pulumi-vault 6.2.0a1718953130__py3-none-any.whl → 6.3.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +26 -0
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/_utilities.py +40 -4
- pulumi_vault/auth_backend.py +47 -0
- pulumi_vault/aws/auth_backend_client.py +247 -7
- pulumi_vault/aws/secret_backend_role.py +169 -0
- pulumi_vault/azure/auth_backend_config.py +133 -0
- pulumi_vault/azure/backend.py +197 -0
- pulumi_vault/database/secrets_mount.py +282 -0
- pulumi_vault/gcp/auth_backend.py +244 -0
- pulumi_vault/gcp/secret_backend.py +271 -3
- pulumi_vault/generic/endpoint.py +6 -6
- pulumi_vault/identity/get_entity.py +2 -2
- pulumi_vault/jwt/auth_backend_role.py +28 -35
- pulumi_vault/kubernetes/secret_backend.py +282 -0
- pulumi_vault/ldap/secret_backend.py +282 -0
- pulumi_vault/mount.py +331 -0
- pulumi_vault/okta/auth_backend.py +441 -0
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/pkisecret/__init__.py +2 -0
- pulumi_vault/pkisecret/_inputs.py +40 -0
- pulumi_vault/pkisecret/backend_config_est.py +614 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +233 -0
- pulumi_vault/pkisecret/outputs.py +64 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +2 -2
- pulumi_vault/pkisecret/secret_backend_config_ca.py +2 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +2 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2 -2
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2 -2
- pulumi_vault/pkisecret/secret_backend_sign.py +2 -2
- pulumi_vault/plugin.py +590 -0
- pulumi_vault/plugin_pinned_version.py +293 -0
- pulumi_vault/provider.py +1 -3
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +47 -0
- pulumi_vault/quota_rate_limit.py +47 -0
- pulumi_vault/ssh/secret_backend_ca.py +94 -0
- {pulumi_vault-6.2.0a1718953130.dist-info → pulumi_vault-6.3.0.dist-info}/METADATA +1 -1
- {pulumi_vault-6.2.0a1718953130.dist-info → pulumi_vault-6.3.0.dist-info}/RECORD +41 -37
- {pulumi_vault-6.2.0a1718953130.dist-info → pulumi_vault-6.3.0.dist-info}/WHEEL +1 -1
- {pulumi_vault-6.2.0a1718953130.dist-info → pulumi_vault-6.3.0.dist-info}/top_level.txt +0 -0
@@ -17,7 +17,9 @@ class SecretBackendRoleArgs:
|
|
17
17
|
backend: pulumi.Input[str],
|
18
18
|
credential_type: pulumi.Input[str],
|
19
19
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
20
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
20
21
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
22
|
+
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
21
23
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
22
24
|
name: Optional[pulumi.Input[str]] = None,
|
23
25
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -25,6 +27,7 @@ class SecretBackendRoleArgs:
|
|
25
27
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
26
28
|
policy_document: Optional[pulumi.Input[str]] = None,
|
27
29
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
28
31
|
user_path: Optional[pulumi.Input[str]] = None):
|
29
32
|
"""
|
30
33
|
The set of arguments for constructing a SecretBackendRole resource.
|
@@ -38,12 +41,16 @@ class SecretBackendRoleArgs:
|
|
38
41
|
and a default TTL is specified on the role,
|
39
42
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
40
43
|
`assumed_role` or `federation_token`.
|
44
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
45
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
41
46
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
42
47
|
against this vault role will be added to these IAM Groups. For a credential
|
43
48
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
44
49
|
corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the
|
45
50
|
policies from each group in `iam_groups` combined with the `policy_document`
|
46
51
|
and `policy_arns` parameters.
|
52
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] iam_tags: A map of strings representing key/value pairs
|
53
|
+
to be used as tags for any IAM user that is created by this role.
|
47
54
|
:param pulumi.Input[int] max_sts_ttl: The max allowed TTL in seconds for STS credentials
|
48
55
|
(credentials TTL are capped to `max_sts_ttl`). Valid only when `credential_type` is
|
49
56
|
one of `assumed_role` or `federation_token`.
|
@@ -72,6 +79,9 @@ class SecretBackendRoleArgs:
|
|
72
79
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
73
80
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
74
81
|
prohibited otherwise.
|
82
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
83
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
84
|
+
`assumed_role`.
|
75
85
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
76
86
|
`credential_type` is `iam_user`. Default is `/`.
|
77
87
|
"""
|
@@ -79,8 +89,12 @@ class SecretBackendRoleArgs:
|
|
79
89
|
pulumi.set(__self__, "credential_type", credential_type)
|
80
90
|
if default_sts_ttl is not None:
|
81
91
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
92
|
+
if external_id is not None:
|
93
|
+
pulumi.set(__self__, "external_id", external_id)
|
82
94
|
if iam_groups is not None:
|
83
95
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
96
|
+
if iam_tags is not None:
|
97
|
+
pulumi.set(__self__, "iam_tags", iam_tags)
|
84
98
|
if max_sts_ttl is not None:
|
85
99
|
pulumi.set(__self__, "max_sts_ttl", max_sts_ttl)
|
86
100
|
if name is not None:
|
@@ -95,6 +109,8 @@ class SecretBackendRoleArgs:
|
|
95
109
|
pulumi.set(__self__, "policy_document", policy_document)
|
96
110
|
if role_arns is not None:
|
97
111
|
pulumi.set(__self__, "role_arns", role_arns)
|
112
|
+
if session_tags is not None:
|
113
|
+
pulumi.set(__self__, "session_tags", session_tags)
|
98
114
|
if user_path is not None:
|
99
115
|
pulumi.set(__self__, "user_path", user_path)
|
100
116
|
|
@@ -141,6 +157,19 @@ class SecretBackendRoleArgs:
|
|
141
157
|
def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
|
142
158
|
pulumi.set(self, "default_sts_ttl", value)
|
143
159
|
|
160
|
+
@property
|
161
|
+
@pulumi.getter(name="externalId")
|
162
|
+
def external_id(self) -> Optional[pulumi.Input[str]]:
|
163
|
+
"""
|
164
|
+
External ID to set for assume role creds.
|
165
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
166
|
+
"""
|
167
|
+
return pulumi.get(self, "external_id")
|
168
|
+
|
169
|
+
@external_id.setter
|
170
|
+
def external_id(self, value: Optional[pulumi.Input[str]]):
|
171
|
+
pulumi.set(self, "external_id", value)
|
172
|
+
|
144
173
|
@property
|
145
174
|
@pulumi.getter(name="iamGroups")
|
146
175
|
def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -158,6 +187,19 @@ class SecretBackendRoleArgs:
|
|
158
187
|
def iam_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
159
188
|
pulumi.set(self, "iam_groups", value)
|
160
189
|
|
190
|
+
@property
|
191
|
+
@pulumi.getter(name="iamTags")
|
192
|
+
def iam_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
193
|
+
"""
|
194
|
+
A map of strings representing key/value pairs
|
195
|
+
to be used as tags for any IAM user that is created by this role.
|
196
|
+
"""
|
197
|
+
return pulumi.get(self, "iam_tags")
|
198
|
+
|
199
|
+
@iam_tags.setter
|
200
|
+
def iam_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
201
|
+
pulumi.set(self, "iam_tags", value)
|
202
|
+
|
161
203
|
@property
|
162
204
|
@pulumi.getter(name="maxStsTtl")
|
163
205
|
def max_sts_ttl(self) -> Optional[pulumi.Input[int]]:
|
@@ -263,6 +305,20 @@ class SecretBackendRoleArgs:
|
|
263
305
|
def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
264
306
|
pulumi.set(self, "role_arns", value)
|
265
307
|
|
308
|
+
@property
|
309
|
+
@pulumi.getter(name="sessionTags")
|
310
|
+
def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
311
|
+
"""
|
312
|
+
A map of strings representing key/value pairs to be set
|
313
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
314
|
+
`assumed_role`.
|
315
|
+
"""
|
316
|
+
return pulumi.get(self, "session_tags")
|
317
|
+
|
318
|
+
@session_tags.setter
|
319
|
+
def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
320
|
+
pulumi.set(self, "session_tags", value)
|
321
|
+
|
266
322
|
@property
|
267
323
|
@pulumi.getter(name="userPath")
|
268
324
|
def user_path(self) -> Optional[pulumi.Input[str]]:
|
@@ -283,7 +339,9 @@ class _SecretBackendRoleState:
|
|
283
339
|
backend: Optional[pulumi.Input[str]] = None,
|
284
340
|
credential_type: Optional[pulumi.Input[str]] = None,
|
285
341
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
342
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
286
343
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
344
|
+
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
287
345
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
288
346
|
name: Optional[pulumi.Input[str]] = None,
|
289
347
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -291,6 +349,7 @@ class _SecretBackendRoleState:
|
|
291
349
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
292
350
|
policy_document: Optional[pulumi.Input[str]] = None,
|
293
351
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
352
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
294
353
|
user_path: Optional[pulumi.Input[str]] = None):
|
295
354
|
"""
|
296
355
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
@@ -304,12 +363,16 @@ class _SecretBackendRoleState:
|
|
304
363
|
and a default TTL is specified on the role,
|
305
364
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
306
365
|
`assumed_role` or `federation_token`.
|
366
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
367
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
307
368
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
308
369
|
against this vault role will be added to these IAM Groups. For a credential
|
309
370
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
310
371
|
corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the
|
311
372
|
policies from each group in `iam_groups` combined with the `policy_document`
|
312
373
|
and `policy_arns` parameters.
|
374
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] iam_tags: A map of strings representing key/value pairs
|
375
|
+
to be used as tags for any IAM user that is created by this role.
|
313
376
|
:param pulumi.Input[int] max_sts_ttl: The max allowed TTL in seconds for STS credentials
|
314
377
|
(credentials TTL are capped to `max_sts_ttl`). Valid only when `credential_type` is
|
315
378
|
one of `assumed_role` or `federation_token`.
|
@@ -338,6 +401,9 @@ class _SecretBackendRoleState:
|
|
338
401
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
339
402
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
340
403
|
prohibited otherwise.
|
404
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
405
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
406
|
+
`assumed_role`.
|
341
407
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
342
408
|
`credential_type` is `iam_user`. Default is `/`.
|
343
409
|
"""
|
@@ -347,8 +413,12 @@ class _SecretBackendRoleState:
|
|
347
413
|
pulumi.set(__self__, "credential_type", credential_type)
|
348
414
|
if default_sts_ttl is not None:
|
349
415
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
416
|
+
if external_id is not None:
|
417
|
+
pulumi.set(__self__, "external_id", external_id)
|
350
418
|
if iam_groups is not None:
|
351
419
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
420
|
+
if iam_tags is not None:
|
421
|
+
pulumi.set(__self__, "iam_tags", iam_tags)
|
352
422
|
if max_sts_ttl is not None:
|
353
423
|
pulumi.set(__self__, "max_sts_ttl", max_sts_ttl)
|
354
424
|
if name is not None:
|
@@ -363,6 +433,8 @@ class _SecretBackendRoleState:
|
|
363
433
|
pulumi.set(__self__, "policy_document", policy_document)
|
364
434
|
if role_arns is not None:
|
365
435
|
pulumi.set(__self__, "role_arns", role_arns)
|
436
|
+
if session_tags is not None:
|
437
|
+
pulumi.set(__self__, "session_tags", session_tags)
|
366
438
|
if user_path is not None:
|
367
439
|
pulumi.set(__self__, "user_path", user_path)
|
368
440
|
|
@@ -409,6 +481,19 @@ class _SecretBackendRoleState:
|
|
409
481
|
def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
|
410
482
|
pulumi.set(self, "default_sts_ttl", value)
|
411
483
|
|
484
|
+
@property
|
485
|
+
@pulumi.getter(name="externalId")
|
486
|
+
def external_id(self) -> Optional[pulumi.Input[str]]:
|
487
|
+
"""
|
488
|
+
External ID to set for assume role creds.
|
489
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
490
|
+
"""
|
491
|
+
return pulumi.get(self, "external_id")
|
492
|
+
|
493
|
+
@external_id.setter
|
494
|
+
def external_id(self, value: Optional[pulumi.Input[str]]):
|
495
|
+
pulumi.set(self, "external_id", value)
|
496
|
+
|
412
497
|
@property
|
413
498
|
@pulumi.getter(name="iamGroups")
|
414
499
|
def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -426,6 +511,19 @@ class _SecretBackendRoleState:
|
|
426
511
|
def iam_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
427
512
|
pulumi.set(self, "iam_groups", value)
|
428
513
|
|
514
|
+
@property
|
515
|
+
@pulumi.getter(name="iamTags")
|
516
|
+
def iam_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
517
|
+
"""
|
518
|
+
A map of strings representing key/value pairs
|
519
|
+
to be used as tags for any IAM user that is created by this role.
|
520
|
+
"""
|
521
|
+
return pulumi.get(self, "iam_tags")
|
522
|
+
|
523
|
+
@iam_tags.setter
|
524
|
+
def iam_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
525
|
+
pulumi.set(self, "iam_tags", value)
|
526
|
+
|
429
527
|
@property
|
430
528
|
@pulumi.getter(name="maxStsTtl")
|
431
529
|
def max_sts_ttl(self) -> Optional[pulumi.Input[int]]:
|
@@ -531,6 +629,20 @@ class _SecretBackendRoleState:
|
|
531
629
|
def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
532
630
|
pulumi.set(self, "role_arns", value)
|
533
631
|
|
632
|
+
@property
|
633
|
+
@pulumi.getter(name="sessionTags")
|
634
|
+
def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
635
|
+
"""
|
636
|
+
A map of strings representing key/value pairs to be set
|
637
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
638
|
+
`assumed_role`.
|
639
|
+
"""
|
640
|
+
return pulumi.get(self, "session_tags")
|
641
|
+
|
642
|
+
@session_tags.setter
|
643
|
+
def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
644
|
+
pulumi.set(self, "session_tags", value)
|
645
|
+
|
534
646
|
@property
|
535
647
|
@pulumi.getter(name="userPath")
|
536
648
|
def user_path(self) -> Optional[pulumi.Input[str]]:
|
@@ -553,7 +665,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
553
665
|
backend: Optional[pulumi.Input[str]] = None,
|
554
666
|
credential_type: Optional[pulumi.Input[str]] = None,
|
555
667
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
668
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
556
669
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
670
|
+
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
557
671
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
558
672
|
name: Optional[pulumi.Input[str]] = None,
|
559
673
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -561,6 +675,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
561
675
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
562
676
|
policy_document: Optional[pulumi.Input[str]] = None,
|
563
677
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
678
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
564
679
|
user_path: Optional[pulumi.Input[str]] = None,
|
565
680
|
__props__=None):
|
566
681
|
"""
|
@@ -610,12 +725,16 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
610
725
|
and a default TTL is specified on the role,
|
611
726
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
612
727
|
`assumed_role` or `federation_token`.
|
728
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
729
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
613
730
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
614
731
|
against this vault role will be added to these IAM Groups. For a credential
|
615
732
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
616
733
|
corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the
|
617
734
|
policies from each group in `iam_groups` combined with the `policy_document`
|
618
735
|
and `policy_arns` parameters.
|
736
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] iam_tags: A map of strings representing key/value pairs
|
737
|
+
to be used as tags for any IAM user that is created by this role.
|
619
738
|
:param pulumi.Input[int] max_sts_ttl: The max allowed TTL in seconds for STS credentials
|
620
739
|
(credentials TTL are capped to `max_sts_ttl`). Valid only when `credential_type` is
|
621
740
|
one of `assumed_role` or `federation_token`.
|
@@ -644,6 +763,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
644
763
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
645
764
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
646
765
|
prohibited otherwise.
|
766
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
767
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
768
|
+
`assumed_role`.
|
647
769
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
648
770
|
`credential_type` is `iam_user`. Default is `/`.
|
649
771
|
"""
|
@@ -706,7 +828,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
706
828
|
backend: Optional[pulumi.Input[str]] = None,
|
707
829
|
credential_type: Optional[pulumi.Input[str]] = None,
|
708
830
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
831
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
709
832
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
833
|
+
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
710
834
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
711
835
|
name: Optional[pulumi.Input[str]] = None,
|
712
836
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -714,6 +838,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
714
838
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
715
839
|
policy_document: Optional[pulumi.Input[str]] = None,
|
716
840
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
841
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
717
842
|
user_path: Optional[pulumi.Input[str]] = None,
|
718
843
|
__props__=None):
|
719
844
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -731,7 +856,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
731
856
|
raise TypeError("Missing required property 'credential_type'")
|
732
857
|
__props__.__dict__["credential_type"] = credential_type
|
733
858
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
859
|
+
__props__.__dict__["external_id"] = external_id
|
734
860
|
__props__.__dict__["iam_groups"] = iam_groups
|
861
|
+
__props__.__dict__["iam_tags"] = iam_tags
|
735
862
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
736
863
|
__props__.__dict__["name"] = name
|
737
864
|
__props__.__dict__["namespace"] = namespace
|
@@ -739,6 +866,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
739
866
|
__props__.__dict__["policy_arns"] = policy_arns
|
740
867
|
__props__.__dict__["policy_document"] = policy_document
|
741
868
|
__props__.__dict__["role_arns"] = role_arns
|
869
|
+
__props__.__dict__["session_tags"] = session_tags
|
742
870
|
__props__.__dict__["user_path"] = user_path
|
743
871
|
super(SecretBackendRole, __self__).__init__(
|
744
872
|
'vault:aws/secretBackendRole:SecretBackendRole',
|
@@ -753,7 +881,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
753
881
|
backend: Optional[pulumi.Input[str]] = None,
|
754
882
|
credential_type: Optional[pulumi.Input[str]] = None,
|
755
883
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
884
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
756
885
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
886
|
+
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
757
887
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
758
888
|
name: Optional[pulumi.Input[str]] = None,
|
759
889
|
namespace: Optional[pulumi.Input[str]] = None,
|
@@ -761,6 +891,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
761
891
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
762
892
|
policy_document: Optional[pulumi.Input[str]] = None,
|
763
893
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
894
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
764
895
|
user_path: Optional[pulumi.Input[str]] = None) -> 'SecretBackendRole':
|
765
896
|
"""
|
766
897
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
@@ -779,12 +910,16 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
779
910
|
and a default TTL is specified on the role,
|
780
911
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
781
912
|
`assumed_role` or `federation_token`.
|
913
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
914
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
782
915
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
783
916
|
against this vault role will be added to these IAM Groups. For a credential
|
784
917
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
785
918
|
corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the
|
786
919
|
policies from each group in `iam_groups` combined with the `policy_document`
|
787
920
|
and `policy_arns` parameters.
|
921
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] iam_tags: A map of strings representing key/value pairs
|
922
|
+
to be used as tags for any IAM user that is created by this role.
|
788
923
|
:param pulumi.Input[int] max_sts_ttl: The max allowed TTL in seconds for STS credentials
|
789
924
|
(credentials TTL are capped to `max_sts_ttl`). Valid only when `credential_type` is
|
790
925
|
one of `assumed_role` or `federation_token`.
|
@@ -813,6 +948,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
813
948
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
814
949
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
815
950
|
prohibited otherwise.
|
951
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
952
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
953
|
+
`assumed_role`.
|
816
954
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
817
955
|
`credential_type` is `iam_user`. Default is `/`.
|
818
956
|
"""
|
@@ -823,7 +961,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
823
961
|
__props__.__dict__["backend"] = backend
|
824
962
|
__props__.__dict__["credential_type"] = credential_type
|
825
963
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
964
|
+
__props__.__dict__["external_id"] = external_id
|
826
965
|
__props__.__dict__["iam_groups"] = iam_groups
|
966
|
+
__props__.__dict__["iam_tags"] = iam_tags
|
827
967
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
828
968
|
__props__.__dict__["name"] = name
|
829
969
|
__props__.__dict__["namespace"] = namespace
|
@@ -831,6 +971,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
831
971
|
__props__.__dict__["policy_arns"] = policy_arns
|
832
972
|
__props__.__dict__["policy_document"] = policy_document
|
833
973
|
__props__.__dict__["role_arns"] = role_arns
|
974
|
+
__props__.__dict__["session_tags"] = session_tags
|
834
975
|
__props__.__dict__["user_path"] = user_path
|
835
976
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
836
977
|
|
@@ -865,6 +1006,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
865
1006
|
"""
|
866
1007
|
return pulumi.get(self, "default_sts_ttl")
|
867
1008
|
|
1009
|
+
@property
|
1010
|
+
@pulumi.getter(name="externalId")
|
1011
|
+
def external_id(self) -> pulumi.Output[Optional[str]]:
|
1012
|
+
"""
|
1013
|
+
External ID to set for assume role creds.
|
1014
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
1015
|
+
"""
|
1016
|
+
return pulumi.get(self, "external_id")
|
1017
|
+
|
868
1018
|
@property
|
869
1019
|
@pulumi.getter(name="iamGroups")
|
870
1020
|
def iam_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
@@ -878,6 +1028,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
878
1028
|
"""
|
879
1029
|
return pulumi.get(self, "iam_groups")
|
880
1030
|
|
1031
|
+
@property
|
1032
|
+
@pulumi.getter(name="iamTags")
|
1033
|
+
def iam_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1034
|
+
"""
|
1035
|
+
A map of strings representing key/value pairs
|
1036
|
+
to be used as tags for any IAM user that is created by this role.
|
1037
|
+
"""
|
1038
|
+
return pulumi.get(self, "iam_tags")
|
1039
|
+
|
881
1040
|
@property
|
882
1041
|
@pulumi.getter(name="maxStsTtl")
|
883
1042
|
def max_sts_ttl(self) -> pulumi.Output[int]:
|
@@ -955,6 +1114,16 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
955
1114
|
"""
|
956
1115
|
return pulumi.get(self, "role_arns")
|
957
1116
|
|
1117
|
+
@property
|
1118
|
+
@pulumi.getter(name="sessionTags")
|
1119
|
+
def session_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1120
|
+
"""
|
1121
|
+
A map of strings representing key/value pairs to be set
|
1122
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
1123
|
+
`assumed_role`.
|
1124
|
+
"""
|
1125
|
+
return pulumi.get(self, "session_tags")
|
1126
|
+
|
958
1127
|
@property
|
959
1128
|
@pulumi.getter(name="userPath")
|
960
1129
|
def user_path(self) -> pulumi.Output[Optional[str]]:
|