pulumi-vault 5.19.0a1705474292__py3-none-any.whl → 5.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +59 -0
- pulumi_vault/_inputs.py +380 -0
- pulumi_vault/_utilities.py +2 -2
- pulumi_vault/aws/secret_backend.py +188 -0
- pulumi_vault/aws/secret_backend_static_role.py +2 -2
- pulumi_vault/azure/backend.py +7 -21
- pulumi_vault/azure/backend_role.py +111 -0
- pulumi_vault/config/__init__.pyi +0 -3
- pulumi_vault/config/outputs.py +380 -0
- pulumi_vault/config/vars.py +0 -3
- pulumi_vault/consul/secret_backend.py +7 -35
- pulumi_vault/database/_inputs.py +536 -0
- pulumi_vault/database/outputs.py +483 -3
- pulumi_vault/gcp/_inputs.py +162 -4
- pulumi_vault/gcp/auth_backend.py +64 -3
- pulumi_vault/gcp/outputs.py +161 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -12
- pulumi_vault/identity/group_alias.py +6 -6
- pulumi_vault/kubernetes/auth_backend_config.py +7 -7
- pulumi_vault/kubernetes/secret_backend_role.py +8 -4
- pulumi_vault/kv/_inputs.py +12 -0
- pulumi_vault/kv/outputs.py +12 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +2 -2
- pulumi_vault/ldap/secret_backend_static_role.py +2 -2
- pulumi_vault/managed/_inputs.py +12 -0
- pulumi_vault/managed/keys.py +20 -0
- pulumi_vault/managed/outputs.py +12 -0
- pulumi_vault/mongodbatlas/secret_role.py +2 -2
- pulumi_vault/namespace.py +46 -14
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -6
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -10
- pulumi_vault/pkisecret/secret_backend_role.py +54 -7
- pulumi_vault/rabbitmq/_inputs.py +36 -0
- pulumi_vault/rabbitmq/outputs.py +36 -0
- pulumi_vault/saml/auth_backend_role.py +7 -14
- pulumi_vault/secrets/__init__.py +14 -0
- pulumi_vault/secrets/sync_association.py +464 -0
- pulumi_vault/secrets/sync_aws_destination.py +564 -0
- pulumi_vault/secrets/sync_azure_destination.py +674 -0
- pulumi_vault/secrets/sync_config.py +297 -0
- pulumi_vault/secrets/sync_gcp_destination.py +438 -0
- pulumi_vault/secrets/sync_gh_destination.py +511 -0
- pulumi_vault/secrets/sync_vercel_destination.py +541 -0
- pulumi_vault/ssh/secret_backend_role.py +7 -14
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/METADATA +2 -2
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/RECORD +48 -40
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-5.19.0a1705474292.dist-info → pulumi_vault-5.20.0.dist-info}/top_level.txt +0 -0
pulumi_vault/gcp/_inputs.py
CHANGED
@@ -11,6 +11,7 @@ from .. import _utilities
|
|
11
11
|
|
12
12
|
__all__ = [
|
13
13
|
'AuthBackendCustomEndpointArgs',
|
14
|
+
'AuthBackendTuneArgs',
|
14
15
|
'SecretRolesetBindingArgs',
|
15
16
|
'SecretStaticAccountBindingArgs',
|
16
17
|
]
|
@@ -28,8 +29,6 @@ class AuthBackendCustomEndpointArgs:
|
|
28
29
|
|
29
30
|
The endpoint value provided for a given key has the form of `scheme://host:port`.
|
30
31
|
The `scheme://` and `:port` portions of the endpoint value are optional.
|
31
|
-
|
32
|
-
For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
|
33
32
|
:param pulumi.Input[str] crm: Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
|
34
33
|
:param pulumi.Input[str] iam: Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
|
35
34
|
"""
|
@@ -62,8 +61,6 @@ class AuthBackendCustomEndpointArgs:
|
|
62
61
|
|
63
62
|
The endpoint value provided for a given key has the form of `scheme://host:port`.
|
64
63
|
The `scheme://` and `:port` portions of the endpoint value are optional.
|
65
|
-
|
66
|
-
For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
|
67
64
|
"""
|
68
65
|
return pulumi.get(self, "compute")
|
69
66
|
|
@@ -96,6 +93,167 @@ class AuthBackendCustomEndpointArgs:
|
|
96
93
|
pulumi.set(self, "iam", value)
|
97
94
|
|
98
95
|
|
96
|
+
@pulumi.input_type
|
97
|
+
class AuthBackendTuneArgs:
|
98
|
+
def __init__(__self__, *,
|
99
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
100
|
+
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
101
|
+
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
102
|
+
default_lease_ttl: Optional[pulumi.Input[str]] = None,
|
103
|
+
listing_visibility: Optional[pulumi.Input[str]] = None,
|
104
|
+
max_lease_ttl: Optional[pulumi.Input[str]] = None,
|
105
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
106
|
+
token_type: Optional[pulumi.Input[str]] = None):
|
107
|
+
"""
|
108
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to whitelist and allowing
|
109
|
+
a plugin to include them in the response.
|
110
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
|
111
|
+
not be HMAC'd by audit devices in the request data object.
|
112
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
|
113
|
+
not be HMAC'd by audit devices in the response data object.
|
114
|
+
:param pulumi.Input[str] default_lease_ttl: Specifies the default time-to-live.
|
115
|
+
If set, this overrides the global default.
|
116
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
117
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in
|
118
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
119
|
+
:param pulumi.Input[str] max_lease_ttl: Specifies the maximum time-to-live.
|
120
|
+
If set, this overrides the global default.
|
121
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
122
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to whitelist and
|
123
|
+
pass from the request to the backend.
|
124
|
+
:param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
|
125
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
126
|
+
|
127
|
+
|
128
|
+
For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
|
129
|
+
"""
|
130
|
+
if allowed_response_headers is not None:
|
131
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
132
|
+
if audit_non_hmac_request_keys is not None:
|
133
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
134
|
+
if audit_non_hmac_response_keys is not None:
|
135
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
136
|
+
if default_lease_ttl is not None:
|
137
|
+
pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
|
138
|
+
if listing_visibility is not None:
|
139
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
140
|
+
if max_lease_ttl is not None:
|
141
|
+
pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
|
142
|
+
if passthrough_request_headers is not None:
|
143
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
144
|
+
if token_type is not None:
|
145
|
+
pulumi.set(__self__, "token_type", token_type)
|
146
|
+
|
147
|
+
@property
|
148
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
149
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
150
|
+
"""
|
151
|
+
List of headers to whitelist and allowing
|
152
|
+
a plugin to include them in the response.
|
153
|
+
"""
|
154
|
+
return pulumi.get(self, "allowed_response_headers")
|
155
|
+
|
156
|
+
@allowed_response_headers.setter
|
157
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
158
|
+
pulumi.set(self, "allowed_response_headers", value)
|
159
|
+
|
160
|
+
@property
|
161
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
162
|
+
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
163
|
+
"""
|
164
|
+
Specifies the list of keys that will
|
165
|
+
not be HMAC'd by audit devices in the request data object.
|
166
|
+
"""
|
167
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
168
|
+
|
169
|
+
@audit_non_hmac_request_keys.setter
|
170
|
+
def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
171
|
+
pulumi.set(self, "audit_non_hmac_request_keys", value)
|
172
|
+
|
173
|
+
@property
|
174
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
175
|
+
def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
176
|
+
"""
|
177
|
+
Specifies the list of keys that will
|
178
|
+
not be HMAC'd by audit devices in the response data object.
|
179
|
+
"""
|
180
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
181
|
+
|
182
|
+
@audit_non_hmac_response_keys.setter
|
183
|
+
def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
184
|
+
pulumi.set(self, "audit_non_hmac_response_keys", value)
|
185
|
+
|
186
|
+
@property
|
187
|
+
@pulumi.getter(name="defaultLeaseTtl")
|
188
|
+
def default_lease_ttl(self) -> Optional[pulumi.Input[str]]:
|
189
|
+
"""
|
190
|
+
Specifies the default time-to-live.
|
191
|
+
If set, this overrides the global default.
|
192
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
193
|
+
"""
|
194
|
+
return pulumi.get(self, "default_lease_ttl")
|
195
|
+
|
196
|
+
@default_lease_ttl.setter
|
197
|
+
def default_lease_ttl(self, value: Optional[pulumi.Input[str]]):
|
198
|
+
pulumi.set(self, "default_lease_ttl", value)
|
199
|
+
|
200
|
+
@property
|
201
|
+
@pulumi.getter(name="listingVisibility")
|
202
|
+
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
203
|
+
"""
|
204
|
+
Specifies whether to show this mount in
|
205
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
206
|
+
"""
|
207
|
+
return pulumi.get(self, "listing_visibility")
|
208
|
+
|
209
|
+
@listing_visibility.setter
|
210
|
+
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
211
|
+
pulumi.set(self, "listing_visibility", value)
|
212
|
+
|
213
|
+
@property
|
214
|
+
@pulumi.getter(name="maxLeaseTtl")
|
215
|
+
def max_lease_ttl(self) -> Optional[pulumi.Input[str]]:
|
216
|
+
"""
|
217
|
+
Specifies the maximum time-to-live.
|
218
|
+
If set, this overrides the global default.
|
219
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
220
|
+
"""
|
221
|
+
return pulumi.get(self, "max_lease_ttl")
|
222
|
+
|
223
|
+
@max_lease_ttl.setter
|
224
|
+
def max_lease_ttl(self, value: Optional[pulumi.Input[str]]):
|
225
|
+
pulumi.set(self, "max_lease_ttl", value)
|
226
|
+
|
227
|
+
@property
|
228
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
229
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
230
|
+
"""
|
231
|
+
List of headers to whitelist and
|
232
|
+
pass from the request to the backend.
|
233
|
+
"""
|
234
|
+
return pulumi.get(self, "passthrough_request_headers")
|
235
|
+
|
236
|
+
@passthrough_request_headers.setter
|
237
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
238
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
239
|
+
|
240
|
+
@property
|
241
|
+
@pulumi.getter(name="tokenType")
|
242
|
+
def token_type(self) -> Optional[pulumi.Input[str]]:
|
243
|
+
"""
|
244
|
+
Specifies the type of tokens that should be returned by
|
245
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
246
|
+
|
247
|
+
|
248
|
+
For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
|
249
|
+
"""
|
250
|
+
return pulumi.get(self, "token_type")
|
251
|
+
|
252
|
+
@token_type.setter
|
253
|
+
def token_type(self, value: Optional[pulumi.Input[str]]):
|
254
|
+
pulumi.set(self, "token_type", value)
|
255
|
+
|
256
|
+
|
99
257
|
@pulumi.input_type
|
100
258
|
class SecretRolesetBindingArgs:
|
101
259
|
def __init__(__self__, *,
|
pulumi_vault/gcp/auth_backend.py
CHANGED
@@ -26,7 +26,8 @@ class AuthBackendArgs:
|
|
26
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
27
27
|
path: Optional[pulumi.Input[str]] = None,
|
28
28
|
private_key_id: Optional[pulumi.Input[str]] = None,
|
29
|
-
project_id: Optional[pulumi.Input[str]] = None
|
29
|
+
project_id: Optional[pulumi.Input[str]] = None,
|
30
|
+
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
|
30
31
|
"""
|
31
32
|
The set of arguments for constructing a AuthBackend resource.
|
32
33
|
:param pulumi.Input[str] client_email: The clients email associated with the credentials
|
@@ -50,6 +51,9 @@ class AuthBackendArgs:
|
|
50
51
|
:param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
|
51
52
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
52
53
|
:param pulumi.Input[str] project_id: The GCP Project ID
|
54
|
+
:param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
55
|
+
|
56
|
+
The `tune` block is used to tune the auth backend:
|
53
57
|
"""
|
54
58
|
if client_email is not None:
|
55
59
|
pulumi.set(__self__, "client_email", client_email)
|
@@ -73,6 +77,8 @@ class AuthBackendArgs:
|
|
73
77
|
pulumi.set(__self__, "private_key_id", private_key_id)
|
74
78
|
if project_id is not None:
|
75
79
|
pulumi.set(__self__, "project_id", project_id)
|
80
|
+
if tune is not None:
|
81
|
+
pulumi.set(__self__, "tune", tune)
|
76
82
|
|
77
83
|
@property
|
78
84
|
@pulumi.getter(name="clientEmail")
|
@@ -216,6 +222,20 @@ class AuthBackendArgs:
|
|
216
222
|
def project_id(self, value: Optional[pulumi.Input[str]]):
|
217
223
|
pulumi.set(self, "project_id", value)
|
218
224
|
|
225
|
+
@property
|
226
|
+
@pulumi.getter
|
227
|
+
def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
|
228
|
+
"""
|
229
|
+
Extra configuration block. Structure is documented below.
|
230
|
+
|
231
|
+
The `tune` block is used to tune the auth backend:
|
232
|
+
"""
|
233
|
+
return pulumi.get(self, "tune")
|
234
|
+
|
235
|
+
@tune.setter
|
236
|
+
def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
|
237
|
+
pulumi.set(self, "tune", value)
|
238
|
+
|
219
239
|
|
220
240
|
@pulumi.input_type
|
221
241
|
class _AuthBackendState:
|
@@ -231,7 +251,8 @@ class _AuthBackendState:
|
|
231
251
|
namespace: Optional[pulumi.Input[str]] = None,
|
232
252
|
path: Optional[pulumi.Input[str]] = None,
|
233
253
|
private_key_id: Optional[pulumi.Input[str]] = None,
|
234
|
-
project_id: Optional[pulumi.Input[str]] = None
|
254
|
+
project_id: Optional[pulumi.Input[str]] = None,
|
255
|
+
tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
|
235
256
|
"""
|
236
257
|
Input properties used for looking up and filtering AuthBackend resources.
|
237
258
|
:param pulumi.Input[str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
|
@@ -256,6 +277,9 @@ class _AuthBackendState:
|
|
256
277
|
:param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
|
257
278
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
258
279
|
:param pulumi.Input[str] project_id: The GCP Project ID
|
280
|
+
:param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
|
281
|
+
|
282
|
+
The `tune` block is used to tune the auth backend:
|
259
283
|
"""
|
260
284
|
if accessor is not None:
|
261
285
|
pulumi.set(__self__, "accessor", accessor)
|
@@ -281,6 +305,8 @@ class _AuthBackendState:
|
|
281
305
|
pulumi.set(__self__, "private_key_id", private_key_id)
|
282
306
|
if project_id is not None:
|
283
307
|
pulumi.set(__self__, "project_id", project_id)
|
308
|
+
if tune is not None:
|
309
|
+
pulumi.set(__self__, "tune", tune)
|
284
310
|
|
285
311
|
@property
|
286
312
|
@pulumi.getter
|
@@ -436,6 +462,20 @@ class _AuthBackendState:
|
|
436
462
|
def project_id(self, value: Optional[pulumi.Input[str]]):
|
437
463
|
pulumi.set(self, "project_id", value)
|
438
464
|
|
465
|
+
@property
|
466
|
+
@pulumi.getter
|
467
|
+
def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
|
468
|
+
"""
|
469
|
+
Extra configuration block. Structure is documented below.
|
470
|
+
|
471
|
+
The `tune` block is used to tune the auth backend:
|
472
|
+
"""
|
473
|
+
return pulumi.get(self, "tune")
|
474
|
+
|
475
|
+
@tune.setter
|
476
|
+
def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
|
477
|
+
pulumi.set(self, "tune", value)
|
478
|
+
|
439
479
|
|
440
480
|
class AuthBackend(pulumi.CustomResource):
|
441
481
|
@overload
|
@@ -453,6 +493,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
453
493
|
path: Optional[pulumi.Input[str]] = None,
|
454
494
|
private_key_id: Optional[pulumi.Input[str]] = None,
|
455
495
|
project_id: Optional[pulumi.Input[str]] = None,
|
496
|
+
tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
|
456
497
|
__props__=None):
|
457
498
|
"""
|
458
499
|
Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
|
@@ -504,6 +545,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
504
545
|
:param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
|
505
546
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
506
547
|
:param pulumi.Input[str] project_id: The GCP Project ID
|
548
|
+
:param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
|
549
|
+
|
550
|
+
The `tune` block is used to tune the auth backend:
|
507
551
|
"""
|
508
552
|
...
|
509
553
|
@overload
|
@@ -564,6 +608,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
564
608
|
path: Optional[pulumi.Input[str]] = None,
|
565
609
|
private_key_id: Optional[pulumi.Input[str]] = None,
|
566
610
|
project_id: Optional[pulumi.Input[str]] = None,
|
611
|
+
tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
|
567
612
|
__props__=None):
|
568
613
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
569
614
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -584,6 +629,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
584
629
|
__props__.__dict__["path"] = path
|
585
630
|
__props__.__dict__["private_key_id"] = private_key_id
|
586
631
|
__props__.__dict__["project_id"] = project_id
|
632
|
+
__props__.__dict__["tune"] = tune
|
587
633
|
__props__.__dict__["accessor"] = None
|
588
634
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["credentials"])
|
589
635
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
@@ -608,7 +654,8 @@ class AuthBackend(pulumi.CustomResource):
|
|
608
654
|
namespace: Optional[pulumi.Input[str]] = None,
|
609
655
|
path: Optional[pulumi.Input[str]] = None,
|
610
656
|
private_key_id: Optional[pulumi.Input[str]] = None,
|
611
|
-
project_id: Optional[pulumi.Input[str]] = None
|
657
|
+
project_id: Optional[pulumi.Input[str]] = None,
|
658
|
+
tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None) -> 'AuthBackend':
|
612
659
|
"""
|
613
660
|
Get an existing AuthBackend resource's state with the given name, id, and optional extra
|
614
661
|
properties used to qualify the lookup.
|
@@ -638,6 +685,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
638
685
|
:param pulumi.Input[str] path: The path to mount the auth method — this defaults to 'gcp'.
|
639
686
|
:param pulumi.Input[str] private_key_id: The ID of the private key from the credentials
|
640
687
|
:param pulumi.Input[str] project_id: The GCP Project ID
|
688
|
+
:param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
|
689
|
+
|
690
|
+
The `tune` block is used to tune the auth backend:
|
641
691
|
"""
|
642
692
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
643
693
|
|
@@ -655,6 +705,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
655
705
|
__props__.__dict__["path"] = path
|
656
706
|
__props__.__dict__["private_key_id"] = private_key_id
|
657
707
|
__props__.__dict__["project_id"] = project_id
|
708
|
+
__props__.__dict__["tune"] = tune
|
658
709
|
return AuthBackend(resource_name, opts=opts, __props__=__props__)
|
659
710
|
|
660
711
|
@property
|
@@ -763,3 +814,13 @@ class AuthBackend(pulumi.CustomResource):
|
|
763
814
|
"""
|
764
815
|
return pulumi.get(self, "project_id")
|
765
816
|
|
817
|
+
@property
|
818
|
+
@pulumi.getter
|
819
|
+
def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
|
820
|
+
"""
|
821
|
+
Extra configuration block. Structure is documented below.
|
822
|
+
|
823
|
+
The `tune` block is used to tune the auth backend:
|
824
|
+
"""
|
825
|
+
return pulumi.get(self, "tune")
|
826
|
+
|
pulumi_vault/gcp/outputs.py
CHANGED
@@ -11,6 +11,7 @@ from .. import _utilities
|
|
11
11
|
|
12
12
|
__all__ = [
|
13
13
|
'AuthBackendCustomEndpoint',
|
14
|
+
'AuthBackendTune',
|
14
15
|
'SecretRolesetBinding',
|
15
16
|
'SecretStaticAccountBinding',
|
16
17
|
]
|
@@ -28,8 +29,6 @@ class AuthBackendCustomEndpoint(dict):
|
|
28
29
|
|
29
30
|
The endpoint value provided for a given key has the form of `scheme://host:port`.
|
30
31
|
The `scheme://` and `:port` portions of the endpoint value are optional.
|
31
|
-
|
32
|
-
For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
|
33
32
|
:param str crm: Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
|
34
33
|
:param str iam: Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
|
35
34
|
"""
|
@@ -58,8 +57,6 @@ class AuthBackendCustomEndpoint(dict):
|
|
58
57
|
|
59
58
|
The endpoint value provided for a given key has the form of `scheme://host:port`.
|
60
59
|
The `scheme://` and `:port` portions of the endpoint value are optional.
|
61
|
-
|
62
|
-
For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
|
63
60
|
"""
|
64
61
|
return pulumi.get(self, "compute")
|
65
62
|
|
@@ -80,6 +77,166 @@ class AuthBackendCustomEndpoint(dict):
|
|
80
77
|
return pulumi.get(self, "iam")
|
81
78
|
|
82
79
|
|
80
|
+
@pulumi.output_type
|
81
|
+
class AuthBackendTune(dict):
|
82
|
+
@staticmethod
|
83
|
+
def __key_warning(key: str):
|
84
|
+
suggest = None
|
85
|
+
if key == "allowedResponseHeaders":
|
86
|
+
suggest = "allowed_response_headers"
|
87
|
+
elif key == "auditNonHmacRequestKeys":
|
88
|
+
suggest = "audit_non_hmac_request_keys"
|
89
|
+
elif key == "auditNonHmacResponseKeys":
|
90
|
+
suggest = "audit_non_hmac_response_keys"
|
91
|
+
elif key == "defaultLeaseTtl":
|
92
|
+
suggest = "default_lease_ttl"
|
93
|
+
elif key == "listingVisibility":
|
94
|
+
suggest = "listing_visibility"
|
95
|
+
elif key == "maxLeaseTtl":
|
96
|
+
suggest = "max_lease_ttl"
|
97
|
+
elif key == "passthroughRequestHeaders":
|
98
|
+
suggest = "passthrough_request_headers"
|
99
|
+
elif key == "tokenType":
|
100
|
+
suggest = "token_type"
|
101
|
+
|
102
|
+
if suggest:
|
103
|
+
pulumi.log.warn(f"Key '{key}' not found in AuthBackendTune. Access the value via the '{suggest}' property getter instead.")
|
104
|
+
|
105
|
+
def __getitem__(self, key: str) -> Any:
|
106
|
+
AuthBackendTune.__key_warning(key)
|
107
|
+
return super().__getitem__(key)
|
108
|
+
|
109
|
+
def get(self, key: str, default = None) -> Any:
|
110
|
+
AuthBackendTune.__key_warning(key)
|
111
|
+
return super().get(key, default)
|
112
|
+
|
113
|
+
def __init__(__self__, *,
|
114
|
+
allowed_response_headers: Optional[Sequence[str]] = None,
|
115
|
+
audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
|
116
|
+
audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
|
117
|
+
default_lease_ttl: Optional[str] = None,
|
118
|
+
listing_visibility: Optional[str] = None,
|
119
|
+
max_lease_ttl: Optional[str] = None,
|
120
|
+
passthrough_request_headers: Optional[Sequence[str]] = None,
|
121
|
+
token_type: Optional[str] = None):
|
122
|
+
"""
|
123
|
+
:param Sequence[str] allowed_response_headers: List of headers to whitelist and allowing
|
124
|
+
a plugin to include them in the response.
|
125
|
+
:param Sequence[str] audit_non_hmac_request_keys: Specifies the list of keys that will
|
126
|
+
not be HMAC'd by audit devices in the request data object.
|
127
|
+
:param Sequence[str] audit_non_hmac_response_keys: Specifies the list of keys that will
|
128
|
+
not be HMAC'd by audit devices in the response data object.
|
129
|
+
:param str default_lease_ttl: Specifies the default time-to-live.
|
130
|
+
If set, this overrides the global default.
|
131
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
132
|
+
:param str listing_visibility: Specifies whether to show this mount in
|
133
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
134
|
+
:param str max_lease_ttl: Specifies the maximum time-to-live.
|
135
|
+
If set, this overrides the global default.
|
136
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
137
|
+
:param Sequence[str] passthrough_request_headers: List of headers to whitelist and
|
138
|
+
pass from the request to the backend.
|
139
|
+
:param str token_type: Specifies the type of tokens that should be returned by
|
140
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
141
|
+
|
142
|
+
|
143
|
+
For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
|
144
|
+
"""
|
145
|
+
if allowed_response_headers is not None:
|
146
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
147
|
+
if audit_non_hmac_request_keys is not None:
|
148
|
+
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
149
|
+
if audit_non_hmac_response_keys is not None:
|
150
|
+
pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
|
151
|
+
if default_lease_ttl is not None:
|
152
|
+
pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
|
153
|
+
if listing_visibility is not None:
|
154
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
155
|
+
if max_lease_ttl is not None:
|
156
|
+
pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
|
157
|
+
if passthrough_request_headers is not None:
|
158
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
159
|
+
if token_type is not None:
|
160
|
+
pulumi.set(__self__, "token_type", token_type)
|
161
|
+
|
162
|
+
@property
|
163
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
164
|
+
def allowed_response_headers(self) -> Optional[Sequence[str]]:
|
165
|
+
"""
|
166
|
+
List of headers to whitelist and allowing
|
167
|
+
a plugin to include them in the response.
|
168
|
+
"""
|
169
|
+
return pulumi.get(self, "allowed_response_headers")
|
170
|
+
|
171
|
+
@property
|
172
|
+
@pulumi.getter(name="auditNonHmacRequestKeys")
|
173
|
+
def audit_non_hmac_request_keys(self) -> Optional[Sequence[str]]:
|
174
|
+
"""
|
175
|
+
Specifies the list of keys that will
|
176
|
+
not be HMAC'd by audit devices in the request data object.
|
177
|
+
"""
|
178
|
+
return pulumi.get(self, "audit_non_hmac_request_keys")
|
179
|
+
|
180
|
+
@property
|
181
|
+
@pulumi.getter(name="auditNonHmacResponseKeys")
|
182
|
+
def audit_non_hmac_response_keys(self) -> Optional[Sequence[str]]:
|
183
|
+
"""
|
184
|
+
Specifies the list of keys that will
|
185
|
+
not be HMAC'd by audit devices in the response data object.
|
186
|
+
"""
|
187
|
+
return pulumi.get(self, "audit_non_hmac_response_keys")
|
188
|
+
|
189
|
+
@property
|
190
|
+
@pulumi.getter(name="defaultLeaseTtl")
|
191
|
+
def default_lease_ttl(self) -> Optional[str]:
|
192
|
+
"""
|
193
|
+
Specifies the default time-to-live.
|
194
|
+
If set, this overrides the global default.
|
195
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
196
|
+
"""
|
197
|
+
return pulumi.get(self, "default_lease_ttl")
|
198
|
+
|
199
|
+
@property
|
200
|
+
@pulumi.getter(name="listingVisibility")
|
201
|
+
def listing_visibility(self) -> Optional[str]:
|
202
|
+
"""
|
203
|
+
Specifies whether to show this mount in
|
204
|
+
the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
|
205
|
+
"""
|
206
|
+
return pulumi.get(self, "listing_visibility")
|
207
|
+
|
208
|
+
@property
|
209
|
+
@pulumi.getter(name="maxLeaseTtl")
|
210
|
+
def max_lease_ttl(self) -> Optional[str]:
|
211
|
+
"""
|
212
|
+
Specifies the maximum time-to-live.
|
213
|
+
If set, this overrides the global default.
|
214
|
+
Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
|
215
|
+
"""
|
216
|
+
return pulumi.get(self, "max_lease_ttl")
|
217
|
+
|
218
|
+
@property
|
219
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
220
|
+
def passthrough_request_headers(self) -> Optional[Sequence[str]]:
|
221
|
+
"""
|
222
|
+
List of headers to whitelist and
|
223
|
+
pass from the request to the backend.
|
224
|
+
"""
|
225
|
+
return pulumi.get(self, "passthrough_request_headers")
|
226
|
+
|
227
|
+
@property
|
228
|
+
@pulumi.getter(name="tokenType")
|
229
|
+
def token_type(self) -> Optional[str]:
|
230
|
+
"""
|
231
|
+
Specifies the type of tokens that should be returned by
|
232
|
+
the mount. Valid values are "default-service", "default-batch", "service", "batch".
|
233
|
+
|
234
|
+
|
235
|
+
For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
|
236
|
+
"""
|
237
|
+
return pulumi.get(self, "token_type")
|
238
|
+
|
239
|
+
|
83
240
|
@pulumi.output_type
|
84
241
|
class SecretRolesetBinding(dict):
|
85
242
|
def __init__(__self__, *,
|
@@ -188,12 +188,6 @@ class AwaitableGetRaftAutopilotStateResult(GetRaftAutopilotStateResult):
|
|
188
188
|
def get_raft_autopilot_state(namespace: Optional[str] = None,
|
189
189
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetRaftAutopilotStateResult:
|
190
190
|
"""
|
191
|
-
Displays the state of the raft cluster under integrated storage as seen by
|
192
|
-
autopilot. It shows whether autopilot thinks the cluster is healthy or not, and
|
193
|
-
how many nodes could fail before the cluster becomes unhealthy ("Failure
|
194
|
-
Tolerance"). For more information, please refer to the
|
195
|
-
[Vault documentation](https://developer.hashicorp.com/vault/api-docs/system/storage/raftautopilot#get-cluster-state).
|
196
|
-
|
197
191
|
## Example Usage
|
198
192
|
|
199
193
|
```python
|
@@ -235,12 +229,6 @@ def get_raft_autopilot_state(namespace: Optional[str] = None,
|
|
235
229
|
def get_raft_autopilot_state_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
236
230
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetRaftAutopilotStateResult]:
|
237
231
|
"""
|
238
|
-
Displays the state of the raft cluster under integrated storage as seen by
|
239
|
-
autopilot. It shows whether autopilot thinks the cluster is healthy or not, and
|
240
|
-
how many nodes could fail before the cluster becomes unhealthy ("Failure
|
241
|
-
Tolerance"). For more information, please refer to the
|
242
|
-
[Vault documentation](https://developer.hashicorp.com/vault/api-docs/system/storage/raftautopilot#get-cluster-state).
|
243
|
-
|
244
232
|
## Example Usage
|
245
233
|
|
246
234
|
```python
|
@@ -199,16 +199,16 @@ class GroupAlias(pulumi.CustomResource):
|
|
199
199
|
|
200
200
|
## Import
|
201
201
|
|
202
|
-
The group alias can be imported with the group alias `id`, for example
|
202
|
+
The group alias can be imported with the group alias `id`, for example:
|
203
203
|
|
204
204
|
```sh
|
205
|
-
|
205
|
+
$ pulumi import vault:identity/groupAlias:GroupAlias group-alias id
|
206
206
|
```
|
207
207
|
|
208
208
|
Group aliases can also be imported using the UUID of the alias record, e.g.
|
209
209
|
|
210
210
|
```sh
|
211
|
-
|
211
|
+
$ pulumi import vault:identity/groupAlias:GroupAlias alias_name 63104e20-88e4-11eb-8d04-cf7ac9d60157
|
212
212
|
```
|
213
213
|
|
214
214
|
:param str resource_name: The name of the resource.
|
@@ -252,16 +252,16 @@ class GroupAlias(pulumi.CustomResource):
|
|
252
252
|
|
253
253
|
## Import
|
254
254
|
|
255
|
-
The group alias can be imported with the group alias `id`, for example
|
255
|
+
The group alias can be imported with the group alias `id`, for example:
|
256
256
|
|
257
257
|
```sh
|
258
|
-
|
258
|
+
$ pulumi import vault:identity/groupAlias:GroupAlias group-alias id
|
259
259
|
```
|
260
260
|
|
261
261
|
Group aliases can also be imported using the UUID of the alias record, e.g.
|
262
262
|
|
263
263
|
```sh
|
264
|
-
|
264
|
+
$ pulumi import vault:identity/groupAlias:GroupAlias alias_name 63104e20-88e4-11eb-8d04-cf7ac9d60157
|
265
265
|
```
|
266
266
|
|
267
267
|
:param str resource_name: The name of the resource.
|