pulumi-vault 6.1.0__py3-none-any.whl → 6.1.0a1711522308__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -2
- pulumi_vault/kubernetes/secret_backend_role.py +25 -99
- pulumi_vault/mongodbatlas/secret_backend.py +6 -6
- pulumi_vault/mongodbatlas/secret_role.py +27 -27
- pulumi_vault/secrets/__init__.py +0 -2
- pulumi_vault/secrets/sync_association.py +58 -32
- pulumi_vault/secrets/sync_aws_destination.py +0 -54
- pulumi_vault/secrets/sync_azure_destination.py +0 -54
- pulumi_vault/secrets/sync_gcp_destination.py +0 -54
- pulumi_vault/secrets/sync_gh_destination.py +0 -54
- pulumi_vault/secrets/sync_vercel_destination.py +0 -54
- {pulumi_vault-6.1.0.dist-info → pulumi_vault-6.1.0a1711522308.dist-info}/METADATA +1 -1
- {pulumi_vault-6.1.0.dist-info → pulumi_vault-6.1.0a1711522308.dist-info}/RECORD +15 -19
- pulumi_vault/get_namespace.py +0 -225
- pulumi_vault/get_namespaces.py +0 -152
- pulumi_vault/secrets/_inputs.py +0 -80
- pulumi_vault/secrets/outputs.py +0 -89
- {pulumi_vault-6.1.0.dist-info → pulumi_vault-6.1.0a1711522308.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0.dist-info → pulumi_vault-6.1.0a1711522308.dist-info}/top_level.txt +0 -0
pulumi_vault/__init__.py
CHANGED
@@ -12,8 +12,6 @@ from .cert_auth_backend_role import *
|
|
12
12
|
from .egp_policy import *
|
13
13
|
from .get_auth_backend import *
|
14
14
|
from .get_auth_backends import *
|
15
|
-
from .get_namespace import *
|
16
|
-
from .get_namespaces import *
|
17
15
|
from .get_nomad_access_token import *
|
18
16
|
from .get_policy_document import *
|
19
17
|
from .get_raft_autopilot_state import *
|
@@ -14,9 +14,8 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
|
14
14
|
@pulumi.input_type
|
15
15
|
class SecretBackendRoleArgs:
|
16
16
|
def __init__(__self__, *,
|
17
|
+
allowed_kubernetes_namespaces: pulumi.Input[Sequence[pulumi.Input[str]]],
|
17
18
|
backend: pulumi.Input[str],
|
18
|
-
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[str]] = None,
|
19
|
-
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
20
19
|
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
21
20
|
extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
22
21
|
generated_role_rules: Optional[pulumi.Input[str]] = None,
|
@@ -30,15 +29,10 @@ class SecretBackendRoleArgs:
|
|
30
29
|
token_max_ttl: Optional[pulumi.Input[int]] = None):
|
31
30
|
"""
|
32
31
|
The set of arguments for constructing a SecretBackendRole resource.
|
32
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
|
33
|
+
can generate credentials for. If set to `*` all namespaces are allowed.
|
33
34
|
:param pulumi.Input[str] backend: The path of the Kubernetes Secrets Engine backend mount to create
|
34
35
|
the role in.
|
35
|
-
:param pulumi.Input[str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
|
36
|
-
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
37
|
-
of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
|
38
|
-
If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
|
39
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
|
40
|
-
can generate credentials for. If set to `*` all namespaces are allowed. If set with
|
41
|
-
`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
|
42
36
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] extra_annotations: Additional annotations to apply to all generated
|
43
37
|
Kubernetes objects.
|
44
38
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] extra_labels: Additional labels to apply to all generated Kubernetes
|
@@ -68,11 +62,8 @@ class SecretBackendRoleArgs:
|
|
68
62
|
:param pulumi.Input[int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
|
69
63
|
:param pulumi.Input[int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
|
70
64
|
"""
|
65
|
+
pulumi.set(__self__, "allowed_kubernetes_namespaces", allowed_kubernetes_namespaces)
|
71
66
|
pulumi.set(__self__, "backend", backend)
|
72
|
-
if allowed_kubernetes_namespace_selector is not None:
|
73
|
-
pulumi.set(__self__, "allowed_kubernetes_namespace_selector", allowed_kubernetes_namespace_selector)
|
74
|
-
if allowed_kubernetes_namespaces is not None:
|
75
|
-
pulumi.set(__self__, "allowed_kubernetes_namespaces", allowed_kubernetes_namespaces)
|
76
67
|
if extra_annotations is not None:
|
77
68
|
pulumi.set(__self__, "extra_annotations", extra_annotations)
|
78
69
|
if extra_labels is not None:
|
@@ -96,6 +87,19 @@ class SecretBackendRoleArgs:
|
|
96
87
|
if token_max_ttl is not None:
|
97
88
|
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
98
89
|
|
90
|
+
@property
|
91
|
+
@pulumi.getter(name="allowedKubernetesNamespaces")
|
92
|
+
def allowed_kubernetes_namespaces(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
93
|
+
"""
|
94
|
+
The list of Kubernetes namespaces this role
|
95
|
+
can generate credentials for. If set to `*` all namespaces are allowed.
|
96
|
+
"""
|
97
|
+
return pulumi.get(self, "allowed_kubernetes_namespaces")
|
98
|
+
|
99
|
+
@allowed_kubernetes_namespaces.setter
|
100
|
+
def allowed_kubernetes_namespaces(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
|
101
|
+
pulumi.set(self, "allowed_kubernetes_namespaces", value)
|
102
|
+
|
99
103
|
@property
|
100
104
|
@pulumi.getter
|
101
105
|
def backend(self) -> pulumi.Input[str]:
|
@@ -109,35 +113,6 @@ class SecretBackendRoleArgs:
|
|
109
113
|
def backend(self, value: pulumi.Input[str]):
|
110
114
|
pulumi.set(self, "backend", value)
|
111
115
|
|
112
|
-
@property
|
113
|
-
@pulumi.getter(name="allowedKubernetesNamespaceSelector")
|
114
|
-
def allowed_kubernetes_namespace_selector(self) -> Optional[pulumi.Input[str]]:
|
115
|
-
"""
|
116
|
-
A label selector for Kubernetes namespaces
|
117
|
-
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
118
|
-
of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
|
119
|
-
If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
|
120
|
-
"""
|
121
|
-
return pulumi.get(self, "allowed_kubernetes_namespace_selector")
|
122
|
-
|
123
|
-
@allowed_kubernetes_namespace_selector.setter
|
124
|
-
def allowed_kubernetes_namespace_selector(self, value: Optional[pulumi.Input[str]]):
|
125
|
-
pulumi.set(self, "allowed_kubernetes_namespace_selector", value)
|
126
|
-
|
127
|
-
@property
|
128
|
-
@pulumi.getter(name="allowedKubernetesNamespaces")
|
129
|
-
def allowed_kubernetes_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
130
|
-
"""
|
131
|
-
The list of Kubernetes namespaces this role
|
132
|
-
can generate credentials for. If set to `*` all namespaces are allowed. If set with
|
133
|
-
`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
|
134
|
-
"""
|
135
|
-
return pulumi.get(self, "allowed_kubernetes_namespaces")
|
136
|
-
|
137
|
-
@allowed_kubernetes_namespaces.setter
|
138
|
-
def allowed_kubernetes_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
139
|
-
pulumi.set(self, "allowed_kubernetes_namespaces", value)
|
140
|
-
|
141
116
|
@property
|
142
117
|
@pulumi.getter(name="extraAnnotations")
|
143
118
|
def extra_annotations(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
@@ -291,7 +266,6 @@ class SecretBackendRoleArgs:
|
|
291
266
|
@pulumi.input_type
|
292
267
|
class _SecretBackendRoleState:
|
293
268
|
def __init__(__self__, *,
|
294
|
-
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[str]] = None,
|
295
269
|
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
296
270
|
backend: Optional[pulumi.Input[str]] = None,
|
297
271
|
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
@@ -307,13 +281,8 @@ class _SecretBackendRoleState:
|
|
307
281
|
token_max_ttl: Optional[pulumi.Input[int]] = None):
|
308
282
|
"""
|
309
283
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
310
|
-
:param pulumi.Input[str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
|
311
|
-
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
312
|
-
of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
|
313
|
-
If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
|
314
284
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
|
315
|
-
can generate credentials for. If set to `*` all namespaces are allowed.
|
316
|
-
`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
|
285
|
+
can generate credentials for. If set to `*` all namespaces are allowed.
|
317
286
|
:param pulumi.Input[str] backend: The path of the Kubernetes Secrets Engine backend mount to create
|
318
287
|
the role in.
|
319
288
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] extra_annotations: Additional annotations to apply to all generated
|
@@ -345,8 +314,6 @@ class _SecretBackendRoleState:
|
|
345
314
|
:param pulumi.Input[int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
|
346
315
|
:param pulumi.Input[int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
|
347
316
|
"""
|
348
|
-
if allowed_kubernetes_namespace_selector is not None:
|
349
|
-
pulumi.set(__self__, "allowed_kubernetes_namespace_selector", allowed_kubernetes_namespace_selector)
|
350
317
|
if allowed_kubernetes_namespaces is not None:
|
351
318
|
pulumi.set(__self__, "allowed_kubernetes_namespaces", allowed_kubernetes_namespaces)
|
352
319
|
if backend is not None:
|
@@ -374,28 +341,12 @@ class _SecretBackendRoleState:
|
|
374
341
|
if token_max_ttl is not None:
|
375
342
|
pulumi.set(__self__, "token_max_ttl", token_max_ttl)
|
376
343
|
|
377
|
-
@property
|
378
|
-
@pulumi.getter(name="allowedKubernetesNamespaceSelector")
|
379
|
-
def allowed_kubernetes_namespace_selector(self) -> Optional[pulumi.Input[str]]:
|
380
|
-
"""
|
381
|
-
A label selector for Kubernetes namespaces
|
382
|
-
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
383
|
-
of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
|
384
|
-
If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
|
385
|
-
"""
|
386
|
-
return pulumi.get(self, "allowed_kubernetes_namespace_selector")
|
387
|
-
|
388
|
-
@allowed_kubernetes_namespace_selector.setter
|
389
|
-
def allowed_kubernetes_namespace_selector(self, value: Optional[pulumi.Input[str]]):
|
390
|
-
pulumi.set(self, "allowed_kubernetes_namespace_selector", value)
|
391
|
-
|
392
344
|
@property
|
393
345
|
@pulumi.getter(name="allowedKubernetesNamespaces")
|
394
346
|
def allowed_kubernetes_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
395
347
|
"""
|
396
348
|
The list of Kubernetes namespaces this role
|
397
|
-
can generate credentials for. If set to `*` all namespaces are allowed.
|
398
|
-
`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
|
349
|
+
can generate credentials for. If set to `*` all namespaces are allowed.
|
399
350
|
"""
|
400
351
|
return pulumi.get(self, "allowed_kubernetes_namespaces")
|
401
352
|
|
@@ -571,7 +522,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
571
522
|
def __init__(__self__,
|
572
523
|
resource_name: str,
|
573
524
|
opts: Optional[pulumi.ResourceOptions] = None,
|
574
|
-
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[str]] = None,
|
575
525
|
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
576
526
|
backend: Optional[pulumi.Input[str]] = None,
|
577
527
|
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
@@ -699,13 +649,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
699
649
|
|
700
650
|
:param str resource_name: The name of the resource.
|
701
651
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
702
|
-
:param pulumi.Input[str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
|
703
|
-
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
704
|
-
of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
|
705
|
-
If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
|
706
652
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
|
707
|
-
can generate credentials for. If set to `*` all namespaces are allowed.
|
708
|
-
`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
|
653
|
+
can generate credentials for. If set to `*` all namespaces are allowed.
|
709
654
|
:param pulumi.Input[str] backend: The path of the Kubernetes Secrets Engine backend mount to create
|
710
655
|
the role in.
|
711
656
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] extra_annotations: Additional annotations to apply to all generated
|
@@ -869,7 +814,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
869
814
|
def _internal_init(__self__,
|
870
815
|
resource_name: str,
|
871
816
|
opts: Optional[pulumi.ResourceOptions] = None,
|
872
|
-
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[str]] = None,
|
873
817
|
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
874
818
|
backend: Optional[pulumi.Input[str]] = None,
|
875
819
|
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
@@ -892,7 +836,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
892
836
|
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
893
837
|
__props__ = SecretBackendRoleArgs.__new__(SecretBackendRoleArgs)
|
894
838
|
|
895
|
-
|
839
|
+
if allowed_kubernetes_namespaces is None and not opts.urn:
|
840
|
+
raise TypeError("Missing required property 'allowed_kubernetes_namespaces'")
|
896
841
|
__props__.__dict__["allowed_kubernetes_namespaces"] = allowed_kubernetes_namespaces
|
897
842
|
if backend is None and not opts.urn:
|
898
843
|
raise TypeError("Missing required property 'backend'")
|
@@ -918,7 +863,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
918
863
|
def get(resource_name: str,
|
919
864
|
id: pulumi.Input[str],
|
920
865
|
opts: Optional[pulumi.ResourceOptions] = None,
|
921
|
-
allowed_kubernetes_namespace_selector: Optional[pulumi.Input[str]] = None,
|
922
866
|
allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
923
867
|
backend: Optional[pulumi.Input[str]] = None,
|
924
868
|
extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
@@ -939,13 +883,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
939
883
|
:param str resource_name: The unique name of the resulting resource.
|
940
884
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
941
885
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
942
|
-
:param pulumi.Input[str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
|
943
|
-
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
944
|
-
of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
|
945
|
-
If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
|
946
886
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
|
947
|
-
can generate credentials for. If set to `*` all namespaces are allowed.
|
948
|
-
`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
|
887
|
+
can generate credentials for. If set to `*` all namespaces are allowed.
|
949
888
|
:param pulumi.Input[str] backend: The path of the Kubernetes Secrets Engine backend mount to create
|
950
889
|
the role in.
|
951
890
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] extra_annotations: Additional annotations to apply to all generated
|
@@ -981,7 +920,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
981
920
|
|
982
921
|
__props__ = _SecretBackendRoleState.__new__(_SecretBackendRoleState)
|
983
922
|
|
984
|
-
__props__.__dict__["allowed_kubernetes_namespace_selector"] = allowed_kubernetes_namespace_selector
|
985
923
|
__props__.__dict__["allowed_kubernetes_namespaces"] = allowed_kubernetes_namespaces
|
986
924
|
__props__.__dict__["backend"] = backend
|
987
925
|
__props__.__dict__["extra_annotations"] = extra_annotations
|
@@ -997,24 +935,12 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
997
935
|
__props__.__dict__["token_max_ttl"] = token_max_ttl
|
998
936
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
999
937
|
|
1000
|
-
@property
|
1001
|
-
@pulumi.getter(name="allowedKubernetesNamespaceSelector")
|
1002
|
-
def allowed_kubernetes_namespace_selector(self) -> pulumi.Output[Optional[str]]:
|
1003
|
-
"""
|
1004
|
-
A label selector for Kubernetes namespaces
|
1005
|
-
in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
|
1006
|
-
of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
|
1007
|
-
If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
|
1008
|
-
"""
|
1009
|
-
return pulumi.get(self, "allowed_kubernetes_namespace_selector")
|
1010
|
-
|
1011
938
|
@property
|
1012
939
|
@pulumi.getter(name="allowedKubernetesNamespaces")
|
1013
|
-
def allowed_kubernetes_namespaces(self) -> pulumi.Output[
|
940
|
+
def allowed_kubernetes_namespaces(self) -> pulumi.Output[Sequence[str]]:
|
1014
941
|
"""
|
1015
942
|
The list of Kubernetes namespaces this role
|
1016
|
-
can generate credentials for. If set to `*` all namespaces are allowed.
|
1017
|
-
`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
|
943
|
+
can generate credentials for. If set to `*` all namespaces are allowed.
|
1018
944
|
"""
|
1019
945
|
return pulumi.get(self, "allowed_kubernetes_namespaces")
|
1020
946
|
|
@@ -199,11 +199,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
199
199
|
import pulumi_vault as vault
|
200
200
|
|
201
201
|
mongo = vault.Mount("mongo",
|
202
|
+
description="MongoDB Atlas secret engine mount",
|
202
203
|
path="mongodbatlas",
|
203
|
-
type="mongodbatlas"
|
204
|
-
description="MongoDB Atlas secret engine mount")
|
204
|
+
type="mongodbatlas")
|
205
205
|
config = vault.mongodbatlas.SecretBackend("config",
|
206
|
-
mount=mongo.path,
|
206
|
+
mount="vault_mount.mongo.path",
|
207
207
|
private_key="privateKey",
|
208
208
|
public_key="publicKey")
|
209
209
|
```
|
@@ -242,11 +242,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
242
242
|
import pulumi_vault as vault
|
243
243
|
|
244
244
|
mongo = vault.Mount("mongo",
|
245
|
+
description="MongoDB Atlas secret engine mount",
|
245
246
|
path="mongodbatlas",
|
246
|
-
type="mongodbatlas"
|
247
|
-
description="MongoDB Atlas secret engine mount")
|
247
|
+
type="mongodbatlas")
|
248
248
|
config = vault.mongodbatlas.SecretBackend("config",
|
249
|
-
mount=mongo.path,
|
249
|
+
mount="vault_mount.mongo.path",
|
250
250
|
private_key="privateKey",
|
251
251
|
public_key="publicKey")
|
252
252
|
```
|
@@ -28,7 +28,7 @@ class SecretRoleArgs:
|
|
28
28
|
"""
|
29
29
|
The set of arguments for constructing a SecretRole resource.
|
30
30
|
:param pulumi.Input[str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
|
31
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have.
|
31
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have.
|
32
32
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
|
33
33
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: IP address to be added to the whitelist for the API key.
|
34
34
|
:param pulumi.Input[str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
|
@@ -40,8 +40,8 @@ class SecretRoleArgs:
|
|
40
40
|
:param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
41
41
|
Required if `project_id` is not set.
|
42
42
|
:param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
|
43
|
-
Required if `organization_id
|
44
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key.
|
43
|
+
Required if `organization_id is` not set.
|
44
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key.
|
45
45
|
:param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
|
46
46
|
"""
|
47
47
|
pulumi.set(__self__, "mount", mount)
|
@@ -81,7 +81,7 @@ class SecretRoleArgs:
|
|
81
81
|
@pulumi.getter
|
82
82
|
def roles(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
|
83
83
|
"""
|
84
|
-
List of roles that the API Key needs to have.
|
84
|
+
List of roles that the API Key needs to have.
|
85
85
|
"""
|
86
86
|
return pulumi.get(self, "roles")
|
87
87
|
|
@@ -170,7 +170,7 @@ class SecretRoleArgs:
|
|
170
170
|
def project_id(self) -> Optional[pulumi.Input[str]]:
|
171
171
|
"""
|
172
172
|
Unique identifier for the project to which the target API Key belongs.
|
173
|
-
Required if `organization_id
|
173
|
+
Required if `organization_id is` not set.
|
174
174
|
"""
|
175
175
|
return pulumi.get(self, "project_id")
|
176
176
|
|
@@ -182,7 +182,7 @@ class SecretRoleArgs:
|
|
182
182
|
@pulumi.getter(name="projectRoles")
|
183
183
|
def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
184
184
|
"""
|
185
|
-
Roles assigned when an org API key is assigned to a project API key.
|
185
|
+
Roles assigned when an org API key is assigned to a project API key.
|
186
186
|
"""
|
187
187
|
return pulumi.get(self, "project_roles")
|
188
188
|
|
@@ -231,9 +231,9 @@ class _SecretRoleState:
|
|
231
231
|
:param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
232
232
|
Required if `project_id` is not set.
|
233
233
|
:param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
|
234
|
-
Required if `organization_id
|
235
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key.
|
236
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have.
|
234
|
+
Required if `organization_id is` not set.
|
235
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key.
|
236
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have.
|
237
237
|
:param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
|
238
238
|
"""
|
239
239
|
if cidr_blocks is not None:
|
@@ -352,7 +352,7 @@ class _SecretRoleState:
|
|
352
352
|
def project_id(self) -> Optional[pulumi.Input[str]]:
|
353
353
|
"""
|
354
354
|
Unique identifier for the project to which the target API Key belongs.
|
355
|
-
Required if `organization_id
|
355
|
+
Required if `organization_id is` not set.
|
356
356
|
"""
|
357
357
|
return pulumi.get(self, "project_id")
|
358
358
|
|
@@ -364,7 +364,7 @@ class _SecretRoleState:
|
|
364
364
|
@pulumi.getter(name="projectRoles")
|
365
365
|
def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
366
366
|
"""
|
367
|
-
Roles assigned when an org API key is assigned to a project API key.
|
367
|
+
Roles assigned when an org API key is assigned to a project API key.
|
368
368
|
"""
|
369
369
|
return pulumi.get(self, "project_roles")
|
370
370
|
|
@@ -376,7 +376,7 @@ class _SecretRoleState:
|
|
376
376
|
@pulumi.getter
|
377
377
|
def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
378
378
|
"""
|
379
|
-
List of roles that the API Key needs to have.
|
379
|
+
List of roles that the API Key needs to have.
|
380
380
|
"""
|
381
381
|
return pulumi.get(self, "roles")
|
382
382
|
|
@@ -427,17 +427,17 @@ class SecretRole(pulumi.CustomResource):
|
|
427
427
|
type="mongodbatlas",
|
428
428
|
description="MongoDB Atlas secret engine mount")
|
429
429
|
config = vault.mongodbatlas.SecretBackend("config",
|
430
|
-
mount=mongo.path,
|
430
|
+
mount="vault_mount.mongo.path",
|
431
431
|
private_key="privateKey",
|
432
432
|
public_key="publicKey")
|
433
433
|
role = vault.mongodbatlas.SecretRole("role",
|
434
434
|
mount=mongo.path,
|
435
435
|
organization_id="7cf5a45a9ccf6400e60981b7",
|
436
436
|
project_id="5cf5a45a9ccf6400e60981b6",
|
437
|
-
roles=
|
437
|
+
roles="ORG_READ_ONLY",
|
438
438
|
ip_addresses="192.168.1.5, 192.168.1.6",
|
439
439
|
cidr_blocks="192.168.1.3/35",
|
440
|
-
project_roles=
|
440
|
+
project_roles="GROUP_READ_ONLY",
|
441
441
|
ttl="60",
|
442
442
|
max_ttl="120")
|
443
443
|
```
|
@@ -466,9 +466,9 @@ class SecretRole(pulumi.CustomResource):
|
|
466
466
|
:param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
467
467
|
Required if `project_id` is not set.
|
468
468
|
:param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
|
469
|
-
Required if `organization_id
|
470
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key.
|
471
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have.
|
469
|
+
Required if `organization_id is` not set.
|
470
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key.
|
471
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have.
|
472
472
|
:param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
|
473
473
|
"""
|
474
474
|
...
|
@@ -490,17 +490,17 @@ class SecretRole(pulumi.CustomResource):
|
|
490
490
|
type="mongodbatlas",
|
491
491
|
description="MongoDB Atlas secret engine mount")
|
492
492
|
config = vault.mongodbatlas.SecretBackend("config",
|
493
|
-
mount=mongo.path,
|
493
|
+
mount="vault_mount.mongo.path",
|
494
494
|
private_key="privateKey",
|
495
495
|
public_key="publicKey")
|
496
496
|
role = vault.mongodbatlas.SecretRole("role",
|
497
497
|
mount=mongo.path,
|
498
498
|
organization_id="7cf5a45a9ccf6400e60981b7",
|
499
499
|
project_id="5cf5a45a9ccf6400e60981b6",
|
500
|
-
roles=
|
500
|
+
roles="ORG_READ_ONLY",
|
501
501
|
ip_addresses="192.168.1.5, 192.168.1.6",
|
502
502
|
cidr_blocks="192.168.1.3/35",
|
503
|
-
project_roles=
|
503
|
+
project_roles="GROUP_READ_ONLY",
|
504
504
|
ttl="60",
|
505
505
|
max_ttl="120")
|
506
506
|
```
|
@@ -605,9 +605,9 @@ class SecretRole(pulumi.CustomResource):
|
|
605
605
|
:param pulumi.Input[str] organization_id: Unique identifier for the organization to which the target API Key belongs.
|
606
606
|
Required if `project_id` is not set.
|
607
607
|
:param pulumi.Input[str] project_id: Unique identifier for the project to which the target API Key belongs.
|
608
|
-
Required if `organization_id
|
609
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key.
|
610
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have.
|
608
|
+
Required if `organization_id is` not set.
|
609
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] project_roles: Roles assigned when an org API key is assigned to a project API key.
|
610
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] roles: List of roles that the API Key needs to have.
|
611
611
|
:param pulumi.Input[str] ttl: Duration in seconds after which the issued credential should expire.
|
612
612
|
"""
|
613
613
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -692,7 +692,7 @@ class SecretRole(pulumi.CustomResource):
|
|
692
692
|
def project_id(self) -> pulumi.Output[Optional[str]]:
|
693
693
|
"""
|
694
694
|
Unique identifier for the project to which the target API Key belongs.
|
695
|
-
Required if `organization_id
|
695
|
+
Required if `organization_id is` not set.
|
696
696
|
"""
|
697
697
|
return pulumi.get(self, "project_id")
|
698
698
|
|
@@ -700,7 +700,7 @@ class SecretRole(pulumi.CustomResource):
|
|
700
700
|
@pulumi.getter(name="projectRoles")
|
701
701
|
def project_roles(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
702
702
|
"""
|
703
|
-
Roles assigned when an org API key is assigned to a project API key.
|
703
|
+
Roles assigned when an org API key is assigned to a project API key.
|
704
704
|
"""
|
705
705
|
return pulumi.get(self, "project_roles")
|
706
706
|
|
@@ -708,7 +708,7 @@ class SecretRole(pulumi.CustomResource):
|
|
708
708
|
@pulumi.getter
|
709
709
|
def roles(self) -> pulumi.Output[Sequence[str]]:
|
710
710
|
"""
|
711
|
-
List of roles that the API Key needs to have.
|
711
|
+
List of roles that the API Key needs to have.
|
712
712
|
"""
|
713
713
|
return pulumi.get(self, "roles")
|
714
714
|
|