pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,48 +19,48 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class AuthBackendRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
bound_service_account_names: pulumi.Input[Sequence[pulumi.Input[
|
24
|
-
bound_service_account_namespaces: pulumi.Input[Sequence[pulumi.Input[
|
25
|
-
role_name: pulumi.Input[
|
26
|
-
alias_name_source: Optional[pulumi.Input[
|
27
|
-
audience: Optional[pulumi.Input[
|
28
|
-
backend: Optional[pulumi.Input[
|
29
|
-
namespace: Optional[pulumi.Input[
|
30
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
31
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
32
|
-
token_max_ttl: Optional[pulumi.Input[
|
33
|
-
token_no_default_policy: Optional[pulumi.Input[
|
34
|
-
token_num_uses: Optional[pulumi.Input[
|
35
|
-
token_period: Optional[pulumi.Input[
|
36
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
37
|
-
token_ttl: Optional[pulumi.Input[
|
38
|
-
token_type: Optional[pulumi.Input[
|
22
|
+
bound_service_account_names: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
23
|
+
bound_service_account_namespaces: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
24
|
+
role_name: pulumi.Input[_builtins.str],
|
25
|
+
alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
audience: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
30
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
31
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
32
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
33
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
34
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
35
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
36
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
37
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
39
38
|
"""
|
40
39
|
The set of arguments for constructing a AuthBackendRole resource.
|
41
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
42
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
43
|
-
:param pulumi.Input[
|
44
|
-
:param pulumi.Input[
|
40
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
41
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
42
|
+
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
43
|
+
:param pulumi.Input[_builtins.str] alias_name_source: Configures how identity aliases are generated.
|
45
44
|
Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
|
46
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.str] audience: Audience claim to verify in the JWT.
|
47
46
|
|
48
47
|
> Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
|
49
48
|
before setting this to something other its default value. There are **important** security
|
50
49
|
implications to be aware of.
|
51
|
-
:param pulumi.Input[
|
52
|
-
:param pulumi.Input[
|
50
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
|
51
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
53
52
|
The value should not contain leading or trailing forward slashes.
|
54
53
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
55
54
|
*Available only for Vault Enterprise*.
|
56
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
57
|
-
:param pulumi.Input[
|
58
|
-
:param pulumi.Input[
|
59
|
-
:param pulumi.Input[
|
60
|
-
:param pulumi.Input[
|
61
|
-
:param pulumi.Input[
|
62
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
63
|
-
:param pulumi.Input[
|
64
|
-
:param pulumi.Input[
|
55
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
56
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
57
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
58
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
59
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
60
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
61
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
62
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
63
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
65
64
|
"""
|
66
65
|
pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
|
67
66
|
pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
|
@@ -93,45 +92,45 @@ class AuthBackendRoleArgs:
|
|
93
92
|
if token_type is not None:
|
94
93
|
pulumi.set(__self__, "token_type", token_type)
|
95
94
|
|
96
|
-
@property
|
95
|
+
@_builtins.property
|
97
96
|
@pulumi.getter(name="boundServiceAccountNames")
|
98
|
-
def bound_service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[
|
97
|
+
def bound_service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
99
98
|
"""
|
100
99
|
List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
101
100
|
"""
|
102
101
|
return pulumi.get(self, "bound_service_account_names")
|
103
102
|
|
104
103
|
@bound_service_account_names.setter
|
105
|
-
def bound_service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[
|
104
|
+
def bound_service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
106
105
|
pulumi.set(self, "bound_service_account_names", value)
|
107
106
|
|
108
|
-
@property
|
107
|
+
@_builtins.property
|
109
108
|
@pulumi.getter(name="boundServiceAccountNamespaces")
|
110
|
-
def bound_service_account_namespaces(self) -> pulumi.Input[Sequence[pulumi.Input[
|
109
|
+
def bound_service_account_namespaces(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
111
110
|
"""
|
112
111
|
List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
113
112
|
"""
|
114
113
|
return pulumi.get(self, "bound_service_account_namespaces")
|
115
114
|
|
116
115
|
@bound_service_account_namespaces.setter
|
117
|
-
def bound_service_account_namespaces(self, value: pulumi.Input[Sequence[pulumi.Input[
|
116
|
+
def bound_service_account_namespaces(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
118
117
|
pulumi.set(self, "bound_service_account_namespaces", value)
|
119
118
|
|
120
|
-
@property
|
119
|
+
@_builtins.property
|
121
120
|
@pulumi.getter(name="roleName")
|
122
|
-
def role_name(self) -> pulumi.Input[
|
121
|
+
def role_name(self) -> pulumi.Input[_builtins.str]:
|
123
122
|
"""
|
124
123
|
Name of the role.
|
125
124
|
"""
|
126
125
|
return pulumi.get(self, "role_name")
|
127
126
|
|
128
127
|
@role_name.setter
|
129
|
-
def role_name(self, value: pulumi.Input[
|
128
|
+
def role_name(self, value: pulumi.Input[_builtins.str]):
|
130
129
|
pulumi.set(self, "role_name", value)
|
131
130
|
|
132
|
-
@property
|
131
|
+
@_builtins.property
|
133
132
|
@pulumi.getter(name="aliasNameSource")
|
134
|
-
def alias_name_source(self) -> Optional[pulumi.Input[
|
133
|
+
def alias_name_source(self) -> Optional[pulumi.Input[_builtins.str]]:
|
135
134
|
"""
|
136
135
|
Configures how identity aliases are generated.
|
137
136
|
Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
|
@@ -139,12 +138,12 @@ class AuthBackendRoleArgs:
|
|
139
138
|
return pulumi.get(self, "alias_name_source")
|
140
139
|
|
141
140
|
@alias_name_source.setter
|
142
|
-
def alias_name_source(self, value: Optional[pulumi.Input[
|
141
|
+
def alias_name_source(self, value: Optional[pulumi.Input[_builtins.str]]):
|
143
142
|
pulumi.set(self, "alias_name_source", value)
|
144
143
|
|
145
|
-
@property
|
144
|
+
@_builtins.property
|
146
145
|
@pulumi.getter
|
147
|
-
def audience(self) -> Optional[pulumi.Input[
|
146
|
+
def audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
148
147
|
"""
|
149
148
|
Audience claim to verify in the JWT.
|
150
149
|
|
@@ -155,24 +154,24 @@ class AuthBackendRoleArgs:
|
|
155
154
|
return pulumi.get(self, "audience")
|
156
155
|
|
157
156
|
@audience.setter
|
158
|
-
def audience(self, value: Optional[pulumi.Input[
|
157
|
+
def audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
159
158
|
pulumi.set(self, "audience", value)
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter
|
163
|
-
def backend(self) -> Optional[pulumi.Input[
|
162
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
164
163
|
"""
|
165
164
|
Unique name of the kubernetes backend to configure.
|
166
165
|
"""
|
167
166
|
return pulumi.get(self, "backend")
|
168
167
|
|
169
168
|
@backend.setter
|
170
|
-
def backend(self, value: Optional[pulumi.Input[
|
169
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
171
170
|
pulumi.set(self, "backend", value)
|
172
171
|
|
173
|
-
@property
|
172
|
+
@_builtins.property
|
174
173
|
@pulumi.getter
|
175
|
-
def namespace(self) -> Optional[pulumi.Input[
|
174
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
176
175
|
"""
|
177
176
|
The namespace to provision the resource in.
|
178
177
|
The value should not contain leading or trailing forward slashes.
|
@@ -182,163 +181,163 @@ class AuthBackendRoleArgs:
|
|
182
181
|
return pulumi.get(self, "namespace")
|
183
182
|
|
184
183
|
@namespace.setter
|
185
|
-
def namespace(self, value: Optional[pulumi.Input[
|
184
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
186
185
|
pulumi.set(self, "namespace", value)
|
187
186
|
|
188
|
-
@property
|
187
|
+
@_builtins.property
|
189
188
|
@pulumi.getter(name="tokenBoundCidrs")
|
190
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
189
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
191
190
|
"""
|
192
191
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
193
192
|
"""
|
194
193
|
return pulumi.get(self, "token_bound_cidrs")
|
195
194
|
|
196
195
|
@token_bound_cidrs.setter
|
197
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
196
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
198
197
|
pulumi.set(self, "token_bound_cidrs", value)
|
199
198
|
|
200
|
-
@property
|
199
|
+
@_builtins.property
|
201
200
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
202
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
201
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
203
202
|
"""
|
204
203
|
Generated Token's Explicit Maximum TTL in seconds
|
205
204
|
"""
|
206
205
|
return pulumi.get(self, "token_explicit_max_ttl")
|
207
206
|
|
208
207
|
@token_explicit_max_ttl.setter
|
209
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
208
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
210
209
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
211
210
|
|
212
|
-
@property
|
211
|
+
@_builtins.property
|
213
212
|
@pulumi.getter(name="tokenMaxTtl")
|
214
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
213
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
215
214
|
"""
|
216
215
|
The maximum lifetime of the generated token
|
217
216
|
"""
|
218
217
|
return pulumi.get(self, "token_max_ttl")
|
219
218
|
|
220
219
|
@token_max_ttl.setter
|
221
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
220
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
222
221
|
pulumi.set(self, "token_max_ttl", value)
|
223
222
|
|
224
|
-
@property
|
223
|
+
@_builtins.property
|
225
224
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
226
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
225
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
227
226
|
"""
|
228
227
|
If true, the 'default' policy will not automatically be added to generated tokens
|
229
228
|
"""
|
230
229
|
return pulumi.get(self, "token_no_default_policy")
|
231
230
|
|
232
231
|
@token_no_default_policy.setter
|
233
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
232
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
234
233
|
pulumi.set(self, "token_no_default_policy", value)
|
235
234
|
|
236
|
-
@property
|
235
|
+
@_builtins.property
|
237
236
|
@pulumi.getter(name="tokenNumUses")
|
238
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
237
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
239
238
|
"""
|
240
239
|
The maximum number of times a token may be used, a value of zero means unlimited
|
241
240
|
"""
|
242
241
|
return pulumi.get(self, "token_num_uses")
|
243
242
|
|
244
243
|
@token_num_uses.setter
|
245
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
244
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
246
245
|
pulumi.set(self, "token_num_uses", value)
|
247
246
|
|
248
|
-
@property
|
247
|
+
@_builtins.property
|
249
248
|
@pulumi.getter(name="tokenPeriod")
|
250
|
-
def token_period(self) -> Optional[pulumi.Input[
|
249
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
251
250
|
"""
|
252
251
|
Generated Token's Period
|
253
252
|
"""
|
254
253
|
return pulumi.get(self, "token_period")
|
255
254
|
|
256
255
|
@token_period.setter
|
257
|
-
def token_period(self, value: Optional[pulumi.Input[
|
256
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
258
257
|
pulumi.set(self, "token_period", value)
|
259
258
|
|
260
|
-
@property
|
259
|
+
@_builtins.property
|
261
260
|
@pulumi.getter(name="tokenPolicies")
|
262
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
261
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
263
262
|
"""
|
264
263
|
Generated Token's Policies
|
265
264
|
"""
|
266
265
|
return pulumi.get(self, "token_policies")
|
267
266
|
|
268
267
|
@token_policies.setter
|
269
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
268
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
270
269
|
pulumi.set(self, "token_policies", value)
|
271
270
|
|
272
|
-
@property
|
271
|
+
@_builtins.property
|
273
272
|
@pulumi.getter(name="tokenTtl")
|
274
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
273
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
275
274
|
"""
|
276
275
|
The initial ttl of the token to generate in seconds
|
277
276
|
"""
|
278
277
|
return pulumi.get(self, "token_ttl")
|
279
278
|
|
280
279
|
@token_ttl.setter
|
281
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
280
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
282
281
|
pulumi.set(self, "token_ttl", value)
|
283
282
|
|
284
|
-
@property
|
283
|
+
@_builtins.property
|
285
284
|
@pulumi.getter(name="tokenType")
|
286
|
-
def token_type(self) -> Optional[pulumi.Input[
|
285
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
287
286
|
"""
|
288
287
|
The type of token to generate, service or batch
|
289
288
|
"""
|
290
289
|
return pulumi.get(self, "token_type")
|
291
290
|
|
292
291
|
@token_type.setter
|
293
|
-
def token_type(self, value: Optional[pulumi.Input[
|
292
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
294
293
|
pulumi.set(self, "token_type", value)
|
295
294
|
|
296
295
|
|
297
296
|
@pulumi.input_type
|
298
297
|
class _AuthBackendRoleState:
|
299
298
|
def __init__(__self__, *,
|
300
|
-
alias_name_source: Optional[pulumi.Input[
|
301
|
-
audience: Optional[pulumi.Input[
|
302
|
-
backend: Optional[pulumi.Input[
|
303
|
-
bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
304
|
-
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[
|
305
|
-
namespace: Optional[pulumi.Input[
|
306
|
-
role_name: Optional[pulumi.Input[
|
307
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
308
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
309
|
-
token_max_ttl: Optional[pulumi.Input[
|
310
|
-
token_no_default_policy: Optional[pulumi.Input[
|
311
|
-
token_num_uses: Optional[pulumi.Input[
|
312
|
-
token_period: Optional[pulumi.Input[
|
313
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
314
|
-
token_ttl: Optional[pulumi.Input[
|
315
|
-
token_type: Optional[pulumi.Input[
|
299
|
+
alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
|
300
|
+
audience: Optional[pulumi.Input[_builtins.str]] = None,
|
301
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
302
|
+
bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
303
|
+
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
304
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
305
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
306
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
307
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
308
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
309
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
310
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
311
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
312
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
313
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
314
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
316
315
|
"""
|
317
316
|
Input properties used for looking up and filtering AuthBackendRole resources.
|
318
|
-
:param pulumi.Input[
|
317
|
+
:param pulumi.Input[_builtins.str] alias_name_source: Configures how identity aliases are generated.
|
319
318
|
Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
|
320
|
-
:param pulumi.Input[
|
319
|
+
:param pulumi.Input[_builtins.str] audience: Audience claim to verify in the JWT.
|
321
320
|
|
322
321
|
> Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
|
323
322
|
before setting this to something other its default value. There are **important** security
|
324
323
|
implications to be aware of.
|
325
|
-
:param pulumi.Input[
|
326
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
327
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
328
|
-
:param pulumi.Input[
|
324
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
|
325
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
326
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
327
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
329
328
|
The value should not contain leading or trailing forward slashes.
|
330
329
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
331
330
|
*Available only for Vault Enterprise*.
|
332
|
-
:param pulumi.Input[
|
333
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
334
|
-
:param pulumi.Input[
|
335
|
-
:param pulumi.Input[
|
336
|
-
:param pulumi.Input[
|
337
|
-
:param pulumi.Input[
|
338
|
-
:param pulumi.Input[
|
339
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
340
|
-
:param pulumi.Input[
|
341
|
-
:param pulumi.Input[
|
331
|
+
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
332
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
333
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
334
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
335
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
336
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
337
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
338
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
339
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
340
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
342
341
|
"""
|
343
342
|
if alias_name_source is not None:
|
344
343
|
pulumi.set(__self__, "alias_name_source", alias_name_source)
|
@@ -373,9 +372,9 @@ class _AuthBackendRoleState:
|
|
373
372
|
if token_type is not None:
|
374
373
|
pulumi.set(__self__, "token_type", token_type)
|
375
374
|
|
376
|
-
@property
|
375
|
+
@_builtins.property
|
377
376
|
@pulumi.getter(name="aliasNameSource")
|
378
|
-
def alias_name_source(self) -> Optional[pulumi.Input[
|
377
|
+
def alias_name_source(self) -> Optional[pulumi.Input[_builtins.str]]:
|
379
378
|
"""
|
380
379
|
Configures how identity aliases are generated.
|
381
380
|
Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
|
@@ -383,12 +382,12 @@ class _AuthBackendRoleState:
|
|
383
382
|
return pulumi.get(self, "alias_name_source")
|
384
383
|
|
385
384
|
@alias_name_source.setter
|
386
|
-
def alias_name_source(self, value: Optional[pulumi.Input[
|
385
|
+
def alias_name_source(self, value: Optional[pulumi.Input[_builtins.str]]):
|
387
386
|
pulumi.set(self, "alias_name_source", value)
|
388
387
|
|
389
|
-
@property
|
388
|
+
@_builtins.property
|
390
389
|
@pulumi.getter
|
391
|
-
def audience(self) -> Optional[pulumi.Input[
|
390
|
+
def audience(self) -> Optional[pulumi.Input[_builtins.str]]:
|
392
391
|
"""
|
393
392
|
Audience claim to verify in the JWT.
|
394
393
|
|
@@ -399,48 +398,48 @@ class _AuthBackendRoleState:
|
|
399
398
|
return pulumi.get(self, "audience")
|
400
399
|
|
401
400
|
@audience.setter
|
402
|
-
def audience(self, value: Optional[pulumi.Input[
|
401
|
+
def audience(self, value: Optional[pulumi.Input[_builtins.str]]):
|
403
402
|
pulumi.set(self, "audience", value)
|
404
403
|
|
405
|
-
@property
|
404
|
+
@_builtins.property
|
406
405
|
@pulumi.getter
|
407
|
-
def backend(self) -> Optional[pulumi.Input[
|
406
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
408
407
|
"""
|
409
408
|
Unique name of the kubernetes backend to configure.
|
410
409
|
"""
|
411
410
|
return pulumi.get(self, "backend")
|
412
411
|
|
413
412
|
@backend.setter
|
414
|
-
def backend(self, value: Optional[pulumi.Input[
|
413
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
415
414
|
pulumi.set(self, "backend", value)
|
416
415
|
|
417
|
-
@property
|
416
|
+
@_builtins.property
|
418
417
|
@pulumi.getter(name="boundServiceAccountNames")
|
419
|
-
def bound_service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
418
|
+
def bound_service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
420
419
|
"""
|
421
420
|
List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
422
421
|
"""
|
423
422
|
return pulumi.get(self, "bound_service_account_names")
|
424
423
|
|
425
424
|
@bound_service_account_names.setter
|
426
|
-
def bound_service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
425
|
+
def bound_service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
427
426
|
pulumi.set(self, "bound_service_account_names", value)
|
428
427
|
|
429
|
-
@property
|
428
|
+
@_builtins.property
|
430
429
|
@pulumi.getter(name="boundServiceAccountNamespaces")
|
431
|
-
def bound_service_account_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
430
|
+
def bound_service_account_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
432
431
|
"""
|
433
432
|
List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
434
433
|
"""
|
435
434
|
return pulumi.get(self, "bound_service_account_namespaces")
|
436
435
|
|
437
436
|
@bound_service_account_namespaces.setter
|
438
|
-
def bound_service_account_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
437
|
+
def bound_service_account_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
439
438
|
pulumi.set(self, "bound_service_account_namespaces", value)
|
440
439
|
|
441
|
-
@property
|
440
|
+
@_builtins.property
|
442
441
|
@pulumi.getter
|
443
|
-
def namespace(self) -> Optional[pulumi.Input[
|
442
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
444
443
|
"""
|
445
444
|
The namespace to provision the resource in.
|
446
445
|
The value should not contain leading or trailing forward slashes.
|
@@ -450,127 +449,127 @@ class _AuthBackendRoleState:
|
|
450
449
|
return pulumi.get(self, "namespace")
|
451
450
|
|
452
451
|
@namespace.setter
|
453
|
-
def namespace(self, value: Optional[pulumi.Input[
|
452
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
454
453
|
pulumi.set(self, "namespace", value)
|
455
454
|
|
456
|
-
@property
|
455
|
+
@_builtins.property
|
457
456
|
@pulumi.getter(name="roleName")
|
458
|
-
def role_name(self) -> Optional[pulumi.Input[
|
457
|
+
def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
459
458
|
"""
|
460
459
|
Name of the role.
|
461
460
|
"""
|
462
461
|
return pulumi.get(self, "role_name")
|
463
462
|
|
464
463
|
@role_name.setter
|
465
|
-
def role_name(self, value: Optional[pulumi.Input[
|
464
|
+
def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
466
465
|
pulumi.set(self, "role_name", value)
|
467
466
|
|
468
|
-
@property
|
467
|
+
@_builtins.property
|
469
468
|
@pulumi.getter(name="tokenBoundCidrs")
|
470
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
469
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
471
470
|
"""
|
472
471
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
473
472
|
"""
|
474
473
|
return pulumi.get(self, "token_bound_cidrs")
|
475
474
|
|
476
475
|
@token_bound_cidrs.setter
|
477
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
476
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
478
477
|
pulumi.set(self, "token_bound_cidrs", value)
|
479
478
|
|
480
|
-
@property
|
479
|
+
@_builtins.property
|
481
480
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
482
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
481
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
483
482
|
"""
|
484
483
|
Generated Token's Explicit Maximum TTL in seconds
|
485
484
|
"""
|
486
485
|
return pulumi.get(self, "token_explicit_max_ttl")
|
487
486
|
|
488
487
|
@token_explicit_max_ttl.setter
|
489
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
488
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
490
489
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
491
490
|
|
492
|
-
@property
|
491
|
+
@_builtins.property
|
493
492
|
@pulumi.getter(name="tokenMaxTtl")
|
494
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
493
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
495
494
|
"""
|
496
495
|
The maximum lifetime of the generated token
|
497
496
|
"""
|
498
497
|
return pulumi.get(self, "token_max_ttl")
|
499
498
|
|
500
499
|
@token_max_ttl.setter
|
501
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
500
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
502
501
|
pulumi.set(self, "token_max_ttl", value)
|
503
502
|
|
504
|
-
@property
|
503
|
+
@_builtins.property
|
505
504
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
506
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
505
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
507
506
|
"""
|
508
507
|
If true, the 'default' policy will not automatically be added to generated tokens
|
509
508
|
"""
|
510
509
|
return pulumi.get(self, "token_no_default_policy")
|
511
510
|
|
512
511
|
@token_no_default_policy.setter
|
513
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
512
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
514
513
|
pulumi.set(self, "token_no_default_policy", value)
|
515
514
|
|
516
|
-
@property
|
515
|
+
@_builtins.property
|
517
516
|
@pulumi.getter(name="tokenNumUses")
|
518
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
517
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
519
518
|
"""
|
520
519
|
The maximum number of times a token may be used, a value of zero means unlimited
|
521
520
|
"""
|
522
521
|
return pulumi.get(self, "token_num_uses")
|
523
522
|
|
524
523
|
@token_num_uses.setter
|
525
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
524
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
526
525
|
pulumi.set(self, "token_num_uses", value)
|
527
526
|
|
528
|
-
@property
|
527
|
+
@_builtins.property
|
529
528
|
@pulumi.getter(name="tokenPeriod")
|
530
|
-
def token_period(self) -> Optional[pulumi.Input[
|
529
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
531
530
|
"""
|
532
531
|
Generated Token's Period
|
533
532
|
"""
|
534
533
|
return pulumi.get(self, "token_period")
|
535
534
|
|
536
535
|
@token_period.setter
|
537
|
-
def token_period(self, value: Optional[pulumi.Input[
|
536
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
538
537
|
pulumi.set(self, "token_period", value)
|
539
538
|
|
540
|
-
@property
|
539
|
+
@_builtins.property
|
541
540
|
@pulumi.getter(name="tokenPolicies")
|
542
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
541
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
543
542
|
"""
|
544
543
|
Generated Token's Policies
|
545
544
|
"""
|
546
545
|
return pulumi.get(self, "token_policies")
|
547
546
|
|
548
547
|
@token_policies.setter
|
549
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
548
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
550
549
|
pulumi.set(self, "token_policies", value)
|
551
550
|
|
552
|
-
@property
|
551
|
+
@_builtins.property
|
553
552
|
@pulumi.getter(name="tokenTtl")
|
554
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
553
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
555
554
|
"""
|
556
555
|
The initial ttl of the token to generate in seconds
|
557
556
|
"""
|
558
557
|
return pulumi.get(self, "token_ttl")
|
559
558
|
|
560
559
|
@token_ttl.setter
|
561
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
560
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
562
561
|
pulumi.set(self, "token_ttl", value)
|
563
562
|
|
564
|
-
@property
|
563
|
+
@_builtins.property
|
565
564
|
@pulumi.getter(name="tokenType")
|
566
|
-
def token_type(self) -> Optional[pulumi.Input[
|
565
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
567
566
|
"""
|
568
567
|
The type of token to generate, service or batch
|
569
568
|
"""
|
570
569
|
return pulumi.get(self, "token_type")
|
571
570
|
|
572
571
|
@token_type.setter
|
573
|
-
def token_type(self, value: Optional[pulumi.Input[
|
572
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
574
573
|
pulumi.set(self, "token_type", value)
|
575
574
|
|
576
575
|
|
@@ -580,22 +579,22 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
580
579
|
def __init__(__self__,
|
581
580
|
resource_name: str,
|
582
581
|
opts: Optional[pulumi.ResourceOptions] = None,
|
583
|
-
alias_name_source: Optional[pulumi.Input[
|
584
|
-
audience: Optional[pulumi.Input[
|
585
|
-
backend: Optional[pulumi.Input[
|
586
|
-
bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
587
|
-
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[
|
588
|
-
namespace: Optional[pulumi.Input[
|
589
|
-
role_name: Optional[pulumi.Input[
|
590
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
591
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
592
|
-
token_max_ttl: Optional[pulumi.Input[
|
593
|
-
token_no_default_policy: Optional[pulumi.Input[
|
594
|
-
token_num_uses: Optional[pulumi.Input[
|
595
|
-
token_period: Optional[pulumi.Input[
|
596
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
597
|
-
token_ttl: Optional[pulumi.Input[
|
598
|
-
token_type: Optional[pulumi.Input[
|
582
|
+
alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
|
583
|
+
audience: Optional[pulumi.Input[_builtins.str]] = None,
|
584
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
585
|
+
bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
586
|
+
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
587
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
588
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
589
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
590
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
591
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
592
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
593
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
594
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
595
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
596
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
597
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
599
598
|
__props__=None):
|
600
599
|
"""
|
601
600
|
Manages an Kubernetes auth backend role in a Vault server. See the [Vault
|
@@ -633,30 +632,30 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
633
632
|
|
634
633
|
:param str resource_name: The name of the resource.
|
635
634
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
636
|
-
:param pulumi.Input[
|
635
|
+
:param pulumi.Input[_builtins.str] alias_name_source: Configures how identity aliases are generated.
|
637
636
|
Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
|
638
|
-
:param pulumi.Input[
|
637
|
+
:param pulumi.Input[_builtins.str] audience: Audience claim to verify in the JWT.
|
639
638
|
|
640
639
|
> Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
|
641
640
|
before setting this to something other its default value. There are **important** security
|
642
641
|
implications to be aware of.
|
643
|
-
:param pulumi.Input[
|
644
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
645
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
646
|
-
:param pulumi.Input[
|
642
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
|
643
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
644
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
645
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
647
646
|
The value should not contain leading or trailing forward slashes.
|
648
647
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
649
648
|
*Available only for Vault Enterprise*.
|
650
|
-
:param pulumi.Input[
|
651
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
652
|
-
:param pulumi.Input[
|
653
|
-
:param pulumi.Input[
|
654
|
-
:param pulumi.Input[
|
655
|
-
:param pulumi.Input[
|
656
|
-
:param pulumi.Input[
|
657
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
658
|
-
:param pulumi.Input[
|
659
|
-
:param pulumi.Input[
|
649
|
+
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
650
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
651
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
652
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
653
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
654
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
655
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
656
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
657
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
658
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
660
659
|
"""
|
661
660
|
...
|
662
661
|
@overload
|
@@ -713,22 +712,22 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
713
712
|
def _internal_init(__self__,
|
714
713
|
resource_name: str,
|
715
714
|
opts: Optional[pulumi.ResourceOptions] = None,
|
716
|
-
alias_name_source: Optional[pulumi.Input[
|
717
|
-
audience: Optional[pulumi.Input[
|
718
|
-
backend: Optional[pulumi.Input[
|
719
|
-
bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
720
|
-
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[
|
721
|
-
namespace: Optional[pulumi.Input[
|
722
|
-
role_name: Optional[pulumi.Input[
|
723
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
724
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
725
|
-
token_max_ttl: Optional[pulumi.Input[
|
726
|
-
token_no_default_policy: Optional[pulumi.Input[
|
727
|
-
token_num_uses: Optional[pulumi.Input[
|
728
|
-
token_period: Optional[pulumi.Input[
|
729
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
730
|
-
token_ttl: Optional[pulumi.Input[
|
731
|
-
token_type: Optional[pulumi.Input[
|
715
|
+
alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
|
716
|
+
audience: Optional[pulumi.Input[_builtins.str]] = None,
|
717
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
718
|
+
bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
719
|
+
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
720
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
721
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
722
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
723
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
724
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
725
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
726
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
727
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
728
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
729
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
730
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
732
731
|
__props__=None):
|
733
732
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
734
733
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -770,22 +769,22 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
770
769
|
def get(resource_name: str,
|
771
770
|
id: pulumi.Input[str],
|
772
771
|
opts: Optional[pulumi.ResourceOptions] = None,
|
773
|
-
alias_name_source: Optional[pulumi.Input[
|
774
|
-
audience: Optional[pulumi.Input[
|
775
|
-
backend: Optional[pulumi.Input[
|
776
|
-
bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
777
|
-
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[
|
778
|
-
namespace: Optional[pulumi.Input[
|
779
|
-
role_name: Optional[pulumi.Input[
|
780
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
781
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
782
|
-
token_max_ttl: Optional[pulumi.Input[
|
783
|
-
token_no_default_policy: Optional[pulumi.Input[
|
784
|
-
token_num_uses: Optional[pulumi.Input[
|
785
|
-
token_period: Optional[pulumi.Input[
|
786
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
787
|
-
token_ttl: Optional[pulumi.Input[
|
788
|
-
token_type: Optional[pulumi.Input[
|
772
|
+
alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
|
773
|
+
audience: Optional[pulumi.Input[_builtins.str]] = None,
|
774
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
775
|
+
bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
776
|
+
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
777
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
778
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
779
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
780
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
781
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
782
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
783
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
784
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
785
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
786
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
787
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRole':
|
789
788
|
"""
|
790
789
|
Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
|
791
790
|
properties used to qualify the lookup.
|
@@ -793,30 +792,30 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
793
792
|
:param str resource_name: The unique name of the resulting resource.
|
794
793
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
795
794
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
796
|
-
:param pulumi.Input[
|
795
|
+
:param pulumi.Input[_builtins.str] alias_name_source: Configures how identity aliases are generated.
|
797
796
|
Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
|
798
|
-
:param pulumi.Input[
|
797
|
+
:param pulumi.Input[_builtins.str] audience: Audience claim to verify in the JWT.
|
799
798
|
|
800
799
|
> Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
|
801
800
|
before setting this to something other its default value. There are **important** security
|
802
801
|
implications to be aware of.
|
803
|
-
:param pulumi.Input[
|
804
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
805
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
806
|
-
:param pulumi.Input[
|
802
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
|
803
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
804
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
805
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
807
806
|
The value should not contain leading or trailing forward slashes.
|
808
807
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
809
808
|
*Available only for Vault Enterprise*.
|
810
|
-
:param pulumi.Input[
|
811
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
812
|
-
:param pulumi.Input[
|
813
|
-
:param pulumi.Input[
|
814
|
-
:param pulumi.Input[
|
815
|
-
:param pulumi.Input[
|
816
|
-
:param pulumi.Input[
|
817
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
818
|
-
:param pulumi.Input[
|
819
|
-
:param pulumi.Input[
|
809
|
+
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
810
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
811
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
812
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
813
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
814
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
815
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
816
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
817
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
818
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
820
819
|
"""
|
821
820
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
822
821
|
|
@@ -840,18 +839,18 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
840
839
|
__props__.__dict__["token_type"] = token_type
|
841
840
|
return AuthBackendRole(resource_name, opts=opts, __props__=__props__)
|
842
841
|
|
843
|
-
@property
|
842
|
+
@_builtins.property
|
844
843
|
@pulumi.getter(name="aliasNameSource")
|
845
|
-
def alias_name_source(self) -> pulumi.Output[
|
844
|
+
def alias_name_source(self) -> pulumi.Output[_builtins.str]:
|
846
845
|
"""
|
847
846
|
Configures how identity aliases are generated.
|
848
847
|
Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
|
849
848
|
"""
|
850
849
|
return pulumi.get(self, "alias_name_source")
|
851
850
|
|
852
|
-
@property
|
851
|
+
@_builtins.property
|
853
852
|
@pulumi.getter
|
854
|
-
def audience(self) -> pulumi.Output[Optional[
|
853
|
+
def audience(self) -> pulumi.Output[Optional[_builtins.str]]:
|
855
854
|
"""
|
856
855
|
Audience claim to verify in the JWT.
|
857
856
|
|
@@ -861,33 +860,33 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
861
860
|
"""
|
862
861
|
return pulumi.get(self, "audience")
|
863
862
|
|
864
|
-
@property
|
863
|
+
@_builtins.property
|
865
864
|
@pulumi.getter
|
866
|
-
def backend(self) -> pulumi.Output[Optional[
|
865
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
867
866
|
"""
|
868
867
|
Unique name of the kubernetes backend to configure.
|
869
868
|
"""
|
870
869
|
return pulumi.get(self, "backend")
|
871
870
|
|
872
|
-
@property
|
871
|
+
@_builtins.property
|
873
872
|
@pulumi.getter(name="boundServiceAccountNames")
|
874
|
-
def bound_service_account_names(self) -> pulumi.Output[Sequence[
|
873
|
+
def bound_service_account_names(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
875
874
|
"""
|
876
875
|
List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
877
876
|
"""
|
878
877
|
return pulumi.get(self, "bound_service_account_names")
|
879
878
|
|
880
|
-
@property
|
879
|
+
@_builtins.property
|
881
880
|
@pulumi.getter(name="boundServiceAccountNamespaces")
|
882
|
-
def bound_service_account_namespaces(self) -> pulumi.Output[Sequence[
|
881
|
+
def bound_service_account_namespaces(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
883
882
|
"""
|
884
883
|
List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
885
884
|
"""
|
886
885
|
return pulumi.get(self, "bound_service_account_namespaces")
|
887
886
|
|
888
|
-
@property
|
887
|
+
@_builtins.property
|
889
888
|
@pulumi.getter
|
890
|
-
def namespace(self) -> pulumi.Output[Optional[
|
889
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
891
890
|
"""
|
892
891
|
The namespace to provision the resource in.
|
893
892
|
The value should not contain leading or trailing forward slashes.
|
@@ -896,81 +895,81 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
896
895
|
"""
|
897
896
|
return pulumi.get(self, "namespace")
|
898
897
|
|
899
|
-
@property
|
898
|
+
@_builtins.property
|
900
899
|
@pulumi.getter(name="roleName")
|
901
|
-
def role_name(self) -> pulumi.Output[
|
900
|
+
def role_name(self) -> pulumi.Output[_builtins.str]:
|
902
901
|
"""
|
903
902
|
Name of the role.
|
904
903
|
"""
|
905
904
|
return pulumi.get(self, "role_name")
|
906
905
|
|
907
|
-
@property
|
906
|
+
@_builtins.property
|
908
907
|
@pulumi.getter(name="tokenBoundCidrs")
|
909
|
-
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[
|
908
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
910
909
|
"""
|
911
910
|
Specifies the blocks of IP addresses which are allowed to use the generated token
|
912
911
|
"""
|
913
912
|
return pulumi.get(self, "token_bound_cidrs")
|
914
913
|
|
915
|
-
@property
|
914
|
+
@_builtins.property
|
916
915
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
917
|
-
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[
|
916
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
918
917
|
"""
|
919
918
|
Generated Token's Explicit Maximum TTL in seconds
|
920
919
|
"""
|
921
920
|
return pulumi.get(self, "token_explicit_max_ttl")
|
922
921
|
|
923
|
-
@property
|
922
|
+
@_builtins.property
|
924
923
|
@pulumi.getter(name="tokenMaxTtl")
|
925
|
-
def token_max_ttl(self) -> pulumi.Output[Optional[
|
924
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
926
925
|
"""
|
927
926
|
The maximum lifetime of the generated token
|
928
927
|
"""
|
929
928
|
return pulumi.get(self, "token_max_ttl")
|
930
929
|
|
931
|
-
@property
|
930
|
+
@_builtins.property
|
932
931
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
933
|
-
def token_no_default_policy(self) -> pulumi.Output[Optional[
|
932
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
934
933
|
"""
|
935
934
|
If true, the 'default' policy will not automatically be added to generated tokens
|
936
935
|
"""
|
937
936
|
return pulumi.get(self, "token_no_default_policy")
|
938
937
|
|
939
|
-
@property
|
938
|
+
@_builtins.property
|
940
939
|
@pulumi.getter(name="tokenNumUses")
|
941
|
-
def token_num_uses(self) -> pulumi.Output[Optional[
|
940
|
+
def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
|
942
941
|
"""
|
943
942
|
The maximum number of times a token may be used, a value of zero means unlimited
|
944
943
|
"""
|
945
944
|
return pulumi.get(self, "token_num_uses")
|
946
945
|
|
947
|
-
@property
|
946
|
+
@_builtins.property
|
948
947
|
@pulumi.getter(name="tokenPeriod")
|
949
|
-
def token_period(self) -> pulumi.Output[Optional[
|
948
|
+
def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
950
949
|
"""
|
951
950
|
Generated Token's Period
|
952
951
|
"""
|
953
952
|
return pulumi.get(self, "token_period")
|
954
953
|
|
955
|
-
@property
|
954
|
+
@_builtins.property
|
956
955
|
@pulumi.getter(name="tokenPolicies")
|
957
|
-
def token_policies(self) -> pulumi.Output[Optional[Sequence[
|
956
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
958
957
|
"""
|
959
958
|
Generated Token's Policies
|
960
959
|
"""
|
961
960
|
return pulumi.get(self, "token_policies")
|
962
961
|
|
963
|
-
@property
|
962
|
+
@_builtins.property
|
964
963
|
@pulumi.getter(name="tokenTtl")
|
965
|
-
def token_ttl(self) -> pulumi.Output[Optional[
|
964
|
+
def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
966
965
|
"""
|
967
966
|
The initial ttl of the token to generate in seconds
|
968
967
|
"""
|
969
968
|
return pulumi.get(self, "token_ttl")
|
970
969
|
|
971
|
-
@property
|
970
|
+
@_builtins.property
|
972
971
|
@pulumi.getter(name="tokenType")
|
973
|
-
def token_type(self) -> pulumi.Output[Optional[
|
972
|
+
def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
974
973
|
"""
|
975
974
|
The type of token to generate, service or batch
|
976
975
|
"""
|