pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,76 +19,76 @@ __all__ = ['CertAuthBackendRoleArgs', 'CertAuthBackendRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class CertAuthBackendRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
certificate: pulumi.Input[
|
24
|
-
allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
25
|
-
allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
28
|
-
allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[
|
29
|
-
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
30
|
-
backend: Optional[pulumi.Input[
|
31
|
-
display_name: Optional[pulumi.Input[
|
32
|
-
name: Optional[pulumi.Input[
|
33
|
-
namespace: Optional[pulumi.Input[
|
34
|
-
ocsp_ca_certificates: Optional[pulumi.Input[
|
35
|
-
ocsp_enabled: Optional[pulumi.Input[
|
36
|
-
ocsp_fail_open: Optional[pulumi.Input[
|
37
|
-
ocsp_query_all_servers: Optional[pulumi.Input[
|
38
|
-
ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[
|
39
|
-
required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[
|
40
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
41
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
42
|
-
token_max_ttl: Optional[pulumi.Input[
|
43
|
-
token_no_default_policy: Optional[pulumi.Input[
|
44
|
-
token_num_uses: Optional[pulumi.Input[
|
45
|
-
token_period: Optional[pulumi.Input[
|
46
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
47
|
-
token_ttl: Optional[pulumi.Input[
|
48
|
-
token_type: Optional[pulumi.Input[
|
22
|
+
certificate: pulumi.Input[_builtins.str],
|
23
|
+
allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
25
|
+
allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
|
+
allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
|
+
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
29
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
display_name: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
33
|
+
ocsp_ca_certificates: Optional[pulumi.Input[_builtins.str]] = None,
|
34
|
+
ocsp_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
ocsp_fail_open: Optional[pulumi.Input[_builtins.bool]] = None,
|
36
|
+
ocsp_query_all_servers: Optional[pulumi.Input[_builtins.bool]] = None,
|
37
|
+
ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
38
|
+
required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
39
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
40
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
41
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
42
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
43
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
44
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
45
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
46
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
47
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
49
48
|
"""
|
50
49
|
The set of arguments for constructing a CertAuthBackendRole resource.
|
51
|
-
:param pulumi.Input[
|
52
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
53
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
54
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
55
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
56
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
57
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
58
|
-
:param pulumi.Input[
|
59
|
-
:param pulumi.Input[
|
60
|
-
:param pulumi.Input[
|
61
|
-
:param pulumi.Input[
|
50
|
+
:param pulumi.Input[_builtins.str] certificate: CA certificate used to validate client certificates
|
51
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_common_names: Allowed the common names for authenticated client certificates
|
52
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
|
53
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_email_sans: Allowed emails for authenticated client certificates
|
54
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
55
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
|
56
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
|
57
|
+
:param pulumi.Input[_builtins.str] backend: Path to the mounted Cert auth backend
|
58
|
+
:param pulumi.Input[_builtins.str] display_name: The name to display on tokens issued under this role.
|
59
|
+
:param pulumi.Input[_builtins.str] name: Name of the role
|
60
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
62
61
|
The value should not contain leading or trailing forward slashes.
|
63
62
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
64
63
|
*Available only for Vault Enterprise*.
|
65
|
-
:param pulumi.Input[
|
64
|
+
:param pulumi.Input[_builtins.str] ocsp_ca_certificates: Any additional CA certificates
|
66
65
|
needed to verify OCSP responses. Provided as base64 encoded PEM data.
|
67
66
|
Requires Vault version 1.13+.
|
68
|
-
:param pulumi.Input[
|
67
|
+
:param pulumi.Input[_builtins.bool] ocsp_enabled: If enabled, validate certificates'
|
69
68
|
revocation status using OCSP. Requires Vault version 1.13+.
|
70
|
-
:param pulumi.Input[
|
69
|
+
:param pulumi.Input[_builtins.bool] ocsp_fail_open: If true and an OCSP response cannot
|
71
70
|
be fetched or is of an unknown status, the login will proceed as if the
|
72
71
|
certificate has not been revoked.
|
73
72
|
Requires Vault version 1.13+.
|
74
|
-
:param pulumi.Input[
|
73
|
+
:param pulumi.Input[_builtins.bool] ocsp_query_all_servers: If set to true, rather than
|
75
74
|
accepting the first successful OCSP response, query all servers and consider
|
76
75
|
the certificate valid only if all servers agree.
|
77
76
|
Requires Vault version 1.13+.
|
78
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
77
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers_overrides: : A comma-separated list of OCSP
|
79
78
|
server addresses. If unset, the OCSP server is determined from the
|
80
79
|
AuthorityInformationAccess extension on the certificate being inspected.
|
81
80
|
Requires Vault version 1.13+.
|
82
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
81
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] required_extensions: TLS extensions required on
|
83
82
|
client certificates
|
84
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
85
|
-
:param pulumi.Input[
|
86
|
-
:param pulumi.Input[
|
87
|
-
:param pulumi.Input[
|
88
|
-
:param pulumi.Input[
|
89
|
-
:param pulumi.Input[
|
90
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
91
|
-
:param pulumi.Input[
|
92
|
-
:param pulumi.Input[
|
83
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
84
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
85
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
86
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
87
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
88
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
89
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
90
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
91
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
93
92
|
"""
|
94
93
|
pulumi.set(__self__, "certificate", certificate)
|
95
94
|
if allowed_common_names is not None:
|
@@ -143,129 +142,129 @@ class CertAuthBackendRoleArgs:
|
|
143
142
|
if token_type is not None:
|
144
143
|
pulumi.set(__self__, "token_type", token_type)
|
145
144
|
|
146
|
-
@property
|
145
|
+
@_builtins.property
|
147
146
|
@pulumi.getter
|
148
|
-
def certificate(self) -> pulumi.Input[
|
147
|
+
def certificate(self) -> pulumi.Input[_builtins.str]:
|
149
148
|
"""
|
150
149
|
CA certificate used to validate client certificates
|
151
150
|
"""
|
152
151
|
return pulumi.get(self, "certificate")
|
153
152
|
|
154
153
|
@certificate.setter
|
155
|
-
def certificate(self, value: pulumi.Input[
|
154
|
+
def certificate(self, value: pulumi.Input[_builtins.str]):
|
156
155
|
pulumi.set(self, "certificate", value)
|
157
156
|
|
158
|
-
@property
|
157
|
+
@_builtins.property
|
159
158
|
@pulumi.getter(name="allowedCommonNames")
|
160
|
-
def allowed_common_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
159
|
+
def allowed_common_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
161
160
|
"""
|
162
161
|
Allowed the common names for authenticated client certificates
|
163
162
|
"""
|
164
163
|
return pulumi.get(self, "allowed_common_names")
|
165
164
|
|
166
165
|
@allowed_common_names.setter
|
167
|
-
def allowed_common_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
166
|
+
def allowed_common_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
168
167
|
pulumi.set(self, "allowed_common_names", value)
|
169
168
|
|
170
|
-
@property
|
169
|
+
@_builtins.property
|
171
170
|
@pulumi.getter(name="allowedDnsSans")
|
172
|
-
def allowed_dns_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
171
|
+
def allowed_dns_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
173
172
|
"""
|
174
173
|
Allowed alternative dns names for authenticated client certificates
|
175
174
|
"""
|
176
175
|
return pulumi.get(self, "allowed_dns_sans")
|
177
176
|
|
178
177
|
@allowed_dns_sans.setter
|
179
|
-
def allowed_dns_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
178
|
+
def allowed_dns_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
180
179
|
pulumi.set(self, "allowed_dns_sans", value)
|
181
180
|
|
182
|
-
@property
|
181
|
+
@_builtins.property
|
183
182
|
@pulumi.getter(name="allowedEmailSans")
|
184
|
-
def allowed_email_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
183
|
+
def allowed_email_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
185
184
|
"""
|
186
185
|
Allowed emails for authenticated client certificates
|
187
186
|
"""
|
188
187
|
return pulumi.get(self, "allowed_email_sans")
|
189
188
|
|
190
189
|
@allowed_email_sans.setter
|
191
|
-
def allowed_email_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
190
|
+
def allowed_email_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
192
191
|
pulumi.set(self, "allowed_email_sans", value)
|
193
192
|
|
194
|
-
@property
|
193
|
+
@_builtins.property
|
195
194
|
@pulumi.getter(name="allowedNames")
|
196
|
-
def allowed_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
195
|
+
def allowed_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
197
196
|
"""
|
198
197
|
DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
199
198
|
"""
|
200
199
|
return pulumi.get(self, "allowed_names")
|
201
200
|
|
202
201
|
@allowed_names.setter
|
203
|
-
def allowed_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
202
|
+
def allowed_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
204
203
|
pulumi.set(self, "allowed_names", value)
|
205
204
|
|
206
|
-
@property
|
205
|
+
@_builtins.property
|
207
206
|
@pulumi.getter(name="allowedOrganizationalUnits")
|
208
|
-
def allowed_organizational_units(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
207
|
+
def allowed_organizational_units(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
209
208
|
"""
|
210
209
|
Allowed organization units for authenticated client certificates.
|
211
210
|
"""
|
212
211
|
return pulumi.get(self, "allowed_organizational_units")
|
213
212
|
|
214
213
|
@allowed_organizational_units.setter
|
215
|
-
def allowed_organizational_units(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
214
|
+
def allowed_organizational_units(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
216
215
|
pulumi.set(self, "allowed_organizational_units", value)
|
217
216
|
|
218
|
-
@property
|
217
|
+
@_builtins.property
|
219
218
|
@pulumi.getter(name="allowedUriSans")
|
220
|
-
def allowed_uri_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
219
|
+
def allowed_uri_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
221
220
|
"""
|
222
221
|
Allowed URIs for authenticated client certificates
|
223
222
|
"""
|
224
223
|
return pulumi.get(self, "allowed_uri_sans")
|
225
224
|
|
226
225
|
@allowed_uri_sans.setter
|
227
|
-
def allowed_uri_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
226
|
+
def allowed_uri_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
228
227
|
pulumi.set(self, "allowed_uri_sans", value)
|
229
228
|
|
230
|
-
@property
|
229
|
+
@_builtins.property
|
231
230
|
@pulumi.getter
|
232
|
-
def backend(self) -> Optional[pulumi.Input[
|
231
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
233
232
|
"""
|
234
233
|
Path to the mounted Cert auth backend
|
235
234
|
"""
|
236
235
|
return pulumi.get(self, "backend")
|
237
236
|
|
238
237
|
@backend.setter
|
239
|
-
def backend(self, value: Optional[pulumi.Input[
|
238
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
240
239
|
pulumi.set(self, "backend", value)
|
241
240
|
|
242
|
-
@property
|
241
|
+
@_builtins.property
|
243
242
|
@pulumi.getter(name="displayName")
|
244
|
-
def display_name(self) -> Optional[pulumi.Input[
|
243
|
+
def display_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
245
244
|
"""
|
246
245
|
The name to display on tokens issued under this role.
|
247
246
|
"""
|
248
247
|
return pulumi.get(self, "display_name")
|
249
248
|
|
250
249
|
@display_name.setter
|
251
|
-
def display_name(self, value: Optional[pulumi.Input[
|
250
|
+
def display_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
252
251
|
pulumi.set(self, "display_name", value)
|
253
252
|
|
254
|
-
@property
|
253
|
+
@_builtins.property
|
255
254
|
@pulumi.getter
|
256
|
-
def name(self) -> Optional[pulumi.Input[
|
255
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
257
256
|
"""
|
258
257
|
Name of the role
|
259
258
|
"""
|
260
259
|
return pulumi.get(self, "name")
|
261
260
|
|
262
261
|
@name.setter
|
263
|
-
def name(self, value: Optional[pulumi.Input[
|
262
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
264
263
|
pulumi.set(self, "name", value)
|
265
264
|
|
266
|
-
@property
|
265
|
+
@_builtins.property
|
267
266
|
@pulumi.getter
|
268
|
-
def namespace(self) -> Optional[pulumi.Input[
|
267
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
269
268
|
"""
|
270
269
|
The namespace to provision the resource in.
|
271
270
|
The value should not contain leading or trailing forward slashes.
|
@@ -275,12 +274,12 @@ class CertAuthBackendRoleArgs:
|
|
275
274
|
return pulumi.get(self, "namespace")
|
276
275
|
|
277
276
|
@namespace.setter
|
278
|
-
def namespace(self, value: Optional[pulumi.Input[
|
277
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
279
278
|
pulumi.set(self, "namespace", value)
|
280
279
|
|
281
|
-
@property
|
280
|
+
@_builtins.property
|
282
281
|
@pulumi.getter(name="ocspCaCertificates")
|
283
|
-
def ocsp_ca_certificates(self) -> Optional[pulumi.Input[
|
282
|
+
def ocsp_ca_certificates(self) -> Optional[pulumi.Input[_builtins.str]]:
|
284
283
|
"""
|
285
284
|
Any additional CA certificates
|
286
285
|
needed to verify OCSP responses. Provided as base64 encoded PEM data.
|
@@ -289,12 +288,12 @@ class CertAuthBackendRoleArgs:
|
|
289
288
|
return pulumi.get(self, "ocsp_ca_certificates")
|
290
289
|
|
291
290
|
@ocsp_ca_certificates.setter
|
292
|
-
def ocsp_ca_certificates(self, value: Optional[pulumi.Input[
|
291
|
+
def ocsp_ca_certificates(self, value: Optional[pulumi.Input[_builtins.str]]):
|
293
292
|
pulumi.set(self, "ocsp_ca_certificates", value)
|
294
293
|
|
295
|
-
@property
|
294
|
+
@_builtins.property
|
296
295
|
@pulumi.getter(name="ocspEnabled")
|
297
|
-
def ocsp_enabled(self) -> Optional[pulumi.Input[
|
296
|
+
def ocsp_enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
298
297
|
"""
|
299
298
|
If enabled, validate certificates'
|
300
299
|
revocation status using OCSP. Requires Vault version 1.13+.
|
@@ -302,12 +301,12 @@ class CertAuthBackendRoleArgs:
|
|
302
301
|
return pulumi.get(self, "ocsp_enabled")
|
303
302
|
|
304
303
|
@ocsp_enabled.setter
|
305
|
-
def ocsp_enabled(self, value: Optional[pulumi.Input[
|
304
|
+
def ocsp_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
306
305
|
pulumi.set(self, "ocsp_enabled", value)
|
307
306
|
|
308
|
-
@property
|
307
|
+
@_builtins.property
|
309
308
|
@pulumi.getter(name="ocspFailOpen")
|
310
|
-
def ocsp_fail_open(self) -> Optional[pulumi.Input[
|
309
|
+
def ocsp_fail_open(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
311
310
|
"""
|
312
311
|
If true and an OCSP response cannot
|
313
312
|
be fetched or is of an unknown status, the login will proceed as if the
|
@@ -317,12 +316,12 @@ class CertAuthBackendRoleArgs:
|
|
317
316
|
return pulumi.get(self, "ocsp_fail_open")
|
318
317
|
|
319
318
|
@ocsp_fail_open.setter
|
320
|
-
def ocsp_fail_open(self, value: Optional[pulumi.Input[
|
319
|
+
def ocsp_fail_open(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
321
320
|
pulumi.set(self, "ocsp_fail_open", value)
|
322
321
|
|
323
|
-
@property
|
322
|
+
@_builtins.property
|
324
323
|
@pulumi.getter(name="ocspQueryAllServers")
|
325
|
-
def ocsp_query_all_servers(self) -> Optional[pulumi.Input[
|
324
|
+
def ocsp_query_all_servers(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
326
325
|
"""
|
327
326
|
If set to true, rather than
|
328
327
|
accepting the first successful OCSP response, query all servers and consider
|
@@ -332,12 +331,12 @@ class CertAuthBackendRoleArgs:
|
|
332
331
|
return pulumi.get(self, "ocsp_query_all_servers")
|
333
332
|
|
334
333
|
@ocsp_query_all_servers.setter
|
335
|
-
def ocsp_query_all_servers(self, value: Optional[pulumi.Input[
|
334
|
+
def ocsp_query_all_servers(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
336
335
|
pulumi.set(self, "ocsp_query_all_servers", value)
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter(name="ocspServersOverrides")
|
340
|
-
def ocsp_servers_overrides(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
339
|
+
def ocsp_servers_overrides(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
341
340
|
"""
|
342
341
|
: A comma-separated list of OCSP
|
343
342
|
server addresses. If unset, the OCSP server is determined from the
|
@@ -347,12 +346,12 @@ class CertAuthBackendRoleArgs:
|
|
347
346
|
return pulumi.get(self, "ocsp_servers_overrides")
|
348
347
|
|
349
348
|
@ocsp_servers_overrides.setter
|
350
|
-
def ocsp_servers_overrides(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
349
|
+
def ocsp_servers_overrides(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
351
350
|
pulumi.set(self, "ocsp_servers_overrides", value)
|
352
351
|
|
353
|
-
@property
|
352
|
+
@_builtins.property
|
354
353
|
@pulumi.getter(name="requiredExtensions")
|
355
|
-
def required_extensions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
354
|
+
def required_extensions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
356
355
|
"""
|
357
356
|
TLS extensions required on
|
358
357
|
client certificates
|
@@ -360,191 +359,191 @@ class CertAuthBackendRoleArgs:
|
|
360
359
|
return pulumi.get(self, "required_extensions")
|
361
360
|
|
362
361
|
@required_extensions.setter
|
363
|
-
def required_extensions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
362
|
+
def required_extensions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
364
363
|
pulumi.set(self, "required_extensions", value)
|
365
364
|
|
366
|
-
@property
|
365
|
+
@_builtins.property
|
367
366
|
@pulumi.getter(name="tokenBoundCidrs")
|
368
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
367
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
369
368
|
"""
|
370
369
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
371
370
|
"""
|
372
371
|
return pulumi.get(self, "token_bound_cidrs")
|
373
372
|
|
374
373
|
@token_bound_cidrs.setter
|
375
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
374
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
376
375
|
pulumi.set(self, "token_bound_cidrs", value)
|
377
376
|
|
378
|
-
@property
|
377
|
+
@_builtins.property
|
379
378
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
380
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
379
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
381
380
|
"""
|
382
381
|
Generated Token's Explicit Maximum TTL in seconds
|
383
382
|
"""
|
384
383
|
return pulumi.get(self, "token_explicit_max_ttl")
|
385
384
|
|
386
385
|
@token_explicit_max_ttl.setter
|
387
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
386
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
388
387
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
389
388
|
|
390
|
-
@property
|
389
|
+
@_builtins.property
|
391
390
|
@pulumi.getter(name="tokenMaxTtl")
|
392
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
391
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
393
392
|
"""
|
394
393
|
The maximum lifetime of the generated token
|
395
394
|
"""
|
396
395
|
return pulumi.get(self, "token_max_ttl")
|
397
396
|
|
398
397
|
@token_max_ttl.setter
|
399
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
398
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
400
399
|
pulumi.set(self, "token_max_ttl", value)
|
401
400
|
|
402
|
-
@property
|
401
|
+
@_builtins.property
|
403
402
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
404
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
403
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
405
404
|
"""
|
406
405
|
If true, the 'default' policy will not automatically be added to generated tokens
|
407
406
|
"""
|
408
407
|
return pulumi.get(self, "token_no_default_policy")
|
409
408
|
|
410
409
|
@token_no_default_policy.setter
|
411
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
410
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
412
411
|
pulumi.set(self, "token_no_default_policy", value)
|
413
412
|
|
414
|
-
@property
|
413
|
+
@_builtins.property
|
415
414
|
@pulumi.getter(name="tokenNumUses")
|
416
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
415
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
417
416
|
"""
|
418
417
|
The maximum number of times a token may be used, a value of zero means unlimited
|
419
418
|
"""
|
420
419
|
return pulumi.get(self, "token_num_uses")
|
421
420
|
|
422
421
|
@token_num_uses.setter
|
423
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
422
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
424
423
|
pulumi.set(self, "token_num_uses", value)
|
425
424
|
|
426
|
-
@property
|
425
|
+
@_builtins.property
|
427
426
|
@pulumi.getter(name="tokenPeriod")
|
428
|
-
def token_period(self) -> Optional[pulumi.Input[
|
427
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
429
428
|
"""
|
430
429
|
Generated Token's Period
|
431
430
|
"""
|
432
431
|
return pulumi.get(self, "token_period")
|
433
432
|
|
434
433
|
@token_period.setter
|
435
|
-
def token_period(self, value: Optional[pulumi.Input[
|
434
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
436
435
|
pulumi.set(self, "token_period", value)
|
437
436
|
|
438
|
-
@property
|
437
|
+
@_builtins.property
|
439
438
|
@pulumi.getter(name="tokenPolicies")
|
440
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
439
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
441
440
|
"""
|
442
441
|
Generated Token's Policies
|
443
442
|
"""
|
444
443
|
return pulumi.get(self, "token_policies")
|
445
444
|
|
446
445
|
@token_policies.setter
|
447
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
446
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
448
447
|
pulumi.set(self, "token_policies", value)
|
449
448
|
|
450
|
-
@property
|
449
|
+
@_builtins.property
|
451
450
|
@pulumi.getter(name="tokenTtl")
|
452
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
451
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
453
452
|
"""
|
454
453
|
The initial ttl of the token to generate in seconds
|
455
454
|
"""
|
456
455
|
return pulumi.get(self, "token_ttl")
|
457
456
|
|
458
457
|
@token_ttl.setter
|
459
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
458
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
460
459
|
pulumi.set(self, "token_ttl", value)
|
461
460
|
|
462
|
-
@property
|
461
|
+
@_builtins.property
|
463
462
|
@pulumi.getter(name="tokenType")
|
464
|
-
def token_type(self) -> Optional[pulumi.Input[
|
463
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
465
464
|
"""
|
466
465
|
The type of token to generate, service or batch
|
467
466
|
"""
|
468
467
|
return pulumi.get(self, "token_type")
|
469
468
|
|
470
469
|
@token_type.setter
|
471
|
-
def token_type(self, value: Optional[pulumi.Input[
|
470
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
472
471
|
pulumi.set(self, "token_type", value)
|
473
472
|
|
474
473
|
|
475
474
|
@pulumi.input_type
|
476
475
|
class _CertAuthBackendRoleState:
|
477
476
|
def __init__(__self__, *,
|
478
|
-
allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
479
|
-
allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
480
|
-
allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
481
|
-
allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
482
|
-
allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[
|
483
|
-
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
484
|
-
backend: Optional[pulumi.Input[
|
485
|
-
certificate: Optional[pulumi.Input[
|
486
|
-
display_name: Optional[pulumi.Input[
|
487
|
-
name: Optional[pulumi.Input[
|
488
|
-
namespace: Optional[pulumi.Input[
|
489
|
-
ocsp_ca_certificates: Optional[pulumi.Input[
|
490
|
-
ocsp_enabled: Optional[pulumi.Input[
|
491
|
-
ocsp_fail_open: Optional[pulumi.Input[
|
492
|
-
ocsp_query_all_servers: Optional[pulumi.Input[
|
493
|
-
ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[
|
494
|
-
required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[
|
495
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
496
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
497
|
-
token_max_ttl: Optional[pulumi.Input[
|
498
|
-
token_no_default_policy: Optional[pulumi.Input[
|
499
|
-
token_num_uses: Optional[pulumi.Input[
|
500
|
-
token_period: Optional[pulumi.Input[
|
501
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
502
|
-
token_ttl: Optional[pulumi.Input[
|
503
|
-
token_type: Optional[pulumi.Input[
|
477
|
+
allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
478
|
+
allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
479
|
+
allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
480
|
+
allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
481
|
+
allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
482
|
+
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
483
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
484
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
485
|
+
display_name: Optional[pulumi.Input[_builtins.str]] = None,
|
486
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
487
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
488
|
+
ocsp_ca_certificates: Optional[pulumi.Input[_builtins.str]] = None,
|
489
|
+
ocsp_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
490
|
+
ocsp_fail_open: Optional[pulumi.Input[_builtins.bool]] = None,
|
491
|
+
ocsp_query_all_servers: Optional[pulumi.Input[_builtins.bool]] = None,
|
492
|
+
ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
493
|
+
required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
494
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
495
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
496
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
497
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
498
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
499
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
500
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
501
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
502
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
504
503
|
"""
|
505
504
|
Input properties used for looking up and filtering CertAuthBackendRole resources.
|
506
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
507
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
508
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
509
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
510
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
511
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
512
|
-
:param pulumi.Input[
|
513
|
-
:param pulumi.Input[
|
514
|
-
:param pulumi.Input[
|
515
|
-
:param pulumi.Input[
|
516
|
-
:param pulumi.Input[
|
505
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_common_names: Allowed the common names for authenticated client certificates
|
506
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
|
507
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_email_sans: Allowed emails for authenticated client certificates
|
508
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
509
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
|
510
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
|
511
|
+
:param pulumi.Input[_builtins.str] backend: Path to the mounted Cert auth backend
|
512
|
+
:param pulumi.Input[_builtins.str] certificate: CA certificate used to validate client certificates
|
513
|
+
:param pulumi.Input[_builtins.str] display_name: The name to display on tokens issued under this role.
|
514
|
+
:param pulumi.Input[_builtins.str] name: Name of the role
|
515
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
517
516
|
The value should not contain leading or trailing forward slashes.
|
518
517
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
519
518
|
*Available only for Vault Enterprise*.
|
520
|
-
:param pulumi.Input[
|
519
|
+
:param pulumi.Input[_builtins.str] ocsp_ca_certificates: Any additional CA certificates
|
521
520
|
needed to verify OCSP responses. Provided as base64 encoded PEM data.
|
522
521
|
Requires Vault version 1.13+.
|
523
|
-
:param pulumi.Input[
|
522
|
+
:param pulumi.Input[_builtins.bool] ocsp_enabled: If enabled, validate certificates'
|
524
523
|
revocation status using OCSP. Requires Vault version 1.13+.
|
525
|
-
:param pulumi.Input[
|
524
|
+
:param pulumi.Input[_builtins.bool] ocsp_fail_open: If true and an OCSP response cannot
|
526
525
|
be fetched or is of an unknown status, the login will proceed as if the
|
527
526
|
certificate has not been revoked.
|
528
527
|
Requires Vault version 1.13+.
|
529
|
-
:param pulumi.Input[
|
528
|
+
:param pulumi.Input[_builtins.bool] ocsp_query_all_servers: If set to true, rather than
|
530
529
|
accepting the first successful OCSP response, query all servers and consider
|
531
530
|
the certificate valid only if all servers agree.
|
532
531
|
Requires Vault version 1.13+.
|
533
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
532
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers_overrides: : A comma-separated list of OCSP
|
534
533
|
server addresses. If unset, the OCSP server is determined from the
|
535
534
|
AuthorityInformationAccess extension on the certificate being inspected.
|
536
535
|
Requires Vault version 1.13+.
|
537
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
536
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] required_extensions: TLS extensions required on
|
538
537
|
client certificates
|
539
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
540
|
-
:param pulumi.Input[
|
541
|
-
:param pulumi.Input[
|
542
|
-
:param pulumi.Input[
|
543
|
-
:param pulumi.Input[
|
544
|
-
:param pulumi.Input[
|
545
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
546
|
-
:param pulumi.Input[
|
547
|
-
:param pulumi.Input[
|
538
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
539
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
540
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
541
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
542
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
543
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
544
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
545
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
546
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
548
547
|
"""
|
549
548
|
if allowed_common_names is not None:
|
550
549
|
pulumi.set(__self__, "allowed_common_names", allowed_common_names)
|
@@ -599,129 +598,129 @@ class _CertAuthBackendRoleState:
|
|
599
598
|
if token_type is not None:
|
600
599
|
pulumi.set(__self__, "token_type", token_type)
|
601
600
|
|
602
|
-
@property
|
601
|
+
@_builtins.property
|
603
602
|
@pulumi.getter(name="allowedCommonNames")
|
604
|
-
def allowed_common_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
603
|
+
def allowed_common_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
605
604
|
"""
|
606
605
|
Allowed the common names for authenticated client certificates
|
607
606
|
"""
|
608
607
|
return pulumi.get(self, "allowed_common_names")
|
609
608
|
|
610
609
|
@allowed_common_names.setter
|
611
|
-
def allowed_common_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
610
|
+
def allowed_common_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
612
611
|
pulumi.set(self, "allowed_common_names", value)
|
613
612
|
|
614
|
-
@property
|
613
|
+
@_builtins.property
|
615
614
|
@pulumi.getter(name="allowedDnsSans")
|
616
|
-
def allowed_dns_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
615
|
+
def allowed_dns_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
617
616
|
"""
|
618
617
|
Allowed alternative dns names for authenticated client certificates
|
619
618
|
"""
|
620
619
|
return pulumi.get(self, "allowed_dns_sans")
|
621
620
|
|
622
621
|
@allowed_dns_sans.setter
|
623
|
-
def allowed_dns_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
622
|
+
def allowed_dns_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
624
623
|
pulumi.set(self, "allowed_dns_sans", value)
|
625
624
|
|
626
|
-
@property
|
625
|
+
@_builtins.property
|
627
626
|
@pulumi.getter(name="allowedEmailSans")
|
628
|
-
def allowed_email_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
627
|
+
def allowed_email_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
629
628
|
"""
|
630
629
|
Allowed emails for authenticated client certificates
|
631
630
|
"""
|
632
631
|
return pulumi.get(self, "allowed_email_sans")
|
633
632
|
|
634
633
|
@allowed_email_sans.setter
|
635
|
-
def allowed_email_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
634
|
+
def allowed_email_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
636
635
|
pulumi.set(self, "allowed_email_sans", value)
|
637
636
|
|
638
|
-
@property
|
637
|
+
@_builtins.property
|
639
638
|
@pulumi.getter(name="allowedNames")
|
640
|
-
def allowed_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
639
|
+
def allowed_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
641
640
|
"""
|
642
641
|
DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
643
642
|
"""
|
644
643
|
return pulumi.get(self, "allowed_names")
|
645
644
|
|
646
645
|
@allowed_names.setter
|
647
|
-
def allowed_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
646
|
+
def allowed_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
648
647
|
pulumi.set(self, "allowed_names", value)
|
649
648
|
|
650
|
-
@property
|
649
|
+
@_builtins.property
|
651
650
|
@pulumi.getter(name="allowedOrganizationalUnits")
|
652
|
-
def allowed_organizational_units(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
651
|
+
def allowed_organizational_units(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
653
652
|
"""
|
654
653
|
Allowed organization units for authenticated client certificates.
|
655
654
|
"""
|
656
655
|
return pulumi.get(self, "allowed_organizational_units")
|
657
656
|
|
658
657
|
@allowed_organizational_units.setter
|
659
|
-
def allowed_organizational_units(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
658
|
+
def allowed_organizational_units(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
660
659
|
pulumi.set(self, "allowed_organizational_units", value)
|
661
660
|
|
662
|
-
@property
|
661
|
+
@_builtins.property
|
663
662
|
@pulumi.getter(name="allowedUriSans")
|
664
|
-
def allowed_uri_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
663
|
+
def allowed_uri_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
665
664
|
"""
|
666
665
|
Allowed URIs for authenticated client certificates
|
667
666
|
"""
|
668
667
|
return pulumi.get(self, "allowed_uri_sans")
|
669
668
|
|
670
669
|
@allowed_uri_sans.setter
|
671
|
-
def allowed_uri_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
670
|
+
def allowed_uri_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
672
671
|
pulumi.set(self, "allowed_uri_sans", value)
|
673
672
|
|
674
|
-
@property
|
673
|
+
@_builtins.property
|
675
674
|
@pulumi.getter
|
676
|
-
def backend(self) -> Optional[pulumi.Input[
|
675
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
677
676
|
"""
|
678
677
|
Path to the mounted Cert auth backend
|
679
678
|
"""
|
680
679
|
return pulumi.get(self, "backend")
|
681
680
|
|
682
681
|
@backend.setter
|
683
|
-
def backend(self, value: Optional[pulumi.Input[
|
682
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
684
683
|
pulumi.set(self, "backend", value)
|
685
684
|
|
686
|
-
@property
|
685
|
+
@_builtins.property
|
687
686
|
@pulumi.getter
|
688
|
-
def certificate(self) -> Optional[pulumi.Input[
|
687
|
+
def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
|
689
688
|
"""
|
690
689
|
CA certificate used to validate client certificates
|
691
690
|
"""
|
692
691
|
return pulumi.get(self, "certificate")
|
693
692
|
|
694
693
|
@certificate.setter
|
695
|
-
def certificate(self, value: Optional[pulumi.Input[
|
694
|
+
def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
|
696
695
|
pulumi.set(self, "certificate", value)
|
697
696
|
|
698
|
-
@property
|
697
|
+
@_builtins.property
|
699
698
|
@pulumi.getter(name="displayName")
|
700
|
-
def display_name(self) -> Optional[pulumi.Input[
|
699
|
+
def display_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
701
700
|
"""
|
702
701
|
The name to display on tokens issued under this role.
|
703
702
|
"""
|
704
703
|
return pulumi.get(self, "display_name")
|
705
704
|
|
706
705
|
@display_name.setter
|
707
|
-
def display_name(self, value: Optional[pulumi.Input[
|
706
|
+
def display_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
708
707
|
pulumi.set(self, "display_name", value)
|
709
708
|
|
710
|
-
@property
|
709
|
+
@_builtins.property
|
711
710
|
@pulumi.getter
|
712
|
-
def name(self) -> Optional[pulumi.Input[
|
711
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
713
712
|
"""
|
714
713
|
Name of the role
|
715
714
|
"""
|
716
715
|
return pulumi.get(self, "name")
|
717
716
|
|
718
717
|
@name.setter
|
719
|
-
def name(self, value: Optional[pulumi.Input[
|
718
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
720
719
|
pulumi.set(self, "name", value)
|
721
720
|
|
722
|
-
@property
|
721
|
+
@_builtins.property
|
723
722
|
@pulumi.getter
|
724
|
-
def namespace(self) -> Optional[pulumi.Input[
|
723
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
725
724
|
"""
|
726
725
|
The namespace to provision the resource in.
|
727
726
|
The value should not contain leading or trailing forward slashes.
|
@@ -731,12 +730,12 @@ class _CertAuthBackendRoleState:
|
|
731
730
|
return pulumi.get(self, "namespace")
|
732
731
|
|
733
732
|
@namespace.setter
|
734
|
-
def namespace(self, value: Optional[pulumi.Input[
|
733
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
735
734
|
pulumi.set(self, "namespace", value)
|
736
735
|
|
737
|
-
@property
|
736
|
+
@_builtins.property
|
738
737
|
@pulumi.getter(name="ocspCaCertificates")
|
739
|
-
def ocsp_ca_certificates(self) -> Optional[pulumi.Input[
|
738
|
+
def ocsp_ca_certificates(self) -> Optional[pulumi.Input[_builtins.str]]:
|
740
739
|
"""
|
741
740
|
Any additional CA certificates
|
742
741
|
needed to verify OCSP responses. Provided as base64 encoded PEM data.
|
@@ -745,12 +744,12 @@ class _CertAuthBackendRoleState:
|
|
745
744
|
return pulumi.get(self, "ocsp_ca_certificates")
|
746
745
|
|
747
746
|
@ocsp_ca_certificates.setter
|
748
|
-
def ocsp_ca_certificates(self, value: Optional[pulumi.Input[
|
747
|
+
def ocsp_ca_certificates(self, value: Optional[pulumi.Input[_builtins.str]]):
|
749
748
|
pulumi.set(self, "ocsp_ca_certificates", value)
|
750
749
|
|
751
|
-
@property
|
750
|
+
@_builtins.property
|
752
751
|
@pulumi.getter(name="ocspEnabled")
|
753
|
-
def ocsp_enabled(self) -> Optional[pulumi.Input[
|
752
|
+
def ocsp_enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
754
753
|
"""
|
755
754
|
If enabled, validate certificates'
|
756
755
|
revocation status using OCSP. Requires Vault version 1.13+.
|
@@ -758,12 +757,12 @@ class _CertAuthBackendRoleState:
|
|
758
757
|
return pulumi.get(self, "ocsp_enabled")
|
759
758
|
|
760
759
|
@ocsp_enabled.setter
|
761
|
-
def ocsp_enabled(self, value: Optional[pulumi.Input[
|
760
|
+
def ocsp_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
762
761
|
pulumi.set(self, "ocsp_enabled", value)
|
763
762
|
|
764
|
-
@property
|
763
|
+
@_builtins.property
|
765
764
|
@pulumi.getter(name="ocspFailOpen")
|
766
|
-
def ocsp_fail_open(self) -> Optional[pulumi.Input[
|
765
|
+
def ocsp_fail_open(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
767
766
|
"""
|
768
767
|
If true and an OCSP response cannot
|
769
768
|
be fetched or is of an unknown status, the login will proceed as if the
|
@@ -773,12 +772,12 @@ class _CertAuthBackendRoleState:
|
|
773
772
|
return pulumi.get(self, "ocsp_fail_open")
|
774
773
|
|
775
774
|
@ocsp_fail_open.setter
|
776
|
-
def ocsp_fail_open(self, value: Optional[pulumi.Input[
|
775
|
+
def ocsp_fail_open(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
777
776
|
pulumi.set(self, "ocsp_fail_open", value)
|
778
777
|
|
779
|
-
@property
|
778
|
+
@_builtins.property
|
780
779
|
@pulumi.getter(name="ocspQueryAllServers")
|
781
|
-
def ocsp_query_all_servers(self) -> Optional[pulumi.Input[
|
780
|
+
def ocsp_query_all_servers(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
782
781
|
"""
|
783
782
|
If set to true, rather than
|
784
783
|
accepting the first successful OCSP response, query all servers and consider
|
@@ -788,12 +787,12 @@ class _CertAuthBackendRoleState:
|
|
788
787
|
return pulumi.get(self, "ocsp_query_all_servers")
|
789
788
|
|
790
789
|
@ocsp_query_all_servers.setter
|
791
|
-
def ocsp_query_all_servers(self, value: Optional[pulumi.Input[
|
790
|
+
def ocsp_query_all_servers(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
792
791
|
pulumi.set(self, "ocsp_query_all_servers", value)
|
793
792
|
|
794
|
-
@property
|
793
|
+
@_builtins.property
|
795
794
|
@pulumi.getter(name="ocspServersOverrides")
|
796
|
-
def ocsp_servers_overrides(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
795
|
+
def ocsp_servers_overrides(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
797
796
|
"""
|
798
797
|
: A comma-separated list of OCSP
|
799
798
|
server addresses. If unset, the OCSP server is determined from the
|
@@ -803,12 +802,12 @@ class _CertAuthBackendRoleState:
|
|
803
802
|
return pulumi.get(self, "ocsp_servers_overrides")
|
804
803
|
|
805
804
|
@ocsp_servers_overrides.setter
|
806
|
-
def ocsp_servers_overrides(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
805
|
+
def ocsp_servers_overrides(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
807
806
|
pulumi.set(self, "ocsp_servers_overrides", value)
|
808
807
|
|
809
|
-
@property
|
808
|
+
@_builtins.property
|
810
809
|
@pulumi.getter(name="requiredExtensions")
|
811
|
-
def required_extensions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
810
|
+
def required_extensions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
812
811
|
"""
|
813
812
|
TLS extensions required on
|
814
813
|
client certificates
|
@@ -816,115 +815,115 @@ class _CertAuthBackendRoleState:
|
|
816
815
|
return pulumi.get(self, "required_extensions")
|
817
816
|
|
818
817
|
@required_extensions.setter
|
819
|
-
def required_extensions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
818
|
+
def required_extensions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
820
819
|
pulumi.set(self, "required_extensions", value)
|
821
820
|
|
822
|
-
@property
|
821
|
+
@_builtins.property
|
823
822
|
@pulumi.getter(name="tokenBoundCidrs")
|
824
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
823
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
825
824
|
"""
|
826
825
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
827
826
|
"""
|
828
827
|
return pulumi.get(self, "token_bound_cidrs")
|
829
828
|
|
830
829
|
@token_bound_cidrs.setter
|
831
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
830
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
832
831
|
pulumi.set(self, "token_bound_cidrs", value)
|
833
832
|
|
834
|
-
@property
|
833
|
+
@_builtins.property
|
835
834
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
836
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
835
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
837
836
|
"""
|
838
837
|
Generated Token's Explicit Maximum TTL in seconds
|
839
838
|
"""
|
840
839
|
return pulumi.get(self, "token_explicit_max_ttl")
|
841
840
|
|
842
841
|
@token_explicit_max_ttl.setter
|
843
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
842
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
844
843
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
845
844
|
|
846
|
-
@property
|
845
|
+
@_builtins.property
|
847
846
|
@pulumi.getter(name="tokenMaxTtl")
|
848
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
847
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
849
848
|
"""
|
850
849
|
The maximum lifetime of the generated token
|
851
850
|
"""
|
852
851
|
return pulumi.get(self, "token_max_ttl")
|
853
852
|
|
854
853
|
@token_max_ttl.setter
|
855
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
854
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
856
855
|
pulumi.set(self, "token_max_ttl", value)
|
857
856
|
|
858
|
-
@property
|
857
|
+
@_builtins.property
|
859
858
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
860
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
859
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
861
860
|
"""
|
862
861
|
If true, the 'default' policy will not automatically be added to generated tokens
|
863
862
|
"""
|
864
863
|
return pulumi.get(self, "token_no_default_policy")
|
865
864
|
|
866
865
|
@token_no_default_policy.setter
|
867
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
866
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
868
867
|
pulumi.set(self, "token_no_default_policy", value)
|
869
868
|
|
870
|
-
@property
|
869
|
+
@_builtins.property
|
871
870
|
@pulumi.getter(name="tokenNumUses")
|
872
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
871
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
873
872
|
"""
|
874
873
|
The maximum number of times a token may be used, a value of zero means unlimited
|
875
874
|
"""
|
876
875
|
return pulumi.get(self, "token_num_uses")
|
877
876
|
|
878
877
|
@token_num_uses.setter
|
879
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
878
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
880
879
|
pulumi.set(self, "token_num_uses", value)
|
881
880
|
|
882
|
-
@property
|
881
|
+
@_builtins.property
|
883
882
|
@pulumi.getter(name="tokenPeriod")
|
884
|
-
def token_period(self) -> Optional[pulumi.Input[
|
883
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
885
884
|
"""
|
886
885
|
Generated Token's Period
|
887
886
|
"""
|
888
887
|
return pulumi.get(self, "token_period")
|
889
888
|
|
890
889
|
@token_period.setter
|
891
|
-
def token_period(self, value: Optional[pulumi.Input[
|
890
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
892
891
|
pulumi.set(self, "token_period", value)
|
893
892
|
|
894
|
-
@property
|
893
|
+
@_builtins.property
|
895
894
|
@pulumi.getter(name="tokenPolicies")
|
896
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
895
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
897
896
|
"""
|
898
897
|
Generated Token's Policies
|
899
898
|
"""
|
900
899
|
return pulumi.get(self, "token_policies")
|
901
900
|
|
902
901
|
@token_policies.setter
|
903
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
902
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
904
903
|
pulumi.set(self, "token_policies", value)
|
905
904
|
|
906
|
-
@property
|
905
|
+
@_builtins.property
|
907
906
|
@pulumi.getter(name="tokenTtl")
|
908
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
907
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
909
908
|
"""
|
910
909
|
The initial ttl of the token to generate in seconds
|
911
910
|
"""
|
912
911
|
return pulumi.get(self, "token_ttl")
|
913
912
|
|
914
913
|
@token_ttl.setter
|
915
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
914
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
916
915
|
pulumi.set(self, "token_ttl", value)
|
917
916
|
|
918
|
-
@property
|
917
|
+
@_builtins.property
|
919
918
|
@pulumi.getter(name="tokenType")
|
920
|
-
def token_type(self) -> Optional[pulumi.Input[
|
919
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
921
920
|
"""
|
922
921
|
The type of token to generate, service or batch
|
923
922
|
"""
|
924
923
|
return pulumi.get(self, "token_type")
|
925
924
|
|
926
925
|
@token_type.setter
|
927
|
-
def token_type(self, value: Optional[pulumi.Input[
|
926
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
928
927
|
pulumi.set(self, "token_type", value)
|
929
928
|
|
930
929
|
|
@@ -934,32 +933,32 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
934
933
|
def __init__(__self__,
|
935
934
|
resource_name: str,
|
936
935
|
opts: Optional[pulumi.ResourceOptions] = None,
|
937
|
-
allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
938
|
-
allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
939
|
-
allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
940
|
-
allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
941
|
-
allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[
|
942
|
-
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
943
|
-
backend: Optional[pulumi.Input[
|
944
|
-
certificate: Optional[pulumi.Input[
|
945
|
-
display_name: Optional[pulumi.Input[
|
946
|
-
name: Optional[pulumi.Input[
|
947
|
-
namespace: Optional[pulumi.Input[
|
948
|
-
ocsp_ca_certificates: Optional[pulumi.Input[
|
949
|
-
ocsp_enabled: Optional[pulumi.Input[
|
950
|
-
ocsp_fail_open: Optional[pulumi.Input[
|
951
|
-
ocsp_query_all_servers: Optional[pulumi.Input[
|
952
|
-
ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[
|
953
|
-
required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[
|
954
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
955
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
956
|
-
token_max_ttl: Optional[pulumi.Input[
|
957
|
-
token_no_default_policy: Optional[pulumi.Input[
|
958
|
-
token_num_uses: Optional[pulumi.Input[
|
959
|
-
token_period: Optional[pulumi.Input[
|
960
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
961
|
-
token_ttl: Optional[pulumi.Input[
|
962
|
-
token_type: Optional[pulumi.Input[
|
936
|
+
allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
937
|
+
allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
938
|
+
allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
939
|
+
allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
940
|
+
allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
941
|
+
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
942
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
943
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
944
|
+
display_name: Optional[pulumi.Input[_builtins.str]] = None,
|
945
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
946
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
947
|
+
ocsp_ca_certificates: Optional[pulumi.Input[_builtins.str]] = None,
|
948
|
+
ocsp_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
949
|
+
ocsp_fail_open: Optional[pulumi.Input[_builtins.bool]] = None,
|
950
|
+
ocsp_query_all_servers: Optional[pulumi.Input[_builtins.bool]] = None,
|
951
|
+
ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
952
|
+
required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
953
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
954
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
955
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
956
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
957
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
958
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
959
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
960
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
961
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
963
962
|
__props__=None):
|
964
963
|
"""
|
965
964
|
Provides a resource to create a role in an [Cert auth backend within Vault](https://www.vaultproject.io/docs/auth/cert.html).
|
@@ -989,48 +988,48 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
989
988
|
|
990
989
|
:param str resource_name: The name of the resource.
|
991
990
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
992
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
993
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
994
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
995
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
996
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
997
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
998
|
-
:param pulumi.Input[
|
999
|
-
:param pulumi.Input[
|
1000
|
-
:param pulumi.Input[
|
1001
|
-
:param pulumi.Input[
|
1002
|
-
:param pulumi.Input[
|
991
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_common_names: Allowed the common names for authenticated client certificates
|
992
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
|
993
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_email_sans: Allowed emails for authenticated client certificates
|
994
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
995
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
|
996
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
|
997
|
+
:param pulumi.Input[_builtins.str] backend: Path to the mounted Cert auth backend
|
998
|
+
:param pulumi.Input[_builtins.str] certificate: CA certificate used to validate client certificates
|
999
|
+
:param pulumi.Input[_builtins.str] display_name: The name to display on tokens issued under this role.
|
1000
|
+
:param pulumi.Input[_builtins.str] name: Name of the role
|
1001
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1003
1002
|
The value should not contain leading or trailing forward slashes.
|
1004
1003
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1005
1004
|
*Available only for Vault Enterprise*.
|
1006
|
-
:param pulumi.Input[
|
1005
|
+
:param pulumi.Input[_builtins.str] ocsp_ca_certificates: Any additional CA certificates
|
1007
1006
|
needed to verify OCSP responses. Provided as base64 encoded PEM data.
|
1008
1007
|
Requires Vault version 1.13+.
|
1009
|
-
:param pulumi.Input[
|
1008
|
+
:param pulumi.Input[_builtins.bool] ocsp_enabled: If enabled, validate certificates'
|
1010
1009
|
revocation status using OCSP. Requires Vault version 1.13+.
|
1011
|
-
:param pulumi.Input[
|
1010
|
+
:param pulumi.Input[_builtins.bool] ocsp_fail_open: If true and an OCSP response cannot
|
1012
1011
|
be fetched or is of an unknown status, the login will proceed as if the
|
1013
1012
|
certificate has not been revoked.
|
1014
1013
|
Requires Vault version 1.13+.
|
1015
|
-
:param pulumi.Input[
|
1014
|
+
:param pulumi.Input[_builtins.bool] ocsp_query_all_servers: If set to true, rather than
|
1016
1015
|
accepting the first successful OCSP response, query all servers and consider
|
1017
1016
|
the certificate valid only if all servers agree.
|
1018
1017
|
Requires Vault version 1.13+.
|
1019
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1018
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers_overrides: : A comma-separated list of OCSP
|
1020
1019
|
server addresses. If unset, the OCSP server is determined from the
|
1021
1020
|
AuthorityInformationAccess extension on the certificate being inspected.
|
1022
1021
|
Requires Vault version 1.13+.
|
1023
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1022
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] required_extensions: TLS extensions required on
|
1024
1023
|
client certificates
|
1025
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1026
|
-
:param pulumi.Input[
|
1027
|
-
:param pulumi.Input[
|
1028
|
-
:param pulumi.Input[
|
1029
|
-
:param pulumi.Input[
|
1030
|
-
:param pulumi.Input[
|
1031
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1032
|
-
:param pulumi.Input[
|
1033
|
-
:param pulumi.Input[
|
1024
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1025
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1026
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
1027
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1028
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1029
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
1030
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
1031
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
1032
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
1034
1033
|
"""
|
1035
1034
|
...
|
1036
1035
|
@overload
|
@@ -1079,32 +1078,32 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1079
1078
|
def _internal_init(__self__,
|
1080
1079
|
resource_name: str,
|
1081
1080
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1082
|
-
allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1083
|
-
allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1084
|
-
allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1085
|
-
allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1086
|
-
allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1087
|
-
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1088
|
-
backend: Optional[pulumi.Input[
|
1089
|
-
certificate: Optional[pulumi.Input[
|
1090
|
-
display_name: Optional[pulumi.Input[
|
1091
|
-
name: Optional[pulumi.Input[
|
1092
|
-
namespace: Optional[pulumi.Input[
|
1093
|
-
ocsp_ca_certificates: Optional[pulumi.Input[
|
1094
|
-
ocsp_enabled: Optional[pulumi.Input[
|
1095
|
-
ocsp_fail_open: Optional[pulumi.Input[
|
1096
|
-
ocsp_query_all_servers: Optional[pulumi.Input[
|
1097
|
-
ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1098
|
-
required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1099
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1100
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
1101
|
-
token_max_ttl: Optional[pulumi.Input[
|
1102
|
-
token_no_default_policy: Optional[pulumi.Input[
|
1103
|
-
token_num_uses: Optional[pulumi.Input[
|
1104
|
-
token_period: Optional[pulumi.Input[
|
1105
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1106
|
-
token_ttl: Optional[pulumi.Input[
|
1107
|
-
token_type: Optional[pulumi.Input[
|
1081
|
+
allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1082
|
+
allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1083
|
+
allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1084
|
+
allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1085
|
+
allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1086
|
+
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1087
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
1088
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
1089
|
+
display_name: Optional[pulumi.Input[_builtins.str]] = None,
|
1090
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
1091
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1092
|
+
ocsp_ca_certificates: Optional[pulumi.Input[_builtins.str]] = None,
|
1093
|
+
ocsp_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
1094
|
+
ocsp_fail_open: Optional[pulumi.Input[_builtins.bool]] = None,
|
1095
|
+
ocsp_query_all_servers: Optional[pulumi.Input[_builtins.bool]] = None,
|
1096
|
+
ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1097
|
+
required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1098
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1099
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1100
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1101
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
1102
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
1103
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1104
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1105
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1106
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
1108
1107
|
__props__=None):
|
1109
1108
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
1110
1109
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -1152,32 +1151,32 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1152
1151
|
def get(resource_name: str,
|
1153
1152
|
id: pulumi.Input[str],
|
1154
1153
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1155
|
-
allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1156
|
-
allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1157
|
-
allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1158
|
-
allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1159
|
-
allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1160
|
-
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1161
|
-
backend: Optional[pulumi.Input[
|
1162
|
-
certificate: Optional[pulumi.Input[
|
1163
|
-
display_name: Optional[pulumi.Input[
|
1164
|
-
name: Optional[pulumi.Input[
|
1165
|
-
namespace: Optional[pulumi.Input[
|
1166
|
-
ocsp_ca_certificates: Optional[pulumi.Input[
|
1167
|
-
ocsp_enabled: Optional[pulumi.Input[
|
1168
|
-
ocsp_fail_open: Optional[pulumi.Input[
|
1169
|
-
ocsp_query_all_servers: Optional[pulumi.Input[
|
1170
|
-
ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1171
|
-
required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1172
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1173
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
1174
|
-
token_max_ttl: Optional[pulumi.Input[
|
1175
|
-
token_no_default_policy: Optional[pulumi.Input[
|
1176
|
-
token_num_uses: Optional[pulumi.Input[
|
1177
|
-
token_period: Optional[pulumi.Input[
|
1178
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
1179
|
-
token_ttl: Optional[pulumi.Input[
|
1180
|
-
token_type: Optional[pulumi.Input[
|
1154
|
+
allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1155
|
+
allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1156
|
+
allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1157
|
+
allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1158
|
+
allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1159
|
+
allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1160
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
1161
|
+
certificate: Optional[pulumi.Input[_builtins.str]] = None,
|
1162
|
+
display_name: Optional[pulumi.Input[_builtins.str]] = None,
|
1163
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
1164
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
1165
|
+
ocsp_ca_certificates: Optional[pulumi.Input[_builtins.str]] = None,
|
1166
|
+
ocsp_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
1167
|
+
ocsp_fail_open: Optional[pulumi.Input[_builtins.bool]] = None,
|
1168
|
+
ocsp_query_all_servers: Optional[pulumi.Input[_builtins.bool]] = None,
|
1169
|
+
ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1170
|
+
required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1171
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1172
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1173
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1174
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
1175
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
1176
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
1177
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
1178
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
1179
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'CertAuthBackendRole':
|
1181
1180
|
"""
|
1182
1181
|
Get an existing CertAuthBackendRole resource's state with the given name, id, and optional extra
|
1183
1182
|
properties used to qualify the lookup.
|
@@ -1185,48 +1184,48 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1185
1184
|
:param str resource_name: The unique name of the resulting resource.
|
1186
1185
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
1187
1186
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1188
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1189
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1190
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1191
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1192
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1193
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1194
|
-
:param pulumi.Input[
|
1195
|
-
:param pulumi.Input[
|
1196
|
-
:param pulumi.Input[
|
1197
|
-
:param pulumi.Input[
|
1198
|
-
:param pulumi.Input[
|
1187
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_common_names: Allowed the common names for authenticated client certificates
|
1188
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
|
1189
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_email_sans: Allowed emails for authenticated client certificates
|
1190
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
1191
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
|
1192
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
|
1193
|
+
:param pulumi.Input[_builtins.str] backend: Path to the mounted Cert auth backend
|
1194
|
+
:param pulumi.Input[_builtins.str] certificate: CA certificate used to validate client certificates
|
1195
|
+
:param pulumi.Input[_builtins.str] display_name: The name to display on tokens issued under this role.
|
1196
|
+
:param pulumi.Input[_builtins.str] name: Name of the role
|
1197
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
1199
1198
|
The value should not contain leading or trailing forward slashes.
|
1200
1199
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1201
1200
|
*Available only for Vault Enterprise*.
|
1202
|
-
:param pulumi.Input[
|
1201
|
+
:param pulumi.Input[_builtins.str] ocsp_ca_certificates: Any additional CA certificates
|
1203
1202
|
needed to verify OCSP responses. Provided as base64 encoded PEM data.
|
1204
1203
|
Requires Vault version 1.13+.
|
1205
|
-
:param pulumi.Input[
|
1204
|
+
:param pulumi.Input[_builtins.bool] ocsp_enabled: If enabled, validate certificates'
|
1206
1205
|
revocation status using OCSP. Requires Vault version 1.13+.
|
1207
|
-
:param pulumi.Input[
|
1206
|
+
:param pulumi.Input[_builtins.bool] ocsp_fail_open: If true and an OCSP response cannot
|
1208
1207
|
be fetched or is of an unknown status, the login will proceed as if the
|
1209
1208
|
certificate has not been revoked.
|
1210
1209
|
Requires Vault version 1.13+.
|
1211
|
-
:param pulumi.Input[
|
1210
|
+
:param pulumi.Input[_builtins.bool] ocsp_query_all_servers: If set to true, rather than
|
1212
1211
|
accepting the first successful OCSP response, query all servers and consider
|
1213
1212
|
the certificate valid only if all servers agree.
|
1214
1213
|
Requires Vault version 1.13+.
|
1215
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1214
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers_overrides: : A comma-separated list of OCSP
|
1216
1215
|
server addresses. If unset, the OCSP server is determined from the
|
1217
1216
|
AuthorityInformationAccess extension on the certificate being inspected.
|
1218
1217
|
Requires Vault version 1.13+.
|
1219
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1218
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] required_extensions: TLS extensions required on
|
1220
1219
|
client certificates
|
1221
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1222
|
-
:param pulumi.Input[
|
1223
|
-
:param pulumi.Input[
|
1224
|
-
:param pulumi.Input[
|
1225
|
-
:param pulumi.Input[
|
1226
|
-
:param pulumi.Input[
|
1227
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
1228
|
-
:param pulumi.Input[
|
1229
|
-
:param pulumi.Input[
|
1220
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1221
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1222
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
1223
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1224
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1225
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
1226
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
1227
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
1228
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
1230
1229
|
"""
|
1231
1230
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1232
1231
|
|
@@ -1260,89 +1259,89 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1260
1259
|
__props__.__dict__["token_type"] = token_type
|
1261
1260
|
return CertAuthBackendRole(resource_name, opts=opts, __props__=__props__)
|
1262
1261
|
|
1263
|
-
@property
|
1262
|
+
@_builtins.property
|
1264
1263
|
@pulumi.getter(name="allowedCommonNames")
|
1265
|
-
def allowed_common_names(self) -> pulumi.Output[Sequence[
|
1264
|
+
def allowed_common_names(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1266
1265
|
"""
|
1267
1266
|
Allowed the common names for authenticated client certificates
|
1268
1267
|
"""
|
1269
1268
|
return pulumi.get(self, "allowed_common_names")
|
1270
1269
|
|
1271
|
-
@property
|
1270
|
+
@_builtins.property
|
1272
1271
|
@pulumi.getter(name="allowedDnsSans")
|
1273
|
-
def allowed_dns_sans(self) -> pulumi.Output[Sequence[
|
1272
|
+
def allowed_dns_sans(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1274
1273
|
"""
|
1275
1274
|
Allowed alternative dns names for authenticated client certificates
|
1276
1275
|
"""
|
1277
1276
|
return pulumi.get(self, "allowed_dns_sans")
|
1278
1277
|
|
1279
|
-
@property
|
1278
|
+
@_builtins.property
|
1280
1279
|
@pulumi.getter(name="allowedEmailSans")
|
1281
|
-
def allowed_email_sans(self) -> pulumi.Output[Sequence[
|
1280
|
+
def allowed_email_sans(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1282
1281
|
"""
|
1283
1282
|
Allowed emails for authenticated client certificates
|
1284
1283
|
"""
|
1285
1284
|
return pulumi.get(self, "allowed_email_sans")
|
1286
1285
|
|
1287
|
-
@property
|
1286
|
+
@_builtins.property
|
1288
1287
|
@pulumi.getter(name="allowedNames")
|
1289
|
-
def allowed_names(self) -> pulumi.Output[Sequence[
|
1288
|
+
def allowed_names(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1290
1289
|
"""
|
1291
1290
|
DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
1292
1291
|
"""
|
1293
1292
|
return pulumi.get(self, "allowed_names")
|
1294
1293
|
|
1295
|
-
@property
|
1294
|
+
@_builtins.property
|
1296
1295
|
@pulumi.getter(name="allowedOrganizationalUnits")
|
1297
|
-
def allowed_organizational_units(self) -> pulumi.Output[Optional[Sequence[
|
1296
|
+
def allowed_organizational_units(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1298
1297
|
"""
|
1299
1298
|
Allowed organization units for authenticated client certificates.
|
1300
1299
|
"""
|
1301
1300
|
return pulumi.get(self, "allowed_organizational_units")
|
1302
1301
|
|
1303
|
-
@property
|
1302
|
+
@_builtins.property
|
1304
1303
|
@pulumi.getter(name="allowedUriSans")
|
1305
|
-
def allowed_uri_sans(self) -> pulumi.Output[Sequence[
|
1304
|
+
def allowed_uri_sans(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1306
1305
|
"""
|
1307
1306
|
Allowed URIs for authenticated client certificates
|
1308
1307
|
"""
|
1309
1308
|
return pulumi.get(self, "allowed_uri_sans")
|
1310
1309
|
|
1311
|
-
@property
|
1310
|
+
@_builtins.property
|
1312
1311
|
@pulumi.getter
|
1313
|
-
def backend(self) -> pulumi.Output[Optional[
|
1312
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1314
1313
|
"""
|
1315
1314
|
Path to the mounted Cert auth backend
|
1316
1315
|
"""
|
1317
1316
|
return pulumi.get(self, "backend")
|
1318
1317
|
|
1319
|
-
@property
|
1318
|
+
@_builtins.property
|
1320
1319
|
@pulumi.getter
|
1321
|
-
def certificate(self) -> pulumi.Output[
|
1320
|
+
def certificate(self) -> pulumi.Output[_builtins.str]:
|
1322
1321
|
"""
|
1323
1322
|
CA certificate used to validate client certificates
|
1324
1323
|
"""
|
1325
1324
|
return pulumi.get(self, "certificate")
|
1326
1325
|
|
1327
|
-
@property
|
1326
|
+
@_builtins.property
|
1328
1327
|
@pulumi.getter(name="displayName")
|
1329
|
-
def display_name(self) -> pulumi.Output[
|
1328
|
+
def display_name(self) -> pulumi.Output[_builtins.str]:
|
1330
1329
|
"""
|
1331
1330
|
The name to display on tokens issued under this role.
|
1332
1331
|
"""
|
1333
1332
|
return pulumi.get(self, "display_name")
|
1334
1333
|
|
1335
|
-
@property
|
1334
|
+
@_builtins.property
|
1336
1335
|
@pulumi.getter
|
1337
|
-
def name(self) -> pulumi.Output[
|
1336
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
1338
1337
|
"""
|
1339
1338
|
Name of the role
|
1340
1339
|
"""
|
1341
1340
|
return pulumi.get(self, "name")
|
1342
1341
|
|
1343
|
-
@property
|
1342
|
+
@_builtins.property
|
1344
1343
|
@pulumi.getter
|
1345
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1344
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1346
1345
|
"""
|
1347
1346
|
The namespace to provision the resource in.
|
1348
1347
|
The value should not contain leading or trailing forward slashes.
|
@@ -1351,9 +1350,9 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1351
1350
|
"""
|
1352
1351
|
return pulumi.get(self, "namespace")
|
1353
1352
|
|
1354
|
-
@property
|
1353
|
+
@_builtins.property
|
1355
1354
|
@pulumi.getter(name="ocspCaCertificates")
|
1356
|
-
def ocsp_ca_certificates(self) -> pulumi.Output[Optional[
|
1355
|
+
def ocsp_ca_certificates(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1357
1356
|
"""
|
1358
1357
|
Any additional CA certificates
|
1359
1358
|
needed to verify OCSP responses. Provided as base64 encoded PEM data.
|
@@ -1361,18 +1360,18 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1361
1360
|
"""
|
1362
1361
|
return pulumi.get(self, "ocsp_ca_certificates")
|
1363
1362
|
|
1364
|
-
@property
|
1363
|
+
@_builtins.property
|
1365
1364
|
@pulumi.getter(name="ocspEnabled")
|
1366
|
-
def ocsp_enabled(self) -> pulumi.Output[
|
1365
|
+
def ocsp_enabled(self) -> pulumi.Output[_builtins.bool]:
|
1367
1366
|
"""
|
1368
1367
|
If enabled, validate certificates'
|
1369
1368
|
revocation status using OCSP. Requires Vault version 1.13+.
|
1370
1369
|
"""
|
1371
1370
|
return pulumi.get(self, "ocsp_enabled")
|
1372
1371
|
|
1373
|
-
@property
|
1372
|
+
@_builtins.property
|
1374
1373
|
@pulumi.getter(name="ocspFailOpen")
|
1375
|
-
def ocsp_fail_open(self) -> pulumi.Output[
|
1374
|
+
def ocsp_fail_open(self) -> pulumi.Output[_builtins.bool]:
|
1376
1375
|
"""
|
1377
1376
|
If true and an OCSP response cannot
|
1378
1377
|
be fetched or is of an unknown status, the login will proceed as if the
|
@@ -1381,9 +1380,9 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1381
1380
|
"""
|
1382
1381
|
return pulumi.get(self, "ocsp_fail_open")
|
1383
1382
|
|
1384
|
-
@property
|
1383
|
+
@_builtins.property
|
1385
1384
|
@pulumi.getter(name="ocspQueryAllServers")
|
1386
|
-
def ocsp_query_all_servers(self) -> pulumi.Output[
|
1385
|
+
def ocsp_query_all_servers(self) -> pulumi.Output[_builtins.bool]:
|
1387
1386
|
"""
|
1388
1387
|
If set to true, rather than
|
1389
1388
|
accepting the first successful OCSP response, query all servers and consider
|
@@ -1392,9 +1391,9 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1392
1391
|
"""
|
1393
1392
|
return pulumi.get(self, "ocsp_query_all_servers")
|
1394
1393
|
|
1395
|
-
@property
|
1394
|
+
@_builtins.property
|
1396
1395
|
@pulumi.getter(name="ocspServersOverrides")
|
1397
|
-
def ocsp_servers_overrides(self) -> pulumi.Output[Optional[Sequence[
|
1396
|
+
def ocsp_servers_overrides(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1398
1397
|
"""
|
1399
1398
|
: A comma-separated list of OCSP
|
1400
1399
|
server addresses. If unset, the OCSP server is determined from the
|
@@ -1403,82 +1402,82 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1403
1402
|
"""
|
1404
1403
|
return pulumi.get(self, "ocsp_servers_overrides")
|
1405
1404
|
|
1406
|
-
@property
|
1405
|
+
@_builtins.property
|
1407
1406
|
@pulumi.getter(name="requiredExtensions")
|
1408
|
-
def required_extensions(self) -> pulumi.Output[Sequence[
|
1407
|
+
def required_extensions(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
1409
1408
|
"""
|
1410
1409
|
TLS extensions required on
|
1411
1410
|
client certificates
|
1412
1411
|
"""
|
1413
1412
|
return pulumi.get(self, "required_extensions")
|
1414
1413
|
|
1415
|
-
@property
|
1414
|
+
@_builtins.property
|
1416
1415
|
@pulumi.getter(name="tokenBoundCidrs")
|
1417
|
-
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[
|
1416
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1418
1417
|
"""
|
1419
1418
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1420
1419
|
"""
|
1421
1420
|
return pulumi.get(self, "token_bound_cidrs")
|
1422
1421
|
|
1423
|
-
@property
|
1422
|
+
@_builtins.property
|
1424
1423
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1425
|
-
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[
|
1424
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1426
1425
|
"""
|
1427
1426
|
Generated Token's Explicit Maximum TTL in seconds
|
1428
1427
|
"""
|
1429
1428
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1430
1429
|
|
1431
|
-
@property
|
1430
|
+
@_builtins.property
|
1432
1431
|
@pulumi.getter(name="tokenMaxTtl")
|
1433
|
-
def token_max_ttl(self) -> pulumi.Output[Optional[
|
1432
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1434
1433
|
"""
|
1435
1434
|
The maximum lifetime of the generated token
|
1436
1435
|
"""
|
1437
1436
|
return pulumi.get(self, "token_max_ttl")
|
1438
1437
|
|
1439
|
-
@property
|
1438
|
+
@_builtins.property
|
1440
1439
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1441
|
-
def token_no_default_policy(self) -> pulumi.Output[Optional[
|
1440
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1442
1441
|
"""
|
1443
1442
|
If true, the 'default' policy will not automatically be added to generated tokens
|
1444
1443
|
"""
|
1445
1444
|
return pulumi.get(self, "token_no_default_policy")
|
1446
1445
|
|
1447
|
-
@property
|
1446
|
+
@_builtins.property
|
1448
1447
|
@pulumi.getter(name="tokenNumUses")
|
1449
|
-
def token_num_uses(self) -> pulumi.Output[Optional[
|
1448
|
+
def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1450
1449
|
"""
|
1451
1450
|
The maximum number of times a token may be used, a value of zero means unlimited
|
1452
1451
|
"""
|
1453
1452
|
return pulumi.get(self, "token_num_uses")
|
1454
1453
|
|
1455
|
-
@property
|
1454
|
+
@_builtins.property
|
1456
1455
|
@pulumi.getter(name="tokenPeriod")
|
1457
|
-
def token_period(self) -> pulumi.Output[Optional[
|
1456
|
+
def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1458
1457
|
"""
|
1459
1458
|
Generated Token's Period
|
1460
1459
|
"""
|
1461
1460
|
return pulumi.get(self, "token_period")
|
1462
1461
|
|
1463
|
-
@property
|
1462
|
+
@_builtins.property
|
1464
1463
|
@pulumi.getter(name="tokenPolicies")
|
1465
|
-
def token_policies(self) -> pulumi.Output[Optional[Sequence[
|
1464
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1466
1465
|
"""
|
1467
1466
|
Generated Token's Policies
|
1468
1467
|
"""
|
1469
1468
|
return pulumi.get(self, "token_policies")
|
1470
1469
|
|
1471
|
-
@property
|
1470
|
+
@_builtins.property
|
1472
1471
|
@pulumi.getter(name="tokenTtl")
|
1473
|
-
def token_ttl(self) -> pulumi.Output[Optional[
|
1472
|
+
def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1474
1473
|
"""
|
1475
1474
|
The initial ttl of the token to generate in seconds
|
1476
1475
|
"""
|
1477
1476
|
return pulumi.get(self, "token_ttl")
|
1478
1477
|
|
1479
|
-
@property
|
1478
|
+
@_builtins.property
|
1480
1479
|
@pulumi.getter(name="tokenType")
|
1481
|
-
def token_type(self) -> pulumi.Output[Optional[
|
1480
|
+
def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1482
1481
|
"""
|
1483
1482
|
The type of token to generate, service or batch
|
1484
1483
|
"""
|