pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,1194 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
from . import outputs
|
|
17
|
+
from ._inputs import *
|
|
18
|
+
|
|
19
|
+
__all__ = ['AuthBackendArgs', 'AuthBackend']
|
|
20
|
+
|
|
21
|
+
@pulumi.input_type
|
|
22
|
+
class AuthBackendArgs:
|
|
23
|
+
def __init__(__self__, *,
|
|
24
|
+
organization: pulumi.Input[_builtins.str],
|
|
25
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
26
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
28
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
29
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
30
|
+
organization_id: Optional[pulumi.Input[_builtins.int]] = None,
|
|
31
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
32
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
33
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
34
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
35
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
36
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
37
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
38
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
39
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
40
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
41
|
+
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
|
|
42
|
+
"""
|
|
43
|
+
The set of arguments for constructing a AuthBackend resource.
|
|
44
|
+
:param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
|
|
45
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: (Optional) The metadata to be tied to generated entity alias.
|
|
46
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
47
|
+
:param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
|
|
48
|
+
are running GitHub Enterprise or an API-compatible authentication server.
|
|
49
|
+
:param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
|
|
50
|
+
This overrides the current stored value, if any.
|
|
51
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
|
52
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
53
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
54
|
+
The value should not contain leading or trailing forward slashes.
|
|
55
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
56
|
+
*Available only for Vault Enterprise*.
|
|
57
|
+
:param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
|
|
58
|
+
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
|
59
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
|
60
|
+
if not specified.
|
|
61
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
|
62
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
63
|
+
as well.
|
|
64
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
|
|
65
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
66
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
67
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
68
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
|
69
|
+
Its current value will be referenced at renewal time.
|
|
70
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
|
71
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
72
|
+
:param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
|
73
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
|
74
|
+
:param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
|
|
75
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
76
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
77
|
+
value of this field. Specified in seconds.
|
|
78
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
|
79
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
80
|
+
:param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
|
81
|
+
Its current value will be referenced at renewal time.
|
|
82
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
|
83
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
|
84
|
+
:param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
|
85
|
+
|
|
86
|
+
The `tune` block is used to tune the auth backend:
|
|
87
|
+
"""
|
|
88
|
+
pulumi.set(__self__, "organization", organization)
|
|
89
|
+
if alias_metadata is not None:
|
|
90
|
+
pulumi.set(__self__, "alias_metadata", alias_metadata)
|
|
91
|
+
if base_url is not None:
|
|
92
|
+
pulumi.set(__self__, "base_url", base_url)
|
|
93
|
+
if description is not None:
|
|
94
|
+
pulumi.set(__self__, "description", description)
|
|
95
|
+
if disable_remount is not None:
|
|
96
|
+
pulumi.set(__self__, "disable_remount", disable_remount)
|
|
97
|
+
if namespace is not None:
|
|
98
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
99
|
+
if organization_id is not None:
|
|
100
|
+
pulumi.set(__self__, "organization_id", organization_id)
|
|
101
|
+
if path is not None:
|
|
102
|
+
pulumi.set(__self__, "path", path)
|
|
103
|
+
if token_bound_cidrs is not None:
|
|
104
|
+
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
|
105
|
+
if token_explicit_max_ttl is not None:
|
|
106
|
+
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
|
107
|
+
if token_max_ttl is not None:
|
|
108
|
+
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
|
109
|
+
if token_no_default_policy is not None:
|
|
110
|
+
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
|
111
|
+
if token_num_uses is not None:
|
|
112
|
+
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
|
113
|
+
if token_period is not None:
|
|
114
|
+
pulumi.set(__self__, "token_period", token_period)
|
|
115
|
+
if token_policies is not None:
|
|
116
|
+
pulumi.set(__self__, "token_policies", token_policies)
|
|
117
|
+
if token_ttl is not None:
|
|
118
|
+
pulumi.set(__self__, "token_ttl", token_ttl)
|
|
119
|
+
if token_type is not None:
|
|
120
|
+
pulumi.set(__self__, "token_type", token_type)
|
|
121
|
+
if tune is not None:
|
|
122
|
+
pulumi.set(__self__, "tune", tune)
|
|
123
|
+
|
|
124
|
+
@_builtins.property
|
|
125
|
+
@pulumi.getter
|
|
126
|
+
def organization(self) -> pulumi.Input[_builtins.str]:
|
|
127
|
+
"""
|
|
128
|
+
The organization configured users must be part of.
|
|
129
|
+
"""
|
|
130
|
+
return pulumi.get(self, "organization")
|
|
131
|
+
|
|
132
|
+
@organization.setter
|
|
133
|
+
def organization(self, value: pulumi.Input[_builtins.str]):
|
|
134
|
+
pulumi.set(self, "organization", value)
|
|
135
|
+
|
|
136
|
+
@_builtins.property
|
|
137
|
+
@pulumi.getter(name="aliasMetadata")
|
|
138
|
+
def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
139
|
+
"""
|
|
140
|
+
(Optional) The metadata to be tied to generated entity alias.
|
|
141
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
142
|
+
"""
|
|
143
|
+
return pulumi.get(self, "alias_metadata")
|
|
144
|
+
|
|
145
|
+
@alias_metadata.setter
|
|
146
|
+
def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
147
|
+
pulumi.set(self, "alias_metadata", value)
|
|
148
|
+
|
|
149
|
+
@_builtins.property
|
|
150
|
+
@pulumi.getter(name="baseUrl")
|
|
151
|
+
def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
152
|
+
"""
|
|
153
|
+
The API endpoint to use. Useful if you
|
|
154
|
+
are running GitHub Enterprise or an API-compatible authentication server.
|
|
155
|
+
"""
|
|
156
|
+
return pulumi.get(self, "base_url")
|
|
157
|
+
|
|
158
|
+
@base_url.setter
|
|
159
|
+
def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
160
|
+
pulumi.set(self, "base_url", value)
|
|
161
|
+
|
|
162
|
+
@_builtins.property
|
|
163
|
+
@pulumi.getter
|
|
164
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
165
|
+
"""
|
|
166
|
+
Specifies the description of the mount.
|
|
167
|
+
This overrides the current stored value, if any.
|
|
168
|
+
"""
|
|
169
|
+
return pulumi.get(self, "description")
|
|
170
|
+
|
|
171
|
+
@description.setter
|
|
172
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
173
|
+
pulumi.set(self, "description", value)
|
|
174
|
+
|
|
175
|
+
@_builtins.property
|
|
176
|
+
@pulumi.getter(name="disableRemount")
|
|
177
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
178
|
+
"""
|
|
179
|
+
If set, opts out of mount migration on path updates.
|
|
180
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
181
|
+
"""
|
|
182
|
+
return pulumi.get(self, "disable_remount")
|
|
183
|
+
|
|
184
|
+
@disable_remount.setter
|
|
185
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
186
|
+
pulumi.set(self, "disable_remount", value)
|
|
187
|
+
|
|
188
|
+
@_builtins.property
|
|
189
|
+
@pulumi.getter
|
|
190
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
191
|
+
"""
|
|
192
|
+
The namespace to provision the resource in.
|
|
193
|
+
The value should not contain leading or trailing forward slashes.
|
|
194
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
195
|
+
*Available only for Vault Enterprise*.
|
|
196
|
+
"""
|
|
197
|
+
return pulumi.get(self, "namespace")
|
|
198
|
+
|
|
199
|
+
@namespace.setter
|
|
200
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
201
|
+
pulumi.set(self, "namespace", value)
|
|
202
|
+
|
|
203
|
+
@_builtins.property
|
|
204
|
+
@pulumi.getter(name="organizationId")
|
|
205
|
+
def organization_id(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
206
|
+
"""
|
|
207
|
+
The ID of the organization users must be part of.
|
|
208
|
+
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
|
209
|
+
"""
|
|
210
|
+
return pulumi.get(self, "organization_id")
|
|
211
|
+
|
|
212
|
+
@organization_id.setter
|
|
213
|
+
def organization_id(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
214
|
+
pulumi.set(self, "organization_id", value)
|
|
215
|
+
|
|
216
|
+
@_builtins.property
|
|
217
|
+
@pulumi.getter
|
|
218
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
219
|
+
"""
|
|
220
|
+
Path where the auth backend is mounted. Defaults to `auth/github`
|
|
221
|
+
if not specified.
|
|
222
|
+
"""
|
|
223
|
+
return pulumi.get(self, "path")
|
|
224
|
+
|
|
225
|
+
@path.setter
|
|
226
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
227
|
+
pulumi.set(self, "path", value)
|
|
228
|
+
|
|
229
|
+
@_builtins.property
|
|
230
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
|
231
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
232
|
+
"""
|
|
233
|
+
(Optional) List of CIDR blocks; if set, specifies blocks of IP
|
|
234
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
235
|
+
as well.
|
|
236
|
+
"""
|
|
237
|
+
return pulumi.get(self, "token_bound_cidrs")
|
|
238
|
+
|
|
239
|
+
@token_bound_cidrs.setter
|
|
240
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
241
|
+
pulumi.set(self, "token_bound_cidrs", value)
|
|
242
|
+
|
|
243
|
+
@_builtins.property
|
|
244
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
|
245
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
246
|
+
"""
|
|
247
|
+
(Optional) If set, will encode an
|
|
248
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
249
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
250
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
251
|
+
"""
|
|
252
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
|
253
|
+
|
|
254
|
+
@token_explicit_max_ttl.setter
|
|
255
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
256
|
+
pulumi.set(self, "token_explicit_max_ttl", value)
|
|
257
|
+
|
|
258
|
+
@_builtins.property
|
|
259
|
+
@pulumi.getter(name="tokenMaxTtl")
|
|
260
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
261
|
+
"""
|
|
262
|
+
(Optional) The maximum lifetime for generated tokens in number of seconds.
|
|
263
|
+
Its current value will be referenced at renewal time.
|
|
264
|
+
"""
|
|
265
|
+
return pulumi.get(self, "token_max_ttl")
|
|
266
|
+
|
|
267
|
+
@token_max_ttl.setter
|
|
268
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
269
|
+
pulumi.set(self, "token_max_ttl", value)
|
|
270
|
+
|
|
271
|
+
@_builtins.property
|
|
272
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
|
273
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
274
|
+
"""
|
|
275
|
+
(Optional) If set, the default policy will not be set on
|
|
276
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
277
|
+
"""
|
|
278
|
+
return pulumi.get(self, "token_no_default_policy")
|
|
279
|
+
|
|
280
|
+
@token_no_default_policy.setter
|
|
281
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
282
|
+
pulumi.set(self, "token_no_default_policy", value)
|
|
283
|
+
|
|
284
|
+
@_builtins.property
|
|
285
|
+
@pulumi.getter(name="tokenNumUses")
|
|
286
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
287
|
+
"""
|
|
288
|
+
(Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
|
289
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
|
290
|
+
"""
|
|
291
|
+
return pulumi.get(self, "token_num_uses")
|
|
292
|
+
|
|
293
|
+
@token_num_uses.setter
|
|
294
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
295
|
+
pulumi.set(self, "token_num_uses", value)
|
|
296
|
+
|
|
297
|
+
@_builtins.property
|
|
298
|
+
@pulumi.getter(name="tokenPeriod")
|
|
299
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
300
|
+
"""
|
|
301
|
+
(Optional) If set, indicates that the
|
|
302
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
303
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
304
|
+
value of this field. Specified in seconds.
|
|
305
|
+
"""
|
|
306
|
+
return pulumi.get(self, "token_period")
|
|
307
|
+
|
|
308
|
+
@token_period.setter
|
|
309
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
310
|
+
pulumi.set(self, "token_period", value)
|
|
311
|
+
|
|
312
|
+
@_builtins.property
|
|
313
|
+
@pulumi.getter(name="tokenPolicies")
|
|
314
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
315
|
+
"""
|
|
316
|
+
(Optional) List of policies to encode onto generated tokens. Depending
|
|
317
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
318
|
+
"""
|
|
319
|
+
return pulumi.get(self, "token_policies")
|
|
320
|
+
|
|
321
|
+
@token_policies.setter
|
|
322
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
323
|
+
pulumi.set(self, "token_policies", value)
|
|
324
|
+
|
|
325
|
+
@_builtins.property
|
|
326
|
+
@pulumi.getter(name="tokenTtl")
|
|
327
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
328
|
+
"""
|
|
329
|
+
(Optional) The incremental lifetime for generated tokens in number of seconds.
|
|
330
|
+
Its current value will be referenced at renewal time.
|
|
331
|
+
"""
|
|
332
|
+
return pulumi.get(self, "token_ttl")
|
|
333
|
+
|
|
334
|
+
@token_ttl.setter
|
|
335
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
336
|
+
pulumi.set(self, "token_ttl", value)
|
|
337
|
+
|
|
338
|
+
@_builtins.property
|
|
339
|
+
@pulumi.getter(name="tokenType")
|
|
340
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
341
|
+
"""
|
|
342
|
+
Specifies the type of tokens that should be returned by
|
|
343
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
|
344
|
+
"""
|
|
345
|
+
return pulumi.get(self, "token_type")
|
|
346
|
+
|
|
347
|
+
@token_type.setter
|
|
348
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
349
|
+
pulumi.set(self, "token_type", value)
|
|
350
|
+
|
|
351
|
+
@_builtins.property
|
|
352
|
+
@pulumi.getter
|
|
353
|
+
def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
|
|
354
|
+
"""
|
|
355
|
+
Extra configuration block. Structure is documented below.
|
|
356
|
+
|
|
357
|
+
The `tune` block is used to tune the auth backend:
|
|
358
|
+
"""
|
|
359
|
+
return pulumi.get(self, "tune")
|
|
360
|
+
|
|
361
|
+
@tune.setter
|
|
362
|
+
def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
|
|
363
|
+
pulumi.set(self, "tune", value)
|
|
364
|
+
|
|
365
|
+
|
|
366
|
+
@pulumi.input_type
|
|
367
|
+
class _AuthBackendState:
|
|
368
|
+
def __init__(__self__, *,
|
|
369
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
|
370
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
371
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
|
372
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
373
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
374
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
375
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
|
376
|
+
organization_id: Optional[pulumi.Input[_builtins.int]] = None,
|
|
377
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
378
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
379
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
380
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
381
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
382
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
383
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
384
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
385
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
386
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
387
|
+
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
|
|
388
|
+
"""
|
|
389
|
+
Input properties used for looking up and filtering AuthBackend resources.
|
|
390
|
+
:param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
|
391
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: (Optional) The metadata to be tied to generated entity alias.
|
|
392
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
393
|
+
:param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
|
|
394
|
+
are running GitHub Enterprise or an API-compatible authentication server.
|
|
395
|
+
:param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
|
|
396
|
+
This overrides the current stored value, if any.
|
|
397
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
|
398
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
399
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
400
|
+
The value should not contain leading or trailing forward slashes.
|
|
401
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
402
|
+
*Available only for Vault Enterprise*.
|
|
403
|
+
:param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
|
|
404
|
+
:param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
|
|
405
|
+
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
|
406
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
|
407
|
+
if not specified.
|
|
408
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
|
409
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
410
|
+
as well.
|
|
411
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
|
|
412
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
413
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
414
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
415
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
|
416
|
+
Its current value will be referenced at renewal time.
|
|
417
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
|
418
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
419
|
+
:param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
|
420
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
|
421
|
+
:param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
|
|
422
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
423
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
424
|
+
value of this field. Specified in seconds.
|
|
425
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
|
426
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
427
|
+
:param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
|
428
|
+
Its current value will be referenced at renewal time.
|
|
429
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
|
430
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
|
431
|
+
:param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
|
432
|
+
|
|
433
|
+
The `tune` block is used to tune the auth backend:
|
|
434
|
+
"""
|
|
435
|
+
if accessor is not None:
|
|
436
|
+
pulumi.set(__self__, "accessor", accessor)
|
|
437
|
+
if alias_metadata is not None:
|
|
438
|
+
pulumi.set(__self__, "alias_metadata", alias_metadata)
|
|
439
|
+
if base_url is not None:
|
|
440
|
+
pulumi.set(__self__, "base_url", base_url)
|
|
441
|
+
if description is not None:
|
|
442
|
+
pulumi.set(__self__, "description", description)
|
|
443
|
+
if disable_remount is not None:
|
|
444
|
+
pulumi.set(__self__, "disable_remount", disable_remount)
|
|
445
|
+
if namespace is not None:
|
|
446
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
447
|
+
if organization is not None:
|
|
448
|
+
pulumi.set(__self__, "organization", organization)
|
|
449
|
+
if organization_id is not None:
|
|
450
|
+
pulumi.set(__self__, "organization_id", organization_id)
|
|
451
|
+
if path is not None:
|
|
452
|
+
pulumi.set(__self__, "path", path)
|
|
453
|
+
if token_bound_cidrs is not None:
|
|
454
|
+
pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
|
|
455
|
+
if token_explicit_max_ttl is not None:
|
|
456
|
+
pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
|
|
457
|
+
if token_max_ttl is not None:
|
|
458
|
+
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
|
459
|
+
if token_no_default_policy is not None:
|
|
460
|
+
pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
|
|
461
|
+
if token_num_uses is not None:
|
|
462
|
+
pulumi.set(__self__, "token_num_uses", token_num_uses)
|
|
463
|
+
if token_period is not None:
|
|
464
|
+
pulumi.set(__self__, "token_period", token_period)
|
|
465
|
+
if token_policies is not None:
|
|
466
|
+
pulumi.set(__self__, "token_policies", token_policies)
|
|
467
|
+
if token_ttl is not None:
|
|
468
|
+
pulumi.set(__self__, "token_ttl", token_ttl)
|
|
469
|
+
if token_type is not None:
|
|
470
|
+
pulumi.set(__self__, "token_type", token_type)
|
|
471
|
+
if tune is not None:
|
|
472
|
+
pulumi.set(__self__, "tune", tune)
|
|
473
|
+
|
|
474
|
+
@_builtins.property
|
|
475
|
+
@pulumi.getter
|
|
476
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
477
|
+
"""
|
|
478
|
+
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
|
479
|
+
"""
|
|
480
|
+
return pulumi.get(self, "accessor")
|
|
481
|
+
|
|
482
|
+
@accessor.setter
|
|
483
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
484
|
+
pulumi.set(self, "accessor", value)
|
|
485
|
+
|
|
486
|
+
@_builtins.property
|
|
487
|
+
@pulumi.getter(name="aliasMetadata")
|
|
488
|
+
def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
489
|
+
"""
|
|
490
|
+
(Optional) The metadata to be tied to generated entity alias.
|
|
491
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
492
|
+
"""
|
|
493
|
+
return pulumi.get(self, "alias_metadata")
|
|
494
|
+
|
|
495
|
+
@alias_metadata.setter
|
|
496
|
+
def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
497
|
+
pulumi.set(self, "alias_metadata", value)
|
|
498
|
+
|
|
499
|
+
@_builtins.property
|
|
500
|
+
@pulumi.getter(name="baseUrl")
|
|
501
|
+
def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
502
|
+
"""
|
|
503
|
+
The API endpoint to use. Useful if you
|
|
504
|
+
are running GitHub Enterprise or an API-compatible authentication server.
|
|
505
|
+
"""
|
|
506
|
+
return pulumi.get(self, "base_url")
|
|
507
|
+
|
|
508
|
+
@base_url.setter
|
|
509
|
+
def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
510
|
+
pulumi.set(self, "base_url", value)
|
|
511
|
+
|
|
512
|
+
@_builtins.property
|
|
513
|
+
@pulumi.getter
|
|
514
|
+
def description(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
515
|
+
"""
|
|
516
|
+
Specifies the description of the mount.
|
|
517
|
+
This overrides the current stored value, if any.
|
|
518
|
+
"""
|
|
519
|
+
return pulumi.get(self, "description")
|
|
520
|
+
|
|
521
|
+
@description.setter
|
|
522
|
+
def description(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
523
|
+
pulumi.set(self, "description", value)
|
|
524
|
+
|
|
525
|
+
@_builtins.property
|
|
526
|
+
@pulumi.getter(name="disableRemount")
|
|
527
|
+
def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
528
|
+
"""
|
|
529
|
+
If set, opts out of mount migration on path updates.
|
|
530
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
531
|
+
"""
|
|
532
|
+
return pulumi.get(self, "disable_remount")
|
|
533
|
+
|
|
534
|
+
@disable_remount.setter
|
|
535
|
+
def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
536
|
+
pulumi.set(self, "disable_remount", value)
|
|
537
|
+
|
|
538
|
+
@_builtins.property
|
|
539
|
+
@pulumi.getter
|
|
540
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
541
|
+
"""
|
|
542
|
+
The namespace to provision the resource in.
|
|
543
|
+
The value should not contain leading or trailing forward slashes.
|
|
544
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
545
|
+
*Available only for Vault Enterprise*.
|
|
546
|
+
"""
|
|
547
|
+
return pulumi.get(self, "namespace")
|
|
548
|
+
|
|
549
|
+
@namespace.setter
|
|
550
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
551
|
+
pulumi.set(self, "namespace", value)
|
|
552
|
+
|
|
553
|
+
@_builtins.property
|
|
554
|
+
@pulumi.getter
|
|
555
|
+
def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
556
|
+
"""
|
|
557
|
+
The organization configured users must be part of.
|
|
558
|
+
"""
|
|
559
|
+
return pulumi.get(self, "organization")
|
|
560
|
+
|
|
561
|
+
@organization.setter
|
|
562
|
+
def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
563
|
+
pulumi.set(self, "organization", value)
|
|
564
|
+
|
|
565
|
+
@_builtins.property
|
|
566
|
+
@pulumi.getter(name="organizationId")
|
|
567
|
+
def organization_id(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
568
|
+
"""
|
|
569
|
+
The ID of the organization users must be part of.
|
|
570
|
+
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
|
571
|
+
"""
|
|
572
|
+
return pulumi.get(self, "organization_id")
|
|
573
|
+
|
|
574
|
+
@organization_id.setter
|
|
575
|
+
def organization_id(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
576
|
+
pulumi.set(self, "organization_id", value)
|
|
577
|
+
|
|
578
|
+
@_builtins.property
|
|
579
|
+
@pulumi.getter
|
|
580
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
581
|
+
"""
|
|
582
|
+
Path where the auth backend is mounted. Defaults to `auth/github`
|
|
583
|
+
if not specified.
|
|
584
|
+
"""
|
|
585
|
+
return pulumi.get(self, "path")
|
|
586
|
+
|
|
587
|
+
@path.setter
|
|
588
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
589
|
+
pulumi.set(self, "path", value)
|
|
590
|
+
|
|
591
|
+
@_builtins.property
|
|
592
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
|
593
|
+
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
594
|
+
"""
|
|
595
|
+
(Optional) List of CIDR blocks; if set, specifies blocks of IP
|
|
596
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
597
|
+
as well.
|
|
598
|
+
"""
|
|
599
|
+
return pulumi.get(self, "token_bound_cidrs")
|
|
600
|
+
|
|
601
|
+
@token_bound_cidrs.setter
|
|
602
|
+
def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
603
|
+
pulumi.set(self, "token_bound_cidrs", value)
|
|
604
|
+
|
|
605
|
+
@_builtins.property
|
|
606
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
|
607
|
+
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
608
|
+
"""
|
|
609
|
+
(Optional) If set, will encode an
|
|
610
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
611
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
612
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
613
|
+
"""
|
|
614
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
|
615
|
+
|
|
616
|
+
@token_explicit_max_ttl.setter
|
|
617
|
+
def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
618
|
+
pulumi.set(self, "token_explicit_max_ttl", value)
|
|
619
|
+
|
|
620
|
+
@_builtins.property
|
|
621
|
+
@pulumi.getter(name="tokenMaxTtl")
|
|
622
|
+
def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
623
|
+
"""
|
|
624
|
+
(Optional) The maximum lifetime for generated tokens in number of seconds.
|
|
625
|
+
Its current value will be referenced at renewal time.
|
|
626
|
+
"""
|
|
627
|
+
return pulumi.get(self, "token_max_ttl")
|
|
628
|
+
|
|
629
|
+
@token_max_ttl.setter
|
|
630
|
+
def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
631
|
+
pulumi.set(self, "token_max_ttl", value)
|
|
632
|
+
|
|
633
|
+
@_builtins.property
|
|
634
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
|
635
|
+
def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
636
|
+
"""
|
|
637
|
+
(Optional) If set, the default policy will not be set on
|
|
638
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
639
|
+
"""
|
|
640
|
+
return pulumi.get(self, "token_no_default_policy")
|
|
641
|
+
|
|
642
|
+
@token_no_default_policy.setter
|
|
643
|
+
def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
644
|
+
pulumi.set(self, "token_no_default_policy", value)
|
|
645
|
+
|
|
646
|
+
@_builtins.property
|
|
647
|
+
@pulumi.getter(name="tokenNumUses")
|
|
648
|
+
def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
649
|
+
"""
|
|
650
|
+
(Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
|
651
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
|
652
|
+
"""
|
|
653
|
+
return pulumi.get(self, "token_num_uses")
|
|
654
|
+
|
|
655
|
+
@token_num_uses.setter
|
|
656
|
+
def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
657
|
+
pulumi.set(self, "token_num_uses", value)
|
|
658
|
+
|
|
659
|
+
@_builtins.property
|
|
660
|
+
@pulumi.getter(name="tokenPeriod")
|
|
661
|
+
def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
662
|
+
"""
|
|
663
|
+
(Optional) If set, indicates that the
|
|
664
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
665
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
666
|
+
value of this field. Specified in seconds.
|
|
667
|
+
"""
|
|
668
|
+
return pulumi.get(self, "token_period")
|
|
669
|
+
|
|
670
|
+
@token_period.setter
|
|
671
|
+
def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
672
|
+
pulumi.set(self, "token_period", value)
|
|
673
|
+
|
|
674
|
+
@_builtins.property
|
|
675
|
+
@pulumi.getter(name="tokenPolicies")
|
|
676
|
+
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
677
|
+
"""
|
|
678
|
+
(Optional) List of policies to encode onto generated tokens. Depending
|
|
679
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
680
|
+
"""
|
|
681
|
+
return pulumi.get(self, "token_policies")
|
|
682
|
+
|
|
683
|
+
@token_policies.setter
|
|
684
|
+
def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
685
|
+
pulumi.set(self, "token_policies", value)
|
|
686
|
+
|
|
687
|
+
@_builtins.property
|
|
688
|
+
@pulumi.getter(name="tokenTtl")
|
|
689
|
+
def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
690
|
+
"""
|
|
691
|
+
(Optional) The incremental lifetime for generated tokens in number of seconds.
|
|
692
|
+
Its current value will be referenced at renewal time.
|
|
693
|
+
"""
|
|
694
|
+
return pulumi.get(self, "token_ttl")
|
|
695
|
+
|
|
696
|
+
@token_ttl.setter
|
|
697
|
+
def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
698
|
+
pulumi.set(self, "token_ttl", value)
|
|
699
|
+
|
|
700
|
+
@_builtins.property
|
|
701
|
+
@pulumi.getter(name="tokenType")
|
|
702
|
+
def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
703
|
+
"""
|
|
704
|
+
Specifies the type of tokens that should be returned by
|
|
705
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
|
706
|
+
"""
|
|
707
|
+
return pulumi.get(self, "token_type")
|
|
708
|
+
|
|
709
|
+
@token_type.setter
|
|
710
|
+
def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
711
|
+
pulumi.set(self, "token_type", value)
|
|
712
|
+
|
|
713
|
+
@_builtins.property
|
|
714
|
+
@pulumi.getter
|
|
715
|
+
def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
|
|
716
|
+
"""
|
|
717
|
+
Extra configuration block. Structure is documented below.
|
|
718
|
+
|
|
719
|
+
The `tune` block is used to tune the auth backend:
|
|
720
|
+
"""
|
|
721
|
+
return pulumi.get(self, "tune")
|
|
722
|
+
|
|
723
|
+
@tune.setter
|
|
724
|
+
def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
|
|
725
|
+
pulumi.set(self, "tune", value)
|
|
726
|
+
|
|
727
|
+
|
|
728
|
+
@pulumi.type_token("vault:github/authBackend:AuthBackend")
|
|
729
|
+
class AuthBackend(pulumi.CustomResource):
|
|
730
|
+
@overload
|
|
731
|
+
def __init__(__self__,
|
|
732
|
+
resource_name: str,
|
|
733
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
734
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
735
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
|
736
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
737
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
738
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
739
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
|
740
|
+
organization_id: Optional[pulumi.Input[_builtins.int]] = None,
|
|
741
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
742
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
743
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
744
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
745
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
746
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
747
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
748
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
749
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
750
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
751
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
|
752
|
+
__props__=None):
|
|
753
|
+
"""
|
|
754
|
+
Manages a GitHub Auth mount in a Vault server. See the [Vault
|
|
755
|
+
documentation](https://www.vaultproject.io/docs/auth/github/) for more
|
|
756
|
+
information.
|
|
757
|
+
|
|
758
|
+
## Example Usage
|
|
759
|
+
|
|
760
|
+
```python
|
|
761
|
+
import pulumi
|
|
762
|
+
import pulumi_vault as vault
|
|
763
|
+
|
|
764
|
+
example = vault.github.AuthBackend("example", organization="myorg")
|
|
765
|
+
```
|
|
766
|
+
|
|
767
|
+
## Import
|
|
768
|
+
|
|
769
|
+
GitHub authentication mounts can be imported using the `path`, e.g.
|
|
770
|
+
|
|
771
|
+
```sh
|
|
772
|
+
$ pulumi import vault:github/authBackend:AuthBackend example github
|
|
773
|
+
```
|
|
774
|
+
|
|
775
|
+
:param str resource_name: The name of the resource.
|
|
776
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
777
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: (Optional) The metadata to be tied to generated entity alias.
|
|
778
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
779
|
+
:param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
|
|
780
|
+
are running GitHub Enterprise or an API-compatible authentication server.
|
|
781
|
+
:param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
|
|
782
|
+
This overrides the current stored value, if any.
|
|
783
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
|
784
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
785
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
786
|
+
The value should not contain leading or trailing forward slashes.
|
|
787
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
788
|
+
*Available only for Vault Enterprise*.
|
|
789
|
+
:param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
|
|
790
|
+
:param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
|
|
791
|
+
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
|
792
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
|
793
|
+
if not specified.
|
|
794
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
|
795
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
796
|
+
as well.
|
|
797
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
|
|
798
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
799
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
800
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
801
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
|
802
|
+
Its current value will be referenced at renewal time.
|
|
803
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
|
804
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
805
|
+
:param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
|
806
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
|
807
|
+
:param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
|
|
808
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
809
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
810
|
+
value of this field. Specified in seconds.
|
|
811
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
|
812
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
813
|
+
:param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
|
814
|
+
Its current value will be referenced at renewal time.
|
|
815
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
|
816
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
|
817
|
+
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
|
818
|
+
|
|
819
|
+
The `tune` block is used to tune the auth backend:
|
|
820
|
+
"""
|
|
821
|
+
...
|
|
822
|
+
@overload
|
|
823
|
+
def __init__(__self__,
|
|
824
|
+
resource_name: str,
|
|
825
|
+
args: AuthBackendArgs,
|
|
826
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
827
|
+
"""
|
|
828
|
+
Manages a GitHub Auth mount in a Vault server. See the [Vault
|
|
829
|
+
documentation](https://www.vaultproject.io/docs/auth/github/) for more
|
|
830
|
+
information.
|
|
831
|
+
|
|
832
|
+
## Example Usage
|
|
833
|
+
|
|
834
|
+
```python
|
|
835
|
+
import pulumi
|
|
836
|
+
import pulumi_vault as vault
|
|
837
|
+
|
|
838
|
+
example = vault.github.AuthBackend("example", organization="myorg")
|
|
839
|
+
```
|
|
840
|
+
|
|
841
|
+
## Import
|
|
842
|
+
|
|
843
|
+
GitHub authentication mounts can be imported using the `path`, e.g.
|
|
844
|
+
|
|
845
|
+
```sh
|
|
846
|
+
$ pulumi import vault:github/authBackend:AuthBackend example github
|
|
847
|
+
```
|
|
848
|
+
|
|
849
|
+
:param str resource_name: The name of the resource.
|
|
850
|
+
:param AuthBackendArgs args: The arguments to use to populate this resource's properties.
|
|
851
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
852
|
+
"""
|
|
853
|
+
...
|
|
854
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
855
|
+
resource_args, opts = _utilities.get_resource_args_opts(AuthBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
856
|
+
if resource_args is not None:
|
|
857
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
858
|
+
else:
|
|
859
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
860
|
+
|
|
861
|
+
def _internal_init(__self__,
|
|
862
|
+
resource_name: str,
|
|
863
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
864
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
865
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
|
866
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
867
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
868
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
869
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
|
870
|
+
organization_id: Optional[pulumi.Input[_builtins.int]] = None,
|
|
871
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
872
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
873
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
874
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
875
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
876
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
877
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
878
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
879
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
880
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
881
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
|
|
882
|
+
__props__=None):
|
|
883
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
884
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
885
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
886
|
+
if opts.id is None:
|
|
887
|
+
if __props__ is not None:
|
|
888
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
889
|
+
__props__ = AuthBackendArgs.__new__(AuthBackendArgs)
|
|
890
|
+
|
|
891
|
+
__props__.__dict__["alias_metadata"] = alias_metadata
|
|
892
|
+
__props__.__dict__["base_url"] = base_url
|
|
893
|
+
__props__.__dict__["description"] = description
|
|
894
|
+
__props__.__dict__["disable_remount"] = disable_remount
|
|
895
|
+
__props__.__dict__["namespace"] = namespace
|
|
896
|
+
if organization is None and not opts.urn:
|
|
897
|
+
raise TypeError("Missing required property 'organization'")
|
|
898
|
+
__props__.__dict__["organization"] = organization
|
|
899
|
+
__props__.__dict__["organization_id"] = organization_id
|
|
900
|
+
__props__.__dict__["path"] = path
|
|
901
|
+
__props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
|
|
902
|
+
__props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
|
|
903
|
+
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
|
904
|
+
__props__.__dict__["token_no_default_policy"] = token_no_default_policy
|
|
905
|
+
__props__.__dict__["token_num_uses"] = token_num_uses
|
|
906
|
+
__props__.__dict__["token_period"] = token_period
|
|
907
|
+
__props__.__dict__["token_policies"] = token_policies
|
|
908
|
+
__props__.__dict__["token_ttl"] = token_ttl
|
|
909
|
+
__props__.__dict__["token_type"] = token_type
|
|
910
|
+
__props__.__dict__["tune"] = tune
|
|
911
|
+
__props__.__dict__["accessor"] = None
|
|
912
|
+
super(AuthBackend, __self__).__init__(
|
|
913
|
+
'vault:github/authBackend:AuthBackend',
|
|
914
|
+
resource_name,
|
|
915
|
+
__props__,
|
|
916
|
+
opts)
|
|
917
|
+
|
|
918
|
+
@staticmethod
|
|
919
|
+
def get(resource_name: str,
|
|
920
|
+
id: pulumi.Input[str],
|
|
921
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
922
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
|
923
|
+
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
924
|
+
base_url: Optional[pulumi.Input[_builtins.str]] = None,
|
|
925
|
+
description: Optional[pulumi.Input[_builtins.str]] = None,
|
|
926
|
+
disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
927
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
928
|
+
organization: Optional[pulumi.Input[_builtins.str]] = None,
|
|
929
|
+
organization_id: Optional[pulumi.Input[_builtins.int]] = None,
|
|
930
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
931
|
+
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
932
|
+
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
933
|
+
token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
934
|
+
token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
935
|
+
token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
936
|
+
token_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
937
|
+
token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
938
|
+
token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
939
|
+
token_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
940
|
+
tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
|
|
941
|
+
"""
|
|
942
|
+
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
|
943
|
+
properties used to qualify the lookup.
|
|
944
|
+
|
|
945
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
946
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
947
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
948
|
+
:param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
|
949
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: (Optional) The metadata to be tied to generated entity alias.
|
|
950
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
951
|
+
:param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
|
|
952
|
+
are running GitHub Enterprise or an API-compatible authentication server.
|
|
953
|
+
:param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
|
|
954
|
+
This overrides the current stored value, if any.
|
|
955
|
+
:param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
|
|
956
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
957
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
958
|
+
The value should not contain leading or trailing forward slashes.
|
|
959
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
960
|
+
*Available only for Vault Enterprise*.
|
|
961
|
+
:param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
|
|
962
|
+
:param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
|
|
963
|
+
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
|
964
|
+
:param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
|
|
965
|
+
if not specified.
|
|
966
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
|
|
967
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
968
|
+
as well.
|
|
969
|
+
:param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
|
|
970
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
971
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
972
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
973
|
+
:param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
|
|
974
|
+
Its current value will be referenced at renewal time.
|
|
975
|
+
:param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
|
|
976
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
977
|
+
:param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
|
978
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
|
979
|
+
:param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
|
|
980
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
981
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
982
|
+
value of this field. Specified in seconds.
|
|
983
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
|
|
984
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
985
|
+
:param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
|
|
986
|
+
Its current value will be referenced at renewal time.
|
|
987
|
+
:param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
|
|
988
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
|
989
|
+
:param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
|
|
990
|
+
|
|
991
|
+
The `tune` block is used to tune the auth backend:
|
|
992
|
+
"""
|
|
993
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
994
|
+
|
|
995
|
+
__props__ = _AuthBackendState.__new__(_AuthBackendState)
|
|
996
|
+
|
|
997
|
+
__props__.__dict__["accessor"] = accessor
|
|
998
|
+
__props__.__dict__["alias_metadata"] = alias_metadata
|
|
999
|
+
__props__.__dict__["base_url"] = base_url
|
|
1000
|
+
__props__.__dict__["description"] = description
|
|
1001
|
+
__props__.__dict__["disable_remount"] = disable_remount
|
|
1002
|
+
__props__.__dict__["namespace"] = namespace
|
|
1003
|
+
__props__.__dict__["organization"] = organization
|
|
1004
|
+
__props__.__dict__["organization_id"] = organization_id
|
|
1005
|
+
__props__.__dict__["path"] = path
|
|
1006
|
+
__props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
|
|
1007
|
+
__props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
|
|
1008
|
+
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
|
1009
|
+
__props__.__dict__["token_no_default_policy"] = token_no_default_policy
|
|
1010
|
+
__props__.__dict__["token_num_uses"] = token_num_uses
|
|
1011
|
+
__props__.__dict__["token_period"] = token_period
|
|
1012
|
+
__props__.__dict__["token_policies"] = token_policies
|
|
1013
|
+
__props__.__dict__["token_ttl"] = token_ttl
|
|
1014
|
+
__props__.__dict__["token_type"] = token_type
|
|
1015
|
+
__props__.__dict__["tune"] = tune
|
|
1016
|
+
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
|
1017
|
+
|
|
1018
|
+
@_builtins.property
|
|
1019
|
+
@pulumi.getter
|
|
1020
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
|
1021
|
+
"""
|
|
1022
|
+
The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
|
1023
|
+
"""
|
|
1024
|
+
return pulumi.get(self, "accessor")
|
|
1025
|
+
|
|
1026
|
+
@_builtins.property
|
|
1027
|
+
@pulumi.getter(name="aliasMetadata")
|
|
1028
|
+
def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
|
1029
|
+
"""
|
|
1030
|
+
(Optional) The metadata to be tied to generated entity alias.
|
|
1031
|
+
This should be a list or map containing the metadata in key value pairs.
|
|
1032
|
+
"""
|
|
1033
|
+
return pulumi.get(self, "alias_metadata")
|
|
1034
|
+
|
|
1035
|
+
@_builtins.property
|
|
1036
|
+
@pulumi.getter(name="baseUrl")
|
|
1037
|
+
def base_url(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1038
|
+
"""
|
|
1039
|
+
The API endpoint to use. Useful if you
|
|
1040
|
+
are running GitHub Enterprise or an API-compatible authentication server.
|
|
1041
|
+
"""
|
|
1042
|
+
return pulumi.get(self, "base_url")
|
|
1043
|
+
|
|
1044
|
+
@_builtins.property
|
|
1045
|
+
@pulumi.getter
|
|
1046
|
+
def description(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1047
|
+
"""
|
|
1048
|
+
Specifies the description of the mount.
|
|
1049
|
+
This overrides the current stored value, if any.
|
|
1050
|
+
"""
|
|
1051
|
+
return pulumi.get(self, "description")
|
|
1052
|
+
|
|
1053
|
+
@_builtins.property
|
|
1054
|
+
@pulumi.getter(name="disableRemount")
|
|
1055
|
+
def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1056
|
+
"""
|
|
1057
|
+
If set, opts out of mount migration on path updates.
|
|
1058
|
+
See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
1059
|
+
"""
|
|
1060
|
+
return pulumi.get(self, "disable_remount")
|
|
1061
|
+
|
|
1062
|
+
@_builtins.property
|
|
1063
|
+
@pulumi.getter
|
|
1064
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1065
|
+
"""
|
|
1066
|
+
The namespace to provision the resource in.
|
|
1067
|
+
The value should not contain leading or trailing forward slashes.
|
|
1068
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
1069
|
+
*Available only for Vault Enterprise*.
|
|
1070
|
+
"""
|
|
1071
|
+
return pulumi.get(self, "namespace")
|
|
1072
|
+
|
|
1073
|
+
@_builtins.property
|
|
1074
|
+
@pulumi.getter
|
|
1075
|
+
def organization(self) -> pulumi.Output[_builtins.str]:
|
|
1076
|
+
"""
|
|
1077
|
+
The organization configured users must be part of.
|
|
1078
|
+
"""
|
|
1079
|
+
return pulumi.get(self, "organization")
|
|
1080
|
+
|
|
1081
|
+
@_builtins.property
|
|
1082
|
+
@pulumi.getter(name="organizationId")
|
|
1083
|
+
def organization_id(self) -> pulumi.Output[_builtins.int]:
|
|
1084
|
+
"""
|
|
1085
|
+
The ID of the organization users must be part of.
|
|
1086
|
+
Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
|
1087
|
+
"""
|
|
1088
|
+
return pulumi.get(self, "organization_id")
|
|
1089
|
+
|
|
1090
|
+
@_builtins.property
|
|
1091
|
+
@pulumi.getter
|
|
1092
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1093
|
+
"""
|
|
1094
|
+
Path where the auth backend is mounted. Defaults to `auth/github`
|
|
1095
|
+
if not specified.
|
|
1096
|
+
"""
|
|
1097
|
+
return pulumi.get(self, "path")
|
|
1098
|
+
|
|
1099
|
+
@_builtins.property
|
|
1100
|
+
@pulumi.getter(name="tokenBoundCidrs")
|
|
1101
|
+
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1102
|
+
"""
|
|
1103
|
+
(Optional) List of CIDR blocks; if set, specifies blocks of IP
|
|
1104
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
1105
|
+
as well.
|
|
1106
|
+
"""
|
|
1107
|
+
return pulumi.get(self, "token_bound_cidrs")
|
|
1108
|
+
|
|
1109
|
+
@_builtins.property
|
|
1110
|
+
@pulumi.getter(name="tokenExplicitMaxTtl")
|
|
1111
|
+
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1112
|
+
"""
|
|
1113
|
+
(Optional) If set, will encode an
|
|
1114
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
1115
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
|
1116
|
+
`token_max_ttl` would otherwise allow a renewal.
|
|
1117
|
+
"""
|
|
1118
|
+
return pulumi.get(self, "token_explicit_max_ttl")
|
|
1119
|
+
|
|
1120
|
+
@_builtins.property
|
|
1121
|
+
@pulumi.getter(name="tokenMaxTtl")
|
|
1122
|
+
def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1123
|
+
"""
|
|
1124
|
+
(Optional) The maximum lifetime for generated tokens in number of seconds.
|
|
1125
|
+
Its current value will be referenced at renewal time.
|
|
1126
|
+
"""
|
|
1127
|
+
return pulumi.get(self, "token_max_ttl")
|
|
1128
|
+
|
|
1129
|
+
@_builtins.property
|
|
1130
|
+
@pulumi.getter(name="tokenNoDefaultPolicy")
|
|
1131
|
+
def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
1132
|
+
"""
|
|
1133
|
+
(Optional) If set, the default policy will not be set on
|
|
1134
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
1135
|
+
"""
|
|
1136
|
+
return pulumi.get(self, "token_no_default_policy")
|
|
1137
|
+
|
|
1138
|
+
@_builtins.property
|
|
1139
|
+
@pulumi.getter(name="tokenNumUses")
|
|
1140
|
+
def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1141
|
+
"""
|
|
1142
|
+
(Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
|
|
1143
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
|
1144
|
+
"""
|
|
1145
|
+
return pulumi.get(self, "token_num_uses")
|
|
1146
|
+
|
|
1147
|
+
@_builtins.property
|
|
1148
|
+
@pulumi.getter(name="tokenPeriod")
|
|
1149
|
+
def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1150
|
+
"""
|
|
1151
|
+
(Optional) If set, indicates that the
|
|
1152
|
+
token generated using this role should never expire. The token should be renewed within the
|
|
1153
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
1154
|
+
value of this field. Specified in seconds.
|
|
1155
|
+
"""
|
|
1156
|
+
return pulumi.get(self, "token_period")
|
|
1157
|
+
|
|
1158
|
+
@_builtins.property
|
|
1159
|
+
@pulumi.getter(name="tokenPolicies")
|
|
1160
|
+
def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
1161
|
+
"""
|
|
1162
|
+
(Optional) List of policies to encode onto generated tokens. Depending
|
|
1163
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
|
1164
|
+
"""
|
|
1165
|
+
return pulumi.get(self, "token_policies")
|
|
1166
|
+
|
|
1167
|
+
@_builtins.property
|
|
1168
|
+
@pulumi.getter(name="tokenTtl")
|
|
1169
|
+
def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1170
|
+
"""
|
|
1171
|
+
(Optional) The incremental lifetime for generated tokens in number of seconds.
|
|
1172
|
+
Its current value will be referenced at renewal time.
|
|
1173
|
+
"""
|
|
1174
|
+
return pulumi.get(self, "token_ttl")
|
|
1175
|
+
|
|
1176
|
+
@_builtins.property
|
|
1177
|
+
@pulumi.getter(name="tokenType")
|
|
1178
|
+
def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1179
|
+
"""
|
|
1180
|
+
Specifies the type of tokens that should be returned by
|
|
1181
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
|
1182
|
+
"""
|
|
1183
|
+
return pulumi.get(self, "token_type")
|
|
1184
|
+
|
|
1185
|
+
@_builtins.property
|
|
1186
|
+
@pulumi.getter
|
|
1187
|
+
def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
|
|
1188
|
+
"""
|
|
1189
|
+
Extra configuration block. Structure is documented below.
|
|
1190
|
+
|
|
1191
|
+
The `tune` block is used to tune the auth backend:
|
|
1192
|
+
"""
|
|
1193
|
+
return pulumi.get(self, "tune")
|
|
1194
|
+
|