Output[builtins.str]:
|
2067
2068
|
"""
|
2068
2069
|
Minimum acceptable version of TLS
|
2069
2070
|
"""
|
@@ -2071,7 +2072,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2071
2072
|
|
2072
2073
|
@property
|
2073
2074
|
@pulumi.getter(name="tokenBoundCidrs")
|
2074
|
-
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
2075
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
2075
2076
|
"""
|
2076
2077
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
2077
2078
|
"""
|
@@ -2079,7 +2080,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2079
2080
|
|
2080
2081
|
@property
|
2081
2082
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
2082
|
-
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
2083
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
2083
2084
|
"""
|
2084
2085
|
Generated Token's Explicit Maximum TTL in seconds
|
2085
2086
|
"""
|
@@ -2087,7 +2088,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2087
2088
|
|
2088
2089
|
@property
|
2089
2090
|
@pulumi.getter(name="tokenMaxTtl")
|
2090
|
-
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
2091
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
2091
2092
|
"""
|
2092
2093
|
The maximum lifetime of the generated token
|
2093
2094
|
"""
|
@@ -2095,7 +2096,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2095
2096
|
|
2096
2097
|
@property
|
2097
2098
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
2098
|
-
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
2099
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
|
2099
2100
|
"""
|
2100
2101
|
If true, the 'default' policy will not automatically be added to generated tokens
|
2101
2102
|
"""
|
@@ -2103,7 +2104,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2103
2104
|
|
2104
2105
|
@property
|
2105
2106
|
@pulumi.getter(name="tokenNumUses")
|
2106
|
-
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
2107
|
+
def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
|
2107
2108
|
"""
|
2108
2109
|
The maximum number of times a token may be used, a value of zero means unlimited
|
2109
2110
|
"""
|
@@ -2111,7 +2112,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2111
2112
|
|
2112
2113
|
@property
|
2113
2114
|
@pulumi.getter(name="tokenPeriod")
|
2114
|
-
def token_period(self) -> pulumi.Output[Optional[int]]:
|
2115
|
+
def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
|
2115
2116
|
"""
|
2116
2117
|
Generated Token's Period
|
2117
2118
|
"""
|
@@ -2119,7 +2120,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2119
2120
|
|
2120
2121
|
@property
|
2121
2122
|
@pulumi.getter(name="tokenPolicies")
|
2122
|
-
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
2123
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
|
2123
2124
|
"""
|
2124
2125
|
Generated Token's Policies
|
2125
2126
|
"""
|
@@ -2127,7 +2128,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2127
2128
|
|
2128
2129
|
@property
|
2129
2130
|
@pulumi.getter(name="tokenTtl")
|
2130
|
-
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
2131
|
+
def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
|
2131
2132
|
"""
|
2132
2133
|
The initial ttl of the token to generate in seconds
|
2133
2134
|
"""
|
@@ -2135,7 +2136,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2135
2136
|
|
2136
2137
|
@property
|
2137
2138
|
@pulumi.getter(name="tokenType")
|
2138
|
-
def token_type(self) -> pulumi.Output[Optional[str]]:
|
2139
|
+
def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
|
2139
2140
|
"""
|
2140
2141
|
The type of token to generate, service or batch
|
2141
2142
|
"""
|
@@ -2143,7 +2144,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2143
2144
|
|
2144
2145
|
@property
|
2145
2146
|
@pulumi.getter
|
2146
|
-
def upndomain(self) -> pulumi.Output[str]:
|
2147
|
+
def upndomain(self) -> pulumi.Output[builtins.str]:
|
2147
2148
|
"""
|
2148
2149
|
The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
2149
2150
|
"""
|
@@ -2151,7 +2152,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2151
2152
|
|
2152
2153
|
@property
|
2153
2154
|
@pulumi.getter
|
2154
|
-
def url(self) -> pulumi.Output[str]:
|
2155
|
+
def url(self) -> pulumi.Output[builtins.str]:
|
2155
2156
|
"""
|
2156
2157
|
The URL of the LDAP server
|
2157
2158
|
"""
|
@@ -2159,7 +2160,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2159
2160
|
|
2160
2161
|
@property
|
2161
2162
|
@pulumi.getter(name="useTokenGroups")
|
2162
|
-
def use_token_groups(self) -> pulumi.Output[bool]:
|
2163
|
+
def use_token_groups(self) -> pulumi.Output[builtins.bool]:
|
2163
2164
|
"""
|
2164
2165
|
Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
2165
2166
|
"""
|
@@ -2167,7 +2168,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2167
2168
|
|
2168
2169
|
@property
|
2169
2170
|
@pulumi.getter
|
2170
|
-
def userattr(self) -> pulumi.Output[str]:
|
2171
|
+
def userattr(self) -> pulumi.Output[builtins.str]:
|
2171
2172
|
"""
|
2172
2173
|
Attribute on user object matching username passed in
|
2173
2174
|
"""
|
@@ -2175,7 +2176,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2175
2176
|
|
2176
2177
|
@property
|
2177
2178
|
@pulumi.getter
|
2178
|
-
def userdn(self) -> pulumi.Output[str]:
|
2179
|
+
def userdn(self) -> pulumi.Output[builtins.str]:
|
2179
2180
|
"""
|
2180
2181
|
Base DN under which to perform user search
|
2181
2182
|
"""
|
@@ -2183,7 +2184,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2183
2184
|
|
2184
2185
|
@property
|
2185
2186
|
@pulumi.getter
|
2186
|
-
def userfilter(self) -> pulumi.Output[str]:
|
2187
|
+
def userfilter(self) -> pulumi.Output[builtins.str]:
|
2187
2188
|
"""
|
2188
2189
|
LDAP user search filter
|
2189
2190
|
"""
|
@@ -2191,7 +2192,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
2191
2192
|
|
2192
2193
|
@property
|
2193
2194
|
@pulumi.getter(name="usernameAsAlias")
|
2194
|
-
def username_as_alias(self) -> pulumi.Output[bool]:
|
2195
|
+
def username_as_alias(self) -> pulumi.Output[builtins.bool]:
|
2195
2196
|
"""
|
2196
2197
|
Force the auth method to use the username passed by the user as the alias name.
|
2197
2198
|
"""
|