pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,29 +19,29 @@ __all__ = ['AuthBackendRoleTagArgs', 'AuthBackendRoleTag']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendRoleTagArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
role: pulumi.Input[
|
24
|
-
allow_instance_migration: Optional[pulumi.Input[
|
25
|
-
backend: Optional[pulumi.Input[
|
26
|
-
disallow_reauthentication: Optional[pulumi.Input[
|
27
|
-
instance_id: Optional[pulumi.Input[
|
28
|
-
max_ttl: Optional[pulumi.Input[
|
29
|
-
namespace: Optional[pulumi.Input[
|
30
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
22
|
+
role: pulumi.Input[_builtins.str],
|
23
|
+
allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
|
24
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
|
26
|
+
instance_id: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
31
30
|
"""
|
32
31
|
The set of arguments for constructing a AuthBackendRoleTag resource.
|
33
|
-
:param pulumi.Input[
|
32
|
+
:param pulumi.Input[_builtins.str] role: The name of the AWS auth backend role to read
|
34
33
|
role tags from, with no leading or trailing `/`s.
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
34
|
+
:param pulumi.Input[_builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
|
35
|
+
:param pulumi.Input[_builtins.str] backend: The path to the AWS auth backend to
|
37
36
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
38
|
-
:param pulumi.Input[
|
39
|
-
:param pulumi.Input[
|
40
|
-
:param pulumi.Input[
|
41
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[_builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
|
38
|
+
:param pulumi.Input[_builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
39
|
+
:param pulumi.Input[_builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
|
40
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
42
41
|
The value should not contain leading or trailing forward slashes.
|
43
42
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
44
43
|
*Available only for Vault Enterprise*.
|
45
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
44
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
46
45
|
"""
|
47
46
|
pulumi.set(__self__, "role", role)
|
48
47
|
if allow_instance_migration is not None:
|
@@ -60,9 +59,9 @@ class AuthBackendRoleTagArgs:
|
|
60
59
|
if policies is not None:
|
61
60
|
pulumi.set(__self__, "policies", policies)
|
62
61
|
|
63
|
-
@property
|
62
|
+
@_builtins.property
|
64
63
|
@pulumi.getter
|
65
|
-
def role(self) -> pulumi.Input[
|
64
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
66
65
|
"""
|
67
66
|
The name of the AWS auth backend role to read
|
68
67
|
role tags from, with no leading or trailing `/`s.
|
@@ -70,24 +69,24 @@ class AuthBackendRoleTagArgs:
|
|
70
69
|
return pulumi.get(self, "role")
|
71
70
|
|
72
71
|
@role.setter
|
73
|
-
def role(self, value: pulumi.Input[
|
72
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
74
73
|
pulumi.set(self, "role", value)
|
75
74
|
|
76
|
-
@property
|
75
|
+
@_builtins.property
|
77
76
|
@pulumi.getter(name="allowInstanceMigration")
|
78
|
-
def allow_instance_migration(self) -> Optional[pulumi.Input[
|
77
|
+
def allow_instance_migration(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
79
78
|
"""
|
80
79
|
If set, allows migration of the underlying instances where the client resides. Use with caution.
|
81
80
|
"""
|
82
81
|
return pulumi.get(self, "allow_instance_migration")
|
83
82
|
|
84
83
|
@allow_instance_migration.setter
|
85
|
-
def allow_instance_migration(self, value: Optional[pulumi.Input[
|
84
|
+
def allow_instance_migration(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
86
85
|
pulumi.set(self, "allow_instance_migration", value)
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter
|
90
|
-
def backend(self) -> Optional[pulumi.Input[
|
89
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
91
90
|
"""
|
92
91
|
The path to the AWS auth backend to
|
93
92
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
@@ -95,48 +94,48 @@ class AuthBackendRoleTagArgs:
|
|
95
94
|
return pulumi.get(self, "backend")
|
96
95
|
|
97
96
|
@backend.setter
|
98
|
-
def backend(self, value: Optional[pulumi.Input[
|
97
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
99
98
|
pulumi.set(self, "backend", value)
|
100
99
|
|
101
|
-
@property
|
100
|
+
@_builtins.property
|
102
101
|
@pulumi.getter(name="disallowReauthentication")
|
103
|
-
def disallow_reauthentication(self) -> Optional[pulumi.Input[
|
102
|
+
def disallow_reauthentication(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
104
103
|
"""
|
105
104
|
If set, only allows a single token to be granted per instance ID.
|
106
105
|
"""
|
107
106
|
return pulumi.get(self, "disallow_reauthentication")
|
108
107
|
|
109
108
|
@disallow_reauthentication.setter
|
110
|
-
def disallow_reauthentication(self, value: Optional[pulumi.Input[
|
109
|
+
def disallow_reauthentication(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
111
110
|
pulumi.set(self, "disallow_reauthentication", value)
|
112
111
|
|
113
|
-
@property
|
112
|
+
@_builtins.property
|
114
113
|
@pulumi.getter(name="instanceId")
|
115
|
-
def instance_id(self) -> Optional[pulumi.Input[
|
114
|
+
def instance_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
116
115
|
"""
|
117
116
|
Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
118
117
|
"""
|
119
118
|
return pulumi.get(self, "instance_id")
|
120
119
|
|
121
120
|
@instance_id.setter
|
122
|
-
def instance_id(self, value: Optional[pulumi.Input[
|
121
|
+
def instance_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
123
122
|
pulumi.set(self, "instance_id", value)
|
124
123
|
|
125
|
-
@property
|
124
|
+
@_builtins.property
|
126
125
|
@pulumi.getter(name="maxTtl")
|
127
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
126
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
128
127
|
"""
|
129
128
|
The maximum TTL of the tokens issued using this role.
|
130
129
|
"""
|
131
130
|
return pulumi.get(self, "max_ttl")
|
132
131
|
|
133
132
|
@max_ttl.setter
|
134
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
133
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
135
134
|
pulumi.set(self, "max_ttl", value)
|
136
135
|
|
137
|
-
@property
|
136
|
+
@_builtins.property
|
138
137
|
@pulumi.getter
|
139
|
-
def namespace(self) -> Optional[pulumi.Input[
|
138
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
140
139
|
"""
|
141
140
|
The namespace to provision the resource in.
|
142
141
|
The value should not contain leading or trailing forward slashes.
|
@@ -146,52 +145,52 @@ class AuthBackendRoleTagArgs:
|
|
146
145
|
return pulumi.get(self, "namespace")
|
147
146
|
|
148
147
|
@namespace.setter
|
149
|
-
def namespace(self, value: Optional[pulumi.Input[
|
148
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
150
149
|
pulumi.set(self, "namespace", value)
|
151
150
|
|
152
|
-
@property
|
151
|
+
@_builtins.property
|
153
152
|
@pulumi.getter
|
154
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
153
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
155
154
|
"""
|
156
155
|
The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
157
156
|
"""
|
158
157
|
return pulumi.get(self, "policies")
|
159
158
|
|
160
159
|
@policies.setter
|
161
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
160
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
162
161
|
pulumi.set(self, "policies", value)
|
163
162
|
|
164
163
|
|
165
164
|
@pulumi.input_type
|
166
165
|
class _AuthBackendRoleTagState:
|
167
166
|
def __init__(__self__, *,
|
168
|
-
allow_instance_migration: Optional[pulumi.Input[
|
169
|
-
backend: Optional[pulumi.Input[
|
170
|
-
disallow_reauthentication: Optional[pulumi.Input[
|
171
|
-
instance_id: Optional[pulumi.Input[
|
172
|
-
max_ttl: Optional[pulumi.Input[
|
173
|
-
namespace: Optional[pulumi.Input[
|
174
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
175
|
-
role: Optional[pulumi.Input[
|
176
|
-
tag_key: Optional[pulumi.Input[
|
177
|
-
tag_value: Optional[pulumi.Input[
|
167
|
+
allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
|
168
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
169
|
+
disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
|
170
|
+
instance_id: Optional[pulumi.Input[_builtins.str]] = None,
|
171
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
172
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
173
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
174
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
175
|
+
tag_key: Optional[pulumi.Input[_builtins.str]] = None,
|
176
|
+
tag_value: Optional[pulumi.Input[_builtins.str]] = None):
|
178
177
|
"""
|
179
178
|
Input properties used for looking up and filtering AuthBackendRoleTag resources.
|
180
|
-
:param pulumi.Input[
|
181
|
-
:param pulumi.Input[
|
179
|
+
:param pulumi.Input[_builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
|
180
|
+
:param pulumi.Input[_builtins.str] backend: The path to the AWS auth backend to
|
182
181
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
183
|
-
:param pulumi.Input[
|
184
|
-
:param pulumi.Input[
|
185
|
-
:param pulumi.Input[
|
186
|
-
:param pulumi.Input[
|
182
|
+
:param pulumi.Input[_builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
|
183
|
+
:param pulumi.Input[_builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
184
|
+
:param pulumi.Input[_builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
|
185
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
187
186
|
The value should not contain leading or trailing forward slashes.
|
188
187
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
189
188
|
*Available only for Vault Enterprise*.
|
190
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
191
|
-
:param pulumi.Input[
|
189
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
190
|
+
:param pulumi.Input[_builtins.str] role: The name of the AWS auth backend role to read
|
192
191
|
role tags from, with no leading or trailing `/`s.
|
193
|
-
:param pulumi.Input[
|
194
|
-
:param pulumi.Input[
|
192
|
+
:param pulumi.Input[_builtins.str] tag_key: The key of the role tag.
|
193
|
+
:param pulumi.Input[_builtins.str] tag_value: The value to set the role key.
|
195
194
|
"""
|
196
195
|
if allow_instance_migration is not None:
|
197
196
|
pulumi.set(__self__, "allow_instance_migration", allow_instance_migration)
|
@@ -214,21 +213,21 @@ class _AuthBackendRoleTagState:
|
|
214
213
|
if tag_value is not None:
|
215
214
|
pulumi.set(__self__, "tag_value", tag_value)
|
216
215
|
|
217
|
-
@property
|
216
|
+
@_builtins.property
|
218
217
|
@pulumi.getter(name="allowInstanceMigration")
|
219
|
-
def allow_instance_migration(self) -> Optional[pulumi.Input[
|
218
|
+
def allow_instance_migration(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
220
219
|
"""
|
221
220
|
If set, allows migration of the underlying instances where the client resides. Use with caution.
|
222
221
|
"""
|
223
222
|
return pulumi.get(self, "allow_instance_migration")
|
224
223
|
|
225
224
|
@allow_instance_migration.setter
|
226
|
-
def allow_instance_migration(self, value: Optional[pulumi.Input[
|
225
|
+
def allow_instance_migration(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
227
226
|
pulumi.set(self, "allow_instance_migration", value)
|
228
227
|
|
229
|
-
@property
|
228
|
+
@_builtins.property
|
230
229
|
@pulumi.getter
|
231
|
-
def backend(self) -> Optional[pulumi.Input[
|
230
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
232
231
|
"""
|
233
232
|
The path to the AWS auth backend to
|
234
233
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
@@ -236,48 +235,48 @@ class _AuthBackendRoleTagState:
|
|
236
235
|
return pulumi.get(self, "backend")
|
237
236
|
|
238
237
|
@backend.setter
|
239
|
-
def backend(self, value: Optional[pulumi.Input[
|
238
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
240
239
|
pulumi.set(self, "backend", value)
|
241
240
|
|
242
|
-
@property
|
241
|
+
@_builtins.property
|
243
242
|
@pulumi.getter(name="disallowReauthentication")
|
244
|
-
def disallow_reauthentication(self) -> Optional[pulumi.Input[
|
243
|
+
def disallow_reauthentication(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
245
244
|
"""
|
246
245
|
If set, only allows a single token to be granted per instance ID.
|
247
246
|
"""
|
248
247
|
return pulumi.get(self, "disallow_reauthentication")
|
249
248
|
|
250
249
|
@disallow_reauthentication.setter
|
251
|
-
def disallow_reauthentication(self, value: Optional[pulumi.Input[
|
250
|
+
def disallow_reauthentication(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
252
251
|
pulumi.set(self, "disallow_reauthentication", value)
|
253
252
|
|
254
|
-
@property
|
253
|
+
@_builtins.property
|
255
254
|
@pulumi.getter(name="instanceId")
|
256
|
-
def instance_id(self) -> Optional[pulumi.Input[
|
255
|
+
def instance_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
257
256
|
"""
|
258
257
|
Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
259
258
|
"""
|
260
259
|
return pulumi.get(self, "instance_id")
|
261
260
|
|
262
261
|
@instance_id.setter
|
263
|
-
def instance_id(self, value: Optional[pulumi.Input[
|
262
|
+
def instance_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
264
263
|
pulumi.set(self, "instance_id", value)
|
265
264
|
|
266
|
-
@property
|
265
|
+
@_builtins.property
|
267
266
|
@pulumi.getter(name="maxTtl")
|
268
|
-
def max_ttl(self) -> Optional[pulumi.Input[
|
267
|
+
def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
269
268
|
"""
|
270
269
|
The maximum TTL of the tokens issued using this role.
|
271
270
|
"""
|
272
271
|
return pulumi.get(self, "max_ttl")
|
273
272
|
|
274
273
|
@max_ttl.setter
|
275
|
-
def max_ttl(self, value: Optional[pulumi.Input[
|
274
|
+
def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
276
275
|
pulumi.set(self, "max_ttl", value)
|
277
276
|
|
278
|
-
@property
|
277
|
+
@_builtins.property
|
279
278
|
@pulumi.getter
|
280
|
-
def namespace(self) -> Optional[pulumi.Input[
|
279
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
281
280
|
"""
|
282
281
|
The namespace to provision the resource in.
|
283
282
|
The value should not contain leading or trailing forward slashes.
|
@@ -287,24 +286,24 @@ class _AuthBackendRoleTagState:
|
|
287
286
|
return pulumi.get(self, "namespace")
|
288
287
|
|
289
288
|
@namespace.setter
|
290
|
-
def namespace(self, value: Optional[pulumi.Input[
|
289
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
291
290
|
pulumi.set(self, "namespace", value)
|
292
291
|
|
293
|
-
@property
|
292
|
+
@_builtins.property
|
294
293
|
@pulumi.getter
|
295
|
-
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
294
|
+
def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
296
295
|
"""
|
297
296
|
The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
298
297
|
"""
|
299
298
|
return pulumi.get(self, "policies")
|
300
299
|
|
301
300
|
@policies.setter
|
302
|
-
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
301
|
+
def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
303
302
|
pulumi.set(self, "policies", value)
|
304
303
|
|
305
|
-
@property
|
304
|
+
@_builtins.property
|
306
305
|
@pulumi.getter
|
307
|
-
def role(self) -> Optional[pulumi.Input[
|
306
|
+
def role(self) -> Optional[pulumi.Input[_builtins.str]]:
|
308
307
|
"""
|
309
308
|
The name of the AWS auth backend role to read
|
310
309
|
role tags from, with no leading or trailing `/`s.
|
@@ -312,31 +311,31 @@ class _AuthBackendRoleTagState:
|
|
312
311
|
return pulumi.get(self, "role")
|
313
312
|
|
314
313
|
@role.setter
|
315
|
-
def role(self, value: Optional[pulumi.Input[
|
314
|
+
def role(self, value: Optional[pulumi.Input[_builtins.str]]):
|
316
315
|
pulumi.set(self, "role", value)
|
317
316
|
|
318
|
-
@property
|
317
|
+
@_builtins.property
|
319
318
|
@pulumi.getter(name="tagKey")
|
320
|
-
def tag_key(self) -> Optional[pulumi.Input[
|
319
|
+
def tag_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
321
320
|
"""
|
322
321
|
The key of the role tag.
|
323
322
|
"""
|
324
323
|
return pulumi.get(self, "tag_key")
|
325
324
|
|
326
325
|
@tag_key.setter
|
327
|
-
def tag_key(self, value: Optional[pulumi.Input[
|
326
|
+
def tag_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
328
327
|
pulumi.set(self, "tag_key", value)
|
329
328
|
|
330
|
-
@property
|
329
|
+
@_builtins.property
|
331
330
|
@pulumi.getter(name="tagValue")
|
332
|
-
def tag_value(self) -> Optional[pulumi.Input[
|
331
|
+
def tag_value(self) -> Optional[pulumi.Input[_builtins.str]]:
|
333
332
|
"""
|
334
333
|
The value to set the role key.
|
335
334
|
"""
|
336
335
|
return pulumi.get(self, "tag_value")
|
337
336
|
|
338
337
|
@tag_value.setter
|
339
|
-
def tag_value(self, value: Optional[pulumi.Input[
|
338
|
+
def tag_value(self, value: Optional[pulumi.Input[_builtins.str]]):
|
340
339
|
pulumi.set(self, "tag_value", value)
|
341
340
|
|
342
341
|
|
@@ -346,32 +345,32 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
346
345
|
def __init__(__self__,
|
347
346
|
resource_name: str,
|
348
347
|
opts: Optional[pulumi.ResourceOptions] = None,
|
349
|
-
allow_instance_migration: Optional[pulumi.Input[
|
350
|
-
backend: Optional[pulumi.Input[
|
351
|
-
disallow_reauthentication: Optional[pulumi.Input[
|
352
|
-
instance_id: Optional[pulumi.Input[
|
353
|
-
max_ttl: Optional[pulumi.Input[
|
354
|
-
namespace: Optional[pulumi.Input[
|
355
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
356
|
-
role: Optional[pulumi.Input[
|
348
|
+
allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
|
349
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
350
|
+
disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
|
351
|
+
instance_id: Optional[pulumi.Input[_builtins.str]] = None,
|
352
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
353
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
354
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
355
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
357
356
|
__props__=None):
|
358
357
|
"""
|
359
358
|
Reads role tag information from an AWS auth backend in Vault.
|
360
359
|
|
361
360
|
:param str resource_name: The name of the resource.
|
362
361
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
363
|
-
:param pulumi.Input[
|
364
|
-
:param pulumi.Input[
|
362
|
+
:param pulumi.Input[_builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
|
363
|
+
:param pulumi.Input[_builtins.str] backend: The path to the AWS auth backend to
|
365
364
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
366
|
-
:param pulumi.Input[
|
367
|
-
:param pulumi.Input[
|
368
|
-
:param pulumi.Input[
|
369
|
-
:param pulumi.Input[
|
365
|
+
:param pulumi.Input[_builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
|
366
|
+
:param pulumi.Input[_builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
367
|
+
:param pulumi.Input[_builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
|
368
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
370
369
|
The value should not contain leading or trailing forward slashes.
|
371
370
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
372
371
|
*Available only for Vault Enterprise*.
|
373
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
374
|
-
:param pulumi.Input[
|
372
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
373
|
+
:param pulumi.Input[_builtins.str] role: The name of the AWS auth backend role to read
|
375
374
|
role tags from, with no leading or trailing `/`s.
|
376
375
|
"""
|
377
376
|
...
|
@@ -398,14 +397,14 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
398
397
|
def _internal_init(__self__,
|
399
398
|
resource_name: str,
|
400
399
|
opts: Optional[pulumi.ResourceOptions] = None,
|
401
|
-
allow_instance_migration: Optional[pulumi.Input[
|
402
|
-
backend: Optional[pulumi.Input[
|
403
|
-
disallow_reauthentication: Optional[pulumi.Input[
|
404
|
-
instance_id: Optional[pulumi.Input[
|
405
|
-
max_ttl: Optional[pulumi.Input[
|
406
|
-
namespace: Optional[pulumi.Input[
|
407
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
408
|
-
role: Optional[pulumi.Input[
|
400
|
+
allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
|
401
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
402
|
+
disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
|
403
|
+
instance_id: Optional[pulumi.Input[_builtins.str]] = None,
|
404
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
405
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
406
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
407
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
409
408
|
__props__=None):
|
410
409
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
411
410
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -437,16 +436,16 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
437
436
|
def get(resource_name: str,
|
438
437
|
id: pulumi.Input[str],
|
439
438
|
opts: Optional[pulumi.ResourceOptions] = None,
|
440
|
-
allow_instance_migration: Optional[pulumi.Input[
|
441
|
-
backend: Optional[pulumi.Input[
|
442
|
-
disallow_reauthentication: Optional[pulumi.Input[
|
443
|
-
instance_id: Optional[pulumi.Input[
|
444
|
-
max_ttl: Optional[pulumi.Input[
|
445
|
-
namespace: Optional[pulumi.Input[
|
446
|
-
policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
447
|
-
role: Optional[pulumi.Input[
|
448
|
-
tag_key: Optional[pulumi.Input[
|
449
|
-
tag_value: Optional[pulumi.Input[
|
439
|
+
allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
|
440
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
441
|
+
disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
|
442
|
+
instance_id: Optional[pulumi.Input[_builtins.str]] = None,
|
443
|
+
max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
444
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
445
|
+
policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
446
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
447
|
+
tag_key: Optional[pulumi.Input[_builtins.str]] = None,
|
448
|
+
tag_value: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRoleTag':
|
450
449
|
"""
|
451
450
|
Get an existing AuthBackendRoleTag resource's state with the given name, id, and optional extra
|
452
451
|
properties used to qualify the lookup.
|
@@ -454,21 +453,21 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
454
453
|
:param str resource_name: The unique name of the resulting resource.
|
455
454
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
456
455
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
457
|
-
:param pulumi.Input[
|
458
|
-
:param pulumi.Input[
|
456
|
+
:param pulumi.Input[_builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
|
457
|
+
:param pulumi.Input[_builtins.str] backend: The path to the AWS auth backend to
|
459
458
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
460
|
-
:param pulumi.Input[
|
461
|
-
:param pulumi.Input[
|
462
|
-
:param pulumi.Input[
|
463
|
-
:param pulumi.Input[
|
459
|
+
:param pulumi.Input[_builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
|
460
|
+
:param pulumi.Input[_builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
461
|
+
:param pulumi.Input[_builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
|
462
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
464
463
|
The value should not contain leading or trailing forward slashes.
|
465
464
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
466
465
|
*Available only for Vault Enterprise*.
|
467
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
468
|
-
:param pulumi.Input[
|
466
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
467
|
+
:param pulumi.Input[_builtins.str] role: The name of the AWS auth backend role to read
|
469
468
|
role tags from, with no leading or trailing `/`s.
|
470
|
-
:param pulumi.Input[
|
471
|
-
:param pulumi.Input[
|
469
|
+
:param pulumi.Input[_builtins.str] tag_key: The key of the role tag.
|
470
|
+
:param pulumi.Input[_builtins.str] tag_value: The value to set the role key.
|
472
471
|
"""
|
473
472
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
474
473
|
|
@@ -486,50 +485,50 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
486
485
|
__props__.__dict__["tag_value"] = tag_value
|
487
486
|
return AuthBackendRoleTag(resource_name, opts=opts, __props__=__props__)
|
488
487
|
|
489
|
-
@property
|
488
|
+
@_builtins.property
|
490
489
|
@pulumi.getter(name="allowInstanceMigration")
|
491
|
-
def allow_instance_migration(self) -> pulumi.Output[Optional[
|
490
|
+
def allow_instance_migration(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
492
491
|
"""
|
493
492
|
If set, allows migration of the underlying instances where the client resides. Use with caution.
|
494
493
|
"""
|
495
494
|
return pulumi.get(self, "allow_instance_migration")
|
496
495
|
|
497
|
-
@property
|
496
|
+
@_builtins.property
|
498
497
|
@pulumi.getter
|
499
|
-
def backend(self) -> pulumi.Output[Optional[
|
498
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
500
499
|
"""
|
501
500
|
The path to the AWS auth backend to
|
502
501
|
read role tags from, with no leading or trailing `/`s. Defaults to "aws".
|
503
502
|
"""
|
504
503
|
return pulumi.get(self, "backend")
|
505
504
|
|
506
|
-
@property
|
505
|
+
@_builtins.property
|
507
506
|
@pulumi.getter(name="disallowReauthentication")
|
508
|
-
def disallow_reauthentication(self) -> pulumi.Output[Optional[
|
507
|
+
def disallow_reauthentication(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
509
508
|
"""
|
510
509
|
If set, only allows a single token to be granted per instance ID.
|
511
510
|
"""
|
512
511
|
return pulumi.get(self, "disallow_reauthentication")
|
513
512
|
|
514
|
-
@property
|
513
|
+
@_builtins.property
|
515
514
|
@pulumi.getter(name="instanceId")
|
516
|
-
def instance_id(self) -> pulumi.Output[Optional[
|
515
|
+
def instance_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
517
516
|
"""
|
518
517
|
Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
|
519
518
|
"""
|
520
519
|
return pulumi.get(self, "instance_id")
|
521
520
|
|
522
|
-
@property
|
521
|
+
@_builtins.property
|
523
522
|
@pulumi.getter(name="maxTtl")
|
524
|
-
def max_ttl(self) -> pulumi.Output[Optional[
|
523
|
+
def max_ttl(self) -> pulumi.Output[Optional[_builtins.str]]:
|
525
524
|
"""
|
526
525
|
The maximum TTL of the tokens issued using this role.
|
527
526
|
"""
|
528
527
|
return pulumi.get(self, "max_ttl")
|
529
528
|
|
530
|
-
@property
|
529
|
+
@_builtins.property
|
531
530
|
@pulumi.getter
|
532
|
-
def namespace(self) -> pulumi.Output[Optional[
|
531
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
533
532
|
"""
|
534
533
|
The namespace to provision the resource in.
|
535
534
|
The value should not contain leading or trailing forward slashes.
|
@@ -538,34 +537,34 @@ class AuthBackendRoleTag(pulumi.CustomResource):
|
|
538
537
|
"""
|
539
538
|
return pulumi.get(self, "namespace")
|
540
539
|
|
541
|
-
@property
|
540
|
+
@_builtins.property
|
542
541
|
@pulumi.getter
|
543
|
-
def policies(self) -> pulumi.Output[Optional[Sequence[
|
542
|
+
def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
544
543
|
"""
|
545
544
|
The policies to be associated with the tag. Must be a subset of the policies associated with the role.
|
546
545
|
"""
|
547
546
|
return pulumi.get(self, "policies")
|
548
547
|
|
549
|
-
@property
|
548
|
+
@_builtins.property
|
550
549
|
@pulumi.getter
|
551
|
-
def role(self) -> pulumi.Output[
|
550
|
+
def role(self) -> pulumi.Output[_builtins.str]:
|
552
551
|
"""
|
553
552
|
The name of the AWS auth backend role to read
|
554
553
|
role tags from, with no leading or trailing `/`s.
|
555
554
|
"""
|
556
555
|
return pulumi.get(self, "role")
|
557
556
|
|
558
|
-
@property
|
557
|
+
@_builtins.property
|
559
558
|
@pulumi.getter(name="tagKey")
|
560
|
-
def tag_key(self) -> pulumi.Output[
|
559
|
+
def tag_key(self) -> pulumi.Output[_builtins.str]:
|
561
560
|
"""
|
562
561
|
The key of the role tag.
|
563
562
|
"""
|
564
563
|
return pulumi.get(self, "tag_key")
|
565
564
|
|
566
|
-
@property
|
565
|
+
@_builtins.property
|
567
566
|
@pulumi.getter(name="tagValue")
|
568
|
-
def tag_value(self) -> pulumi.Output[
|
567
|
+
def tag_value(self) -> pulumi.Output[_builtins.str]:
|
569
568
|
"""
|
570
569
|
The value to set the role key.
|
571
570
|
"""
|