pulumi-harness 0.5.0a1736833425__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-harness might be problematic. Click here for more details.
- pulumi_harness/__init__.py +1257 -0
- pulumi_harness/_inputs.py +4025 -0
- pulumi_harness/_utilities.py +327 -0
- pulumi_harness/add_user_to_group.py +241 -0
- pulumi_harness/application.py +393 -0
- pulumi_harness/application_git_sync.py +411 -0
- pulumi_harness/autostopping/__init__.py +27 -0
- pulumi_harness/autostopping/_inputs.py +2688 -0
- pulumi_harness/autostopping/aws_alb.py +640 -0
- pulumi_harness/autostopping/aws_proxy.py +760 -0
- pulumi_harness/autostopping/azure_gateway.py +798 -0
- pulumi_harness/autostopping/azure_proxy.py +855 -0
- pulumi_harness/autostopping/gcp_proxy.py +779 -0
- pulumi_harness/autostopping/get_aws_alb.py +278 -0
- pulumi_harness/autostopping/get_aws_proxy.py +335 -0
- pulumi_harness/autostopping/get_azure_gateway.py +343 -0
- pulumi_harness/autostopping/get_azure_proxy.py +375 -0
- pulumi_harness/autostopping/get_gcp_proxy.py +340 -0
- pulumi_harness/autostopping/get_rule_ecs.py +225 -0
- pulumi_harness/autostopping/get_rule_rds.py +205 -0
- pulumi_harness/autostopping/get_rule_vm.py +265 -0
- pulumi_harness/autostopping/get_schedule.py +193 -0
- pulumi_harness/autostopping/outputs.py +1971 -0
- pulumi_harness/autostopping/rule_ecs.py +450 -0
- pulumi_harness/autostopping/rule_rds.py +448 -0
- pulumi_harness/autostopping/rule_vm.py +663 -0
- pulumi_harness/autostopping/schedule.py +465 -0
- pulumi_harness/cloudprovider/__init__.py +17 -0
- pulumi_harness/cloudprovider/_inputs.py +777 -0
- pulumi_harness/cloudprovider/aws.py +586 -0
- pulumi_harness/cloudprovider/azure.py +393 -0
- pulumi_harness/cloudprovider/datacenter.py +233 -0
- pulumi_harness/cloudprovider/gcp.py +340 -0
- pulumi_harness/cloudprovider/get_delegate_ids.py +148 -0
- pulumi_harness/cloudprovider/kubernetes.py +310 -0
- pulumi_harness/cloudprovider/outputs.py +657 -0
- pulumi_harness/cloudprovider/spot.py +296 -0
- pulumi_harness/cloudprovider/tanzu.py +441 -0
- pulumi_harness/cluster/__init__.py +9 -0
- pulumi_harness/cluster/get_orchestrator.py +134 -0
- pulumi_harness/cluster/orchestrator.py +286 -0
- pulumi_harness/config/__init__.py +8 -0
- pulumi_harness/config/__init__.pyi +40 -0
- pulumi_harness/config/vars.py +54 -0
- pulumi_harness/delegate_approval.py +267 -0
- pulumi_harness/encrypted_text.py +499 -0
- pulumi_harness/environment.py +446 -0
- pulumi_harness/get_application.py +180 -0
- pulumi_harness/get_current_account.py +108 -0
- pulumi_harness/get_delegate.py +280 -0
- pulumi_harness/get_encrypted_text.py +136 -0
- pulumi_harness/get_environment.py +184 -0
- pulumi_harness/get_git_connector.py +255 -0
- pulumi_harness/get_secret_manager.py +142 -0
- pulumi_harness/get_service.py +198 -0
- pulumi_harness/get_ssh_credential.py +122 -0
- pulumi_harness/get_sso_provider.py +114 -0
- pulumi_harness/get_trigger.py +177 -0
- pulumi_harness/get_user.py +184 -0
- pulumi_harness/get_user_group.py +100 -0
- pulumi_harness/get_yaml_config.py +142 -0
- pulumi_harness/git_connector.py +738 -0
- pulumi_harness/governance/__init__.py +13 -0
- pulumi_harness/governance/get_rule.py +168 -0
- pulumi_harness/governance/get_rule_enforcement.py +266 -0
- pulumi_harness/governance/get_rule_set.py +150 -0
- pulumi_harness/governance/rule.py +337 -0
- pulumi_harness/governance/rule_enforcement.py +668 -0
- pulumi_harness/governance/rule_set.py +321 -0
- pulumi_harness/infrastructure_definition.py +1246 -0
- pulumi_harness/outputs.py +3306 -0
- pulumi_harness/platform/__init__.py +220 -0
- pulumi_harness/platform/_inputs.py +22314 -0
- pulumi_harness/platform/app_dynamics_connector.py +733 -0
- pulumi_harness/platform/artifactory_connector.py +748 -0
- pulumi_harness/platform/aws_cc_connector.py +716 -0
- pulumi_harness/platform/aws_connector.py +851 -0
- pulumi_harness/platform/aws_kms_connector.py +619 -0
- pulumi_harness/platform/aws_secret_manager_connector.py +712 -0
- pulumi_harness/platform/azure_cloud_cost_connector.py +675 -0
- pulumi_harness/platform/azure_cloud_provider_connector.py +826 -0
- pulumi_harness/platform/azure_key_vault_connector.py +843 -0
- pulumi_harness/platform/bitbucket_connector.py +713 -0
- pulumi_harness/platform/connector_azure_artifacts.py +529 -0
- pulumi_harness/platform/connector_custom_secret_manager.py +887 -0
- pulumi_harness/platform/connector_customhealthsource.py +807 -0
- pulumi_harness/platform/connector_jdbc.py +609 -0
- pulumi_harness/platform/connector_pdc.py +527 -0
- pulumi_harness/platform/connector_rancher.py +617 -0
- pulumi_harness/platform/datadog_connector.py +651 -0
- pulumi_harness/platform/db_instance.py +636 -0
- pulumi_harness/platform/db_schema.py +547 -0
- pulumi_harness/platform/delegatetoken.py +520 -0
- pulumi_harness/platform/docker_connector.py +669 -0
- pulumi_harness/platform/dynatrace_connector.py +601 -0
- pulumi_harness/platform/elasticsearch_connector.py +744 -0
- pulumi_harness/platform/environment.py +1173 -0
- pulumi_harness/platform/environment_clusters_mapping.py +454 -0
- pulumi_harness/platform/environment_group.py +560 -0
- pulumi_harness/platform/environment_service_overrides.py +688 -0
- pulumi_harness/platform/feature_flag.py +724 -0
- pulumi_harness/platform/feature_flag_api_key.py +550 -0
- pulumi_harness/platform/feature_flag_target.py +473 -0
- pulumi_harness/platform/feature_flag_target_group.py +577 -0
- pulumi_harness/platform/file_store_file.py +822 -0
- pulumi_harness/platform/file_store_folder.py +628 -0
- pulumi_harness/platform/filters.py +511 -0
- pulumi_harness/platform/gcp_cloud_cost_connector.py +669 -0
- pulumi_harness/platform/gcp_connector.py +663 -0
- pulumi_harness/platform/gcp_secret_manager_connector.py +594 -0
- pulumi_harness/platform/get_api_key.py +292 -0
- pulumi_harness/platform/get_app_dynamics_connector.py +271 -0
- pulumi_harness/platform/get_artifactory_connector.py +243 -0
- pulumi_harness/platform/get_aws_cc_connector.py +271 -0
- pulumi_harness/platform/get_aws_connector.py +313 -0
- pulumi_harness/platform/get_aws_kms_connector.py +253 -0
- pulumi_harness/platform/get_aws_secret_manager_connector.py +267 -0
- pulumi_harness/platform/get_azure_cloud_cost_connector.py +257 -0
- pulumi_harness/platform/get_azure_cloud_provider_connector.py +257 -0
- pulumi_harness/platform/get_azure_key_vault_connector.py +308 -0
- pulumi_harness/platform/get_bitbucket_connector.py +285 -0
- pulumi_harness/platform/get_ccm_filters.py +221 -0
- pulumi_harness/platform/get_connector_custom_secret_manager.py +330 -0
- pulumi_harness/platform/get_connector_customhealthsource.py +281 -0
- pulumi_harness/platform/get_connector_jdbc.py +243 -0
- pulumi_harness/platform/get_connector_pdc.py +229 -0
- pulumi_harness/platform/get_connector_rancher.py +236 -0
- pulumi_harness/platform/get_current_account.py +126 -0
- pulumi_harness/platform/get_current_user.py +252 -0
- pulumi_harness/platform/get_datadog_connector.py +262 -0
- pulumi_harness/platform/get_db_instance.py +268 -0
- pulumi_harness/platform/get_db_schema.py +233 -0
- pulumi_harness/platform/get_delegatetoken.py +214 -0
- pulumi_harness/platform/get_docker_connector.py +257 -0
- pulumi_harness/platform/get_dynatrace_connector.py +242 -0
- pulumi_harness/platform/get_elasticsearch_connector.py +257 -0
- pulumi_harness/platform/get_environment.py +263 -0
- pulumi_harness/platform/get_environment_clusters_mapping.py +262 -0
- pulumi_harness/platform/get_environment_group.py +190 -0
- pulumi_harness/platform/get_environment_list.py +172 -0
- pulumi_harness/platform/get_environment_service_overrides.py +212 -0
- pulumi_harness/platform/get_file_store_file.py +327 -0
- pulumi_harness/platform/get_file_store_folder.py +271 -0
- pulumi_harness/platform/get_filters.py +217 -0
- pulumi_harness/platform/get_gcp_cloud_cost_connector.py +257 -0
- pulumi_harness/platform/get_gcp_connector.py +243 -0
- pulumi_harness/platform/get_gcp_secret_manager_connector.py +238 -0
- pulumi_harness/platform/get_git_connector.py +271 -0
- pulumi_harness/platform/get_github_connector.py +296 -0
- pulumi_harness/platform/get_gitlab_connector.py +285 -0
- pulumi_harness/platform/get_gitops_agent.py +303 -0
- pulumi_harness/platform/get_gitops_agent_deploy_yaml.py +257 -0
- pulumi_harness/platform/get_gitops_app_project.py +191 -0
- pulumi_harness/platform/get_gitops_app_project_mapping.py +189 -0
- pulumi_harness/platform/get_gitops_applications.py +351 -0
- pulumi_harness/platform/get_gitops_cluster.py +216 -0
- pulumi_harness/platform/get_gitops_gnupg.py +219 -0
- pulumi_harness/platform/get_gitops_repo_cert.py +155 -0
- pulumi_harness/platform/get_gitops_repo_cred.py +223 -0
- pulumi_harness/platform/get_gitops_repository.py +230 -0
- pulumi_harness/platform/get_gitx_webhook.py +194 -0
- pulumi_harness/platform/get_helm_connector.py +243 -0
- pulumi_harness/platform/get_iacm_default_pipeline.py +168 -0
- pulumi_harness/platform/get_infra_module.py +320 -0
- pulumi_harness/platform/get_infrastructure.py +287 -0
- pulumi_harness/platform/get_input_set.py +238 -0
- pulumi_harness/platform/get_jenkins_connector.py +243 -0
- pulumi_harness/platform/get_jira_connector.py +285 -0
- pulumi_harness/platform/get_kubernetes_cloud_cost_connector.py +228 -0
- pulumi_harness/platform/get_kubernetes_connector.py +285 -0
- pulumi_harness/platform/get_manual_freeze.py +305 -0
- pulumi_harness/platform/get_monitored_service.py +134 -0
- pulumi_harness/platform/get_nexus_connector.py +257 -0
- pulumi_harness/platform/get_notification_rule.py +156 -0
- pulumi_harness/platform/get_oci_helm_connector.py +243 -0
- pulumi_harness/platform/get_organization.py +156 -0
- pulumi_harness/platform/get_overrides.py +198 -0
- pulumi_harness/platform/get_pagerduty_connector.py +224 -0
- pulumi_harness/platform/get_permissions.py +149 -0
- pulumi_harness/platform/get_pipeline.py +268 -0
- pulumi_harness/platform/get_pipeline_filters.py +197 -0
- pulumi_harness/platform/get_pipeline_list.py +269 -0
- pulumi_harness/platform/get_policy.py +220 -0
- pulumi_harness/platform/get_policy_set.py +298 -0
- pulumi_harness/platform/get_project.py +210 -0
- pulumi_harness/platform/get_project_list.py +249 -0
- pulumi_harness/platform/get_prometheus_connector.py +271 -0
- pulumi_harness/platform/get_provider.py +85 -0
- pulumi_harness/platform/get_repo.py +362 -0
- pulumi_harness/platform/get_repo_rule_branch.py +312 -0
- pulumi_harness/platform/get_repo_webhook.py +316 -0
- pulumi_harness/platform/get_resource_group.py +267 -0
- pulumi_harness/platform/get_role_assignments.py +223 -0
- pulumi_harness/platform/get_roles.py +240 -0
- pulumi_harness/platform/get_secret_file.py +224 -0
- pulumi_harness/platform/get_secret_sshkey.py +239 -0
- pulumi_harness/platform/get_secret_text.py +264 -0
- pulumi_harness/platform/get_service.py +235 -0
- pulumi_harness/platform/get_service_account.py +224 -0
- pulumi_harness/platform/get_service_list.py +172 -0
- pulumi_harness/platform/get_service_now_connector.py +285 -0
- pulumi_harness/platform/get_service_overrides_v2.py +220 -0
- pulumi_harness/platform/get_slo.py +134 -0
- pulumi_harness/platform/get_splunk_connector.py +270 -0
- pulumi_harness/platform/get_spot_connector.py +215 -0
- pulumi_harness/platform/get_sumologic_connector.py +256 -0
- pulumi_harness/platform/get_tas_connector.py +243 -0
- pulumi_harness/platform/get_template.py +386 -0
- pulumi_harness/platform/get_template_filters.py +221 -0
- pulumi_harness/platform/get_terraform_cloud_connector.py +233 -0
- pulumi_harness/platform/get_token.py +430 -0
- pulumi_harness/platform/get_triggers.py +260 -0
- pulumi_harness/platform/get_user.py +222 -0
- pulumi_harness/platform/get_usergroup.py +340 -0
- pulumi_harness/platform/get_variables.py +209 -0
- pulumi_harness/platform/get_vault_connector.py +574 -0
- pulumi_harness/platform/get_workspace.py +411 -0
- pulumi_harness/platform/get_workspace_output_value.py +168 -0
- pulumi_harness/platform/git_connector.py +713 -0
- pulumi_harness/platform/git_ops_agent.py +727 -0
- pulumi_harness/platform/git_ops_applications.py +1090 -0
- pulumi_harness/platform/git_ops_cluster.py +438 -0
- pulumi_harness/platform/git_ops_gnupg.py +453 -0
- pulumi_harness/platform/git_ops_repo_cert.py +437 -0
- pulumi_harness/platform/git_ops_repo_cred.py +533 -0
- pulumi_harness/platform/git_ops_repository.py +831 -0
- pulumi_harness/platform/github_connector.py +807 -0
- pulumi_harness/platform/gitlab_connector.py +713 -0
- pulumi_harness/platform/gitops_app_project.py +485 -0
- pulumi_harness/platform/gitops_app_project_mapping.py +423 -0
- pulumi_harness/platform/gitx_webhook.py +616 -0
- pulumi_harness/platform/helm_connector.py +617 -0
- pulumi_harness/platform/iacm_default_pipeline.py +343 -0
- pulumi_harness/platform/infra_module.py +755 -0
- pulumi_harness/platform/infrastructure.py +937 -0
- pulumi_harness/platform/input_set.py +689 -0
- pulumi_harness/platform/jenkins_connector.py +566 -0
- pulumi_harness/platform/jira_connector.py +714 -0
- pulumi_harness/platform/kubernetes_cloud_cost_connector.py +558 -0
- pulumi_harness/platform/kubernetes_connector.py +895 -0
- pulumi_harness/platform/manual_freeze.py +835 -0
- pulumi_harness/platform/monitored_service.py +1984 -0
- pulumi_harness/platform/newrelic_connector.py +651 -0
- pulumi_harness/platform/nexus_connector.py +622 -0
- pulumi_harness/platform/notification_rule.py +526 -0
- pulumi_harness/platform/oci_helm_connector.py +617 -0
- pulumi_harness/platform/organization.py +336 -0
- pulumi_harness/platform/outputs.py +23361 -0
- pulumi_harness/platform/overrides.py +669 -0
- pulumi_harness/platform/pagerduty_connector.py +547 -0
- pulumi_harness/platform/pipeline.py +991 -0
- pulumi_harness/platform/pipeline_filters.py +711 -0
- pulumi_harness/platform/policy.py +944 -0
- pulumi_harness/platform/policy_set.py +594 -0
- pulumi_harness/platform/project.py +453 -0
- pulumi_harness/platform/prometheus_connector.py +710 -0
- pulumi_harness/platform/provider.py +349 -0
- pulumi_harness/platform/repo.py +737 -0
- pulumi_harness/platform/repo_rule_branch.py +645 -0
- pulumi_harness/platform/repo_webhook.py +664 -0
- pulumi_harness/platform/resource_group.py +718 -0
- pulumi_harness/platform/role_assignments.py +524 -0
- pulumi_harness/platform/roles.py +546 -0
- pulumi_harness/platform/secret_file.py +548 -0
- pulumi_harness/platform/secret_sshkey.py +569 -0
- pulumi_harness/platform/secret_text.py +620 -0
- pulumi_harness/platform/service.py +1195 -0
- pulumi_harness/platform/service_account.py +548 -0
- pulumi_harness/platform/service_now_connector.py +714 -0
- pulumi_harness/platform/service_overrides_v2.py +915 -0
- pulumi_harness/platform/slo.py +462 -0
- pulumi_harness/platform/splunk_connector.py +701 -0
- pulumi_harness/platform/spot_connector.py +452 -0
- pulumi_harness/platform/sumologic_connector.py +651 -0
- pulumi_harness/platform/tas_connector.py +570 -0
- pulumi_harness/platform/template.py +861 -0
- pulumi_harness/platform/template_filters.py +515 -0
- pulumi_harness/platform/terraform_cloud_connector.py +545 -0
- pulumi_harness/platform/token.py +977 -0
- pulumi_harness/platform/triggers.py +680 -0
- pulumi_harness/platform/user.py +522 -0
- pulumi_harness/platform/usergroup.py +1104 -0
- pulumi_harness/platform/variables.py +509 -0
- pulumi_harness/platform/vault_connector.py +1919 -0
- pulumi_harness/platform/workspace.py +1145 -0
- pulumi_harness/platform_api_key.py +617 -0
- pulumi_harness/platform_ccm_filters.py +515 -0
- pulumi_harness/provider.py +227 -0
- pulumi_harness/pulumi-plugin.json +6 -0
- pulumi_harness/py.typed +0 -0
- pulumi_harness/service/__init__.py +18 -0
- pulumi_harness/service/_inputs.py +660 -0
- pulumi_harness/service/ami.py +336 -0
- pulumi_harness/service/codedeploy.py +336 -0
- pulumi_harness/service/ecs.py +336 -0
- pulumi_harness/service/helm.py +336 -0
- pulumi_harness/service/kubernetes.py +409 -0
- pulumi_harness/service/lambda_.py +336 -0
- pulumi_harness/service/outputs.py +388 -0
- pulumi_harness/service/ssh.py +386 -0
- pulumi_harness/service/tanzu.py +336 -0
- pulumi_harness/service/winrm.py +386 -0
- pulumi_harness/ssh_credential.py +361 -0
- pulumi_harness/user.py +423 -0
- pulumi_harness/user_group.py +713 -0
- pulumi_harness/user_group_permissions.py +247 -0
- pulumi_harness/yaml_config.py +336 -0
- pulumi_harness-0.5.0a1736833425.dist-info/METADATA +69 -0
- pulumi_harness-0.5.0a1736833425.dist-info/RECORD +311 -0
- pulumi_harness-0.5.0a1736833425.dist-info/WHEEL +5 -0
- pulumi_harness-0.5.0a1736833425.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,1919 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import copy
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['VaultConnectorArgs', 'VaultConnector']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class VaultConnectorArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
identifier: pulumi.Input[str],
|
|
23
|
+
renewal_interval_minutes: pulumi.Input[int],
|
|
24
|
+
vault_url: pulumi.Input[str],
|
|
25
|
+
access_type: Optional[pulumi.Input[str]] = None,
|
|
26
|
+
app_role_id: Optional[pulumi.Input[str]] = None,
|
|
27
|
+
auth_token: Optional[pulumi.Input[str]] = None,
|
|
28
|
+
aws_region: Optional[pulumi.Input[str]] = None,
|
|
29
|
+
base_path: Optional[pulumi.Input[str]] = None,
|
|
30
|
+
default: Optional[pulumi.Input[bool]] = None,
|
|
31
|
+
delegate_selectors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
32
|
+
description: Optional[pulumi.Input[str]] = None,
|
|
33
|
+
is_default: Optional[pulumi.Input[bool]] = None,
|
|
34
|
+
is_read_only: Optional[pulumi.Input[bool]] = None,
|
|
35
|
+
k8s_auth_endpoint: Optional[pulumi.Input[str]] = None,
|
|
36
|
+
name: Optional[pulumi.Input[str]] = None,
|
|
37
|
+
namespace: Optional[pulumi.Input[str]] = None,
|
|
38
|
+
org_id: Optional[pulumi.Input[str]] = None,
|
|
39
|
+
project_id: Optional[pulumi.Input[str]] = None,
|
|
40
|
+
read_only: Optional[pulumi.Input[bool]] = None,
|
|
41
|
+
renew_app_role_token: Optional[pulumi.Input[bool]] = None,
|
|
42
|
+
secret_engine_manually_configured: Optional[pulumi.Input[bool]] = None,
|
|
43
|
+
secret_engine_name: Optional[pulumi.Input[str]] = None,
|
|
44
|
+
secret_engine_version: Optional[pulumi.Input[int]] = None,
|
|
45
|
+
secret_id: Optional[pulumi.Input[str]] = None,
|
|
46
|
+
service_account_token_path: Optional[pulumi.Input[str]] = None,
|
|
47
|
+
sink_path: Optional[pulumi.Input[str]] = None,
|
|
48
|
+
tags: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
49
|
+
use_aws_iam: Optional[pulumi.Input[bool]] = None,
|
|
50
|
+
use_k8s_auth: Optional[pulumi.Input[bool]] = None,
|
|
51
|
+
use_vault_agent: Optional[pulumi.Input[bool]] = None,
|
|
52
|
+
vault_aws_iam_role: Optional[pulumi.Input[str]] = None,
|
|
53
|
+
vault_k8s_auth_role: Optional[pulumi.Input[str]] = None,
|
|
54
|
+
xvault_aws_iam_server_id: Optional[pulumi.Input[str]] = None):
|
|
55
|
+
"""
|
|
56
|
+
The set of arguments for constructing a VaultConnector resource.
|
|
57
|
+
:param pulumi.Input[str] identifier: Unique identifier of the resource.
|
|
58
|
+
:param pulumi.Input[int] renewal_interval_minutes: The time interval for the token renewal.
|
|
59
|
+
:param pulumi.Input[str] vault_url: URL of the HashiCorp Vault.
|
|
60
|
+
:param pulumi.Input[str] access_type: Access type.
|
|
61
|
+
:param pulumi.Input[str] app_role_id: ID of App Role.
|
|
62
|
+
:param pulumi.Input[str] auth_token: Authentication token for Vault.
|
|
63
|
+
:param pulumi.Input[str] aws_region: AWS region where the AWS IAM authentication will happen.
|
|
64
|
+
:param pulumi.Input[str] base_path: Location of the Vault directory where the secret will be stored.
|
|
65
|
+
:param pulumi.Input[bool] default: Is default or not.
|
|
66
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegate_selectors: List of Delegate Selectors that belong to the same Delegate and are used to connect to the Secret Manager.
|
|
67
|
+
:param pulumi.Input[str] description: Description of the resource.
|
|
68
|
+
:param pulumi.Input[bool] is_default: Is default or not.
|
|
69
|
+
:param pulumi.Input[bool] is_read_only: Read only or not.
|
|
70
|
+
:param pulumi.Input[str] k8s_auth_endpoint: The path where Kubernetes Auth is enabled in Vault.
|
|
71
|
+
:param pulumi.Input[str] name: Name of the resource.
|
|
72
|
+
:param pulumi.Input[str] namespace: Vault namespace where the Secret will be created.
|
|
73
|
+
:param pulumi.Input[str] org_id: Unique identifier of the organization.
|
|
74
|
+
:param pulumi.Input[str] project_id: Unique identifier of the project.
|
|
75
|
+
:param pulumi.Input[bool] read_only: Read only.
|
|
76
|
+
:param pulumi.Input[bool] renew_app_role_token: Boolean value to indicate if AppRole token renewal is enabled or not.
|
|
77
|
+
:param pulumi.Input[bool] secret_engine_manually_configured: Manually entered Secret Engine.
|
|
78
|
+
:param pulumi.Input[str] secret_engine_name: Name of the Secret Engine.
|
|
79
|
+
:param pulumi.Input[int] secret_engine_version: Version of Secret Engine.
|
|
80
|
+
:param pulumi.Input[str] secret_id: ID of the Secret.
|
|
81
|
+
:param pulumi.Input[str] service_account_token_path: The Service Account token path in the K8s pod where the token is mounted.
|
|
82
|
+
:param pulumi.Input[str] sink_path: The location from which the authentication token should be read.
|
|
83
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] tags: Tags to associate with the resource.
|
|
84
|
+
:param pulumi.Input[bool] use_aws_iam: Boolean value to indicate if AWS IAM is used for authentication.
|
|
85
|
+
:param pulumi.Input[bool] use_k8s_auth: Boolean value to indicate if K8s Auth is used for authentication.
|
|
86
|
+
:param pulumi.Input[bool] use_vault_agent: Boolean value to indicate if Vault Agent is used for authentication.
|
|
87
|
+
:param pulumi.Input[str] vault_aws_iam_role: The Vault role defined to bind to aws iam account/role being accessed.
|
|
88
|
+
:param pulumi.Input[str] vault_k8s_auth_role: The role where K8s Auth will happen.
|
|
89
|
+
:param pulumi.Input[str] xvault_aws_iam_server_id: The AWS IAM Header Server ID that has been configured for this AWS IAM instance.
|
|
90
|
+
"""
|
|
91
|
+
pulumi.set(__self__, "identifier", identifier)
|
|
92
|
+
pulumi.set(__self__, "renewal_interval_minutes", renewal_interval_minutes)
|
|
93
|
+
pulumi.set(__self__, "vault_url", vault_url)
|
|
94
|
+
if access_type is not None:
|
|
95
|
+
pulumi.set(__self__, "access_type", access_type)
|
|
96
|
+
if app_role_id is not None:
|
|
97
|
+
pulumi.set(__self__, "app_role_id", app_role_id)
|
|
98
|
+
if auth_token is not None:
|
|
99
|
+
pulumi.set(__self__, "auth_token", auth_token)
|
|
100
|
+
if aws_region is not None:
|
|
101
|
+
pulumi.set(__self__, "aws_region", aws_region)
|
|
102
|
+
if base_path is not None:
|
|
103
|
+
pulumi.set(__self__, "base_path", base_path)
|
|
104
|
+
if default is not None:
|
|
105
|
+
pulumi.set(__self__, "default", default)
|
|
106
|
+
if delegate_selectors is not None:
|
|
107
|
+
pulumi.set(__self__, "delegate_selectors", delegate_selectors)
|
|
108
|
+
if description is not None:
|
|
109
|
+
pulumi.set(__self__, "description", description)
|
|
110
|
+
if is_default is not None:
|
|
111
|
+
pulumi.set(__self__, "is_default", is_default)
|
|
112
|
+
if is_read_only is not None:
|
|
113
|
+
pulumi.set(__self__, "is_read_only", is_read_only)
|
|
114
|
+
if k8s_auth_endpoint is not None:
|
|
115
|
+
pulumi.set(__self__, "k8s_auth_endpoint", k8s_auth_endpoint)
|
|
116
|
+
if name is not None:
|
|
117
|
+
pulumi.set(__self__, "name", name)
|
|
118
|
+
if namespace is not None:
|
|
119
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
120
|
+
if org_id is not None:
|
|
121
|
+
pulumi.set(__self__, "org_id", org_id)
|
|
122
|
+
if project_id is not None:
|
|
123
|
+
pulumi.set(__self__, "project_id", project_id)
|
|
124
|
+
if read_only is not None:
|
|
125
|
+
pulumi.set(__self__, "read_only", read_only)
|
|
126
|
+
if renew_app_role_token is not None:
|
|
127
|
+
pulumi.set(__self__, "renew_app_role_token", renew_app_role_token)
|
|
128
|
+
if secret_engine_manually_configured is not None:
|
|
129
|
+
pulumi.set(__self__, "secret_engine_manually_configured", secret_engine_manually_configured)
|
|
130
|
+
if secret_engine_name is not None:
|
|
131
|
+
pulumi.set(__self__, "secret_engine_name", secret_engine_name)
|
|
132
|
+
if secret_engine_version is not None:
|
|
133
|
+
pulumi.set(__self__, "secret_engine_version", secret_engine_version)
|
|
134
|
+
if secret_id is not None:
|
|
135
|
+
pulumi.set(__self__, "secret_id", secret_id)
|
|
136
|
+
if service_account_token_path is not None:
|
|
137
|
+
pulumi.set(__self__, "service_account_token_path", service_account_token_path)
|
|
138
|
+
if sink_path is not None:
|
|
139
|
+
pulumi.set(__self__, "sink_path", sink_path)
|
|
140
|
+
if tags is not None:
|
|
141
|
+
pulumi.set(__self__, "tags", tags)
|
|
142
|
+
if use_aws_iam is not None:
|
|
143
|
+
pulumi.set(__self__, "use_aws_iam", use_aws_iam)
|
|
144
|
+
if use_k8s_auth is not None:
|
|
145
|
+
pulumi.set(__self__, "use_k8s_auth", use_k8s_auth)
|
|
146
|
+
if use_vault_agent is not None:
|
|
147
|
+
pulumi.set(__self__, "use_vault_agent", use_vault_agent)
|
|
148
|
+
if vault_aws_iam_role is not None:
|
|
149
|
+
pulumi.set(__self__, "vault_aws_iam_role", vault_aws_iam_role)
|
|
150
|
+
if vault_k8s_auth_role is not None:
|
|
151
|
+
pulumi.set(__self__, "vault_k8s_auth_role", vault_k8s_auth_role)
|
|
152
|
+
if xvault_aws_iam_server_id is not None:
|
|
153
|
+
pulumi.set(__self__, "xvault_aws_iam_server_id", xvault_aws_iam_server_id)
|
|
154
|
+
|
|
155
|
+
@property
|
|
156
|
+
@pulumi.getter
|
|
157
|
+
def identifier(self) -> pulumi.Input[str]:
|
|
158
|
+
"""
|
|
159
|
+
Unique identifier of the resource.
|
|
160
|
+
"""
|
|
161
|
+
return pulumi.get(self, "identifier")
|
|
162
|
+
|
|
163
|
+
@identifier.setter
|
|
164
|
+
def identifier(self, value: pulumi.Input[str]):
|
|
165
|
+
pulumi.set(self, "identifier", value)
|
|
166
|
+
|
|
167
|
+
@property
|
|
168
|
+
@pulumi.getter(name="renewalIntervalMinutes")
|
|
169
|
+
def renewal_interval_minutes(self) -> pulumi.Input[int]:
|
|
170
|
+
"""
|
|
171
|
+
The time interval for the token renewal.
|
|
172
|
+
"""
|
|
173
|
+
return pulumi.get(self, "renewal_interval_minutes")
|
|
174
|
+
|
|
175
|
+
@renewal_interval_minutes.setter
|
|
176
|
+
def renewal_interval_minutes(self, value: pulumi.Input[int]):
|
|
177
|
+
pulumi.set(self, "renewal_interval_minutes", value)
|
|
178
|
+
|
|
179
|
+
@property
|
|
180
|
+
@pulumi.getter(name="vaultUrl")
|
|
181
|
+
def vault_url(self) -> pulumi.Input[str]:
|
|
182
|
+
"""
|
|
183
|
+
URL of the HashiCorp Vault.
|
|
184
|
+
"""
|
|
185
|
+
return pulumi.get(self, "vault_url")
|
|
186
|
+
|
|
187
|
+
@vault_url.setter
|
|
188
|
+
def vault_url(self, value: pulumi.Input[str]):
|
|
189
|
+
pulumi.set(self, "vault_url", value)
|
|
190
|
+
|
|
191
|
+
@property
|
|
192
|
+
@pulumi.getter(name="accessType")
|
|
193
|
+
def access_type(self) -> Optional[pulumi.Input[str]]:
|
|
194
|
+
"""
|
|
195
|
+
Access type.
|
|
196
|
+
"""
|
|
197
|
+
return pulumi.get(self, "access_type")
|
|
198
|
+
|
|
199
|
+
@access_type.setter
|
|
200
|
+
def access_type(self, value: Optional[pulumi.Input[str]]):
|
|
201
|
+
pulumi.set(self, "access_type", value)
|
|
202
|
+
|
|
203
|
+
@property
|
|
204
|
+
@pulumi.getter(name="appRoleId")
|
|
205
|
+
def app_role_id(self) -> Optional[pulumi.Input[str]]:
|
|
206
|
+
"""
|
|
207
|
+
ID of App Role.
|
|
208
|
+
"""
|
|
209
|
+
return pulumi.get(self, "app_role_id")
|
|
210
|
+
|
|
211
|
+
@app_role_id.setter
|
|
212
|
+
def app_role_id(self, value: Optional[pulumi.Input[str]]):
|
|
213
|
+
pulumi.set(self, "app_role_id", value)
|
|
214
|
+
|
|
215
|
+
@property
|
|
216
|
+
@pulumi.getter(name="authToken")
|
|
217
|
+
def auth_token(self) -> Optional[pulumi.Input[str]]:
|
|
218
|
+
"""
|
|
219
|
+
Authentication token for Vault.
|
|
220
|
+
"""
|
|
221
|
+
return pulumi.get(self, "auth_token")
|
|
222
|
+
|
|
223
|
+
@auth_token.setter
|
|
224
|
+
def auth_token(self, value: Optional[pulumi.Input[str]]):
|
|
225
|
+
pulumi.set(self, "auth_token", value)
|
|
226
|
+
|
|
227
|
+
@property
|
|
228
|
+
@pulumi.getter(name="awsRegion")
|
|
229
|
+
def aws_region(self) -> Optional[pulumi.Input[str]]:
|
|
230
|
+
"""
|
|
231
|
+
AWS region where the AWS IAM authentication will happen.
|
|
232
|
+
"""
|
|
233
|
+
return pulumi.get(self, "aws_region")
|
|
234
|
+
|
|
235
|
+
@aws_region.setter
|
|
236
|
+
def aws_region(self, value: Optional[pulumi.Input[str]]):
|
|
237
|
+
pulumi.set(self, "aws_region", value)
|
|
238
|
+
|
|
239
|
+
@property
|
|
240
|
+
@pulumi.getter(name="basePath")
|
|
241
|
+
def base_path(self) -> Optional[pulumi.Input[str]]:
|
|
242
|
+
"""
|
|
243
|
+
Location of the Vault directory where the secret will be stored.
|
|
244
|
+
"""
|
|
245
|
+
return pulumi.get(self, "base_path")
|
|
246
|
+
|
|
247
|
+
@base_path.setter
|
|
248
|
+
def base_path(self, value: Optional[pulumi.Input[str]]):
|
|
249
|
+
pulumi.set(self, "base_path", value)
|
|
250
|
+
|
|
251
|
+
@property
|
|
252
|
+
@pulumi.getter
|
|
253
|
+
def default(self) -> Optional[pulumi.Input[bool]]:
|
|
254
|
+
"""
|
|
255
|
+
Is default or not.
|
|
256
|
+
"""
|
|
257
|
+
return pulumi.get(self, "default")
|
|
258
|
+
|
|
259
|
+
@default.setter
|
|
260
|
+
def default(self, value: Optional[pulumi.Input[bool]]):
|
|
261
|
+
pulumi.set(self, "default", value)
|
|
262
|
+
|
|
263
|
+
@property
|
|
264
|
+
@pulumi.getter(name="delegateSelectors")
|
|
265
|
+
def delegate_selectors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
266
|
+
"""
|
|
267
|
+
List of Delegate Selectors that belong to the same Delegate and are used to connect to the Secret Manager.
|
|
268
|
+
"""
|
|
269
|
+
return pulumi.get(self, "delegate_selectors")
|
|
270
|
+
|
|
271
|
+
@delegate_selectors.setter
|
|
272
|
+
def delegate_selectors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
273
|
+
pulumi.set(self, "delegate_selectors", value)
|
|
274
|
+
|
|
275
|
+
@property
|
|
276
|
+
@pulumi.getter
|
|
277
|
+
def description(self) -> Optional[pulumi.Input[str]]:
|
|
278
|
+
"""
|
|
279
|
+
Description of the resource.
|
|
280
|
+
"""
|
|
281
|
+
return pulumi.get(self, "description")
|
|
282
|
+
|
|
283
|
+
@description.setter
|
|
284
|
+
def description(self, value: Optional[pulumi.Input[str]]):
|
|
285
|
+
pulumi.set(self, "description", value)
|
|
286
|
+
|
|
287
|
+
@property
|
|
288
|
+
@pulumi.getter(name="isDefault")
|
|
289
|
+
def is_default(self) -> Optional[pulumi.Input[bool]]:
|
|
290
|
+
"""
|
|
291
|
+
Is default or not.
|
|
292
|
+
"""
|
|
293
|
+
return pulumi.get(self, "is_default")
|
|
294
|
+
|
|
295
|
+
@is_default.setter
|
|
296
|
+
def is_default(self, value: Optional[pulumi.Input[bool]]):
|
|
297
|
+
pulumi.set(self, "is_default", value)
|
|
298
|
+
|
|
299
|
+
@property
|
|
300
|
+
@pulumi.getter(name="isReadOnly")
|
|
301
|
+
def is_read_only(self) -> Optional[pulumi.Input[bool]]:
|
|
302
|
+
"""
|
|
303
|
+
Read only or not.
|
|
304
|
+
"""
|
|
305
|
+
return pulumi.get(self, "is_read_only")
|
|
306
|
+
|
|
307
|
+
@is_read_only.setter
|
|
308
|
+
def is_read_only(self, value: Optional[pulumi.Input[bool]]):
|
|
309
|
+
pulumi.set(self, "is_read_only", value)
|
|
310
|
+
|
|
311
|
+
@property
|
|
312
|
+
@pulumi.getter(name="k8sAuthEndpoint")
|
|
313
|
+
def k8s_auth_endpoint(self) -> Optional[pulumi.Input[str]]:
|
|
314
|
+
"""
|
|
315
|
+
The path where Kubernetes Auth is enabled in Vault.
|
|
316
|
+
"""
|
|
317
|
+
return pulumi.get(self, "k8s_auth_endpoint")
|
|
318
|
+
|
|
319
|
+
@k8s_auth_endpoint.setter
|
|
320
|
+
def k8s_auth_endpoint(self, value: Optional[pulumi.Input[str]]):
|
|
321
|
+
pulumi.set(self, "k8s_auth_endpoint", value)
|
|
322
|
+
|
|
323
|
+
@property
|
|
324
|
+
@pulumi.getter
|
|
325
|
+
def name(self) -> Optional[pulumi.Input[str]]:
|
|
326
|
+
"""
|
|
327
|
+
Name of the resource.
|
|
328
|
+
"""
|
|
329
|
+
return pulumi.get(self, "name")
|
|
330
|
+
|
|
331
|
+
@name.setter
|
|
332
|
+
def name(self, value: Optional[pulumi.Input[str]]):
|
|
333
|
+
pulumi.set(self, "name", value)
|
|
334
|
+
|
|
335
|
+
@property
|
|
336
|
+
@pulumi.getter
|
|
337
|
+
def namespace(self) -> Optional[pulumi.Input[str]]:
|
|
338
|
+
"""
|
|
339
|
+
Vault namespace where the Secret will be created.
|
|
340
|
+
"""
|
|
341
|
+
return pulumi.get(self, "namespace")
|
|
342
|
+
|
|
343
|
+
@namespace.setter
|
|
344
|
+
def namespace(self, value: Optional[pulumi.Input[str]]):
|
|
345
|
+
pulumi.set(self, "namespace", value)
|
|
346
|
+
|
|
347
|
+
@property
|
|
348
|
+
@pulumi.getter(name="orgId")
|
|
349
|
+
def org_id(self) -> Optional[pulumi.Input[str]]:
|
|
350
|
+
"""
|
|
351
|
+
Unique identifier of the organization.
|
|
352
|
+
"""
|
|
353
|
+
return pulumi.get(self, "org_id")
|
|
354
|
+
|
|
355
|
+
@org_id.setter
|
|
356
|
+
def org_id(self, value: Optional[pulumi.Input[str]]):
|
|
357
|
+
pulumi.set(self, "org_id", value)
|
|
358
|
+
|
|
359
|
+
@property
|
|
360
|
+
@pulumi.getter(name="projectId")
|
|
361
|
+
def project_id(self) -> Optional[pulumi.Input[str]]:
|
|
362
|
+
"""
|
|
363
|
+
Unique identifier of the project.
|
|
364
|
+
"""
|
|
365
|
+
return pulumi.get(self, "project_id")
|
|
366
|
+
|
|
367
|
+
@project_id.setter
|
|
368
|
+
def project_id(self, value: Optional[pulumi.Input[str]]):
|
|
369
|
+
pulumi.set(self, "project_id", value)
|
|
370
|
+
|
|
371
|
+
@property
|
|
372
|
+
@pulumi.getter(name="readOnly")
|
|
373
|
+
def read_only(self) -> Optional[pulumi.Input[bool]]:
|
|
374
|
+
"""
|
|
375
|
+
Read only.
|
|
376
|
+
"""
|
|
377
|
+
return pulumi.get(self, "read_only")
|
|
378
|
+
|
|
379
|
+
@read_only.setter
|
|
380
|
+
def read_only(self, value: Optional[pulumi.Input[bool]]):
|
|
381
|
+
pulumi.set(self, "read_only", value)
|
|
382
|
+
|
|
383
|
+
@property
|
|
384
|
+
@pulumi.getter(name="renewAppRoleToken")
|
|
385
|
+
def renew_app_role_token(self) -> Optional[pulumi.Input[bool]]:
|
|
386
|
+
"""
|
|
387
|
+
Boolean value to indicate if AppRole token renewal is enabled or not.
|
|
388
|
+
"""
|
|
389
|
+
return pulumi.get(self, "renew_app_role_token")
|
|
390
|
+
|
|
391
|
+
@renew_app_role_token.setter
|
|
392
|
+
def renew_app_role_token(self, value: Optional[pulumi.Input[bool]]):
|
|
393
|
+
pulumi.set(self, "renew_app_role_token", value)
|
|
394
|
+
|
|
395
|
+
@property
|
|
396
|
+
@pulumi.getter(name="secretEngineManuallyConfigured")
|
|
397
|
+
def secret_engine_manually_configured(self) -> Optional[pulumi.Input[bool]]:
|
|
398
|
+
"""
|
|
399
|
+
Manually entered Secret Engine.
|
|
400
|
+
"""
|
|
401
|
+
return pulumi.get(self, "secret_engine_manually_configured")
|
|
402
|
+
|
|
403
|
+
@secret_engine_manually_configured.setter
|
|
404
|
+
def secret_engine_manually_configured(self, value: Optional[pulumi.Input[bool]]):
|
|
405
|
+
pulumi.set(self, "secret_engine_manually_configured", value)
|
|
406
|
+
|
|
407
|
+
@property
|
|
408
|
+
@pulumi.getter(name="secretEngineName")
|
|
409
|
+
def secret_engine_name(self) -> Optional[pulumi.Input[str]]:
|
|
410
|
+
"""
|
|
411
|
+
Name of the Secret Engine.
|
|
412
|
+
"""
|
|
413
|
+
return pulumi.get(self, "secret_engine_name")
|
|
414
|
+
|
|
415
|
+
@secret_engine_name.setter
|
|
416
|
+
def secret_engine_name(self, value: Optional[pulumi.Input[str]]):
|
|
417
|
+
pulumi.set(self, "secret_engine_name", value)
|
|
418
|
+
|
|
419
|
+
@property
|
|
420
|
+
@pulumi.getter(name="secretEngineVersion")
|
|
421
|
+
def secret_engine_version(self) -> Optional[pulumi.Input[int]]:
|
|
422
|
+
"""
|
|
423
|
+
Version of Secret Engine.
|
|
424
|
+
"""
|
|
425
|
+
return pulumi.get(self, "secret_engine_version")
|
|
426
|
+
|
|
427
|
+
@secret_engine_version.setter
|
|
428
|
+
def secret_engine_version(self, value: Optional[pulumi.Input[int]]):
|
|
429
|
+
pulumi.set(self, "secret_engine_version", value)
|
|
430
|
+
|
|
431
|
+
@property
|
|
432
|
+
@pulumi.getter(name="secretId")
|
|
433
|
+
def secret_id(self) -> Optional[pulumi.Input[str]]:
|
|
434
|
+
"""
|
|
435
|
+
ID of the Secret.
|
|
436
|
+
"""
|
|
437
|
+
return pulumi.get(self, "secret_id")
|
|
438
|
+
|
|
439
|
+
@secret_id.setter
|
|
440
|
+
def secret_id(self, value: Optional[pulumi.Input[str]]):
|
|
441
|
+
pulumi.set(self, "secret_id", value)
|
|
442
|
+
|
|
443
|
+
@property
|
|
444
|
+
@pulumi.getter(name="serviceAccountTokenPath")
|
|
445
|
+
def service_account_token_path(self) -> Optional[pulumi.Input[str]]:
|
|
446
|
+
"""
|
|
447
|
+
The Service Account token path in the K8s pod where the token is mounted.
|
|
448
|
+
"""
|
|
449
|
+
return pulumi.get(self, "service_account_token_path")
|
|
450
|
+
|
|
451
|
+
@service_account_token_path.setter
|
|
452
|
+
def service_account_token_path(self, value: Optional[pulumi.Input[str]]):
|
|
453
|
+
pulumi.set(self, "service_account_token_path", value)
|
|
454
|
+
|
|
455
|
+
@property
|
|
456
|
+
@pulumi.getter(name="sinkPath")
|
|
457
|
+
def sink_path(self) -> Optional[pulumi.Input[str]]:
|
|
458
|
+
"""
|
|
459
|
+
The location from which the authentication token should be read.
|
|
460
|
+
"""
|
|
461
|
+
return pulumi.get(self, "sink_path")
|
|
462
|
+
|
|
463
|
+
@sink_path.setter
|
|
464
|
+
def sink_path(self, value: Optional[pulumi.Input[str]]):
|
|
465
|
+
pulumi.set(self, "sink_path", value)
|
|
466
|
+
|
|
467
|
+
@property
|
|
468
|
+
@pulumi.getter
|
|
469
|
+
def tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
470
|
+
"""
|
|
471
|
+
Tags to associate with the resource.
|
|
472
|
+
"""
|
|
473
|
+
return pulumi.get(self, "tags")
|
|
474
|
+
|
|
475
|
+
@tags.setter
|
|
476
|
+
def tags(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
477
|
+
pulumi.set(self, "tags", value)
|
|
478
|
+
|
|
479
|
+
@property
|
|
480
|
+
@pulumi.getter(name="useAwsIam")
|
|
481
|
+
def use_aws_iam(self) -> Optional[pulumi.Input[bool]]:
|
|
482
|
+
"""
|
|
483
|
+
Boolean value to indicate if AWS IAM is used for authentication.
|
|
484
|
+
"""
|
|
485
|
+
return pulumi.get(self, "use_aws_iam")
|
|
486
|
+
|
|
487
|
+
@use_aws_iam.setter
|
|
488
|
+
def use_aws_iam(self, value: Optional[pulumi.Input[bool]]):
|
|
489
|
+
pulumi.set(self, "use_aws_iam", value)
|
|
490
|
+
|
|
491
|
+
@property
|
|
492
|
+
@pulumi.getter(name="useK8sAuth")
|
|
493
|
+
def use_k8s_auth(self) -> Optional[pulumi.Input[bool]]:
|
|
494
|
+
"""
|
|
495
|
+
Boolean value to indicate if K8s Auth is used for authentication.
|
|
496
|
+
"""
|
|
497
|
+
return pulumi.get(self, "use_k8s_auth")
|
|
498
|
+
|
|
499
|
+
@use_k8s_auth.setter
|
|
500
|
+
def use_k8s_auth(self, value: Optional[pulumi.Input[bool]]):
|
|
501
|
+
pulumi.set(self, "use_k8s_auth", value)
|
|
502
|
+
|
|
503
|
+
@property
|
|
504
|
+
@pulumi.getter(name="useVaultAgent")
|
|
505
|
+
def use_vault_agent(self) -> Optional[pulumi.Input[bool]]:
|
|
506
|
+
"""
|
|
507
|
+
Boolean value to indicate if Vault Agent is used for authentication.
|
|
508
|
+
"""
|
|
509
|
+
return pulumi.get(self, "use_vault_agent")
|
|
510
|
+
|
|
511
|
+
@use_vault_agent.setter
|
|
512
|
+
def use_vault_agent(self, value: Optional[pulumi.Input[bool]]):
|
|
513
|
+
pulumi.set(self, "use_vault_agent", value)
|
|
514
|
+
|
|
515
|
+
@property
|
|
516
|
+
@pulumi.getter(name="vaultAwsIamRole")
|
|
517
|
+
def vault_aws_iam_role(self) -> Optional[pulumi.Input[str]]:
|
|
518
|
+
"""
|
|
519
|
+
The Vault role defined to bind to aws iam account/role being accessed.
|
|
520
|
+
"""
|
|
521
|
+
return pulumi.get(self, "vault_aws_iam_role")
|
|
522
|
+
|
|
523
|
+
@vault_aws_iam_role.setter
|
|
524
|
+
def vault_aws_iam_role(self, value: Optional[pulumi.Input[str]]):
|
|
525
|
+
pulumi.set(self, "vault_aws_iam_role", value)
|
|
526
|
+
|
|
527
|
+
@property
|
|
528
|
+
@pulumi.getter(name="vaultK8sAuthRole")
|
|
529
|
+
def vault_k8s_auth_role(self) -> Optional[pulumi.Input[str]]:
|
|
530
|
+
"""
|
|
531
|
+
The role where K8s Auth will happen.
|
|
532
|
+
"""
|
|
533
|
+
return pulumi.get(self, "vault_k8s_auth_role")
|
|
534
|
+
|
|
535
|
+
@vault_k8s_auth_role.setter
|
|
536
|
+
def vault_k8s_auth_role(self, value: Optional[pulumi.Input[str]]):
|
|
537
|
+
pulumi.set(self, "vault_k8s_auth_role", value)
|
|
538
|
+
|
|
539
|
+
@property
|
|
540
|
+
@pulumi.getter(name="xvaultAwsIamServerId")
|
|
541
|
+
def xvault_aws_iam_server_id(self) -> Optional[pulumi.Input[str]]:
|
|
542
|
+
"""
|
|
543
|
+
The AWS IAM Header Server ID that has been configured for this AWS IAM instance.
|
|
544
|
+
"""
|
|
545
|
+
return pulumi.get(self, "xvault_aws_iam_server_id")
|
|
546
|
+
|
|
547
|
+
@xvault_aws_iam_server_id.setter
|
|
548
|
+
def xvault_aws_iam_server_id(self, value: Optional[pulumi.Input[str]]):
|
|
549
|
+
pulumi.set(self, "xvault_aws_iam_server_id", value)
|
|
550
|
+
|
|
551
|
+
|
|
552
|
+
@pulumi.input_type
|
|
553
|
+
class _VaultConnectorState:
|
|
554
|
+
def __init__(__self__, *,
|
|
555
|
+
access_type: Optional[pulumi.Input[str]] = None,
|
|
556
|
+
app_role_id: Optional[pulumi.Input[str]] = None,
|
|
557
|
+
auth_token: Optional[pulumi.Input[str]] = None,
|
|
558
|
+
aws_region: Optional[pulumi.Input[str]] = None,
|
|
559
|
+
base_path: Optional[pulumi.Input[str]] = None,
|
|
560
|
+
default: Optional[pulumi.Input[bool]] = None,
|
|
561
|
+
delegate_selectors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
562
|
+
description: Optional[pulumi.Input[str]] = None,
|
|
563
|
+
identifier: Optional[pulumi.Input[str]] = None,
|
|
564
|
+
is_default: Optional[pulumi.Input[bool]] = None,
|
|
565
|
+
is_read_only: Optional[pulumi.Input[bool]] = None,
|
|
566
|
+
k8s_auth_endpoint: Optional[pulumi.Input[str]] = None,
|
|
567
|
+
name: Optional[pulumi.Input[str]] = None,
|
|
568
|
+
namespace: Optional[pulumi.Input[str]] = None,
|
|
569
|
+
org_id: Optional[pulumi.Input[str]] = None,
|
|
570
|
+
project_id: Optional[pulumi.Input[str]] = None,
|
|
571
|
+
read_only: Optional[pulumi.Input[bool]] = None,
|
|
572
|
+
renew_app_role_token: Optional[pulumi.Input[bool]] = None,
|
|
573
|
+
renewal_interval_minutes: Optional[pulumi.Input[int]] = None,
|
|
574
|
+
secret_engine_manually_configured: Optional[pulumi.Input[bool]] = None,
|
|
575
|
+
secret_engine_name: Optional[pulumi.Input[str]] = None,
|
|
576
|
+
secret_engine_version: Optional[pulumi.Input[int]] = None,
|
|
577
|
+
secret_id: Optional[pulumi.Input[str]] = None,
|
|
578
|
+
service_account_token_path: Optional[pulumi.Input[str]] = None,
|
|
579
|
+
sink_path: Optional[pulumi.Input[str]] = None,
|
|
580
|
+
tags: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
581
|
+
use_aws_iam: Optional[pulumi.Input[bool]] = None,
|
|
582
|
+
use_k8s_auth: Optional[pulumi.Input[bool]] = None,
|
|
583
|
+
use_vault_agent: Optional[pulumi.Input[bool]] = None,
|
|
584
|
+
vault_aws_iam_role: Optional[pulumi.Input[str]] = None,
|
|
585
|
+
vault_k8s_auth_role: Optional[pulumi.Input[str]] = None,
|
|
586
|
+
vault_url: Optional[pulumi.Input[str]] = None,
|
|
587
|
+
xvault_aws_iam_server_id: Optional[pulumi.Input[str]] = None):
|
|
588
|
+
"""
|
|
589
|
+
Input properties used for looking up and filtering VaultConnector resources.
|
|
590
|
+
:param pulumi.Input[str] access_type: Access type.
|
|
591
|
+
:param pulumi.Input[str] app_role_id: ID of App Role.
|
|
592
|
+
:param pulumi.Input[str] auth_token: Authentication token for Vault.
|
|
593
|
+
:param pulumi.Input[str] aws_region: AWS region where the AWS IAM authentication will happen.
|
|
594
|
+
:param pulumi.Input[str] base_path: Location of the Vault directory where the secret will be stored.
|
|
595
|
+
:param pulumi.Input[bool] default: Is default or not.
|
|
596
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegate_selectors: List of Delegate Selectors that belong to the same Delegate and are used to connect to the Secret Manager.
|
|
597
|
+
:param pulumi.Input[str] description: Description of the resource.
|
|
598
|
+
:param pulumi.Input[str] identifier: Unique identifier of the resource.
|
|
599
|
+
:param pulumi.Input[bool] is_default: Is default or not.
|
|
600
|
+
:param pulumi.Input[bool] is_read_only: Read only or not.
|
|
601
|
+
:param pulumi.Input[str] k8s_auth_endpoint: The path where Kubernetes Auth is enabled in Vault.
|
|
602
|
+
:param pulumi.Input[str] name: Name of the resource.
|
|
603
|
+
:param pulumi.Input[str] namespace: Vault namespace where the Secret will be created.
|
|
604
|
+
:param pulumi.Input[str] org_id: Unique identifier of the organization.
|
|
605
|
+
:param pulumi.Input[str] project_id: Unique identifier of the project.
|
|
606
|
+
:param pulumi.Input[bool] read_only: Read only.
|
|
607
|
+
:param pulumi.Input[bool] renew_app_role_token: Boolean value to indicate if AppRole token renewal is enabled or not.
|
|
608
|
+
:param pulumi.Input[int] renewal_interval_minutes: The time interval for the token renewal.
|
|
609
|
+
:param pulumi.Input[bool] secret_engine_manually_configured: Manually entered Secret Engine.
|
|
610
|
+
:param pulumi.Input[str] secret_engine_name: Name of the Secret Engine.
|
|
611
|
+
:param pulumi.Input[int] secret_engine_version: Version of Secret Engine.
|
|
612
|
+
:param pulumi.Input[str] secret_id: ID of the Secret.
|
|
613
|
+
:param pulumi.Input[str] service_account_token_path: The Service Account token path in the K8s pod where the token is mounted.
|
|
614
|
+
:param pulumi.Input[str] sink_path: The location from which the authentication token should be read.
|
|
615
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] tags: Tags to associate with the resource.
|
|
616
|
+
:param pulumi.Input[bool] use_aws_iam: Boolean value to indicate if AWS IAM is used for authentication.
|
|
617
|
+
:param pulumi.Input[bool] use_k8s_auth: Boolean value to indicate if K8s Auth is used for authentication.
|
|
618
|
+
:param pulumi.Input[bool] use_vault_agent: Boolean value to indicate if Vault Agent is used for authentication.
|
|
619
|
+
:param pulumi.Input[str] vault_aws_iam_role: The Vault role defined to bind to aws iam account/role being accessed.
|
|
620
|
+
:param pulumi.Input[str] vault_k8s_auth_role: The role where K8s Auth will happen.
|
|
621
|
+
:param pulumi.Input[str] vault_url: URL of the HashiCorp Vault.
|
|
622
|
+
:param pulumi.Input[str] xvault_aws_iam_server_id: The AWS IAM Header Server ID that has been configured for this AWS IAM instance.
|
|
623
|
+
"""
|
|
624
|
+
if access_type is not None:
|
|
625
|
+
pulumi.set(__self__, "access_type", access_type)
|
|
626
|
+
if app_role_id is not None:
|
|
627
|
+
pulumi.set(__self__, "app_role_id", app_role_id)
|
|
628
|
+
if auth_token is not None:
|
|
629
|
+
pulumi.set(__self__, "auth_token", auth_token)
|
|
630
|
+
if aws_region is not None:
|
|
631
|
+
pulumi.set(__self__, "aws_region", aws_region)
|
|
632
|
+
if base_path is not None:
|
|
633
|
+
pulumi.set(__self__, "base_path", base_path)
|
|
634
|
+
if default is not None:
|
|
635
|
+
pulumi.set(__self__, "default", default)
|
|
636
|
+
if delegate_selectors is not None:
|
|
637
|
+
pulumi.set(__self__, "delegate_selectors", delegate_selectors)
|
|
638
|
+
if description is not None:
|
|
639
|
+
pulumi.set(__self__, "description", description)
|
|
640
|
+
if identifier is not None:
|
|
641
|
+
pulumi.set(__self__, "identifier", identifier)
|
|
642
|
+
if is_default is not None:
|
|
643
|
+
pulumi.set(__self__, "is_default", is_default)
|
|
644
|
+
if is_read_only is not None:
|
|
645
|
+
pulumi.set(__self__, "is_read_only", is_read_only)
|
|
646
|
+
if k8s_auth_endpoint is not None:
|
|
647
|
+
pulumi.set(__self__, "k8s_auth_endpoint", k8s_auth_endpoint)
|
|
648
|
+
if name is not None:
|
|
649
|
+
pulumi.set(__self__, "name", name)
|
|
650
|
+
if namespace is not None:
|
|
651
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
652
|
+
if org_id is not None:
|
|
653
|
+
pulumi.set(__self__, "org_id", org_id)
|
|
654
|
+
if project_id is not None:
|
|
655
|
+
pulumi.set(__self__, "project_id", project_id)
|
|
656
|
+
if read_only is not None:
|
|
657
|
+
pulumi.set(__self__, "read_only", read_only)
|
|
658
|
+
if renew_app_role_token is not None:
|
|
659
|
+
pulumi.set(__self__, "renew_app_role_token", renew_app_role_token)
|
|
660
|
+
if renewal_interval_minutes is not None:
|
|
661
|
+
pulumi.set(__self__, "renewal_interval_minutes", renewal_interval_minutes)
|
|
662
|
+
if secret_engine_manually_configured is not None:
|
|
663
|
+
pulumi.set(__self__, "secret_engine_manually_configured", secret_engine_manually_configured)
|
|
664
|
+
if secret_engine_name is not None:
|
|
665
|
+
pulumi.set(__self__, "secret_engine_name", secret_engine_name)
|
|
666
|
+
if secret_engine_version is not None:
|
|
667
|
+
pulumi.set(__self__, "secret_engine_version", secret_engine_version)
|
|
668
|
+
if secret_id is not None:
|
|
669
|
+
pulumi.set(__self__, "secret_id", secret_id)
|
|
670
|
+
if service_account_token_path is not None:
|
|
671
|
+
pulumi.set(__self__, "service_account_token_path", service_account_token_path)
|
|
672
|
+
if sink_path is not None:
|
|
673
|
+
pulumi.set(__self__, "sink_path", sink_path)
|
|
674
|
+
if tags is not None:
|
|
675
|
+
pulumi.set(__self__, "tags", tags)
|
|
676
|
+
if use_aws_iam is not None:
|
|
677
|
+
pulumi.set(__self__, "use_aws_iam", use_aws_iam)
|
|
678
|
+
if use_k8s_auth is not None:
|
|
679
|
+
pulumi.set(__self__, "use_k8s_auth", use_k8s_auth)
|
|
680
|
+
if use_vault_agent is not None:
|
|
681
|
+
pulumi.set(__self__, "use_vault_agent", use_vault_agent)
|
|
682
|
+
if vault_aws_iam_role is not None:
|
|
683
|
+
pulumi.set(__self__, "vault_aws_iam_role", vault_aws_iam_role)
|
|
684
|
+
if vault_k8s_auth_role is not None:
|
|
685
|
+
pulumi.set(__self__, "vault_k8s_auth_role", vault_k8s_auth_role)
|
|
686
|
+
if vault_url is not None:
|
|
687
|
+
pulumi.set(__self__, "vault_url", vault_url)
|
|
688
|
+
if xvault_aws_iam_server_id is not None:
|
|
689
|
+
pulumi.set(__self__, "xvault_aws_iam_server_id", xvault_aws_iam_server_id)
|
|
690
|
+
|
|
691
|
+
@property
|
|
692
|
+
@pulumi.getter(name="accessType")
|
|
693
|
+
def access_type(self) -> Optional[pulumi.Input[str]]:
|
|
694
|
+
"""
|
|
695
|
+
Access type.
|
|
696
|
+
"""
|
|
697
|
+
return pulumi.get(self, "access_type")
|
|
698
|
+
|
|
699
|
+
@access_type.setter
|
|
700
|
+
def access_type(self, value: Optional[pulumi.Input[str]]):
|
|
701
|
+
pulumi.set(self, "access_type", value)
|
|
702
|
+
|
|
703
|
+
@property
|
|
704
|
+
@pulumi.getter(name="appRoleId")
|
|
705
|
+
def app_role_id(self) -> Optional[pulumi.Input[str]]:
|
|
706
|
+
"""
|
|
707
|
+
ID of App Role.
|
|
708
|
+
"""
|
|
709
|
+
return pulumi.get(self, "app_role_id")
|
|
710
|
+
|
|
711
|
+
@app_role_id.setter
|
|
712
|
+
def app_role_id(self, value: Optional[pulumi.Input[str]]):
|
|
713
|
+
pulumi.set(self, "app_role_id", value)
|
|
714
|
+
|
|
715
|
+
@property
|
|
716
|
+
@pulumi.getter(name="authToken")
|
|
717
|
+
def auth_token(self) -> Optional[pulumi.Input[str]]:
|
|
718
|
+
"""
|
|
719
|
+
Authentication token for Vault.
|
|
720
|
+
"""
|
|
721
|
+
return pulumi.get(self, "auth_token")
|
|
722
|
+
|
|
723
|
+
@auth_token.setter
|
|
724
|
+
def auth_token(self, value: Optional[pulumi.Input[str]]):
|
|
725
|
+
pulumi.set(self, "auth_token", value)
|
|
726
|
+
|
|
727
|
+
@property
|
|
728
|
+
@pulumi.getter(name="awsRegion")
|
|
729
|
+
def aws_region(self) -> Optional[pulumi.Input[str]]:
|
|
730
|
+
"""
|
|
731
|
+
AWS region where the AWS IAM authentication will happen.
|
|
732
|
+
"""
|
|
733
|
+
return pulumi.get(self, "aws_region")
|
|
734
|
+
|
|
735
|
+
@aws_region.setter
|
|
736
|
+
def aws_region(self, value: Optional[pulumi.Input[str]]):
|
|
737
|
+
pulumi.set(self, "aws_region", value)
|
|
738
|
+
|
|
739
|
+
@property
|
|
740
|
+
@pulumi.getter(name="basePath")
|
|
741
|
+
def base_path(self) -> Optional[pulumi.Input[str]]:
|
|
742
|
+
"""
|
|
743
|
+
Location of the Vault directory where the secret will be stored.
|
|
744
|
+
"""
|
|
745
|
+
return pulumi.get(self, "base_path")
|
|
746
|
+
|
|
747
|
+
@base_path.setter
|
|
748
|
+
def base_path(self, value: Optional[pulumi.Input[str]]):
|
|
749
|
+
pulumi.set(self, "base_path", value)
|
|
750
|
+
|
|
751
|
+
@property
|
|
752
|
+
@pulumi.getter
|
|
753
|
+
def default(self) -> Optional[pulumi.Input[bool]]:
|
|
754
|
+
"""
|
|
755
|
+
Is default or not.
|
|
756
|
+
"""
|
|
757
|
+
return pulumi.get(self, "default")
|
|
758
|
+
|
|
759
|
+
@default.setter
|
|
760
|
+
def default(self, value: Optional[pulumi.Input[bool]]):
|
|
761
|
+
pulumi.set(self, "default", value)
|
|
762
|
+
|
|
763
|
+
@property
|
|
764
|
+
@pulumi.getter(name="delegateSelectors")
|
|
765
|
+
def delegate_selectors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
766
|
+
"""
|
|
767
|
+
List of Delegate Selectors that belong to the same Delegate and are used to connect to the Secret Manager.
|
|
768
|
+
"""
|
|
769
|
+
return pulumi.get(self, "delegate_selectors")
|
|
770
|
+
|
|
771
|
+
@delegate_selectors.setter
|
|
772
|
+
def delegate_selectors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
773
|
+
pulumi.set(self, "delegate_selectors", value)
|
|
774
|
+
|
|
775
|
+
@property
|
|
776
|
+
@pulumi.getter
|
|
777
|
+
def description(self) -> Optional[pulumi.Input[str]]:
|
|
778
|
+
"""
|
|
779
|
+
Description of the resource.
|
|
780
|
+
"""
|
|
781
|
+
return pulumi.get(self, "description")
|
|
782
|
+
|
|
783
|
+
@description.setter
|
|
784
|
+
def description(self, value: Optional[pulumi.Input[str]]):
|
|
785
|
+
pulumi.set(self, "description", value)
|
|
786
|
+
|
|
787
|
+
@property
|
|
788
|
+
@pulumi.getter
|
|
789
|
+
def identifier(self) -> Optional[pulumi.Input[str]]:
|
|
790
|
+
"""
|
|
791
|
+
Unique identifier of the resource.
|
|
792
|
+
"""
|
|
793
|
+
return pulumi.get(self, "identifier")
|
|
794
|
+
|
|
795
|
+
@identifier.setter
|
|
796
|
+
def identifier(self, value: Optional[pulumi.Input[str]]):
|
|
797
|
+
pulumi.set(self, "identifier", value)
|
|
798
|
+
|
|
799
|
+
@property
|
|
800
|
+
@pulumi.getter(name="isDefault")
|
|
801
|
+
def is_default(self) -> Optional[pulumi.Input[bool]]:
|
|
802
|
+
"""
|
|
803
|
+
Is default or not.
|
|
804
|
+
"""
|
|
805
|
+
return pulumi.get(self, "is_default")
|
|
806
|
+
|
|
807
|
+
@is_default.setter
|
|
808
|
+
def is_default(self, value: Optional[pulumi.Input[bool]]):
|
|
809
|
+
pulumi.set(self, "is_default", value)
|
|
810
|
+
|
|
811
|
+
@property
|
|
812
|
+
@pulumi.getter(name="isReadOnly")
|
|
813
|
+
def is_read_only(self) -> Optional[pulumi.Input[bool]]:
|
|
814
|
+
"""
|
|
815
|
+
Read only or not.
|
|
816
|
+
"""
|
|
817
|
+
return pulumi.get(self, "is_read_only")
|
|
818
|
+
|
|
819
|
+
@is_read_only.setter
|
|
820
|
+
def is_read_only(self, value: Optional[pulumi.Input[bool]]):
|
|
821
|
+
pulumi.set(self, "is_read_only", value)
|
|
822
|
+
|
|
823
|
+
@property
|
|
824
|
+
@pulumi.getter(name="k8sAuthEndpoint")
|
|
825
|
+
def k8s_auth_endpoint(self) -> Optional[pulumi.Input[str]]:
|
|
826
|
+
"""
|
|
827
|
+
The path where Kubernetes Auth is enabled in Vault.
|
|
828
|
+
"""
|
|
829
|
+
return pulumi.get(self, "k8s_auth_endpoint")
|
|
830
|
+
|
|
831
|
+
@k8s_auth_endpoint.setter
|
|
832
|
+
def k8s_auth_endpoint(self, value: Optional[pulumi.Input[str]]):
|
|
833
|
+
pulumi.set(self, "k8s_auth_endpoint", value)
|
|
834
|
+
|
|
835
|
+
@property
|
|
836
|
+
@pulumi.getter
|
|
837
|
+
def name(self) -> Optional[pulumi.Input[str]]:
|
|
838
|
+
"""
|
|
839
|
+
Name of the resource.
|
|
840
|
+
"""
|
|
841
|
+
return pulumi.get(self, "name")
|
|
842
|
+
|
|
843
|
+
@name.setter
|
|
844
|
+
def name(self, value: Optional[pulumi.Input[str]]):
|
|
845
|
+
pulumi.set(self, "name", value)
|
|
846
|
+
|
|
847
|
+
@property
|
|
848
|
+
@pulumi.getter
|
|
849
|
+
def namespace(self) -> Optional[pulumi.Input[str]]:
|
|
850
|
+
"""
|
|
851
|
+
Vault namespace where the Secret will be created.
|
|
852
|
+
"""
|
|
853
|
+
return pulumi.get(self, "namespace")
|
|
854
|
+
|
|
855
|
+
@namespace.setter
|
|
856
|
+
def namespace(self, value: Optional[pulumi.Input[str]]):
|
|
857
|
+
pulumi.set(self, "namespace", value)
|
|
858
|
+
|
|
859
|
+
@property
|
|
860
|
+
@pulumi.getter(name="orgId")
|
|
861
|
+
def org_id(self) -> Optional[pulumi.Input[str]]:
|
|
862
|
+
"""
|
|
863
|
+
Unique identifier of the organization.
|
|
864
|
+
"""
|
|
865
|
+
return pulumi.get(self, "org_id")
|
|
866
|
+
|
|
867
|
+
@org_id.setter
|
|
868
|
+
def org_id(self, value: Optional[pulumi.Input[str]]):
|
|
869
|
+
pulumi.set(self, "org_id", value)
|
|
870
|
+
|
|
871
|
+
@property
|
|
872
|
+
@pulumi.getter(name="projectId")
|
|
873
|
+
def project_id(self) -> Optional[pulumi.Input[str]]:
|
|
874
|
+
"""
|
|
875
|
+
Unique identifier of the project.
|
|
876
|
+
"""
|
|
877
|
+
return pulumi.get(self, "project_id")
|
|
878
|
+
|
|
879
|
+
@project_id.setter
|
|
880
|
+
def project_id(self, value: Optional[pulumi.Input[str]]):
|
|
881
|
+
pulumi.set(self, "project_id", value)
|
|
882
|
+
|
|
883
|
+
@property
|
|
884
|
+
@pulumi.getter(name="readOnly")
|
|
885
|
+
def read_only(self) -> Optional[pulumi.Input[bool]]:
|
|
886
|
+
"""
|
|
887
|
+
Read only.
|
|
888
|
+
"""
|
|
889
|
+
return pulumi.get(self, "read_only")
|
|
890
|
+
|
|
891
|
+
@read_only.setter
|
|
892
|
+
def read_only(self, value: Optional[pulumi.Input[bool]]):
|
|
893
|
+
pulumi.set(self, "read_only", value)
|
|
894
|
+
|
|
895
|
+
@property
|
|
896
|
+
@pulumi.getter(name="renewAppRoleToken")
|
|
897
|
+
def renew_app_role_token(self) -> Optional[pulumi.Input[bool]]:
|
|
898
|
+
"""
|
|
899
|
+
Boolean value to indicate if AppRole token renewal is enabled or not.
|
|
900
|
+
"""
|
|
901
|
+
return pulumi.get(self, "renew_app_role_token")
|
|
902
|
+
|
|
903
|
+
@renew_app_role_token.setter
|
|
904
|
+
def renew_app_role_token(self, value: Optional[pulumi.Input[bool]]):
|
|
905
|
+
pulumi.set(self, "renew_app_role_token", value)
|
|
906
|
+
|
|
907
|
+
@property
|
|
908
|
+
@pulumi.getter(name="renewalIntervalMinutes")
|
|
909
|
+
def renewal_interval_minutes(self) -> Optional[pulumi.Input[int]]:
|
|
910
|
+
"""
|
|
911
|
+
The time interval for the token renewal.
|
|
912
|
+
"""
|
|
913
|
+
return pulumi.get(self, "renewal_interval_minutes")
|
|
914
|
+
|
|
915
|
+
@renewal_interval_minutes.setter
|
|
916
|
+
def renewal_interval_minutes(self, value: Optional[pulumi.Input[int]]):
|
|
917
|
+
pulumi.set(self, "renewal_interval_minutes", value)
|
|
918
|
+
|
|
919
|
+
@property
|
|
920
|
+
@pulumi.getter(name="secretEngineManuallyConfigured")
|
|
921
|
+
def secret_engine_manually_configured(self) -> Optional[pulumi.Input[bool]]:
|
|
922
|
+
"""
|
|
923
|
+
Manually entered Secret Engine.
|
|
924
|
+
"""
|
|
925
|
+
return pulumi.get(self, "secret_engine_manually_configured")
|
|
926
|
+
|
|
927
|
+
@secret_engine_manually_configured.setter
|
|
928
|
+
def secret_engine_manually_configured(self, value: Optional[pulumi.Input[bool]]):
|
|
929
|
+
pulumi.set(self, "secret_engine_manually_configured", value)
|
|
930
|
+
|
|
931
|
+
@property
|
|
932
|
+
@pulumi.getter(name="secretEngineName")
|
|
933
|
+
def secret_engine_name(self) -> Optional[pulumi.Input[str]]:
|
|
934
|
+
"""
|
|
935
|
+
Name of the Secret Engine.
|
|
936
|
+
"""
|
|
937
|
+
return pulumi.get(self, "secret_engine_name")
|
|
938
|
+
|
|
939
|
+
@secret_engine_name.setter
|
|
940
|
+
def secret_engine_name(self, value: Optional[pulumi.Input[str]]):
|
|
941
|
+
pulumi.set(self, "secret_engine_name", value)
|
|
942
|
+
|
|
943
|
+
@property
|
|
944
|
+
@pulumi.getter(name="secretEngineVersion")
|
|
945
|
+
def secret_engine_version(self) -> Optional[pulumi.Input[int]]:
|
|
946
|
+
"""
|
|
947
|
+
Version of Secret Engine.
|
|
948
|
+
"""
|
|
949
|
+
return pulumi.get(self, "secret_engine_version")
|
|
950
|
+
|
|
951
|
+
@secret_engine_version.setter
|
|
952
|
+
def secret_engine_version(self, value: Optional[pulumi.Input[int]]):
|
|
953
|
+
pulumi.set(self, "secret_engine_version", value)
|
|
954
|
+
|
|
955
|
+
@property
|
|
956
|
+
@pulumi.getter(name="secretId")
|
|
957
|
+
def secret_id(self) -> Optional[pulumi.Input[str]]:
|
|
958
|
+
"""
|
|
959
|
+
ID of the Secret.
|
|
960
|
+
"""
|
|
961
|
+
return pulumi.get(self, "secret_id")
|
|
962
|
+
|
|
963
|
+
@secret_id.setter
|
|
964
|
+
def secret_id(self, value: Optional[pulumi.Input[str]]):
|
|
965
|
+
pulumi.set(self, "secret_id", value)
|
|
966
|
+
|
|
967
|
+
@property
|
|
968
|
+
@pulumi.getter(name="serviceAccountTokenPath")
|
|
969
|
+
def service_account_token_path(self) -> Optional[pulumi.Input[str]]:
|
|
970
|
+
"""
|
|
971
|
+
The Service Account token path in the K8s pod where the token is mounted.
|
|
972
|
+
"""
|
|
973
|
+
return pulumi.get(self, "service_account_token_path")
|
|
974
|
+
|
|
975
|
+
@service_account_token_path.setter
|
|
976
|
+
def service_account_token_path(self, value: Optional[pulumi.Input[str]]):
|
|
977
|
+
pulumi.set(self, "service_account_token_path", value)
|
|
978
|
+
|
|
979
|
+
@property
|
|
980
|
+
@pulumi.getter(name="sinkPath")
|
|
981
|
+
def sink_path(self) -> Optional[pulumi.Input[str]]:
|
|
982
|
+
"""
|
|
983
|
+
The location from which the authentication token should be read.
|
|
984
|
+
"""
|
|
985
|
+
return pulumi.get(self, "sink_path")
|
|
986
|
+
|
|
987
|
+
@sink_path.setter
|
|
988
|
+
def sink_path(self, value: Optional[pulumi.Input[str]]):
|
|
989
|
+
pulumi.set(self, "sink_path", value)
|
|
990
|
+
|
|
991
|
+
@property
|
|
992
|
+
@pulumi.getter
|
|
993
|
+
def tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
|
994
|
+
"""
|
|
995
|
+
Tags to associate with the resource.
|
|
996
|
+
"""
|
|
997
|
+
return pulumi.get(self, "tags")
|
|
998
|
+
|
|
999
|
+
@tags.setter
|
|
1000
|
+
def tags(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
|
1001
|
+
pulumi.set(self, "tags", value)
|
|
1002
|
+
|
|
1003
|
+
@property
|
|
1004
|
+
@pulumi.getter(name="useAwsIam")
|
|
1005
|
+
def use_aws_iam(self) -> Optional[pulumi.Input[bool]]:
|
|
1006
|
+
"""
|
|
1007
|
+
Boolean value to indicate if AWS IAM is used for authentication.
|
|
1008
|
+
"""
|
|
1009
|
+
return pulumi.get(self, "use_aws_iam")
|
|
1010
|
+
|
|
1011
|
+
@use_aws_iam.setter
|
|
1012
|
+
def use_aws_iam(self, value: Optional[pulumi.Input[bool]]):
|
|
1013
|
+
pulumi.set(self, "use_aws_iam", value)
|
|
1014
|
+
|
|
1015
|
+
@property
|
|
1016
|
+
@pulumi.getter(name="useK8sAuth")
|
|
1017
|
+
def use_k8s_auth(self) -> Optional[pulumi.Input[bool]]:
|
|
1018
|
+
"""
|
|
1019
|
+
Boolean value to indicate if K8s Auth is used for authentication.
|
|
1020
|
+
"""
|
|
1021
|
+
return pulumi.get(self, "use_k8s_auth")
|
|
1022
|
+
|
|
1023
|
+
@use_k8s_auth.setter
|
|
1024
|
+
def use_k8s_auth(self, value: Optional[pulumi.Input[bool]]):
|
|
1025
|
+
pulumi.set(self, "use_k8s_auth", value)
|
|
1026
|
+
|
|
1027
|
+
@property
|
|
1028
|
+
@pulumi.getter(name="useVaultAgent")
|
|
1029
|
+
def use_vault_agent(self) -> Optional[pulumi.Input[bool]]:
|
|
1030
|
+
"""
|
|
1031
|
+
Boolean value to indicate if Vault Agent is used for authentication.
|
|
1032
|
+
"""
|
|
1033
|
+
return pulumi.get(self, "use_vault_agent")
|
|
1034
|
+
|
|
1035
|
+
@use_vault_agent.setter
|
|
1036
|
+
def use_vault_agent(self, value: Optional[pulumi.Input[bool]]):
|
|
1037
|
+
pulumi.set(self, "use_vault_agent", value)
|
|
1038
|
+
|
|
1039
|
+
@property
|
|
1040
|
+
@pulumi.getter(name="vaultAwsIamRole")
|
|
1041
|
+
def vault_aws_iam_role(self) -> Optional[pulumi.Input[str]]:
|
|
1042
|
+
"""
|
|
1043
|
+
The Vault role defined to bind to aws iam account/role being accessed.
|
|
1044
|
+
"""
|
|
1045
|
+
return pulumi.get(self, "vault_aws_iam_role")
|
|
1046
|
+
|
|
1047
|
+
@vault_aws_iam_role.setter
|
|
1048
|
+
def vault_aws_iam_role(self, value: Optional[pulumi.Input[str]]):
|
|
1049
|
+
pulumi.set(self, "vault_aws_iam_role", value)
|
|
1050
|
+
|
|
1051
|
+
@property
|
|
1052
|
+
@pulumi.getter(name="vaultK8sAuthRole")
|
|
1053
|
+
def vault_k8s_auth_role(self) -> Optional[pulumi.Input[str]]:
|
|
1054
|
+
"""
|
|
1055
|
+
The role where K8s Auth will happen.
|
|
1056
|
+
"""
|
|
1057
|
+
return pulumi.get(self, "vault_k8s_auth_role")
|
|
1058
|
+
|
|
1059
|
+
@vault_k8s_auth_role.setter
|
|
1060
|
+
def vault_k8s_auth_role(self, value: Optional[pulumi.Input[str]]):
|
|
1061
|
+
pulumi.set(self, "vault_k8s_auth_role", value)
|
|
1062
|
+
|
|
1063
|
+
@property
|
|
1064
|
+
@pulumi.getter(name="vaultUrl")
|
|
1065
|
+
def vault_url(self) -> Optional[pulumi.Input[str]]:
|
|
1066
|
+
"""
|
|
1067
|
+
URL of the HashiCorp Vault.
|
|
1068
|
+
"""
|
|
1069
|
+
return pulumi.get(self, "vault_url")
|
|
1070
|
+
|
|
1071
|
+
@vault_url.setter
|
|
1072
|
+
def vault_url(self, value: Optional[pulumi.Input[str]]):
|
|
1073
|
+
pulumi.set(self, "vault_url", value)
|
|
1074
|
+
|
|
1075
|
+
@property
|
|
1076
|
+
@pulumi.getter(name="xvaultAwsIamServerId")
|
|
1077
|
+
def xvault_aws_iam_server_id(self) -> Optional[pulumi.Input[str]]:
|
|
1078
|
+
"""
|
|
1079
|
+
The AWS IAM Header Server ID that has been configured for this AWS IAM instance.
|
|
1080
|
+
"""
|
|
1081
|
+
return pulumi.get(self, "xvault_aws_iam_server_id")
|
|
1082
|
+
|
|
1083
|
+
@xvault_aws_iam_server_id.setter
|
|
1084
|
+
def xvault_aws_iam_server_id(self, value: Optional[pulumi.Input[str]]):
|
|
1085
|
+
pulumi.set(self, "xvault_aws_iam_server_id", value)
|
|
1086
|
+
|
|
1087
|
+
|
|
1088
|
+
class VaultConnector(pulumi.CustomResource):
|
|
1089
|
+
@overload
|
|
1090
|
+
def __init__(__self__,
|
|
1091
|
+
resource_name: str,
|
|
1092
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
1093
|
+
access_type: Optional[pulumi.Input[str]] = None,
|
|
1094
|
+
app_role_id: Optional[pulumi.Input[str]] = None,
|
|
1095
|
+
auth_token: Optional[pulumi.Input[str]] = None,
|
|
1096
|
+
aws_region: Optional[pulumi.Input[str]] = None,
|
|
1097
|
+
base_path: Optional[pulumi.Input[str]] = None,
|
|
1098
|
+
default: Optional[pulumi.Input[bool]] = None,
|
|
1099
|
+
delegate_selectors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
1100
|
+
description: Optional[pulumi.Input[str]] = None,
|
|
1101
|
+
identifier: Optional[pulumi.Input[str]] = None,
|
|
1102
|
+
is_default: Optional[pulumi.Input[bool]] = None,
|
|
1103
|
+
is_read_only: Optional[pulumi.Input[bool]] = None,
|
|
1104
|
+
k8s_auth_endpoint: Optional[pulumi.Input[str]] = None,
|
|
1105
|
+
name: Optional[pulumi.Input[str]] = None,
|
|
1106
|
+
namespace: Optional[pulumi.Input[str]] = None,
|
|
1107
|
+
org_id: Optional[pulumi.Input[str]] = None,
|
|
1108
|
+
project_id: Optional[pulumi.Input[str]] = None,
|
|
1109
|
+
read_only: Optional[pulumi.Input[bool]] = None,
|
|
1110
|
+
renew_app_role_token: Optional[pulumi.Input[bool]] = None,
|
|
1111
|
+
renewal_interval_minutes: Optional[pulumi.Input[int]] = None,
|
|
1112
|
+
secret_engine_manually_configured: Optional[pulumi.Input[bool]] = None,
|
|
1113
|
+
secret_engine_name: Optional[pulumi.Input[str]] = None,
|
|
1114
|
+
secret_engine_version: Optional[pulumi.Input[int]] = None,
|
|
1115
|
+
secret_id: Optional[pulumi.Input[str]] = None,
|
|
1116
|
+
service_account_token_path: Optional[pulumi.Input[str]] = None,
|
|
1117
|
+
sink_path: Optional[pulumi.Input[str]] = None,
|
|
1118
|
+
tags: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
1119
|
+
use_aws_iam: Optional[pulumi.Input[bool]] = None,
|
|
1120
|
+
use_k8s_auth: Optional[pulumi.Input[bool]] = None,
|
|
1121
|
+
use_vault_agent: Optional[pulumi.Input[bool]] = None,
|
|
1122
|
+
vault_aws_iam_role: Optional[pulumi.Input[str]] = None,
|
|
1123
|
+
vault_k8s_auth_role: Optional[pulumi.Input[str]] = None,
|
|
1124
|
+
vault_url: Optional[pulumi.Input[str]] = None,
|
|
1125
|
+
xvault_aws_iam_server_id: Optional[pulumi.Input[str]] = None,
|
|
1126
|
+
__props__=None):
|
|
1127
|
+
"""
|
|
1128
|
+
## Example Usage
|
|
1129
|
+
|
|
1130
|
+
```python
|
|
1131
|
+
import pulumi
|
|
1132
|
+
import pulumi_harness as harness
|
|
1133
|
+
|
|
1134
|
+
aws_auth = harness.platform.VaultConnector("aws_auth",
|
|
1135
|
+
identifier="identifier",
|
|
1136
|
+
name="name",
|
|
1137
|
+
description="test",
|
|
1138
|
+
tags=["foo:bar"],
|
|
1139
|
+
aws_region="aws_region",
|
|
1140
|
+
base_path="base_path",
|
|
1141
|
+
access_type="AWS_IAM",
|
|
1142
|
+
default=False,
|
|
1143
|
+
xvault_aws_iam_server_id=f"account.{test['id']}",
|
|
1144
|
+
read_only=True,
|
|
1145
|
+
renewal_interval_minutes=60,
|
|
1146
|
+
secret_engine_manually_configured=True,
|
|
1147
|
+
secret_engine_name="secret_engine_name",
|
|
1148
|
+
secret_engine_version=2,
|
|
1149
|
+
vault_aws_iam_role="vault_aws_iam_role",
|
|
1150
|
+
use_aws_iam=True,
|
|
1151
|
+
use_k8s_auth=False,
|
|
1152
|
+
use_vault_agent=False,
|
|
1153
|
+
delegate_selectors=["harness-delegate"],
|
|
1154
|
+
vault_url="https://vault_url.com")
|
|
1155
|
+
app_role = harness.platform.VaultConnector("app_role",
|
|
1156
|
+
identifier="identifier",
|
|
1157
|
+
name="name",
|
|
1158
|
+
description="test",
|
|
1159
|
+
tags=["foo:bar"],
|
|
1160
|
+
app_role_id="app_role_id",
|
|
1161
|
+
base_path="base_path",
|
|
1162
|
+
access_type="APP_ROLE",
|
|
1163
|
+
default=False,
|
|
1164
|
+
secret_id=f"account.{test['id']}",
|
|
1165
|
+
read_only=True,
|
|
1166
|
+
renewal_interval_minutes=60,
|
|
1167
|
+
secret_engine_manually_configured=True,
|
|
1168
|
+
secret_engine_name="secret_engine_name",
|
|
1169
|
+
secret_engine_version=2,
|
|
1170
|
+
use_aws_iam=False,
|
|
1171
|
+
use_k8s_auth=False,
|
|
1172
|
+
use_vault_agent=False,
|
|
1173
|
+
renew_app_role_token=True,
|
|
1174
|
+
delegate_selectors=["harness-delegate"],
|
|
1175
|
+
vault_url="https://vault_url.com")
|
|
1176
|
+
k8s_auth = harness.platform.VaultConnector("k8s_auth",
|
|
1177
|
+
identifier="identifier",
|
|
1178
|
+
name="name",
|
|
1179
|
+
description="test",
|
|
1180
|
+
tags=["foo:bar"],
|
|
1181
|
+
auth_token=f"account.{test['id']}",
|
|
1182
|
+
base_path="base_path",
|
|
1183
|
+
access_type="K8s_AUTH",
|
|
1184
|
+
default=False,
|
|
1185
|
+
k8s_auth_endpoint="k8s_auth_endpoint",
|
|
1186
|
+
namespace="namespace",
|
|
1187
|
+
read_only=True,
|
|
1188
|
+
renewal_interval_minutes=10,
|
|
1189
|
+
secret_engine_manually_configured=True,
|
|
1190
|
+
secret_engine_name="secret_engine_name",
|
|
1191
|
+
secret_engine_version=2,
|
|
1192
|
+
service_account_token_path="service_account_token_path",
|
|
1193
|
+
use_aws_iam=False,
|
|
1194
|
+
use_k8s_auth=True,
|
|
1195
|
+
use_vault_agent=False,
|
|
1196
|
+
vault_k8s_auth_role="vault_k8s_auth_role",
|
|
1197
|
+
vault_aws_iam_role="vault_aws_iam_role",
|
|
1198
|
+
delegate_selectors=["harness-delegate"],
|
|
1199
|
+
vault_url="https://vault_url.com")
|
|
1200
|
+
vault_agent = harness.platform.VaultConnector("vault_agent",
|
|
1201
|
+
identifier="identifier",
|
|
1202
|
+
name="name",
|
|
1203
|
+
description="test",
|
|
1204
|
+
tags=["foo:bar"],
|
|
1205
|
+
auth_token=f"account.{test['id']}",
|
|
1206
|
+
base_path="base_path",
|
|
1207
|
+
access_type="VAULT_AGENT",
|
|
1208
|
+
default=False,
|
|
1209
|
+
namespace="namespace",
|
|
1210
|
+
read_only=True,
|
|
1211
|
+
renewal_interval_minutes=10,
|
|
1212
|
+
secret_engine_manually_configured=True,
|
|
1213
|
+
secret_engine_name="secret_engine_name",
|
|
1214
|
+
secret_engine_version=2,
|
|
1215
|
+
use_aws_iam=False,
|
|
1216
|
+
use_k8s_auth=False,
|
|
1217
|
+
use_vault_agent=True,
|
|
1218
|
+
sink_path="sink_path",
|
|
1219
|
+
delegate_selectors=["harness-delegate"],
|
|
1220
|
+
vault_url="https://vault_url.com")
|
|
1221
|
+
token = harness.platform.VaultConnector("token",
|
|
1222
|
+
identifier="identifier",
|
|
1223
|
+
name="name",
|
|
1224
|
+
description="test",
|
|
1225
|
+
tags=["foo:bar"],
|
|
1226
|
+
auth_token=f"account.{test['id']}",
|
|
1227
|
+
base_path="base_path",
|
|
1228
|
+
access_type="TOKEN",
|
|
1229
|
+
default=False,
|
|
1230
|
+
namespace="namespace",
|
|
1231
|
+
read_only=True,
|
|
1232
|
+
renewal_interval_minutes=10,
|
|
1233
|
+
secret_engine_manually_configured=True,
|
|
1234
|
+
secret_engine_name="secret_engine_name",
|
|
1235
|
+
secret_engine_version=2,
|
|
1236
|
+
use_aws_iam=False,
|
|
1237
|
+
use_k8s_auth=False,
|
|
1238
|
+
vault_url="https://vault_url.com")
|
|
1239
|
+
```
|
|
1240
|
+
|
|
1241
|
+
## Import
|
|
1242
|
+
|
|
1243
|
+
Import account level vault connector
|
|
1244
|
+
|
|
1245
|
+
```sh
|
|
1246
|
+
$ pulumi import harness:platform/vaultConnector:VaultConnector example <connector_id>
|
|
1247
|
+
```
|
|
1248
|
+
|
|
1249
|
+
Import org level vault connector
|
|
1250
|
+
|
|
1251
|
+
```sh
|
|
1252
|
+
$ pulumi import harness:platform/vaultConnector:VaultConnector example <ord_id>/<connector_id>
|
|
1253
|
+
```
|
|
1254
|
+
|
|
1255
|
+
Import project level vault connector
|
|
1256
|
+
|
|
1257
|
+
```sh
|
|
1258
|
+
$ pulumi import harness:platform/vaultConnector:VaultConnector example <org_id>/<project_id>/<connector_id>
|
|
1259
|
+
```
|
|
1260
|
+
|
|
1261
|
+
:param str resource_name: The name of the resource.
|
|
1262
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
1263
|
+
:param pulumi.Input[str] access_type: Access type.
|
|
1264
|
+
:param pulumi.Input[str] app_role_id: ID of App Role.
|
|
1265
|
+
:param pulumi.Input[str] auth_token: Authentication token for Vault.
|
|
1266
|
+
:param pulumi.Input[str] aws_region: AWS region where the AWS IAM authentication will happen.
|
|
1267
|
+
:param pulumi.Input[str] base_path: Location of the Vault directory where the secret will be stored.
|
|
1268
|
+
:param pulumi.Input[bool] default: Is default or not.
|
|
1269
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegate_selectors: List of Delegate Selectors that belong to the same Delegate and are used to connect to the Secret Manager.
|
|
1270
|
+
:param pulumi.Input[str] description: Description of the resource.
|
|
1271
|
+
:param pulumi.Input[str] identifier: Unique identifier of the resource.
|
|
1272
|
+
:param pulumi.Input[bool] is_default: Is default or not.
|
|
1273
|
+
:param pulumi.Input[bool] is_read_only: Read only or not.
|
|
1274
|
+
:param pulumi.Input[str] k8s_auth_endpoint: The path where Kubernetes Auth is enabled in Vault.
|
|
1275
|
+
:param pulumi.Input[str] name: Name of the resource.
|
|
1276
|
+
:param pulumi.Input[str] namespace: Vault namespace where the Secret will be created.
|
|
1277
|
+
:param pulumi.Input[str] org_id: Unique identifier of the organization.
|
|
1278
|
+
:param pulumi.Input[str] project_id: Unique identifier of the project.
|
|
1279
|
+
:param pulumi.Input[bool] read_only: Read only.
|
|
1280
|
+
:param pulumi.Input[bool] renew_app_role_token: Boolean value to indicate if AppRole token renewal is enabled or not.
|
|
1281
|
+
:param pulumi.Input[int] renewal_interval_minutes: The time interval for the token renewal.
|
|
1282
|
+
:param pulumi.Input[bool] secret_engine_manually_configured: Manually entered Secret Engine.
|
|
1283
|
+
:param pulumi.Input[str] secret_engine_name: Name of the Secret Engine.
|
|
1284
|
+
:param pulumi.Input[int] secret_engine_version: Version of Secret Engine.
|
|
1285
|
+
:param pulumi.Input[str] secret_id: ID of the Secret.
|
|
1286
|
+
:param pulumi.Input[str] service_account_token_path: The Service Account token path in the K8s pod where the token is mounted.
|
|
1287
|
+
:param pulumi.Input[str] sink_path: The location from which the authentication token should be read.
|
|
1288
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] tags: Tags to associate with the resource.
|
|
1289
|
+
:param pulumi.Input[bool] use_aws_iam: Boolean value to indicate if AWS IAM is used for authentication.
|
|
1290
|
+
:param pulumi.Input[bool] use_k8s_auth: Boolean value to indicate if K8s Auth is used for authentication.
|
|
1291
|
+
:param pulumi.Input[bool] use_vault_agent: Boolean value to indicate if Vault Agent is used for authentication.
|
|
1292
|
+
:param pulumi.Input[str] vault_aws_iam_role: The Vault role defined to bind to aws iam account/role being accessed.
|
|
1293
|
+
:param pulumi.Input[str] vault_k8s_auth_role: The role where K8s Auth will happen.
|
|
1294
|
+
:param pulumi.Input[str] vault_url: URL of the HashiCorp Vault.
|
|
1295
|
+
:param pulumi.Input[str] xvault_aws_iam_server_id: The AWS IAM Header Server ID that has been configured for this AWS IAM instance.
|
|
1296
|
+
"""
|
|
1297
|
+
...
|
|
1298
|
+
@overload
|
|
1299
|
+
def __init__(__self__,
|
|
1300
|
+
resource_name: str,
|
|
1301
|
+
args: VaultConnectorArgs,
|
|
1302
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
1303
|
+
"""
|
|
1304
|
+
## Example Usage
|
|
1305
|
+
|
|
1306
|
+
```python
|
|
1307
|
+
import pulumi
|
|
1308
|
+
import pulumi_harness as harness
|
|
1309
|
+
|
|
1310
|
+
aws_auth = harness.platform.VaultConnector("aws_auth",
|
|
1311
|
+
identifier="identifier",
|
|
1312
|
+
name="name",
|
|
1313
|
+
description="test",
|
|
1314
|
+
tags=["foo:bar"],
|
|
1315
|
+
aws_region="aws_region",
|
|
1316
|
+
base_path="base_path",
|
|
1317
|
+
access_type="AWS_IAM",
|
|
1318
|
+
default=False,
|
|
1319
|
+
xvault_aws_iam_server_id=f"account.{test['id']}",
|
|
1320
|
+
read_only=True,
|
|
1321
|
+
renewal_interval_minutes=60,
|
|
1322
|
+
secret_engine_manually_configured=True,
|
|
1323
|
+
secret_engine_name="secret_engine_name",
|
|
1324
|
+
secret_engine_version=2,
|
|
1325
|
+
vault_aws_iam_role="vault_aws_iam_role",
|
|
1326
|
+
use_aws_iam=True,
|
|
1327
|
+
use_k8s_auth=False,
|
|
1328
|
+
use_vault_agent=False,
|
|
1329
|
+
delegate_selectors=["harness-delegate"],
|
|
1330
|
+
vault_url="https://vault_url.com")
|
|
1331
|
+
app_role = harness.platform.VaultConnector("app_role",
|
|
1332
|
+
identifier="identifier",
|
|
1333
|
+
name="name",
|
|
1334
|
+
description="test",
|
|
1335
|
+
tags=["foo:bar"],
|
|
1336
|
+
app_role_id="app_role_id",
|
|
1337
|
+
base_path="base_path",
|
|
1338
|
+
access_type="APP_ROLE",
|
|
1339
|
+
default=False,
|
|
1340
|
+
secret_id=f"account.{test['id']}",
|
|
1341
|
+
read_only=True,
|
|
1342
|
+
renewal_interval_minutes=60,
|
|
1343
|
+
secret_engine_manually_configured=True,
|
|
1344
|
+
secret_engine_name="secret_engine_name",
|
|
1345
|
+
secret_engine_version=2,
|
|
1346
|
+
use_aws_iam=False,
|
|
1347
|
+
use_k8s_auth=False,
|
|
1348
|
+
use_vault_agent=False,
|
|
1349
|
+
renew_app_role_token=True,
|
|
1350
|
+
delegate_selectors=["harness-delegate"],
|
|
1351
|
+
vault_url="https://vault_url.com")
|
|
1352
|
+
k8s_auth = harness.platform.VaultConnector("k8s_auth",
|
|
1353
|
+
identifier="identifier",
|
|
1354
|
+
name="name",
|
|
1355
|
+
description="test",
|
|
1356
|
+
tags=["foo:bar"],
|
|
1357
|
+
auth_token=f"account.{test['id']}",
|
|
1358
|
+
base_path="base_path",
|
|
1359
|
+
access_type="K8s_AUTH",
|
|
1360
|
+
default=False,
|
|
1361
|
+
k8s_auth_endpoint="k8s_auth_endpoint",
|
|
1362
|
+
namespace="namespace",
|
|
1363
|
+
read_only=True,
|
|
1364
|
+
renewal_interval_minutes=10,
|
|
1365
|
+
secret_engine_manually_configured=True,
|
|
1366
|
+
secret_engine_name="secret_engine_name",
|
|
1367
|
+
secret_engine_version=2,
|
|
1368
|
+
service_account_token_path="service_account_token_path",
|
|
1369
|
+
use_aws_iam=False,
|
|
1370
|
+
use_k8s_auth=True,
|
|
1371
|
+
use_vault_agent=False,
|
|
1372
|
+
vault_k8s_auth_role="vault_k8s_auth_role",
|
|
1373
|
+
vault_aws_iam_role="vault_aws_iam_role",
|
|
1374
|
+
delegate_selectors=["harness-delegate"],
|
|
1375
|
+
vault_url="https://vault_url.com")
|
|
1376
|
+
vault_agent = harness.platform.VaultConnector("vault_agent",
|
|
1377
|
+
identifier="identifier",
|
|
1378
|
+
name="name",
|
|
1379
|
+
description="test",
|
|
1380
|
+
tags=["foo:bar"],
|
|
1381
|
+
auth_token=f"account.{test['id']}",
|
|
1382
|
+
base_path="base_path",
|
|
1383
|
+
access_type="VAULT_AGENT",
|
|
1384
|
+
default=False,
|
|
1385
|
+
namespace="namespace",
|
|
1386
|
+
read_only=True,
|
|
1387
|
+
renewal_interval_minutes=10,
|
|
1388
|
+
secret_engine_manually_configured=True,
|
|
1389
|
+
secret_engine_name="secret_engine_name",
|
|
1390
|
+
secret_engine_version=2,
|
|
1391
|
+
use_aws_iam=False,
|
|
1392
|
+
use_k8s_auth=False,
|
|
1393
|
+
use_vault_agent=True,
|
|
1394
|
+
sink_path="sink_path",
|
|
1395
|
+
delegate_selectors=["harness-delegate"],
|
|
1396
|
+
vault_url="https://vault_url.com")
|
|
1397
|
+
token = harness.platform.VaultConnector("token",
|
|
1398
|
+
identifier="identifier",
|
|
1399
|
+
name="name",
|
|
1400
|
+
description="test",
|
|
1401
|
+
tags=["foo:bar"],
|
|
1402
|
+
auth_token=f"account.{test['id']}",
|
|
1403
|
+
base_path="base_path",
|
|
1404
|
+
access_type="TOKEN",
|
|
1405
|
+
default=False,
|
|
1406
|
+
namespace="namespace",
|
|
1407
|
+
read_only=True,
|
|
1408
|
+
renewal_interval_minutes=10,
|
|
1409
|
+
secret_engine_manually_configured=True,
|
|
1410
|
+
secret_engine_name="secret_engine_name",
|
|
1411
|
+
secret_engine_version=2,
|
|
1412
|
+
use_aws_iam=False,
|
|
1413
|
+
use_k8s_auth=False,
|
|
1414
|
+
vault_url="https://vault_url.com")
|
|
1415
|
+
```
|
|
1416
|
+
|
|
1417
|
+
## Import
|
|
1418
|
+
|
|
1419
|
+
Import account level vault connector
|
|
1420
|
+
|
|
1421
|
+
```sh
|
|
1422
|
+
$ pulumi import harness:platform/vaultConnector:VaultConnector example <connector_id>
|
|
1423
|
+
```
|
|
1424
|
+
|
|
1425
|
+
Import org level vault connector
|
|
1426
|
+
|
|
1427
|
+
```sh
|
|
1428
|
+
$ pulumi import harness:platform/vaultConnector:VaultConnector example <ord_id>/<connector_id>
|
|
1429
|
+
```
|
|
1430
|
+
|
|
1431
|
+
Import project level vault connector
|
|
1432
|
+
|
|
1433
|
+
```sh
|
|
1434
|
+
$ pulumi import harness:platform/vaultConnector:VaultConnector example <org_id>/<project_id>/<connector_id>
|
|
1435
|
+
```
|
|
1436
|
+
|
|
1437
|
+
:param str resource_name: The name of the resource.
|
|
1438
|
+
:param VaultConnectorArgs args: The arguments to use to populate this resource's properties.
|
|
1439
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
1440
|
+
"""
|
|
1441
|
+
...
|
|
1442
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
1443
|
+
resource_args, opts = _utilities.get_resource_args_opts(VaultConnectorArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
1444
|
+
if resource_args is not None:
|
|
1445
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
1446
|
+
else:
|
|
1447
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
1448
|
+
|
|
1449
|
+
def _internal_init(__self__,
|
|
1450
|
+
resource_name: str,
|
|
1451
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
1452
|
+
access_type: Optional[pulumi.Input[str]] = None,
|
|
1453
|
+
app_role_id: Optional[pulumi.Input[str]] = None,
|
|
1454
|
+
auth_token: Optional[pulumi.Input[str]] = None,
|
|
1455
|
+
aws_region: Optional[pulumi.Input[str]] = None,
|
|
1456
|
+
base_path: Optional[pulumi.Input[str]] = None,
|
|
1457
|
+
default: Optional[pulumi.Input[bool]] = None,
|
|
1458
|
+
delegate_selectors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
1459
|
+
description: Optional[pulumi.Input[str]] = None,
|
|
1460
|
+
identifier: Optional[pulumi.Input[str]] = None,
|
|
1461
|
+
is_default: Optional[pulumi.Input[bool]] = None,
|
|
1462
|
+
is_read_only: Optional[pulumi.Input[bool]] = None,
|
|
1463
|
+
k8s_auth_endpoint: Optional[pulumi.Input[str]] = None,
|
|
1464
|
+
name: Optional[pulumi.Input[str]] = None,
|
|
1465
|
+
namespace: Optional[pulumi.Input[str]] = None,
|
|
1466
|
+
org_id: Optional[pulumi.Input[str]] = None,
|
|
1467
|
+
project_id: Optional[pulumi.Input[str]] = None,
|
|
1468
|
+
read_only: Optional[pulumi.Input[bool]] = None,
|
|
1469
|
+
renew_app_role_token: Optional[pulumi.Input[bool]] = None,
|
|
1470
|
+
renewal_interval_minutes: Optional[pulumi.Input[int]] = None,
|
|
1471
|
+
secret_engine_manually_configured: Optional[pulumi.Input[bool]] = None,
|
|
1472
|
+
secret_engine_name: Optional[pulumi.Input[str]] = None,
|
|
1473
|
+
secret_engine_version: Optional[pulumi.Input[int]] = None,
|
|
1474
|
+
secret_id: Optional[pulumi.Input[str]] = None,
|
|
1475
|
+
service_account_token_path: Optional[pulumi.Input[str]] = None,
|
|
1476
|
+
sink_path: Optional[pulumi.Input[str]] = None,
|
|
1477
|
+
tags: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
1478
|
+
use_aws_iam: Optional[pulumi.Input[bool]] = None,
|
|
1479
|
+
use_k8s_auth: Optional[pulumi.Input[bool]] = None,
|
|
1480
|
+
use_vault_agent: Optional[pulumi.Input[bool]] = None,
|
|
1481
|
+
vault_aws_iam_role: Optional[pulumi.Input[str]] = None,
|
|
1482
|
+
vault_k8s_auth_role: Optional[pulumi.Input[str]] = None,
|
|
1483
|
+
vault_url: Optional[pulumi.Input[str]] = None,
|
|
1484
|
+
xvault_aws_iam_server_id: Optional[pulumi.Input[str]] = None,
|
|
1485
|
+
__props__=None):
|
|
1486
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
1487
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
1488
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
1489
|
+
if opts.id is None:
|
|
1490
|
+
if __props__ is not None:
|
|
1491
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
1492
|
+
__props__ = VaultConnectorArgs.__new__(VaultConnectorArgs)
|
|
1493
|
+
|
|
1494
|
+
__props__.__dict__["access_type"] = access_type
|
|
1495
|
+
__props__.__dict__["app_role_id"] = app_role_id
|
|
1496
|
+
__props__.__dict__["auth_token"] = auth_token
|
|
1497
|
+
__props__.__dict__["aws_region"] = aws_region
|
|
1498
|
+
__props__.__dict__["base_path"] = base_path
|
|
1499
|
+
__props__.__dict__["default"] = default
|
|
1500
|
+
__props__.__dict__["delegate_selectors"] = delegate_selectors
|
|
1501
|
+
__props__.__dict__["description"] = description
|
|
1502
|
+
if identifier is None and not opts.urn:
|
|
1503
|
+
raise TypeError("Missing required property 'identifier'")
|
|
1504
|
+
__props__.__dict__["identifier"] = identifier
|
|
1505
|
+
__props__.__dict__["is_default"] = is_default
|
|
1506
|
+
__props__.__dict__["is_read_only"] = is_read_only
|
|
1507
|
+
__props__.__dict__["k8s_auth_endpoint"] = k8s_auth_endpoint
|
|
1508
|
+
__props__.__dict__["name"] = name
|
|
1509
|
+
__props__.__dict__["namespace"] = namespace
|
|
1510
|
+
__props__.__dict__["org_id"] = org_id
|
|
1511
|
+
__props__.__dict__["project_id"] = project_id
|
|
1512
|
+
__props__.__dict__["read_only"] = read_only
|
|
1513
|
+
__props__.__dict__["renew_app_role_token"] = renew_app_role_token
|
|
1514
|
+
if renewal_interval_minutes is None and not opts.urn:
|
|
1515
|
+
raise TypeError("Missing required property 'renewal_interval_minutes'")
|
|
1516
|
+
__props__.__dict__["renewal_interval_minutes"] = renewal_interval_minutes
|
|
1517
|
+
__props__.__dict__["secret_engine_manually_configured"] = secret_engine_manually_configured
|
|
1518
|
+
__props__.__dict__["secret_engine_name"] = secret_engine_name
|
|
1519
|
+
__props__.__dict__["secret_engine_version"] = secret_engine_version
|
|
1520
|
+
__props__.__dict__["secret_id"] = secret_id
|
|
1521
|
+
__props__.__dict__["service_account_token_path"] = service_account_token_path
|
|
1522
|
+
__props__.__dict__["sink_path"] = sink_path
|
|
1523
|
+
__props__.__dict__["tags"] = tags
|
|
1524
|
+
__props__.__dict__["use_aws_iam"] = use_aws_iam
|
|
1525
|
+
__props__.__dict__["use_k8s_auth"] = use_k8s_auth
|
|
1526
|
+
__props__.__dict__["use_vault_agent"] = use_vault_agent
|
|
1527
|
+
__props__.__dict__["vault_aws_iam_role"] = vault_aws_iam_role
|
|
1528
|
+
__props__.__dict__["vault_k8s_auth_role"] = vault_k8s_auth_role
|
|
1529
|
+
if vault_url is None and not opts.urn:
|
|
1530
|
+
raise TypeError("Missing required property 'vault_url'")
|
|
1531
|
+
__props__.__dict__["vault_url"] = vault_url
|
|
1532
|
+
__props__.__dict__["xvault_aws_iam_server_id"] = xvault_aws_iam_server_id
|
|
1533
|
+
super(VaultConnector, __self__).__init__(
|
|
1534
|
+
'harness:platform/vaultConnector:VaultConnector',
|
|
1535
|
+
resource_name,
|
|
1536
|
+
__props__,
|
|
1537
|
+
opts)
|
|
1538
|
+
|
|
1539
|
+
@staticmethod
|
|
1540
|
+
def get(resource_name: str,
|
|
1541
|
+
id: pulumi.Input[str],
|
|
1542
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
1543
|
+
access_type: Optional[pulumi.Input[str]] = None,
|
|
1544
|
+
app_role_id: Optional[pulumi.Input[str]] = None,
|
|
1545
|
+
auth_token: Optional[pulumi.Input[str]] = None,
|
|
1546
|
+
aws_region: Optional[pulumi.Input[str]] = None,
|
|
1547
|
+
base_path: Optional[pulumi.Input[str]] = None,
|
|
1548
|
+
default: Optional[pulumi.Input[bool]] = None,
|
|
1549
|
+
delegate_selectors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
1550
|
+
description: Optional[pulumi.Input[str]] = None,
|
|
1551
|
+
identifier: Optional[pulumi.Input[str]] = None,
|
|
1552
|
+
is_default: Optional[pulumi.Input[bool]] = None,
|
|
1553
|
+
is_read_only: Optional[pulumi.Input[bool]] = None,
|
|
1554
|
+
k8s_auth_endpoint: Optional[pulumi.Input[str]] = None,
|
|
1555
|
+
name: Optional[pulumi.Input[str]] = None,
|
|
1556
|
+
namespace: Optional[pulumi.Input[str]] = None,
|
|
1557
|
+
org_id: Optional[pulumi.Input[str]] = None,
|
|
1558
|
+
project_id: Optional[pulumi.Input[str]] = None,
|
|
1559
|
+
read_only: Optional[pulumi.Input[bool]] = None,
|
|
1560
|
+
renew_app_role_token: Optional[pulumi.Input[bool]] = None,
|
|
1561
|
+
renewal_interval_minutes: Optional[pulumi.Input[int]] = None,
|
|
1562
|
+
secret_engine_manually_configured: Optional[pulumi.Input[bool]] = None,
|
|
1563
|
+
secret_engine_name: Optional[pulumi.Input[str]] = None,
|
|
1564
|
+
secret_engine_version: Optional[pulumi.Input[int]] = None,
|
|
1565
|
+
secret_id: Optional[pulumi.Input[str]] = None,
|
|
1566
|
+
service_account_token_path: Optional[pulumi.Input[str]] = None,
|
|
1567
|
+
sink_path: Optional[pulumi.Input[str]] = None,
|
|
1568
|
+
tags: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
|
1569
|
+
use_aws_iam: Optional[pulumi.Input[bool]] = None,
|
|
1570
|
+
use_k8s_auth: Optional[pulumi.Input[bool]] = None,
|
|
1571
|
+
use_vault_agent: Optional[pulumi.Input[bool]] = None,
|
|
1572
|
+
vault_aws_iam_role: Optional[pulumi.Input[str]] = None,
|
|
1573
|
+
vault_k8s_auth_role: Optional[pulumi.Input[str]] = None,
|
|
1574
|
+
vault_url: Optional[pulumi.Input[str]] = None,
|
|
1575
|
+
xvault_aws_iam_server_id: Optional[pulumi.Input[str]] = None) -> 'VaultConnector':
|
|
1576
|
+
"""
|
|
1577
|
+
Get an existing VaultConnector resource's state with the given name, id, and optional extra
|
|
1578
|
+
properties used to qualify the lookup.
|
|
1579
|
+
|
|
1580
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
1581
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
1582
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
1583
|
+
:param pulumi.Input[str] access_type: Access type.
|
|
1584
|
+
:param pulumi.Input[str] app_role_id: ID of App Role.
|
|
1585
|
+
:param pulumi.Input[str] auth_token: Authentication token for Vault.
|
|
1586
|
+
:param pulumi.Input[str] aws_region: AWS region where the AWS IAM authentication will happen.
|
|
1587
|
+
:param pulumi.Input[str] base_path: Location of the Vault directory where the secret will be stored.
|
|
1588
|
+
:param pulumi.Input[bool] default: Is default or not.
|
|
1589
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegate_selectors: List of Delegate Selectors that belong to the same Delegate and are used to connect to the Secret Manager.
|
|
1590
|
+
:param pulumi.Input[str] description: Description of the resource.
|
|
1591
|
+
:param pulumi.Input[str] identifier: Unique identifier of the resource.
|
|
1592
|
+
:param pulumi.Input[bool] is_default: Is default or not.
|
|
1593
|
+
:param pulumi.Input[bool] is_read_only: Read only or not.
|
|
1594
|
+
:param pulumi.Input[str] k8s_auth_endpoint: The path where Kubernetes Auth is enabled in Vault.
|
|
1595
|
+
:param pulumi.Input[str] name: Name of the resource.
|
|
1596
|
+
:param pulumi.Input[str] namespace: Vault namespace where the Secret will be created.
|
|
1597
|
+
:param pulumi.Input[str] org_id: Unique identifier of the organization.
|
|
1598
|
+
:param pulumi.Input[str] project_id: Unique identifier of the project.
|
|
1599
|
+
:param pulumi.Input[bool] read_only: Read only.
|
|
1600
|
+
:param pulumi.Input[bool] renew_app_role_token: Boolean value to indicate if AppRole token renewal is enabled or not.
|
|
1601
|
+
:param pulumi.Input[int] renewal_interval_minutes: The time interval for the token renewal.
|
|
1602
|
+
:param pulumi.Input[bool] secret_engine_manually_configured: Manually entered Secret Engine.
|
|
1603
|
+
:param pulumi.Input[str] secret_engine_name: Name of the Secret Engine.
|
|
1604
|
+
:param pulumi.Input[int] secret_engine_version: Version of Secret Engine.
|
|
1605
|
+
:param pulumi.Input[str] secret_id: ID of the Secret.
|
|
1606
|
+
:param pulumi.Input[str] service_account_token_path: The Service Account token path in the K8s pod where the token is mounted.
|
|
1607
|
+
:param pulumi.Input[str] sink_path: The location from which the authentication token should be read.
|
|
1608
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] tags: Tags to associate with the resource.
|
|
1609
|
+
:param pulumi.Input[bool] use_aws_iam: Boolean value to indicate if AWS IAM is used for authentication.
|
|
1610
|
+
:param pulumi.Input[bool] use_k8s_auth: Boolean value to indicate if K8s Auth is used for authentication.
|
|
1611
|
+
:param pulumi.Input[bool] use_vault_agent: Boolean value to indicate if Vault Agent is used for authentication.
|
|
1612
|
+
:param pulumi.Input[str] vault_aws_iam_role: The Vault role defined to bind to aws iam account/role being accessed.
|
|
1613
|
+
:param pulumi.Input[str] vault_k8s_auth_role: The role where K8s Auth will happen.
|
|
1614
|
+
:param pulumi.Input[str] vault_url: URL of the HashiCorp Vault.
|
|
1615
|
+
:param pulumi.Input[str] xvault_aws_iam_server_id: The AWS IAM Header Server ID that has been configured for this AWS IAM instance.
|
|
1616
|
+
"""
|
|
1617
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
1618
|
+
|
|
1619
|
+
__props__ = _VaultConnectorState.__new__(_VaultConnectorState)
|
|
1620
|
+
|
|
1621
|
+
__props__.__dict__["access_type"] = access_type
|
|
1622
|
+
__props__.__dict__["app_role_id"] = app_role_id
|
|
1623
|
+
__props__.__dict__["auth_token"] = auth_token
|
|
1624
|
+
__props__.__dict__["aws_region"] = aws_region
|
|
1625
|
+
__props__.__dict__["base_path"] = base_path
|
|
1626
|
+
__props__.__dict__["default"] = default
|
|
1627
|
+
__props__.__dict__["delegate_selectors"] = delegate_selectors
|
|
1628
|
+
__props__.__dict__["description"] = description
|
|
1629
|
+
__props__.__dict__["identifier"] = identifier
|
|
1630
|
+
__props__.__dict__["is_default"] = is_default
|
|
1631
|
+
__props__.__dict__["is_read_only"] = is_read_only
|
|
1632
|
+
__props__.__dict__["k8s_auth_endpoint"] = k8s_auth_endpoint
|
|
1633
|
+
__props__.__dict__["name"] = name
|
|
1634
|
+
__props__.__dict__["namespace"] = namespace
|
|
1635
|
+
__props__.__dict__["org_id"] = org_id
|
|
1636
|
+
__props__.__dict__["project_id"] = project_id
|
|
1637
|
+
__props__.__dict__["read_only"] = read_only
|
|
1638
|
+
__props__.__dict__["renew_app_role_token"] = renew_app_role_token
|
|
1639
|
+
__props__.__dict__["renewal_interval_minutes"] = renewal_interval_minutes
|
|
1640
|
+
__props__.__dict__["secret_engine_manually_configured"] = secret_engine_manually_configured
|
|
1641
|
+
__props__.__dict__["secret_engine_name"] = secret_engine_name
|
|
1642
|
+
__props__.__dict__["secret_engine_version"] = secret_engine_version
|
|
1643
|
+
__props__.__dict__["secret_id"] = secret_id
|
|
1644
|
+
__props__.__dict__["service_account_token_path"] = service_account_token_path
|
|
1645
|
+
__props__.__dict__["sink_path"] = sink_path
|
|
1646
|
+
__props__.__dict__["tags"] = tags
|
|
1647
|
+
__props__.__dict__["use_aws_iam"] = use_aws_iam
|
|
1648
|
+
__props__.__dict__["use_k8s_auth"] = use_k8s_auth
|
|
1649
|
+
__props__.__dict__["use_vault_agent"] = use_vault_agent
|
|
1650
|
+
__props__.__dict__["vault_aws_iam_role"] = vault_aws_iam_role
|
|
1651
|
+
__props__.__dict__["vault_k8s_auth_role"] = vault_k8s_auth_role
|
|
1652
|
+
__props__.__dict__["vault_url"] = vault_url
|
|
1653
|
+
__props__.__dict__["xvault_aws_iam_server_id"] = xvault_aws_iam_server_id
|
|
1654
|
+
return VaultConnector(resource_name, opts=opts, __props__=__props__)
|
|
1655
|
+
|
|
1656
|
+
@property
|
|
1657
|
+
@pulumi.getter(name="accessType")
|
|
1658
|
+
def access_type(self) -> pulumi.Output[Optional[str]]:
|
|
1659
|
+
"""
|
|
1660
|
+
Access type.
|
|
1661
|
+
"""
|
|
1662
|
+
return pulumi.get(self, "access_type")
|
|
1663
|
+
|
|
1664
|
+
@property
|
|
1665
|
+
@pulumi.getter(name="appRoleId")
|
|
1666
|
+
def app_role_id(self) -> pulumi.Output[Optional[str]]:
|
|
1667
|
+
"""
|
|
1668
|
+
ID of App Role.
|
|
1669
|
+
"""
|
|
1670
|
+
return pulumi.get(self, "app_role_id")
|
|
1671
|
+
|
|
1672
|
+
@property
|
|
1673
|
+
@pulumi.getter(name="authToken")
|
|
1674
|
+
def auth_token(self) -> pulumi.Output[str]:
|
|
1675
|
+
"""
|
|
1676
|
+
Authentication token for Vault.
|
|
1677
|
+
"""
|
|
1678
|
+
return pulumi.get(self, "auth_token")
|
|
1679
|
+
|
|
1680
|
+
@property
|
|
1681
|
+
@pulumi.getter(name="awsRegion")
|
|
1682
|
+
def aws_region(self) -> pulumi.Output[Optional[str]]:
|
|
1683
|
+
"""
|
|
1684
|
+
AWS region where the AWS IAM authentication will happen.
|
|
1685
|
+
"""
|
|
1686
|
+
return pulumi.get(self, "aws_region")
|
|
1687
|
+
|
|
1688
|
+
@property
|
|
1689
|
+
@pulumi.getter(name="basePath")
|
|
1690
|
+
def base_path(self) -> pulumi.Output[Optional[str]]:
|
|
1691
|
+
"""
|
|
1692
|
+
Location of the Vault directory where the secret will be stored.
|
|
1693
|
+
"""
|
|
1694
|
+
return pulumi.get(self, "base_path")
|
|
1695
|
+
|
|
1696
|
+
@property
|
|
1697
|
+
@pulumi.getter
|
|
1698
|
+
def default(self) -> pulumi.Output[Optional[bool]]:
|
|
1699
|
+
"""
|
|
1700
|
+
Is default or not.
|
|
1701
|
+
"""
|
|
1702
|
+
return pulumi.get(self, "default")
|
|
1703
|
+
|
|
1704
|
+
@property
|
|
1705
|
+
@pulumi.getter(name="delegateSelectors")
|
|
1706
|
+
def delegate_selectors(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
|
1707
|
+
"""
|
|
1708
|
+
List of Delegate Selectors that belong to the same Delegate and are used to connect to the Secret Manager.
|
|
1709
|
+
"""
|
|
1710
|
+
return pulumi.get(self, "delegate_selectors")
|
|
1711
|
+
|
|
1712
|
+
@property
|
|
1713
|
+
@pulumi.getter
|
|
1714
|
+
def description(self) -> pulumi.Output[Optional[str]]:
|
|
1715
|
+
"""
|
|
1716
|
+
Description of the resource.
|
|
1717
|
+
"""
|
|
1718
|
+
return pulumi.get(self, "description")
|
|
1719
|
+
|
|
1720
|
+
@property
|
|
1721
|
+
@pulumi.getter
|
|
1722
|
+
def identifier(self) -> pulumi.Output[str]:
|
|
1723
|
+
"""
|
|
1724
|
+
Unique identifier of the resource.
|
|
1725
|
+
"""
|
|
1726
|
+
return pulumi.get(self, "identifier")
|
|
1727
|
+
|
|
1728
|
+
@property
|
|
1729
|
+
@pulumi.getter(name="isDefault")
|
|
1730
|
+
def is_default(self) -> pulumi.Output[Optional[bool]]:
|
|
1731
|
+
"""
|
|
1732
|
+
Is default or not.
|
|
1733
|
+
"""
|
|
1734
|
+
return pulumi.get(self, "is_default")
|
|
1735
|
+
|
|
1736
|
+
@property
|
|
1737
|
+
@pulumi.getter(name="isReadOnly")
|
|
1738
|
+
def is_read_only(self) -> pulumi.Output[Optional[bool]]:
|
|
1739
|
+
"""
|
|
1740
|
+
Read only or not.
|
|
1741
|
+
"""
|
|
1742
|
+
return pulumi.get(self, "is_read_only")
|
|
1743
|
+
|
|
1744
|
+
@property
|
|
1745
|
+
@pulumi.getter(name="k8sAuthEndpoint")
|
|
1746
|
+
def k8s_auth_endpoint(self) -> pulumi.Output[Optional[str]]:
|
|
1747
|
+
"""
|
|
1748
|
+
The path where Kubernetes Auth is enabled in Vault.
|
|
1749
|
+
"""
|
|
1750
|
+
return pulumi.get(self, "k8s_auth_endpoint")
|
|
1751
|
+
|
|
1752
|
+
@property
|
|
1753
|
+
@pulumi.getter
|
|
1754
|
+
def name(self) -> pulumi.Output[str]:
|
|
1755
|
+
"""
|
|
1756
|
+
Name of the resource.
|
|
1757
|
+
"""
|
|
1758
|
+
return pulumi.get(self, "name")
|
|
1759
|
+
|
|
1760
|
+
@property
|
|
1761
|
+
@pulumi.getter
|
|
1762
|
+
def namespace(self) -> pulumi.Output[Optional[str]]:
|
|
1763
|
+
"""
|
|
1764
|
+
Vault namespace where the Secret will be created.
|
|
1765
|
+
"""
|
|
1766
|
+
return pulumi.get(self, "namespace")
|
|
1767
|
+
|
|
1768
|
+
@property
|
|
1769
|
+
@pulumi.getter(name="orgId")
|
|
1770
|
+
def org_id(self) -> pulumi.Output[Optional[str]]:
|
|
1771
|
+
"""
|
|
1772
|
+
Unique identifier of the organization.
|
|
1773
|
+
"""
|
|
1774
|
+
return pulumi.get(self, "org_id")
|
|
1775
|
+
|
|
1776
|
+
@property
|
|
1777
|
+
@pulumi.getter(name="projectId")
|
|
1778
|
+
def project_id(self) -> pulumi.Output[Optional[str]]:
|
|
1779
|
+
"""
|
|
1780
|
+
Unique identifier of the project.
|
|
1781
|
+
"""
|
|
1782
|
+
return pulumi.get(self, "project_id")
|
|
1783
|
+
|
|
1784
|
+
@property
|
|
1785
|
+
@pulumi.getter(name="readOnly")
|
|
1786
|
+
def read_only(self) -> pulumi.Output[Optional[bool]]:
|
|
1787
|
+
"""
|
|
1788
|
+
Read only.
|
|
1789
|
+
"""
|
|
1790
|
+
return pulumi.get(self, "read_only")
|
|
1791
|
+
|
|
1792
|
+
@property
|
|
1793
|
+
@pulumi.getter(name="renewAppRoleToken")
|
|
1794
|
+
def renew_app_role_token(self) -> pulumi.Output[bool]:
|
|
1795
|
+
"""
|
|
1796
|
+
Boolean value to indicate if AppRole token renewal is enabled or not.
|
|
1797
|
+
"""
|
|
1798
|
+
return pulumi.get(self, "renew_app_role_token")
|
|
1799
|
+
|
|
1800
|
+
@property
|
|
1801
|
+
@pulumi.getter(name="renewalIntervalMinutes")
|
|
1802
|
+
def renewal_interval_minutes(self) -> pulumi.Output[int]:
|
|
1803
|
+
"""
|
|
1804
|
+
The time interval for the token renewal.
|
|
1805
|
+
"""
|
|
1806
|
+
return pulumi.get(self, "renewal_interval_minutes")
|
|
1807
|
+
|
|
1808
|
+
@property
|
|
1809
|
+
@pulumi.getter(name="secretEngineManuallyConfigured")
|
|
1810
|
+
def secret_engine_manually_configured(self) -> pulumi.Output[Optional[bool]]:
|
|
1811
|
+
"""
|
|
1812
|
+
Manually entered Secret Engine.
|
|
1813
|
+
"""
|
|
1814
|
+
return pulumi.get(self, "secret_engine_manually_configured")
|
|
1815
|
+
|
|
1816
|
+
@property
|
|
1817
|
+
@pulumi.getter(name="secretEngineName")
|
|
1818
|
+
def secret_engine_name(self) -> pulumi.Output[Optional[str]]:
|
|
1819
|
+
"""
|
|
1820
|
+
Name of the Secret Engine.
|
|
1821
|
+
"""
|
|
1822
|
+
return pulumi.get(self, "secret_engine_name")
|
|
1823
|
+
|
|
1824
|
+
@property
|
|
1825
|
+
@pulumi.getter(name="secretEngineVersion")
|
|
1826
|
+
def secret_engine_version(self) -> pulumi.Output[Optional[int]]:
|
|
1827
|
+
"""
|
|
1828
|
+
Version of Secret Engine.
|
|
1829
|
+
"""
|
|
1830
|
+
return pulumi.get(self, "secret_engine_version")
|
|
1831
|
+
|
|
1832
|
+
@property
|
|
1833
|
+
@pulumi.getter(name="secretId")
|
|
1834
|
+
def secret_id(self) -> pulumi.Output[Optional[str]]:
|
|
1835
|
+
"""
|
|
1836
|
+
ID of the Secret.
|
|
1837
|
+
"""
|
|
1838
|
+
return pulumi.get(self, "secret_id")
|
|
1839
|
+
|
|
1840
|
+
@property
|
|
1841
|
+
@pulumi.getter(name="serviceAccountTokenPath")
|
|
1842
|
+
def service_account_token_path(self) -> pulumi.Output[Optional[str]]:
|
|
1843
|
+
"""
|
|
1844
|
+
The Service Account token path in the K8s pod where the token is mounted.
|
|
1845
|
+
"""
|
|
1846
|
+
return pulumi.get(self, "service_account_token_path")
|
|
1847
|
+
|
|
1848
|
+
@property
|
|
1849
|
+
@pulumi.getter(name="sinkPath")
|
|
1850
|
+
def sink_path(self) -> pulumi.Output[Optional[str]]:
|
|
1851
|
+
"""
|
|
1852
|
+
The location from which the authentication token should be read.
|
|
1853
|
+
"""
|
|
1854
|
+
return pulumi.get(self, "sink_path")
|
|
1855
|
+
|
|
1856
|
+
@property
|
|
1857
|
+
@pulumi.getter
|
|
1858
|
+
def tags(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
|
1859
|
+
"""
|
|
1860
|
+
Tags to associate with the resource.
|
|
1861
|
+
"""
|
|
1862
|
+
return pulumi.get(self, "tags")
|
|
1863
|
+
|
|
1864
|
+
@property
|
|
1865
|
+
@pulumi.getter(name="useAwsIam")
|
|
1866
|
+
def use_aws_iam(self) -> pulumi.Output[Optional[bool]]:
|
|
1867
|
+
"""
|
|
1868
|
+
Boolean value to indicate if AWS IAM is used for authentication.
|
|
1869
|
+
"""
|
|
1870
|
+
return pulumi.get(self, "use_aws_iam")
|
|
1871
|
+
|
|
1872
|
+
@property
|
|
1873
|
+
@pulumi.getter(name="useK8sAuth")
|
|
1874
|
+
def use_k8s_auth(self) -> pulumi.Output[Optional[bool]]:
|
|
1875
|
+
"""
|
|
1876
|
+
Boolean value to indicate if K8s Auth is used for authentication.
|
|
1877
|
+
"""
|
|
1878
|
+
return pulumi.get(self, "use_k8s_auth")
|
|
1879
|
+
|
|
1880
|
+
@property
|
|
1881
|
+
@pulumi.getter(name="useVaultAgent")
|
|
1882
|
+
def use_vault_agent(self) -> pulumi.Output[Optional[bool]]:
|
|
1883
|
+
"""
|
|
1884
|
+
Boolean value to indicate if Vault Agent is used for authentication.
|
|
1885
|
+
"""
|
|
1886
|
+
return pulumi.get(self, "use_vault_agent")
|
|
1887
|
+
|
|
1888
|
+
@property
|
|
1889
|
+
@pulumi.getter(name="vaultAwsIamRole")
|
|
1890
|
+
def vault_aws_iam_role(self) -> pulumi.Output[Optional[str]]:
|
|
1891
|
+
"""
|
|
1892
|
+
The Vault role defined to bind to aws iam account/role being accessed.
|
|
1893
|
+
"""
|
|
1894
|
+
return pulumi.get(self, "vault_aws_iam_role")
|
|
1895
|
+
|
|
1896
|
+
@property
|
|
1897
|
+
@pulumi.getter(name="vaultK8sAuthRole")
|
|
1898
|
+
def vault_k8s_auth_role(self) -> pulumi.Output[Optional[str]]:
|
|
1899
|
+
"""
|
|
1900
|
+
The role where K8s Auth will happen.
|
|
1901
|
+
"""
|
|
1902
|
+
return pulumi.get(self, "vault_k8s_auth_role")
|
|
1903
|
+
|
|
1904
|
+
@property
|
|
1905
|
+
@pulumi.getter(name="vaultUrl")
|
|
1906
|
+
def vault_url(self) -> pulumi.Output[str]:
|
|
1907
|
+
"""
|
|
1908
|
+
URL of the HashiCorp Vault.
|
|
1909
|
+
"""
|
|
1910
|
+
return pulumi.get(self, "vault_url")
|
|
1911
|
+
|
|
1912
|
+
@property
|
|
1913
|
+
@pulumi.getter(name="xvaultAwsIamServerId")
|
|
1914
|
+
def xvault_aws_iam_server_id(self) -> pulumi.Output[Optional[str]]:
|
|
1915
|
+
"""
|
|
1916
|
+
The AWS IAM Header Server ID that has been configured for this AWS IAM instance.
|
|
1917
|
+
"""
|
|
1918
|
+
return pulumi.get(self, "xvault_aws_iam_server_id")
|
|
1919
|
+
|