pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,40 +19,40 @@ __all__ = ['ScepAuthBackendRoleArgs', 'ScepAuthBackendRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class ScepAuthBackendRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
auth_type: pulumi.Input[
|
24
|
-
backend: Optional[pulumi.Input[
|
25
|
-
challenge: Optional[pulumi.Input[
|
26
|
-
display_name: Optional[pulumi.Input[
|
27
|
-
name: Optional[pulumi.Input[
|
28
|
-
namespace: Optional[pulumi.Input[
|
29
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
30
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
31
|
-
token_max_ttl: Optional[pulumi.Input[
|
32
|
-
token_no_default_policy: Optional[pulumi.Input[
|
33
|
-
token_num_uses: Optional[pulumi.Input[
|
34
|
-
token_period: Optional[pulumi.Input[
|
35
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
36
|
-
token_ttl: Optional[pulumi.Input[
|
37
|
-
token_type: Optional[pulumi.Input[
|
22
|
+
auth_type: pulumi.Input[_builtins.str],
|
23
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
24
|
+
challenge: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
display_name: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
29
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
30
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
31
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
32
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
33
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
34
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
35
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
36
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
38
37
|
"""
|
39
38
|
The set of arguments for constructing a ScepAuthBackendRole resource.
|
40
|
-
:param pulumi.Input[
|
41
|
-
:param pulumi.Input[
|
42
|
-
:param pulumi.Input[
|
43
|
-
:param pulumi.Input[
|
44
|
-
:param pulumi.Input[
|
39
|
+
:param pulumi.Input[_builtins.str] auth_type: The authentication type to use. This can be either "static-challenge" or "intune".
|
40
|
+
:param pulumi.Input[_builtins.str] backend: Path to the mounted SCEP auth backend.
|
41
|
+
:param pulumi.Input[_builtins.str] challenge: The static challenge to use if auth_type is "static-challenge", not used for other auth types.
|
42
|
+
:param pulumi.Input[_builtins.str] name: Name of the role.
|
43
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
45
44
|
The value should not contain leading or trailing forward slashes.
|
46
45
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
47
46
|
*Available only for Vault Enterprise*.
|
48
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
49
|
-
:param pulumi.Input[
|
50
|
-
:param pulumi.Input[
|
51
|
-
:param pulumi.Input[
|
52
|
-
:param pulumi.Input[
|
53
|
-
:param pulumi.Input[
|
54
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
55
|
-
:param pulumi.Input[
|
56
|
-
:param pulumi.Input[
|
47
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
48
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
49
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
50
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
51
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
52
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
53
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
54
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
55
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
57
56
|
"""
|
58
57
|
pulumi.set(__self__, "auth_type", auth_type)
|
59
58
|
if backend is not None:
|
@@ -85,66 +84,66 @@ class ScepAuthBackendRoleArgs:
|
|
85
84
|
if token_type is not None:
|
86
85
|
pulumi.set(__self__, "token_type", token_type)
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter(name="authType")
|
90
|
-
def auth_type(self) -> pulumi.Input[
|
89
|
+
def auth_type(self) -> pulumi.Input[_builtins.str]:
|
91
90
|
"""
|
92
91
|
The authentication type to use. This can be either "static-challenge" or "intune".
|
93
92
|
"""
|
94
93
|
return pulumi.get(self, "auth_type")
|
95
94
|
|
96
95
|
@auth_type.setter
|
97
|
-
def auth_type(self, value: pulumi.Input[
|
96
|
+
def auth_type(self, value: pulumi.Input[_builtins.str]):
|
98
97
|
pulumi.set(self, "auth_type", value)
|
99
98
|
|
100
|
-
@property
|
99
|
+
@_builtins.property
|
101
100
|
@pulumi.getter
|
102
|
-
def backend(self) -> Optional[pulumi.Input[
|
101
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
103
102
|
"""
|
104
103
|
Path to the mounted SCEP auth backend.
|
105
104
|
"""
|
106
105
|
return pulumi.get(self, "backend")
|
107
106
|
|
108
107
|
@backend.setter
|
109
|
-
def backend(self, value: Optional[pulumi.Input[
|
108
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
110
109
|
pulumi.set(self, "backend", value)
|
111
110
|
|
112
|
-
@property
|
111
|
+
@_builtins.property
|
113
112
|
@pulumi.getter
|
114
|
-
def challenge(self) -> Optional[pulumi.Input[
|
113
|
+
def challenge(self) -> Optional[pulumi.Input[_builtins.str]]:
|
115
114
|
"""
|
116
115
|
The static challenge to use if auth_type is "static-challenge", not used for other auth types.
|
117
116
|
"""
|
118
117
|
return pulumi.get(self, "challenge")
|
119
118
|
|
120
119
|
@challenge.setter
|
121
|
-
def challenge(self, value: Optional[pulumi.Input[
|
120
|
+
def challenge(self, value: Optional[pulumi.Input[_builtins.str]]):
|
122
121
|
pulumi.set(self, "challenge", value)
|
123
122
|
|
124
|
-
@property
|
123
|
+
@_builtins.property
|
125
124
|
@pulumi.getter(name="displayName")
|
126
|
-
def display_name(self) -> Optional[pulumi.Input[
|
125
|
+
def display_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
127
126
|
return pulumi.get(self, "display_name")
|
128
127
|
|
129
128
|
@display_name.setter
|
130
|
-
def display_name(self, value: Optional[pulumi.Input[
|
129
|
+
def display_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
131
130
|
pulumi.set(self, "display_name", value)
|
132
131
|
|
133
|
-
@property
|
132
|
+
@_builtins.property
|
134
133
|
@pulumi.getter
|
135
|
-
def name(self) -> Optional[pulumi.Input[
|
134
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
136
135
|
"""
|
137
136
|
Name of the role.
|
138
137
|
"""
|
139
138
|
return pulumi.get(self, "name")
|
140
139
|
|
141
140
|
@name.setter
|
142
|
-
def name(self, value: Optional[pulumi.Input[
|
141
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
143
142
|
pulumi.set(self, "name", value)
|
144
143
|
|
145
|
-
@property
|
144
|
+
@_builtins.property
|
146
145
|
@pulumi.getter
|
147
|
-
def namespace(self) -> Optional[pulumi.Input[
|
146
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
148
147
|
"""
|
149
148
|
The namespace to provision the resource in.
|
150
149
|
The value should not contain leading or trailing forward slashes.
|
@@ -154,155 +153,155 @@ class ScepAuthBackendRoleArgs:
|
|
154
153
|
return pulumi.get(self, "namespace")
|
155
154
|
|
156
155
|
@namespace.setter
|
157
|
-
def namespace(self, value: Optional[pulumi.Input[
|
156
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
158
157
|
pulumi.set(self, "namespace", value)
|
159
158
|
|
160
|
-
@property
|
159
|
+
@_builtins.property
|
161
160
|
@pulumi.getter(name="tokenBoundCidrs")
|
162
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
161
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
163
162
|
"""
|
164
163
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
165
164
|
"""
|
166
165
|
return pulumi.get(self, "token_bound_cidrs")
|
167
166
|
|
168
167
|
@token_bound_cidrs.setter
|
169
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
168
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
170
169
|
pulumi.set(self, "token_bound_cidrs", value)
|
171
170
|
|
172
|
-
@property
|
171
|
+
@_builtins.property
|
173
172
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
174
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
173
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
175
174
|
"""
|
176
175
|
Generated Token's Explicit Maximum TTL in seconds
|
177
176
|
"""
|
178
177
|
return pulumi.get(self, "token_explicit_max_ttl")
|
179
178
|
|
180
179
|
@token_explicit_max_ttl.setter
|
181
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
180
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
182
181
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
183
182
|
|
184
|
-
@property
|
183
|
+
@_builtins.property
|
185
184
|
@pulumi.getter(name="tokenMaxTtl")
|
186
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
185
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
187
186
|
"""
|
188
187
|
The maximum lifetime of the generated token
|
189
188
|
"""
|
190
189
|
return pulumi.get(self, "token_max_ttl")
|
191
190
|
|
192
191
|
@token_max_ttl.setter
|
193
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
192
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
194
193
|
pulumi.set(self, "token_max_ttl", value)
|
195
194
|
|
196
|
-
@property
|
195
|
+
@_builtins.property
|
197
196
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
198
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
197
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
199
198
|
"""
|
200
199
|
If true, the 'default' policy will not automatically be added to generated tokens
|
201
200
|
"""
|
202
201
|
return pulumi.get(self, "token_no_default_policy")
|
203
202
|
|
204
203
|
@token_no_default_policy.setter
|
205
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
204
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
206
205
|
pulumi.set(self, "token_no_default_policy", value)
|
207
206
|
|
208
|
-
@property
|
207
|
+
@_builtins.property
|
209
208
|
@pulumi.getter(name="tokenNumUses")
|
210
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
209
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
211
210
|
"""
|
212
211
|
The maximum number of times a token may be used, a value of zero means unlimited
|
213
212
|
"""
|
214
213
|
return pulumi.get(self, "token_num_uses")
|
215
214
|
|
216
215
|
@token_num_uses.setter
|
217
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
216
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
218
217
|
pulumi.set(self, "token_num_uses", value)
|
219
218
|
|
220
|
-
@property
|
219
|
+
@_builtins.property
|
221
220
|
@pulumi.getter(name="tokenPeriod")
|
222
|
-
def token_period(self) -> Optional[pulumi.Input[
|
221
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
223
222
|
"""
|
224
223
|
Generated Token's Period
|
225
224
|
"""
|
226
225
|
return pulumi.get(self, "token_period")
|
227
226
|
|
228
227
|
@token_period.setter
|
229
|
-
def token_period(self, value: Optional[pulumi.Input[
|
228
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
230
229
|
pulumi.set(self, "token_period", value)
|
231
230
|
|
232
|
-
@property
|
231
|
+
@_builtins.property
|
233
232
|
@pulumi.getter(name="tokenPolicies")
|
234
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
233
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
235
234
|
"""
|
236
235
|
Generated Token's Policies
|
237
236
|
"""
|
238
237
|
return pulumi.get(self, "token_policies")
|
239
238
|
|
240
239
|
@token_policies.setter
|
241
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
240
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
242
241
|
pulumi.set(self, "token_policies", value)
|
243
242
|
|
244
|
-
@property
|
243
|
+
@_builtins.property
|
245
244
|
@pulumi.getter(name="tokenTtl")
|
246
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
245
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
247
246
|
"""
|
248
247
|
The initial ttl of the token to generate in seconds
|
249
248
|
"""
|
250
249
|
return pulumi.get(self, "token_ttl")
|
251
250
|
|
252
251
|
@token_ttl.setter
|
253
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
252
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
254
253
|
pulumi.set(self, "token_ttl", value)
|
255
254
|
|
256
|
-
@property
|
255
|
+
@_builtins.property
|
257
256
|
@pulumi.getter(name="tokenType")
|
258
|
-
def token_type(self) -> Optional[pulumi.Input[
|
257
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
259
258
|
"""
|
260
259
|
The type of token to generate, service or batch
|
261
260
|
"""
|
262
261
|
return pulumi.get(self, "token_type")
|
263
262
|
|
264
263
|
@token_type.setter
|
265
|
-
def token_type(self, value: Optional[pulumi.Input[
|
264
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
266
265
|
pulumi.set(self, "token_type", value)
|
267
266
|
|
268
267
|
|
269
268
|
@pulumi.input_type
|
270
269
|
class _ScepAuthBackendRoleState:
|
271
270
|
def __init__(__self__, *,
|
272
|
-
auth_type: Optional[pulumi.Input[
|
273
|
-
backend: Optional[pulumi.Input[
|
274
|
-
challenge: Optional[pulumi.Input[
|
275
|
-
display_name: Optional[pulumi.Input[
|
276
|
-
name: Optional[pulumi.Input[
|
277
|
-
namespace: Optional[pulumi.Input[
|
278
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
279
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
280
|
-
token_max_ttl: Optional[pulumi.Input[
|
281
|
-
token_no_default_policy: Optional[pulumi.Input[
|
282
|
-
token_num_uses: Optional[pulumi.Input[
|
283
|
-
token_period: Optional[pulumi.Input[
|
284
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
285
|
-
token_ttl: Optional[pulumi.Input[
|
286
|
-
token_type: Optional[pulumi.Input[
|
271
|
+
auth_type: Optional[pulumi.Input[_builtins.str]] = None,
|
272
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
273
|
+
challenge: Optional[pulumi.Input[_builtins.str]] = None,
|
274
|
+
display_name: Optional[pulumi.Input[_builtins.str]] = None,
|
275
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
276
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
277
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
278
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
279
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
280
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
281
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
282
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
283
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
284
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
285
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
287
286
|
"""
|
288
287
|
Input properties used for looking up and filtering ScepAuthBackendRole resources.
|
289
|
-
:param pulumi.Input[
|
290
|
-
:param pulumi.Input[
|
291
|
-
:param pulumi.Input[
|
292
|
-
:param pulumi.Input[
|
293
|
-
:param pulumi.Input[
|
288
|
+
:param pulumi.Input[_builtins.str] auth_type: The authentication type to use. This can be either "static-challenge" or "intune".
|
289
|
+
:param pulumi.Input[_builtins.str] backend: Path to the mounted SCEP auth backend.
|
290
|
+
:param pulumi.Input[_builtins.str] challenge: The static challenge to use if auth_type is "static-challenge", not used for other auth types.
|
291
|
+
:param pulumi.Input[_builtins.str] name: Name of the role.
|
292
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
294
293
|
The value should not contain leading or trailing forward slashes.
|
295
294
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
296
295
|
*Available only for Vault Enterprise*.
|
297
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
298
|
-
:param pulumi.Input[
|
299
|
-
:param pulumi.Input[
|
300
|
-
:param pulumi.Input[
|
301
|
-
:param pulumi.Input[
|
302
|
-
:param pulumi.Input[
|
303
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
304
|
-
:param pulumi.Input[
|
305
|
-
:param pulumi.Input[
|
296
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
297
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
298
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
299
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
300
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
301
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
302
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
303
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
304
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
306
305
|
"""
|
307
306
|
if auth_type is not None:
|
308
307
|
pulumi.set(__self__, "auth_type", auth_type)
|
@@ -335,66 +334,66 @@ class _ScepAuthBackendRoleState:
|
|
335
334
|
if token_type is not None:
|
336
335
|
pulumi.set(__self__, "token_type", token_type)
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter(name="authType")
|
340
|
-
def auth_type(self) -> Optional[pulumi.Input[
|
339
|
+
def auth_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
341
340
|
"""
|
342
341
|
The authentication type to use. This can be either "static-challenge" or "intune".
|
343
342
|
"""
|
344
343
|
return pulumi.get(self, "auth_type")
|
345
344
|
|
346
345
|
@auth_type.setter
|
347
|
-
def auth_type(self, value: Optional[pulumi.Input[
|
346
|
+
def auth_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
348
347
|
pulumi.set(self, "auth_type", value)
|
349
348
|
|
350
|
-
@property
|
349
|
+
@_builtins.property
|
351
350
|
@pulumi.getter
|
352
|
-
def backend(self) -> Optional[pulumi.Input[
|
351
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
353
352
|
"""
|
354
353
|
Path to the mounted SCEP auth backend.
|
355
354
|
"""
|
356
355
|
return pulumi.get(self, "backend")
|
357
356
|
|
358
357
|
@backend.setter
|
359
|
-
def backend(self, value: Optional[pulumi.Input[
|
358
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
360
359
|
pulumi.set(self, "backend", value)
|
361
360
|
|
362
|
-
@property
|
361
|
+
@_builtins.property
|
363
362
|
@pulumi.getter
|
364
|
-
def challenge(self) -> Optional[pulumi.Input[
|
363
|
+
def challenge(self) -> Optional[pulumi.Input[_builtins.str]]:
|
365
364
|
"""
|
366
365
|
The static challenge to use if auth_type is "static-challenge", not used for other auth types.
|
367
366
|
"""
|
368
367
|
return pulumi.get(self, "challenge")
|
369
368
|
|
370
369
|
@challenge.setter
|
371
|
-
def challenge(self, value: Optional[pulumi.Input[
|
370
|
+
def challenge(self, value: Optional[pulumi.Input[_builtins.str]]):
|
372
371
|
pulumi.set(self, "challenge", value)
|
373
372
|
|
374
|
-
@property
|
373
|
+
@_builtins.property
|
375
374
|
@pulumi.getter(name="displayName")
|
376
|
-
def display_name(self) -> Optional[pulumi.Input[
|
375
|
+
def display_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
377
376
|
return pulumi.get(self, "display_name")
|
378
377
|
|
379
378
|
@display_name.setter
|
380
|
-
def display_name(self, value: Optional[pulumi.Input[
|
379
|
+
def display_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
381
380
|
pulumi.set(self, "display_name", value)
|
382
381
|
|
383
|
-
@property
|
382
|
+
@_builtins.property
|
384
383
|
@pulumi.getter
|
385
|
-
def name(self) -> Optional[pulumi.Input[
|
384
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
386
385
|
"""
|
387
386
|
Name of the role.
|
388
387
|
"""
|
389
388
|
return pulumi.get(self, "name")
|
390
389
|
|
391
390
|
@name.setter
|
392
|
-
def name(self, value: Optional[pulumi.Input[
|
391
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
393
392
|
pulumi.set(self, "name", value)
|
394
393
|
|
395
|
-
@property
|
394
|
+
@_builtins.property
|
396
395
|
@pulumi.getter
|
397
|
-
def namespace(self) -> Optional[pulumi.Input[
|
396
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
398
397
|
"""
|
399
398
|
The namespace to provision the resource in.
|
400
399
|
The value should not contain leading or trailing forward slashes.
|
@@ -404,115 +403,115 @@ class _ScepAuthBackendRoleState:
|
|
404
403
|
return pulumi.get(self, "namespace")
|
405
404
|
|
406
405
|
@namespace.setter
|
407
|
-
def namespace(self, value: Optional[pulumi.Input[
|
406
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
408
407
|
pulumi.set(self, "namespace", value)
|
409
408
|
|
410
|
-
@property
|
409
|
+
@_builtins.property
|
411
410
|
@pulumi.getter(name="tokenBoundCidrs")
|
412
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
411
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
413
412
|
"""
|
414
413
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
415
414
|
"""
|
416
415
|
return pulumi.get(self, "token_bound_cidrs")
|
417
416
|
|
418
417
|
@token_bound_cidrs.setter
|
419
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
418
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
420
419
|
pulumi.set(self, "token_bound_cidrs", value)
|
421
420
|
|
422
|
-
@property
|
421
|
+
@_builtins.property
|
423
422
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
424
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
423
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
425
424
|
"""
|
426
425
|
Generated Token's Explicit Maximum TTL in seconds
|
427
426
|
"""
|
428
427
|
return pulumi.get(self, "token_explicit_max_ttl")
|
429
428
|
|
430
429
|
@token_explicit_max_ttl.setter
|
431
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
430
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
432
431
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
433
432
|
|
434
|
-
@property
|
433
|
+
@_builtins.property
|
435
434
|
@pulumi.getter(name="tokenMaxTtl")
|
436
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
435
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
437
436
|
"""
|
438
437
|
The maximum lifetime of the generated token
|
439
438
|
"""
|
440
439
|
return pulumi.get(self, "token_max_ttl")
|
441
440
|
|
442
441
|
@token_max_ttl.setter
|
443
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
442
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
444
443
|
pulumi.set(self, "token_max_ttl", value)
|
445
444
|
|
446
|
-
@property
|
445
|
+
@_builtins.property
|
447
446
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
448
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
447
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
449
448
|
"""
|
450
449
|
If true, the 'default' policy will not automatically be added to generated tokens
|
451
450
|
"""
|
452
451
|
return pulumi.get(self, "token_no_default_policy")
|
453
452
|
|
454
453
|
@token_no_default_policy.setter
|
455
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
454
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
456
455
|
pulumi.set(self, "token_no_default_policy", value)
|
457
456
|
|
458
|
-
@property
|
457
|
+
@_builtins.property
|
459
458
|
@pulumi.getter(name="tokenNumUses")
|
460
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
459
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
461
460
|
"""
|
462
461
|
The maximum number of times a token may be used, a value of zero means unlimited
|
463
462
|
"""
|
464
463
|
return pulumi.get(self, "token_num_uses")
|
465
464
|
|
466
465
|
@token_num_uses.setter
|
467
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
466
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
468
467
|
pulumi.set(self, "token_num_uses", value)
|
469
468
|
|
470
|
-
@property
|
469
|
+
@_builtins.property
|
471
470
|
@pulumi.getter(name="tokenPeriod")
|
472
|
-
def token_period(self) -> Optional[pulumi.Input[
|
471
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
473
472
|
"""
|
474
473
|
Generated Token's Period
|
475
474
|
"""
|
476
475
|
return pulumi.get(self, "token_period")
|
477
476
|
|
478
477
|
@token_period.setter
|
479
|
-
def token_period(self, value: Optional[pulumi.Input[
|
478
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
480
479
|
pulumi.set(self, "token_period", value)
|
481
480
|
|
482
|
-
@property
|
481
|
+
@_builtins.property
|
483
482
|
@pulumi.getter(name="tokenPolicies")
|
484
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
483
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
485
484
|
"""
|
486
485
|
Generated Token's Policies
|
487
486
|
"""
|
488
487
|
return pulumi.get(self, "token_policies")
|
489
488
|
|
490
489
|
@token_policies.setter
|
491
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
490
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
492
491
|
pulumi.set(self, "token_policies", value)
|
493
492
|
|
494
|
-
@property
|
493
|
+
@_builtins.property
|
495
494
|
@pulumi.getter(name="tokenTtl")
|
496
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
495
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
497
496
|
"""
|
498
497
|
The initial ttl of the token to generate in seconds
|
499
498
|
"""
|
500
499
|
return pulumi.get(self, "token_ttl")
|
501
500
|
|
502
501
|
@token_ttl.setter
|
503
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
502
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
504
503
|
pulumi.set(self, "token_ttl", value)
|
505
504
|
|
506
|
-
@property
|
505
|
+
@_builtins.property
|
507
506
|
@pulumi.getter(name="tokenType")
|
508
|
-
def token_type(self) -> Optional[pulumi.Input[
|
507
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
509
508
|
"""
|
510
509
|
The type of token to generate, service or batch
|
511
510
|
"""
|
512
511
|
return pulumi.get(self, "token_type")
|
513
512
|
|
514
513
|
@token_type.setter
|
515
|
-
def token_type(self, value: Optional[pulumi.Input[
|
514
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
516
515
|
pulumi.set(self, "token_type", value)
|
517
516
|
|
518
517
|
|
@@ -522,21 +521,21 @@ class ScepAuthBackendRole(pulumi.CustomResource):
|
|
522
521
|
def __init__(__self__,
|
523
522
|
resource_name: str,
|
524
523
|
opts: Optional[pulumi.ResourceOptions] = None,
|
525
|
-
auth_type: Optional[pulumi.Input[
|
526
|
-
backend: Optional[pulumi.Input[
|
527
|
-
challenge: Optional[pulumi.Input[
|
528
|
-
display_name: Optional[pulumi.Input[
|
529
|
-
name: Optional[pulumi.Input[
|
530
|
-
namespace: Optional[pulumi.Input[
|
531
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
532
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
533
|
-
token_max_ttl: Optional[pulumi.Input[
|
534
|
-
token_no_default_policy: Optional[pulumi.Input[
|
535
|
-
token_num_uses: Optional[pulumi.Input[
|
536
|
-
token_period: Optional[pulumi.Input[
|
537
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
538
|
-
token_ttl: Optional[pulumi.Input[
|
539
|
-
token_type: Optional[pulumi.Input[
|
524
|
+
auth_type: Optional[pulumi.Input[_builtins.str]] = None,
|
525
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
526
|
+
challenge: Optional[pulumi.Input[_builtins.str]] = None,
|
527
|
+
display_name: Optional[pulumi.Input[_builtins.str]] = None,
|
528
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
529
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
530
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
531
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
532
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
533
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
534
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
535
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
536
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
537
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
538
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
540
539
|
__props__=None):
|
541
540
|
"""
|
542
541
|
## Example Usage
|
@@ -561,23 +560,23 @@ class ScepAuthBackendRole(pulumi.CustomResource):
|
|
561
560
|
|
562
561
|
:param str resource_name: The name of the resource.
|
563
562
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
564
|
-
:param pulumi.Input[
|
565
|
-
:param pulumi.Input[
|
566
|
-
:param pulumi.Input[
|
567
|
-
:param pulumi.Input[
|
568
|
-
:param pulumi.Input[
|
563
|
+
:param pulumi.Input[_builtins.str] auth_type: The authentication type to use. This can be either "static-challenge" or "intune".
|
564
|
+
:param pulumi.Input[_builtins.str] backend: Path to the mounted SCEP auth backend.
|
565
|
+
:param pulumi.Input[_builtins.str] challenge: The static challenge to use if auth_type is "static-challenge", not used for other auth types.
|
566
|
+
:param pulumi.Input[_builtins.str] name: Name of the role.
|
567
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
569
568
|
The value should not contain leading or trailing forward slashes.
|
570
569
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
571
570
|
*Available only for Vault Enterprise*.
|
572
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
573
|
-
:param pulumi.Input[
|
574
|
-
:param pulumi.Input[
|
575
|
-
:param pulumi.Input[
|
576
|
-
:param pulumi.Input[
|
577
|
-
:param pulumi.Input[
|
578
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
579
|
-
:param pulumi.Input[
|
580
|
-
:param pulumi.Input[
|
571
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
572
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
573
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
574
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
575
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
576
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
577
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
578
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
579
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
581
580
|
"""
|
582
581
|
...
|
583
582
|
@overload
|
@@ -621,21 +620,21 @@ class ScepAuthBackendRole(pulumi.CustomResource):
|
|
621
620
|
def _internal_init(__self__,
|
622
621
|
resource_name: str,
|
623
622
|
opts: Optional[pulumi.ResourceOptions] = None,
|
624
|
-
auth_type: Optional[pulumi.Input[
|
625
|
-
backend: Optional[pulumi.Input[
|
626
|
-
challenge: Optional[pulumi.Input[
|
627
|
-
display_name: Optional[pulumi.Input[
|
628
|
-
name: Optional[pulumi.Input[
|
629
|
-
namespace: Optional[pulumi.Input[
|
630
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
631
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
632
|
-
token_max_ttl: Optional[pulumi.Input[
|
633
|
-
token_no_default_policy: Optional[pulumi.Input[
|
634
|
-
token_num_uses: Optional[pulumi.Input[
|
635
|
-
token_period: Optional[pulumi.Input[
|
636
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
637
|
-
token_ttl: Optional[pulumi.Input[
|
638
|
-
token_type: Optional[pulumi.Input[
|
623
|
+
auth_type: Optional[pulumi.Input[_builtins.str]] = None,
|
624
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
625
|
+
challenge: Optional[pulumi.Input[_builtins.str]] = None,
|
626
|
+
display_name: Optional[pulumi.Input[_builtins.str]] = None,
|
627
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
628
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
629
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
630
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
631
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
632
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
633
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
634
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
635
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
636
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
637
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
639
638
|
__props__=None):
|
640
639
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
641
640
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -672,21 +671,21 @@ class ScepAuthBackendRole(pulumi.CustomResource):
|
|
672
671
|
def get(resource_name: str,
|
673
672
|
id: pulumi.Input[str],
|
674
673
|
opts: Optional[pulumi.ResourceOptions] = None,
|
675
|
-
auth_type: Optional[pulumi.Input[
|
676
|
-
backend: Optional[pulumi.Input[
|
677
|
-
challenge: Optional[pulumi.Input[
|
678
|
-
display_name: Optional[pulumi.Input[
|
679
|
-
name: Optional[pulumi.Input[
|
680
|
-
namespace: Optional[pulumi.Input[
|
681
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
682
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
683
|
-
token_max_ttl: Optional[pulumi.Input[
|
684
|
-
token_no_default_policy: Optional[pulumi.Input[
|
685
|
-
token_num_uses: Optional[pulumi.Input[
|
686
|
-
token_period: Optional[pulumi.Input[
|
687
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
688
|
-
token_ttl: Optional[pulumi.Input[
|
689
|
-
token_type: Optional[pulumi.Input[
|
674
|
+
auth_type: Optional[pulumi.Input[_builtins.str]] = None,
|
675
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
676
|
+
challenge: Optional[pulumi.Input[_builtins.str]] = None,
|
677
|
+
display_name: Optional[pulumi.Input[_builtins.str]] = None,
|
678
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
679
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
680
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
681
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
682
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
683
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
684
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
685
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
686
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
687
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
688
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'ScepAuthBackendRole':
|
690
689
|
"""
|
691
690
|
Get an existing ScepAuthBackendRole resource's state with the given name, id, and optional extra
|
692
691
|
properties used to qualify the lookup.
|
@@ -694,23 +693,23 @@ class ScepAuthBackendRole(pulumi.CustomResource):
|
|
694
693
|
:param str resource_name: The unique name of the resulting resource.
|
695
694
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
696
695
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
697
|
-
:param pulumi.Input[
|
698
|
-
:param pulumi.Input[
|
699
|
-
:param pulumi.Input[
|
700
|
-
:param pulumi.Input[
|
701
|
-
:param pulumi.Input[
|
696
|
+
:param pulumi.Input[_builtins.str] auth_type: The authentication type to use. This can be either "static-challenge" or "intune".
|
697
|
+
:param pulumi.Input[_builtins.str] backend: Path to the mounted SCEP auth backend.
|
698
|
+
:param pulumi.Input[_builtins.str] challenge: The static challenge to use if auth_type is "static-challenge", not used for other auth types.
|
699
|
+
:param pulumi.Input[_builtins.str] name: Name of the role.
|
700
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
702
701
|
The value should not contain leading or trailing forward slashes.
|
703
702
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
704
703
|
*Available only for Vault Enterprise*.
|
705
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
706
|
-
:param pulumi.Input[
|
707
|
-
:param pulumi.Input[
|
708
|
-
:param pulumi.Input[
|
709
|
-
:param pulumi.Input[
|
710
|
-
:param pulumi.Input[
|
711
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
712
|
-
:param pulumi.Input[
|
713
|
-
:param pulumi.Input[
|
704
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
705
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
706
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
707
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
708
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
709
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
710
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
711
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
712
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
714
713
|
"""
|
715
714
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
716
715
|
|
@@ -733,46 +732,46 @@ class ScepAuthBackendRole(pulumi.CustomResource):
|
|
733
732
|
__props__.__dict__["token_type"] = token_type
|
734
733
|
return ScepAuthBackendRole(resource_name, opts=opts, __props__=__props__)
|
735
734
|
|
736
|
-
@property
|
735
|
+
@_builtins.property
|
737
736
|
@pulumi.getter(name="authType")
|
738
|
-
def auth_type(self) -> pulumi.Output[
|
737
|
+
def auth_type(self) -> pulumi.Output[_builtins.str]:
|
739
738
|
"""
|
740
739
|
The authentication type to use. This can be either "static-challenge" or "intune".
|
741
740
|
"""
|
742
741
|
return pulumi.get(self, "auth_type")
|
743
742
|
|
744
|
-
@property
|
743
|
+
@_builtins.property
|
745
744
|
@pulumi.getter
|
746
|
-
def backend(self) -> pulumi.Output[Optional[
|
745
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
747
746
|
"""
|
748
747
|
Path to the mounted SCEP auth backend.
|
749
748
|
"""
|
750
749
|
return pulumi.get(self, "backend")
|
751
750
|
|
752
|
-
@property
|
751
|
+
@_builtins.property
|
753
752
|
@pulumi.getter
|
754
|
-
def challenge(self) -> pulumi.Output[Optional[
|
753
|
+
def challenge(self) -> pulumi.Output[Optional[_builtins.str]]:
|
755
754
|
"""
|
756
755
|
The static challenge to use if auth_type is "static-challenge", not used for other auth types.
|
757
756
|
"""
|
758
757
|
return pulumi.get(self, "challenge")
|
759
758
|
|
760
|
-
@property
|
759
|
+
@_builtins.property
|
761
760
|
@pulumi.getter(name="displayName")
|
762
|
-
def display_name(self) -> pulumi.Output[
|
761
|
+
def display_name(self) -> pulumi.Output[_builtins.str]:
|
763
762
|
return pulumi.get(self, "display_name")
|
764
763
|
|
765
|
-
@property
|
764
|
+
@_builtins.property
|
766
765
|
@pulumi.getter
|
767
|
-
def name(self) -> pulumi.Output[
|
766
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
768
767
|
"""
|
769
768
|
Name of the role.
|
770
769
|
"""
|
771
770
|
return pulumi.get(self, "name")
|
772
771
|
|
773
|
-
@property
|
772
|
+
@_builtins.property
|
774
773
|
@pulumi.getter
|
775
|
-
def namespace(self) -> pulumi.Output[Optional[
|
774
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
776
775
|
"""
|
777
776
|
The namespace to provision the resource in.
|
778
777
|
The value should not contain leading or trailing forward slashes.
|
@@ -781,73 +780,73 @@ class ScepAuthBackendRole(pulumi.CustomResource):
|
|
781
780
|
"""
|
782
781
|
return pulumi.get(self, "namespace")
|
783
782
|
|
784
|
-
@property
|
783
|
+
@_builtins.property
|
785
784
|
@pulumi.getter(name="tokenBoundCidrs")
|
786
|
-
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[
|
785
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
787
786
|
"""
|
788
787
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
789
788
|
"""
|
790
789
|
return pulumi.get(self, "token_bound_cidrs")
|
791
790
|
|
792
|
-
@property
|
791
|
+
@_builtins.property
|
793
792
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
794
|
-
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[
|
793
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
795
794
|
"""
|
796
795
|
Generated Token's Explicit Maximum TTL in seconds
|
797
796
|
"""
|
798
797
|
return pulumi.get(self, "token_explicit_max_ttl")
|
799
798
|
|
800
|
-
@property
|
799
|
+
@_builtins.property
|
801
800
|
@pulumi.getter(name="tokenMaxTtl")
|
802
|
-
def token_max_ttl(self) -> pulumi.Output[Optional[
|
801
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
803
802
|
"""
|
804
803
|
The maximum lifetime of the generated token
|
805
804
|
"""
|
806
805
|
return pulumi.get(self, "token_max_ttl")
|
807
806
|
|
808
|
-
@property
|
807
|
+
@_builtins.property
|
809
808
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
810
|
-
def token_no_default_policy(self) -> pulumi.Output[Optional[
|
809
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
811
810
|
"""
|
812
811
|
If true, the 'default' policy will not automatically be added to generated tokens
|
813
812
|
"""
|
814
813
|
return pulumi.get(self, "token_no_default_policy")
|
815
814
|
|
816
|
-
@property
|
815
|
+
@_builtins.property
|
817
816
|
@pulumi.getter(name="tokenNumUses")
|
818
|
-
def token_num_uses(self) -> pulumi.Output[Optional[
|
817
|
+
def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
|
819
818
|
"""
|
820
819
|
The maximum number of times a token may be used, a value of zero means unlimited
|
821
820
|
"""
|
822
821
|
return pulumi.get(self, "token_num_uses")
|
823
822
|
|
824
|
-
@property
|
823
|
+
@_builtins.property
|
825
824
|
@pulumi.getter(name="tokenPeriod")
|
826
|
-
def token_period(self) -> pulumi.Output[Optional[
|
825
|
+
def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
827
826
|
"""
|
828
827
|
Generated Token's Period
|
829
828
|
"""
|
830
829
|
return pulumi.get(self, "token_period")
|
831
830
|
|
832
|
-
@property
|
831
|
+
@_builtins.property
|
833
832
|
@pulumi.getter(name="tokenPolicies")
|
834
|
-
def token_policies(self) -> pulumi.Output[Optional[Sequence[
|
833
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
835
834
|
"""
|
836
835
|
Generated Token's Policies
|
837
836
|
"""
|
838
837
|
return pulumi.get(self, "token_policies")
|
839
838
|
|
840
|
-
@property
|
839
|
+
@_builtins.property
|
841
840
|
@pulumi.getter(name="tokenTtl")
|
842
|
-
def token_ttl(self) -> pulumi.Output[Optional[
|
841
|
+
def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
843
842
|
"""
|
844
843
|
The initial ttl of the token to generate in seconds
|
845
844
|
"""
|
846
845
|
return pulumi.get(self, "token_ttl")
|
847
846
|
|
848
|
-
@property
|
847
|
+
@_builtins.property
|
849
848
|
@pulumi.getter(name="tokenType")
|
850
|
-
def token_type(self) -> pulumi.Output[Optional[
|
849
|
+
def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
851
850
|
"""
|
852
851
|
The type of token to generate, service or batch
|
853
852
|
"""
|