pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,62 +21,62 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class AuthBackendArgs:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
organization: pulumi.Input[
|
26
|
-
base_url: Optional[pulumi.Input[
|
27
|
-
description: Optional[pulumi.Input[
|
28
|
-
disable_remount: Optional[pulumi.Input[
|
29
|
-
namespace: Optional[pulumi.Input[
|
30
|
-
organization_id: Optional[pulumi.Input[
|
31
|
-
path: Optional[pulumi.Input[
|
32
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
33
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
34
|
-
token_max_ttl: Optional[pulumi.Input[
|
35
|
-
token_no_default_policy: Optional[pulumi.Input[
|
36
|
-
token_num_uses: Optional[pulumi.Input[
|
37
|
-
token_period: Optional[pulumi.Input[
|
38
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
39
|
-
token_ttl: Optional[pulumi.Input[
|
40
|
-
token_type: Optional[pulumi.Input[
|
24
|
+
organization: pulumi.Input[_builtins.str],
|
25
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
28
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
organization_id: Optional[pulumi.Input[_builtins.int]] = None,
|
30
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
32
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
33
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
34
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
35
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
36
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
37
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
38
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
39
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
41
40
|
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
|
42
41
|
"""
|
43
42
|
The set of arguments for constructing a AuthBackend resource.
|
44
|
-
:param pulumi.Input[
|
45
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
|
44
|
+
:param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
|
46
45
|
are running GitHub Enterprise or an API-compatible authentication server.
|
47
|
-
:param pulumi.Input[
|
46
|
+
:param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
|
48
47
|
This overrides the current stored value, if any.
|
49
|
-
:param pulumi.Input[
|
48
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
50
49
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
51
|
-
:param pulumi.Input[
|
50
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
52
51
|
The value should not contain leading or trailing forward slashes.
|
53
52
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
54
53
|
*Available only for Vault Enterprise*.
|
55
|
-
:param pulumi.Input[
|
54
|
+
:param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
|
56
55
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
57
|
-
:param pulumi.Input[
|
56
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
58
57
|
if not specified.
|
59
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
58
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
60
59
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
61
60
|
as well.
|
62
|
-
:param pulumi.Input[
|
61
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
|
63
62
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
64
63
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
65
64
|
`token_max_ttl` would otherwise allow a renewal.
|
66
|
-
:param pulumi.Input[
|
65
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
67
66
|
Its current value will be referenced at renewal time.
|
68
|
-
:param pulumi.Input[
|
67
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
69
68
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
70
|
-
:param pulumi.Input[
|
69
|
+
:param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
71
70
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
72
|
-
:param pulumi.Input[
|
71
|
+
:param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
|
73
72
|
token generated using this role should never expire. The token should be renewed within the
|
74
73
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
75
74
|
value of this field. Specified in seconds.
|
76
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
75
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
77
76
|
on the auth method, this list may be supplemented by user/group/other values.
|
78
|
-
:param pulumi.Input[
|
77
|
+
:param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
79
78
|
Its current value will be referenced at renewal time.
|
80
|
-
:param pulumi.Input[
|
79
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
81
80
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
82
81
|
:param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
83
82
|
|
@@ -117,21 +116,21 @@ class AuthBackendArgs:
|
|
117
116
|
if tune is not None:
|
118
117
|
pulumi.set(__self__, "tune", tune)
|
119
118
|
|
120
|
-
@property
|
119
|
+
@_builtins.property
|
121
120
|
@pulumi.getter
|
122
|
-
def organization(self) -> pulumi.Input[
|
121
|
+
def organization(self) -> pulumi.Input[_builtins.str]:
|
123
122
|
"""
|
124
123
|
The organization configured users must be part of.
|
125
124
|
"""
|
126
125
|
return pulumi.get(self, "organization")
|
127
126
|
|
128
127
|
@organization.setter
|
129
|
-
def organization(self, value: pulumi.Input[
|
128
|
+
def organization(self, value: pulumi.Input[_builtins.str]):
|
130
129
|
pulumi.set(self, "organization", value)
|
131
130
|
|
132
|
-
@property
|
131
|
+
@_builtins.property
|
133
132
|
@pulumi.getter(name="baseUrl")
|
134
|
-
def base_url(self) -> Optional[pulumi.Input[
|
133
|
+
def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
135
134
|
"""
|
136
135
|
The API endpoint to use. Useful if you
|
137
136
|
are running GitHub Enterprise or an API-compatible authentication server.
|
@@ -139,12 +138,12 @@ class AuthBackendArgs:
|
|
139
138
|
return pulumi.get(self, "base_url")
|
140
139
|
|
141
140
|
@base_url.setter
|
142
|
-
def base_url(self, value: Optional[pulumi.Input[
|
141
|
+
def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
143
142
|
pulumi.set(self, "base_url", value)
|
144
143
|
|
145
|
-
@property
|
144
|
+
@_builtins.property
|
146
145
|
@pulumi.getter
|
147
|
-
def description(self) -> Optional[pulumi.Input[
|
146
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
148
147
|
"""
|
149
148
|
Specifies the description of the mount.
|
150
149
|
This overrides the current stored value, if any.
|
@@ -152,12 +151,12 @@ class AuthBackendArgs:
|
|
152
151
|
return pulumi.get(self, "description")
|
153
152
|
|
154
153
|
@description.setter
|
155
|
-
def description(self, value: Optional[pulumi.Input[
|
154
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
156
155
|
pulumi.set(self, "description", value)
|
157
156
|
|
158
|
-
@property
|
157
|
+
@_builtins.property
|
159
158
|
@pulumi.getter(name="disableRemount")
|
160
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
159
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
161
160
|
"""
|
162
161
|
If set, opts out of mount migration on path updates.
|
163
162
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -165,12 +164,12 @@ class AuthBackendArgs:
|
|
165
164
|
return pulumi.get(self, "disable_remount")
|
166
165
|
|
167
166
|
@disable_remount.setter
|
168
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
167
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
169
168
|
pulumi.set(self, "disable_remount", value)
|
170
169
|
|
171
|
-
@property
|
170
|
+
@_builtins.property
|
172
171
|
@pulumi.getter
|
173
|
-
def namespace(self) -> Optional[pulumi.Input[
|
172
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
174
173
|
"""
|
175
174
|
The namespace to provision the resource in.
|
176
175
|
The value should not contain leading or trailing forward slashes.
|
@@ -180,12 +179,12 @@ class AuthBackendArgs:
|
|
180
179
|
return pulumi.get(self, "namespace")
|
181
180
|
|
182
181
|
@namespace.setter
|
183
|
-
def namespace(self, value: Optional[pulumi.Input[
|
182
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
184
183
|
pulumi.set(self, "namespace", value)
|
185
184
|
|
186
|
-
@property
|
185
|
+
@_builtins.property
|
187
186
|
@pulumi.getter(name="organizationId")
|
188
|
-
def organization_id(self) -> Optional[pulumi.Input[
|
187
|
+
def organization_id(self) -> Optional[pulumi.Input[_builtins.int]]:
|
189
188
|
"""
|
190
189
|
The ID of the organization users must be part of.
|
191
190
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
@@ -193,12 +192,12 @@ class AuthBackendArgs:
|
|
193
192
|
return pulumi.get(self, "organization_id")
|
194
193
|
|
195
194
|
@organization_id.setter
|
196
|
-
def organization_id(self, value: Optional[pulumi.Input[
|
195
|
+
def organization_id(self, value: Optional[pulumi.Input[_builtins.int]]):
|
197
196
|
pulumi.set(self, "organization_id", value)
|
198
197
|
|
199
|
-
@property
|
198
|
+
@_builtins.property
|
200
199
|
@pulumi.getter
|
201
|
-
def path(self) -> Optional[pulumi.Input[
|
200
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
202
201
|
"""
|
203
202
|
Path where the auth backend is mounted. Defaults to `auth/github`
|
204
203
|
if not specified.
|
@@ -206,12 +205,12 @@ class AuthBackendArgs:
|
|
206
205
|
return pulumi.get(self, "path")
|
207
206
|
|
208
207
|
@path.setter
|
209
|
-
def path(self, value: Optional[pulumi.Input[
|
208
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
210
209
|
pulumi.set(self, "path", value)
|
211
210
|
|
212
|
-
@property
|
211
|
+
@_builtins.property
|
213
212
|
@pulumi.getter(name="tokenBoundCidrs")
|
214
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
213
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
215
214
|
"""
|
216
215
|
(Optional) List of CIDR blocks; if set, specifies blocks of IP
|
217
216
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
@@ -220,12 +219,12 @@ class AuthBackendArgs:
|
|
220
219
|
return pulumi.get(self, "token_bound_cidrs")
|
221
220
|
|
222
221
|
@token_bound_cidrs.setter
|
223
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
222
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
224
223
|
pulumi.set(self, "token_bound_cidrs", value)
|
225
224
|
|
226
|
-
@property
|
225
|
+
@_builtins.property
|
227
226
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
228
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
227
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
229
228
|
"""
|
230
229
|
(Optional) If set, will encode an
|
231
230
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
@@ -235,12 +234,12 @@ class AuthBackendArgs:
|
|
235
234
|
return pulumi.get(self, "token_explicit_max_ttl")
|
236
235
|
|
237
236
|
@token_explicit_max_ttl.setter
|
238
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
237
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
239
238
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
240
239
|
|
241
|
-
@property
|
240
|
+
@_builtins.property
|
242
241
|
@pulumi.getter(name="tokenMaxTtl")
|
243
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
242
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
244
243
|
"""
|
245
244
|
(Optional) The maximum lifetime for generated tokens in number of seconds.
|
246
245
|
Its current value will be referenced at renewal time.
|
@@ -248,12 +247,12 @@ class AuthBackendArgs:
|
|
248
247
|
return pulumi.get(self, "token_max_ttl")
|
249
248
|
|
250
249
|
@token_max_ttl.setter
|
251
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
250
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
252
251
|
pulumi.set(self, "token_max_ttl", value)
|
253
252
|
|
254
|
-
@property
|
253
|
+
@_builtins.property
|
255
254
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
256
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
255
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
257
256
|
"""
|
258
257
|
(Optional) If set, the default policy will not be set on
|
259
258
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
@@ -261,12 +260,12 @@ class AuthBackendArgs:
|
|
261
260
|
return pulumi.get(self, "token_no_default_policy")
|
262
261
|
|
263
262
|
@token_no_default_policy.setter
|
264
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
263
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
265
264
|
pulumi.set(self, "token_no_default_policy", value)
|
266
265
|
|
267
|
-
@property
|
266
|
+
@_builtins.property
|
268
267
|
@pulumi.getter(name="tokenNumUses")
|
269
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
268
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
270
269
|
"""
|
271
270
|
(Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
272
271
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
@@ -274,12 +273,12 @@ class AuthBackendArgs:
|
|
274
273
|
return pulumi.get(self, "token_num_uses")
|
275
274
|
|
276
275
|
@token_num_uses.setter
|
277
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
276
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
278
277
|
pulumi.set(self, "token_num_uses", value)
|
279
278
|
|
280
|
-
@property
|
279
|
+
@_builtins.property
|
281
280
|
@pulumi.getter(name="tokenPeriod")
|
282
|
-
def token_period(self) -> Optional[pulumi.Input[
|
281
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
283
282
|
"""
|
284
283
|
(Optional) If set, indicates that the
|
285
284
|
token generated using this role should never expire. The token should be renewed within the
|
@@ -289,12 +288,12 @@ class AuthBackendArgs:
|
|
289
288
|
return pulumi.get(self, "token_period")
|
290
289
|
|
291
290
|
@token_period.setter
|
292
|
-
def token_period(self, value: Optional[pulumi.Input[
|
291
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
293
292
|
pulumi.set(self, "token_period", value)
|
294
293
|
|
295
|
-
@property
|
294
|
+
@_builtins.property
|
296
295
|
@pulumi.getter(name="tokenPolicies")
|
297
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
296
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
298
297
|
"""
|
299
298
|
(Optional) List of policies to encode onto generated tokens. Depending
|
300
299
|
on the auth method, this list may be supplemented by user/group/other values.
|
@@ -302,12 +301,12 @@ class AuthBackendArgs:
|
|
302
301
|
return pulumi.get(self, "token_policies")
|
303
302
|
|
304
303
|
@token_policies.setter
|
305
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
304
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
306
305
|
pulumi.set(self, "token_policies", value)
|
307
306
|
|
308
|
-
@property
|
307
|
+
@_builtins.property
|
309
308
|
@pulumi.getter(name="tokenTtl")
|
310
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
309
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
311
310
|
"""
|
312
311
|
(Optional) The incremental lifetime for generated tokens in number of seconds.
|
313
312
|
Its current value will be referenced at renewal time.
|
@@ -315,12 +314,12 @@ class AuthBackendArgs:
|
|
315
314
|
return pulumi.get(self, "token_ttl")
|
316
315
|
|
317
316
|
@token_ttl.setter
|
318
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
317
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
319
318
|
pulumi.set(self, "token_ttl", value)
|
320
319
|
|
321
|
-
@property
|
320
|
+
@_builtins.property
|
322
321
|
@pulumi.getter(name="tokenType")
|
323
|
-
def token_type(self) -> Optional[pulumi.Input[
|
322
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
324
323
|
"""
|
325
324
|
Specifies the type of tokens that should be returned by
|
326
325
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -328,10 +327,10 @@ class AuthBackendArgs:
|
|
328
327
|
return pulumi.get(self, "token_type")
|
329
328
|
|
330
329
|
@token_type.setter
|
331
|
-
def token_type(self, value: Optional[pulumi.Input[
|
330
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
332
331
|
pulumi.set(self, "token_type", value)
|
333
332
|
|
334
|
-
@property
|
333
|
+
@_builtins.property
|
335
334
|
@pulumi.getter
|
336
335
|
def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
|
337
336
|
"""
|
@@ -349,64 +348,64 @@ class AuthBackendArgs:
|
|
349
348
|
@pulumi.input_type
|
350
349
|
class _AuthBackendState:
|
351
350
|
def __init__(__self__, *,
|
352
|
-
accessor: Optional[pulumi.Input[
|
353
|
-
base_url: Optional[pulumi.Input[
|
354
|
-
description: Optional[pulumi.Input[
|
355
|
-
disable_remount: Optional[pulumi.Input[
|
356
|
-
namespace: Optional[pulumi.Input[
|
357
|
-
organization: Optional[pulumi.Input[
|
358
|
-
organization_id: Optional[pulumi.Input[
|
359
|
-
path: Optional[pulumi.Input[
|
360
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
361
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
362
|
-
token_max_ttl: Optional[pulumi.Input[
|
363
|
-
token_no_default_policy: Optional[pulumi.Input[
|
364
|
-
token_num_uses: Optional[pulumi.Input[
|
365
|
-
token_period: Optional[pulumi.Input[
|
366
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
367
|
-
token_ttl: Optional[pulumi.Input[
|
368
|
-
token_type: Optional[pulumi.Input[
|
351
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
352
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
353
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
354
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
355
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
356
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
357
|
+
organization_id: Optional[pulumi.Input[_builtins.int]] = None,
|
358
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
359
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
360
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
361
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
362
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
363
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
364
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
365
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
366
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
367
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
369
368
|
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
|
370
369
|
"""
|
371
370
|
Input properties used for looking up and filtering AuthBackend resources.
|
372
|
-
:param pulumi.Input[
|
373
|
-
:param pulumi.Input[
|
371
|
+
:param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
372
|
+
:param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
|
374
373
|
are running GitHub Enterprise or an API-compatible authentication server.
|
375
|
-
:param pulumi.Input[
|
374
|
+
:param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
|
376
375
|
This overrides the current stored value, if any.
|
377
|
-
:param pulumi.Input[
|
376
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
378
377
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
379
|
-
:param pulumi.Input[
|
378
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
380
379
|
The value should not contain leading or trailing forward slashes.
|
381
380
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
382
381
|
*Available only for Vault Enterprise*.
|
383
|
-
:param pulumi.Input[
|
384
|
-
:param pulumi.Input[
|
382
|
+
:param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
|
383
|
+
:param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
|
385
384
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
386
|
-
:param pulumi.Input[
|
385
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
387
386
|
if not specified.
|
388
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
387
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
389
388
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
390
389
|
as well.
|
391
|
-
:param pulumi.Input[
|
390
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
|
392
391
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
393
392
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
394
393
|
`token_max_ttl` would otherwise allow a renewal.
|
395
|
-
:param pulumi.Input[
|
394
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
396
395
|
Its current value will be referenced at renewal time.
|
397
|
-
:param pulumi.Input[
|
396
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
398
397
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
399
|
-
:param pulumi.Input[
|
398
|
+
:param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
400
399
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
401
|
-
:param pulumi.Input[
|
400
|
+
:param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
|
402
401
|
token generated using this role should never expire. The token should be renewed within the
|
403
402
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
404
403
|
value of this field. Specified in seconds.
|
405
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
404
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
406
405
|
on the auth method, this list may be supplemented by user/group/other values.
|
407
|
-
:param pulumi.Input[
|
406
|
+
:param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
408
407
|
Its current value will be referenced at renewal time.
|
409
|
-
:param pulumi.Input[
|
408
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
410
409
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
411
410
|
:param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
412
411
|
|
@@ -449,21 +448,21 @@ class _AuthBackendState:
|
|
449
448
|
if tune is not None:
|
450
449
|
pulumi.set(__self__, "tune", tune)
|
451
450
|
|
452
|
-
@property
|
451
|
+
@_builtins.property
|
453
452
|
@pulumi.getter
|
454
|
-
def accessor(self) -> Optional[pulumi.Input[
|
453
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
455
454
|
"""
|
456
455
|
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
457
456
|
"""
|
458
457
|
return pulumi.get(self, "accessor")
|
459
458
|
|
460
459
|
@accessor.setter
|
461
|
-
def accessor(self, value: Optional[pulumi.Input[
|
460
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
462
461
|
pulumi.set(self, "accessor", value)
|
463
462
|
|
464
|
-
@property
|
463
|
+
@_builtins.property
|
465
464
|
@pulumi.getter(name="baseUrl")
|
466
|
-
def base_url(self) -> Optional[pulumi.Input[
|
465
|
+
def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
467
466
|
"""
|
468
467
|
The API endpoint to use. Useful if you
|
469
468
|
are running GitHub Enterprise or an API-compatible authentication server.
|
@@ -471,12 +470,12 @@ class _AuthBackendState:
|
|
471
470
|
return pulumi.get(self, "base_url")
|
472
471
|
|
473
472
|
@base_url.setter
|
474
|
-
def base_url(self, value: Optional[pulumi.Input[
|
473
|
+
def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
475
474
|
pulumi.set(self, "base_url", value)
|
476
475
|
|
477
|
-
@property
|
476
|
+
@_builtins.property
|
478
477
|
@pulumi.getter
|
479
|
-
def description(self) -> Optional[pulumi.Input[
|
478
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
480
479
|
"""
|
481
480
|
Specifies the description of the mount.
|
482
481
|
This overrides the current stored value, if any.
|
@@ -484,12 +483,12 @@ class _AuthBackendState:
|
|
484
483
|
return pulumi.get(self, "description")
|
485
484
|
|
486
485
|
@description.setter
|
487
|
-
def description(self, value: Optional[pulumi.Input[
|
486
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
488
487
|
pulumi.set(self, "description", value)
|
489
488
|
|
490
|
-
@property
|
489
|
+
@_builtins.property
|
491
490
|
@pulumi.getter(name="disableRemount")
|
492
|
-
def disable_remount(self) -> Optional[pulumi.Input[
|
491
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
493
492
|
"""
|
494
493
|
If set, opts out of mount migration on path updates.
|
495
494
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
@@ -497,12 +496,12 @@ class _AuthBackendState:
|
|
497
496
|
return pulumi.get(self, "disable_remount")
|
498
497
|
|
499
498
|
@disable_remount.setter
|
500
|
-
def disable_remount(self, value: Optional[pulumi.Input[
|
499
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
501
500
|
pulumi.set(self, "disable_remount", value)
|
502
501
|
|
503
|
-
@property
|
502
|
+
@_builtins.property
|
504
503
|
@pulumi.getter
|
505
|
-
def namespace(self) -> Optional[pulumi.Input[
|
504
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
506
505
|
"""
|
507
506
|
The namespace to provision the resource in.
|
508
507
|
The value should not contain leading or trailing forward slashes.
|
@@ -512,24 +511,24 @@ class _AuthBackendState:
|
|
512
511
|
return pulumi.get(self, "namespace")
|
513
512
|
|
514
513
|
@namespace.setter
|
515
|
-
def namespace(self, value: Optional[pulumi.Input[
|
514
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
516
515
|
pulumi.set(self, "namespace", value)
|
517
516
|
|
518
|
-
@property
|
517
|
+
@_builtins.property
|
519
518
|
@pulumi.getter
|
520
|
-
def organization(self) -> Optional[pulumi.Input[
|
519
|
+
def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
|
521
520
|
"""
|
522
521
|
The organization configured users must be part of.
|
523
522
|
"""
|
524
523
|
return pulumi.get(self, "organization")
|
525
524
|
|
526
525
|
@organization.setter
|
527
|
-
def organization(self, value: Optional[pulumi.Input[
|
526
|
+
def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
|
528
527
|
pulumi.set(self, "organization", value)
|
529
528
|
|
530
|
-
@property
|
529
|
+
@_builtins.property
|
531
530
|
@pulumi.getter(name="organizationId")
|
532
|
-
def organization_id(self) -> Optional[pulumi.Input[
|
531
|
+
def organization_id(self) -> Optional[pulumi.Input[_builtins.int]]:
|
533
532
|
"""
|
534
533
|
The ID of the organization users must be part of.
|
535
534
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
@@ -537,12 +536,12 @@ class _AuthBackendState:
|
|
537
536
|
return pulumi.get(self, "organization_id")
|
538
537
|
|
539
538
|
@organization_id.setter
|
540
|
-
def organization_id(self, value: Optional[pulumi.Input[
|
539
|
+
def organization_id(self, value: Optional[pulumi.Input[_builtins.int]]):
|
541
540
|
pulumi.set(self, "organization_id", value)
|
542
541
|
|
543
|
-
@property
|
542
|
+
@_builtins.property
|
544
543
|
@pulumi.getter
|
545
|
-
def path(self) -> Optional[pulumi.Input[
|
544
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
546
545
|
"""
|
547
546
|
Path where the auth backend is mounted. Defaults to `auth/github`
|
548
547
|
if not specified.
|
@@ -550,12 +549,12 @@ class _AuthBackendState:
|
|
550
549
|
return pulumi.get(self, "path")
|
551
550
|
|
552
551
|
@path.setter
|
553
|
-
def path(self, value: Optional[pulumi.Input[
|
552
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
554
553
|
pulumi.set(self, "path", value)
|
555
554
|
|
556
|
-
@property
|
555
|
+
@_builtins.property
|
557
556
|
@pulumi.getter(name="tokenBoundCidrs")
|
558
|
-
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
557
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
559
558
|
"""
|
560
559
|
(Optional) List of CIDR blocks; if set, specifies blocks of IP
|
561
560
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
@@ -564,12 +563,12 @@ class _AuthBackendState:
|
|
564
563
|
return pulumi.get(self, "token_bound_cidrs")
|
565
564
|
|
566
565
|
@token_bound_cidrs.setter
|
567
|
-
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
566
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
568
567
|
pulumi.set(self, "token_bound_cidrs", value)
|
569
568
|
|
570
|
-
@property
|
569
|
+
@_builtins.property
|
571
570
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
572
|
-
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[
|
571
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
573
572
|
"""
|
574
573
|
(Optional) If set, will encode an
|
575
574
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
@@ -579,12 +578,12 @@ class _AuthBackendState:
|
|
579
578
|
return pulumi.get(self, "token_explicit_max_ttl")
|
580
579
|
|
581
580
|
@token_explicit_max_ttl.setter
|
582
|
-
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[
|
581
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
583
582
|
pulumi.set(self, "token_explicit_max_ttl", value)
|
584
583
|
|
585
|
-
@property
|
584
|
+
@_builtins.property
|
586
585
|
@pulumi.getter(name="tokenMaxTtl")
|
587
|
-
def token_max_ttl(self) -> Optional[pulumi.Input[
|
586
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
588
587
|
"""
|
589
588
|
(Optional) The maximum lifetime for generated tokens in number of seconds.
|
590
589
|
Its current value will be referenced at renewal time.
|
@@ -592,12 +591,12 @@ class _AuthBackendState:
|
|
592
591
|
return pulumi.get(self, "token_max_ttl")
|
593
592
|
|
594
593
|
@token_max_ttl.setter
|
595
|
-
def token_max_ttl(self, value: Optional[pulumi.Input[
|
594
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
596
595
|
pulumi.set(self, "token_max_ttl", value)
|
597
596
|
|
598
|
-
@property
|
597
|
+
@_builtins.property
|
599
598
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
600
|
-
def token_no_default_policy(self) -> Optional[pulumi.Input[
|
599
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
601
600
|
"""
|
602
601
|
(Optional) If set, the default policy will not be set on
|
603
602
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
@@ -605,12 +604,12 @@ class _AuthBackendState:
|
|
605
604
|
return pulumi.get(self, "token_no_default_policy")
|
606
605
|
|
607
606
|
@token_no_default_policy.setter
|
608
|
-
def token_no_default_policy(self, value: Optional[pulumi.Input[
|
607
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
609
608
|
pulumi.set(self, "token_no_default_policy", value)
|
610
609
|
|
611
|
-
@property
|
610
|
+
@_builtins.property
|
612
611
|
@pulumi.getter(name="tokenNumUses")
|
613
|
-
def token_num_uses(self) -> Optional[pulumi.Input[
|
612
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
614
613
|
"""
|
615
614
|
(Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
616
615
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
@@ -618,12 +617,12 @@ class _AuthBackendState:
|
|
618
617
|
return pulumi.get(self, "token_num_uses")
|
619
618
|
|
620
619
|
@token_num_uses.setter
|
621
|
-
def token_num_uses(self, value: Optional[pulumi.Input[
|
620
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
622
621
|
pulumi.set(self, "token_num_uses", value)
|
623
622
|
|
624
|
-
@property
|
623
|
+
@_builtins.property
|
625
624
|
@pulumi.getter(name="tokenPeriod")
|
626
|
-
def token_period(self) -> Optional[pulumi.Input[
|
625
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
627
626
|
"""
|
628
627
|
(Optional) If set, indicates that the
|
629
628
|
token generated using this role should never expire. The token should be renewed within the
|
@@ -633,12 +632,12 @@ class _AuthBackendState:
|
|
633
632
|
return pulumi.get(self, "token_period")
|
634
633
|
|
635
634
|
@token_period.setter
|
636
|
-
def token_period(self, value: Optional[pulumi.Input[
|
635
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
637
636
|
pulumi.set(self, "token_period", value)
|
638
637
|
|
639
|
-
@property
|
638
|
+
@_builtins.property
|
640
639
|
@pulumi.getter(name="tokenPolicies")
|
641
|
-
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
640
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
642
641
|
"""
|
643
642
|
(Optional) List of policies to encode onto generated tokens. Depending
|
644
643
|
on the auth method, this list may be supplemented by user/group/other values.
|
@@ -646,12 +645,12 @@ class _AuthBackendState:
|
|
646
645
|
return pulumi.get(self, "token_policies")
|
647
646
|
|
648
647
|
@token_policies.setter
|
649
|
-
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
648
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
650
649
|
pulumi.set(self, "token_policies", value)
|
651
650
|
|
652
|
-
@property
|
651
|
+
@_builtins.property
|
653
652
|
@pulumi.getter(name="tokenTtl")
|
654
|
-
def token_ttl(self) -> Optional[pulumi.Input[
|
653
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
655
654
|
"""
|
656
655
|
(Optional) The incremental lifetime for generated tokens in number of seconds.
|
657
656
|
Its current value will be referenced at renewal time.
|
@@ -659,12 +658,12 @@ class _AuthBackendState:
|
|
659
658
|
return pulumi.get(self, "token_ttl")
|
660
659
|
|
661
660
|
@token_ttl.setter
|
662
|
-
def token_ttl(self, value: Optional[pulumi.Input[
|
661
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
663
662
|
pulumi.set(self, "token_ttl", value)
|
664
663
|
|
665
|
-
@property
|
664
|
+
@_builtins.property
|
666
665
|
@pulumi.getter(name="tokenType")
|
667
|
-
def token_type(self) -> Optional[pulumi.Input[
|
666
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
668
667
|
"""
|
669
668
|
Specifies the type of tokens that should be returned by
|
670
669
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
@@ -672,10 +671,10 @@ class _AuthBackendState:
|
|
672
671
|
return pulumi.get(self, "token_type")
|
673
672
|
|
674
673
|
@token_type.setter
|
675
|
-
def token_type(self, value: Optional[pulumi.Input[
|
674
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
676
675
|
pulumi.set(self, "token_type", value)
|
677
676
|
|
678
|
-
@property
|
677
|
+
@_builtins.property
|
679
678
|
@pulumi.getter
|
680
679
|
def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
|
681
680
|
"""
|
@@ -696,22 +695,22 @@ class AuthBackend(pulumi.CustomResource):
|
|
696
695
|
def __init__(__self__,
|
697
696
|
resource_name: str,
|
698
697
|
opts: Optional[pulumi.ResourceOptions] = None,
|
699
|
-
base_url: Optional[pulumi.Input[
|
700
|
-
description: Optional[pulumi.Input[
|
701
|
-
disable_remount: Optional[pulumi.Input[
|
702
|
-
namespace: Optional[pulumi.Input[
|
703
|
-
organization: Optional[pulumi.Input[
|
704
|
-
organization_id: Optional[pulumi.Input[
|
705
|
-
path: Optional[pulumi.Input[
|
706
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
707
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
708
|
-
token_max_ttl: Optional[pulumi.Input[
|
709
|
-
token_no_default_policy: Optional[pulumi.Input[
|
710
|
-
token_num_uses: Optional[pulumi.Input[
|
711
|
-
token_period: Optional[pulumi.Input[
|
712
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
713
|
-
token_ttl: Optional[pulumi.Input[
|
714
|
-
token_type: Optional[pulumi.Input[
|
698
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
699
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
700
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
701
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
702
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
703
|
+
organization_id: Optional[pulumi.Input[_builtins.int]] = None,
|
704
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
705
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
706
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
707
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
708
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
709
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
710
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
711
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
712
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
713
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
715
714
|
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
716
715
|
__props__=None):
|
717
716
|
"""
|
@@ -738,43 +737,43 @@ class AuthBackend(pulumi.CustomResource):
|
|
738
737
|
|
739
738
|
:param str resource_name: The name of the resource.
|
740
739
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
741
|
-
:param pulumi.Input[
|
740
|
+
:param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
|
742
741
|
are running GitHub Enterprise or an API-compatible authentication server.
|
743
|
-
:param pulumi.Input[
|
742
|
+
:param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
|
744
743
|
This overrides the current stored value, if any.
|
745
|
-
:param pulumi.Input[
|
744
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
746
745
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
747
|
-
:param pulumi.Input[
|
746
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
748
747
|
The value should not contain leading or trailing forward slashes.
|
749
748
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
750
749
|
*Available only for Vault Enterprise*.
|
751
|
-
:param pulumi.Input[
|
752
|
-
:param pulumi.Input[
|
750
|
+
:param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
|
751
|
+
:param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
|
753
752
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
754
|
-
:param pulumi.Input[
|
753
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
755
754
|
if not specified.
|
756
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
755
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
757
756
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
758
757
|
as well.
|
759
|
-
:param pulumi.Input[
|
758
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
|
760
759
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
761
760
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
762
761
|
`token_max_ttl` would otherwise allow a renewal.
|
763
|
-
:param pulumi.Input[
|
762
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
764
763
|
Its current value will be referenced at renewal time.
|
765
|
-
:param pulumi.Input[
|
764
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
766
765
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
767
|
-
:param pulumi.Input[
|
766
|
+
:param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
768
767
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
769
|
-
:param pulumi.Input[
|
768
|
+
:param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
|
770
769
|
token generated using this role should never expire. The token should be renewed within the
|
771
770
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
772
771
|
value of this field. Specified in seconds.
|
773
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
772
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
774
773
|
on the auth method, this list may be supplemented by user/group/other values.
|
775
|
-
:param pulumi.Input[
|
774
|
+
:param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
776
775
|
Its current value will be referenced at renewal time.
|
777
|
-
:param pulumi.Input[
|
776
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
778
777
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
779
778
|
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
780
779
|
|
@@ -823,22 +822,22 @@ class AuthBackend(pulumi.CustomResource):
|
|
823
822
|
def _internal_init(__self__,
|
824
823
|
resource_name: str,
|
825
824
|
opts: Optional[pulumi.ResourceOptions] = None,
|
826
|
-
base_url: Optional[pulumi.Input[
|
827
|
-
description: Optional[pulumi.Input[
|
828
|
-
disable_remount: Optional[pulumi.Input[
|
829
|
-
namespace: Optional[pulumi.Input[
|
830
|
-
organization: Optional[pulumi.Input[
|
831
|
-
organization_id: Optional[pulumi.Input[
|
832
|
-
path: Optional[pulumi.Input[
|
833
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
834
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
835
|
-
token_max_ttl: Optional[pulumi.Input[
|
836
|
-
token_no_default_policy: Optional[pulumi.Input[
|
837
|
-
token_num_uses: Optional[pulumi.Input[
|
838
|
-
token_period: Optional[pulumi.Input[
|
839
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
840
|
-
token_ttl: Optional[pulumi.Input[
|
841
|
-
token_type: Optional[pulumi.Input[
|
825
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
826
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
827
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
828
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
829
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
830
|
+
organization_id: Optional[pulumi.Input[_builtins.int]] = None,
|
831
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
832
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
833
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
834
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
835
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
836
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
837
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
838
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
839
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
840
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
842
841
|
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
843
842
|
__props__=None):
|
844
843
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -879,23 +878,23 @@ class AuthBackend(pulumi.CustomResource):
|
|
879
878
|
def get(resource_name: str,
|
880
879
|
id: pulumi.Input[str],
|
881
880
|
opts: Optional[pulumi.ResourceOptions] = None,
|
882
|
-
accessor: Optional[pulumi.Input[
|
883
|
-
base_url: Optional[pulumi.Input[
|
884
|
-
description: Optional[pulumi.Input[
|
885
|
-
disable_remount: Optional[pulumi.Input[
|
886
|
-
namespace: Optional[pulumi.Input[
|
887
|
-
organization: Optional[pulumi.Input[
|
888
|
-
organization_id: Optional[pulumi.Input[
|
889
|
-
path: Optional[pulumi.Input[
|
890
|
-
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[
|
891
|
-
token_explicit_max_ttl: Optional[pulumi.Input[
|
892
|
-
token_max_ttl: Optional[pulumi.Input[
|
893
|
-
token_no_default_policy: Optional[pulumi.Input[
|
894
|
-
token_num_uses: Optional[pulumi.Input[
|
895
|
-
token_period: Optional[pulumi.Input[
|
896
|
-
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[
|
897
|
-
token_ttl: Optional[pulumi.Input[
|
898
|
-
token_type: Optional[pulumi.Input[
|
881
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
882
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
883
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
884
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
885
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
886
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
887
|
+
organization_id: Optional[pulumi.Input[_builtins.int]] = None,
|
888
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
889
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
890
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
891
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
892
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
893
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
894
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
895
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
896
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
897
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
899
898
|
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
|
900
899
|
"""
|
901
900
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
@@ -904,44 +903,44 @@ class AuthBackend(pulumi.CustomResource):
|
|
904
903
|
:param str resource_name: The unique name of the resulting resource.
|
905
904
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
906
905
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
907
|
-
:param pulumi.Input[
|
908
|
-
:param pulumi.Input[
|
906
|
+
:param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
907
|
+
:param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
|
909
908
|
are running GitHub Enterprise or an API-compatible authentication server.
|
910
|
-
:param pulumi.Input[
|
909
|
+
:param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
|
911
910
|
This overrides the current stored value, if any.
|
912
|
-
:param pulumi.Input[
|
911
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
913
912
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
914
|
-
:param pulumi.Input[
|
913
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
915
914
|
The value should not contain leading or trailing forward slashes.
|
916
915
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
917
916
|
*Available only for Vault Enterprise*.
|
918
|
-
:param pulumi.Input[
|
919
|
-
:param pulumi.Input[
|
917
|
+
:param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
|
918
|
+
:param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
|
920
919
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
921
|
-
:param pulumi.Input[
|
920
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
922
921
|
if not specified.
|
923
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
922
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
924
923
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
925
924
|
as well.
|
926
|
-
:param pulumi.Input[
|
925
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
|
927
926
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
928
927
|
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
929
928
|
`token_max_ttl` would otherwise allow a renewal.
|
930
|
-
:param pulumi.Input[
|
929
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
931
930
|
Its current value will be referenced at renewal time.
|
932
|
-
:param pulumi.Input[
|
931
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
933
932
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
934
|
-
:param pulumi.Input[
|
933
|
+
:param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
935
934
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
936
|
-
:param pulumi.Input[
|
935
|
+
:param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
|
937
936
|
token generated using this role should never expire. The token should be renewed within the
|
938
937
|
duration specified by this value. At each renewal, the token's TTL will be set to the
|
939
938
|
value of this field. Specified in seconds.
|
940
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
939
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
941
940
|
on the auth method, this list may be supplemented by user/group/other values.
|
942
|
-
:param pulumi.Input[
|
941
|
+
:param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
943
942
|
Its current value will be referenced at renewal time.
|
944
|
-
:param pulumi.Input[
|
943
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
945
944
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
946
945
|
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
947
946
|
|
@@ -971,44 +970,44 @@ class AuthBackend(pulumi.CustomResource):
|
|
971
970
|
__props__.__dict__["tune"] = tune
|
972
971
|
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
973
972
|
|
974
|
-
@property
|
973
|
+
@_builtins.property
|
975
974
|
@pulumi.getter
|
976
|
-
def accessor(self) -> pulumi.Output[
|
975
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
977
976
|
"""
|
978
977
|
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
979
978
|
"""
|
980
979
|
return pulumi.get(self, "accessor")
|
981
980
|
|
982
|
-
@property
|
981
|
+
@_builtins.property
|
983
982
|
@pulumi.getter(name="baseUrl")
|
984
|
-
def base_url(self) -> pulumi.Output[Optional[
|
983
|
+
def base_url(self) -> pulumi.Output[Optional[_builtins.str]]:
|
985
984
|
"""
|
986
985
|
The API endpoint to use. Useful if you
|
987
986
|
are running GitHub Enterprise or an API-compatible authentication server.
|
988
987
|
"""
|
989
988
|
return pulumi.get(self, "base_url")
|
990
989
|
|
991
|
-
@property
|
990
|
+
@_builtins.property
|
992
991
|
@pulumi.getter
|
993
|
-
def description(self) -> pulumi.Output[Optional[
|
992
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
994
993
|
"""
|
995
994
|
Specifies the description of the mount.
|
996
995
|
This overrides the current stored value, if any.
|
997
996
|
"""
|
998
997
|
return pulumi.get(self, "description")
|
999
998
|
|
1000
|
-
@property
|
999
|
+
@_builtins.property
|
1001
1000
|
@pulumi.getter(name="disableRemount")
|
1002
|
-
def disable_remount(self) -> pulumi.Output[Optional[
|
1001
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1003
1002
|
"""
|
1004
1003
|
If set, opts out of mount migration on path updates.
|
1005
1004
|
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
1006
1005
|
"""
|
1007
1006
|
return pulumi.get(self, "disable_remount")
|
1008
1007
|
|
1009
|
-
@property
|
1008
|
+
@_builtins.property
|
1010
1009
|
@pulumi.getter
|
1011
|
-
def namespace(self) -> pulumi.Output[Optional[
|
1010
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1012
1011
|
"""
|
1013
1012
|
The namespace to provision the resource in.
|
1014
1013
|
The value should not contain leading or trailing forward slashes.
|
@@ -1017,35 +1016,35 @@ class AuthBackend(pulumi.CustomResource):
|
|
1017
1016
|
"""
|
1018
1017
|
return pulumi.get(self, "namespace")
|
1019
1018
|
|
1020
|
-
@property
|
1019
|
+
@_builtins.property
|
1021
1020
|
@pulumi.getter
|
1022
|
-
def organization(self) -> pulumi.Output[
|
1021
|
+
def organization(self) -> pulumi.Output[_builtins.str]:
|
1023
1022
|
"""
|
1024
1023
|
The organization configured users must be part of.
|
1025
1024
|
"""
|
1026
1025
|
return pulumi.get(self, "organization")
|
1027
1026
|
|
1028
|
-
@property
|
1027
|
+
@_builtins.property
|
1029
1028
|
@pulumi.getter(name="organizationId")
|
1030
|
-
def organization_id(self) -> pulumi.Output[
|
1029
|
+
def organization_id(self) -> pulumi.Output[_builtins.int]:
|
1031
1030
|
"""
|
1032
1031
|
The ID of the organization users must be part of.
|
1033
1032
|
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
1034
1033
|
"""
|
1035
1034
|
return pulumi.get(self, "organization_id")
|
1036
1035
|
|
1037
|
-
@property
|
1036
|
+
@_builtins.property
|
1038
1037
|
@pulumi.getter
|
1039
|
-
def path(self) -> pulumi.Output[Optional[
|
1038
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1040
1039
|
"""
|
1041
1040
|
Path where the auth backend is mounted. Defaults to `auth/github`
|
1042
1041
|
if not specified.
|
1043
1042
|
"""
|
1044
1043
|
return pulumi.get(self, "path")
|
1045
1044
|
|
1046
|
-
@property
|
1045
|
+
@_builtins.property
|
1047
1046
|
@pulumi.getter(name="tokenBoundCidrs")
|
1048
|
-
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[
|
1047
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1049
1048
|
"""
|
1050
1049
|
(Optional) List of CIDR blocks; if set, specifies blocks of IP
|
1051
1050
|
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
@@ -1053,9 +1052,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
1053
1052
|
"""
|
1054
1053
|
return pulumi.get(self, "token_bound_cidrs")
|
1055
1054
|
|
1056
|
-
@property
|
1055
|
+
@_builtins.property
|
1057
1056
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1058
|
-
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[
|
1057
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1059
1058
|
"""
|
1060
1059
|
(Optional) If set, will encode an
|
1061
1060
|
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
@@ -1064,36 +1063,36 @@ class AuthBackend(pulumi.CustomResource):
|
|
1064
1063
|
"""
|
1065
1064
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1066
1065
|
|
1067
|
-
@property
|
1066
|
+
@_builtins.property
|
1068
1067
|
@pulumi.getter(name="tokenMaxTtl")
|
1069
|
-
def token_max_ttl(self) -> pulumi.Output[Optional[
|
1068
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1070
1069
|
"""
|
1071
1070
|
(Optional) The maximum lifetime for generated tokens in number of seconds.
|
1072
1071
|
Its current value will be referenced at renewal time.
|
1073
1072
|
"""
|
1074
1073
|
return pulumi.get(self, "token_max_ttl")
|
1075
1074
|
|
1076
|
-
@property
|
1075
|
+
@_builtins.property
|
1077
1076
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1078
|
-
def token_no_default_policy(self) -> pulumi.Output[Optional[
|
1077
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
1079
1078
|
"""
|
1080
1079
|
(Optional) If set, the default policy will not be set on
|
1081
1080
|
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1082
1081
|
"""
|
1083
1082
|
return pulumi.get(self, "token_no_default_policy")
|
1084
1083
|
|
1085
|
-
@property
|
1084
|
+
@_builtins.property
|
1086
1085
|
@pulumi.getter(name="tokenNumUses")
|
1087
|
-
def token_num_uses(self) -> pulumi.Output[Optional[
|
1086
|
+
def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1088
1087
|
"""
|
1089
1088
|
(Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
1090
1089
|
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1091
1090
|
"""
|
1092
1091
|
return pulumi.get(self, "token_num_uses")
|
1093
1092
|
|
1094
|
-
@property
|
1093
|
+
@_builtins.property
|
1095
1094
|
@pulumi.getter(name="tokenPeriod")
|
1096
|
-
def token_period(self) -> pulumi.Output[Optional[
|
1095
|
+
def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1097
1096
|
"""
|
1098
1097
|
(Optional) If set, indicates that the
|
1099
1098
|
token generated using this role should never expire. The token should be renewed within the
|
@@ -1102,34 +1101,34 @@ class AuthBackend(pulumi.CustomResource):
|
|
1102
1101
|
"""
|
1103
1102
|
return pulumi.get(self, "token_period")
|
1104
1103
|
|
1105
|
-
@property
|
1104
|
+
@_builtins.property
|
1106
1105
|
@pulumi.getter(name="tokenPolicies")
|
1107
|
-
def token_policies(self) -> pulumi.Output[Optional[Sequence[
|
1106
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
1108
1107
|
"""
|
1109
1108
|
(Optional) List of policies to encode onto generated tokens. Depending
|
1110
1109
|
on the auth method, this list may be supplemented by user/group/other values.
|
1111
1110
|
"""
|
1112
1111
|
return pulumi.get(self, "token_policies")
|
1113
1112
|
|
1114
|
-
@property
|
1113
|
+
@_builtins.property
|
1115
1114
|
@pulumi.getter(name="tokenTtl")
|
1116
|
-
def token_ttl(self) -> pulumi.Output[Optional[
|
1115
|
+
def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
1117
1116
|
"""
|
1118
1117
|
(Optional) The incremental lifetime for generated tokens in number of seconds.
|
1119
1118
|
Its current value will be referenced at renewal time.
|
1120
1119
|
"""
|
1121
1120
|
return pulumi.get(self, "token_ttl")
|
1122
1121
|
|
1123
|
-
@property
|
1122
|
+
@_builtins.property
|
1124
1123
|
@pulumi.getter(name="tokenType")
|
1125
|
-
def token_type(self) -> pulumi.Output[Optional[
|
1124
|
+
def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1126
1125
|
"""
|
1127
1126
|
Specifies the type of tokens that should be returned by
|
1128
1127
|
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
1129
1128
|
"""
|
1130
1129
|
return pulumi.get(self, "token_type")
|
1131
1130
|
|
1132
|
-
@property
|
1131
|
+
@_builtins.property
|
1133
1132
|
@pulumi.getter
|
1134
1133
|
def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
|
1135
1134
|
"""
|