pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,48 +19,48 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
path: pulumi.Input[
|
24
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
25
|
-
bound_attributes_type: Optional[pulumi.Input[
|
26
|
-
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
bound_subjects_type: Optional[pulumi.Input[
|
28
|
-
groups_attribute: Optional[pulumi.Input[
|
29
|
-
name: Optional[pulumi.Input[
|
30
|
-
namespace: Optional[pulumi.Input[
|
31
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
32
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
33
|
-
token_max_ttl: Optional[pulumi.Input[
|
34
|
-
token_no_default_policy: Optional[pulumi.Input[
|
35
|
-
token_num_uses: Optional[pulumi.Input[
|
36
|
-
token_period: Optional[pulumi.Input[
|
37
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
38
|
-
token_ttl: Optional[pulumi.Input[
|
39
|
-
token_type: Optional[pulumi.Input[
|
22
|
+
path: pulumi.Input[_builtins.str],
|
23
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
31
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
33
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
34
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
35
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
36
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
37
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
38
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
40
39
|
"""
|
41
40
|
The set of arguments for constructing a AuthBackendRole resource.
|
42
|
-
:param pulumi.Input[
|
43
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted.
|
42
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
|
44
43
|
exist in the SAML assertion.
|
45
|
-
:param pulumi.Input[
|
44
|
+
:param pulumi.Input[_builtins.str] bound_attributes_type: The type of matching assertion to perform on
|
46
45
|
`bound_attributes_type`.
|
47
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
48
|
-
:param pulumi.Input[
|
49
|
-
:param pulumi.Input[
|
46
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
|
47
|
+
:param pulumi.Input[_builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
|
48
|
+
:param pulumi.Input[_builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
|
50
49
|
user belongs.
|
51
|
-
:param pulumi.Input[
|
52
|
-
:param pulumi.Input[
|
50
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the role.
|
51
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
53
52
|
The value should not contain leading or trailing forward slashes.
|
54
53
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
55
54
|
*Available only for Vault Enterprise*.
|
56
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
57
|
-
:param pulumi.Input[
|
58
|
-
:param pulumi.Input[
|
59
|
-
:param pulumi.Input[
|
60
|
-
:param pulumi.Input[
|
61
|
-
:param pulumi.Input[
|
62
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
63
|
-
:param pulumi.Input[
|
64
|
-
:param pulumi.Input[
|
55
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
56
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
57
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
58
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
59
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
60
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
61
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
62
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
63
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
65
64
|
"""
|
66
65
|
pulumi.set(__self__, "path", path)
|
67
66
|
if bound_attributes is not None:
|
@@ -97,21 +96,21 @@ class AuthBackendRoleArgs:
|
|
97
96
|
if token_type is not None:
|
98
97
|
pulumi.set(__self__, "token_type", token_type)
|
99
98
|
|
100
|
-
@property
|
99
|
+
@_builtins.property
|
101
100
|
@pulumi.getter
|
102
|
-
def path(self) -> pulumi.Input[
|
101
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
103
102
|
"""
|
104
103
|
Path where the auth backend is mounted.
|
105
104
|
"""
|
106
105
|
return pulumi.get(self, "path")
|
107
106
|
|
108
107
|
@path.setter
|
109
|
-
def path(self, value: pulumi.Input[
|
108
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
110
109
|
pulumi.set(self, "path", value)
|
111
110
|
|
112
|
-
@property
|
111
|
+
@_builtins.property
|
113
112
|
@pulumi.getter(name="boundAttributes")
|
114
|
-
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
113
|
+
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
115
114
|
"""
|
116
115
|
Mapping of attribute names to values that are expected to
|
117
116
|
exist in the SAML assertion.
|
@@ -119,12 +118,12 @@ class AuthBackendRoleArgs:
|
|
119
118
|
return pulumi.get(self, "bound_attributes")
|
120
119
|
|
121
120
|
@bound_attributes.setter
|
122
|
-
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
121
|
+
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
123
122
|
pulumi.set(self, "bound_attributes", value)
|
124
123
|
|
125
|
-
@property
|
124
|
+
@_builtins.property
|
126
125
|
@pulumi.getter(name="boundAttributesType")
|
127
|
-
def bound_attributes_type(self) -> Optional[pulumi.Input[
|
126
|
+
def bound_attributes_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
128
127
|
"""
|
129
128
|
The type of matching assertion to perform on
|
130
129
|
`bound_attributes_type`.
|
@@ -132,36 +131,36 @@ class AuthBackendRoleArgs:
|
|
132
131
|
return pulumi.get(self, "bound_attributes_type")
|
133
132
|
|
134
133
|
@bound_attributes_type.setter
|
135
|
-
def bound_attributes_type(self, value: Optional[pulumi.Input[
|
134
|
+
def bound_attributes_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
136
135
|
pulumi.set(self, "bound_attributes_type", value)
|
137
136
|
|
138
|
-
@property
|
137
|
+
@_builtins.property
|
139
138
|
@pulumi.getter(name="boundSubjects")
|
140
|
-
def bound_subjects(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
139
|
+
def bound_subjects(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
141
140
|
"""
|
142
141
|
List of subjects being asserted for SAML authentication.
|
143
142
|
"""
|
144
143
|
return pulumi.get(self, "bound_subjects")
|
145
144
|
|
146
145
|
@bound_subjects.setter
|
147
|
-
def bound_subjects(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
146
|
+
def bound_subjects(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
148
147
|
pulumi.set(self, "bound_subjects", value)
|
149
148
|
|
150
|
-
@property
|
149
|
+
@_builtins.property
|
151
150
|
@pulumi.getter(name="boundSubjectsType")
|
152
|
-
def bound_subjects_type(self) -> Optional[pulumi.Input[
|
151
|
+
def bound_subjects_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
153
152
|
"""
|
154
153
|
The type of matching assertion to perform on `bound_subjects`.
|
155
154
|
"""
|
156
155
|
return pulumi.get(self, "bound_subjects_type")
|
157
156
|
|
158
157
|
@bound_subjects_type.setter
|
159
|
-
def bound_subjects_type(self, value: Optional[pulumi.Input[
|
158
|
+
def bound_subjects_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
160
159
|
pulumi.set(self, "bound_subjects_type", value)
|
161
160
|
|
162
|
-
@property
|
161
|
+
@_builtins.property
|
163
162
|
@pulumi.getter(name="groupsAttribute")
|
164
|
-
def groups_attribute(self) -> Optional[pulumi.Input[
|
163
|
+
def groups_attribute(self) -> Optional[pulumi.Input[_builtins.str]]:
|
165
164
|
"""
|
166
165
|
The attribute to use to identify the set of groups to which the
|
167
166
|
user belongs.
|
@@ -169,24 +168,24 @@ class AuthBackendRoleArgs:
|
|
169
168
|
return pulumi.get(self, "groups_attribute")
|
170
169
|
|
171
170
|
@groups_attribute.setter
|
172
|
-
def groups_attribute(self, value: Optional[pulumi.Input[
|
171
|
+
def groups_attribute(self, value: Optional[pulumi.Input[_builtins.str]]):
|
173
172
|
pulumi.set(self, "groups_attribute", value)
|
174
173
|
|
175
|
-
@property
|
174
|
+
@_builtins.property
|
176
175
|
@pulumi.getter
|
177
|
-
def name(self) -> Optional[pulumi.Input[
|
176
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
178
177
|
"""
|
179
178
|
Unique name of the role.
|
180
179
|
"""
|
181
180
|
return pulumi.get(self, "name")
|
182
181
|
|
183
182
|
@name.setter
|
184
|
-
def name(self, value: Optional[pulumi.Input[
|
183
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
185
184
|
pulumi.set(self, "name", value)
|
186
185
|
|
187
|
-
@property
|
186
|
+
@_builtins.property
|
188
187
|
@pulumi.getter
|
189
|
-
def namespace(self) -> Optional[pulumi.Input[
|
188
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
190
189
|
"""
|
191
190
|
The namespace to provision the resource in.
|
192
191
|
The value should not contain leading or trailing forward slashes.
|
@@ -196,163 +195,163 @@ class AuthBackendRoleArgs:
|
|
196
195
|
return pulumi.get(self, "namespace")
|
197
196
|
|
198
197
|
@namespace.setter
|
199
|
-
def namespace(self, value: Optional[pulumi.Input[
|
198
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
200
199
|
pulumi.set(self, "namespace", value)
|
201
200
|
|
202
|
-
@property
|
201
|
+
@_builtins.property
|
203
202
|
@pulumi.getter(name="tokenBoundCidrs")
|
204
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
203
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
205
204
|
"""
|
206
205
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
207
206
|
"""
|
208
207
|
return pulumi.get(self, "token_bound_cidrs")
|
209
208
|
|
210
209
|
@token_bound_cidrs.setter
|
211
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
210
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
212
211
|
pulumi.set(self, "token_bound_cidrs", value)
|
213
212
|
|
214
|
-
@property
|
213
|
+
@_builtins.property
|
215
214
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
216
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
215
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
217
216
|
"""
|
218
217
|
Generated Token's Explicit Maximum TTL in seconds
|
219
218
|
"""
|
220
219
|
return pulumi.get(self, "token_explicit_max_ttl")
|
221
220
|
|
222
221
|
@token_explicit_max_ttl.setter
|
223
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
222
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
224
223
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
225
224
|
|
226
|
-
@property
|
225
|
+
@_builtins.property
|
227
226
|
@pulumi.getter(name="tokenMaxTtl")
|
228
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
227
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
229
228
|
"""
|
230
229
|
The maximum lifetime of the generated token
|
231
230
|
"""
|
232
231
|
return pulumi.get(self, "token_max_ttl")
|
233
232
|
|
234
233
|
@token_max_ttl.setter
|
235
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
234
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
236
235
|
pulumi.set(self, "token_max_ttl", value)
|
237
236
|
|
238
|
-
@property
|
237
|
+
@_builtins.property
|
239
238
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
240
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
239
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
241
240
|
"""
|
242
241
|
If true, the 'default' policy will not automatically be added to generated tokens
|
243
242
|
"""
|
244
243
|
return pulumi.get(self, "token_no_default_policy")
|
245
244
|
|
246
245
|
@token_no_default_policy.setter
|
247
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
246
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
248
247
|
pulumi.set(self, "token_no_default_policy", value)
|
249
248
|
|
250
|
-
@property
|
249
|
+
@_builtins.property
|
251
250
|
@pulumi.getter(name="tokenNumUses")
|
252
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
251
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
253
252
|
"""
|
254
253
|
The maximum number of times a token may be used, a value of zero means unlimited
|
255
254
|
"""
|
256
255
|
return pulumi.get(self, "token_num_uses")
|
257
256
|
|
258
257
|
@token_num_uses.setter
|
259
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
258
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
260
259
|
pulumi.set(self, "token_num_uses", value)
|
261
260
|
|
262
|
-
@property
|
261
|
+
@_builtins.property
|
263
262
|
@pulumi.getter(name="tokenPeriod")
|
264
|
-
def token_period(self) -> Optional[pulumi.Input[
|
263
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
265
264
|
"""
|
266
265
|
Generated Token's Period
|
267
266
|
"""
|
268
267
|
return pulumi.get(self, "token_period")
|
269
268
|
|
270
269
|
@token_period.setter
|
271
|
-
def token_period(self, value: Optional[pulumi.Input[
|
270
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
272
271
|
pulumi.set(self, "token_period", value)
|
273
272
|
|
274
|
-
@property
|
273
|
+
@_builtins.property
|
275
274
|
@pulumi.getter(name="tokenPolicies")
|
276
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
275
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
277
276
|
"""
|
278
277
|
Generated Token's Policies
|
279
278
|
"""
|
280
279
|
return pulumi.get(self, "token_policies")
|
281
280
|
|
282
281
|
@token_policies.setter
|
283
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
282
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
284
283
|
pulumi.set(self, "token_policies", value)
|
285
284
|
|
286
|
-
@property
|
285
|
+
@_builtins.property
|
287
286
|
@pulumi.getter(name="tokenTtl")
|
288
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
287
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
289
288
|
"""
|
290
289
|
The initial ttl of the token to generate in seconds
|
291
290
|
"""
|
292
291
|
return pulumi.get(self, "token_ttl")
|
293
292
|
|
294
293
|
@token_ttl.setter
|
295
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
294
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
296
295
|
pulumi.set(self, "token_ttl", value)
|
297
296
|
|
298
|
-
@property
|
297
|
+
@_builtins.property
|
299
298
|
@pulumi.getter(name="tokenType")
|
300
|
-
def token_type(self) -> Optional[pulumi.Input[
|
299
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
301
300
|
"""
|
302
301
|
The type of token to generate, service or batch
|
303
302
|
"""
|
304
303
|
return pulumi.get(self, "token_type")
|
305
304
|
|
306
305
|
@token_type.setter
|
307
|
-
def token_type(self, value: Optional[pulumi.Input[
|
306
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
308
307
|
pulumi.set(self, "token_type", value)
|
309
308
|
|
310
309
|
|
311
310
|
@pulumi.input_type
|
312
311
|
class _AuthBackendRoleState:
|
313
312
|
def __init__(__self__, *,
|
314
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
315
|
-
bound_attributes_type: Optional[pulumi.Input[
|
316
|
-
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[
|
317
|
-
bound_subjects_type: Optional[pulumi.Input[
|
318
|
-
groups_attribute: Optional[pulumi.Input[
|
319
|
-
name: Optional[pulumi.Input[
|
320
|
-
namespace: Optional[pulumi.Input[
|
321
|
-
path: Optional[pulumi.Input[
|
322
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
323
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
324
|
-
token_max_ttl: Optional[pulumi.Input[
|
325
|
-
token_no_default_policy: Optional[pulumi.Input[
|
326
|
-
token_num_uses: Optional[pulumi.Input[
|
327
|
-
token_period: Optional[pulumi.Input[
|
328
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
329
|
-
token_ttl: Optional[pulumi.Input[
|
330
|
-
token_type: Optional[pulumi.Input[
|
313
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
314
|
+
bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
|
315
|
+
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
316
|
+
bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
|
317
|
+
groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
|
318
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
319
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
320
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
321
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
322
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
323
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
324
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
325
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
326
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
327
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
328
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
329
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
331
330
|
"""
|
332
331
|
Input properties used for looking up and filtering AuthBackendRole resources.
|
333
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
332
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
|
334
333
|
exist in the SAML assertion.
|
335
|
-
:param pulumi.Input[
|
334
|
+
:param pulumi.Input[_builtins.str] bound_attributes_type: The type of matching assertion to perform on
|
336
335
|
`bound_attributes_type`.
|
337
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
338
|
-
:param pulumi.Input[
|
339
|
-
:param pulumi.Input[
|
336
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
|
337
|
+
:param pulumi.Input[_builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
|
338
|
+
:param pulumi.Input[_builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
|
340
339
|
user belongs.
|
341
|
-
:param pulumi.Input[
|
342
|
-
:param pulumi.Input[
|
340
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the role.
|
341
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
343
342
|
The value should not contain leading or trailing forward slashes.
|
344
343
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
345
344
|
*Available only for Vault Enterprise*.
|
346
|
-
:param pulumi.Input[
|
347
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
348
|
-
:param pulumi.Input[
|
349
|
-
:param pulumi.Input[
|
350
|
-
:param pulumi.Input[
|
351
|
-
:param pulumi.Input[
|
352
|
-
:param pulumi.Input[
|
353
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
354
|
-
:param pulumi.Input[
|
355
|
-
:param pulumi.Input[
|
345
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted.
|
346
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
347
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
348
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
349
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
350
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
351
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
352
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
353
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
354
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
356
355
|
"""
|
357
356
|
if bound_attributes is not None:
|
358
357
|
pulumi.set(__self__, "bound_attributes", bound_attributes)
|
@@ -389,9 +388,9 @@ class _AuthBackendRoleState:
|
|
389
388
|
if token_type is not None:
|
390
389
|
pulumi.set(__self__, "token_type", token_type)
|
391
390
|
|
392
|
-
@property
|
391
|
+
@_builtins.property
|
393
392
|
@pulumi.getter(name="boundAttributes")
|
394
|
-
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
393
|
+
def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
395
394
|
"""
|
396
395
|
Mapping of attribute names to values that are expected to
|
397
396
|
exist in the SAML assertion.
|
@@ -399,12 +398,12 @@ class _AuthBackendRoleState:
|
|
399
398
|
return pulumi.get(self, "bound_attributes")
|
400
399
|
|
401
400
|
@bound_attributes.setter
|
402
|
-
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
401
|
+
def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
403
402
|
pulumi.set(self, "bound_attributes", value)
|
404
403
|
|
405
|
-
@property
|
404
|
+
@_builtins.property
|
406
405
|
@pulumi.getter(name="boundAttributesType")
|
407
|
-
def bound_attributes_type(self) -> Optional[pulumi.Input[
|
406
|
+
def bound_attributes_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
408
407
|
"""
|
409
408
|
The type of matching assertion to perform on
|
410
409
|
`bound_attributes_type`.
|
@@ -412,36 +411,36 @@ class _AuthBackendRoleState:
|
|
412
411
|
return pulumi.get(self, "bound_attributes_type")
|
413
412
|
|
414
413
|
@bound_attributes_type.setter
|
415
|
-
def bound_attributes_type(self, value: Optional[pulumi.Input[
|
414
|
+
def bound_attributes_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
416
415
|
pulumi.set(self, "bound_attributes_type", value)
|
417
416
|
|
418
|
-
@property
|
417
|
+
@_builtins.property
|
419
418
|
@pulumi.getter(name="boundSubjects")
|
420
|
-
def bound_subjects(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
419
|
+
def bound_subjects(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
421
420
|
"""
|
422
421
|
List of subjects being asserted for SAML authentication.
|
423
422
|
"""
|
424
423
|
return pulumi.get(self, "bound_subjects")
|
425
424
|
|
426
425
|
@bound_subjects.setter
|
427
|
-
def bound_subjects(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
426
|
+
def bound_subjects(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
428
427
|
pulumi.set(self, "bound_subjects", value)
|
429
428
|
|
430
|
-
@property
|
429
|
+
@_builtins.property
|
431
430
|
@pulumi.getter(name="boundSubjectsType")
|
432
|
-
def bound_subjects_type(self) -> Optional[pulumi.Input[
|
431
|
+
def bound_subjects_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
433
432
|
"""
|
434
433
|
The type of matching assertion to perform on `bound_subjects`.
|
435
434
|
"""
|
436
435
|
return pulumi.get(self, "bound_subjects_type")
|
437
436
|
|
438
437
|
@bound_subjects_type.setter
|
439
|
-
def bound_subjects_type(self, value: Optional[pulumi.Input[
|
438
|
+
def bound_subjects_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
440
439
|
pulumi.set(self, "bound_subjects_type", value)
|
441
440
|
|
442
|
-
@property
|
441
|
+
@_builtins.property
|
443
442
|
@pulumi.getter(name="groupsAttribute")
|
444
|
-
def groups_attribute(self) -> Optional[pulumi.Input[
|
443
|
+
def groups_attribute(self) -> Optional[pulumi.Input[_builtins.str]]:
|
445
444
|
"""
|
446
445
|
The attribute to use to identify the set of groups to which the
|
447
446
|
user belongs.
|
@@ -449,24 +448,24 @@ class _AuthBackendRoleState:
|
|
449
448
|
return pulumi.get(self, "groups_attribute")
|
450
449
|
|
451
450
|
@groups_attribute.setter
|
452
|
-
def groups_attribute(self, value: Optional[pulumi.Input[
|
451
|
+
def groups_attribute(self, value: Optional[pulumi.Input[_builtins.str]]):
|
453
452
|
pulumi.set(self, "groups_attribute", value)
|
454
453
|
|
455
|
-
@property
|
454
|
+
@_builtins.property
|
456
455
|
@pulumi.getter
|
457
|
-
def name(self) -> Optional[pulumi.Input[
|
456
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
458
457
|
"""
|
459
458
|
Unique name of the role.
|
460
459
|
"""
|
461
460
|
return pulumi.get(self, "name")
|
462
461
|
|
463
462
|
@name.setter
|
464
|
-
def name(self, value: Optional[pulumi.Input[
|
463
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
465
464
|
pulumi.set(self, "name", value)
|
466
465
|
|
467
|
-
@property
|
466
|
+
@_builtins.property
|
468
467
|
@pulumi.getter
|
469
|
-
def namespace(self) -> Optional[pulumi.Input[
|
468
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
470
469
|
"""
|
471
470
|
The namespace to provision the resource in.
|
472
471
|
The value should not contain leading or trailing forward slashes.
|
@@ -476,127 +475,127 @@ class _AuthBackendRoleState:
|
|
476
475
|
return pulumi.get(self, "namespace")
|
477
476
|
|
478
477
|
@namespace.setter
|
479
|
-
def namespace(self, value: Optional[pulumi.Input[
|
478
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
480
479
|
pulumi.set(self, "namespace", value)
|
481
480
|
|
482
|
-
@property
|
481
|
+
@_builtins.property
|
483
482
|
@pulumi.getter
|
484
|
-
def path(self) -> Optional[pulumi.Input[
|
483
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
485
484
|
"""
|
486
485
|
Path where the auth backend is mounted.
|
487
486
|
"""
|
488
487
|
return pulumi.get(self, "path")
|
489
488
|
|
490
489
|
@path.setter
|
491
|
-
def path(self, value: Optional[pulumi.Input[
|
490
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
492
491
|
pulumi.set(self, "path", value)
|
493
492
|
|
494
|
-
@property
|
493
|
+
@_builtins.property
|
495
494
|
@pulumi.getter(name="tokenBoundCidrs")
|
496
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
495
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
497
496
|
"""
|
498
497
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
499
498
|
"""
|
500
499
|
return pulumi.get(self, "token_bound_cidrs")
|
501
500
|
|
502
501
|
@token_bound_cidrs.setter
|
503
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
502
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
504
503
|
pulumi.set(self, "token_bound_cidrs", value)
|
505
504
|
|
506
|
-
@property
|
505
|
+
@_builtins.property
|
507
506
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
508
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
507
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
509
508
|
"""
|
510
509
|
Generated Token's Explicit Maximum TTL in seconds
|
511
510
|
"""
|
512
511
|
return pulumi.get(self, "token_explicit_max_ttl")
|
513
512
|
|
514
513
|
@token_explicit_max_ttl.setter
|
515
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
514
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
516
515
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
517
516
|
|
518
|
-
@property
|
517
|
+
@_builtins.property
|
519
518
|
@pulumi.getter(name="tokenMaxTtl")
|
520
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
519
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
521
520
|
"""
|
522
521
|
The maximum lifetime of the generated token
|
523
522
|
"""
|
524
523
|
return pulumi.get(self, "token_max_ttl")
|
525
524
|
|
526
525
|
@token_max_ttl.setter
|
527
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
526
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
528
527
|
pulumi.set(self, "token_max_ttl", value)
|
529
528
|
|
530
|
-
@property
|
529
|
+
@_builtins.property
|
531
530
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
532
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
531
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
533
532
|
"""
|
534
533
|
If true, the 'default' policy will not automatically be added to generated tokens
|
535
534
|
"""
|
536
535
|
return pulumi.get(self, "token_no_default_policy")
|
537
536
|
|
538
537
|
@token_no_default_policy.setter
|
539
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
538
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
540
539
|
pulumi.set(self, "token_no_default_policy", value)
|
541
540
|
|
542
|
-
@property
|
541
|
+
@_builtins.property
|
543
542
|
@pulumi.getter(name="tokenNumUses")
|
544
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
543
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
545
544
|
"""
|
546
545
|
The maximum number of times a token may be used, a value of zero means unlimited
|
547
546
|
"""
|
548
547
|
return pulumi.get(self, "token_num_uses")
|
549
548
|
|
550
549
|
@token_num_uses.setter
|
551
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
550
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
552
551
|
pulumi.set(self, "token_num_uses", value)
|
553
552
|
|
554
|
-
@property
|
553
|
+
@_builtins.property
|
555
554
|
@pulumi.getter(name="tokenPeriod")
|
556
|
-
def token_period(self) -> Optional[pulumi.Input[
|
555
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
557
556
|
"""
|
558
557
|
Generated Token's Period
|
559
558
|
"""
|
560
559
|
return pulumi.get(self, "token_period")
|
561
560
|
|
562
561
|
@token_period.setter
|
563
|
-
def token_period(self, value: Optional[pulumi.Input[
|
562
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
564
563
|
pulumi.set(self, "token_period", value)
|
565
564
|
|
566
|
-
@property
|
565
|
+
@_builtins.property
|
567
566
|
@pulumi.getter(name="tokenPolicies")
|
568
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
567
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
569
568
|
"""
|
570
569
|
Generated Token's Policies
|
571
570
|
"""
|
572
571
|
return pulumi.get(self, "token_policies")
|
573
572
|
|
574
573
|
@token_policies.setter
|
575
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
574
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
576
575
|
pulumi.set(self, "token_policies", value)
|
577
576
|
|
578
|
-
@property
|
577
|
+
@_builtins.property
|
579
578
|
@pulumi.getter(name="tokenTtl")
|
580
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
579
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
581
580
|
"""
|
582
581
|
The initial ttl of the token to generate in seconds
|
583
582
|
"""
|
584
583
|
return pulumi.get(self, "token_ttl")
|
585
584
|
|
586
585
|
@token_ttl.setter
|
587
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
586
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
588
587
|
pulumi.set(self, "token_ttl", value)
|
589
588
|
|
590
|
-
@property
|
589
|
+
@_builtins.property
|
591
590
|
@pulumi.getter(name="tokenType")
|
592
|
-
def token_type(self) -> Optional[pulumi.Input[
|
591
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
593
592
|
"""
|
594
593
|
The type of token to generate, service or batch
|
595
594
|
"""
|
596
595
|
return pulumi.get(self, "token_type")
|
597
596
|
|
598
597
|
@token_type.setter
|
599
|
-
def token_type(self, value: Optional[pulumi.Input[
|
598
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
600
599
|
pulumi.set(self, "token_type", value)
|
601
600
|
|
602
601
|
|
@@ -606,23 +605,23 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
606
605
|
def __init__(__self__,
|
607
606
|
resource_name: str,
|
608
607
|
opts: Optional[pulumi.ResourceOptions] = None,
|
609
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
610
|
-
bound_attributes_type: Optional[pulumi.Input[
|
611
|
-
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[
|
612
|
-
bound_subjects_type: Optional[pulumi.Input[
|
613
|
-
groups_attribute: Optional[pulumi.Input[
|
614
|
-
name: Optional[pulumi.Input[
|
615
|
-
namespace: Optional[pulumi.Input[
|
616
|
-
path: Optional[pulumi.Input[
|
617
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
618
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
619
|
-
token_max_ttl: Optional[pulumi.Input[
|
620
|
-
token_no_default_policy: Optional[pulumi.Input[
|
621
|
-
token_num_uses: Optional[pulumi.Input[
|
622
|
-
token_period: Optional[pulumi.Input[
|
623
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
624
|
-
token_ttl: Optional[pulumi.Input[
|
625
|
-
token_type: Optional[pulumi.Input[
|
608
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
609
|
+
bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
|
610
|
+
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
611
|
+
bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
|
612
|
+
groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
|
613
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
614
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
615
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
616
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
617
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
618
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
619
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
620
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
621
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
622
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
623
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
624
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
626
625
|
__props__=None):
|
627
626
|
"""
|
628
627
|
Manages an SAML auth backend role in a Vault server. See the [Vault
|
@@ -663,29 +662,29 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
663
662
|
|
664
663
|
:param str resource_name: The name of the resource.
|
665
664
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
666
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
665
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
|
667
666
|
exist in the SAML assertion.
|
668
|
-
:param pulumi.Input[
|
667
|
+
:param pulumi.Input[_builtins.str] bound_attributes_type: The type of matching assertion to perform on
|
669
668
|
`bound_attributes_type`.
|
670
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
671
|
-
:param pulumi.Input[
|
672
|
-
:param pulumi.Input[
|
669
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
|
670
|
+
:param pulumi.Input[_builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
|
671
|
+
:param pulumi.Input[_builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
|
673
672
|
user belongs.
|
674
|
-
:param pulumi.Input[
|
675
|
-
:param pulumi.Input[
|
673
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the role.
|
674
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
676
675
|
The value should not contain leading or trailing forward slashes.
|
677
676
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
678
677
|
*Available only for Vault Enterprise*.
|
679
|
-
:param pulumi.Input[
|
680
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
681
|
-
:param pulumi.Input[
|
682
|
-
:param pulumi.Input[
|
683
|
-
:param pulumi.Input[
|
684
|
-
:param pulumi.Input[
|
685
|
-
:param pulumi.Input[
|
686
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
687
|
-
:param pulumi.Input[
|
688
|
-
:param pulumi.Input[
|
678
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted.
|
679
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
680
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
681
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
682
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
683
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
684
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
685
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
686
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
687
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
689
688
|
"""
|
690
689
|
...
|
691
690
|
@overload
|
@@ -745,23 +744,23 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
745
744
|
def _internal_init(__self__,
|
746
745
|
resource_name: str,
|
747
746
|
opts: Optional[pulumi.ResourceOptions] = None,
|
748
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
749
|
-
bound_attributes_type: Optional[pulumi.Input[
|
750
|
-
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[
|
751
|
-
bound_subjects_type: Optional[pulumi.Input[
|
752
|
-
groups_attribute: Optional[pulumi.Input[
|
753
|
-
name: Optional[pulumi.Input[
|
754
|
-
namespace: Optional[pulumi.Input[
|
755
|
-
path: Optional[pulumi.Input[
|
756
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
757
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
758
|
-
token_max_ttl: Optional[pulumi.Input[
|
759
|
-
token_no_default_policy: Optional[pulumi.Input[
|
760
|
-
token_num_uses: Optional[pulumi.Input[
|
761
|
-
token_period: Optional[pulumi.Input[
|
762
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
763
|
-
token_ttl: Optional[pulumi.Input[
|
764
|
-
token_type: Optional[pulumi.Input[
|
747
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
748
|
+
bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
|
749
|
+
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
750
|
+
bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
|
751
|
+
groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
|
752
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
753
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
754
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
755
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
756
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
757
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
758
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
759
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
760
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
761
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
762
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
763
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
765
764
|
__props__=None):
|
766
765
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
767
766
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -800,23 +799,23 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
800
799
|
def get(resource_name: str,
|
801
800
|
id: pulumi.Input[str],
|
802
801
|
opts: Optional[pulumi.ResourceOptions] = None,
|
803
|
-
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
804
|
-
bound_attributes_type: Optional[pulumi.Input[
|
805
|
-
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[
|
806
|
-
bound_subjects_type: Optional[pulumi.Input[
|
807
|
-
groups_attribute: Optional[pulumi.Input[
|
808
|
-
name: Optional[pulumi.Input[
|
809
|
-
namespace: Optional[pulumi.Input[
|
810
|
-
path: Optional[pulumi.Input[
|
811
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
812
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
813
|
-
token_max_ttl: Optional[pulumi.Input[
|
814
|
-
token_no_default_policy: Optional[pulumi.Input[
|
815
|
-
token_num_uses: Optional[pulumi.Input[
|
816
|
-
token_period: Optional[pulumi.Input[
|
817
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
818
|
-
token_ttl: Optional[pulumi.Input[
|
819
|
-
token_type: Optional[pulumi.Input[
|
802
|
+
bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
803
|
+
bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
|
804
|
+
bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
805
|
+
bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
|
806
|
+
groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
|
807
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
808
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
809
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
810
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
811
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
812
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
813
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
814
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
815
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
816
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
817
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
818
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRole':
|
820
819
|
"""
|
821
820
|
Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
|
822
821
|
properties used to qualify the lookup.
|
@@ -824,29 +823,29 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
824
823
|
:param str resource_name: The unique name of the resulting resource.
|
825
824
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
826
825
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
827
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
826
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
|
828
827
|
exist in the SAML assertion.
|
829
|
-
:param pulumi.Input[
|
828
|
+
:param pulumi.Input[_builtins.str] bound_attributes_type: The type of matching assertion to perform on
|
830
829
|
`bound_attributes_type`.
|
831
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
832
|
-
:param pulumi.Input[
|
833
|
-
:param pulumi.Input[
|
830
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
|
831
|
+
:param pulumi.Input[_builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
|
832
|
+
:param pulumi.Input[_builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
|
834
833
|
user belongs.
|
835
|
-
:param pulumi.Input[
|
836
|
-
:param pulumi.Input[
|
834
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the role.
|
835
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
837
836
|
The value should not contain leading or trailing forward slashes.
|
838
837
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
839
838
|
*Available only for Vault Enterprise*.
|
840
|
-
:param pulumi.Input[
|
841
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
842
|
-
:param pulumi.Input[
|
843
|
-
:param pulumi.Input[
|
844
|
-
:param pulumi.Input[
|
845
|
-
:param pulumi.Input[
|
846
|
-
:param pulumi.Input[
|
847
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
848
|
-
:param pulumi.Input[
|
849
|
-
:param pulumi.Input[
|
839
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted.
|
840
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
841
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
842
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
843
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
844
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
845
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
846
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
847
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
848
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
850
849
|
"""
|
851
850
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
852
851
|
|
@@ -871,60 +870,60 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
871
870
|
__props__.__dict__["token_type"] = token_type
|
872
871
|
return AuthBackendRole(resource_name, opts=opts, __props__=__props__)
|
873
872
|
|
874
|
-
@property
|
873
|
+
@_builtins.property
|
875
874
|
@pulumi.getter(name="boundAttributes")
|
876
|
-
def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str,
|
875
|
+
def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
877
876
|
"""
|
878
877
|
Mapping of attribute names to values that are expected to
|
879
878
|
exist in the SAML assertion.
|
880
879
|
"""
|
881
880
|
return pulumi.get(self, "bound_attributes")
|
882
881
|
|
883
|
-
@property
|
882
|
+
@_builtins.property
|
884
883
|
@pulumi.getter(name="boundAttributesType")
|
885
|
-
def bound_attributes_type(self) -> pulumi.Output[
|
884
|
+
def bound_attributes_type(self) -> pulumi.Output[_builtins.str]:
|
886
885
|
"""
|
887
886
|
The type of matching assertion to perform on
|
888
887
|
`bound_attributes_type`.
|
889
888
|
"""
|
890
889
|
return pulumi.get(self, "bound_attributes_type")
|
891
890
|
|
892
|
-
@property
|
891
|
+
@_builtins.property
|
893
892
|
@pulumi.getter(name="boundSubjects")
|
894
|
-
def bound_subjects(self) -> pulumi.Output[Optional[Sequence[
|
893
|
+
def bound_subjects(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
895
894
|
"""
|
896
895
|
List of subjects being asserted for SAML authentication.
|
897
896
|
"""
|
898
897
|
return pulumi.get(self, "bound_subjects")
|
899
898
|
|
900
|
-
@property
|
899
|
+
@_builtins.property
|
901
900
|
@pulumi.getter(name="boundSubjectsType")
|
902
|
-
def bound_subjects_type(self) -> pulumi.Output[
|
901
|
+
def bound_subjects_type(self) -> pulumi.Output[_builtins.str]:
|
903
902
|
"""
|
904
903
|
The type of matching assertion to perform on `bound_subjects`.
|
905
904
|
"""
|
906
905
|
return pulumi.get(self, "bound_subjects_type")
|
907
906
|
|
908
|
-
@property
|
907
|
+
@_builtins.property
|
909
908
|
@pulumi.getter(name="groupsAttribute")
|
910
|
-
def groups_attribute(self) -> pulumi.Output[Optional[
|
909
|
+
def groups_attribute(self) -> pulumi.Output[Optional[_builtins.str]]:
|
911
910
|
"""
|
912
911
|
The attribute to use to identify the set of groups to which the
|
913
912
|
user belongs.
|
914
913
|
"""
|
915
914
|
return pulumi.get(self, "groups_attribute")
|
916
915
|
|
917
|
-
@property
|
916
|
+
@_builtins.property
|
918
917
|
@pulumi.getter
|
919
|
-
def name(self) -> pulumi.Output[
|
918
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
920
919
|
"""
|
921
920
|
Unique name of the role.
|
922
921
|
"""
|
923
922
|
return pulumi.get(self, "name")
|
924
923
|
|
925
|
-
@property
|
924
|
+
@_builtins.property
|
926
925
|
@pulumi.getter
|
927
|
-
def namespace(self) -> pulumi.Output[Optional[
|
926
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
928
927
|
"""
|
929
928
|
The namespace to provision the resource in.
|
930
929
|
The value should not contain leading or trailing forward slashes.
|
@@ -933,81 +932,81 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
933
932
|
"""
|
934
933
|
return pulumi.get(self, "namespace")
|
935
934
|
|
936
|
-
@property
|
935
|
+
@_builtins.property
|
937
936
|
@pulumi.getter
|
938
|
-
def path(self) -> pulumi.Output[
|
937
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
939
938
|
"""
|
940
939
|
Path where the auth backend is mounted.
|
941
940
|
"""
|
942
941
|
return pulumi.get(self, "path")
|
943
942
|
|
944
|
-
@property
|
943
|
+
@_builtins.property
|
945
944
|
@pulumi.getter(name="tokenBoundCidrs")
|
946
|
-
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[
|
945
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
947
946
|
"""
|
948
947
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
949
948
|
"""
|
950
949
|
return pulumi.get(self, "token_bound_cidrs")
|
951
950
|
|
952
|
-
@property
|
951
|
+
@_builtins.property
|
953
952
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
954
|
-
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[
|
953
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
955
954
|
"""
|
956
955
|
Generated Token's Explicit Maximum TTL in seconds
|
957
956
|
"""
|
958
957
|
return pulumi.get(self, "token_explicit_max_ttl")
|
959
958
|
|
960
|
-
@property
|
959
|
+
@_builtins.property
|
961
960
|
@pulumi.getter(name="tokenMaxTtl")
|
962
|
-
def token_max_ttl(self) -> pulumi.Output[Optional[
|
961
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
963
962
|
"""
|
964
963
|
The maximum lifetime of the generated token
|
965
964
|
"""
|
966
965
|
return pulumi.get(self, "token_max_ttl")
|
967
966
|
|
968
|
-
@property
|
967
|
+
@_builtins.property
|
969
968
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
970
|
-
def token_no_default_policy(self) -> pulumi.Output[Optional[
|
969
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
971
970
|
"""
|
972
971
|
If true, the 'default' policy will not automatically be added to generated tokens
|
973
972
|
"""
|
974
973
|
return pulumi.get(self, "token_no_default_policy")
|
975
974
|
|
976
|
-
@property
|
975
|
+
@_builtins.property
|
977
976
|
@pulumi.getter(name="tokenNumUses")
|
978
|
-
def token_num_uses(self) -> pulumi.Output[Optional[
|
977
|
+
def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
|
979
978
|
"""
|
980
979
|
The maximum number of times a token may be used, a value of zero means unlimited
|
981
980
|
"""
|
982
981
|
return pulumi.get(self, "token_num_uses")
|
983
982
|
|
984
|
-
@property
|
983
|
+
@_builtins.property
|
985
984
|
@pulumi.getter(name="tokenPeriod")
|
986
|
-
def token_period(self) -> pulumi.Output[Optional[
|
985
|
+
def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
987
986
|
"""
|
988
987
|
Generated Token's Period
|
989
988
|
"""
|
990
989
|
return pulumi.get(self, "token_period")
|
991
990
|
|
992
|
-
@property
|
991
|
+
@_builtins.property
|
993
992
|
@pulumi.getter(name="tokenPolicies")
|
994
|
-
def token_policies(self) -> pulumi.Output[Optional[Sequence[
|
993
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
995
994
|
"""
|
996
995
|
Generated Token's Policies
|
997
996
|
"""
|
998
997
|
return pulumi.get(self, "token_policies")
|
999
998
|
|
1000
|
-
@property
|
999
|
+
@_builtins.property
|
1001
1000
|
@pulumi.getter(name="tokenTtl")
|
1002
|
-
def token_ttl(self) -> pulumi.Output[Optional[
|
1001
|
+
def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1003
1002
|
"""
|
1004
1003
|
The initial ttl of the token to generate in seconds
|
1005
1004
|
"""
|
1006
1005
|
return pulumi.get(self, "token_ttl")
|
1007
1006
|
|
1008
|
-
@property
|
1007
|
+
@_builtins.property
|
1009
1008
|
@pulumi.getter(name="tokenType")
|
1010
|
-
def token_type(self) -> pulumi.Output[Optional[
|
1009
|
+
def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1011
1010
|
"""
|
1012
1011
|
The type of token to generate, service or batch
|
1013
1012
|
"""
|