pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,1135 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class AuthBackendRoleArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
role_name: pulumi.Input[_builtins.str],
|
|
23
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
24
|
+
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
25
|
+
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
26
|
+
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
27
|
+
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
28
|
+
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
29
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
30
|
+
orphan: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
31
|
+
path_suffix: Optional[pulumi.Input[_builtins.str]] = None,
|
|
32
|
+
renewable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
33
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
34
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
35
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
36
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
37
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
38
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
39
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
40
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
41
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
|
42
|
+
"""
|
|
43
|
+
The set of arguments for constructing a AuthBackendRole resource.
|
|
44
|
+
:param pulumi.Input[_builtins.str] role_name: The name of the role.
|
|
45
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
|
|
46
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
47
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
|
|
48
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies: List of allowed policies for given role.
|
|
49
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
|
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies: List of disallowed policies for given role.
|
|
51
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
|
52
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
53
|
+
The value should not contain leading or trailing forward slashes.
|
|
54
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
55
|
+
*Available only for Vault Enterprise*.
|
|
56
|
+
:param pulumi.Input[_builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
|
57
|
+
:param pulumi.Input[_builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
|
58
|
+
:param pulumi.Input[_builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
|
59
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
60
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
|
61
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
|
62
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
|
63
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
|
64
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
|
65
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
|
66
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
|
67
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
|
68
|
+
"""
|
|
69
|
+
pulumi.set(__self__, "role_name", role_name)
|
|
70
|
+
if alias_metadata is not None:
|
|
71
|
+
pulumi.set(__self__, "alias_metadata", alias_metadata)
|
|
72
|
+
if allowed_entity_aliases is not None:
|
|
73
|
+
pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
|
|
74
|
+
if allowed_policies is not None:
|
|
75
|
+
pulumi.set(__self__, "allowed_policies", allowed_policies)
|
|
76
|
+
if allowed_policies_globs is not None:
|
|
77
|
+
pulumi.set(__self__, "allowed_policies_globs", allowed_policies_globs)
|
|
78
|
+
if disallowed_policies is not None:
|
|
79
|
+
pulumi.set(__self__, "disallowed_policies", disallowed_policies)
|
|
80
|
+
if disallowed_policies_globs is not None:
|
|
81
|
+
pulumi.set(__self__, "disallowed_policies_globs", disallowed_policies_globs)
|
|
82
|
+
if namespace is not None:
|
|
83
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
84
|
+
if orphan is not None:
|
|
85
|
+
pulumi.set(__self__, "orphan", orphan)
|
|
86
|
+
if path_suffix is not None:
|
|
87
|
+
pulumi.set(__self__, "path_suffix", path_suffix)
|
|
88
|
+
if renewable is not None:
|
|
89
|
+
pulumi.set(__self__, "renewable", renewable)
|
|
90
|
+
if token_bound_cidrs is not None:
|
|
91
|
+
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
|
92
|
+
if token_explicit_max_ttl is not None:
|
|
93
|
+
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
|
94
|
+
if token_max_ttl is not None:
|
|
95
|
+
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
|
96
|
+
if token_no_default_policy is not None:
|
|
97
|
+
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
|
98
|
+
if token_num_uses is not None:
|
|
99
|
+
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
|
100
|
+
if token_period is not None:
|
|
101
|
+
pulumi.set(__self__, "token_period", token_period)
|
|
102
|
+
if token_policies is not None:
|
|
103
|
+
pulumi.set(__self__, "token_policies", token_policies)
|
|
104
|
+
if token_ttl is not None:
|
|
105
|
+
pulumi.set(__self__, "token_ttl", token_ttl)
|
|
106
|
+
if token_type is not None:
|
|
107
|
+
pulumi.set(__self__, "token_type", token_type)
|
|
108
|
+
|
|
109
|
+
@_builtins.property
|
|
110
|
+
@pulumi.getter(name="roleName")
|
|
111
|
+
def role_name(self) -> pulumi.Input[_builtins.str]:
|
|
112
|
+
"""
|
|
113
|
+
The name of the role.
|
|
114
|
+
"""
|
|
115
|
+
return pulumi.get(self, "role_name")
|
|
116
|
+
|
|
117
|
+
@role_name.setter
|
|
118
|
+
def role_name(self, value: pulumi.Input[_builtins.str]):
|
|
119
|
+
pulumi.set(self, "role_name", value)
|
|
120
|
+
|
|
121
|
+
@_builtins.property
|
|
122
|
+
@pulumi.getter(name="aliasMetadata")
|
|
123
|
+
def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
124
|
+
"""
|
|
125
|
+
The metadata to be tied to generated entity alias.
|
|
126
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
127
|
+
"""
|
|
128
|
+
return pulumi.get(self, "alias_metadata")
|
|
129
|
+
|
|
130
|
+
@alias_metadata.setter
|
|
131
|
+
def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
132
|
+
pulumi.set(self, "alias_metadata", value)
|
|
133
|
+
|
|
134
|
+
@_builtins.property
|
|
135
|
+
@pulumi.getter(name="allowedEntityAliases")
|
|
136
|
+
def allowed_entity_aliases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
137
|
+
"""
|
|
138
|
+
List of allowed entity aliases.
|
|
139
|
+
"""
|
|
140
|
+
return pulumi.get(self, "allowed_entity_aliases")
|
|
141
|
+
|
|
142
|
+
@allowed_entity_aliases.setter
|
|
143
|
+
def allowed_entity_aliases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
144
|
+
pulumi.set(self, "allowed_entity_aliases", value)
|
|
145
|
+
|
|
146
|
+
@_builtins.property
|
|
147
|
+
@pulumi.getter(name="allowedPolicies")
|
|
148
|
+
def allowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
149
|
+
"""
|
|
150
|
+
List of allowed policies for given role.
|
|
151
|
+
"""
|
|
152
|
+
return pulumi.get(self, "allowed_policies")
|
|
153
|
+
|
|
154
|
+
@allowed_policies.setter
|
|
155
|
+
def allowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
156
|
+
pulumi.set(self, "allowed_policies", value)
|
|
157
|
+
|
|
158
|
+
@_builtins.property
|
|
159
|
+
@pulumi.getter(name="allowedPoliciesGlobs")
|
|
160
|
+
def allowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
161
|
+
"""
|
|
162
|
+
Set of allowed policies with glob match for given role.
|
|
163
|
+
"""
|
|
164
|
+
return pulumi.get(self, "allowed_policies_globs")
|
|
165
|
+
|
|
166
|
+
@allowed_policies_globs.setter
|
|
167
|
+
def allowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
168
|
+
pulumi.set(self, "allowed_policies_globs", value)
|
|
169
|
+
|
|
170
|
+
@_builtins.property
|
|
171
|
+
@pulumi.getter(name="disallowedPolicies")
|
|
172
|
+
def disallowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
173
|
+
"""
|
|
174
|
+
List of disallowed policies for given role.
|
|
175
|
+
"""
|
|
176
|
+
return pulumi.get(self, "disallowed_policies")
|
|
177
|
+
|
|
178
|
+
@disallowed_policies.setter
|
|
179
|
+
def disallowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
180
|
+
pulumi.set(self, "disallowed_policies", value)
|
|
181
|
+
|
|
182
|
+
@_builtins.property
|
|
183
|
+
@pulumi.getter(name="disallowedPoliciesGlobs")
|
|
184
|
+
def disallowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
185
|
+
"""
|
|
186
|
+
Set of disallowed policies with glob match for given role.
|
|
187
|
+
"""
|
|
188
|
+
return pulumi.get(self, "disallowed_policies_globs")
|
|
189
|
+
|
|
190
|
+
@disallowed_policies_globs.setter
|
|
191
|
+
def disallowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
192
|
+
pulumi.set(self, "disallowed_policies_globs", value)
|
|
193
|
+
|
|
194
|
+
@_builtins.property
|
|
195
|
+
@pulumi.getter
|
|
196
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
197
|
+
"""
|
|
198
|
+
The namespace to provision the resource in.
|
|
199
|
+
The value should not contain leading or trailing forward slashes.
|
|
200
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
201
|
+
*Available only for Vault Enterprise*.
|
|
202
|
+
"""
|
|
203
|
+
return pulumi.get(self, "namespace")
|
|
204
|
+
|
|
205
|
+
@namespace.setter
|
|
206
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
207
|
+
pulumi.set(self, "namespace", value)
|
|
208
|
+
|
|
209
|
+
@_builtins.property
|
|
210
|
+
@pulumi.getter
|
|
211
|
+
def orphan(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
212
|
+
"""
|
|
213
|
+
If true, tokens created against this policy will be orphan tokens.
|
|
214
|
+
"""
|
|
215
|
+
return pulumi.get(self, "orphan")
|
|
216
|
+
|
|
217
|
+
@orphan.setter
|
|
218
|
+
def orphan(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
219
|
+
pulumi.set(self, "orphan", value)
|
|
220
|
+
|
|
221
|
+
@_builtins.property
|
|
222
|
+
@pulumi.getter(name="pathSuffix")
|
|
223
|
+
def path_suffix(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
224
|
+
"""
|
|
225
|
+
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
|
226
|
+
"""
|
|
227
|
+
return pulumi.get(self, "path_suffix")
|
|
228
|
+
|
|
229
|
+
@path_suffix.setter
|
|
230
|
+
def path_suffix(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
231
|
+
pulumi.set(self, "path_suffix", value)
|
|
232
|
+
|
|
233
|
+
@_builtins.property
|
|
234
|
+
@pulumi.getter
|
|
235
|
+
def renewable(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
236
|
+
"""
|
|
237
|
+
Whether to disable the ability of the token to be renewed past its initial TTL.
|
|
238
|
+
"""
|
|
239
|
+
return pulumi.get(self, "renewable")
|
|
240
|
+
|
|
241
|
+
@renewable.setter
|
|
242
|
+
def renewable(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
243
|
+
pulumi.set(self, "renewable", value)
|
|
244
|
+
|
|
245
|
+
@_builtins.property
|
|
246
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
|
247
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
248
|
+
"""
|
|
249
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
250
|
+
"""
|
|
251
|
+
return pulumi.get(self, "token_bound_cidrs")
|
|
252
|
+
|
|
253
|
+
@token_bound_cidrs.setter
|
|
254
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
255
|
+
pulumi.set(self, "token_bound_cidrs", value)
|
|
256
|
+
|
|
257
|
+
@_builtins.property
|
|
258
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
|
259
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
260
|
+
"""
|
|
261
|
+
Generated Token's Explicit Maximum TTL in seconds
|
|
262
|
+
"""
|
|
263
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
|
264
|
+
|
|
265
|
+
@token_explicit_max_ttl.setter
|
|
266
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
267
|
+
pulumi.set(self, "token_explicit_max_ttl", value)
|
|
268
|
+
|
|
269
|
+
@_builtins.property
|
|
270
|
+
@pulumi.getter(name="tokenMaxTtl")
|
|
271
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
272
|
+
"""
|
|
273
|
+
The maximum lifetime of the generated token
|
|
274
|
+
"""
|
|
275
|
+
return pulumi.get(self, "token_max_ttl")
|
|
276
|
+
|
|
277
|
+
@token_max_ttl.setter
|
|
278
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
279
|
+
pulumi.set(self, "token_max_ttl", value)
|
|
280
|
+
|
|
281
|
+
@_builtins.property
|
|
282
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
|
283
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
284
|
+
"""
|
|
285
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
|
286
|
+
"""
|
|
287
|
+
return pulumi.get(self, "token_no_default_policy")
|
|
288
|
+
|
|
289
|
+
@token_no_default_policy.setter
|
|
290
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
291
|
+
pulumi.set(self, "token_no_default_policy", value)
|
|
292
|
+
|
|
293
|
+
@_builtins.property
|
|
294
|
+
@pulumi.getter(name="tokenNumUses")
|
|
295
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
296
|
+
"""
|
|
297
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
|
298
|
+
"""
|
|
299
|
+
return pulumi.get(self, "token_num_uses")
|
|
300
|
+
|
|
301
|
+
@token_num_uses.setter
|
|
302
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
303
|
+
pulumi.set(self, "token_num_uses", value)
|
|
304
|
+
|
|
305
|
+
@_builtins.property
|
|
306
|
+
@pulumi.getter(name="tokenPeriod")
|
|
307
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
308
|
+
"""
|
|
309
|
+
Generated Token's Period
|
|
310
|
+
"""
|
|
311
|
+
return pulumi.get(self, "token_period")
|
|
312
|
+
|
|
313
|
+
@token_period.setter
|
|
314
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
315
|
+
pulumi.set(self, "token_period", value)
|
|
316
|
+
|
|
317
|
+
@_builtins.property
|
|
318
|
+
@pulumi.getter(name="tokenPolicies")
|
|
319
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
320
|
+
"""
|
|
321
|
+
Generated Token's Policies
|
|
322
|
+
"""
|
|
323
|
+
return pulumi.get(self, "token_policies")
|
|
324
|
+
|
|
325
|
+
@token_policies.setter
|
|
326
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
327
|
+
pulumi.set(self, "token_policies", value)
|
|
328
|
+
|
|
329
|
+
@_builtins.property
|
|
330
|
+
@pulumi.getter(name="tokenTtl")
|
|
331
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
332
|
+
"""
|
|
333
|
+
The initial ttl of the token to generate in seconds
|
|
334
|
+
"""
|
|
335
|
+
return pulumi.get(self, "token_ttl")
|
|
336
|
+
|
|
337
|
+
@token_ttl.setter
|
|
338
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
339
|
+
pulumi.set(self, "token_ttl", value)
|
|
340
|
+
|
|
341
|
+
@_builtins.property
|
|
342
|
+
@pulumi.getter(name="tokenType")
|
|
343
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
344
|
+
"""
|
|
345
|
+
The type of token to generate, service or batch
|
|
346
|
+
"""
|
|
347
|
+
return pulumi.get(self, "token_type")
|
|
348
|
+
|
|
349
|
+
@token_type.setter
|
|
350
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
351
|
+
pulumi.set(self, "token_type", value)
|
|
352
|
+
|
|
353
|
+
|
|
354
|
+
@pulumi.input_type
|
|
355
|
+
class _AuthBackendRoleState:
|
|
356
|
+
def __init__(__self__, *,
|
|
357
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
358
|
+
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
359
|
+
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
360
|
+
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
361
|
+
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
362
|
+
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
363
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
364
|
+
orphan: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
365
|
+
path_suffix: Optional[pulumi.Input[_builtins.str]] = None,
|
|
366
|
+
renewable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
367
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
368
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
369
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
370
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
371
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
372
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
373
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
374
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
375
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
376
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None):
|
|
377
|
+
"""
|
|
378
|
+
Input properties used for looking up and filtering AuthBackendRole resources.
|
|
379
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
|
|
380
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
381
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
|
|
382
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies: List of allowed policies for given role.
|
|
383
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
|
|
384
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies: List of disallowed policies for given role.
|
|
385
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
|
386
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
387
|
+
The value should not contain leading or trailing forward slashes.
|
|
388
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
389
|
+
*Available only for Vault Enterprise*.
|
|
390
|
+
:param pulumi.Input[_builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
|
391
|
+
:param pulumi.Input[_builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
|
392
|
+
:param pulumi.Input[_builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
|
393
|
+
:param pulumi.Input[_builtins.str] role_name: The name of the role.
|
|
394
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
395
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
|
396
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
|
397
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
|
398
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
|
399
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
|
400
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
|
401
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
|
402
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
|
403
|
+
"""
|
|
404
|
+
if alias_metadata is not None:
|
|
405
|
+
pulumi.set(__self__, "alias_metadata", alias_metadata)
|
|
406
|
+
if allowed_entity_aliases is not None:
|
|
407
|
+
pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
|
|
408
|
+
if allowed_policies is not None:
|
|
409
|
+
pulumi.set(__self__, "allowed_policies", allowed_policies)
|
|
410
|
+
if allowed_policies_globs is not None:
|
|
411
|
+
pulumi.set(__self__, "allowed_policies_globs", allowed_policies_globs)
|
|
412
|
+
if disallowed_policies is not None:
|
|
413
|
+
pulumi.set(__self__, "disallowed_policies", disallowed_policies)
|
|
414
|
+
if disallowed_policies_globs is not None:
|
|
415
|
+
pulumi.set(__self__, "disallowed_policies_globs", disallowed_policies_globs)
|
|
416
|
+
if namespace is not None:
|
|
417
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
418
|
+
if orphan is not None:
|
|
419
|
+
pulumi.set(__self__, "orphan", orphan)
|
|
420
|
+
if path_suffix is not None:
|
|
421
|
+
pulumi.set(__self__, "path_suffix", path_suffix)
|
|
422
|
+
if renewable is not None:
|
|
423
|
+
pulumi.set(__self__, "renewable", renewable)
|
|
424
|
+
if role_name is not None:
|
|
425
|
+
pulumi.set(__self__, "role_name", role_name)
|
|
426
|
+
if token_bound_cidrs is not None:
|
|
427
|
+
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
|
428
|
+
if token_explicit_max_ttl is not None:
|
|
429
|
+
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
|
430
|
+
if token_max_ttl is not None:
|
|
431
|
+
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
|
432
|
+
if token_no_default_policy is not None:
|
|
433
|
+
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
|
434
|
+
if token_num_uses is not None:
|
|
435
|
+
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
|
436
|
+
if token_period is not None:
|
|
437
|
+
pulumi.set(__self__, "token_period", token_period)
|
|
438
|
+
if token_policies is not None:
|
|
439
|
+
pulumi.set(__self__, "token_policies", token_policies)
|
|
440
|
+
if token_ttl is not None:
|
|
441
|
+
pulumi.set(__self__, "token_ttl", token_ttl)
|
|
442
|
+
if token_type is not None:
|
|
443
|
+
pulumi.set(__self__, "token_type", token_type)
|
|
444
|
+
|
|
445
|
+
@_builtins.property
|
|
446
|
+
@pulumi.getter(name="aliasMetadata")
|
|
447
|
+
def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
448
|
+
"""
|
|
449
|
+
The metadata to be tied to generated entity alias.
|
|
450
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
451
|
+
"""
|
|
452
|
+
return pulumi.get(self, "alias_metadata")
|
|
453
|
+
|
|
454
|
+
@alias_metadata.setter
|
|
455
|
+
def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
456
|
+
pulumi.set(self, "alias_metadata", value)
|
|
457
|
+
|
|
458
|
+
@_builtins.property
|
|
459
|
+
@pulumi.getter(name="allowedEntityAliases")
|
|
460
|
+
def allowed_entity_aliases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
461
|
+
"""
|
|
462
|
+
List of allowed entity aliases.
|
|
463
|
+
"""
|
|
464
|
+
return pulumi.get(self, "allowed_entity_aliases")
|
|
465
|
+
|
|
466
|
+
@allowed_entity_aliases.setter
|
|
467
|
+
def allowed_entity_aliases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
468
|
+
pulumi.set(self, "allowed_entity_aliases", value)
|
|
469
|
+
|
|
470
|
+
@_builtins.property
|
|
471
|
+
@pulumi.getter(name="allowedPolicies")
|
|
472
|
+
def allowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
473
|
+
"""
|
|
474
|
+
List of allowed policies for given role.
|
|
475
|
+
"""
|
|
476
|
+
return pulumi.get(self, "allowed_policies")
|
|
477
|
+
|
|
478
|
+
@allowed_policies.setter
|
|
479
|
+
def allowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
480
|
+
pulumi.set(self, "allowed_policies", value)
|
|
481
|
+
|
|
482
|
+
@_builtins.property
|
|
483
|
+
@pulumi.getter(name="allowedPoliciesGlobs")
|
|
484
|
+
def allowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
485
|
+
"""
|
|
486
|
+
Set of allowed policies with glob match for given role.
|
|
487
|
+
"""
|
|
488
|
+
return pulumi.get(self, "allowed_policies_globs")
|
|
489
|
+
|
|
490
|
+
@allowed_policies_globs.setter
|
|
491
|
+
def allowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
492
|
+
pulumi.set(self, "allowed_policies_globs", value)
|
|
493
|
+
|
|
494
|
+
@_builtins.property
|
|
495
|
+
@pulumi.getter(name="disallowedPolicies")
|
|
496
|
+
def disallowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
497
|
+
"""
|
|
498
|
+
List of disallowed policies for given role.
|
|
499
|
+
"""
|
|
500
|
+
return pulumi.get(self, "disallowed_policies")
|
|
501
|
+
|
|
502
|
+
@disallowed_policies.setter
|
|
503
|
+
def disallowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
504
|
+
pulumi.set(self, "disallowed_policies", value)
|
|
505
|
+
|
|
506
|
+
@_builtins.property
|
|
507
|
+
@pulumi.getter(name="disallowedPoliciesGlobs")
|
|
508
|
+
def disallowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
509
|
+
"""
|
|
510
|
+
Set of disallowed policies with glob match for given role.
|
|
511
|
+
"""
|
|
512
|
+
return pulumi.get(self, "disallowed_policies_globs")
|
|
513
|
+
|
|
514
|
+
@disallowed_policies_globs.setter
|
|
515
|
+
def disallowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
516
|
+
pulumi.set(self, "disallowed_policies_globs", value)
|
|
517
|
+
|
|
518
|
+
@_builtins.property
|
|
519
|
+
@pulumi.getter
|
|
520
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
521
|
+
"""
|
|
522
|
+
The namespace to provision the resource in.
|
|
523
|
+
The value should not contain leading or trailing forward slashes.
|
|
524
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
525
|
+
*Available only for Vault Enterprise*.
|
|
526
|
+
"""
|
|
527
|
+
return pulumi.get(self, "namespace")
|
|
528
|
+
|
|
529
|
+
@namespace.setter
|
|
530
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
531
|
+
pulumi.set(self, "namespace", value)
|
|
532
|
+
|
|
533
|
+
@_builtins.property
|
|
534
|
+
@pulumi.getter
|
|
535
|
+
def orphan(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
536
|
+
"""
|
|
537
|
+
If true, tokens created against this policy will be orphan tokens.
|
|
538
|
+
"""
|
|
539
|
+
return pulumi.get(self, "orphan")
|
|
540
|
+
|
|
541
|
+
@orphan.setter
|
|
542
|
+
def orphan(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
543
|
+
pulumi.set(self, "orphan", value)
|
|
544
|
+
|
|
545
|
+
@_builtins.property
|
|
546
|
+
@pulumi.getter(name="pathSuffix")
|
|
547
|
+
def path_suffix(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
548
|
+
"""
|
|
549
|
+
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
|
550
|
+
"""
|
|
551
|
+
return pulumi.get(self, "path_suffix")
|
|
552
|
+
|
|
553
|
+
@path_suffix.setter
|
|
554
|
+
def path_suffix(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
555
|
+
pulumi.set(self, "path_suffix", value)
|
|
556
|
+
|
|
557
|
+
@_builtins.property
|
|
558
|
+
@pulumi.getter
|
|
559
|
+
def renewable(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
560
|
+
"""
|
|
561
|
+
Whether to disable the ability of the token to be renewed past its initial TTL.
|
|
562
|
+
"""
|
|
563
|
+
return pulumi.get(self, "renewable")
|
|
564
|
+
|
|
565
|
+
@renewable.setter
|
|
566
|
+
def renewable(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
567
|
+
pulumi.set(self, "renewable", value)
|
|
568
|
+
|
|
569
|
+
@_builtins.property
|
|
570
|
+
@pulumi.getter(name="roleName")
|
|
571
|
+
def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
572
|
+
"""
|
|
573
|
+
The name of the role.
|
|
574
|
+
"""
|
|
575
|
+
return pulumi.get(self, "role_name")
|
|
576
|
+
|
|
577
|
+
@role_name.setter
|
|
578
|
+
def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
579
|
+
pulumi.set(self, "role_name", value)
|
|
580
|
+
|
|
581
|
+
@_builtins.property
|
|
582
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
|
583
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
584
|
+
"""
|
|
585
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
586
|
+
"""
|
|
587
|
+
return pulumi.get(self, "token_bound_cidrs")
|
|
588
|
+
|
|
589
|
+
@token_bound_cidrs.setter
|
|
590
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
591
|
+
pulumi.set(self, "token_bound_cidrs", value)
|
|
592
|
+
|
|
593
|
+
@_builtins.property
|
|
594
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
|
595
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
596
|
+
"""
|
|
597
|
+
Generated Token's Explicit Maximum TTL in seconds
|
|
598
|
+
"""
|
|
599
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
|
600
|
+
|
|
601
|
+
@token_explicit_max_ttl.setter
|
|
602
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
603
|
+
pulumi.set(self, "token_explicit_max_ttl", value)
|
|
604
|
+
|
|
605
|
+
@_builtins.property
|
|
606
|
+
@pulumi.getter(name="tokenMaxTtl")
|
|
607
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
608
|
+
"""
|
|
609
|
+
The maximum lifetime of the generated token
|
|
610
|
+
"""
|
|
611
|
+
return pulumi.get(self, "token_max_ttl")
|
|
612
|
+
|
|
613
|
+
@token_max_ttl.setter
|
|
614
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
615
|
+
pulumi.set(self, "token_max_ttl", value)
|
|
616
|
+
|
|
617
|
+
@_builtins.property
|
|
618
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
|
619
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
620
|
+
"""
|
|
621
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
|
622
|
+
"""
|
|
623
|
+
return pulumi.get(self, "token_no_default_policy")
|
|
624
|
+
|
|
625
|
+
@token_no_default_policy.setter
|
|
626
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
627
|
+
pulumi.set(self, "token_no_default_policy", value)
|
|
628
|
+
|
|
629
|
+
@_builtins.property
|
|
630
|
+
@pulumi.getter(name="tokenNumUses")
|
|
631
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
632
|
+
"""
|
|
633
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
|
634
|
+
"""
|
|
635
|
+
return pulumi.get(self, "token_num_uses")
|
|
636
|
+
|
|
637
|
+
@token_num_uses.setter
|
|
638
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
639
|
+
pulumi.set(self, "token_num_uses", value)
|
|
640
|
+
|
|
641
|
+
@_builtins.property
|
|
642
|
+
@pulumi.getter(name="tokenPeriod")
|
|
643
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
644
|
+
"""
|
|
645
|
+
Generated Token's Period
|
|
646
|
+
"""
|
|
647
|
+
return pulumi.get(self, "token_period")
|
|
648
|
+
|
|
649
|
+
@token_period.setter
|
|
650
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
651
|
+
pulumi.set(self, "token_period", value)
|
|
652
|
+
|
|
653
|
+
@_builtins.property
|
|
654
|
+
@pulumi.getter(name="tokenPolicies")
|
|
655
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
656
|
+
"""
|
|
657
|
+
Generated Token's Policies
|
|
658
|
+
"""
|
|
659
|
+
return pulumi.get(self, "token_policies")
|
|
660
|
+
|
|
661
|
+
@token_policies.setter
|
|
662
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
663
|
+
pulumi.set(self, "token_policies", value)
|
|
664
|
+
|
|
665
|
+
@_builtins.property
|
|
666
|
+
@pulumi.getter(name="tokenTtl")
|
|
667
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
668
|
+
"""
|
|
669
|
+
The initial ttl of the token to generate in seconds
|
|
670
|
+
"""
|
|
671
|
+
return pulumi.get(self, "token_ttl")
|
|
672
|
+
|
|
673
|
+
@token_ttl.setter
|
|
674
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
675
|
+
pulumi.set(self, "token_ttl", value)
|
|
676
|
+
|
|
677
|
+
@_builtins.property
|
|
678
|
+
@pulumi.getter(name="tokenType")
|
|
679
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
680
|
+
"""
|
|
681
|
+
The type of token to generate, service or batch
|
|
682
|
+
"""
|
|
683
|
+
return pulumi.get(self, "token_type")
|
|
684
|
+
|
|
685
|
+
@token_type.setter
|
|
686
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
687
|
+
pulumi.set(self, "token_type", value)
|
|
688
|
+
|
|
689
|
+
|
|
690
|
+
@pulumi.type_token("vault:tokenauth/authBackendRole:AuthBackendRole")
|
|
691
|
+
class AuthBackendRole(pulumi.CustomResource):
|
|
692
|
+
@overload
|
|
693
|
+
def __init__(__self__,
|
|
694
|
+
resource_name: str,
|
|
695
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
696
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
697
|
+
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
698
|
+
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
699
|
+
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
700
|
+
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
701
|
+
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
702
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
703
|
+
orphan: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
704
|
+
path_suffix: Optional[pulumi.Input[_builtins.str]] = None,
|
|
705
|
+
renewable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
706
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
707
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
708
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
709
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
710
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
711
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
712
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
713
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
714
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
715
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
716
|
+
__props__=None):
|
|
717
|
+
"""
|
|
718
|
+
Manages Token auth backend role in a Vault server. See the [Vault
|
|
719
|
+
documentation](https://www.vaultproject.io/docs/auth/token.html) for more
|
|
720
|
+
information.
|
|
721
|
+
|
|
722
|
+
## Example Usage
|
|
723
|
+
|
|
724
|
+
```python
|
|
725
|
+
import pulumi
|
|
726
|
+
import pulumi_vault as vault
|
|
727
|
+
|
|
728
|
+
example = vault.tokenauth.AuthBackendRole("example",
|
|
729
|
+
role_name="my-role",
|
|
730
|
+
allowed_policies=[
|
|
731
|
+
"dev",
|
|
732
|
+
"test",
|
|
733
|
+
],
|
|
734
|
+
disallowed_policies=["default"],
|
|
735
|
+
allowed_entity_aliases=["test_entity"],
|
|
736
|
+
orphan=True,
|
|
737
|
+
token_period=86400,
|
|
738
|
+
renewable=True,
|
|
739
|
+
token_explicit_max_ttl=115200,
|
|
740
|
+
path_suffix="path-suffix")
|
|
741
|
+
```
|
|
742
|
+
|
|
743
|
+
## Import
|
|
744
|
+
|
|
745
|
+
Token auth backend roles can be imported with `auth/token/roles/` followed by the `role_name`, e.g.
|
|
746
|
+
|
|
747
|
+
```sh
|
|
748
|
+
$ pulumi import vault:tokenauth/authBackendRole:AuthBackendRole example auth/token/roles/my-role
|
|
749
|
+
```
|
|
750
|
+
|
|
751
|
+
:param str resource_name: The name of the resource.
|
|
752
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
753
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
|
|
754
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
755
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
|
|
756
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies: List of allowed policies for given role.
|
|
757
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
|
|
758
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies: List of disallowed policies for given role.
|
|
759
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
|
760
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
761
|
+
The value should not contain leading or trailing forward slashes.
|
|
762
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
763
|
+
*Available only for Vault Enterprise*.
|
|
764
|
+
:param pulumi.Input[_builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
|
765
|
+
:param pulumi.Input[_builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
|
766
|
+
:param pulumi.Input[_builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
|
767
|
+
:param pulumi.Input[_builtins.str] role_name: The name of the role.
|
|
768
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
769
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
|
770
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
|
771
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
|
772
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
|
773
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
|
774
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
|
775
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
|
776
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
|
777
|
+
"""
|
|
778
|
+
...
|
|
779
|
+
@overload
|
|
780
|
+
def __init__(__self__,
|
|
781
|
+
resource_name: str,
|
|
782
|
+
args: AuthBackendRoleArgs,
|
|
783
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
784
|
+
"""
|
|
785
|
+
Manages Token auth backend role in a Vault server. See the [Vault
|
|
786
|
+
documentation](https://www.vaultproject.io/docs/auth/token.html) for more
|
|
787
|
+
information.
|
|
788
|
+
|
|
789
|
+
## Example Usage
|
|
790
|
+
|
|
791
|
+
```python
|
|
792
|
+
import pulumi
|
|
793
|
+
import pulumi_vault as vault
|
|
794
|
+
|
|
795
|
+
example = vault.tokenauth.AuthBackendRole("example",
|
|
796
|
+
role_name="my-role",
|
|
797
|
+
allowed_policies=[
|
|
798
|
+
"dev",
|
|
799
|
+
"test",
|
|
800
|
+
],
|
|
801
|
+
disallowed_policies=["default"],
|
|
802
|
+
allowed_entity_aliases=["test_entity"],
|
|
803
|
+
orphan=True,
|
|
804
|
+
token_period=86400,
|
|
805
|
+
renewable=True,
|
|
806
|
+
token_explicit_max_ttl=115200,
|
|
807
|
+
path_suffix="path-suffix")
|
|
808
|
+
```
|
|
809
|
+
|
|
810
|
+
## Import
|
|
811
|
+
|
|
812
|
+
Token auth backend roles can be imported with `auth/token/roles/` followed by the `role_name`, e.g.
|
|
813
|
+
|
|
814
|
+
```sh
|
|
815
|
+
$ pulumi import vault:tokenauth/authBackendRole:AuthBackendRole example auth/token/roles/my-role
|
|
816
|
+
```
|
|
817
|
+
|
|
818
|
+
:param str resource_name: The name of the resource.
|
|
819
|
+
:param AuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
|
|
820
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
821
|
+
"""
|
|
822
|
+
...
|
|
823
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
824
|
+
resource_args, opts = _utilities.get_resource_args_opts(AuthBackendRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
825
|
+
if resource_args is not None:
|
|
826
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
827
|
+
else:
|
|
828
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
829
|
+
|
|
830
|
+
def _internal_init(__self__,
|
|
831
|
+
resource_name: str,
|
|
832
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
833
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
834
|
+
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
835
|
+
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
836
|
+
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
837
|
+
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
838
|
+
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
839
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
840
|
+
orphan: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
841
|
+
path_suffix: Optional[pulumi.Input[_builtins.str]] = None,
|
|
842
|
+
renewable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
843
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
844
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
845
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
846
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
847
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
848
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
849
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
850
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
851
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
852
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
853
|
+
__props__=None):
|
|
854
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
855
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
856
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
857
|
+
if opts.id is None:
|
|
858
|
+
if __props__ is not None:
|
|
859
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
860
|
+
__props__ = AuthBackendRoleArgs.__new__(AuthBackendRoleArgs)
|
|
861
|
+
|
|
862
|
+
__props__.__dict__["alias_metadata"] = alias_metadata
|
|
863
|
+
__props__.__dict__["allowed_entity_aliases"] = allowed_entity_aliases
|
|
864
|
+
__props__.__dict__["allowed_policies"] = allowed_policies
|
|
865
|
+
__props__.__dict__["allowed_policies_globs"] = allowed_policies_globs
|
|
866
|
+
__props__.__dict__["disallowed_policies"] = disallowed_policies
|
|
867
|
+
__props__.__dict__["disallowed_policies_globs"] = disallowed_policies_globs
|
|
868
|
+
__props__.__dict__["namespace"] = namespace
|
|
869
|
+
__props__.__dict__["orphan"] = orphan
|
|
870
|
+
__props__.__dict__["path_suffix"] = path_suffix
|
|
871
|
+
__props__.__dict__["renewable"] = renewable
|
|
872
|
+
if role_name is None and not opts.urn:
|
|
873
|
+
raise TypeError("Missing required property 'role_name'")
|
|
874
|
+
__props__.__dict__["role_name"] = role_name
|
|
875
|
+
__props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
|
|
876
|
+
__props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
|
|
877
|
+
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
|
878
|
+
__props__.__dict__["token_no_default_policy"] = token_no_default_policy
|
|
879
|
+
__props__.__dict__["token_num_uses"] = token_num_uses
|
|
880
|
+
__props__.__dict__["token_period"] = token_period
|
|
881
|
+
__props__.__dict__["token_policies"] = token_policies
|
|
882
|
+
__props__.__dict__["token_ttl"] = token_ttl
|
|
883
|
+
__props__.__dict__["token_type"] = token_type
|
|
884
|
+
super(AuthBackendRole, __self__).__init__(
|
|
885
|
+
'vault:tokenauth/authBackendRole:AuthBackendRole',
|
|
886
|
+
resource_name,
|
|
887
|
+
__props__,
|
|
888
|
+
opts)
|
|
889
|
+
|
|
890
|
+
@staticmethod
|
|
891
|
+
def get(resource_name: str,
|
|
892
|
+
id: pulumi.Input[str],
|
|
893
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
894
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
895
|
+
allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
896
|
+
allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
897
|
+
allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
898
|
+
disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
899
|
+
disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
900
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
901
|
+
orphan: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
902
|
+
path_suffix: Optional[pulumi.Input[_builtins.str]] = None,
|
|
903
|
+
renewable: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
904
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
905
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
906
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
907
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
908
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
909
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
910
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
911
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
912
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
913
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRole':
|
|
914
|
+
"""
|
|
915
|
+
Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
|
|
916
|
+
properties used to qualify the lookup.
|
|
917
|
+
|
|
918
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
919
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
920
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
921
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
|
|
922
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
923
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
|
|
924
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies: List of allowed policies for given role.
|
|
925
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
|
|
926
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies: List of disallowed policies for given role.
|
|
927
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
|
|
928
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
929
|
+
The value should not contain leading or trailing forward slashes.
|
|
930
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
931
|
+
*Available only for Vault Enterprise*.
|
|
932
|
+
:param pulumi.Input[_builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
|
|
933
|
+
:param pulumi.Input[_builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
|
934
|
+
:param pulumi.Input[_builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
|
935
|
+
:param pulumi.Input[_builtins.str] role_name: The name of the role.
|
|
936
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
937
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
|
938
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
|
|
939
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
|
940
|
+
:param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
|
941
|
+
:param pulumi.Input[_builtins.int] token_period: Generated Token's Period
|
|
942
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
|
|
943
|
+
:param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
|
|
944
|
+
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
|
945
|
+
"""
|
|
946
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
947
|
+
|
|
948
|
+
__props__ = _AuthBackendRoleState.__new__(_AuthBackendRoleState)
|
|
949
|
+
|
|
950
|
+
__props__.__dict__["alias_metadata"] = alias_metadata
|
|
951
|
+
__props__.__dict__["allowed_entity_aliases"] = allowed_entity_aliases
|
|
952
|
+
__props__.__dict__["allowed_policies"] = allowed_policies
|
|
953
|
+
__props__.__dict__["allowed_policies_globs"] = allowed_policies_globs
|
|
954
|
+
__props__.__dict__["disallowed_policies"] = disallowed_policies
|
|
955
|
+
__props__.__dict__["disallowed_policies_globs"] = disallowed_policies_globs
|
|
956
|
+
__props__.__dict__["namespace"] = namespace
|
|
957
|
+
__props__.__dict__["orphan"] = orphan
|
|
958
|
+
__props__.__dict__["path_suffix"] = path_suffix
|
|
959
|
+
__props__.__dict__["renewable"] = renewable
|
|
960
|
+
__props__.__dict__["role_name"] = role_name
|
|
961
|
+
__props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
|
|
962
|
+
__props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
|
|
963
|
+
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
|
964
|
+
__props__.__dict__["token_no_default_policy"] = token_no_default_policy
|
|
965
|
+
__props__.__dict__["token_num_uses"] = token_num_uses
|
|
966
|
+
__props__.__dict__["token_period"] = token_period
|
|
967
|
+
__props__.__dict__["token_policies"] = token_policies
|
|
968
|
+
__props__.__dict__["token_ttl"] = token_ttl
|
|
969
|
+
__props__.__dict__["token_type"] = token_type
|
|
970
|
+
return AuthBackendRole(resource_name, opts=opts, __props__=__props__)
|
|
971
|
+
|
|
972
|
+
@_builtins.property
|
|
973
|
+
@pulumi.getter(name="aliasMetadata")
|
|
974
|
+
def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
|
975
|
+
"""
|
|
976
|
+
The metadata to be tied to generated entity alias.
|
|
977
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
978
|
+
"""
|
|
979
|
+
return pulumi.get(self, "alias_metadata")
|
|
980
|
+
|
|
981
|
+
@_builtins.property
|
|
982
|
+
@pulumi.getter(name="allowedEntityAliases")
|
|
983
|
+
def allowed_entity_aliases(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
984
|
+
"""
|
|
985
|
+
List of allowed entity aliases.
|
|
986
|
+
"""
|
|
987
|
+
return pulumi.get(self, "allowed_entity_aliases")
|
|
988
|
+
|
|
989
|
+
@_builtins.property
|
|
990
|
+
@pulumi.getter(name="allowedPolicies")
|
|
991
|
+
def allowed_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
992
|
+
"""
|
|
993
|
+
List of allowed policies for given role.
|
|
994
|
+
"""
|
|
995
|
+
return pulumi.get(self, "allowed_policies")
|
|
996
|
+
|
|
997
|
+
@_builtins.property
|
|
998
|
+
@pulumi.getter(name="allowedPoliciesGlobs")
|
|
999
|
+
def allowed_policies_globs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1000
|
+
"""
|
|
1001
|
+
Set of allowed policies with glob match for given role.
|
|
1002
|
+
"""
|
|
1003
|
+
return pulumi.get(self, "allowed_policies_globs")
|
|
1004
|
+
|
|
1005
|
+
@_builtins.property
|
|
1006
|
+
@pulumi.getter(name="disallowedPolicies")
|
|
1007
|
+
def disallowed_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1008
|
+
"""
|
|
1009
|
+
List of disallowed policies for given role.
|
|
1010
|
+
"""
|
|
1011
|
+
return pulumi.get(self, "disallowed_policies")
|
|
1012
|
+
|
|
1013
|
+
@_builtins.property
|
|
1014
|
+
@pulumi.getter(name="disallowedPoliciesGlobs")
|
|
1015
|
+
def disallowed_policies_globs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1016
|
+
"""
|
|
1017
|
+
Set of disallowed policies with glob match for given role.
|
|
1018
|
+
"""
|
|
1019
|
+
return pulumi.get(self, "disallowed_policies_globs")
|
|
1020
|
+
|
|
1021
|
+
@_builtins.property
|
|
1022
|
+
@pulumi.getter
|
|
1023
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1024
|
+
"""
|
|
1025
|
+
The namespace to provision the resource in.
|
|
1026
|
+
The value should not contain leading or trailing forward slashes.
|
|
1027
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
1028
|
+
*Available only for Vault Enterprise*.
|
|
1029
|
+
"""
|
|
1030
|
+
return pulumi.get(self, "namespace")
|
|
1031
|
+
|
|
1032
|
+
@_builtins.property
|
|
1033
|
+
@pulumi.getter
|
|
1034
|
+
def orphan(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1035
|
+
"""
|
|
1036
|
+
If true, tokens created against this policy will be orphan tokens.
|
|
1037
|
+
"""
|
|
1038
|
+
return pulumi.get(self, "orphan")
|
|
1039
|
+
|
|
1040
|
+
@_builtins.property
|
|
1041
|
+
@pulumi.getter(name="pathSuffix")
|
|
1042
|
+
def path_suffix(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1043
|
+
"""
|
|
1044
|
+
Tokens created against this role will have the given suffix as part of their path in addition to the role name.
|
|
1045
|
+
"""
|
|
1046
|
+
return pulumi.get(self, "path_suffix")
|
|
1047
|
+
|
|
1048
|
+
@_builtins.property
|
|
1049
|
+
@pulumi.getter
|
|
1050
|
+
def renewable(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1051
|
+
"""
|
|
1052
|
+
Whether to disable the ability of the token to be renewed past its initial TTL.
|
|
1053
|
+
"""
|
|
1054
|
+
return pulumi.get(self, "renewable")
|
|
1055
|
+
|
|
1056
|
+
@_builtins.property
|
|
1057
|
+
@pulumi.getter(name="roleName")
|
|
1058
|
+
def role_name(self) -> pulumi.Output[_builtins.str]:
|
|
1059
|
+
"""
|
|
1060
|
+
The name of the role.
|
|
1061
|
+
"""
|
|
1062
|
+
return pulumi.get(self, "role_name")
|
|
1063
|
+
|
|
1064
|
+
@_builtins.property
|
|
1065
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
|
1066
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1067
|
+
"""
|
|
1068
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
1069
|
+
"""
|
|
1070
|
+
return pulumi.get(self, "token_bound_cidrs")
|
|
1071
|
+
|
|
1072
|
+
@_builtins.property
|
|
1073
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
|
1074
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1075
|
+
"""
|
|
1076
|
+
Generated Token's Explicit Maximum TTL in seconds
|
|
1077
|
+
"""
|
|
1078
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
|
1079
|
+
|
|
1080
|
+
@_builtins.property
|
|
1081
|
+
@pulumi.getter(name="tokenMaxTtl")
|
|
1082
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1083
|
+
"""
|
|
1084
|
+
The maximum lifetime of the generated token
|
|
1085
|
+
"""
|
|
1086
|
+
return pulumi.get(self, "token_max_ttl")
|
|
1087
|
+
|
|
1088
|
+
@_builtins.property
|
|
1089
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
|
1090
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1091
|
+
"""
|
|
1092
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
|
1093
|
+
"""
|
|
1094
|
+
return pulumi.get(self, "token_no_default_policy")
|
|
1095
|
+
|
|
1096
|
+
@_builtins.property
|
|
1097
|
+
@pulumi.getter(name="tokenNumUses")
|
|
1098
|
+
def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1099
|
+
"""
|
|
1100
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
|
1101
|
+
"""
|
|
1102
|
+
return pulumi.get(self, "token_num_uses")
|
|
1103
|
+
|
|
1104
|
+
@_builtins.property
|
|
1105
|
+
@pulumi.getter(name="tokenPeriod")
|
|
1106
|
+
def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1107
|
+
"""
|
|
1108
|
+
Generated Token's Period
|
|
1109
|
+
"""
|
|
1110
|
+
return pulumi.get(self, "token_period")
|
|
1111
|
+
|
|
1112
|
+
@_builtins.property
|
|
1113
|
+
@pulumi.getter(name="tokenPolicies")
|
|
1114
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1115
|
+
"""
|
|
1116
|
+
Generated Token's Policies
|
|
1117
|
+
"""
|
|
1118
|
+
return pulumi.get(self, "token_policies")
|
|
1119
|
+
|
|
1120
|
+
@_builtins.property
|
|
1121
|
+
@pulumi.getter(name="tokenTtl")
|
|
1122
|
+
def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1123
|
+
"""
|
|
1124
|
+
The initial ttl of the token to generate in seconds
|
|
1125
|
+
"""
|
|
1126
|
+
return pulumi.get(self, "token_ttl")
|
|
1127
|
+
|
|
1128
|
+
@_builtins.property
|
|
1129
|
+
@pulumi.getter(name="tokenType")
|
|
1130
|
+
def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1131
|
+
"""
|
|
1132
|
+
The type of token to generate, service or batch
|
|
1133
|
+
"""
|
|
1134
|
+
return pulumi.get(self, "token_type")
|
|
1135
|
+
|