Module kubernetes
This provider is a derived work of the Terraform Provider distributed under MPL 2.0. If you encounter a bug or missing feature, first check the
pulumi/pulumi-vaultrepo; however, if that doesn’t turn up anything, please consult the sourceterraform-providers/terraform-provider-vaultrepo.
Resources
Functions
Others
- AuthBackendConfigArgs
- AuthBackendConfigState
- AuthBackendRoleArgs
- AuthBackendRoleState
- GetAuthBackendConfigArgs
- GetAuthBackendConfigResult
- GetAuthBackendRoleArgs
- GetAuthBackendRoleResult
Resources
Resource AuthBackendConfig
class AuthBackendConfig extends CustomResourceManages an Kubernetes auth backend config in a Vault server. See the Vault documentation for more information.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const kubernetes = new vault.AuthBackend("kubernetes", {
type: "kubernetes",
});
const example = new vault.kubernetes.AuthBackendConfig("example", {
backend: kubernetes.path,
issuer: "api",
kubernetesCaCert: `-----BEGIN CERTIFICATE-----
example
-----END CERTIFICATE-----`,
kubernetesHost: "http://example.com:443",
tokenReviewerJwt: "ZXhhbXBsZQo=",
});constructor
new AuthBackendConfig(name: string, args: AuthBackendConfigArgs, opts?: pulumi.CustomResourceOptions)Create a AuthBackendConfig resource with the given unique name, arguments, and options.
nameThe unique name of the resource.argsThe arguments to use to populate this resource's properties.optsA bag of options that control this resource's behavior.
method get
public static get(name: string, id: pulumi.Input<pulumi.ID>, state?: AuthBackendConfigState, opts?: pulumi.CustomResourceOptions): AuthBackendConfigGet an existing AuthBackendConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
method getProvider
getProvider(moduleMember: string): ProviderResource | undefinedmethod isInstance
public static isInstance(obj: any): obj is AuthBackendConfigReturns true if the given object is an instance of AuthBackendConfig. This is designed to work even when multiple copies of the Pulumi SDK have been loaded into the same process.
property backend
public backend: pulumi.Output<string | undefined>;Unique name of the kubernetes backend to configure.
property id
id: Output<ID>;id is the provider-assigned unique ID for this managed resource. It is set during deployments and may be missing (undefined) during planning phases.
property issuer
public issuer: pulumi.Output<string | undefined>;Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
property kubernetesCaCert
public kubernetesCaCert: pulumi.Output<string | undefined>;PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
property kubernetesHost
public kubernetesHost: pulumi.Output<string>;Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
property pemKeys
public pemKeys: pulumi.Output<string[] | undefined>;List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
property tokenReviewerJwt
public tokenReviewerJwt: pulumi.Output<string | undefined>;A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
property urn
urn: Output<URN>;urn is the stable logical URN used to distinctly address a resource, both before and after deployments.
Resource AuthBackendRole
class AuthBackendRole extends CustomResourceManages an Kubernetes auth backend role in a Vault server. See the Vault documentation for more information.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const kubernetes = new vault.AuthBackend("kubernetes", {type: "kubernetes"});
const example = new vault.kubernetes.AuthBackendRole("example", {
backend: kubernetes.path,
roleName: "example-role",
boundServiceAccountNames: ["example"],
boundServiceAccountNamespaces: ["example"],
tokenTtl: 3600,
tokenPolicies: [
"default",
"dev",
"prod",
],
audience: "vault",
});constructor
new AuthBackendRole(name: string, args: AuthBackendRoleArgs, opts?: pulumi.CustomResourceOptions)Create a AuthBackendRole resource with the given unique name, arguments, and options.
nameThe unique name of the resource.argsThe arguments to use to populate this resource's properties.optsA bag of options that control this resource's behavior.
method get
public static get(name: string, id: pulumi.Input<pulumi.ID>, state?: AuthBackendRoleState, opts?: pulumi.CustomResourceOptions): AuthBackendRoleGet an existing AuthBackendRole resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
method getProvider
getProvider(moduleMember: string): ProviderResource | undefinedmethod isInstance
public static isInstance(obj: any): obj is AuthBackendRoleReturns true if the given object is an instance of AuthBackendRole. This is designed to work even when multiple copies of the Pulumi SDK have been loaded into the same process.
property audience
public audience: pulumi.Output<string | undefined>;Audience claim to verify in the JWT.
property backend
public backend: pulumi.Output<string | undefined>;Unique name of the kubernetes backend to configure.
property boundCidrs
public boundCidrs: pulumi.Output<string[] | undefined>;If set, a list of CIDRs valid as the source address for login requests. This value is also encoded into any resulting token.
property boundServiceAccountNames
public boundServiceAccountNames: pulumi.Output<string[]>;List of service account names able to access this role. If set to ["*"] all names are allowed, both this and boundServiceAccountNamespaces can not be “*“.
property boundServiceAccountNamespaces
public boundServiceAccountNamespaces: pulumi.Output<string[]>;List of namespaces allowed to access this role. If set to ["*"] all namespaces are allowed, both this and boundServiceAccountNames can not be set to “*“.
property id
id: Output<ID>;id is the provider-assigned unique ID for this managed resource. It is set during deployments and may be missing (undefined) during planning phases.
property maxTtl
public maxTtl: pulumi.Output<number | undefined>;The maximum allowed lifetime of tokens issued using this role, provided as a number of seconds.
property numUses
public numUses: pulumi.Output<number | undefined>;If set, puts a use-count limitation on the issued token.
property period
public period: pulumi.Output<number | undefined>;If set, indicates that the token generated using this role should never expire. The token should be renewed within the duration specified by this value. At each renewal, the token’s TTL will be set to the value of this field. Specified in seconds.
property policies
public policies: pulumi.Output<string[] | undefined>;An array of strings specifying the policies to be set on tokens issued using this role.
property roleName
public roleName: pulumi.Output<string>;Name of the role.
property tokenBoundCidrs
public tokenBoundCidrs: pulumi.Output<string[] | undefined>;List of CIDR blocks; if set, specifies blocks of IP addresses which can authenticate successfully, and ties the resulting token to these blocks as well.
property tokenExplicitMaxTtl
public tokenExplicitMaxTtl: pulumi.Output<number | undefined>;If set, will encode an
explicit max TTL
onto the token in number of seconds. This is a hard cap even if tokenTtl and
tokenMaxTtl would otherwise allow a renewal.
property tokenMaxTtl
public tokenMaxTtl: pulumi.Output<number | undefined>;The maximum lifetime for generated tokens in number of seconds. Its current value will be referenced at renewal time.
property tokenNoDefaultPolicy
public tokenNoDefaultPolicy: pulumi.Output<boolean | undefined>;If set, the default policy will not be set on generated tokens; otherwise it will be added to the policies set in token_policies.
property tokenNumUses
public tokenNumUses: pulumi.Output<number | undefined>;The period, if any, in number of seconds to set on the token.
property tokenPeriod
public tokenPeriod: pulumi.Output<number | undefined>;If set, indicates that the token generated using this role should never expire. The token should be renewed within the duration specified by this value. At each renewal, the token’s TTL will be set to the value of this field. Specified in seconds.
property tokenPolicies
public tokenPolicies: pulumi.Output<string[] | undefined>;List of policies to encode onto generated tokens. Depending on the auth method, this list may be supplemented by user/group/other values.
property tokenTtl
public tokenTtl: pulumi.Output<number | undefined>;The incremental lifetime for generated tokens in number of seconds. Its current value will be referenced at renewal time.
property tokenType
public tokenType: pulumi.Output<string | undefined>;The type of token that should be generated. Can be service,
batch, or default to use the mount’s tuned default (which unless changed will be
service tokens). For token store roles, there are two additional possibilities:
default-service and default-batch which specify the type to return unless the client
requests a different type at generation time.
property ttl
public ttl: pulumi.Output<number | undefined>;The TTL period of tokens issued using this role, provided as a number of seconds.
property urn
urn: Output<URN>;urn is the stable logical URN used to distinctly address a resource, both before and after deployments.
Functions
Function getAuthBackendConfig
getAuthBackendConfig(args?: GetAuthBackendConfigArgs, opts?: pulumi.InvokeOptions): Promise<GetAuthBackendConfigResult>Reads the Role of an Kubernetes from a Vault server. See the Vault documentation for more information.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const config = pulumi.output(vault.kubernetes.getAuthBackendConfig({
backend: "my-kubernetes-backend",
}, { async: true }));
export const tokenReviewerJwt = config.tokenReviewerJwt;Function getAuthBackendRole
getAuthBackendRole(args: GetAuthBackendRoleArgs, opts?: pulumi.InvokeOptions): Promise<GetAuthBackendRoleResult>Reads the Role of an Kubernetes from a Vault server. See the Vault documentation for more information.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const role = pulumi.output(vault.kubernetes.getAuthBackendRole({
backend: "my-kubernetes-backend",
roleName: "my-role",
}, { async: true }));
export const policies = role.policies!;Others
interface AuthBackendConfigArgs
interface AuthBackendConfigArgsThe set of arguments for constructing a AuthBackendConfig resource.
property backend
backend?: pulumi.Input<string>;Unique name of the kubernetes backend to configure.
property issuer
issuer?: pulumi.Input<string>;Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
property kubernetesCaCert
kubernetesCaCert?: pulumi.Input<string>;PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
property kubernetesHost
kubernetesHost: pulumi.Input<string>;Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
property pemKeys
pemKeys?: pulumi.Input<pulumi.Input<string>[]>;List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
property tokenReviewerJwt
tokenReviewerJwt?: pulumi.Input<string>;A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
interface AuthBackendConfigState
interface AuthBackendConfigStateInput properties used for looking up and filtering AuthBackendConfig resources.
property backend
backend?: pulumi.Input<string>;Unique name of the kubernetes backend to configure.
property issuer
issuer?: pulumi.Input<string>;Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
property kubernetesCaCert
kubernetesCaCert?: pulumi.Input<string>;PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
property kubernetesHost
kubernetesHost?: pulumi.Input<string>;Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
property pemKeys
pemKeys?: pulumi.Input<pulumi.Input<string>[]>;List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
property tokenReviewerJwt
tokenReviewerJwt?: pulumi.Input<string>;A service account JWT used to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
interface AuthBackendRoleArgs
interface AuthBackendRoleArgsThe set of arguments for constructing a AuthBackendRole resource.
property audience
audience?: pulumi.Input<string>;Audience claim to verify in the JWT.
property backend
backend?: pulumi.Input<string>;Unique name of the kubernetes backend to configure.
property boundCidrs
token_bound_cidrs instead if you are running Vault >= 1.2boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;If set, a list of CIDRs valid as the source address for login requests. This value is also encoded into any resulting token.
property boundServiceAccountNames
boundServiceAccountNames: pulumi.Input<pulumi.Input<string>[]>;List of service account names able to access this role. If set to ["*"] all names are allowed, both this and boundServiceAccountNamespaces can not be “*“.
property boundServiceAccountNamespaces
boundServiceAccountNamespaces: pulumi.Input<pulumi.Input<string>[]>;List of namespaces allowed to access this role. If set to ["*"] all namespaces are allowed, both this and boundServiceAccountNames can not be set to “*“.
property maxTtl
token_max_ttl instead if you are running Vault >= 1.2maxTtl?: pulumi.Input<number>;The maximum allowed lifetime of tokens issued using this role, provided as a number of seconds.
property numUses
token_num_uses instead if you are running Vault >= 1.2numUses?: pulumi.Input<number>;If set, puts a use-count limitation on the issued token.
property period
token_period instead if you are running Vault >= 1.2period?: pulumi.Input<number>;If set, indicates that the token generated using this role should never expire. The token should be renewed within the duration specified by this value. At each renewal, the token’s TTL will be set to the value of this field. Specified in seconds.
property policies
token_policies instead if you are running Vault >= 1.2policies?: pulumi.Input<pulumi.Input<string>[]>;An array of strings specifying the policies to be set on tokens issued using this role.
property roleName
roleName: pulumi.Input<string>;Name of the role.
property tokenBoundCidrs
tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;List of CIDR blocks; if set, specifies blocks of IP addresses which can authenticate successfully, and ties the resulting token to these blocks as well.
property tokenExplicitMaxTtl
tokenExplicitMaxTtl?: pulumi.Input<number>;If set, will encode an
explicit max TTL
onto the token in number of seconds. This is a hard cap even if tokenTtl and
tokenMaxTtl would otherwise allow a renewal.
property tokenMaxTtl
tokenMaxTtl?: pulumi.Input<number>;The maximum lifetime for generated tokens in number of seconds. Its current value will be referenced at renewal time.
property tokenNoDefaultPolicy
tokenNoDefaultPolicy?: pulumi.Input<boolean>;If set, the default policy will not be set on generated tokens; otherwise it will be added to the policies set in token_policies.
property tokenNumUses
tokenNumUses?: pulumi.Input<number>;The period, if any, in number of seconds to set on the token.
property tokenPeriod
tokenPeriod?: pulumi.Input<number>;If set, indicates that the token generated using this role should never expire. The token should be renewed within the duration specified by this value. At each renewal, the token’s TTL will be set to the value of this field. Specified in seconds.
property tokenPolicies
tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;List of policies to encode onto generated tokens. Depending on the auth method, this list may be supplemented by user/group/other values.
property tokenTtl
tokenTtl?: pulumi.Input<number>;The incremental lifetime for generated tokens in number of seconds. Its current value will be referenced at renewal time.
property tokenType
tokenType?: pulumi.Input<string>;The type of token that should be generated. Can be service,
batch, or default to use the mount’s tuned default (which unless changed will be
service tokens). For token store roles, there are two additional possibilities:
default-service and default-batch which specify the type to return unless the client
requests a different type at generation time.
property ttl
token_ttl instead if you are running Vault >= 1.2ttl?: pulumi.Input<number>;The TTL period of tokens issued using this role, provided as a number of seconds.
interface AuthBackendRoleState
interface AuthBackendRoleStateInput properties used for looking up and filtering AuthBackendRole resources.
property audience
audience?: pulumi.Input<string>;Audience claim to verify in the JWT.
property backend
backend?: pulumi.Input<string>;Unique name of the kubernetes backend to configure.
property boundCidrs
token_bound_cidrs instead if you are running Vault >= 1.2boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;If set, a list of CIDRs valid as the source address for login requests. This value is also encoded into any resulting token.
property boundServiceAccountNames
boundServiceAccountNames?: pulumi.Input<pulumi.Input<string>[]>;List of service account names able to access this role. If set to ["*"] all names are allowed, both this and boundServiceAccountNamespaces can not be “*“.
property boundServiceAccountNamespaces
boundServiceAccountNamespaces?: pulumi.Input<pulumi.Input<string>[]>;List of namespaces allowed to access this role. If set to ["*"] all namespaces are allowed, both this and boundServiceAccountNames can not be set to “*“.
property maxTtl
token_max_ttl instead if you are running Vault >= 1.2maxTtl?: pulumi.Input<number>;The maximum allowed lifetime of tokens issued using this role, provided as a number of seconds.
property numUses
token_num_uses instead if you are running Vault >= 1.2numUses?: pulumi.Input<number>;If set, puts a use-count limitation on the issued token.
property period
token_period instead if you are running Vault >= 1.2period?: pulumi.Input<number>;If set, indicates that the token generated using this role should never expire. The token should be renewed within the duration specified by this value. At each renewal, the token’s TTL will be set to the value of this field. Specified in seconds.
property policies
token_policies instead if you are running Vault >= 1.2policies?: pulumi.Input<pulumi.Input<string>[]>;An array of strings specifying the policies to be set on tokens issued using this role.
property roleName
roleName?: pulumi.Input<string>;Name of the role.
property tokenBoundCidrs
tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;List of CIDR blocks; if set, specifies blocks of IP addresses which can authenticate successfully, and ties the resulting token to these blocks as well.
property tokenExplicitMaxTtl
tokenExplicitMaxTtl?: pulumi.Input<number>;If set, will encode an
explicit max TTL
onto the token in number of seconds. This is a hard cap even if tokenTtl and
tokenMaxTtl would otherwise allow a renewal.
property tokenMaxTtl
tokenMaxTtl?: pulumi.Input<number>;The maximum lifetime for generated tokens in number of seconds. Its current value will be referenced at renewal time.
property tokenNoDefaultPolicy
tokenNoDefaultPolicy?: pulumi.Input<boolean>;If set, the default policy will not be set on generated tokens; otherwise it will be added to the policies set in token_policies.
property tokenNumUses
tokenNumUses?: pulumi.Input<number>;The period, if any, in number of seconds to set on the token.
property tokenPeriod
tokenPeriod?: pulumi.Input<number>;If set, indicates that the token generated using this role should never expire. The token should be renewed within the duration specified by this value. At each renewal, the token’s TTL will be set to the value of this field. Specified in seconds.
property tokenPolicies
tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;List of policies to encode onto generated tokens. Depending on the auth method, this list may be supplemented by user/group/other values.
property tokenTtl
tokenTtl?: pulumi.Input<number>;The incremental lifetime for generated tokens in number of seconds. Its current value will be referenced at renewal time.
property tokenType
tokenType?: pulumi.Input<string>;The type of token that should be generated. Can be service,
batch, or default to use the mount’s tuned default (which unless changed will be
service tokens). For token store roles, there are two additional possibilities:
default-service and default-batch which specify the type to return unless the client
requests a different type at generation time.
property ttl
token_ttl instead if you are running Vault >= 1.2ttl?: pulumi.Input<number>;The TTL period of tokens issued using this role, provided as a number of seconds.
interface GetAuthBackendConfigArgs
interface GetAuthBackendConfigArgsA collection of arguments for invoking getAuthBackendConfig.
property backend
backend?: undefined | string;The unique name for the Kubernetes backend the config to retrieve Role attributes for resides in. Defaults to “kubernetes”.
property issuer
issuer?: undefined | string;Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
property kubernetesCaCert
kubernetesCaCert?: undefined | string;PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
property kubernetesHost
kubernetesHost?: undefined | string;Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
property pemKeys
pemKeys?: string[];Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
interface GetAuthBackendConfigResult
interface GetAuthBackendConfigResultA collection of values returned by getAuthBackendConfig.
property backend
backend?: undefined | string;property id
id: string;The provider-assigned unique ID for this managed resource.
property issuer
issuer: string;Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
property kubernetesCaCert
kubernetesCaCert: string;PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
property kubernetesHost
kubernetesHost: string;Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
property pemKeys
pemKeys: string[];Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
interface GetAuthBackendRoleArgs
interface GetAuthBackendRoleArgsA collection of arguments for invoking getAuthBackendRole.
property audience
audience?: undefined | string;(Optional) Audience claim to verify in the JWT.
property backend
backend?: undefined | string;The unique name for the Kubernetes backend the role to retrieve Role attributes for resides in. Defaults to “kubernetes”.
property boundCidrs
boundCidrs?: string[];property maxTtl
maxTtl?: undefined | number;property numUses
numUses?: undefined | number;property period
period?: undefined | number;property policies
policies?: string[];property roleName
roleName: string;The name of the role to retrieve the Role attributes for.
property tokenBoundCidrs
tokenBoundCidrs?: string[];List of CIDR blocks; if set, specifies blocks of IP addresses which can authenticate successfully, and ties the resulting token to these blocks as well.
property tokenExplicitMaxTtl
tokenExplicitMaxTtl?: undefined | number;If set, will encode an
explicit max TTL
onto the token in number of seconds. This is a hard cap even if tokenTtl and
tokenMaxTtl would otherwise allow a renewal.
property tokenMaxTtl
tokenMaxTtl?: undefined | number;The maximum lifetime for generated tokens in number of seconds. Its current value will be referenced at renewal time.
property tokenNoDefaultPolicy
tokenNoDefaultPolicy?: undefined | false | true;If set, the default policy will not be set on generated tokens; otherwise it will be added to the policies set in token_policies.
property tokenNumUses
tokenNumUses?: undefined | number;The period, if any, in number of seconds to set on the token.
property tokenPeriod
tokenPeriod?: undefined | number;(Optional) If set, indicates that the token generated using this role should never expire. The token should be renewed within the duration specified by this value. At each renewal, the token’s TTL will be set to the value of this field. Specified in seconds.
property tokenPolicies
tokenPolicies?: string[];List of policies to encode onto generated tokens. Depending on the auth method, this list may be supplemented by user/group/other values.
property tokenTtl
tokenTtl?: undefined | number;The incremental lifetime for generated tokens in number of seconds. Its current value will be referenced at renewal time.
property tokenType
tokenType?: undefined | string;The type of token that should be generated. Can be service,
batch, or default to use the mount’s tuned default (which unless changed will be
service tokens). For token store roles, there are two additional possibilities:
default-service and default-batch which specify the type to return unless the client
requests a different type at generation time.
property ttl
ttl?: undefined | number;interface GetAuthBackendRoleResult
interface GetAuthBackendRoleResultA collection of values returned by getAuthBackendRole.
property audience
audience?: undefined | string;(Optional) Audience claim to verify in the JWT.
property backend
backend?: undefined | string;property boundCidrs
boundCidrs?: string[];property boundServiceAccountNames
boundServiceAccountNames: string[];List of service account names able to access this role. If set to “” all names are allowed, both this and boundServiceAccountNamespaces can not be “”.
property boundServiceAccountNamespaces
boundServiceAccountNamespaces: string[];List of namespaces allowed to access this role. If set to “” all namespaces are allowed, both this and boundServiceAccountNames can not be set to “”.
property id
id: string;The provider-assigned unique ID for this managed resource.
property maxTtl
maxTtl?: undefined | number;property numUses
numUses?: undefined | number;property period
period?: undefined | number;property policies
policies?: string[];property roleName
roleName: string;property tokenBoundCidrs
tokenBoundCidrs?: string[];List of CIDR blocks; if set, specifies blocks of IP addresses which can authenticate successfully, and ties the resulting token to these blocks as well.
property tokenExplicitMaxTtl
tokenExplicitMaxTtl?: undefined | number;If set, will encode an
explicit max TTL
onto the token in number of seconds. This is a hard cap even if tokenTtl and
tokenMaxTtl would otherwise allow a renewal.
property tokenMaxTtl
tokenMaxTtl?: undefined | number;The maximum lifetime for generated tokens in number of seconds. Its current value will be referenced at renewal time.
property tokenNoDefaultPolicy
tokenNoDefaultPolicy?: undefined | false | true;If set, the default policy will not be set on generated tokens; otherwise it will be added to the policies set in token_policies.
property tokenNumUses
tokenNumUses?: undefined | number;The period, if any, in number of seconds to set on the token.
property tokenPeriod
tokenPeriod?: undefined | number;(Optional) If set, indicates that the token generated using this role should never expire. The token should be renewed within the duration specified by this value. At each renewal, the token’s TTL will be set to the value of this field. Specified in seconds.
property tokenPolicies
tokenPolicies?: string[];List of policies to encode onto generated tokens. Depending on the auth method, this list may be supplemented by user/group/other values.
property tokenTtl
tokenTtl?: undefined | number;The incremental lifetime for generated tokens in number of seconds. Its current value will be referenced at renewal time.
property tokenType
tokenType?: undefined | string;The type of token that should be generated. Can be service,
batch, or default to use the mount’s tuned default (which unless changed will be
service tokens). For token store roles, there are two additional possibilities:
default-service and default-batch which specify the type to return unless the client
requests a different type at generation time.
property ttl
ttl?: undefined | number;