pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.0a1723109142__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/aws/secret_backend_role.py +115 -0
- pulumi_vault/identity/get_entity.py +2 -2
- pulumi_vault/mount.py +14 -7
- pulumi_vault/pulumi-plugin.json +1 -1
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.0a1723109142.dist-info}/METADATA +1 -1
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.0a1723109142.dist-info}/RECORD +8 -8
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.0a1723109142.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.0a1723109142.dist-info}/top_level.txt +0 -0
@@ -17,6 +17,7 @@ class SecretBackendRoleArgs:
|
|
17
17
|
backend: pulumi.Input[str],
|
18
18
|
credential_type: pulumi.Input[str],
|
19
19
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
20
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
20
21
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
22
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
22
23
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -26,6 +27,7 @@ class SecretBackendRoleArgs:
|
|
26
27
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
27
28
|
policy_document: Optional[pulumi.Input[str]] = None,
|
28
29
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
29
31
|
user_path: Optional[pulumi.Input[str]] = None):
|
30
32
|
"""
|
31
33
|
The set of arguments for constructing a SecretBackendRole resource.
|
@@ -39,6 +41,8 @@ class SecretBackendRoleArgs:
|
|
39
41
|
and a default TTL is specified on the role,
|
40
42
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
41
43
|
`assumed_role` or `federation_token`.
|
44
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
45
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
42
46
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
43
47
|
against this vault role will be added to these IAM Groups. For a credential
|
44
48
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -75,6 +79,9 @@ class SecretBackendRoleArgs:
|
|
75
79
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
76
80
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
77
81
|
prohibited otherwise.
|
82
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
83
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
84
|
+
`assumed_role`.
|
78
85
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
79
86
|
`credential_type` is `iam_user`. Default is `/`.
|
80
87
|
"""
|
@@ -82,6 +89,8 @@ class SecretBackendRoleArgs:
|
|
82
89
|
pulumi.set(__self__, "credential_type", credential_type)
|
83
90
|
if default_sts_ttl is not None:
|
84
91
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
92
|
+
if external_id is not None:
|
93
|
+
pulumi.set(__self__, "external_id", external_id)
|
85
94
|
if iam_groups is not None:
|
86
95
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
87
96
|
if iam_tags is not None:
|
@@ -100,6 +109,8 @@ class SecretBackendRoleArgs:
|
|
100
109
|
pulumi.set(__self__, "policy_document", policy_document)
|
101
110
|
if role_arns is not None:
|
102
111
|
pulumi.set(__self__, "role_arns", role_arns)
|
112
|
+
if session_tags is not None:
|
113
|
+
pulumi.set(__self__, "session_tags", session_tags)
|
103
114
|
if user_path is not None:
|
104
115
|
pulumi.set(__self__, "user_path", user_path)
|
105
116
|
|
@@ -146,6 +157,19 @@ class SecretBackendRoleArgs:
|
|
146
157
|
def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
|
147
158
|
pulumi.set(self, "default_sts_ttl", value)
|
148
159
|
|
160
|
+
@property
|
161
|
+
@pulumi.getter(name="externalId")
|
162
|
+
def external_id(self) -> Optional[pulumi.Input[str]]:
|
163
|
+
"""
|
164
|
+
External ID to set for assume role creds.
|
165
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
166
|
+
"""
|
167
|
+
return pulumi.get(self, "external_id")
|
168
|
+
|
169
|
+
@external_id.setter
|
170
|
+
def external_id(self, value: Optional[pulumi.Input[str]]):
|
171
|
+
pulumi.set(self, "external_id", value)
|
172
|
+
|
149
173
|
@property
|
150
174
|
@pulumi.getter(name="iamGroups")
|
151
175
|
def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -281,6 +305,20 @@ class SecretBackendRoleArgs:
|
|
281
305
|
def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
282
306
|
pulumi.set(self, "role_arns", value)
|
283
307
|
|
308
|
+
@property
|
309
|
+
@pulumi.getter(name="sessionTags")
|
310
|
+
def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
311
|
+
"""
|
312
|
+
A map of strings representing key/value pairs to be set
|
313
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
314
|
+
`assumed_role`.
|
315
|
+
"""
|
316
|
+
return pulumi.get(self, "session_tags")
|
317
|
+
|
318
|
+
@session_tags.setter
|
319
|
+
def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
320
|
+
pulumi.set(self, "session_tags", value)
|
321
|
+
|
284
322
|
@property
|
285
323
|
@pulumi.getter(name="userPath")
|
286
324
|
def user_path(self) -> Optional[pulumi.Input[str]]:
|
@@ -301,6 +339,7 @@ class _SecretBackendRoleState:
|
|
301
339
|
backend: Optional[pulumi.Input[str]] = None,
|
302
340
|
credential_type: Optional[pulumi.Input[str]] = None,
|
303
341
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
342
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
304
343
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
305
344
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
306
345
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -310,6 +349,7 @@ class _SecretBackendRoleState:
|
|
310
349
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
311
350
|
policy_document: Optional[pulumi.Input[str]] = None,
|
312
351
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
352
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
313
353
|
user_path: Optional[pulumi.Input[str]] = None):
|
314
354
|
"""
|
315
355
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
@@ -323,6 +363,8 @@ class _SecretBackendRoleState:
|
|
323
363
|
and a default TTL is specified on the role,
|
324
364
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
325
365
|
`assumed_role` or `federation_token`.
|
366
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
367
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
326
368
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
327
369
|
against this vault role will be added to these IAM Groups. For a credential
|
328
370
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -359,6 +401,9 @@ class _SecretBackendRoleState:
|
|
359
401
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
360
402
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
361
403
|
prohibited otherwise.
|
404
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
405
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
406
|
+
`assumed_role`.
|
362
407
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
363
408
|
`credential_type` is `iam_user`. Default is `/`.
|
364
409
|
"""
|
@@ -368,6 +413,8 @@ class _SecretBackendRoleState:
|
|
368
413
|
pulumi.set(__self__, "credential_type", credential_type)
|
369
414
|
if default_sts_ttl is not None:
|
370
415
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
416
|
+
if external_id is not None:
|
417
|
+
pulumi.set(__self__, "external_id", external_id)
|
371
418
|
if iam_groups is not None:
|
372
419
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
373
420
|
if iam_tags is not None:
|
@@ -386,6 +433,8 @@ class _SecretBackendRoleState:
|
|
386
433
|
pulumi.set(__self__, "policy_document", policy_document)
|
387
434
|
if role_arns is not None:
|
388
435
|
pulumi.set(__self__, "role_arns", role_arns)
|
436
|
+
if session_tags is not None:
|
437
|
+
pulumi.set(__self__, "session_tags", session_tags)
|
389
438
|
if user_path is not None:
|
390
439
|
pulumi.set(__self__, "user_path", user_path)
|
391
440
|
|
@@ -432,6 +481,19 @@ class _SecretBackendRoleState:
|
|
432
481
|
def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
|
433
482
|
pulumi.set(self, "default_sts_ttl", value)
|
434
483
|
|
484
|
+
@property
|
485
|
+
@pulumi.getter(name="externalId")
|
486
|
+
def external_id(self) -> Optional[pulumi.Input[str]]:
|
487
|
+
"""
|
488
|
+
External ID to set for assume role creds.
|
489
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
490
|
+
"""
|
491
|
+
return pulumi.get(self, "external_id")
|
492
|
+
|
493
|
+
@external_id.setter
|
494
|
+
def external_id(self, value: Optional[pulumi.Input[str]]):
|
495
|
+
pulumi.set(self, "external_id", value)
|
496
|
+
|
435
497
|
@property
|
436
498
|
@pulumi.getter(name="iamGroups")
|
437
499
|
def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -567,6 +629,20 @@ class _SecretBackendRoleState:
|
|
567
629
|
def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
568
630
|
pulumi.set(self, "role_arns", value)
|
569
631
|
|
632
|
+
@property
|
633
|
+
@pulumi.getter(name="sessionTags")
|
634
|
+
def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
635
|
+
"""
|
636
|
+
A map of strings representing key/value pairs to be set
|
637
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
638
|
+
`assumed_role`.
|
639
|
+
"""
|
640
|
+
return pulumi.get(self, "session_tags")
|
641
|
+
|
642
|
+
@session_tags.setter
|
643
|
+
def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
644
|
+
pulumi.set(self, "session_tags", value)
|
645
|
+
|
570
646
|
@property
|
571
647
|
@pulumi.getter(name="userPath")
|
572
648
|
def user_path(self) -> Optional[pulumi.Input[str]]:
|
@@ -589,6 +665,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
589
665
|
backend: Optional[pulumi.Input[str]] = None,
|
590
666
|
credential_type: Optional[pulumi.Input[str]] = None,
|
591
667
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
668
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
592
669
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
593
670
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
594
671
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -598,6 +675,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
598
675
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
599
676
|
policy_document: Optional[pulumi.Input[str]] = None,
|
600
677
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
678
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
601
679
|
user_path: Optional[pulumi.Input[str]] = None,
|
602
680
|
__props__=None):
|
603
681
|
"""
|
@@ -647,6 +725,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
647
725
|
and a default TTL is specified on the role,
|
648
726
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
649
727
|
`assumed_role` or `federation_token`.
|
728
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
729
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
650
730
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
651
731
|
against this vault role will be added to these IAM Groups. For a credential
|
652
732
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -683,6 +763,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
683
763
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
684
764
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
685
765
|
prohibited otherwise.
|
766
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
767
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
768
|
+
`assumed_role`.
|
686
769
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
687
770
|
`credential_type` is `iam_user`. Default is `/`.
|
688
771
|
"""
|
@@ -745,6 +828,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
745
828
|
backend: Optional[pulumi.Input[str]] = None,
|
746
829
|
credential_type: Optional[pulumi.Input[str]] = None,
|
747
830
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
831
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
748
832
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
749
833
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
750
834
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -754,6 +838,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
754
838
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
755
839
|
policy_document: Optional[pulumi.Input[str]] = None,
|
756
840
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
841
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
757
842
|
user_path: Optional[pulumi.Input[str]] = None,
|
758
843
|
__props__=None):
|
759
844
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -771,6 +856,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
771
856
|
raise TypeError("Missing required property 'credential_type'")
|
772
857
|
__props__.__dict__["credential_type"] = credential_type
|
773
858
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
859
|
+
__props__.__dict__["external_id"] = external_id
|
774
860
|
__props__.__dict__["iam_groups"] = iam_groups
|
775
861
|
__props__.__dict__["iam_tags"] = iam_tags
|
776
862
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
@@ -780,6 +866,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
780
866
|
__props__.__dict__["policy_arns"] = policy_arns
|
781
867
|
__props__.__dict__["policy_document"] = policy_document
|
782
868
|
__props__.__dict__["role_arns"] = role_arns
|
869
|
+
__props__.__dict__["session_tags"] = session_tags
|
783
870
|
__props__.__dict__["user_path"] = user_path
|
784
871
|
super(SecretBackendRole, __self__).__init__(
|
785
872
|
'vault:aws/secretBackendRole:SecretBackendRole',
|
@@ -794,6 +881,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
794
881
|
backend: Optional[pulumi.Input[str]] = None,
|
795
882
|
credential_type: Optional[pulumi.Input[str]] = None,
|
796
883
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
884
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
797
885
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
798
886
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
799
887
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -803,6 +891,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
803
891
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
804
892
|
policy_document: Optional[pulumi.Input[str]] = None,
|
805
893
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
894
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
806
895
|
user_path: Optional[pulumi.Input[str]] = None) -> 'SecretBackendRole':
|
807
896
|
"""
|
808
897
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
@@ -821,6 +910,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
821
910
|
and a default TTL is specified on the role,
|
822
911
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
823
912
|
`assumed_role` or `federation_token`.
|
913
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
914
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
824
915
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
825
916
|
against this vault role will be added to these IAM Groups. For a credential
|
826
917
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -857,6 +948,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
857
948
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
858
949
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
859
950
|
prohibited otherwise.
|
951
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
952
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
953
|
+
`assumed_role`.
|
860
954
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
861
955
|
`credential_type` is `iam_user`. Default is `/`.
|
862
956
|
"""
|
@@ -867,6 +961,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
867
961
|
__props__.__dict__["backend"] = backend
|
868
962
|
__props__.__dict__["credential_type"] = credential_type
|
869
963
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
964
|
+
__props__.__dict__["external_id"] = external_id
|
870
965
|
__props__.__dict__["iam_groups"] = iam_groups
|
871
966
|
__props__.__dict__["iam_tags"] = iam_tags
|
872
967
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
@@ -876,6 +971,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
876
971
|
__props__.__dict__["policy_arns"] = policy_arns
|
877
972
|
__props__.__dict__["policy_document"] = policy_document
|
878
973
|
__props__.__dict__["role_arns"] = role_arns
|
974
|
+
__props__.__dict__["session_tags"] = session_tags
|
879
975
|
__props__.__dict__["user_path"] = user_path
|
880
976
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
881
977
|
|
@@ -910,6 +1006,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
910
1006
|
"""
|
911
1007
|
return pulumi.get(self, "default_sts_ttl")
|
912
1008
|
|
1009
|
+
@property
|
1010
|
+
@pulumi.getter(name="externalId")
|
1011
|
+
def external_id(self) -> pulumi.Output[Optional[str]]:
|
1012
|
+
"""
|
1013
|
+
External ID to set for assume role creds.
|
1014
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
1015
|
+
"""
|
1016
|
+
return pulumi.get(self, "external_id")
|
1017
|
+
|
913
1018
|
@property
|
914
1019
|
@pulumi.getter(name="iamGroups")
|
915
1020
|
def iam_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
@@ -1009,6 +1114,16 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1009
1114
|
"""
|
1010
1115
|
return pulumi.get(self, "role_arns")
|
1011
1116
|
|
1117
|
+
@property
|
1118
|
+
@pulumi.getter(name="sessionTags")
|
1119
|
+
def session_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1120
|
+
"""
|
1121
|
+
A map of strings representing key/value pairs to be set
|
1122
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
1123
|
+
`assumed_role`.
|
1124
|
+
"""
|
1125
|
+
return pulumi.get(self, "session_tags")
|
1126
|
+
|
1012
1127
|
@property
|
1013
1128
|
@pulumi.getter(name="userPath")
|
1014
1129
|
def user_path(self) -> pulumi.Output[Optional[str]]:
|
@@ -263,7 +263,7 @@ def get_entity(alias_id: Optional[str] = None,
|
|
263
263
|
|
264
264
|
## Required Vault Capabilities
|
265
265
|
|
266
|
-
Use of this resource requires the `
|
266
|
+
Use of this resource requires the `update` capability on `/identity/lookup/entity`.
|
267
267
|
|
268
268
|
|
269
269
|
:param str alias_id: ID of the alias.
|
@@ -333,7 +333,7 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
333
333
|
|
334
334
|
## Required Vault Capabilities
|
335
335
|
|
336
|
-
Use of this resource requires the `
|
336
|
+
Use of this resource requires the `update` capability on `/identity/lookup/entity`.
|
337
337
|
|
338
338
|
|
339
339
|
:param str alias_id: ID of the alias.
|
pulumi_vault/mount.py
CHANGED
@@ -49,7 +49,8 @@ class MountArgs:
|
|
49
49
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
50
50
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
51
51
|
not provided, this will default to Vault's OIDC default key.
|
52
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
52
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
53
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
53
54
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
54
55
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
55
56
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -240,7 +241,8 @@ class MountArgs:
|
|
240
241
|
@pulumi.getter(name="listingVisibility")
|
241
242
|
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
242
243
|
"""
|
243
|
-
Specifies whether to show this mount in the UI-specific
|
244
|
+
Specifies whether to show this mount in the UI-specific
|
245
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
244
246
|
"""
|
245
247
|
return pulumi.get(self, "listing_visibility")
|
246
248
|
|
@@ -377,7 +379,8 @@ class _MountState:
|
|
377
379
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
378
380
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
379
381
|
not provided, this will default to Vault's OIDC default key.
|
380
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
382
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
383
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
381
384
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
382
385
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
383
386
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -562,7 +565,8 @@ class _MountState:
|
|
562
565
|
@pulumi.getter(name="listingVisibility")
|
563
566
|
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
564
567
|
"""
|
565
|
-
Specifies whether to show this mount in the UI-specific
|
568
|
+
Specifies whether to show this mount in the UI-specific
|
569
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
566
570
|
"""
|
567
571
|
return pulumi.get(self, "listing_visibility")
|
568
572
|
|
@@ -786,7 +790,8 @@ class Mount(pulumi.CustomResource):
|
|
786
790
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
787
791
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
788
792
|
not provided, this will default to Vault's OIDC default key.
|
789
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
793
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
794
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
790
795
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
791
796
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
792
797
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -988,7 +993,8 @@ class Mount(pulumi.CustomResource):
|
|
988
993
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
989
994
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
990
995
|
not provided, this will default to Vault's OIDC default key.
|
991
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
996
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
997
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
992
998
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
993
999
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
994
1000
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -1118,7 +1124,8 @@ class Mount(pulumi.CustomResource):
|
|
1118
1124
|
@pulumi.getter(name="listingVisibility")
|
1119
1125
|
def listing_visibility(self) -> pulumi.Output[Optional[str]]:
|
1120
1126
|
"""
|
1121
|
-
Specifies whether to show this mount in the UI-specific
|
1127
|
+
Specifies whether to show this mount in the UI-specific
|
1128
|
+
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
1122
1129
|
"""
|
1123
1130
|
return pulumi.get(self, "listing_visibility")
|
1124
1131
|
|
pulumi_vault/pulumi-plugin.json
CHANGED
@@ -17,7 +17,7 @@ pulumi_vault/mfa_duo.py,sha256=LJzOnwcNhzbgogrW4cyvadUFnB7wasK-QQ4MbPU0eS4,28237
|
|
17
17
|
pulumi_vault/mfa_okta.py,sha256=pA6n9k3BBMHXLvvyjOoSxTirgAznz5M0bWeXjHq8riU,29503
|
18
18
|
pulumi_vault/mfa_pingid.py,sha256=h4W3TOvcUQK1gzwqiC6samirfBghCTIcBgd3KpyBGww,30972
|
19
19
|
pulumi_vault/mfa_totp.py,sha256=J-c-GoVmO6FED6UDff2AtZJh5R8XlbnYY7CDeuPopI0,25344
|
20
|
-
pulumi_vault/mount.py,sha256=
|
20
|
+
pulumi_vault/mount.py,sha256=c1LAxLDySvex6kcEwzd4ZmRUBhWf3Saetpue9MLTiYs,59849
|
21
21
|
pulumi_vault/namespace.py,sha256=QKY3lKdHIZpT_l0Ut6Fk_FarRPsEkLyxv1tmfgXXoU0,18077
|
22
22
|
pulumi_vault/nomad_secret_backend.py,sha256=cmL2NkjNIZxu9a7NEMMHgojGi12I2tGDojFdMGSgj04,42018
|
23
23
|
pulumi_vault/nomad_secret_role.py,sha256=47QltNPaM58oiCXt77Z6r1cXRVN79FhYWI7Iei5sQ3w,20146
|
@@ -27,7 +27,7 @@ pulumi_vault/plugin.py,sha256=0fBhSZDyQhzML9r1Udhy9ngHcfjwzi1BzvutsbKKUwU,23482
|
|
27
27
|
pulumi_vault/plugin_pinned_version.py,sha256=mo62qPp_IwJRnv5t2p9ywInEjwHFsBunoyCDGc0bveg,10583
|
28
28
|
pulumi_vault/policy.py,sha256=V6knAiqkzH97T72s6FB2qNjScDfKOAl3mox1h7vg0Ps,10935
|
29
29
|
pulumi_vault/provider.py,sha256=gvnZj6hsMxMypnzizoolBed2LmtQPUCyMXlgGWpmLxY,41708
|
30
|
-
pulumi_vault/pulumi-plugin.json,sha256=
|
30
|
+
pulumi_vault/pulumi-plugin.json,sha256=ai-5rsMMH-TIxAO6LovU87E7Wt5IkOxDxC_eEPe540k,81
|
31
31
|
pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
32
32
|
pulumi_vault/quota_lease_count.py,sha256=w5CLQQjCk9PKSzX_XeLMEV87xre-poHJG9NfAGVVTjw,24898
|
33
33
|
pulumi_vault/quota_rate_limit.py,sha256=hA0tDU-54VrfcTHCzbRU-TL32BLnPBxhl92faufEkZo,29503
|
@@ -60,7 +60,7 @@ pulumi_vault/aws/auth_backend_sts_role.py,sha256=yy2-_7dY4LEjFjo2ROE905-o-3uiHqL
|
|
60
60
|
pulumi_vault/aws/get_access_credentials.py,sha256=AjYqLOhyucc98yNNh39DpTwBzTnSPgUeOgWAqiWZs9c,12282
|
61
61
|
pulumi_vault/aws/get_static_access_credentials.py,sha256=65NLi7oDfPERU_XHaQC7kYkw-VngpesORVJ5B8ahPwo,4742
|
62
62
|
pulumi_vault/aws/secret_backend.py,sha256=VoDgh8p5z7KC0jhBu5bh_oKcvYscPciTnEe00X3WaD8,49429
|
63
|
-
pulumi_vault/aws/secret_backend_role.py,sha256=
|
63
|
+
pulumi_vault/aws/secret_backend_role.py,sha256=mGJYeBEct69kdK9HfS7k7wQgrlatu93U-ZkFbgNUQck,56724
|
64
64
|
pulumi_vault/aws/secret_backend_static_role.py,sha256=XB-cCvBxYf3G1yp8FUh1ecUDIHAc80pV8mokb3NS1HQ,17821
|
65
65
|
pulumi_vault/azure/__init__.py,sha256=Ip6GcRxEn43qDXL93F4Jm2uYqW7HJlPK_dg1WrfwXBg,471
|
66
66
|
pulumi_vault/azure/_inputs.py,sha256=uS9C0fl059lbaxHD8PiAwWbCrDahbgBcqztfYeTDaEo,2564
|
@@ -110,7 +110,7 @@ pulumi_vault/identity/__init__.py,sha256=0lwEIF5yG_HPzGj-VTGpnAPyd5zqwoLC0ltNaWW
|
|
110
110
|
pulumi_vault/identity/entity.py,sha256=n0urur32RKQ4eEzU8TzkrsEr_iVU7CnjJu-GT2-igEU,19832
|
111
111
|
pulumi_vault/identity/entity_alias.py,sha256=F6u_zADIe7DFrPem3FB11kU618b6VqMbJCEDqQ8Vqn0,18539
|
112
112
|
pulumi_vault/identity/entity_policies.py,sha256=IVW9T5hHFcToSmM9DX0tYTZ7m5kMC-LF8hmsGVUSZkA,19927
|
113
|
-
pulumi_vault/identity/get_entity.py,sha256=
|
113
|
+
pulumi_vault/identity/get_entity.py,sha256=DuvhHx1ZpDhxdHYebh7DWOQ-iIY57F6OscJR4LPvpAU,14351
|
114
114
|
pulumi_vault/identity/get_group.py,sha256=uD9KxGqQp2rOgExzehjgC1-AeIvY99QKRPS4EaC1_0Y,17956
|
115
115
|
pulumi_vault/identity/get_oidc_client_creds.py,sha256=y8S0VLA_bVhqxmLHsMlBZrcRHBpjrTphPgVpU4FPgM0,5927
|
116
116
|
pulumi_vault/identity/get_oidc_openid_config.py,sha256=B75fMH2x5QFtDUKO0hheszmMrM9EvRQ3JszpCWPiI7k,13482
|
@@ -250,7 +250,7 @@ pulumi_vault/transit/get_decrypt.py,sha256=6rFzK4Ghf3tWRNJ_rSCs0yJsPynk9oeqZIJJq
|
|
250
250
|
pulumi_vault/transit/get_encrypt.py,sha256=wz1GDrLP8JzDLCcjbU7tZM7vHNtBQ9PPpLHczy22uqY,5712
|
251
251
|
pulumi_vault/transit/secret_backend_key.py,sha256=56to0JZaIFaCZVeiW5pNKER6azVhs2JXJoccgdVdtoI,53286
|
252
252
|
pulumi_vault/transit/secret_cache_config.py,sha256=kSfKajNG2v5iPtoEnNLRXCIR5sRGUqTTxRW-tT0X_iM,12483
|
253
|
-
pulumi_vault-6.3.
|
254
|
-
pulumi_vault-6.3.
|
255
|
-
pulumi_vault-6.3.
|
256
|
-
pulumi_vault-6.3.
|
253
|
+
pulumi_vault-6.3.0a1723109142.dist-info/METADATA,sha256=sCKAQQozcu9GmWzgMsbfvzHfhXOFJti9PtnieQ2NAwk,4860
|
254
|
+
pulumi_vault-6.3.0a1723109142.dist-info/WHEEL,sha256=R0nc6qTxuoLk7ShA2_Y-UWkN8ZdfDBG2B6Eqpz2WXbs,91
|
255
|
+
pulumi_vault-6.3.0a1723109142.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
|
256
|
+
pulumi_vault-6.3.0a1723109142.dist-info/RECORD,,
|
File without changes
|
{pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.0a1723109142.dist-info}/top_level.txt
RENAMED
File without changes
|