pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,99 +19,99 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
url: pulumi.Input[
|
24
|
-
binddn: Optional[pulumi.Input[
|
25
|
-
bindpass: Optional[pulumi.Input[
|
26
|
-
case_sensitive_names: Optional[pulumi.Input[
|
27
|
-
certificate: Optional[pulumi.Input[
|
28
|
-
client_tls_cert: Optional[pulumi.Input[
|
29
|
-
client_tls_key: Optional[pulumi.Input[
|
30
|
-
connection_timeout: Optional[pulumi.Input[
|
31
|
-
deny_null_bind: Optional[pulumi.Input[
|
32
|
-
description: Optional[pulumi.Input[
|
33
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
34
|
-
disable_remount: Optional[pulumi.Input[
|
35
|
-
discoverdn: Optional[pulumi.Input[
|
36
|
-
groupattr: Optional[pulumi.Input[
|
37
|
-
groupdn: Optional[pulumi.Input[
|
38
|
-
groupfilter: Optional[pulumi.Input[
|
39
|
-
insecure_tls: Optional[pulumi.Input[
|
40
|
-
local: Optional[pulumi.Input[
|
41
|
-
max_page_size: Optional[pulumi.Input[
|
42
|
-
namespace: Optional[pulumi.Input[
|
43
|
-
path: Optional[pulumi.Input[
|
44
|
-
rotation_period: Optional[pulumi.Input[
|
45
|
-
rotation_schedule: Optional[pulumi.Input[
|
46
|
-
rotation_window: Optional[pulumi.Input[
|
47
|
-
starttls: Optional[pulumi.Input[
|
48
|
-
tls_max_version: Optional[pulumi.Input[
|
49
|
-
tls_min_version: Optional[pulumi.Input[
|
50
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
51
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
52
|
-
token_max_ttl: Optional[pulumi.Input[
|
53
|
-
token_no_default_policy: Optional[pulumi.Input[
|
54
|
-
token_num_uses: Optional[pulumi.Input[
|
55
|
-
token_period: Optional[pulumi.Input[
|
56
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
57
|
-
token_ttl: Optional[pulumi.Input[
|
58
|
-
token_type: Optional[pulumi.Input[
|
59
|
-
upndomain: Optional[pulumi.Input[
|
60
|
-
use_token_groups: Optional[pulumi.Input[
|
61
|
-
userattr: Optional[pulumi.Input[
|
62
|
-
userdn: Optional[pulumi.Input[
|
63
|
-
userfilter: Optional[pulumi.Input[
|
64
|
-
username_as_alias: Optional[pulumi.Input[
|
22
|
+
url: pulumi.Input[_builtins.str],
|
23
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
case_sensitive_names: Optional[pulumi.Input[_builtins.bool]] = None,
|
26
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
30
|
+
deny_null_bind: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
33
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
34
|
+
discoverdn: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
groupattr: Optional[pulumi.Input[_builtins.str]] = None,
|
36
|
+
groupdn: Optional[pulumi.Input[_builtins.str]] = None,
|
37
|
+
groupfilter: Optional[pulumi.Input[_builtins.str]] = None,
|
38
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
39
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
40
|
+
max_page_size: Optional[pulumi.Input[_builtins.int]] = None,
|
41
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
42
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
43
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
44
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
45
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
46
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
47
|
+
tls_max_version: Optional[pulumi.Input[_builtins.str]] = None,
|
48
|
+
tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
|
49
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
50
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
51
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
52
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
53
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
54
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
55
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
56
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
57
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
58
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
59
|
+
use_token_groups: Optional[pulumi.Input[_builtins.bool]] = None,
|
60
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
61
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None,
|
62
|
+
userfilter: Optional[pulumi.Input[_builtins.str]] = None,
|
63
|
+
username_as_alias: Optional[pulumi.Input[_builtins.bool]] = None):
|
65
64
|
"""
|
66
65
|
The set of arguments for constructing a AuthBackend resource.
|
67
|
-
:param pulumi.Input[
|
68
|
-
:param pulumi.Input[
|
69
|
-
:param pulumi.Input[
|
70
|
-
:param pulumi.Input[
|
71
|
-
:param pulumi.Input[
|
72
|
-
:param pulumi.Input[
|
73
|
-
:param pulumi.Input[
|
74
|
-
:param pulumi.Input[
|
75
|
-
:param pulumi.Input[
|
76
|
-
:param pulumi.Input[
|
66
|
+
:param pulumi.Input[_builtins.str] url: The URL of the LDAP server
|
67
|
+
:param pulumi.Input[_builtins.str] binddn: DN of object to bind when performing user search
|
68
|
+
:param pulumi.Input[_builtins.str] bindpass: Password to use with `binddn` when performing user search
|
69
|
+
:param pulumi.Input[_builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
70
|
+
:param pulumi.Input[_builtins.str] certificate: Trusted CA to validate TLS certificate
|
71
|
+
:param pulumi.Input[_builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
72
|
+
:param pulumi.Input[_builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
73
|
+
:param pulumi.Input[_builtins.str] description: Description for the LDAP auth backend mount
|
74
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
75
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
77
76
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
78
|
-
:param pulumi.Input[
|
79
|
-
:param pulumi.Input[
|
80
|
-
:param pulumi.Input[
|
81
|
-
:param pulumi.Input[
|
82
|
-
:param pulumi.Input[
|
83
|
-
:param pulumi.Input[
|
84
|
-
:param pulumi.Input[
|
77
|
+
:param pulumi.Input[_builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
|
78
|
+
:param pulumi.Input[_builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
|
79
|
+
:param pulumi.Input[_builtins.str] groupdn: Base DN under which to perform group search
|
80
|
+
:param pulumi.Input[_builtins.str] groupfilter: Go template used to construct group membership query
|
81
|
+
:param pulumi.Input[_builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
|
82
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
|
83
|
+
:param pulumi.Input[_builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
|
85
84
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
86
|
-
:param pulumi.Input[
|
85
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
87
86
|
The value should not contain leading or trailing forward slashes.
|
88
87
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
89
88
|
*Available only for Vault Enterprise*.
|
90
|
-
:param pulumi.Input[
|
91
|
-
:param pulumi.Input[
|
89
|
+
:param pulumi.Input[_builtins.str] path: Path to mount the LDAP auth backend under
|
90
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
92
91
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
93
|
-
:param pulumi.Input[
|
92
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
94
93
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
95
|
-
:param pulumi.Input[
|
94
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
96
95
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
97
96
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
98
|
-
:param pulumi.Input[
|
99
|
-
:param pulumi.Input[
|
100
|
-
:param pulumi.Input[
|
101
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
102
|
-
:param pulumi.Input[
|
103
|
-
:param pulumi.Input[
|
104
|
-
:param pulumi.Input[
|
105
|
-
:param pulumi.Input[
|
106
|
-
:param pulumi.Input[
|
107
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
108
|
-
:param pulumi.Input[
|
109
|
-
:param pulumi.Input[
|
110
|
-
:param pulumi.Input[
|
111
|
-
:param pulumi.Input[
|
112
|
-
:param pulumi.Input[
|
113
|
-
:param pulumi.Input[
|
114
|
-
:param pulumi.Input[
|
115
|
-
:param pulumi.Input[
|
97
|
+
:param pulumi.Input[_builtins.bool] starttls: Control use of TLS when conecting to LDAP
|
98
|
+
:param pulumi.Input[_builtins.str] tls_max_version: Maximum acceptable version of TLS
|
99
|
+
:param pulumi.Input[_builtins.str] tls_min_version: Minimum acceptable version of TLS
|
100
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
101
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
102
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
103
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
104
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
105
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
106
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
107
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
108
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
109
|
+
:param pulumi.Input[_builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
110
|
+
:param pulumi.Input[_builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
111
|
+
:param pulumi.Input[_builtins.str] userattr: Attribute on user object matching username passed in
|
112
|
+
:param pulumi.Input[_builtins.str] userdn: Base DN under which to perform user search
|
113
|
+
:param pulumi.Input[_builtins.str] userfilter: LDAP user search filter
|
114
|
+
:param pulumi.Input[_builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
|
116
115
|
"""
|
117
116
|
pulumi.set(__self__, "url", url)
|
118
117
|
if binddn is not None:
|
@@ -198,135 +197,135 @@ class AuthBackendArgs:
|
|
198
197
|
if username_as_alias is not None:
|
199
198
|
pulumi.set(__self__, "username_as_alias", username_as_alias)
|
200
199
|
|
201
|
-
@property
|
200
|
+
@_builtins.property
|
202
201
|
@pulumi.getter
|
203
|
-
def url(self) -> pulumi.Input[
|
202
|
+
def url(self) -> pulumi.Input[_builtins.str]:
|
204
203
|
"""
|
205
204
|
The URL of the LDAP server
|
206
205
|
"""
|
207
206
|
return pulumi.get(self, "url")
|
208
207
|
|
209
208
|
@url.setter
|
210
|
-
def url(self, value: pulumi.Input[
|
209
|
+
def url(self, value: pulumi.Input[_builtins.str]):
|
211
210
|
pulumi.set(self, "url", value)
|
212
211
|
|
213
|
-
@property
|
212
|
+
@_builtins.property
|
214
213
|
@pulumi.getter
|
215
|
-
def binddn(self) -> Optional[pulumi.Input[
|
214
|
+
def binddn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
216
215
|
"""
|
217
216
|
DN of object to bind when performing user search
|
218
217
|
"""
|
219
218
|
return pulumi.get(self, "binddn")
|
220
219
|
|
221
220
|
@binddn.setter
|
222
|
-
def binddn(self, value: Optional[pulumi.Input[
|
221
|
+
def binddn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
223
222
|
pulumi.set(self, "binddn", value)
|
224
223
|
|
225
|
-
@property
|
224
|
+
@_builtins.property
|
226
225
|
@pulumi.getter
|
227
|
-
def bindpass(self) -> Optional[pulumi.Input[
|
226
|
+
def bindpass(self) -> Optional[pulumi.Input[_builtins.str]]:
|
228
227
|
"""
|
229
228
|
Password to use with `binddn` when performing user search
|
230
229
|
"""
|
231
230
|
return pulumi.get(self, "bindpass")
|
232
231
|
|
233
232
|
@bindpass.setter
|
234
|
-
def bindpass(self, value: Optional[pulumi.Input[
|
233
|
+
def bindpass(self, value: Optional[pulumi.Input[_builtins.str]]):
|
235
234
|
pulumi.set(self, "bindpass", value)
|
236
235
|
|
237
|
-
@property
|
236
|
+
@_builtins.property
|
238
237
|
@pulumi.getter(name="caseSensitiveNames")
|
239
|
-
def case_sensitive_names(self) -> Optional[pulumi.Input[
|
238
|
+
def case_sensitive_names(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
240
239
|
"""
|
241
240
|
Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
242
241
|
"""
|
243
242
|
return pulumi.get(self, "case_sensitive_names")
|
244
243
|
|
245
244
|
@case_sensitive_names.setter
|
246
|
-
def case_sensitive_names(self, value: Optional[pulumi.Input[
|
245
|
+
def case_sensitive_names(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
247
246
|
pulumi.set(self, "case_sensitive_names", value)
|
248
247
|
|
249
|
-
@property
|
248
|
+
@_builtins.property
|
250
249
|
@pulumi.getter
|
251
|
-
def certificate(self) -> Optional[pulumi.Input[
|
250
|
+
def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
|
252
251
|
"""
|
253
252
|
Trusted CA to validate TLS certificate
|
254
253
|
"""
|
255
254
|
return pulumi.get(self, "certificate")
|
256
255
|
|
257
256
|
@certificate.setter
|
258
|
-
def certificate(self, value: Optional[pulumi.Input[
|
257
|
+
def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
|
259
258
|
pulumi.set(self, "certificate", value)
|
260
259
|
|
261
|
-
@property
|
260
|
+
@_builtins.property
|
262
261
|
@pulumi.getter(name="clientTlsCert")
|
263
|
-
def client_tls_cert(self) -> Optional[pulumi.Input[
|
262
|
+
def client_tls_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
264
263
|
return pulumi.get(self, "client_tls_cert")
|
265
264
|
|
266
265
|
@client_tls_cert.setter
|
267
|
-
def client_tls_cert(self, value: Optional[pulumi.Input[
|
266
|
+
def client_tls_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
268
267
|
pulumi.set(self, "client_tls_cert", value)
|
269
268
|
|
270
|
-
@property
|
269
|
+
@_builtins.property
|
271
270
|
@pulumi.getter(name="clientTlsKey")
|
272
|
-
def client_tls_key(self) -> Optional[pulumi.Input[
|
271
|
+
def client_tls_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
273
272
|
return pulumi.get(self, "client_tls_key")
|
274
273
|
|
275
274
|
@client_tls_key.setter
|
276
|
-
def client_tls_key(self, value: Optional[pulumi.Input[
|
275
|
+
def client_tls_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
277
276
|
pulumi.set(self, "client_tls_key", value)
|
278
277
|
|
279
|
-
@property
|
278
|
+
@_builtins.property
|
280
279
|
@pulumi.getter(name="connectionTimeout")
|
281
|
-
def connection_timeout(self) -> Optional[pulumi.Input[
|
280
|
+
def connection_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
|
282
281
|
"""
|
283
282
|
Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
284
283
|
"""
|
285
284
|
return pulumi.get(self, "connection_timeout")
|
286
285
|
|
287
286
|
@connection_timeout.setter
|
288
|
-
def connection_timeout(self, value: Optional[pulumi.Input[
|
287
|
+
def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
|
289
288
|
pulumi.set(self, "connection_timeout", value)
|
290
289
|
|
291
|
-
@property
|
290
|
+
@_builtins.property
|
292
291
|
@pulumi.getter(name="denyNullBind")
|
293
|
-
def deny_null_bind(self) -> Optional[pulumi.Input[
|
292
|
+
def deny_null_bind(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
294
293
|
"""
|
295
294
|
Prevents users from bypassing authentication when providing an empty password.
|
296
295
|
"""
|
297
296
|
return pulumi.get(self, "deny_null_bind")
|
298
297
|
|
299
298
|
@deny_null_bind.setter
|
300
|
-
def deny_null_bind(self, value: Optional[pulumi.Input[
|
299
|
+
def deny_null_bind(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
301
300
|
pulumi.set(self, "deny_null_bind", value)
|
302
301
|
|
303
|
-
@property
|
302
|
+
@_builtins.property
|
304
303
|
@pulumi.getter
|
305
|
-
def description(self) -> Optional[pulumi.Input[
|
304
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
306
305
|
"""
|
307
306
|
Description for the LDAP auth backend mount
|
308
307
|
"""
|
309
308
|
return pulumi.get(self, "description")
|
310
309
|
|
311
310
|
@description.setter
|
312
|
-
def description(self, value: Optional[pulumi.Input[
|
311
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
313
312
|
pulumi.set(self, "description", value)
|
314
313
|
|
315
|
-
@property
|
314
|
+
@_builtins.property
|
316
315
|
@pulumi.getter(name="disableAutomatedRotation")
|
317
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
316
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
318
317
|
"""
|
319
318
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
320
319
|
"""
|
321
320
|
return pulumi.get(self, "disable_automated_rotation")
|
322
321
|
|
323
322
|
@disable_automated_rotation.setter
|
324
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
323
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
325
324
|
pulumi.set(self, "disable_automated_rotation", value)
|
326
325
|
|
327
|
-
@property
|
326
|
+
@_builtins.property
|
328
327
|
@pulumi.getter(name="disableRemount")
|
329
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
328
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
330
329
|
"""
|
331
330
|
If set, opts out of mount migration on path updates.
|
332
331
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -334,84 +333,84 @@ class AuthBackendArgs:
|
|
334
333
|
return pulumi.get(self, "disable_remount")
|
335
334
|
|
336
335
|
@disable_remount.setter
|
337
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
336
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
338
337
|
pulumi.set(self, "disable_remount", value)
|
339
338
|
|
340
|
-
@property
|
339
|
+
@_builtins.property
|
341
340
|
@pulumi.getter
|
342
|
-
def discoverdn(self) -> Optional[pulumi.Input[
|
341
|
+
def discoverdn(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
343
342
|
"""
|
344
343
|
Use anonymous bind to discover the bind DN of a user.
|
345
344
|
"""
|
346
345
|
return pulumi.get(self, "discoverdn")
|
347
346
|
|
348
347
|
@discoverdn.setter
|
349
|
-
def discoverdn(self, value: Optional[pulumi.Input[
|
348
|
+
def discoverdn(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
350
349
|
pulumi.set(self, "discoverdn", value)
|
351
350
|
|
352
|
-
@property
|
351
|
+
@_builtins.property
|
353
352
|
@pulumi.getter
|
354
|
-
def groupattr(self) -> Optional[pulumi.Input[
|
353
|
+
def groupattr(self) -> Optional[pulumi.Input[_builtins.str]]:
|
355
354
|
"""
|
356
355
|
LDAP attribute to follow on objects returned by groupfilter
|
357
356
|
"""
|
358
357
|
return pulumi.get(self, "groupattr")
|
359
358
|
|
360
359
|
@groupattr.setter
|
361
|
-
def groupattr(self, value: Optional[pulumi.Input[
|
360
|
+
def groupattr(self, value: Optional[pulumi.Input[_builtins.str]]):
|
362
361
|
pulumi.set(self, "groupattr", value)
|
363
362
|
|
364
|
-
@property
|
363
|
+
@_builtins.property
|
365
364
|
@pulumi.getter
|
366
|
-
def groupdn(self) -> Optional[pulumi.Input[
|
365
|
+
def groupdn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
367
366
|
"""
|
368
367
|
Base DN under which to perform group search
|
369
368
|
"""
|
370
369
|
return pulumi.get(self, "groupdn")
|
371
370
|
|
372
371
|
@groupdn.setter
|
373
|
-
def groupdn(self, value: Optional[pulumi.Input[
|
372
|
+
def groupdn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
374
373
|
pulumi.set(self, "groupdn", value)
|
375
374
|
|
376
|
-
@property
|
375
|
+
@_builtins.property
|
377
376
|
@pulumi.getter
|
378
|
-
def groupfilter(self) -> Optional[pulumi.Input[
|
377
|
+
def groupfilter(self) -> Optional[pulumi.Input[_builtins.str]]:
|
379
378
|
"""
|
380
379
|
Go template used to construct group membership query
|
381
380
|
"""
|
382
381
|
return pulumi.get(self, "groupfilter")
|
383
382
|
|
384
383
|
@groupfilter.setter
|
385
|
-
def groupfilter(self, value: Optional[pulumi.Input[
|
384
|
+
def groupfilter(self, value: Optional[pulumi.Input[_builtins.str]]):
|
386
385
|
pulumi.set(self, "groupfilter", value)
|
387
386
|
|
388
|
-
@property
|
387
|
+
@_builtins.property
|
389
388
|
@pulumi.getter(name="insecureTls")
|
390
|
-
def insecure_tls(self) -> Optional[pulumi.Input[
|
389
|
+
def insecure_tls(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
391
390
|
"""
|
392
391
|
Control whether or TLS certificates must be validated
|
393
392
|
"""
|
394
393
|
return pulumi.get(self, "insecure_tls")
|
395
394
|
|
396
395
|
@insecure_tls.setter
|
397
|
-
def insecure_tls(self, value: Optional[pulumi.Input[
|
396
|
+
def insecure_tls(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
398
397
|
pulumi.set(self, "insecure_tls", value)
|
399
398
|
|
400
|
-
@property
|
399
|
+
@_builtins.property
|
401
400
|
@pulumi.getter
|
402
|
-
def local(self) -> Optional[pulumi.Input[
|
401
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
403
402
|
"""
|
404
403
|
Specifies if the auth method is local only.
|
405
404
|
"""
|
406
405
|
return pulumi.get(self, "local")
|
407
406
|
|
408
407
|
@local.setter
|
409
|
-
def local(self, value: Optional[pulumi.Input[
|
408
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
410
409
|
pulumi.set(self, "local", value)
|
411
410
|
|
412
|
-
@property
|
411
|
+
@_builtins.property
|
413
412
|
@pulumi.getter(name="maxPageSize")
|
414
|
-
def max_page_size(self) -> Optional[pulumi.Input[
|
413
|
+
def max_page_size(self) -> Optional[pulumi.Input[_builtins.int]]:
|
415
414
|
"""
|
416
415
|
Sets the max page size for LDAP lookups, by default it's set to -1.
|
417
416
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
@@ -419,12 +418,12 @@ class AuthBackendArgs:
|
|
419
418
|
return pulumi.get(self, "max_page_size")
|
420
419
|
|
421
420
|
@max_page_size.setter
|
422
|
-
def max_page_size(self, value: Optional[pulumi.Input[
|
421
|
+
def max_page_size(self, value: Optional[pulumi.Input[_builtins.int]]):
|
423
422
|
pulumi.set(self, "max_page_size", value)
|
424
423
|
|
425
|
-
@property
|
424
|
+
@_builtins.property
|
426
425
|
@pulumi.getter
|
427
|
-
def namespace(self) -> Optional[pulumi.Input[
|
426
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
428
427
|
"""
|
429
428
|
The namespace to provision the resource in.
|
430
429
|
The value should not contain leading or trailing forward slashes.
|
@@ -434,24 +433,24 @@ class AuthBackendArgs:
|
|
434
433
|
return pulumi.get(self, "namespace")
|
435
434
|
|
436
435
|
@namespace.setter
|
437
|
-
def namespace(self, value: Optional[pulumi.Input[
|
436
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
438
437
|
pulumi.set(self, "namespace", value)
|
439
438
|
|
440
|
-
@property
|
439
|
+
@_builtins.property
|
441
440
|
@pulumi.getter
|
442
|
-
def path(self) -> Optional[pulumi.Input[
|
441
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
443
442
|
"""
|
444
443
|
Path to mount the LDAP auth backend under
|
445
444
|
"""
|
446
445
|
return pulumi.get(self, "path")
|
447
446
|
|
448
447
|
@path.setter
|
449
|
-
def path(self, value: Optional[pulumi.Input[
|
448
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
450
449
|
pulumi.set(self, "path", value)
|
451
450
|
|
452
|
-
@property
|
451
|
+
@_builtins.property
|
453
452
|
@pulumi.getter(name="rotationPeriod")
|
454
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
453
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
455
454
|
"""
|
456
455
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
457
456
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -459,12 +458,12 @@ class AuthBackendArgs:
|
|
459
458
|
return pulumi.get(self, "rotation_period")
|
460
459
|
|
461
460
|
@rotation_period.setter
|
462
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
461
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
463
462
|
pulumi.set(self, "rotation_period", value)
|
464
463
|
|
465
|
-
@property
|
464
|
+
@_builtins.property
|
466
465
|
@pulumi.getter(name="rotationSchedule")
|
467
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
466
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
468
467
|
"""
|
469
468
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
470
469
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -472,12 +471,12 @@ class AuthBackendArgs:
|
|
472
471
|
return pulumi.get(self, "rotation_schedule")
|
473
472
|
|
474
473
|
@rotation_schedule.setter
|
475
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
474
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
476
475
|
pulumi.set(self, "rotation_schedule", value)
|
477
476
|
|
478
|
-
@property
|
477
|
+
@_builtins.property
|
479
478
|
@pulumi.getter(name="rotationWindow")
|
480
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
479
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
481
480
|
"""
|
482
481
|
The maximum amount of time in seconds allowed to complete
|
483
482
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -486,324 +485,324 @@ class AuthBackendArgs:
|
|
486
485
|
return pulumi.get(self, "rotation_window")
|
487
486
|
|
488
487
|
@rotation_window.setter
|
489
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
488
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
490
489
|
pulumi.set(self, "rotation_window", value)
|
491
490
|
|
492
|
-
@property
|
491
|
+
@_builtins.property
|
493
492
|
@pulumi.getter
|
494
|
-
def starttls(self) -> Optional[pulumi.Input[
|
493
|
+
def starttls(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
495
494
|
"""
|
496
495
|
Control use of TLS when conecting to LDAP
|
497
496
|
"""
|
498
497
|
return pulumi.get(self, "starttls")
|
499
498
|
|
500
499
|
@starttls.setter
|
501
|
-
def starttls(self, value: Optional[pulumi.Input[
|
500
|
+
def starttls(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
502
501
|
pulumi.set(self, "starttls", value)
|
503
502
|
|
504
|
-
@property
|
503
|
+
@_builtins.property
|
505
504
|
@pulumi.getter(name="tlsMaxVersion")
|
506
|
-
def tls_max_version(self) -> Optional[pulumi.Input[
|
505
|
+
def tls_max_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
507
506
|
"""
|
508
507
|
Maximum acceptable version of TLS
|
509
508
|
"""
|
510
509
|
return pulumi.get(self, "tls_max_version")
|
511
510
|
|
512
511
|
@tls_max_version.setter
|
513
|
-
def tls_max_version(self, value: Optional[pulumi.Input[
|
512
|
+
def tls_max_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
514
513
|
pulumi.set(self, "tls_max_version", value)
|
515
514
|
|
516
|
-
@property
|
515
|
+
@_builtins.property
|
517
516
|
@pulumi.getter(name="tlsMinVersion")
|
518
|
-
def tls_min_version(self) -> Optional[pulumi.Input[
|
517
|
+
def tls_min_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
519
518
|
"""
|
520
519
|
Minimum acceptable version of TLS
|
521
520
|
"""
|
522
521
|
return pulumi.get(self, "tls_min_version")
|
523
522
|
|
524
523
|
@tls_min_version.setter
|
525
|
-
def tls_min_version(self, value: Optional[pulumi.Input[
|
524
|
+
def tls_min_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
526
525
|
pulumi.set(self, "tls_min_version", value)
|
527
526
|
|
528
|
-
@property
|
527
|
+
@_builtins.property
|
529
528
|
@pulumi.getter(name="tokenBoundCidrs")
|
530
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
529
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
531
530
|
"""
|
532
531
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
533
532
|
"""
|
534
533
|
return pulumi.get(self, "token_bound_cidrs")
|
535
534
|
|
536
535
|
@token_bound_cidrs.setter
|
537
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
536
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
538
537
|
pulumi.set(self, "token_bound_cidrs", value)
|
539
538
|
|
540
|
-
@property
|
539
|
+
@_builtins.property
|
541
540
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
542
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
541
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
543
542
|
"""
|
544
543
|
Generated Token's Explicit Maximum TTL in seconds
|
545
544
|
"""
|
546
545
|
return pulumi.get(self, "token_explicit_max_ttl")
|
547
546
|
|
548
547
|
@token_explicit_max_ttl.setter
|
549
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
548
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
550
549
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
551
550
|
|
552
|
-
@property
|
551
|
+
@_builtins.property
|
553
552
|
@pulumi.getter(name="tokenMaxTtl")
|
554
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
553
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
555
554
|
"""
|
556
555
|
The maximum lifetime of the generated token
|
557
556
|
"""
|
558
557
|
return pulumi.get(self, "token_max_ttl")
|
559
558
|
|
560
559
|
@token_max_ttl.setter
|
561
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
560
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
562
561
|
pulumi.set(self, "token_max_ttl", value)
|
563
562
|
|
564
|
-
@property
|
563
|
+
@_builtins.property
|
565
564
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
566
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
565
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
567
566
|
"""
|
568
567
|
If true, the 'default' policy will not automatically be added to generated tokens
|
569
568
|
"""
|
570
569
|
return pulumi.get(self, "token_no_default_policy")
|
571
570
|
|
572
571
|
@token_no_default_policy.setter
|
573
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
572
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
574
573
|
pulumi.set(self, "token_no_default_policy", value)
|
575
574
|
|
576
|
-
@property
|
575
|
+
@_builtins.property
|
577
576
|
@pulumi.getter(name="tokenNumUses")
|
578
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
577
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
579
578
|
"""
|
580
579
|
The maximum number of times a token may be used, a value of zero means unlimited
|
581
580
|
"""
|
582
581
|
return pulumi.get(self, "token_num_uses")
|
583
582
|
|
584
583
|
@token_num_uses.setter
|
585
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
584
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
586
585
|
pulumi.set(self, "token_num_uses", value)
|
587
586
|
|
588
|
-
@property
|
587
|
+
@_builtins.property
|
589
588
|
@pulumi.getter(name="tokenPeriod")
|
590
|
-
def token_period(self) -> Optional[pulumi.Input[
|
589
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
591
590
|
"""
|
592
591
|
Generated Token's Period
|
593
592
|
"""
|
594
593
|
return pulumi.get(self, "token_period")
|
595
594
|
|
596
595
|
@token_period.setter
|
597
|
-
def token_period(self, value: Optional[pulumi.Input[
|
596
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
598
597
|
pulumi.set(self, "token_period", value)
|
599
598
|
|
600
|
-
@property
|
599
|
+
@_builtins.property
|
601
600
|
@pulumi.getter(name="tokenPolicies")
|
602
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
601
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
603
602
|
"""
|
604
603
|
Generated Token's Policies
|
605
604
|
"""
|
606
605
|
return pulumi.get(self, "token_policies")
|
607
606
|
|
608
607
|
@token_policies.setter
|
609
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
608
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
610
609
|
pulumi.set(self, "token_policies", value)
|
611
610
|
|
612
|
-
@property
|
611
|
+
@_builtins.property
|
613
612
|
@pulumi.getter(name="tokenTtl")
|
614
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
613
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
615
614
|
"""
|
616
615
|
The initial ttl of the token to generate in seconds
|
617
616
|
"""
|
618
617
|
return pulumi.get(self, "token_ttl")
|
619
618
|
|
620
619
|
@token_ttl.setter
|
621
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
620
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
622
621
|
pulumi.set(self, "token_ttl", value)
|
623
622
|
|
624
|
-
@property
|
623
|
+
@_builtins.property
|
625
624
|
@pulumi.getter(name="tokenType")
|
626
|
-
def token_type(self) -> Optional[pulumi.Input[
|
625
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
627
626
|
"""
|
628
627
|
The type of token to generate, service or batch
|
629
628
|
"""
|
630
629
|
return pulumi.get(self, "token_type")
|
631
630
|
|
632
631
|
@token_type.setter
|
633
|
-
def token_type(self, value: Optional[pulumi.Input[
|
632
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
634
633
|
pulumi.set(self, "token_type", value)
|
635
634
|
|
636
|
-
@property
|
635
|
+
@_builtins.property
|
637
636
|
@pulumi.getter
|
638
|
-
def upndomain(self) -> Optional[pulumi.Input[
|
637
|
+
def upndomain(self) -> Optional[pulumi.Input[_builtins.str]]:
|
639
638
|
"""
|
640
639
|
The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
641
640
|
"""
|
642
641
|
return pulumi.get(self, "upndomain")
|
643
642
|
|
644
643
|
@upndomain.setter
|
645
|
-
def upndomain(self, value: Optional[pulumi.Input[
|
644
|
+
def upndomain(self, value: Optional[pulumi.Input[_builtins.str]]):
|
646
645
|
pulumi.set(self, "upndomain", value)
|
647
646
|
|
648
|
-
@property
|
647
|
+
@_builtins.property
|
649
648
|
@pulumi.getter(name="useTokenGroups")
|
650
|
-
def use_token_groups(self) -> Optional[pulumi.Input[
|
649
|
+
def use_token_groups(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
651
650
|
"""
|
652
651
|
Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
653
652
|
"""
|
654
653
|
return pulumi.get(self, "use_token_groups")
|
655
654
|
|
656
655
|
@use_token_groups.setter
|
657
|
-
def use_token_groups(self, value: Optional[pulumi.Input[
|
656
|
+
def use_token_groups(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
658
657
|
pulumi.set(self, "use_token_groups", value)
|
659
658
|
|
660
|
-
@property
|
659
|
+
@_builtins.property
|
661
660
|
@pulumi.getter
|
662
|
-
def userattr(self) -> Optional[pulumi.Input[
|
661
|
+
def userattr(self) -> Optional[pulumi.Input[_builtins.str]]:
|
663
662
|
"""
|
664
663
|
Attribute on user object matching username passed in
|
665
664
|
"""
|
666
665
|
return pulumi.get(self, "userattr")
|
667
666
|
|
668
667
|
@userattr.setter
|
669
|
-
def userattr(self, value: Optional[pulumi.Input[
|
668
|
+
def userattr(self, value: Optional[pulumi.Input[_builtins.str]]):
|
670
669
|
pulumi.set(self, "userattr", value)
|
671
670
|
|
672
|
-
@property
|
671
|
+
@_builtins.property
|
673
672
|
@pulumi.getter
|
674
|
-
def userdn(self) -> Optional[pulumi.Input[
|
673
|
+
def userdn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
675
674
|
"""
|
676
675
|
Base DN under which to perform user search
|
677
676
|
"""
|
678
677
|
return pulumi.get(self, "userdn")
|
679
678
|
|
680
679
|
@userdn.setter
|
681
|
-
def userdn(self, value: Optional[pulumi.Input[
|
680
|
+
def userdn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
682
681
|
pulumi.set(self, "userdn", value)
|
683
682
|
|
684
|
-
@property
|
683
|
+
@_builtins.property
|
685
684
|
@pulumi.getter
|
686
|
-
def userfilter(self) -> Optional[pulumi.Input[
|
685
|
+
def userfilter(self) -> Optional[pulumi.Input[_builtins.str]]:
|
687
686
|
"""
|
688
687
|
LDAP user search filter
|
689
688
|
"""
|
690
689
|
return pulumi.get(self, "userfilter")
|
691
690
|
|
692
691
|
@userfilter.setter
|
693
|
-
def userfilter(self, value: Optional[pulumi.Input[
|
692
|
+
def userfilter(self, value: Optional[pulumi.Input[_builtins.str]]):
|
694
693
|
pulumi.set(self, "userfilter", value)
|
695
694
|
|
696
|
-
@property
|
695
|
+
@_builtins.property
|
697
696
|
@pulumi.getter(name="usernameAsAlias")
|
698
|
-
def username_as_alias(self) -> Optional[pulumi.Input[
|
697
|
+
def username_as_alias(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
699
698
|
"""
|
700
699
|
Force the auth method to use the username passed by the user as the alias name.
|
701
700
|
"""
|
702
701
|
return pulumi.get(self, "username_as_alias")
|
703
702
|
|
704
703
|
@username_as_alias.setter
|
705
|
-
def username_as_alias(self, value: Optional[pulumi.Input[
|
704
|
+
def username_as_alias(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
706
705
|
pulumi.set(self, "username_as_alias", value)
|
707
706
|
|
708
707
|
|
709
708
|
@pulumi.input_type
|
710
709
|
class _AuthBackendState:
|
711
710
|
def __init__(__self__, *,
|
712
|
-
accessor: Optional[pulumi.Input[
|
713
|
-
binddn: Optional[pulumi.Input[
|
714
|
-
bindpass: Optional[pulumi.Input[
|
715
|
-
case_sensitive_names: Optional[pulumi.Input[
|
716
|
-
certificate: Optional[pulumi.Input[
|
717
|
-
client_tls_cert: Optional[pulumi.Input[
|
718
|
-
client_tls_key: Optional[pulumi.Input[
|
719
|
-
connection_timeout: Optional[pulumi.Input[
|
720
|
-
deny_null_bind: Optional[pulumi.Input[
|
721
|
-
description: Optional[pulumi.Input[
|
722
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
723
|
-
disable_remount: Optional[pulumi.Input[
|
724
|
-
discoverdn: Optional[pulumi.Input[
|
725
|
-
groupattr: Optional[pulumi.Input[
|
726
|
-
groupdn: Optional[pulumi.Input[
|
727
|
-
groupfilter: Optional[pulumi.Input[
|
728
|
-
insecure_tls: Optional[pulumi.Input[
|
729
|
-
local: Optional[pulumi.Input[
|
730
|
-
max_page_size: Optional[pulumi.Input[
|
731
|
-
namespace: Optional[pulumi.Input[
|
732
|
-
path: Optional[pulumi.Input[
|
733
|
-
rotation_period: Optional[pulumi.Input[
|
734
|
-
rotation_schedule: Optional[pulumi.Input[
|
735
|
-
rotation_window: Optional[pulumi.Input[
|
736
|
-
starttls: Optional[pulumi.Input[
|
737
|
-
tls_max_version: Optional[pulumi.Input[
|
738
|
-
tls_min_version: Optional[pulumi.Input[
|
739
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
740
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
741
|
-
token_max_ttl: Optional[pulumi.Input[
|
742
|
-
token_no_default_policy: Optional[pulumi.Input[
|
743
|
-
token_num_uses: Optional[pulumi.Input[
|
744
|
-
token_period: Optional[pulumi.Input[
|
745
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
746
|
-
token_ttl: Optional[pulumi.Input[
|
747
|
-
token_type: Optional[pulumi.Input[
|
748
|
-
upndomain: Optional[pulumi.Input[
|
749
|
-
url: Optional[pulumi.Input[
|
750
|
-
use_token_groups: Optional[pulumi.Input[
|
751
|
-
userattr: Optional[pulumi.Input[
|
752
|
-
userdn: Optional[pulumi.Input[
|
753
|
-
userfilter: Optional[pulumi.Input[
|
754
|
-
username_as_alias: Optional[pulumi.Input[
|
711
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
712
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
713
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
714
|
+
case_sensitive_names: Optional[pulumi.Input[_builtins.bool]] = None,
|
715
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
716
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
717
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
718
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
719
|
+
deny_null_bind: Optional[pulumi.Input[_builtins.bool]] = None,
|
720
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
721
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
722
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
723
|
+
discoverdn: Optional[pulumi.Input[_builtins.bool]] = None,
|
724
|
+
groupattr: Optional[pulumi.Input[_builtins.str]] = None,
|
725
|
+
groupdn: Optional[pulumi.Input[_builtins.str]] = None,
|
726
|
+
groupfilter: Optional[pulumi.Input[_builtins.str]] = None,
|
727
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
728
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
729
|
+
max_page_size: Optional[pulumi.Input[_builtins.int]] = None,
|
730
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
731
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
732
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
733
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
734
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
735
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
736
|
+
tls_max_version: Optional[pulumi.Input[_builtins.str]] = None,
|
737
|
+
tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
|
738
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
739
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
740
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
741
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
742
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
743
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
744
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
745
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
746
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
747
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
748
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
749
|
+
use_token_groups: Optional[pulumi.Input[_builtins.bool]] = None,
|
750
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
751
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None,
|
752
|
+
userfilter: Optional[pulumi.Input[_builtins.str]] = None,
|
753
|
+
username_as_alias: Optional[pulumi.Input[_builtins.bool]] = None):
|
755
754
|
"""
|
756
755
|
Input properties used for looking up and filtering AuthBackend resources.
|
757
|
-
:param pulumi.Input[
|
758
|
-
:param pulumi.Input[
|
759
|
-
:param pulumi.Input[
|
760
|
-
:param pulumi.Input[
|
761
|
-
:param pulumi.Input[
|
762
|
-
:param pulumi.Input[
|
763
|
-
:param pulumi.Input[
|
764
|
-
:param pulumi.Input[
|
765
|
-
:param pulumi.Input[
|
766
|
-
:param pulumi.Input[
|
756
|
+
:param pulumi.Input[_builtins.str] accessor: The accessor for this auth mount.
|
757
|
+
:param pulumi.Input[_builtins.str] binddn: DN of object to bind when performing user search
|
758
|
+
:param pulumi.Input[_builtins.str] bindpass: Password to use with `binddn` when performing user search
|
759
|
+
:param pulumi.Input[_builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
760
|
+
:param pulumi.Input[_builtins.str] certificate: Trusted CA to validate TLS certificate
|
761
|
+
:param pulumi.Input[_builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
762
|
+
:param pulumi.Input[_builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
763
|
+
:param pulumi.Input[_builtins.str] description: Description for the LDAP auth backend mount
|
764
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
765
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
767
766
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
768
|
-
:param pulumi.Input[
|
769
|
-
:param pulumi.Input[
|
770
|
-
:param pulumi.Input[
|
771
|
-
:param pulumi.Input[
|
772
|
-
:param pulumi.Input[
|
773
|
-
:param pulumi.Input[
|
774
|
-
:param pulumi.Input[
|
767
|
+
:param pulumi.Input[_builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
|
768
|
+
:param pulumi.Input[_builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
|
769
|
+
:param pulumi.Input[_builtins.str] groupdn: Base DN under which to perform group search
|
770
|
+
:param pulumi.Input[_builtins.str] groupfilter: Go template used to construct group membership query
|
771
|
+
:param pulumi.Input[_builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
|
772
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
|
773
|
+
:param pulumi.Input[_builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
|
775
774
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
776
|
-
:param pulumi.Input[
|
775
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
777
776
|
The value should not contain leading or trailing forward slashes.
|
778
777
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
779
778
|
*Available only for Vault Enterprise*.
|
780
|
-
:param pulumi.Input[
|
781
|
-
:param pulumi.Input[
|
779
|
+
:param pulumi.Input[_builtins.str] path: Path to mount the LDAP auth backend under
|
780
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
782
781
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
783
|
-
:param pulumi.Input[
|
782
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
784
783
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
785
|
-
:param pulumi.Input[
|
784
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
786
785
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
787
786
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
788
|
-
:param pulumi.Input[
|
789
|
-
:param pulumi.Input[
|
790
|
-
:param pulumi.Input[
|
791
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
792
|
-
:param pulumi.Input[
|
793
|
-
:param pulumi.Input[
|
794
|
-
:param pulumi.Input[
|
795
|
-
:param pulumi.Input[
|
796
|
-
:param pulumi.Input[
|
797
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
798
|
-
:param pulumi.Input[
|
799
|
-
:param pulumi.Input[
|
800
|
-
:param pulumi.Input[
|
801
|
-
:param pulumi.Input[
|
802
|
-
:param pulumi.Input[
|
803
|
-
:param pulumi.Input[
|
804
|
-
:param pulumi.Input[
|
805
|
-
:param pulumi.Input[
|
806
|
-
:param pulumi.Input[
|
787
|
+
:param pulumi.Input[_builtins.bool] starttls: Control use of TLS when conecting to LDAP
|
788
|
+
:param pulumi.Input[_builtins.str] tls_max_version: Maximum acceptable version of TLS
|
789
|
+
:param pulumi.Input[_builtins.str] tls_min_version: Minimum acceptable version of TLS
|
790
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
791
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
792
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
793
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
794
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
795
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
796
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
797
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
798
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
799
|
+
:param pulumi.Input[_builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
800
|
+
:param pulumi.Input[_builtins.str] url: The URL of the LDAP server
|
801
|
+
:param pulumi.Input[_builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
802
|
+
:param pulumi.Input[_builtins.str] userattr: Attribute on user object matching username passed in
|
803
|
+
:param pulumi.Input[_builtins.str] userdn: Base DN under which to perform user search
|
804
|
+
:param pulumi.Input[_builtins.str] userfilter: LDAP user search filter
|
805
|
+
:param pulumi.Input[_builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
|
807
806
|
"""
|
808
807
|
if accessor is not None:
|
809
808
|
pulumi.set(__self__, "accessor", accessor)
|
@@ -892,135 +891,135 @@ class _AuthBackendState:
|
|
892
891
|
if username_as_alias is not None:
|
893
892
|
pulumi.set(__self__, "username_as_alias", username_as_alias)
|
894
893
|
|
895
|
-
@property
|
894
|
+
@_builtins.property
|
896
895
|
@pulumi.getter
|
897
|
-
def accessor(self) -> Optional[pulumi.Input[
|
896
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
898
897
|
"""
|
899
898
|
The accessor for this auth mount.
|
900
899
|
"""
|
901
900
|
return pulumi.get(self, "accessor")
|
902
901
|
|
903
902
|
@accessor.setter
|
904
|
-
def accessor(self, value: Optional[pulumi.Input[
|
903
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
905
904
|
pulumi.set(self, "accessor", value)
|
906
905
|
|
907
|
-
@property
|
906
|
+
@_builtins.property
|
908
907
|
@pulumi.getter
|
909
|
-
def binddn(self) -> Optional[pulumi.Input[
|
908
|
+
def binddn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
910
909
|
"""
|
911
910
|
DN of object to bind when performing user search
|
912
911
|
"""
|
913
912
|
return pulumi.get(self, "binddn")
|
914
913
|
|
915
914
|
@binddn.setter
|
916
|
-
def binddn(self, value: Optional[pulumi.Input[
|
915
|
+
def binddn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
917
916
|
pulumi.set(self, "binddn", value)
|
918
917
|
|
919
|
-
@property
|
918
|
+
@_builtins.property
|
920
919
|
@pulumi.getter
|
921
|
-
def bindpass(self) -> Optional[pulumi.Input[
|
920
|
+
def bindpass(self) -> Optional[pulumi.Input[_builtins.str]]:
|
922
921
|
"""
|
923
922
|
Password to use with `binddn` when performing user search
|
924
923
|
"""
|
925
924
|
return pulumi.get(self, "bindpass")
|
926
925
|
|
927
926
|
@bindpass.setter
|
928
|
-
def bindpass(self, value: Optional[pulumi.Input[
|
927
|
+
def bindpass(self, value: Optional[pulumi.Input[_builtins.str]]):
|
929
928
|
pulumi.set(self, "bindpass", value)
|
930
929
|
|
931
|
-
@property
|
930
|
+
@_builtins.property
|
932
931
|
@pulumi.getter(name="caseSensitiveNames")
|
933
|
-
def case_sensitive_names(self) -> Optional[pulumi.Input[
|
932
|
+
def case_sensitive_names(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
934
933
|
"""
|
935
934
|
Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
936
935
|
"""
|
937
936
|
return pulumi.get(self, "case_sensitive_names")
|
938
937
|
|
939
938
|
@case_sensitive_names.setter
|
940
|
-
def case_sensitive_names(self, value: Optional[pulumi.Input[
|
939
|
+
def case_sensitive_names(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
941
940
|
pulumi.set(self, "case_sensitive_names", value)
|
942
941
|
|
943
|
-
@property
|
942
|
+
@_builtins.property
|
944
943
|
@pulumi.getter
|
945
|
-
def certificate(self) -> Optional[pulumi.Input[
|
944
|
+
def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
|
946
945
|
"""
|
947
946
|
Trusted CA to validate TLS certificate
|
948
947
|
"""
|
949
948
|
return pulumi.get(self, "certificate")
|
950
949
|
|
951
950
|
@certificate.setter
|
952
|
-
def certificate(self, value: Optional[pulumi.Input[
|
951
|
+
def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
|
953
952
|
pulumi.set(self, "certificate", value)
|
954
953
|
|
955
|
-
@property
|
954
|
+
@_builtins.property
|
956
955
|
@pulumi.getter(name="clientTlsCert")
|
957
|
-
def client_tls_cert(self) -> Optional[pulumi.Input[
|
956
|
+
def client_tls_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
|
958
957
|
return pulumi.get(self, "client_tls_cert")
|
959
958
|
|
960
959
|
@client_tls_cert.setter
|
961
|
-
def client_tls_cert(self, value: Optional[pulumi.Input[
|
960
|
+
def client_tls_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
|
962
961
|
pulumi.set(self, "client_tls_cert", value)
|
963
962
|
|
964
|
-
@property
|
963
|
+
@_builtins.property
|
965
964
|
@pulumi.getter(name="clientTlsKey")
|
966
|
-
def client_tls_key(self) -> Optional[pulumi.Input[
|
965
|
+
def client_tls_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
967
966
|
return pulumi.get(self, "client_tls_key")
|
968
967
|
|
969
968
|
@client_tls_key.setter
|
970
|
-
def client_tls_key(self, value: Optional[pulumi.Input[
|
969
|
+
def client_tls_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
971
970
|
pulumi.set(self, "client_tls_key", value)
|
972
971
|
|
973
|
-
@property
|
972
|
+
@_builtins.property
|
974
973
|
@pulumi.getter(name="connectionTimeout")
|
975
|
-
def connection_timeout(self) -> Optional[pulumi.Input[
|
974
|
+
def connection_timeout(self) -> Optional[pulumi.Input[_builtins.int]]:
|
976
975
|
"""
|
977
976
|
Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
978
977
|
"""
|
979
978
|
return pulumi.get(self, "connection_timeout")
|
980
979
|
|
981
980
|
@connection_timeout.setter
|
982
|
-
def connection_timeout(self, value: Optional[pulumi.Input[
|
981
|
+
def connection_timeout(self, value: Optional[pulumi.Input[_builtins.int]]):
|
983
982
|
pulumi.set(self, "connection_timeout", value)
|
984
983
|
|
985
|
-
@property
|
984
|
+
@_builtins.property
|
986
985
|
@pulumi.getter(name="denyNullBind")
|
987
|
-
def deny_null_bind(self) -> Optional[pulumi.Input[
|
986
|
+
def deny_null_bind(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
988
987
|
"""
|
989
988
|
Prevents users from bypassing authentication when providing an empty password.
|
990
989
|
"""
|
991
990
|
return pulumi.get(self, "deny_null_bind")
|
992
991
|
|
993
992
|
@deny_null_bind.setter
|
994
|
-
def deny_null_bind(self, value: Optional[pulumi.Input[
|
993
|
+
def deny_null_bind(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
995
994
|
pulumi.set(self, "deny_null_bind", value)
|
996
995
|
|
997
|
-
@property
|
996
|
+
@_builtins.property
|
998
997
|
@pulumi.getter
|
999
|
-
def description(self) -> Optional[pulumi.Input[
|
998
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1000
999
|
"""
|
1001
1000
|
Description for the LDAP auth backend mount
|
1002
1001
|
"""
|
1003
1002
|
return pulumi.get(self, "description")
|
1004
1003
|
|
1005
1004
|
@description.setter
|
1006
|
-
def description(self, value: Optional[pulumi.Input[
|
1005
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1007
1006
|
pulumi.set(self, "description", value)
|
1008
1007
|
|
1009
|
-
@property
|
1008
|
+
@_builtins.property
|
1010
1009
|
@pulumi.getter(name="disableAutomatedRotation")
|
1011
|
-
def disable_automated_rotation(self) -> Optional[pulumi.Input[
|
1010
|
+
def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1012
1011
|
"""
|
1013
1012
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1014
1013
|
"""
|
1015
1014
|
return pulumi.get(self, "disable_automated_rotation")
|
1016
1015
|
|
1017
1016
|
@disable_automated_rotation.setter
|
1018
|
-
def disable_automated_rotation(self, value: Optional[pulumi.Input[
|
1017
|
+
def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1019
1018
|
pulumi.set(self, "disable_automated_rotation", value)
|
1020
1019
|
|
1021
|
-
@property
|
1020
|
+
@_builtins.property
|
1022
1021
|
@pulumi.getter(name="disableRemount")
|
1023
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
1022
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1024
1023
|
"""
|
1025
1024
|
If set, opts out of mount migration on path updates.
|
1026
1025
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -1028,84 +1027,84 @@ class _AuthBackendState:
|
|
1028
1027
|
return pulumi.get(self, "disable_remount")
|
1029
1028
|
|
1030
1029
|
@disable_remount.setter
|
1031
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
1030
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1032
1031
|
pulumi.set(self, "disable_remount", value)
|
1033
1032
|
|
1034
|
-
@property
|
1033
|
+
@_builtins.property
|
1035
1034
|
@pulumi.getter
|
1036
|
-
def discoverdn(self) -> Optional[pulumi.Input[
|
1035
|
+
def discoverdn(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1037
1036
|
"""
|
1038
1037
|
Use anonymous bind to discover the bind DN of a user.
|
1039
1038
|
"""
|
1040
1039
|
return pulumi.get(self, "discoverdn")
|
1041
1040
|
|
1042
1041
|
@discoverdn.setter
|
1043
|
-
def discoverdn(self, value: Optional[pulumi.Input[
|
1042
|
+
def discoverdn(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1044
1043
|
pulumi.set(self, "discoverdn", value)
|
1045
1044
|
|
1046
|
-
@property
|
1045
|
+
@_builtins.property
|
1047
1046
|
@pulumi.getter
|
1048
|
-
def groupattr(self) -> Optional[pulumi.Input[
|
1047
|
+
def groupattr(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1049
1048
|
"""
|
1050
1049
|
LDAP attribute to follow on objects returned by groupfilter
|
1051
1050
|
"""
|
1052
1051
|
return pulumi.get(self, "groupattr")
|
1053
1052
|
|
1054
1053
|
@groupattr.setter
|
1055
|
-
def groupattr(self, value: Optional[pulumi.Input[
|
1054
|
+
def groupattr(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1056
1055
|
pulumi.set(self, "groupattr", value)
|
1057
1056
|
|
1058
|
-
@property
|
1057
|
+
@_builtins.property
|
1059
1058
|
@pulumi.getter
|
1060
|
-
def groupdn(self) -> Optional[pulumi.Input[
|
1059
|
+
def groupdn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1061
1060
|
"""
|
1062
1061
|
Base DN under which to perform group search
|
1063
1062
|
"""
|
1064
1063
|
return pulumi.get(self, "groupdn")
|
1065
1064
|
|
1066
1065
|
@groupdn.setter
|
1067
|
-
def groupdn(self, value: Optional[pulumi.Input[
|
1066
|
+
def groupdn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1068
1067
|
pulumi.set(self, "groupdn", value)
|
1069
1068
|
|
1070
|
-
@property
|
1069
|
+
@_builtins.property
|
1071
1070
|
@pulumi.getter
|
1072
|
-
def groupfilter(self) -> Optional[pulumi.Input[
|
1071
|
+
def groupfilter(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1073
1072
|
"""
|
1074
1073
|
Go template used to construct group membership query
|
1075
1074
|
"""
|
1076
1075
|
return pulumi.get(self, "groupfilter")
|
1077
1076
|
|
1078
1077
|
@groupfilter.setter
|
1079
|
-
def groupfilter(self, value: Optional[pulumi.Input[
|
1078
|
+
def groupfilter(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1080
1079
|
pulumi.set(self, "groupfilter", value)
|
1081
1080
|
|
1082
|
-
@property
|
1081
|
+
@_builtins.property
|
1083
1082
|
@pulumi.getter(name="insecureTls")
|
1084
|
-
def insecure_tls(self) -> Optional[pulumi.Input[
|
1083
|
+
def insecure_tls(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1085
1084
|
"""
|
1086
1085
|
Control whether or TLS certificates must be validated
|
1087
1086
|
"""
|
1088
1087
|
return pulumi.get(self, "insecure_tls")
|
1089
1088
|
|
1090
1089
|
@insecure_tls.setter
|
1091
|
-
def insecure_tls(self, value: Optional[pulumi.Input[
|
1090
|
+
def insecure_tls(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1092
1091
|
pulumi.set(self, "insecure_tls", value)
|
1093
1092
|
|
1094
|
-
@property
|
1093
|
+
@_builtins.property
|
1095
1094
|
@pulumi.getter
|
1096
|
-
def local(self) -> Optional[pulumi.Input[
|
1095
|
+
def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1097
1096
|
"""
|
1098
1097
|
Specifies if the auth method is local only.
|
1099
1098
|
"""
|
1100
1099
|
return pulumi.get(self, "local")
|
1101
1100
|
|
1102
1101
|
@local.setter
|
1103
|
-
def local(self, value: Optional[pulumi.Input[
|
1102
|
+
def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1104
1103
|
pulumi.set(self, "local", value)
|
1105
1104
|
|
1106
|
-
@property
|
1105
|
+
@_builtins.property
|
1107
1106
|
@pulumi.getter(name="maxPageSize")
|
1108
|
-
def max_page_size(self) -> Optional[pulumi.Input[
|
1107
|
+
def max_page_size(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1109
1108
|
"""
|
1110
1109
|
Sets the max page size for LDAP lookups, by default it's set to -1.
|
1111
1110
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
@@ -1113,12 +1112,12 @@ class _AuthBackendState:
|
|
1113
1112
|
return pulumi.get(self, "max_page_size")
|
1114
1113
|
|
1115
1114
|
@max_page_size.setter
|
1116
|
-
def max_page_size(self, value: Optional[pulumi.Input[
|
1115
|
+
def max_page_size(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1117
1116
|
pulumi.set(self, "max_page_size", value)
|
1118
1117
|
|
1119
|
-
@property
|
1118
|
+
@_builtins.property
|
1120
1119
|
@pulumi.getter
|
1121
|
-
def namespace(self) -> Optional[pulumi.Input[
|
1120
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1122
1121
|
"""
|
1123
1122
|
The namespace to provision the resource in.
|
1124
1123
|
The value should not contain leading or trailing forward slashes.
|
@@ -1128,24 +1127,24 @@ class _AuthBackendState:
|
|
1128
1127
|
return pulumi.get(self, "namespace")
|
1129
1128
|
|
1130
1129
|
@namespace.setter
|
1131
|
-
def namespace(self, value: Optional[pulumi.Input[
|
1130
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1132
1131
|
pulumi.set(self, "namespace", value)
|
1133
1132
|
|
1134
|
-
@property
|
1133
|
+
@_builtins.property
|
1135
1134
|
@pulumi.getter
|
1136
|
-
def path(self) -> Optional[pulumi.Input[
|
1135
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1137
1136
|
"""
|
1138
1137
|
Path to mount the LDAP auth backend under
|
1139
1138
|
"""
|
1140
1139
|
return pulumi.get(self, "path")
|
1141
1140
|
|
1142
1141
|
@path.setter
|
1143
|
-
def path(self, value: Optional[pulumi.Input[
|
1142
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1144
1143
|
pulumi.set(self, "path", value)
|
1145
1144
|
|
1146
|
-
@property
|
1145
|
+
@_builtins.property
|
1147
1146
|
@pulumi.getter(name="rotationPeriod")
|
1148
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
1147
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1149
1148
|
"""
|
1150
1149
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
1151
1150
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
@@ -1153,12 +1152,12 @@ class _AuthBackendState:
|
|
1153
1152
|
return pulumi.get(self, "rotation_period")
|
1154
1153
|
|
1155
1154
|
@rotation_period.setter
|
1156
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
1155
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1157
1156
|
pulumi.set(self, "rotation_period", value)
|
1158
1157
|
|
1159
|
-
@property
|
1158
|
+
@_builtins.property
|
1160
1159
|
@pulumi.getter(name="rotationSchedule")
|
1161
|
-
def rotation_schedule(self) -> Optional[pulumi.Input[
|
1160
|
+
def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1162
1161
|
"""
|
1163
1162
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1164
1163
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
@@ -1166,12 +1165,12 @@ class _AuthBackendState:
|
|
1166
1165
|
return pulumi.get(self, "rotation_schedule")
|
1167
1166
|
|
1168
1167
|
@rotation_schedule.setter
|
1169
|
-
def rotation_schedule(self, value: Optional[pulumi.Input[
|
1168
|
+
def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1170
1169
|
pulumi.set(self, "rotation_schedule", value)
|
1171
1170
|
|
1172
|
-
@property
|
1171
|
+
@_builtins.property
|
1173
1172
|
@pulumi.getter(name="rotationWindow")
|
1174
|
-
def rotation_window(self) -> Optional[pulumi.Input[
|
1173
|
+
def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1175
1174
|
"""
|
1176
1175
|
The maximum amount of time in seconds allowed to complete
|
1177
1176
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -1180,235 +1179,235 @@ class _AuthBackendState:
|
|
1180
1179
|
return pulumi.get(self, "rotation_window")
|
1181
1180
|
|
1182
1181
|
@rotation_window.setter
|
1183
|
-
def rotation_window(self, value: Optional[pulumi.Input[
|
1182
|
+
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1184
1183
|
pulumi.set(self, "rotation_window", value)
|
1185
1184
|
|
1186
|
-
@property
|
1185
|
+
@_builtins.property
|
1187
1186
|
@pulumi.getter
|
1188
|
-
def starttls(self) -> Optional[pulumi.Input[
|
1187
|
+
def starttls(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1189
1188
|
"""
|
1190
1189
|
Control use of TLS when conecting to LDAP
|
1191
1190
|
"""
|
1192
1191
|
return pulumi.get(self, "starttls")
|
1193
1192
|
|
1194
1193
|
@starttls.setter
|
1195
|
-
def starttls(self, value: Optional[pulumi.Input[
|
1194
|
+
def starttls(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1196
1195
|
pulumi.set(self, "starttls", value)
|
1197
1196
|
|
1198
|
-
@property
|
1197
|
+
@_builtins.property
|
1199
1198
|
@pulumi.getter(name="tlsMaxVersion")
|
1200
|
-
def tls_max_version(self) -> Optional[pulumi.Input[
|
1199
|
+
def tls_max_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1201
1200
|
"""
|
1202
1201
|
Maximum acceptable version of TLS
|
1203
1202
|
"""
|
1204
1203
|
return pulumi.get(self, "tls_max_version")
|
1205
1204
|
|
1206
1205
|
@tls_max_version.setter
|
1207
|
-
def tls_max_version(self, value: Optional[pulumi.Input[
|
1206
|
+
def tls_max_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1208
1207
|
pulumi.set(self, "tls_max_version", value)
|
1209
1208
|
|
1210
|
-
@property
|
1209
|
+
@_builtins.property
|
1211
1210
|
@pulumi.getter(name="tlsMinVersion")
|
1212
|
-
def tls_min_version(self) -> Optional[pulumi.Input[
|
1211
|
+
def tls_min_version(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1213
1212
|
"""
|
1214
1213
|
Minimum acceptable version of TLS
|
1215
1214
|
"""
|
1216
1215
|
return pulumi.get(self, "tls_min_version")
|
1217
1216
|
|
1218
1217
|
@tls_min_version.setter
|
1219
|
-
def tls_min_version(self, value: Optional[pulumi.Input[
|
1218
|
+
def tls_min_version(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1220
1219
|
pulumi.set(self, "tls_min_version", value)
|
1221
1220
|
|
1222
|
-
@property
|
1221
|
+
@_builtins.property
|
1223
1222
|
@pulumi.getter(name="tokenBoundCidrs")
|
1224
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
1223
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
1225
1224
|
"""
|
1226
1225
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1227
1226
|
"""
|
1228
1227
|
return pulumi.get(self, "token_bound_cidrs")
|
1229
1228
|
|
1230
1229
|
@token_bound_cidrs.setter
|
1231
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1230
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
1232
1231
|
pulumi.set(self, "token_bound_cidrs", value)
|
1233
1232
|
|
1234
|
-
@property
|
1233
|
+
@_builtins.property
|
1235
1234
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1236
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
1235
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1237
1236
|
"""
|
1238
1237
|
Generated Token's Explicit Maximum TTL in seconds
|
1239
1238
|
"""
|
1240
1239
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1241
1240
|
|
1242
1241
|
@token_explicit_max_ttl.setter
|
1243
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
1242
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1244
1243
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
1245
1244
|
|
1246
|
-
@property
|
1245
|
+
@_builtins.property
|
1247
1246
|
@pulumi.getter(name="tokenMaxTtl")
|
1248
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
1247
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1249
1248
|
"""
|
1250
1249
|
The maximum lifetime of the generated token
|
1251
1250
|
"""
|
1252
1251
|
return pulumi.get(self, "token_max_ttl")
|
1253
1252
|
|
1254
1253
|
@token_max_ttl.setter
|
1255
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
1254
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1256
1255
|
pulumi.set(self, "token_max_ttl", value)
|
1257
1256
|
|
1258
|
-
@property
|
1257
|
+
@_builtins.property
|
1259
1258
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1260
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
1259
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1261
1260
|
"""
|
1262
1261
|
If true, the 'default' policy will not automatically be added to generated tokens
|
1263
1262
|
"""
|
1264
1263
|
return pulumi.get(self, "token_no_default_policy")
|
1265
1264
|
|
1266
1265
|
@token_no_default_policy.setter
|
1267
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
1266
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1268
1267
|
pulumi.set(self, "token_no_default_policy", value)
|
1269
1268
|
|
1270
|
-
@property
|
1269
|
+
@_builtins.property
|
1271
1270
|
@pulumi.getter(name="tokenNumUses")
|
1272
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
1271
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1273
1272
|
"""
|
1274
1273
|
The maximum number of times a token may be used, a value of zero means unlimited
|
1275
1274
|
"""
|
1276
1275
|
return pulumi.get(self, "token_num_uses")
|
1277
1276
|
|
1278
1277
|
@token_num_uses.setter
|
1279
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
1278
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1280
1279
|
pulumi.set(self, "token_num_uses", value)
|
1281
1280
|
|
1282
|
-
@property
|
1281
|
+
@_builtins.property
|
1283
1282
|
@pulumi.getter(name="tokenPeriod")
|
1284
|
-
def token_period(self) -> Optional[pulumi.Input[
|
1283
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1285
1284
|
"""
|
1286
1285
|
Generated Token's Period
|
1287
1286
|
"""
|
1288
1287
|
return pulumi.get(self, "token_period")
|
1289
1288
|
|
1290
1289
|
@token_period.setter
|
1291
|
-
def token_period(self, value: Optional[pulumi.Input[
|
1290
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1292
1291
|
pulumi.set(self, "token_period", value)
|
1293
1292
|
|
1294
|
-
@property
|
1293
|
+
@_builtins.property
|
1295
1294
|
@pulumi.getter(name="tokenPolicies")
|
1296
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
1295
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
1297
1296
|
"""
|
1298
1297
|
Generated Token's Policies
|
1299
1298
|
"""
|
1300
1299
|
return pulumi.get(self, "token_policies")
|
1301
1300
|
|
1302
1301
|
@token_policies.setter
|
1303
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1302
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
1304
1303
|
pulumi.set(self, "token_policies", value)
|
1305
1304
|
|
1306
|
-
@property
|
1305
|
+
@_builtins.property
|
1307
1306
|
@pulumi.getter(name="tokenTtl")
|
1308
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
1307
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
1309
1308
|
"""
|
1310
1309
|
The initial ttl of the token to generate in seconds
|
1311
1310
|
"""
|
1312
1311
|
return pulumi.get(self, "token_ttl")
|
1313
1312
|
|
1314
1313
|
@token_ttl.setter
|
1315
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
1314
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
1316
1315
|
pulumi.set(self, "token_ttl", value)
|
1317
1316
|
|
1318
|
-
@property
|
1317
|
+
@_builtins.property
|
1319
1318
|
@pulumi.getter(name="tokenType")
|
1320
|
-
def token_type(self) -> Optional[pulumi.Input[
|
1319
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1321
1320
|
"""
|
1322
1321
|
The type of token to generate, service or batch
|
1323
1322
|
"""
|
1324
1323
|
return pulumi.get(self, "token_type")
|
1325
1324
|
|
1326
1325
|
@token_type.setter
|
1327
|
-
def token_type(self, value: Optional[pulumi.Input[
|
1326
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1328
1327
|
pulumi.set(self, "token_type", value)
|
1329
1328
|
|
1330
|
-
@property
|
1329
|
+
@_builtins.property
|
1331
1330
|
@pulumi.getter
|
1332
|
-
def upndomain(self) -> Optional[pulumi.Input[
|
1331
|
+
def upndomain(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1333
1332
|
"""
|
1334
1333
|
The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1335
1334
|
"""
|
1336
1335
|
return pulumi.get(self, "upndomain")
|
1337
1336
|
|
1338
1337
|
@upndomain.setter
|
1339
|
-
def upndomain(self, value: Optional[pulumi.Input[
|
1338
|
+
def upndomain(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1340
1339
|
pulumi.set(self, "upndomain", value)
|
1341
1340
|
|
1342
|
-
@property
|
1341
|
+
@_builtins.property
|
1343
1342
|
@pulumi.getter
|
1344
|
-
def url(self) -> Optional[pulumi.Input[
|
1343
|
+
def url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1345
1344
|
"""
|
1346
1345
|
The URL of the LDAP server
|
1347
1346
|
"""
|
1348
1347
|
return pulumi.get(self, "url")
|
1349
1348
|
|
1350
1349
|
@url.setter
|
1351
|
-
def url(self, value: Optional[pulumi.Input[
|
1350
|
+
def url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1352
1351
|
pulumi.set(self, "url", value)
|
1353
1352
|
|
1354
|
-
@property
|
1353
|
+
@_builtins.property
|
1355
1354
|
@pulumi.getter(name="useTokenGroups")
|
1356
|
-
def use_token_groups(self) -> Optional[pulumi.Input[
|
1355
|
+
def use_token_groups(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1357
1356
|
"""
|
1358
1357
|
Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
1359
1358
|
"""
|
1360
1359
|
return pulumi.get(self, "use_token_groups")
|
1361
1360
|
|
1362
1361
|
@use_token_groups.setter
|
1363
|
-
def use_token_groups(self, value: Optional[pulumi.Input[
|
1362
|
+
def use_token_groups(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1364
1363
|
pulumi.set(self, "use_token_groups", value)
|
1365
1364
|
|
1366
|
-
@property
|
1365
|
+
@_builtins.property
|
1367
1366
|
@pulumi.getter
|
1368
|
-
def userattr(self) -> Optional[pulumi.Input[
|
1367
|
+
def userattr(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1369
1368
|
"""
|
1370
1369
|
Attribute on user object matching username passed in
|
1371
1370
|
"""
|
1372
1371
|
return pulumi.get(self, "userattr")
|
1373
1372
|
|
1374
1373
|
@userattr.setter
|
1375
|
-
def userattr(self, value: Optional[pulumi.Input[
|
1374
|
+
def userattr(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1376
1375
|
pulumi.set(self, "userattr", value)
|
1377
1376
|
|
1378
|
-
@property
|
1377
|
+
@_builtins.property
|
1379
1378
|
@pulumi.getter
|
1380
|
-
def userdn(self) -> Optional[pulumi.Input[
|
1379
|
+
def userdn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1381
1380
|
"""
|
1382
1381
|
Base DN under which to perform user search
|
1383
1382
|
"""
|
1384
1383
|
return pulumi.get(self, "userdn")
|
1385
1384
|
|
1386
1385
|
@userdn.setter
|
1387
|
-
def userdn(self, value: Optional[pulumi.Input[
|
1386
|
+
def userdn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1388
1387
|
pulumi.set(self, "userdn", value)
|
1389
1388
|
|
1390
|
-
@property
|
1389
|
+
@_builtins.property
|
1391
1390
|
@pulumi.getter
|
1392
|
-
def userfilter(self) -> Optional[pulumi.Input[
|
1391
|
+
def userfilter(self) -> Optional[pulumi.Input[_builtins.str]]:
|
1393
1392
|
"""
|
1394
1393
|
LDAP user search filter
|
1395
1394
|
"""
|
1396
1395
|
return pulumi.get(self, "userfilter")
|
1397
1396
|
|
1398
1397
|
@userfilter.setter
|
1399
|
-
def userfilter(self, value: Optional[pulumi.Input[
|
1398
|
+
def userfilter(self, value: Optional[pulumi.Input[_builtins.str]]):
|
1400
1399
|
pulumi.set(self, "userfilter", value)
|
1401
1400
|
|
1402
|
-
@property
|
1401
|
+
@_builtins.property
|
1403
1402
|
@pulumi.getter(name="usernameAsAlias")
|
1404
|
-
def username_as_alias(self) -> Optional[pulumi.Input[
|
1403
|
+
def username_as_alias(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
1405
1404
|
"""
|
1406
1405
|
Force the auth method to use the username passed by the user as the alias name.
|
1407
1406
|
"""
|
1408
1407
|
return pulumi.get(self, "username_as_alias")
|
1409
1408
|
|
1410
1409
|
@username_as_alias.setter
|
1411
|
-
def username_as_alias(self, value: Optional[pulumi.Input[
|
1410
|
+
def username_as_alias(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
1412
1411
|
pulumi.set(self, "username_as_alias", value)
|
1413
1412
|
|
1414
1413
|
|
@@ -1418,48 +1417,48 @@ class AuthBackend(pulumi.CustomResource):
|
|
1418
1417
|
def __init__(__self__,
|
1419
1418
|
resource_name: str,
|
1420
1419
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1421
|
-
binddn: Optional[pulumi.Input[
|
1422
|
-
bindpass: Optional[pulumi.Input[
|
1423
|
-
case_sensitive_names: Optional[pulumi.Input[
|
1424
|
-
certificate: Optional[pulumi.Input[
|
1425
|
-
client_tls_cert: Optional[pulumi.Input[
|
1426
|
-
client_tls_key: Optional[pulumi.Input[
|
1427
|
-
connection_timeout: Optional[pulumi.Input[
|
1428
|
-
deny_null_bind: Optional[pulumi.Input[
|
1429
|
-
description: Optional[pulumi.Input[
|
1430
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
1431
|
-
disable_remount: Optional[pulumi.Input[
|
1432
|
-
discoverdn: Optional[pulumi.Input[
|
1433
|
-
groupattr: Optional[pulumi.Input[
|
1434
|
-
groupdn: Optional[pulumi.Input[
|
1435
|
-
groupfilter: Optional[pulumi.Input[
|
1436
|
-
insecure_tls: Optional[pulumi.Input[
|
1437
|
-
local: Optional[pulumi.Input[
|
1438
|
-
max_page_size: Optional[pulumi.Input[
|
1439
|
-
namespace: Optional[pulumi.Input[
|
1440
|
-
path: Optional[pulumi.Input[
|
1441
|
-
rotation_period: Optional[pulumi.Input[
|
1442
|
-
rotation_schedule: Optional[pulumi.Input[
|
1443
|
-
rotation_window: Optional[pulumi.Input[
|
1444
|
-
starttls: Optional[pulumi.Input[
|
1445
|
-
tls_max_version: Optional[pulumi.Input[
|
1446
|
-
tls_min_version: Optional[pulumi.Input[
|
1447
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1448
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
1449
|
-
token_max_ttl: Optional[pulumi.Input[
|
1450
|
-
token_no_default_policy: Optional[pulumi.Input[
|
1451
|
-
token_num_uses: Optional[pulumi.Input[
|
1452
|
-
token_period: Optional[pulumi.Input[
|
1453
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1454
|
-
token_ttl: Optional[pulumi.Input[
|
1455
|
-
token_type: Optional[pulumi.Input[
|
1456
|
-
upndomain: Optional[pulumi.Input[
|
1457
|
-
url: Optional[pulumi.Input[
|
1458
|
-
use_token_groups: Optional[pulumi.Input[
|
1459
|
-
userattr: Optional[pulumi.Input[
|
1460
|
-
userdn: Optional[pulumi.Input[
|
1461
|
-
userfilter: Optional[pulumi.Input[
|
1462
|
-
username_as_alias: Optional[pulumi.Input[
|
1420
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
1421
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
1422
|
+
case_sensitive_names: Optional[pulumi.Input[_builtins.bool]] = None,
|
1423
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
1424
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1425
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1426
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1427
|
+
deny_null_bind: Optional[pulumi.Input[_builtins.bool]] = None,
|
1428
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1429
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1430
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1431
|
+
discoverdn: Optional[pulumi.Input[_builtins.bool]] = None,
|
1432
|
+
groupattr: Optional[pulumi.Input[_builtins.str]] = None,
|
1433
|
+
groupdn: Optional[pulumi.Input[_builtins.str]] = None,
|
1434
|
+
groupfilter: Optional[pulumi.Input[_builtins.str]] = None,
|
1435
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1436
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1437
|
+
max_page_size: Optional[pulumi.Input[_builtins.int]] = None,
|
1438
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1439
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1440
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1441
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1442
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1443
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1444
|
+
tls_max_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1445
|
+
tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1446
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1447
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1448
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1449
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
1450
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
1451
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1452
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1453
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1454
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
1455
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
1456
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
1457
|
+
use_token_groups: Optional[pulumi.Input[_builtins.bool]] = None,
|
1458
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
1459
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None,
|
1460
|
+
userfilter: Optional[pulumi.Input[_builtins.str]] = None,
|
1461
|
+
username_as_alias: Optional[pulumi.Input[_builtins.bool]] = None,
|
1463
1462
|
__props__=None):
|
1464
1463
|
"""
|
1465
1464
|
Provides a resource for managing an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
|
@@ -1493,55 +1492,55 @@ class AuthBackend(pulumi.CustomResource):
|
|
1493
1492
|
|
1494
1493
|
:param str resource_name: The name of the resource.
|
1495
1494
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1496
|
-
:param pulumi.Input[
|
1497
|
-
:param pulumi.Input[
|
1498
|
-
:param pulumi.Input[
|
1499
|
-
:param pulumi.Input[
|
1500
|
-
:param pulumi.Input[
|
1501
|
-
:param pulumi.Input[
|
1502
|
-
:param pulumi.Input[
|
1503
|
-
:param pulumi.Input[
|
1504
|
-
:param pulumi.Input[
|
1495
|
+
:param pulumi.Input[_builtins.str] binddn: DN of object to bind when performing user search
|
1496
|
+
:param pulumi.Input[_builtins.str] bindpass: Password to use with `binddn` when performing user search
|
1497
|
+
:param pulumi.Input[_builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
1498
|
+
:param pulumi.Input[_builtins.str] certificate: Trusted CA to validate TLS certificate
|
1499
|
+
:param pulumi.Input[_builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1500
|
+
:param pulumi.Input[_builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
1501
|
+
:param pulumi.Input[_builtins.str] description: Description for the LDAP auth backend mount
|
1502
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1503
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
1505
1504
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1506
|
-
:param pulumi.Input[
|
1507
|
-
:param pulumi.Input[
|
1508
|
-
:param pulumi.Input[
|
1509
|
-
:param pulumi.Input[
|
1510
|
-
:param pulumi.Input[
|
1511
|
-
:param pulumi.Input[
|
1512
|
-
:param pulumi.Input[
|
1505
|
+
:param pulumi.Input[_builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
|
1506
|
+
:param pulumi.Input[_builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
|
1507
|
+
:param pulumi.Input[_builtins.str] groupdn: Base DN under which to perform group search
|
1508
|
+
:param pulumi.Input[_builtins.str] groupfilter: Go template used to construct group membership query
|
1509
|
+
:param pulumi.Input[_builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
|
1510
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
|
1511
|
+
:param pulumi.Input[_builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
|
1513
1512
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
1514
|
-
:param pulumi.Input[
|
1513
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1515
1514
|
The value should not contain leading or trailing forward slashes.
|
1516
1515
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1517
1516
|
*Available only for Vault Enterprise*.
|
1518
|
-
:param pulumi.Input[
|
1519
|
-
:param pulumi.Input[
|
1517
|
+
:param pulumi.Input[_builtins.str] path: Path to mount the LDAP auth backend under
|
1518
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1520
1519
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1521
|
-
:param pulumi.Input[
|
1520
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1522
1521
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1523
|
-
:param pulumi.Input[
|
1522
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1524
1523
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1525
1524
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1526
|
-
:param pulumi.Input[
|
1527
|
-
:param pulumi.Input[
|
1528
|
-
:param pulumi.Input[
|
1529
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1530
|
-
:param pulumi.Input[
|
1531
|
-
:param pulumi.Input[
|
1532
|
-
:param pulumi.Input[
|
1533
|
-
:param pulumi.Input[
|
1534
|
-
:param pulumi.Input[
|
1535
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1536
|
-
:param pulumi.Input[
|
1537
|
-
:param pulumi.Input[
|
1538
|
-
:param pulumi.Input[
|
1539
|
-
:param pulumi.Input[
|
1540
|
-
:param pulumi.Input[
|
1541
|
-
:param pulumi.Input[
|
1542
|
-
:param pulumi.Input[
|
1543
|
-
:param pulumi.Input[
|
1544
|
-
:param pulumi.Input[
|
1525
|
+
:param pulumi.Input[_builtins.bool] starttls: Control use of TLS when conecting to LDAP
|
1526
|
+
:param pulumi.Input[_builtins.str] tls_max_version: Maximum acceptable version of TLS
|
1527
|
+
:param pulumi.Input[_builtins.str] tls_min_version: Minimum acceptable version of TLS
|
1528
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1529
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1530
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
1531
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1532
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1533
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
1534
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
1535
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
1536
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
1537
|
+
:param pulumi.Input[_builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1538
|
+
:param pulumi.Input[_builtins.str] url: The URL of the LDAP server
|
1539
|
+
:param pulumi.Input[_builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
1540
|
+
:param pulumi.Input[_builtins.str] userattr: Attribute on user object matching username passed in
|
1541
|
+
:param pulumi.Input[_builtins.str] userdn: Base DN under which to perform user search
|
1542
|
+
:param pulumi.Input[_builtins.str] userfilter: LDAP user search filter
|
1543
|
+
:param pulumi.Input[_builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
|
1545
1544
|
"""
|
1546
1545
|
...
|
1547
1546
|
@overload
|
@@ -1594,48 +1593,48 @@ class AuthBackend(pulumi.CustomResource):
|
|
1594
1593
|
def _internal_init(__self__,
|
1595
1594
|
resource_name: str,
|
1596
1595
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1597
|
-
binddn: Optional[pulumi.Input[
|
1598
|
-
bindpass: Optional[pulumi.Input[
|
1599
|
-
case_sensitive_names: Optional[pulumi.Input[
|
1600
|
-
certificate: Optional[pulumi.Input[
|
1601
|
-
client_tls_cert: Optional[pulumi.Input[
|
1602
|
-
client_tls_key: Optional[pulumi.Input[
|
1603
|
-
connection_timeout: Optional[pulumi.Input[
|
1604
|
-
deny_null_bind: Optional[pulumi.Input[
|
1605
|
-
description: Optional[pulumi.Input[
|
1606
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
1607
|
-
disable_remount: Optional[pulumi.Input[
|
1608
|
-
discoverdn: Optional[pulumi.Input[
|
1609
|
-
groupattr: Optional[pulumi.Input[
|
1610
|
-
groupdn: Optional[pulumi.Input[
|
1611
|
-
groupfilter: Optional[pulumi.Input[
|
1612
|
-
insecure_tls: Optional[pulumi.Input[
|
1613
|
-
local: Optional[pulumi.Input[
|
1614
|
-
max_page_size: Optional[pulumi.Input[
|
1615
|
-
namespace: Optional[pulumi.Input[
|
1616
|
-
path: Optional[pulumi.Input[
|
1617
|
-
rotation_period: Optional[pulumi.Input[
|
1618
|
-
rotation_schedule: Optional[pulumi.Input[
|
1619
|
-
rotation_window: Optional[pulumi.Input[
|
1620
|
-
starttls: Optional[pulumi.Input[
|
1621
|
-
tls_max_version: Optional[pulumi.Input[
|
1622
|
-
tls_min_version: Optional[pulumi.Input[
|
1623
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1624
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
1625
|
-
token_max_ttl: Optional[pulumi.Input[
|
1626
|
-
token_no_default_policy: Optional[pulumi.Input[
|
1627
|
-
token_num_uses: Optional[pulumi.Input[
|
1628
|
-
token_period: Optional[pulumi.Input[
|
1629
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1630
|
-
token_ttl: Optional[pulumi.Input[
|
1631
|
-
token_type: Optional[pulumi.Input[
|
1632
|
-
upndomain: Optional[pulumi.Input[
|
1633
|
-
url: Optional[pulumi.Input[
|
1634
|
-
use_token_groups: Optional[pulumi.Input[
|
1635
|
-
userattr: Optional[pulumi.Input[
|
1636
|
-
userdn: Optional[pulumi.Input[
|
1637
|
-
userfilter: Optional[pulumi.Input[
|
1638
|
-
username_as_alias: Optional[pulumi.Input[
|
1596
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
1597
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
1598
|
+
case_sensitive_names: Optional[pulumi.Input[_builtins.bool]] = None,
|
1599
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
1600
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1601
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1602
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1603
|
+
deny_null_bind: Optional[pulumi.Input[_builtins.bool]] = None,
|
1604
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1605
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1606
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1607
|
+
discoverdn: Optional[pulumi.Input[_builtins.bool]] = None,
|
1608
|
+
groupattr: Optional[pulumi.Input[_builtins.str]] = None,
|
1609
|
+
groupdn: Optional[pulumi.Input[_builtins.str]] = None,
|
1610
|
+
groupfilter: Optional[pulumi.Input[_builtins.str]] = None,
|
1611
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1612
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1613
|
+
max_page_size: Optional[pulumi.Input[_builtins.int]] = None,
|
1614
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1615
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1616
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1617
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1618
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1619
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1620
|
+
tls_max_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1621
|
+
tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1622
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1623
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1624
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1625
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
1626
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
1627
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1628
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1629
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1630
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
1631
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
1632
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
1633
|
+
use_token_groups: Optional[pulumi.Input[_builtins.bool]] = None,
|
1634
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
1635
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None,
|
1636
|
+
userfilter: Optional[pulumi.Input[_builtins.str]] = None,
|
1637
|
+
username_as_alias: Optional[pulumi.Input[_builtins.bool]] = None,
|
1639
1638
|
__props__=None):
|
1640
1639
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
1641
1640
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -1702,49 +1701,49 @@ class AuthBackend(pulumi.CustomResource):
|
|
1702
1701
|
def get(resource_name: str,
|
1703
1702
|
id: pulumi.Input[str],
|
1704
1703
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1705
|
-
accessor: Optional[pulumi.Input[
|
1706
|
-
binddn: Optional[pulumi.Input[
|
1707
|
-
bindpass: Optional[pulumi.Input[
|
1708
|
-
case_sensitive_names: Optional[pulumi.Input[
|
1709
|
-
certificate: Optional[pulumi.Input[
|
1710
|
-
client_tls_cert: Optional[pulumi.Input[
|
1711
|
-
client_tls_key: Optional[pulumi.Input[
|
1712
|
-
connection_timeout: Optional[pulumi.Input[
|
1713
|
-
deny_null_bind: Optional[pulumi.Input[
|
1714
|
-
description: Optional[pulumi.Input[
|
1715
|
-
disable_automated_rotation: Optional[pulumi.Input[
|
1716
|
-
disable_remount: Optional[pulumi.Input[
|
1717
|
-
discoverdn: Optional[pulumi.Input[
|
1718
|
-
groupattr: Optional[pulumi.Input[
|
1719
|
-
groupdn: Optional[pulumi.Input[
|
1720
|
-
groupfilter: Optional[pulumi.Input[
|
1721
|
-
insecure_tls: Optional[pulumi.Input[
|
1722
|
-
local: Optional[pulumi.Input[
|
1723
|
-
max_page_size: Optional[pulumi.Input[
|
1724
|
-
namespace: Optional[pulumi.Input[
|
1725
|
-
path: Optional[pulumi.Input[
|
1726
|
-
rotation_period: Optional[pulumi.Input[
|
1727
|
-
rotation_schedule: Optional[pulumi.Input[
|
1728
|
-
rotation_window: Optional[pulumi.Input[
|
1729
|
-
starttls: Optional[pulumi.Input[
|
1730
|
-
tls_max_version: Optional[pulumi.Input[
|
1731
|
-
tls_min_version: Optional[pulumi.Input[
|
1732
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1733
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
1734
|
-
token_max_ttl: Optional[pulumi.Input[
|
1735
|
-
token_no_default_policy: Optional[pulumi.Input[
|
1736
|
-
token_num_uses: Optional[pulumi.Input[
|
1737
|
-
token_period: Optional[pulumi.Input[
|
1738
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1739
|
-
token_ttl: Optional[pulumi.Input[
|
1740
|
-
token_type: Optional[pulumi.Input[
|
1741
|
-
upndomain: Optional[pulumi.Input[
|
1742
|
-
url: Optional[pulumi.Input[
|
1743
|
-
use_token_groups: Optional[pulumi.Input[
|
1744
|
-
userattr: Optional[pulumi.Input[
|
1745
|
-
userdn: Optional[pulumi.Input[
|
1746
|
-
userfilter: Optional[pulumi.Input[
|
1747
|
-
username_as_alias: Optional[pulumi.Input[
|
1704
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
1705
|
+
binddn: Optional[pulumi.Input[_builtins.str]] = None,
|
1706
|
+
bindpass: Optional[pulumi.Input[_builtins.str]] = None,
|
1707
|
+
case_sensitive_names: Optional[pulumi.Input[_builtins.bool]] = None,
|
1708
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
1709
|
+
client_tls_cert: Optional[pulumi.Input[_builtins.str]] = None,
|
1710
|
+
client_tls_key: Optional[pulumi.Input[_builtins.str]] = None,
|
1711
|
+
connection_timeout: Optional[pulumi.Input[_builtins.int]] = None,
|
1712
|
+
deny_null_bind: Optional[pulumi.Input[_builtins.bool]] = None,
|
1713
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
1714
|
+
disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
1715
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
1716
|
+
discoverdn: Optional[pulumi.Input[_builtins.bool]] = None,
|
1717
|
+
groupattr: Optional[pulumi.Input[_builtins.str]] = None,
|
1718
|
+
groupdn: Optional[pulumi.Input[_builtins.str]] = None,
|
1719
|
+
groupfilter: Optional[pulumi.Input[_builtins.str]] = None,
|
1720
|
+
insecure_tls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1721
|
+
local: Optional[pulumi.Input[_builtins.bool]] = None,
|
1722
|
+
max_page_size: Optional[pulumi.Input[_builtins.int]] = None,
|
1723
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1724
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
1725
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1726
|
+
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
1727
|
+
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
1728
|
+
starttls: Optional[pulumi.Input[_builtins.bool]] = None,
|
1729
|
+
tls_max_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1730
|
+
tls_min_version: Optional[pulumi.Input[_builtins.str]] = None,
|
1731
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1732
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1733
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1734
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
1735
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
1736
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1737
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1738
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1739
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
1740
|
+
upndomain: Optional[pulumi.Input[_builtins.str]] = None,
|
1741
|
+
url: Optional[pulumi.Input[_builtins.str]] = None,
|
1742
|
+
use_token_groups: Optional[pulumi.Input[_builtins.bool]] = None,
|
1743
|
+
userattr: Optional[pulumi.Input[_builtins.str]] = None,
|
1744
|
+
userdn: Optional[pulumi.Input[_builtins.str]] = None,
|
1745
|
+
userfilter: Optional[pulumi.Input[_builtins.str]] = None,
|
1746
|
+
username_as_alias: Optional[pulumi.Input[_builtins.bool]] = None) -> 'AuthBackend':
|
1748
1747
|
"""
|
1749
1748
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
1750
1749
|
properties used to qualify the lookup.
|
@@ -1752,56 +1751,56 @@ class AuthBackend(pulumi.CustomResource):
|
|
1752
1751
|
:param str resource_name: The unique name of the resulting resource.
|
1753
1752
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1754
1753
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1755
|
-
:param pulumi.Input[
|
1756
|
-
:param pulumi.Input[
|
1757
|
-
:param pulumi.Input[
|
1758
|
-
:param pulumi.Input[
|
1759
|
-
:param pulumi.Input[
|
1760
|
-
:param pulumi.Input[
|
1761
|
-
:param pulumi.Input[
|
1762
|
-
:param pulumi.Input[
|
1763
|
-
:param pulumi.Input[
|
1764
|
-
:param pulumi.Input[
|
1754
|
+
:param pulumi.Input[_builtins.str] accessor: The accessor for this auth mount.
|
1755
|
+
:param pulumi.Input[_builtins.str] binddn: DN of object to bind when performing user search
|
1756
|
+
:param pulumi.Input[_builtins.str] bindpass: Password to use with `binddn` when performing user search
|
1757
|
+
:param pulumi.Input[_builtins.bool] case_sensitive_names: Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
1758
|
+
:param pulumi.Input[_builtins.str] certificate: Trusted CA to validate TLS certificate
|
1759
|
+
:param pulumi.Input[_builtins.int] connection_timeout: Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1760
|
+
:param pulumi.Input[_builtins.bool] deny_null_bind: Prevents users from bypassing authentication when providing an empty password.
|
1761
|
+
:param pulumi.Input[_builtins.str] description: Description for the LDAP auth backend mount
|
1762
|
+
:param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1763
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
1765
1764
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1766
|
-
:param pulumi.Input[
|
1767
|
-
:param pulumi.Input[
|
1768
|
-
:param pulumi.Input[
|
1769
|
-
:param pulumi.Input[
|
1770
|
-
:param pulumi.Input[
|
1771
|
-
:param pulumi.Input[
|
1772
|
-
:param pulumi.Input[
|
1765
|
+
:param pulumi.Input[_builtins.bool] discoverdn: Use anonymous bind to discover the bind DN of a user.
|
1766
|
+
:param pulumi.Input[_builtins.str] groupattr: LDAP attribute to follow on objects returned by groupfilter
|
1767
|
+
:param pulumi.Input[_builtins.str] groupdn: Base DN under which to perform group search
|
1768
|
+
:param pulumi.Input[_builtins.str] groupfilter: Go template used to construct group membership query
|
1769
|
+
:param pulumi.Input[_builtins.bool] insecure_tls: Control whether or TLS certificates must be validated
|
1770
|
+
:param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
|
1771
|
+
:param pulumi.Input[_builtins.int] max_page_size: Sets the max page size for LDAP lookups, by default it's set to -1.
|
1773
1772
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
1774
|
-
:param pulumi.Input[
|
1773
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1775
1774
|
The value should not contain leading or trailing forward slashes.
|
1776
1775
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1777
1776
|
*Available only for Vault Enterprise*.
|
1778
|
-
:param pulumi.Input[
|
1779
|
-
:param pulumi.Input[
|
1777
|
+
:param pulumi.Input[_builtins.str] path: Path to mount the LDAP auth backend under
|
1778
|
+
:param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
|
1780
1779
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
1781
|
-
:param pulumi.Input[
|
1780
|
+
:param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
1782
1781
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
1783
|
-
:param pulumi.Input[
|
1782
|
+
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
1784
1783
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
1785
1784
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
1786
|
-
:param pulumi.Input[
|
1787
|
-
:param pulumi.Input[
|
1788
|
-
:param pulumi.Input[
|
1789
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1790
|
-
:param pulumi.Input[
|
1791
|
-
:param pulumi.Input[
|
1792
|
-
:param pulumi.Input[
|
1793
|
-
:param pulumi.Input[
|
1794
|
-
:param pulumi.Input[
|
1795
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1796
|
-
:param pulumi.Input[
|
1797
|
-
:param pulumi.Input[
|
1798
|
-
:param pulumi.Input[
|
1799
|
-
:param pulumi.Input[
|
1800
|
-
:param pulumi.Input[
|
1801
|
-
:param pulumi.Input[
|
1802
|
-
:param pulumi.Input[
|
1803
|
-
:param pulumi.Input[
|
1804
|
-
:param pulumi.Input[
|
1785
|
+
:param pulumi.Input[_builtins.bool] starttls: Control use of TLS when conecting to LDAP
|
1786
|
+
:param pulumi.Input[_builtins.str] tls_max_version: Maximum acceptable version of TLS
|
1787
|
+
:param pulumi.Input[_builtins.str] tls_min_version: Minimum acceptable version of TLS
|
1788
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1789
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1790
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
1791
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1792
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1793
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
1794
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
1795
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
1796
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
1797
|
+
:param pulumi.Input[_builtins.str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1798
|
+
:param pulumi.Input[_builtins.str] url: The URL of the LDAP server
|
1799
|
+
:param pulumi.Input[_builtins.bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
1800
|
+
:param pulumi.Input[_builtins.str] userattr: Attribute on user object matching username passed in
|
1801
|
+
:param pulumi.Input[_builtins.str] userdn: Base DN under which to perform user search
|
1802
|
+
:param pulumi.Input[_builtins.str] userfilter: LDAP user search filter
|
1803
|
+
:param pulumi.Input[_builtins.bool] username_as_alias: Force the auth method to use the username passed by the user as the alias name.
|
1805
1804
|
"""
|
1806
1805
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1807
1806
|
|
@@ -1852,157 +1851,157 @@ class AuthBackend(pulumi.CustomResource):
|
|
1852
1851
|
__props__.__dict__["username_as_alias"] = username_as_alias
|
1853
1852
|
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
1854
1853
|
|
1855
|
-
@property
|
1854
|
+
@_builtins.property
|
1856
1855
|
@pulumi.getter
|
1857
|
-
def accessor(self) -> pulumi.Output[
|
1856
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
1858
1857
|
"""
|
1859
1858
|
The accessor for this auth mount.
|
1860
1859
|
"""
|
1861
1860
|
return pulumi.get(self, "accessor")
|
1862
1861
|
|
1863
|
-
@property
|
1862
|
+
@_builtins.property
|
1864
1863
|
@pulumi.getter
|
1865
|
-
def binddn(self) -> pulumi.Output[
|
1864
|
+
def binddn(self) -> pulumi.Output[_builtins.str]:
|
1866
1865
|
"""
|
1867
1866
|
DN of object to bind when performing user search
|
1868
1867
|
"""
|
1869
1868
|
return pulumi.get(self, "binddn")
|
1870
1869
|
|
1871
|
-
@property
|
1870
|
+
@_builtins.property
|
1872
1871
|
@pulumi.getter
|
1873
|
-
def bindpass(self) -> pulumi.Output[
|
1872
|
+
def bindpass(self) -> pulumi.Output[_builtins.str]:
|
1874
1873
|
"""
|
1875
1874
|
Password to use with `binddn` when performing user search
|
1876
1875
|
"""
|
1877
1876
|
return pulumi.get(self, "bindpass")
|
1878
1877
|
|
1879
|
-
@property
|
1878
|
+
@_builtins.property
|
1880
1879
|
@pulumi.getter(name="caseSensitiveNames")
|
1881
|
-
def case_sensitive_names(self) -> pulumi.Output[
|
1880
|
+
def case_sensitive_names(self) -> pulumi.Output[_builtins.bool]:
|
1882
1881
|
"""
|
1883
1882
|
Control case senstivity of objects fetched from LDAP, this is used for object matching in vault
|
1884
1883
|
"""
|
1885
1884
|
return pulumi.get(self, "case_sensitive_names")
|
1886
1885
|
|
1887
|
-
@property
|
1886
|
+
@_builtins.property
|
1888
1887
|
@pulumi.getter
|
1889
|
-
def certificate(self) -> pulumi.Output[
|
1888
|
+
def certificate(self) -> pulumi.Output[_builtins.str]:
|
1890
1889
|
"""
|
1891
1890
|
Trusted CA to validate TLS certificate
|
1892
1891
|
"""
|
1893
1892
|
return pulumi.get(self, "certificate")
|
1894
1893
|
|
1895
|
-
@property
|
1894
|
+
@_builtins.property
|
1896
1895
|
@pulumi.getter(name="clientTlsCert")
|
1897
|
-
def client_tls_cert(self) -> pulumi.Output[
|
1896
|
+
def client_tls_cert(self) -> pulumi.Output[_builtins.str]:
|
1898
1897
|
return pulumi.get(self, "client_tls_cert")
|
1899
1898
|
|
1900
|
-
@property
|
1899
|
+
@_builtins.property
|
1901
1900
|
@pulumi.getter(name="clientTlsKey")
|
1902
|
-
def client_tls_key(self) -> pulumi.Output[
|
1901
|
+
def client_tls_key(self) -> pulumi.Output[_builtins.str]:
|
1903
1902
|
return pulumi.get(self, "client_tls_key")
|
1904
1903
|
|
1905
|
-
@property
|
1904
|
+
@_builtins.property
|
1906
1905
|
@pulumi.getter(name="connectionTimeout")
|
1907
|
-
def connection_timeout(self) -> pulumi.Output[
|
1906
|
+
def connection_timeout(self) -> pulumi.Output[_builtins.int]:
|
1908
1907
|
"""
|
1909
1908
|
Timeout in seconds when connecting to LDAP before attempting to connect to the next server in the URL provided in `url` (integer: 30)
|
1910
1909
|
"""
|
1911
1910
|
return pulumi.get(self, "connection_timeout")
|
1912
1911
|
|
1913
|
-
@property
|
1912
|
+
@_builtins.property
|
1914
1913
|
@pulumi.getter(name="denyNullBind")
|
1915
|
-
def deny_null_bind(self) -> pulumi.Output[
|
1914
|
+
def deny_null_bind(self) -> pulumi.Output[_builtins.bool]:
|
1916
1915
|
"""
|
1917
1916
|
Prevents users from bypassing authentication when providing an empty password.
|
1918
1917
|
"""
|
1919
1918
|
return pulumi.get(self, "deny_null_bind")
|
1920
1919
|
|
1921
|
-
@property
|
1920
|
+
@_builtins.property
|
1922
1921
|
@pulumi.getter
|
1923
|
-
def description(self) -> pulumi.Output[
|
1922
|
+
def description(self) -> pulumi.Output[_builtins.str]:
|
1924
1923
|
"""
|
1925
1924
|
Description for the LDAP auth backend mount
|
1926
1925
|
"""
|
1927
1926
|
return pulumi.get(self, "description")
|
1928
1927
|
|
1929
|
-
@property
|
1928
|
+
@_builtins.property
|
1930
1929
|
@pulumi.getter(name="disableAutomatedRotation")
|
1931
|
-
def disable_automated_rotation(self) -> pulumi.Output[Optional[
|
1930
|
+
def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1932
1931
|
"""
|
1933
1932
|
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
|
1934
1933
|
"""
|
1935
1934
|
return pulumi.get(self, "disable_automated_rotation")
|
1936
1935
|
|
1937
|
-
@property
|
1936
|
+
@_builtins.property
|
1938
1937
|
@pulumi.getter(name="disableRemount")
|
1939
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1938
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1940
1939
|
"""
|
1941
1940
|
If set, opts out of mount migration on path updates.
|
1942
1941
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1943
1942
|
"""
|
1944
1943
|
return pulumi.get(self, "disable_remount")
|
1945
1944
|
|
1946
|
-
@property
|
1945
|
+
@_builtins.property
|
1947
1946
|
@pulumi.getter
|
1948
|
-
def discoverdn(self) -> pulumi.Output[
|
1947
|
+
def discoverdn(self) -> pulumi.Output[_builtins.bool]:
|
1949
1948
|
"""
|
1950
1949
|
Use anonymous bind to discover the bind DN of a user.
|
1951
1950
|
"""
|
1952
1951
|
return pulumi.get(self, "discoverdn")
|
1953
1952
|
|
1954
|
-
@property
|
1953
|
+
@_builtins.property
|
1955
1954
|
@pulumi.getter
|
1956
|
-
def groupattr(self) -> pulumi.Output[
|
1955
|
+
def groupattr(self) -> pulumi.Output[_builtins.str]:
|
1957
1956
|
"""
|
1958
1957
|
LDAP attribute to follow on objects returned by groupfilter
|
1959
1958
|
"""
|
1960
1959
|
return pulumi.get(self, "groupattr")
|
1961
1960
|
|
1962
|
-
@property
|
1961
|
+
@_builtins.property
|
1963
1962
|
@pulumi.getter
|
1964
|
-
def groupdn(self) -> pulumi.Output[
|
1963
|
+
def groupdn(self) -> pulumi.Output[_builtins.str]:
|
1965
1964
|
"""
|
1966
1965
|
Base DN under which to perform group search
|
1967
1966
|
"""
|
1968
1967
|
return pulumi.get(self, "groupdn")
|
1969
1968
|
|
1970
|
-
@property
|
1969
|
+
@_builtins.property
|
1971
1970
|
@pulumi.getter
|
1972
|
-
def groupfilter(self) -> pulumi.Output[
|
1971
|
+
def groupfilter(self) -> pulumi.Output[_builtins.str]:
|
1973
1972
|
"""
|
1974
1973
|
Go template used to construct group membership query
|
1975
1974
|
"""
|
1976
1975
|
return pulumi.get(self, "groupfilter")
|
1977
1976
|
|
1978
|
-
@property
|
1977
|
+
@_builtins.property
|
1979
1978
|
@pulumi.getter(name="insecureTls")
|
1980
|
-
def insecure_tls(self) -> pulumi.Output[
|
1979
|
+
def insecure_tls(self) -> pulumi.Output[_builtins.bool]:
|
1981
1980
|
"""
|
1982
1981
|
Control whether or TLS certificates must be validated
|
1983
1982
|
"""
|
1984
1983
|
return pulumi.get(self, "insecure_tls")
|
1985
1984
|
|
1986
|
-
@property
|
1985
|
+
@_builtins.property
|
1987
1986
|
@pulumi.getter
|
1988
|
-
def local(self) -> pulumi.Output[Optional[
|
1987
|
+
def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1989
1988
|
"""
|
1990
1989
|
Specifies if the auth method is local only.
|
1991
1990
|
"""
|
1992
1991
|
return pulumi.get(self, "local")
|
1993
1992
|
|
1994
|
-
@property
|
1993
|
+
@_builtins.property
|
1995
1994
|
@pulumi.getter(name="maxPageSize")
|
1996
|
-
def max_page_size(self) -> pulumi.Output[Optional[
|
1995
|
+
def max_page_size(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1997
1996
|
"""
|
1998
1997
|
Sets the max page size for LDAP lookups, by default it's set to -1.
|
1999
1998
|
*Available only for Vault 1.11.11+, 1.12.7+, and 1.13.3+*.
|
2000
1999
|
"""
|
2001
2000
|
return pulumi.get(self, "max_page_size")
|
2002
2001
|
|
2003
|
-
@property
|
2002
|
+
@_builtins.property
|
2004
2003
|
@pulumi.getter
|
2005
|
-
def namespace(self) -> pulumi.Output[Optional[
|
2004
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2006
2005
|
"""
|
2007
2006
|
The namespace to provision the resource in.
|
2008
2007
|
The value should not contain leading or trailing forward slashes.
|
@@ -2011,35 +2010,35 @@ class AuthBackend(pulumi.CustomResource):
|
|
2011
2010
|
"""
|
2012
2011
|
return pulumi.get(self, "namespace")
|
2013
2012
|
|
2014
|
-
@property
|
2013
|
+
@_builtins.property
|
2015
2014
|
@pulumi.getter
|
2016
|
-
def path(self) -> pulumi.Output[Optional[
|
2015
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2017
2016
|
"""
|
2018
2017
|
Path to mount the LDAP auth backend under
|
2019
2018
|
"""
|
2020
2019
|
return pulumi.get(self, "path")
|
2021
2020
|
|
2022
|
-
@property
|
2021
|
+
@_builtins.property
|
2023
2022
|
@pulumi.getter(name="rotationPeriod")
|
2024
|
-
def rotation_period(self) -> pulumi.Output[Optional[
|
2023
|
+
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
2025
2024
|
"""
|
2026
2025
|
The amount of time in seconds Vault should wait before rotating the root credential.
|
2027
2026
|
A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
|
2028
2027
|
"""
|
2029
2028
|
return pulumi.get(self, "rotation_period")
|
2030
2029
|
|
2031
|
-
@property
|
2030
|
+
@_builtins.property
|
2032
2031
|
@pulumi.getter(name="rotationSchedule")
|
2033
|
-
def rotation_schedule(self) -> pulumi.Output[Optional[
|
2032
|
+
def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2034
2033
|
"""
|
2035
2034
|
The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
|
2036
2035
|
defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
|
2037
2036
|
"""
|
2038
2037
|
return pulumi.get(self, "rotation_schedule")
|
2039
2038
|
|
2040
|
-
@property
|
2039
|
+
@_builtins.property
|
2041
2040
|
@pulumi.getter(name="rotationWindow")
|
2042
|
-
def rotation_window(self) -> pulumi.Output[Optional[
|
2041
|
+
def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
|
2043
2042
|
"""
|
2044
2043
|
The maximum amount of time in seconds allowed to complete
|
2045
2044
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
@@ -2047,153 +2046,153 @@ class AuthBackend(pulumi.CustomResource):
|
|
2047
2046
|
"""
|
2048
2047
|
return pulumi.get(self, "rotation_window")
|
2049
2048
|
|
2050
|
-
@property
|
2049
|
+
@_builtins.property
|
2051
2050
|
@pulumi.getter
|
2052
|
-
def starttls(self) -> pulumi.Output[
|
2051
|
+
def starttls(self) -> pulumi.Output[_builtins.bool]:
|
2053
2052
|
"""
|
2054
2053
|
Control use of TLS when conecting to LDAP
|
2055
2054
|
"""
|
2056
2055
|
return pulumi.get(self, "starttls")
|
2057
2056
|
|
2058
|
-
@property
|
2057
|
+
@_builtins.property
|
2059
2058
|
@pulumi.getter(name="tlsMaxVersion")
|
2060
|
-
def tls_max_version(self) -> pulumi.Output[
|
2059
|
+
def tls_max_version(self) -> pulumi.Output[_builtins.str]:
|
2061
2060
|
"""
|
2062
2061
|
Maximum acceptable version of TLS
|
2063
2062
|
"""
|
2064
2063
|
return pulumi.get(self, "tls_max_version")
|
2065
2064
|
|
2066
|
-
@property
|
2065
|
+
@_builtins.property
|
2067
2066
|
@pulumi.getter(name="tlsMinVersion")
|
2068
|
-
def tls_min_version(self) -> pulumi.Output[
|
2067
|
+
def tls_min_version(self) -> pulumi.Output[_builtins.str]:
|
2069
2068
|
"""
|
2070
2069
|
Minimum acceptable version of TLS
|
2071
2070
|
"""
|
2072
2071
|
return pulumi.get(self, "tls_min_version")
|
2073
2072
|
|
2074
|
-
@property
|
2073
|
+
@_builtins.property
|
2075
2074
|
@pulumi.getter(name="tokenBoundCidrs")
|
2076
|
-
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[
|
2075
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
2077
2076
|
"""
|
2078
2077
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
2079
2078
|
"""
|
2080
2079
|
return pulumi.get(self, "token_bound_cidrs")
|
2081
2080
|
|
2082
|
-
@property
|
2081
|
+
@_builtins.property
|
2083
2082
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
2084
|
-
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[
|
2083
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
2085
2084
|
"""
|
2086
2085
|
Generated Token's Explicit Maximum TTL in seconds
|
2087
2086
|
"""
|
2088
2087
|
return pulumi.get(self, "token_explicit_max_ttl")
|
2089
2088
|
|
2090
|
-
@property
|
2089
|
+
@_builtins.property
|
2091
2090
|
@pulumi.getter(name="tokenMaxTtl")
|
2092
|
-
def token_max_ttl(self) -> pulumi.Output[Optional[
|
2091
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
2093
2092
|
"""
|
2094
2093
|
The maximum lifetime of the generated token
|
2095
2094
|
"""
|
2096
2095
|
return pulumi.get(self, "token_max_ttl")
|
2097
2096
|
|
2098
|
-
@property
|
2097
|
+
@_builtins.property
|
2099
2098
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
2100
|
-
def token_no_default_policy(self) -> pulumi.Output[Optional[
|
2099
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
2101
2100
|
"""
|
2102
2101
|
If true, the 'default' policy will not automatically be added to generated tokens
|
2103
2102
|
"""
|
2104
2103
|
return pulumi.get(self, "token_no_default_policy")
|
2105
2104
|
|
2106
|
-
@property
|
2105
|
+
@_builtins.property
|
2107
2106
|
@pulumi.getter(name="tokenNumUses")
|
2108
|
-
def token_num_uses(self) -> pulumi.Output[Optional[
|
2107
|
+
def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
|
2109
2108
|
"""
|
2110
2109
|
The maximum number of times a token may be used, a value of zero means unlimited
|
2111
2110
|
"""
|
2112
2111
|
return pulumi.get(self, "token_num_uses")
|
2113
2112
|
|
2114
|
-
@property
|
2113
|
+
@_builtins.property
|
2115
2114
|
@pulumi.getter(name="tokenPeriod")
|
2116
|
-
def token_period(self) -> pulumi.Output[Optional[
|
2115
|
+
def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
2117
2116
|
"""
|
2118
2117
|
Generated Token's Period
|
2119
2118
|
"""
|
2120
2119
|
return pulumi.get(self, "token_period")
|
2121
2120
|
|
2122
|
-
@property
|
2121
|
+
@_builtins.property
|
2123
2122
|
@pulumi.getter(name="tokenPolicies")
|
2124
|
-
def token_policies(self) -> pulumi.Output[Optional[Sequence[
|
2123
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
2125
2124
|
"""
|
2126
2125
|
Generated Token's Policies
|
2127
2126
|
"""
|
2128
2127
|
return pulumi.get(self, "token_policies")
|
2129
2128
|
|
2130
|
-
@property
|
2129
|
+
@_builtins.property
|
2131
2130
|
@pulumi.getter(name="tokenTtl")
|
2132
|
-
def token_ttl(self) -> pulumi.Output[Optional[
|
2131
|
+
def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
2133
2132
|
"""
|
2134
2133
|
The initial ttl of the token to generate in seconds
|
2135
2134
|
"""
|
2136
2135
|
return pulumi.get(self, "token_ttl")
|
2137
2136
|
|
2138
|
-
@property
|
2137
|
+
@_builtins.property
|
2139
2138
|
@pulumi.getter(name="tokenType")
|
2140
|
-
def token_type(self) -> pulumi.Output[Optional[
|
2139
|
+
def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
2141
2140
|
"""
|
2142
2141
|
The type of token to generate, service or batch
|
2143
2142
|
"""
|
2144
2143
|
return pulumi.get(self, "token_type")
|
2145
2144
|
|
2146
|
-
@property
|
2145
|
+
@_builtins.property
|
2147
2146
|
@pulumi.getter
|
2148
|
-
def upndomain(self) -> pulumi.Output[
|
2147
|
+
def upndomain(self) -> pulumi.Output[_builtins.str]:
|
2149
2148
|
"""
|
2150
2149
|
The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
2151
2150
|
"""
|
2152
2151
|
return pulumi.get(self, "upndomain")
|
2153
2152
|
|
2154
|
-
@property
|
2153
|
+
@_builtins.property
|
2155
2154
|
@pulumi.getter
|
2156
|
-
def url(self) -> pulumi.Output[
|
2155
|
+
def url(self) -> pulumi.Output[_builtins.str]:
|
2157
2156
|
"""
|
2158
2157
|
The URL of the LDAP server
|
2159
2158
|
"""
|
2160
2159
|
return pulumi.get(self, "url")
|
2161
2160
|
|
2162
|
-
@property
|
2161
|
+
@_builtins.property
|
2163
2162
|
@pulumi.getter(name="useTokenGroups")
|
2164
|
-
def use_token_groups(self) -> pulumi.Output[
|
2163
|
+
def use_token_groups(self) -> pulumi.Output[_builtins.bool]:
|
2165
2164
|
"""
|
2166
2165
|
Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
2167
2166
|
"""
|
2168
2167
|
return pulumi.get(self, "use_token_groups")
|
2169
2168
|
|
2170
|
-
@property
|
2169
|
+
@_builtins.property
|
2171
2170
|
@pulumi.getter
|
2172
|
-
def userattr(self) -> pulumi.Output[
|
2171
|
+
def userattr(self) -> pulumi.Output[_builtins.str]:
|
2173
2172
|
"""
|
2174
2173
|
Attribute on user object matching username passed in
|
2175
2174
|
"""
|
2176
2175
|
return pulumi.get(self, "userattr")
|
2177
2176
|
|
2178
|
-
@property
|
2177
|
+
@_builtins.property
|
2179
2178
|
@pulumi.getter
|
2180
|
-
def userdn(self) -> pulumi.Output[
|
2179
|
+
def userdn(self) -> pulumi.Output[_builtins.str]:
|
2181
2180
|
"""
|
2182
2181
|
Base DN under which to perform user search
|
2183
2182
|
"""
|
2184
2183
|
return pulumi.get(self, "userdn")
|
2185
2184
|
|
2186
|
-
@property
|
2185
|
+
@_builtins.property
|
2187
2186
|
@pulumi.getter
|
2188
|
-
def userfilter(self) -> pulumi.Output[
|
2187
|
+
def userfilter(self) -> pulumi.Output[_builtins.str]:
|
2189
2188
|
"""
|
2190
2189
|
LDAP user search filter
|
2191
2190
|
"""
|
2192
2191
|
return pulumi.get(self, "userfilter")
|
2193
2192
|
|
2194
|
-
@property
|
2193
|
+
@_builtins.property
|
2195
2194
|
@pulumi.getter(name="usernameAsAlias")
|
2196
|
-
def username_as_alias(self) -> pulumi.Output[
|
2195
|
+
def username_as_alias(self) -> pulumi.Output[_builtins.bool]:
|
2197
2196
|
"""
|
2198
2197
|
Force the auth method to use the username passed by the user as the alias name.
|
2199
2198
|
"""
|