pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,514 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetAuthBackendRoleResult',
|
|
19
|
+
'AwaitableGetAuthBackendRoleResult',
|
|
20
|
+
'get_auth_backend_role',
|
|
21
|
+
'get_auth_backend_role_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetAuthBackendRoleResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getAuthBackendRole.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, alias_metadata=None, backend=None, bound_instance_groups=None, bound_labels=None, bound_projects=None, bound_regions=None, bound_service_accounts=None, bound_zones=None, id=None, namespace=None, role_id=None, role_name=None, token_bound_cidrs=None, token_explicit_max_ttl=None, token_max_ttl=None, token_no_default_policy=None, token_num_uses=None, token_period=None, token_policies=None, token_ttl=None, token_type=None, type=None):
|
|
30
|
+
if alias_metadata and not isinstance(alias_metadata, dict):
|
|
31
|
+
raise TypeError("Expected argument 'alias_metadata' to be a dict")
|
|
32
|
+
pulumi.set(__self__, "alias_metadata", alias_metadata)
|
|
33
|
+
if backend and not isinstance(backend, str):
|
|
34
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
|
35
|
+
pulumi.set(__self__, "backend", backend)
|
|
36
|
+
if bound_instance_groups and not isinstance(bound_instance_groups, list):
|
|
37
|
+
raise TypeError("Expected argument 'bound_instance_groups' to be a list")
|
|
38
|
+
pulumi.set(__self__, "bound_instance_groups", bound_instance_groups)
|
|
39
|
+
if bound_labels and not isinstance(bound_labels, list):
|
|
40
|
+
raise TypeError("Expected argument 'bound_labels' to be a list")
|
|
41
|
+
pulumi.set(__self__, "bound_labels", bound_labels)
|
|
42
|
+
if bound_projects and not isinstance(bound_projects, list):
|
|
43
|
+
raise TypeError("Expected argument 'bound_projects' to be a list")
|
|
44
|
+
pulumi.set(__self__, "bound_projects", bound_projects)
|
|
45
|
+
if bound_regions and not isinstance(bound_regions, list):
|
|
46
|
+
raise TypeError("Expected argument 'bound_regions' to be a list")
|
|
47
|
+
pulumi.set(__self__, "bound_regions", bound_regions)
|
|
48
|
+
if bound_service_accounts and not isinstance(bound_service_accounts, list):
|
|
49
|
+
raise TypeError("Expected argument 'bound_service_accounts' to be a list")
|
|
50
|
+
pulumi.set(__self__, "bound_service_accounts", bound_service_accounts)
|
|
51
|
+
if bound_zones and not isinstance(bound_zones, list):
|
|
52
|
+
raise TypeError("Expected argument 'bound_zones' to be a list")
|
|
53
|
+
pulumi.set(__self__, "bound_zones", bound_zones)
|
|
54
|
+
if id and not isinstance(id, str):
|
|
55
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
56
|
+
pulumi.set(__self__, "id", id)
|
|
57
|
+
if namespace and not isinstance(namespace, str):
|
|
58
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
59
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
60
|
+
if role_id and not isinstance(role_id, str):
|
|
61
|
+
raise TypeError("Expected argument 'role_id' to be a str")
|
|
62
|
+
pulumi.set(__self__, "role_id", role_id)
|
|
63
|
+
if role_name and not isinstance(role_name, str):
|
|
64
|
+
raise TypeError("Expected argument 'role_name' to be a str")
|
|
65
|
+
pulumi.set(__self__, "role_name", role_name)
|
|
66
|
+
if token_bound_cidrs and not isinstance(token_bound_cidrs, list):
|
|
67
|
+
raise TypeError("Expected argument 'token_bound_cidrs' to be a list")
|
|
68
|
+
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
|
69
|
+
if token_explicit_max_ttl and not isinstance(token_explicit_max_ttl, int):
|
|
70
|
+
raise TypeError("Expected argument 'token_explicit_max_ttl' to be a int")
|
|
71
|
+
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
|
72
|
+
if token_max_ttl and not isinstance(token_max_ttl, int):
|
|
73
|
+
raise TypeError("Expected argument 'token_max_ttl' to be a int")
|
|
74
|
+
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
|
75
|
+
if token_no_default_policy and not isinstance(token_no_default_policy, bool):
|
|
76
|
+
raise TypeError("Expected argument 'token_no_default_policy' to be a bool")
|
|
77
|
+
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
|
78
|
+
if token_num_uses and not isinstance(token_num_uses, int):
|
|
79
|
+
raise TypeError("Expected argument 'token_num_uses' to be a int")
|
|
80
|
+
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
|
81
|
+
if token_period and not isinstance(token_period, int):
|
|
82
|
+
raise TypeError("Expected argument 'token_period' to be a int")
|
|
83
|
+
pulumi.set(__self__, "token_period", token_period)
|
|
84
|
+
if token_policies and not isinstance(token_policies, list):
|
|
85
|
+
raise TypeError("Expected argument 'token_policies' to be a list")
|
|
86
|
+
pulumi.set(__self__, "token_policies", token_policies)
|
|
87
|
+
if token_ttl and not isinstance(token_ttl, int):
|
|
88
|
+
raise TypeError("Expected argument 'token_ttl' to be a int")
|
|
89
|
+
pulumi.set(__self__, "token_ttl", token_ttl)
|
|
90
|
+
if token_type and not isinstance(token_type, str):
|
|
91
|
+
raise TypeError("Expected argument 'token_type' to be a str")
|
|
92
|
+
pulumi.set(__self__, "token_type", token_type)
|
|
93
|
+
if type and not isinstance(type, str):
|
|
94
|
+
raise TypeError("Expected argument 'type' to be a str")
|
|
95
|
+
pulumi.set(__self__, "type", type)
|
|
96
|
+
|
|
97
|
+
@_builtins.property
|
|
98
|
+
@pulumi.getter(name="aliasMetadata")
|
|
99
|
+
def alias_metadata(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
100
|
+
return pulumi.get(self, "alias_metadata")
|
|
101
|
+
|
|
102
|
+
@_builtins.property
|
|
103
|
+
@pulumi.getter
|
|
104
|
+
def backend(self) -> Optional[_builtins.str]:
|
|
105
|
+
return pulumi.get(self, "backend")
|
|
106
|
+
|
|
107
|
+
@_builtins.property
|
|
108
|
+
@pulumi.getter(name="boundInstanceGroups")
|
|
109
|
+
def bound_instance_groups(self) -> Sequence[_builtins.str]:
|
|
110
|
+
"""
|
|
111
|
+
GCP regions bound to the role. Returned when `type` is `gce`.
|
|
112
|
+
"""
|
|
113
|
+
return pulumi.get(self, "bound_instance_groups")
|
|
114
|
+
|
|
115
|
+
@_builtins.property
|
|
116
|
+
@pulumi.getter(name="boundLabels")
|
|
117
|
+
def bound_labels(self) -> Sequence[_builtins.str]:
|
|
118
|
+
"""
|
|
119
|
+
GCP labels bound to the role. Returned when `type` is `gce`.
|
|
120
|
+
"""
|
|
121
|
+
return pulumi.get(self, "bound_labels")
|
|
122
|
+
|
|
123
|
+
@_builtins.property
|
|
124
|
+
@pulumi.getter(name="boundProjects")
|
|
125
|
+
def bound_projects(self) -> Sequence[_builtins.str]:
|
|
126
|
+
"""
|
|
127
|
+
GCP projects bound to the role.
|
|
128
|
+
"""
|
|
129
|
+
return pulumi.get(self, "bound_projects")
|
|
130
|
+
|
|
131
|
+
@_builtins.property
|
|
132
|
+
@pulumi.getter(name="boundRegions")
|
|
133
|
+
def bound_regions(self) -> Sequence[_builtins.str]:
|
|
134
|
+
"""
|
|
135
|
+
GCP regions bound to the role. Returned when `type` is `gce`.
|
|
136
|
+
"""
|
|
137
|
+
return pulumi.get(self, "bound_regions")
|
|
138
|
+
|
|
139
|
+
@_builtins.property
|
|
140
|
+
@pulumi.getter(name="boundServiceAccounts")
|
|
141
|
+
def bound_service_accounts(self) -> Sequence[_builtins.str]:
|
|
142
|
+
"""
|
|
143
|
+
GCP service accounts bound to the role. Returned when `type` is `iam`.
|
|
144
|
+
"""
|
|
145
|
+
return pulumi.get(self, "bound_service_accounts")
|
|
146
|
+
|
|
147
|
+
@_builtins.property
|
|
148
|
+
@pulumi.getter(name="boundZones")
|
|
149
|
+
def bound_zones(self) -> Sequence[_builtins.str]:
|
|
150
|
+
"""
|
|
151
|
+
GCP zones bound to the role. Returned when `type` is `gce`.
|
|
152
|
+
"""
|
|
153
|
+
return pulumi.get(self, "bound_zones")
|
|
154
|
+
|
|
155
|
+
@_builtins.property
|
|
156
|
+
@pulumi.getter
|
|
157
|
+
def id(self) -> _builtins.str:
|
|
158
|
+
"""
|
|
159
|
+
The provider-assigned unique ID for this managed resource.
|
|
160
|
+
"""
|
|
161
|
+
return pulumi.get(self, "id")
|
|
162
|
+
|
|
163
|
+
@_builtins.property
|
|
164
|
+
@pulumi.getter
|
|
165
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
166
|
+
return pulumi.get(self, "namespace")
|
|
167
|
+
|
|
168
|
+
@_builtins.property
|
|
169
|
+
@pulumi.getter(name="roleId")
|
|
170
|
+
def role_id(self) -> _builtins.str:
|
|
171
|
+
"""
|
|
172
|
+
The RoleID of the GCP role.
|
|
173
|
+
"""
|
|
174
|
+
return pulumi.get(self, "role_id")
|
|
175
|
+
|
|
176
|
+
@_builtins.property
|
|
177
|
+
@pulumi.getter(name="roleName")
|
|
178
|
+
def role_name(self) -> _builtins.str:
|
|
179
|
+
return pulumi.get(self, "role_name")
|
|
180
|
+
|
|
181
|
+
@_builtins.property
|
|
182
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
|
183
|
+
def token_bound_cidrs(self) -> Optional[Sequence[_builtins.str]]:
|
|
184
|
+
"""
|
|
185
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
|
186
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
187
|
+
as well.
|
|
188
|
+
"""
|
|
189
|
+
return pulumi.get(self, "token_bound_cidrs")
|
|
190
|
+
|
|
191
|
+
@_builtins.property
|
|
192
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
|
193
|
+
def token_explicit_max_ttl(self) -> Optional[_builtins.int]:
|
|
194
|
+
"""
|
|
195
|
+
If set, will encode an
|
|
196
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
197
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
198
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
199
|
+
"""
|
|
200
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
|
201
|
+
|
|
202
|
+
@_builtins.property
|
|
203
|
+
@pulumi.getter(name="tokenMaxTtl")
|
|
204
|
+
def token_max_ttl(self) -> Optional[_builtins.int]:
|
|
205
|
+
"""
|
|
206
|
+
The maximum lifetime for generated tokens in number of seconds.
|
|
207
|
+
Its current value will be referenced at renewal time.
|
|
208
|
+
"""
|
|
209
|
+
return pulumi.get(self, "token_max_ttl")
|
|
210
|
+
|
|
211
|
+
@_builtins.property
|
|
212
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
|
213
|
+
def token_no_default_policy(self) -> Optional[_builtins.bool]:
|
|
214
|
+
"""
|
|
215
|
+
If set, the default policy will not be set on
|
|
216
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
217
|
+
"""
|
|
218
|
+
return pulumi.get(self, "token_no_default_policy")
|
|
219
|
+
|
|
220
|
+
@_builtins.property
|
|
221
|
+
@pulumi.getter(name="tokenNumUses")
|
|
222
|
+
def token_num_uses(self) -> Optional[_builtins.int]:
|
|
223
|
+
"""
|
|
224
|
+
The
|
|
225
|
+
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
|
226
|
+
if any, in number of seconds to set on the token.
|
|
227
|
+
"""
|
|
228
|
+
return pulumi.get(self, "token_num_uses")
|
|
229
|
+
|
|
230
|
+
@_builtins.property
|
|
231
|
+
@pulumi.getter(name="tokenPeriod")
|
|
232
|
+
def token_period(self) -> Optional[_builtins.int]:
|
|
233
|
+
"""
|
|
234
|
+
(Optional) If set, indicates that the
|
|
235
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
236
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
237
|
+
value of this field. Specified in seconds.
|
|
238
|
+
"""
|
|
239
|
+
return pulumi.get(self, "token_period")
|
|
240
|
+
|
|
241
|
+
@_builtins.property
|
|
242
|
+
@pulumi.getter(name="tokenPolicies")
|
|
243
|
+
def token_policies(self) -> Optional[Sequence[_builtins.str]]:
|
|
244
|
+
"""
|
|
245
|
+
List of policies to encode onto generated tokens. Depending
|
|
246
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
247
|
+
"""
|
|
248
|
+
return pulumi.get(self, "token_policies")
|
|
249
|
+
|
|
250
|
+
@_builtins.property
|
|
251
|
+
@pulumi.getter(name="tokenTtl")
|
|
252
|
+
def token_ttl(self) -> Optional[_builtins.int]:
|
|
253
|
+
"""
|
|
254
|
+
The incremental lifetime for generated tokens in number of seconds.
|
|
255
|
+
Its current value will be referenced at renewal time.
|
|
256
|
+
"""
|
|
257
|
+
return pulumi.get(self, "token_ttl")
|
|
258
|
+
|
|
259
|
+
@_builtins.property
|
|
260
|
+
@pulumi.getter(name="tokenType")
|
|
261
|
+
def token_type(self) -> Optional[_builtins.str]:
|
|
262
|
+
"""
|
|
263
|
+
The type of token that should be generated. Can be `service`,
|
|
264
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
265
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
|
266
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
|
267
|
+
requests a different type at generation time.
|
|
268
|
+
"""
|
|
269
|
+
return pulumi.get(self, "token_type")
|
|
270
|
+
|
|
271
|
+
@_builtins.property
|
|
272
|
+
@pulumi.getter
|
|
273
|
+
def type(self) -> _builtins.str:
|
|
274
|
+
"""
|
|
275
|
+
Type of GCP role. Expected values are `iam` or `gce`.
|
|
276
|
+
"""
|
|
277
|
+
return pulumi.get(self, "type")
|
|
278
|
+
|
|
279
|
+
|
|
280
|
+
class AwaitableGetAuthBackendRoleResult(GetAuthBackendRoleResult):
|
|
281
|
+
# pylint: disable=using-constant-test
|
|
282
|
+
def __await__(self):
|
|
283
|
+
if False:
|
|
284
|
+
yield self
|
|
285
|
+
return GetAuthBackendRoleResult(
|
|
286
|
+
alias_metadata=self.alias_metadata,
|
|
287
|
+
backend=self.backend,
|
|
288
|
+
bound_instance_groups=self.bound_instance_groups,
|
|
289
|
+
bound_labels=self.bound_labels,
|
|
290
|
+
bound_projects=self.bound_projects,
|
|
291
|
+
bound_regions=self.bound_regions,
|
|
292
|
+
bound_service_accounts=self.bound_service_accounts,
|
|
293
|
+
bound_zones=self.bound_zones,
|
|
294
|
+
id=self.id,
|
|
295
|
+
namespace=self.namespace,
|
|
296
|
+
role_id=self.role_id,
|
|
297
|
+
role_name=self.role_name,
|
|
298
|
+
token_bound_cidrs=self.token_bound_cidrs,
|
|
299
|
+
token_explicit_max_ttl=self.token_explicit_max_ttl,
|
|
300
|
+
token_max_ttl=self.token_max_ttl,
|
|
301
|
+
token_no_default_policy=self.token_no_default_policy,
|
|
302
|
+
token_num_uses=self.token_num_uses,
|
|
303
|
+
token_period=self.token_period,
|
|
304
|
+
token_policies=self.token_policies,
|
|
305
|
+
token_ttl=self.token_ttl,
|
|
306
|
+
token_type=self.token_type,
|
|
307
|
+
type=self.type)
|
|
308
|
+
|
|
309
|
+
|
|
310
|
+
def get_auth_backend_role(alias_metadata: Optional[Mapping[str, _builtins.str]] = None,
|
|
311
|
+
backend: Optional[_builtins.str] = None,
|
|
312
|
+
namespace: Optional[_builtins.str] = None,
|
|
313
|
+
role_name: Optional[_builtins.str] = None,
|
|
314
|
+
token_bound_cidrs: Optional[Sequence[_builtins.str]] = None,
|
|
315
|
+
token_explicit_max_ttl: Optional[_builtins.int] = None,
|
|
316
|
+
token_max_ttl: Optional[_builtins.int] = None,
|
|
317
|
+
token_no_default_policy: Optional[_builtins.bool] = None,
|
|
318
|
+
token_num_uses: Optional[_builtins.int] = None,
|
|
319
|
+
token_period: Optional[_builtins.int] = None,
|
|
320
|
+
token_policies: Optional[Sequence[_builtins.str]] = None,
|
|
321
|
+
token_ttl: Optional[_builtins.int] = None,
|
|
322
|
+
token_type: Optional[_builtins.str] = None,
|
|
323
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendRoleResult:
|
|
324
|
+
"""
|
|
325
|
+
Reads a GCP auth role from a Vault server.
|
|
326
|
+
|
|
327
|
+
## Example Usage
|
|
328
|
+
|
|
329
|
+
```python
|
|
330
|
+
import pulumi
|
|
331
|
+
import pulumi_vault as vault
|
|
332
|
+
|
|
333
|
+
role = vault.gcp.get_auth_backend_role(backend="my-gcp-backend",
|
|
334
|
+
role_name="my-role")
|
|
335
|
+
pulumi.export("role-id", role.role_id)
|
|
336
|
+
```
|
|
337
|
+
|
|
338
|
+
|
|
339
|
+
:param _builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
|
|
340
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
341
|
+
The value should not contain leading or trailing forward slashes.
|
|
342
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
343
|
+
*Available only for Vault Enterprise*.
|
|
344
|
+
:param _builtins.str role_name: The name of the role to retrieve the Role ID for.
|
|
345
|
+
:param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
|
346
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
347
|
+
as well.
|
|
348
|
+
:param _builtins.int token_explicit_max_ttl: If set, will encode an
|
|
349
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
350
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
351
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
352
|
+
:param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
|
353
|
+
Its current value will be referenced at renewal time.
|
|
354
|
+
:param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
|
|
355
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
356
|
+
:param _builtins.int token_num_uses: The
|
|
357
|
+
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
|
358
|
+
if any, in number of seconds to set on the token.
|
|
359
|
+
:param _builtins.int token_period: (Optional) If set, indicates that the
|
|
360
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
361
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
362
|
+
value of this field. Specified in seconds.
|
|
363
|
+
:param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
|
|
364
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
365
|
+
:param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
|
366
|
+
Its current value will be referenced at renewal time.
|
|
367
|
+
:param _builtins.str token_type: The type of token that should be generated. Can be `service`,
|
|
368
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
369
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
|
370
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
|
371
|
+
requests a different type at generation time.
|
|
372
|
+
"""
|
|
373
|
+
__args__ = dict()
|
|
374
|
+
__args__['aliasMetadata'] = alias_metadata
|
|
375
|
+
__args__['backend'] = backend
|
|
376
|
+
__args__['namespace'] = namespace
|
|
377
|
+
__args__['roleName'] = role_name
|
|
378
|
+
__args__['tokenBoundCidrs'] = token_bound_cidrs
|
|
379
|
+
__args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
|
|
380
|
+
__args__['tokenMaxTtl'] = token_max_ttl
|
|
381
|
+
__args__['tokenNoDefaultPolicy'] = token_no_default_policy
|
|
382
|
+
__args__['tokenNumUses'] = token_num_uses
|
|
383
|
+
__args__['tokenPeriod'] = token_period
|
|
384
|
+
__args__['tokenPolicies'] = token_policies
|
|
385
|
+
__args__['tokenTtl'] = token_ttl
|
|
386
|
+
__args__['tokenType'] = token_type
|
|
387
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
388
|
+
__ret__ = pulumi.runtime.invoke('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult).value
|
|
389
|
+
|
|
390
|
+
return AwaitableGetAuthBackendRoleResult(
|
|
391
|
+
alias_metadata=pulumi.get(__ret__, 'alias_metadata'),
|
|
392
|
+
backend=pulumi.get(__ret__, 'backend'),
|
|
393
|
+
bound_instance_groups=pulumi.get(__ret__, 'bound_instance_groups'),
|
|
394
|
+
bound_labels=pulumi.get(__ret__, 'bound_labels'),
|
|
395
|
+
bound_projects=pulumi.get(__ret__, 'bound_projects'),
|
|
396
|
+
bound_regions=pulumi.get(__ret__, 'bound_regions'),
|
|
397
|
+
bound_service_accounts=pulumi.get(__ret__, 'bound_service_accounts'),
|
|
398
|
+
bound_zones=pulumi.get(__ret__, 'bound_zones'),
|
|
399
|
+
id=pulumi.get(__ret__, 'id'),
|
|
400
|
+
namespace=pulumi.get(__ret__, 'namespace'),
|
|
401
|
+
role_id=pulumi.get(__ret__, 'role_id'),
|
|
402
|
+
role_name=pulumi.get(__ret__, 'role_name'),
|
|
403
|
+
token_bound_cidrs=pulumi.get(__ret__, 'token_bound_cidrs'),
|
|
404
|
+
token_explicit_max_ttl=pulumi.get(__ret__, 'token_explicit_max_ttl'),
|
|
405
|
+
token_max_ttl=pulumi.get(__ret__, 'token_max_ttl'),
|
|
406
|
+
token_no_default_policy=pulumi.get(__ret__, 'token_no_default_policy'),
|
|
407
|
+
token_num_uses=pulumi.get(__ret__, 'token_num_uses'),
|
|
408
|
+
token_period=pulumi.get(__ret__, 'token_period'),
|
|
409
|
+
token_policies=pulumi.get(__ret__, 'token_policies'),
|
|
410
|
+
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
|
411
|
+
token_type=pulumi.get(__ret__, 'token_type'),
|
|
412
|
+
type=pulumi.get(__ret__, 'type'))
|
|
413
|
+
def get_auth_backend_role_output(alias_metadata: Optional[pulumi.Input[Optional[Mapping[str, _builtins.str]]]] = None,
|
|
414
|
+
backend: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
415
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
416
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
417
|
+
token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
|
|
418
|
+
token_explicit_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
|
419
|
+
token_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
|
420
|
+
token_no_default_policy: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
|
421
|
+
token_num_uses: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
|
422
|
+
token_period: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
|
423
|
+
token_policies: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
|
|
424
|
+
token_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
|
425
|
+
token_type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
426
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleResult]:
|
|
427
|
+
"""
|
|
428
|
+
Reads a GCP auth role from a Vault server.
|
|
429
|
+
|
|
430
|
+
## Example Usage
|
|
431
|
+
|
|
432
|
+
```python
|
|
433
|
+
import pulumi
|
|
434
|
+
import pulumi_vault as vault
|
|
435
|
+
|
|
436
|
+
role = vault.gcp.get_auth_backend_role(backend="my-gcp-backend",
|
|
437
|
+
role_name="my-role")
|
|
438
|
+
pulumi.export("role-id", role.role_id)
|
|
439
|
+
```
|
|
440
|
+
|
|
441
|
+
|
|
442
|
+
:param _builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
|
|
443
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
444
|
+
The value should not contain leading or trailing forward slashes.
|
|
445
|
+
The `namespace` is always relative to the provider's configured namespace.
|
|
446
|
+
*Available only for Vault Enterprise*.
|
|
447
|
+
:param _builtins.str role_name: The name of the role to retrieve the Role ID for.
|
|
448
|
+
:param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
|
449
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
450
|
+
as well.
|
|
451
|
+
:param _builtins.int token_explicit_max_ttl: If set, will encode an
|
|
452
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
453
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
454
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
455
|
+
:param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
|
456
|
+
Its current value will be referenced at renewal time.
|
|
457
|
+
:param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
|
|
458
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
459
|
+
:param _builtins.int token_num_uses: The
|
|
460
|
+
[period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
|
461
|
+
if any, in number of seconds to set on the token.
|
|
462
|
+
:param _builtins.int token_period: (Optional) If set, indicates that the
|
|
463
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
464
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
465
|
+
value of this field. Specified in seconds.
|
|
466
|
+
:param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
|
|
467
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
468
|
+
:param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
|
469
|
+
Its current value will be referenced at renewal time.
|
|
470
|
+
:param _builtins.str token_type: The type of token that should be generated. Can be `service`,
|
|
471
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
472
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
|
473
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
|
474
|
+
requests a different type at generation time.
|
|
475
|
+
"""
|
|
476
|
+
__args__ = dict()
|
|
477
|
+
__args__['aliasMetadata'] = alias_metadata
|
|
478
|
+
__args__['backend'] = backend
|
|
479
|
+
__args__['namespace'] = namespace
|
|
480
|
+
__args__['roleName'] = role_name
|
|
481
|
+
__args__['tokenBoundCidrs'] = token_bound_cidrs
|
|
482
|
+
__args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
|
|
483
|
+
__args__['tokenMaxTtl'] = token_max_ttl
|
|
484
|
+
__args__['tokenNoDefaultPolicy'] = token_no_default_policy
|
|
485
|
+
__args__['tokenNumUses'] = token_num_uses
|
|
486
|
+
__args__['tokenPeriod'] = token_period
|
|
487
|
+
__args__['tokenPolicies'] = token_policies
|
|
488
|
+
__args__['tokenTtl'] = token_ttl
|
|
489
|
+
__args__['tokenType'] = token_type
|
|
490
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
491
|
+
__ret__ = pulumi.runtime.invoke_output('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
|
|
492
|
+
return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
|
|
493
|
+
alias_metadata=pulumi.get(__response__, 'alias_metadata'),
|
|
494
|
+
backend=pulumi.get(__response__, 'backend'),
|
|
495
|
+
bound_instance_groups=pulumi.get(__response__, 'bound_instance_groups'),
|
|
496
|
+
bound_labels=pulumi.get(__response__, 'bound_labels'),
|
|
497
|
+
bound_projects=pulumi.get(__response__, 'bound_projects'),
|
|
498
|
+
bound_regions=pulumi.get(__response__, 'bound_regions'),
|
|
499
|
+
bound_service_accounts=pulumi.get(__response__, 'bound_service_accounts'),
|
|
500
|
+
bound_zones=pulumi.get(__response__, 'bound_zones'),
|
|
501
|
+
id=pulumi.get(__response__, 'id'),
|
|
502
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
|
503
|
+
role_id=pulumi.get(__response__, 'role_id'),
|
|
504
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
|
505
|
+
token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
|
|
506
|
+
token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
|
|
507
|
+
token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
|
|
508
|
+
token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
|
|
509
|
+
token_num_uses=pulumi.get(__response__, 'token_num_uses'),
|
|
510
|
+
token_period=pulumi.get(__response__, 'token_period'),
|
|
511
|
+
token_policies=pulumi.get(__response__, 'token_policies'),
|
|
512
|
+
token_ttl=pulumi.get(__response__, 'token_ttl'),
|
|
513
|
+
token_type=pulumi.get(__response__, 'token_type'),
|
|
514
|
+
type=pulumi.get(__response__, 'type')))
|