pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -18,7 +18,6 @@ class SecretBackendRoleArgs:
|
|
18
18
|
credential_type: pulumi.Input[str],
|
19
19
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
20
20
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
|
-
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
22
21
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
23
22
|
name: Optional[pulumi.Input[str]] = None,
|
24
23
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -45,8 +44,6 @@ class SecretBackendRoleArgs:
|
|
45
44
|
corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the
|
46
45
|
policies from each group in `iam_groups` combined with the `policy_document`
|
47
46
|
and `policy_arns` parameters.
|
48
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] iam_tags: A map of strings representing key/value pairs
|
49
|
-
to be used as tags for any IAM user that is created by this role.
|
50
47
|
:param pulumi.Input[int] max_sts_ttl: The max allowed TTL in seconds for STS credentials
|
51
48
|
(credentials TTL are capped to `max_sts_ttl`). Valid only when `credential_type` is
|
52
49
|
one of `assumed_role` or `federation_token`.
|
@@ -84,8 +81,6 @@ class SecretBackendRoleArgs:
|
|
84
81
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
85
82
|
if iam_groups is not None:
|
86
83
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
87
|
-
if iam_tags is not None:
|
88
|
-
pulumi.set(__self__, "iam_tags", iam_tags)
|
89
84
|
if max_sts_ttl is not None:
|
90
85
|
pulumi.set(__self__, "max_sts_ttl", max_sts_ttl)
|
91
86
|
if name is not None:
|
@@ -163,19 +158,6 @@ class SecretBackendRoleArgs:
|
|
163
158
|
def iam_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
164
159
|
pulumi.set(self, "iam_groups", value)
|
165
160
|
|
166
|
-
@property
|
167
|
-
@pulumi.getter(name="iamTags")
|
168
|
-
def iam_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
169
|
-
"""
|
170
|
-
A map of strings representing key/value pairs
|
171
|
-
to be used as tags for any IAM user that is created by this role.
|
172
|
-
"""
|
173
|
-
return pulumi.get(self, "iam_tags")
|
174
|
-
|
175
|
-
@iam_tags.setter
|
176
|
-
def iam_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
177
|
-
pulumi.set(self, "iam_tags", value)
|
178
|
-
|
179
161
|
@property
|
180
162
|
@pulumi.getter(name="maxStsTtl")
|
181
163
|
def max_sts_ttl(self) -> Optional[pulumi.Input[int]]:
|
@@ -302,7 +284,6 @@ class _SecretBackendRoleState:
|
|
302
284
|
credential_type: Optional[pulumi.Input[str]] = None,
|
303
285
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
304
286
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
305
|
-
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
306
287
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
307
288
|
name: Optional[pulumi.Input[str]] = None,
|
308
289
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -329,8 +310,6 @@ class _SecretBackendRoleState:
|
|
329
310
|
corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the
|
330
311
|
policies from each group in `iam_groups` combined with the `policy_document`
|
331
312
|
and `policy_arns` parameters.
|
332
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] iam_tags: A map of strings representing key/value pairs
|
333
|
-
to be used as tags for any IAM user that is created by this role.
|
334
313
|
:param pulumi.Input[int] max_sts_ttl: The max allowed TTL in seconds for STS credentials
|
335
314
|
(credentials TTL are capped to `max_sts_ttl`). Valid only when `credential_type` is
|
336
315
|
one of `assumed_role` or `federation_token`.
|
@@ -370,8 +349,6 @@ class _SecretBackendRoleState:
|
|
370
349
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
371
350
|
if iam_groups is not None:
|
372
351
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
373
|
-
if iam_tags is not None:
|
374
|
-
pulumi.set(__self__, "iam_tags", iam_tags)
|
375
352
|
if max_sts_ttl is not None:
|
376
353
|
pulumi.set(__self__, "max_sts_ttl", max_sts_ttl)
|
377
354
|
if name is not None:
|
@@ -449,19 +426,6 @@ class _SecretBackendRoleState:
|
|
449
426
|
def iam_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
450
427
|
pulumi.set(self, "iam_groups", value)
|
451
428
|
|
452
|
-
@property
|
453
|
-
@pulumi.getter(name="iamTags")
|
454
|
-
def iam_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
455
|
-
"""
|
456
|
-
A map of strings representing key/value pairs
|
457
|
-
to be used as tags for any IAM user that is created by this role.
|
458
|
-
"""
|
459
|
-
return pulumi.get(self, "iam_tags")
|
460
|
-
|
461
|
-
@iam_tags.setter
|
462
|
-
def iam_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
463
|
-
pulumi.set(self, "iam_tags", value)
|
464
|
-
|
465
429
|
@property
|
466
430
|
@pulumi.getter(name="maxStsTtl")
|
467
431
|
def max_sts_ttl(self) -> Optional[pulumi.Input[int]]:
|
@@ -590,7 +554,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
590
554
|
credential_type: Optional[pulumi.Input[str]] = None,
|
591
555
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
592
556
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
593
|
-
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
594
557
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
595
558
|
name: Optional[pulumi.Input[str]] = None,
|
596
559
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -603,6 +566,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
603
566
|
"""
|
604
567
|
## Example Usage
|
605
568
|
|
569
|
+
<!--Start PulumiCodeChooser -->
|
606
570
|
```python
|
607
571
|
import pulumi
|
608
572
|
import pulumi_vault as vault
|
@@ -612,7 +576,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
612
576
|
secret_key="AWS secret key")
|
613
577
|
role = vault.aws.SecretBackendRole("role",
|
614
578
|
backend=aws.path,
|
615
|
-
name="deploy",
|
616
579
|
credential_type="iam_user",
|
617
580
|
policy_document=\"\"\"{
|
618
581
|
"Version": "2012-10-17",
|
@@ -626,6 +589,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
626
589
|
}
|
627
590
|
\"\"\")
|
628
591
|
```
|
592
|
+
<!--End PulumiCodeChooser -->
|
629
593
|
|
630
594
|
## Import
|
631
595
|
|
@@ -653,8 +617,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
653
617
|
corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the
|
654
618
|
policies from each group in `iam_groups` combined with the `policy_document`
|
655
619
|
and `policy_arns` parameters.
|
656
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] iam_tags: A map of strings representing key/value pairs
|
657
|
-
to be used as tags for any IAM user that is created by this role.
|
658
620
|
:param pulumi.Input[int] max_sts_ttl: The max allowed TTL in seconds for STS credentials
|
659
621
|
(credentials TTL are capped to `max_sts_ttl`). Valid only when `credential_type` is
|
660
622
|
one of `assumed_role` or `federation_token`.
|
@@ -695,6 +657,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
695
657
|
"""
|
696
658
|
## Example Usage
|
697
659
|
|
660
|
+
<!--Start PulumiCodeChooser -->
|
698
661
|
```python
|
699
662
|
import pulumi
|
700
663
|
import pulumi_vault as vault
|
@@ -704,7 +667,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
704
667
|
secret_key="AWS secret key")
|
705
668
|
role = vault.aws.SecretBackendRole("role",
|
706
669
|
backend=aws.path,
|
707
|
-
name="deploy",
|
708
670
|
credential_type="iam_user",
|
709
671
|
policy_document=\"\"\"{
|
710
672
|
"Version": "2012-10-17",
|
@@ -718,6 +680,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
718
680
|
}
|
719
681
|
\"\"\")
|
720
682
|
```
|
683
|
+
<!--End PulumiCodeChooser -->
|
721
684
|
|
722
685
|
## Import
|
723
686
|
|
@@ -746,7 +709,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
746
709
|
credential_type: Optional[pulumi.Input[str]] = None,
|
747
710
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
748
711
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
749
|
-
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
750
712
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
751
713
|
name: Optional[pulumi.Input[str]] = None,
|
752
714
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -772,7 +734,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
772
734
|
__props__.__dict__["credential_type"] = credential_type
|
773
735
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
774
736
|
__props__.__dict__["iam_groups"] = iam_groups
|
775
|
-
__props__.__dict__["iam_tags"] = iam_tags
|
776
737
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
777
738
|
__props__.__dict__["name"] = name
|
778
739
|
__props__.__dict__["namespace"] = namespace
|
@@ -795,7 +756,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
795
756
|
credential_type: Optional[pulumi.Input[str]] = None,
|
796
757
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
797
758
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
798
|
-
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
799
759
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
800
760
|
name: Optional[pulumi.Input[str]] = None,
|
801
761
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -827,8 +787,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
827
787
|
corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the
|
828
788
|
policies from each group in `iam_groups` combined with the `policy_document`
|
829
789
|
and `policy_arns` parameters.
|
830
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] iam_tags: A map of strings representing key/value pairs
|
831
|
-
to be used as tags for any IAM user that is created by this role.
|
832
790
|
:param pulumi.Input[int] max_sts_ttl: The max allowed TTL in seconds for STS credentials
|
833
791
|
(credentials TTL are capped to `max_sts_ttl`). Valid only when `credential_type` is
|
834
792
|
one of `assumed_role` or `federation_token`.
|
@@ -868,7 +826,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
868
826
|
__props__.__dict__["credential_type"] = credential_type
|
869
827
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
870
828
|
__props__.__dict__["iam_groups"] = iam_groups
|
871
|
-
__props__.__dict__["iam_tags"] = iam_tags
|
872
829
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
873
830
|
__props__.__dict__["name"] = name
|
874
831
|
__props__.__dict__["namespace"] = namespace
|
@@ -923,15 +880,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
923
880
|
"""
|
924
881
|
return pulumi.get(self, "iam_groups")
|
925
882
|
|
926
|
-
@property
|
927
|
-
@pulumi.getter(name="iamTags")
|
928
|
-
def iam_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
929
|
-
"""
|
930
|
-
A map of strings representing key/value pairs
|
931
|
-
to be used as tags for any IAM user that is created by this role.
|
932
|
-
"""
|
933
|
-
return pulumi.get(self, "iam_tags")
|
934
|
-
|
935
883
|
@property
|
936
884
|
@pulumi.getter(name="maxStsTtl")
|
937
885
|
def max_sts_ttl(self) -> pulumi.Output[int]:
|
@@ -219,6 +219,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
219
219
|
"""
|
220
220
|
## Example Usage
|
221
221
|
|
222
|
+
<!--Start PulumiCodeChooser -->
|
222
223
|
```python
|
223
224
|
import pulumi
|
224
225
|
import pulumi_vault as vault
|
@@ -228,10 +229,10 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
228
229
|
description="Obtain AWS credentials.")
|
229
230
|
role = vault.aws.SecretBackendStaticRole("role",
|
230
231
|
backend=aws.path,
|
231
|
-
name="test",
|
232
232
|
username="my-test-user",
|
233
233
|
rotation_period=3600)
|
234
234
|
```
|
235
|
+
<!--End PulumiCodeChooser -->
|
235
236
|
|
236
237
|
## Import
|
237
238
|
|
@@ -264,6 +265,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
264
265
|
"""
|
265
266
|
## Example Usage
|
266
267
|
|
268
|
+
<!--Start PulumiCodeChooser -->
|
267
269
|
```python
|
268
270
|
import pulumi
|
269
271
|
import pulumi_vault as vault
|
@@ -273,10 +275,10 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
273
275
|
description="Obtain AWS credentials.")
|
274
276
|
role = vault.aws.SecretBackendStaticRole("role",
|
275
277
|
backend=aws.path,
|
276
|
-
name="test",
|
277
278
|
username="my-test-user",
|
278
279
|
rotation_period=3600)
|
279
280
|
```
|
281
|
+
<!--End PulumiCodeChooser -->
|
280
282
|
|
281
283
|
## Import
|
282
284
|
|
@@ -20,8 +20,6 @@ class AuthBackendConfigArgs:
|
|
20
20
|
client_id: Optional[pulumi.Input[str]] = None,
|
21
21
|
client_secret: Optional[pulumi.Input[str]] = None,
|
22
22
|
environment: Optional[pulumi.Input[str]] = None,
|
23
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
24
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
25
23
|
namespace: Optional[pulumi.Input[str]] = None):
|
26
24
|
"""
|
27
25
|
The set of arguments for constructing a AuthBackendConfig resource.
|
@@ -38,9 +36,6 @@ class AuthBackendConfigArgs:
|
|
38
36
|
:param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
|
39
37
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
40
38
|
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
41
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
42
|
-
*Available only for Vault Enterprise*
|
43
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
44
39
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
45
40
|
The value should not contain leading or trailing forward slashes.
|
46
41
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -56,10 +51,6 @@ class AuthBackendConfigArgs:
|
|
56
51
|
pulumi.set(__self__, "client_secret", client_secret)
|
57
52
|
if environment is not None:
|
58
53
|
pulumi.set(__self__, "environment", environment)
|
59
|
-
if identity_token_audience is not None:
|
60
|
-
pulumi.set(__self__, "identity_token_audience", identity_token_audience)
|
61
|
-
if identity_token_ttl is not None:
|
62
|
-
pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
|
63
54
|
if namespace is not None:
|
64
55
|
pulumi.set(__self__, "namespace", namespace)
|
65
56
|
|
@@ -142,31 +133,6 @@ class AuthBackendConfigArgs:
|
|
142
133
|
def environment(self, value: Optional[pulumi.Input[str]]):
|
143
134
|
pulumi.set(self, "environment", value)
|
144
135
|
|
145
|
-
@property
|
146
|
-
@pulumi.getter(name="identityTokenAudience")
|
147
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
|
148
|
-
"""
|
149
|
-
The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
150
|
-
*Available only for Vault Enterprise*
|
151
|
-
"""
|
152
|
-
return pulumi.get(self, "identity_token_audience")
|
153
|
-
|
154
|
-
@identity_token_audience.setter
|
155
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
|
156
|
-
pulumi.set(self, "identity_token_audience", value)
|
157
|
-
|
158
|
-
@property
|
159
|
-
@pulumi.getter(name="identityTokenTtl")
|
160
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
|
161
|
-
"""
|
162
|
-
The TTL of generated identity tokens in seconds.
|
163
|
-
"""
|
164
|
-
return pulumi.get(self, "identity_token_ttl")
|
165
|
-
|
166
|
-
@identity_token_ttl.setter
|
167
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
|
168
|
-
pulumi.set(self, "identity_token_ttl", value)
|
169
|
-
|
170
136
|
@property
|
171
137
|
@pulumi.getter
|
172
138
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -190,8 +156,6 @@ class _AuthBackendConfigState:
|
|
190
156
|
client_id: Optional[pulumi.Input[str]] = None,
|
191
157
|
client_secret: Optional[pulumi.Input[str]] = None,
|
192
158
|
environment: Optional[pulumi.Input[str]] = None,
|
193
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
194
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
195
159
|
namespace: Optional[pulumi.Input[str]] = None,
|
196
160
|
resource: Optional[pulumi.Input[str]] = None,
|
197
161
|
tenant_id: Optional[pulumi.Input[str]] = None):
|
@@ -206,9 +170,6 @@ class _AuthBackendConfigState:
|
|
206
170
|
:param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
|
207
171
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
208
172
|
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
209
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
210
|
-
*Available only for Vault Enterprise*
|
211
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
212
173
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
213
174
|
The value should not contain leading or trailing forward slashes.
|
214
175
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -226,10 +187,6 @@ class _AuthBackendConfigState:
|
|
226
187
|
pulumi.set(__self__, "client_secret", client_secret)
|
227
188
|
if environment is not None:
|
228
189
|
pulumi.set(__self__, "environment", environment)
|
229
|
-
if identity_token_audience is not None:
|
230
|
-
pulumi.set(__self__, "identity_token_audience", identity_token_audience)
|
231
|
-
if identity_token_ttl is not None:
|
232
|
-
pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
|
233
190
|
if namespace is not None:
|
234
191
|
pulumi.set(__self__, "namespace", namespace)
|
235
192
|
if resource is not None:
|
@@ -290,31 +247,6 @@ class _AuthBackendConfigState:
|
|
290
247
|
def environment(self, value: Optional[pulumi.Input[str]]):
|
291
248
|
pulumi.set(self, "environment", value)
|
292
249
|
|
293
|
-
@property
|
294
|
-
@pulumi.getter(name="identityTokenAudience")
|
295
|
-
def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
|
296
|
-
"""
|
297
|
-
The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
298
|
-
*Available only for Vault Enterprise*
|
299
|
-
"""
|
300
|
-
return pulumi.get(self, "identity_token_audience")
|
301
|
-
|
302
|
-
@identity_token_audience.setter
|
303
|
-
def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
|
304
|
-
pulumi.set(self, "identity_token_audience", value)
|
305
|
-
|
306
|
-
@property
|
307
|
-
@pulumi.getter(name="identityTokenTtl")
|
308
|
-
def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
|
309
|
-
"""
|
310
|
-
The TTL of generated identity tokens in seconds.
|
311
|
-
"""
|
312
|
-
return pulumi.get(self, "identity_token_ttl")
|
313
|
-
|
314
|
-
@identity_token_ttl.setter
|
315
|
-
def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
|
316
|
-
pulumi.set(self, "identity_token_ttl", value)
|
317
|
-
|
318
250
|
@property
|
319
251
|
@pulumi.getter
|
320
252
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -366,8 +298,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
366
298
|
client_id: Optional[pulumi.Input[str]] = None,
|
367
299
|
client_secret: Optional[pulumi.Input[str]] = None,
|
368
300
|
environment: Optional[pulumi.Input[str]] = None,
|
369
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
370
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
371
301
|
namespace: Optional[pulumi.Input[str]] = None,
|
372
302
|
resource: Optional[pulumi.Input[str]] = None,
|
373
303
|
tenant_id: Optional[pulumi.Input[str]] = None,
|
@@ -375,34 +305,20 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
375
305
|
"""
|
376
306
|
## Example Usage
|
377
307
|
|
378
|
-
|
379
|
-
```python
|
380
|
-
import pulumi
|
381
|
-
import pulumi_vault as vault
|
382
|
-
|
383
|
-
example = vault.AuthBackend("example",
|
384
|
-
type="azure",
|
385
|
-
identity_token_key="example-key")
|
386
|
-
example_auth_backend_config = vault.azure.AuthBackendConfig("example",
|
387
|
-
backend=example.path,
|
388
|
-
tenant_id="11111111-2222-3333-4444-555555555555",
|
389
|
-
client_id="11111111-2222-3333-4444-555555555555",
|
390
|
-
identity_token_audience="<TOKEN_AUDIENCE>",
|
391
|
-
identity_token_ttl="<TOKEN_TTL>")
|
392
|
-
```
|
393
|
-
|
308
|
+
<!--Start PulumiCodeChooser -->
|
394
309
|
```python
|
395
310
|
import pulumi
|
396
311
|
import pulumi_vault as vault
|
397
312
|
|
398
|
-
|
399
|
-
example_auth_backend_config = vault.azure.AuthBackendConfig("
|
400
|
-
backend=
|
313
|
+
example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="azure")
|
314
|
+
example_auth_backend_config = vault.azure.AuthBackendConfig("exampleAuthBackendConfig",
|
315
|
+
backend=example_auth_backend.path,
|
401
316
|
tenant_id="11111111-2222-3333-4444-555555555555",
|
402
317
|
client_id="11111111-2222-3333-4444-555555555555",
|
403
318
|
client_secret="01234567890123456789",
|
404
319
|
resource="https://vault.hashicorp.com")
|
405
320
|
```
|
321
|
+
<!--End PulumiCodeChooser -->
|
406
322
|
|
407
323
|
## Import
|
408
324
|
|
@@ -423,9 +339,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
423
339
|
:param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
|
424
340
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
425
341
|
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
426
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
427
|
-
*Available only for Vault Enterprise*
|
428
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
429
342
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
430
343
|
The value should not contain leading or trailing forward slashes.
|
431
344
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -444,34 +357,20 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
444
357
|
"""
|
445
358
|
## Example Usage
|
446
359
|
|
447
|
-
|
448
|
-
```python
|
449
|
-
import pulumi
|
450
|
-
import pulumi_vault as vault
|
451
|
-
|
452
|
-
example = vault.AuthBackend("example",
|
453
|
-
type="azure",
|
454
|
-
identity_token_key="example-key")
|
455
|
-
example_auth_backend_config = vault.azure.AuthBackendConfig("example",
|
456
|
-
backend=example.path,
|
457
|
-
tenant_id="11111111-2222-3333-4444-555555555555",
|
458
|
-
client_id="11111111-2222-3333-4444-555555555555",
|
459
|
-
identity_token_audience="<TOKEN_AUDIENCE>",
|
460
|
-
identity_token_ttl="<TOKEN_TTL>")
|
461
|
-
```
|
462
|
-
|
360
|
+
<!--Start PulumiCodeChooser -->
|
463
361
|
```python
|
464
362
|
import pulumi
|
465
363
|
import pulumi_vault as vault
|
466
364
|
|
467
|
-
|
468
|
-
example_auth_backend_config = vault.azure.AuthBackendConfig("
|
469
|
-
backend=
|
365
|
+
example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="azure")
|
366
|
+
example_auth_backend_config = vault.azure.AuthBackendConfig("exampleAuthBackendConfig",
|
367
|
+
backend=example_auth_backend.path,
|
470
368
|
tenant_id="11111111-2222-3333-4444-555555555555",
|
471
369
|
client_id="11111111-2222-3333-4444-555555555555",
|
472
370
|
client_secret="01234567890123456789",
|
473
371
|
resource="https://vault.hashicorp.com")
|
474
372
|
```
|
373
|
+
<!--End PulumiCodeChooser -->
|
475
374
|
|
476
375
|
## Import
|
477
376
|
|
@@ -500,8 +399,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
500
399
|
client_id: Optional[pulumi.Input[str]] = None,
|
501
400
|
client_secret: Optional[pulumi.Input[str]] = None,
|
502
401
|
environment: Optional[pulumi.Input[str]] = None,
|
503
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
504
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
505
402
|
namespace: Optional[pulumi.Input[str]] = None,
|
506
403
|
resource: Optional[pulumi.Input[str]] = None,
|
507
404
|
tenant_id: Optional[pulumi.Input[str]] = None,
|
@@ -518,8 +415,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
518
415
|
__props__.__dict__["client_id"] = None if client_id is None else pulumi.Output.secret(client_id)
|
519
416
|
__props__.__dict__["client_secret"] = None if client_secret is None else pulumi.Output.secret(client_secret)
|
520
417
|
__props__.__dict__["environment"] = environment
|
521
|
-
__props__.__dict__["identity_token_audience"] = identity_token_audience
|
522
|
-
__props__.__dict__["identity_token_ttl"] = identity_token_ttl
|
523
418
|
__props__.__dict__["namespace"] = namespace
|
524
419
|
if resource is None and not opts.urn:
|
525
420
|
raise TypeError("Missing required property 'resource'")
|
@@ -543,8 +438,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
543
438
|
client_id: Optional[pulumi.Input[str]] = None,
|
544
439
|
client_secret: Optional[pulumi.Input[str]] = None,
|
545
440
|
environment: Optional[pulumi.Input[str]] = None,
|
546
|
-
identity_token_audience: Optional[pulumi.Input[str]] = None,
|
547
|
-
identity_token_ttl: Optional[pulumi.Input[int]] = None,
|
548
441
|
namespace: Optional[pulumi.Input[str]] = None,
|
549
442
|
resource: Optional[pulumi.Input[str]] = None,
|
550
443
|
tenant_id: Optional[pulumi.Input[str]] = None) -> 'AuthBackendConfig':
|
@@ -564,9 +457,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
564
457
|
:param pulumi.Input[str] environment: The Azure cloud environment. Valid values:
|
565
458
|
AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
|
566
459
|
AzureGermanCloud. Defaults to `AzurePublicCloud`.
|
567
|
-
:param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
568
|
-
*Available only for Vault Enterprise*
|
569
|
-
:param pulumi.Input[int] identity_token_ttl: The TTL of generated identity tokens in seconds.
|
570
460
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
571
461
|
The value should not contain leading or trailing forward slashes.
|
572
462
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -584,8 +474,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
584
474
|
__props__.__dict__["client_id"] = client_id
|
585
475
|
__props__.__dict__["client_secret"] = client_secret
|
586
476
|
__props__.__dict__["environment"] = environment
|
587
|
-
__props__.__dict__["identity_token_audience"] = identity_token_audience
|
588
|
-
__props__.__dict__["identity_token_ttl"] = identity_token_ttl
|
589
477
|
__props__.__dict__["namespace"] = namespace
|
590
478
|
__props__.__dict__["resource"] = resource
|
591
479
|
__props__.__dict__["tenant_id"] = tenant_id
|
@@ -628,23 +516,6 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
628
516
|
"""
|
629
517
|
return pulumi.get(self, "environment")
|
630
518
|
|
631
|
-
@property
|
632
|
-
@pulumi.getter(name="identityTokenAudience")
|
633
|
-
def identity_token_audience(self) -> pulumi.Output[Optional[str]]:
|
634
|
-
"""
|
635
|
-
The audience claim value for plugin identity tokens. Requires Vault 1.17+.
|
636
|
-
*Available only for Vault Enterprise*
|
637
|
-
"""
|
638
|
-
return pulumi.get(self, "identity_token_audience")
|
639
|
-
|
640
|
-
@property
|
641
|
-
@pulumi.getter(name="identityTokenTtl")
|
642
|
-
def identity_token_ttl(self) -> pulumi.Output[int]:
|
643
|
-
"""
|
644
|
-
The TTL of generated identity tokens in seconds.
|
645
|
-
"""
|
646
|
-
return pulumi.get(self, "identity_token_ttl")
|
647
|
-
|
648
519
|
@property
|
649
520
|
@pulumi.getter
|
650
521
|
def namespace(self) -> pulumi.Output[Optional[str]]:
|