pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -92,88 +91,88 @@ class GetAuthBackendRoleResult:
|
|
92
91
|
raise TypeError("Expected argument 'type' to be a str")
|
93
92
|
pulumi.set(__self__, "type", type)
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter
|
97
|
-
def backend(self) -> Optional[
|
96
|
+
def backend(self) -> Optional[_builtins.str]:
|
98
97
|
return pulumi.get(self, "backend")
|
99
98
|
|
100
|
-
@property
|
99
|
+
@_builtins.property
|
101
100
|
@pulumi.getter(name="boundInstanceGroups")
|
102
|
-
def bound_instance_groups(self) -> Sequence[
|
101
|
+
def bound_instance_groups(self) -> Sequence[_builtins.str]:
|
103
102
|
"""
|
104
103
|
GCP regions bound to the role. Returned when `type` is `gce`.
|
105
104
|
"""
|
106
105
|
return pulumi.get(self, "bound_instance_groups")
|
107
106
|
|
108
|
-
@property
|
107
|
+
@_builtins.property
|
109
108
|
@pulumi.getter(name="boundLabels")
|
110
|
-
def bound_labels(self) -> Sequence[
|
109
|
+
def bound_labels(self) -> Sequence[_builtins.str]:
|
111
110
|
"""
|
112
111
|
GCP labels bound to the role. Returned when `type` is `gce`.
|
113
112
|
"""
|
114
113
|
return pulumi.get(self, "bound_labels")
|
115
114
|
|
116
|
-
@property
|
115
|
+
@_builtins.property
|
117
116
|
@pulumi.getter(name="boundProjects")
|
118
|
-
def bound_projects(self) -> Sequence[
|
117
|
+
def bound_projects(self) -> Sequence[_builtins.str]:
|
119
118
|
"""
|
120
119
|
GCP projects bound to the role.
|
121
120
|
"""
|
122
121
|
return pulumi.get(self, "bound_projects")
|
123
122
|
|
124
|
-
@property
|
123
|
+
@_builtins.property
|
125
124
|
@pulumi.getter(name="boundRegions")
|
126
|
-
def bound_regions(self) -> Sequence[
|
125
|
+
def bound_regions(self) -> Sequence[_builtins.str]:
|
127
126
|
"""
|
128
127
|
GCP regions bound to the role. Returned when `type` is `gce`.
|
129
128
|
"""
|
130
129
|
return pulumi.get(self, "bound_regions")
|
131
130
|
|
132
|
-
@property
|
131
|
+
@_builtins.property
|
133
132
|
@pulumi.getter(name="boundServiceAccounts")
|
134
|
-
def bound_service_accounts(self) -> Sequence[
|
133
|
+
def bound_service_accounts(self) -> Sequence[_builtins.str]:
|
135
134
|
"""
|
136
135
|
GCP service accounts bound to the role. Returned when `type` is `iam`.
|
137
136
|
"""
|
138
137
|
return pulumi.get(self, "bound_service_accounts")
|
139
138
|
|
140
|
-
@property
|
139
|
+
@_builtins.property
|
141
140
|
@pulumi.getter(name="boundZones")
|
142
|
-
def bound_zones(self) -> Sequence[
|
141
|
+
def bound_zones(self) -> Sequence[_builtins.str]:
|
143
142
|
"""
|
144
143
|
GCP zones bound to the role. Returned when `type` is `gce`.
|
145
144
|
"""
|
146
145
|
return pulumi.get(self, "bound_zones")
|
147
146
|
|
148
|
-
@property
|
147
|
+
@_builtins.property
|
149
148
|
@pulumi.getter
|
150
|
-
def id(self) ->
|
149
|
+
def id(self) -> _builtins.str:
|
151
150
|
"""
|
152
151
|
The provider-assigned unique ID for this managed resource.
|
153
152
|
"""
|
154
153
|
return pulumi.get(self, "id")
|
155
154
|
|
156
|
-
@property
|
155
|
+
@_builtins.property
|
157
156
|
@pulumi.getter
|
158
|
-
def namespace(self) -> Optional[
|
157
|
+
def namespace(self) -> Optional[_builtins.str]:
|
159
158
|
return pulumi.get(self, "namespace")
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter(name="roleId")
|
163
|
-
def role_id(self) ->
|
162
|
+
def role_id(self) -> _builtins.str:
|
164
163
|
"""
|
165
164
|
The RoleID of the GCP role.
|
166
165
|
"""
|
167
166
|
return pulumi.get(self, "role_id")
|
168
167
|
|
169
|
-
@property
|
168
|
+
@_builtins.property
|
170
169
|
@pulumi.getter(name="roleName")
|
171
|
-
def role_name(self) ->
|
170
|
+
def role_name(self) -> _builtins.str:
|
172
171
|
return pulumi.get(self, "role_name")
|
173
172
|
|
174
|
-
@property
|
173
|
+
@_builtins.property
|
175
174
|
@pulumi.getter(name="tokenBoundCidrs")
|
176
|
-
def token_bound_cidrs(self) -> Optional[Sequence[
|
175
|
+
def token_bound_cidrs(self) -> Optional[Sequence[_builtins.str]]:
|
177
176
|
"""
|
178
177
|
List of CIDR blocks; if set, specifies blocks of IP
|
179
178
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
@@ -181,9 +180,9 @@ class GetAuthBackendRoleResult:
|
|
181
180
|
"""
|
182
181
|
return pulumi.get(self, "token_bound_cidrs")
|
183
182
|
|
184
|
-
@property
|
183
|
+
@_builtins.property
|
185
184
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
186
|
-
def token_explicit_max_ttl(self) -> Optional[
|
185
|
+
def token_explicit_max_ttl(self) -> Optional[_builtins.int]:
|
187
186
|
"""
|
188
187
|
If set, will encode an
|
189
188
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
@@ -192,27 +191,27 @@ class GetAuthBackendRoleResult:
|
|
192
191
|
"""
|
193
192
|
return pulumi.get(self, "token_explicit_max_ttl")
|
194
193
|
|
195
|
-
@property
|
194
|
+
@_builtins.property
|
196
195
|
@pulumi.getter(name="tokenMaxTtl")
|
197
|
-
def token_max_ttl(self) -> Optional[
|
196
|
+
def token_max_ttl(self) -> Optional[_builtins.int]:
|
198
197
|
"""
|
199
198
|
The maximum lifetime for generated tokens in number of seconds.
|
200
199
|
Its current value will be referenced at renewal time.
|
201
200
|
"""
|
202
201
|
return pulumi.get(self, "token_max_ttl")
|
203
202
|
|
204
|
-
@property
|
203
|
+
@_builtins.property
|
205
204
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
206
|
-
def token_no_default_policy(self) -> Optional[
|
205
|
+
def token_no_default_policy(self) -> Optional[_builtins.bool]:
|
207
206
|
"""
|
208
207
|
If set, the default policy will not be set on
|
209
208
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
210
209
|
"""
|
211
210
|
return pulumi.get(self, "token_no_default_policy")
|
212
211
|
|
213
|
-
@property
|
212
|
+
@_builtins.property
|
214
213
|
@pulumi.getter(name="tokenNumUses")
|
215
|
-
def token_num_uses(self) -> Optional[
|
214
|
+
def token_num_uses(self) -> Optional[_builtins.int]:
|
216
215
|
"""
|
217
216
|
The
|
218
217
|
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
@@ -220,9 +219,9 @@ class GetAuthBackendRoleResult:
|
|
220
219
|
"""
|
221
220
|
return pulumi.get(self, "token_num_uses")
|
222
221
|
|
223
|
-
@property
|
222
|
+
@_builtins.property
|
224
223
|
@pulumi.getter(name="tokenPeriod")
|
225
|
-
def token_period(self) -> Optional[
|
224
|
+
def token_period(self) -> Optional[_builtins.int]:
|
226
225
|
"""
|
227
226
|
(Optional) If set, indicates that the
|
228
227
|
token generated using this role should never expire. The token should be renewed within the
|
@@ -231,27 +230,27 @@ class GetAuthBackendRoleResult:
|
|
231
230
|
"""
|
232
231
|
return pulumi.get(self, "token_period")
|
233
232
|
|
234
|
-
@property
|
233
|
+
@_builtins.property
|
235
234
|
@pulumi.getter(name="tokenPolicies")
|
236
|
-
def token_policies(self) -> Optional[Sequence[
|
235
|
+
def token_policies(self) -> Optional[Sequence[_builtins.str]]:
|
237
236
|
"""
|
238
237
|
List of policies to encode onto generated tokens. Depending
|
239
238
|
on the auth method, this list may be supplemented by user/group/other values.
|
240
239
|
"""
|
241
240
|
return pulumi.get(self, "token_policies")
|
242
241
|
|
243
|
-
@property
|
242
|
+
@_builtins.property
|
244
243
|
@pulumi.getter(name="tokenTtl")
|
245
|
-
def token_ttl(self) -> Optional[
|
244
|
+
def token_ttl(self) -> Optional[_builtins.int]:
|
246
245
|
"""
|
247
246
|
The incremental lifetime for generated tokens in number of seconds.
|
248
247
|
Its current value will be referenced at renewal time.
|
249
248
|
"""
|
250
249
|
return pulumi.get(self, "token_ttl")
|
251
250
|
|
252
|
-
@property
|
251
|
+
@_builtins.property
|
253
252
|
@pulumi.getter(name="tokenType")
|
254
|
-
def token_type(self) -> Optional[
|
253
|
+
def token_type(self) -> Optional[_builtins.str]:
|
255
254
|
"""
|
256
255
|
The type of token that should be generated. Can be `service`,
|
257
256
|
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
@@ -261,9 +260,9 @@ class GetAuthBackendRoleResult:
|
|
261
260
|
"""
|
262
261
|
return pulumi.get(self, "token_type")
|
263
262
|
|
264
|
-
@property
|
263
|
+
@_builtins.property
|
265
264
|
@pulumi.getter
|
266
|
-
def type(self) ->
|
265
|
+
def type(self) -> _builtins.str:
|
267
266
|
"""
|
268
267
|
Type of GCP role. Expected values are `iam` or `gce`.
|
269
268
|
"""
|
@@ -299,18 +298,18 @@ class AwaitableGetAuthBackendRoleResult(GetAuthBackendRoleResult):
|
|
299
298
|
type=self.type)
|
300
299
|
|
301
300
|
|
302
|
-
def get_auth_backend_role(backend: Optional[
|
303
|
-
namespace: Optional[
|
304
|
-
role_name: Optional[
|
305
|
-
token_bound_cidrs: Optional[Sequence[
|
306
|
-
token_explicit_max_ttl: Optional[
|
307
|
-
token_max_ttl: Optional[
|
308
|
-
token_no_default_policy: Optional[
|
309
|
-
token_num_uses: Optional[
|
310
|
-
token_period: Optional[
|
311
|
-
token_policies: Optional[Sequence[
|
312
|
-
token_ttl: Optional[
|
313
|
-
token_type: Optional[
|
301
|
+
def get_auth_backend_role(backend: Optional[_builtins.str] = None,
|
302
|
+
namespace: Optional[_builtins.str] = None,
|
303
|
+
role_name: Optional[_builtins.str] = None,
|
304
|
+
token_bound_cidrs: Optional[Sequence[_builtins.str]] = None,
|
305
|
+
token_explicit_max_ttl: Optional[_builtins.int] = None,
|
306
|
+
token_max_ttl: Optional[_builtins.int] = None,
|
307
|
+
token_no_default_policy: Optional[_builtins.bool] = None,
|
308
|
+
token_num_uses: Optional[_builtins.int] = None,
|
309
|
+
token_period: Optional[_builtins.int] = None,
|
310
|
+
token_policies: Optional[Sequence[_builtins.str]] = None,
|
311
|
+
token_ttl: Optional[_builtins.int] = None,
|
312
|
+
token_type: Optional[_builtins.str] = None,
|
314
313
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendRoleResult:
|
315
314
|
"""
|
316
315
|
Reads a GCP auth role from a Vault server.
|
@@ -327,35 +326,35 @@ def get_auth_backend_role(backend: Optional[builtins.str] = None,
|
|
327
326
|
```
|
328
327
|
|
329
328
|
|
330
|
-
:param
|
331
|
-
:param
|
329
|
+
:param _builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
|
330
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
332
331
|
The value should not contain leading or trailing forward slashes.
|
333
332
|
The `namespace` is always relative to the provider's configured namespace.
|
334
333
|
*Available only for Vault Enterprise*.
|
335
|
-
:param
|
336
|
-
:param Sequence[
|
334
|
+
:param _builtins.str role_name: The name of the role to retrieve the Role ID for.
|
335
|
+
:param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
337
336
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
338
337
|
as well.
|
339
|
-
:param
|
338
|
+
:param _builtins.int token_explicit_max_ttl: If set, will encode an
|
340
339
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
341
340
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
342
341
|
`token_max_ttl` would otherwise allow a renewal.
|
343
|
-
:param
|
342
|
+
:param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
344
343
|
Its current value will be referenced at renewal time.
|
345
|
-
:param
|
344
|
+
:param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
|
346
345
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
347
|
-
:param
|
346
|
+
:param _builtins.int token_num_uses: The
|
348
347
|
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
349
348
|
if any, in number of seconds to set on the token.
|
350
|
-
:param
|
349
|
+
:param _builtins.int token_period: (Optional) If set, indicates that the
|
351
350
|
token generated using this role should never expire. The token should be renewed within the
|
352
351
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
353
352
|
value of this field. Specified in seconds.
|
354
|
-
:param Sequence[
|
353
|
+
:param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
|
355
354
|
on the auth method, this list may be supplemented by user/group/other values.
|
356
|
-
:param
|
355
|
+
:param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
357
356
|
Its current value will be referenced at renewal time.
|
358
|
-
:param
|
357
|
+
:param _builtins.str token_type: The type of token that should be generated. Can be `service`,
|
359
358
|
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
360
359
|
`service` tokens). For token store roles, there are two additional possibilities:
|
361
360
|
`default-service` and `default-batch` which specify the type to return unless the client
|
@@ -399,18 +398,18 @@ def get_auth_backend_role(backend: Optional[builtins.str] = None,
|
|
399
398
|
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
400
399
|
token_type=pulumi.get(__ret__, 'token_type'),
|
401
400
|
type=pulumi.get(__ret__, 'type'))
|
402
|
-
def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[
|
403
|
-
namespace: Optional[pulumi.Input[Optional[
|
404
|
-
role_name: Optional[pulumi.Input[
|
405
|
-
token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[
|
406
|
-
token_explicit_max_ttl: Optional[pulumi.Input[Optional[
|
407
|
-
token_max_ttl: Optional[pulumi.Input[Optional[
|
408
|
-
token_no_default_policy: Optional[pulumi.Input[Optional[
|
409
|
-
token_num_uses: Optional[pulumi.Input[Optional[
|
410
|
-
token_period: Optional[pulumi.Input[Optional[
|
411
|
-
token_policies: Optional[pulumi.Input[Optional[Sequence[
|
412
|
-
token_ttl: Optional[pulumi.Input[Optional[
|
413
|
-
token_type: Optional[pulumi.Input[Optional[
|
401
|
+
def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
402
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
403
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
404
|
+
token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
|
405
|
+
token_explicit_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
406
|
+
token_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
407
|
+
token_no_default_policy: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
408
|
+
token_num_uses: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
409
|
+
token_period: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
410
|
+
token_policies: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
|
411
|
+
token_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
412
|
+
token_type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
414
413
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleResult]:
|
415
414
|
"""
|
416
415
|
Reads a GCP auth role from a Vault server.
|
@@ -427,35 +426,35 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[builtin
|
|
427
426
|
```
|
428
427
|
|
429
428
|
|
430
|
-
:param
|
431
|
-
:param
|
429
|
+
:param _builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
|
430
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
432
431
|
The value should not contain leading or trailing forward slashes.
|
433
432
|
The `namespace` is always relative to the provider's configured namespace.
|
434
433
|
*Available only for Vault Enterprise*.
|
435
|
-
:param
|
436
|
-
:param Sequence[
|
434
|
+
:param _builtins.str role_name: The name of the role to retrieve the Role ID for.
|
435
|
+
:param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
437
436
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
438
437
|
as well.
|
439
|
-
:param
|
438
|
+
:param _builtins.int token_explicit_max_ttl: If set, will encode an
|
440
439
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
441
440
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
442
441
|
`token_max_ttl` would otherwise allow a renewal.
|
443
|
-
:param
|
442
|
+
:param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
444
443
|
Its current value will be referenced at renewal time.
|
445
|
-
:param
|
444
|
+
:param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
|
446
445
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
447
|
-
:param
|
446
|
+
:param _builtins.int token_num_uses: The
|
448
447
|
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
449
448
|
if any, in number of seconds to set on the token.
|
450
|
-
:param
|
449
|
+
:param _builtins.int token_period: (Optional) If set, indicates that the
|
451
450
|
token generated using this role should never expire. The token should be renewed within the
|
452
451
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
453
452
|
value of this field. Specified in seconds.
|
454
|
-
:param Sequence[
|
453
|
+
:param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
|
455
454
|
on the auth method, this list may be supplemented by user/group/other values.
|
456
|
-
:param
|
455
|
+
:param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
457
456
|
Its current value will be referenced at renewal time.
|
458
|
-
:param
|
457
|
+
:param _builtins.str token_type: The type of token that should be generated. Can be `service`,
|
459
458
|
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
460
459
|
`service` tokens). For token store roles, there are two additional possibilities:
|
461
460
|
`default-service` and `default-batch` which specify the type to return unless the client
|