pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +120 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +37 -7
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +35 -23
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
@@ -17,6 +22,7 @@ class SecretBackendRoleArgs:
|
|
17
22
|
backend: pulumi.Input[str],
|
18
23
|
credential_type: pulumi.Input[str],
|
19
24
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
25
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
20
26
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
27
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
22
28
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -26,6 +32,7 @@ class SecretBackendRoleArgs:
|
|
26
32
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
27
33
|
policy_document: Optional[pulumi.Input[str]] = None,
|
28
34
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
35
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
29
36
|
user_path: Optional[pulumi.Input[str]] = None):
|
30
37
|
"""
|
31
38
|
The set of arguments for constructing a SecretBackendRole resource.
|
@@ -39,6 +46,8 @@ class SecretBackendRoleArgs:
|
|
39
46
|
and a default TTL is specified on the role,
|
40
47
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
41
48
|
`assumed_role` or `federation_token`.
|
49
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
50
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
42
51
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
43
52
|
against this vault role will be added to these IAM Groups. For a credential
|
44
53
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -75,6 +84,9 @@ class SecretBackendRoleArgs:
|
|
75
84
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
76
85
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
77
86
|
prohibited otherwise.
|
87
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
88
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
89
|
+
`assumed_role`.
|
78
90
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
79
91
|
`credential_type` is `iam_user`. Default is `/`.
|
80
92
|
"""
|
@@ -82,6 +94,8 @@ class SecretBackendRoleArgs:
|
|
82
94
|
pulumi.set(__self__, "credential_type", credential_type)
|
83
95
|
if default_sts_ttl is not None:
|
84
96
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
97
|
+
if external_id is not None:
|
98
|
+
pulumi.set(__self__, "external_id", external_id)
|
85
99
|
if iam_groups is not None:
|
86
100
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
87
101
|
if iam_tags is not None:
|
@@ -100,6 +114,8 @@ class SecretBackendRoleArgs:
|
|
100
114
|
pulumi.set(__self__, "policy_document", policy_document)
|
101
115
|
if role_arns is not None:
|
102
116
|
pulumi.set(__self__, "role_arns", role_arns)
|
117
|
+
if session_tags is not None:
|
118
|
+
pulumi.set(__self__, "session_tags", session_tags)
|
103
119
|
if user_path is not None:
|
104
120
|
pulumi.set(__self__, "user_path", user_path)
|
105
121
|
|
@@ -146,6 +162,19 @@ class SecretBackendRoleArgs:
|
|
146
162
|
def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
|
147
163
|
pulumi.set(self, "default_sts_ttl", value)
|
148
164
|
|
165
|
+
@property
|
166
|
+
@pulumi.getter(name="externalId")
|
167
|
+
def external_id(self) -> Optional[pulumi.Input[str]]:
|
168
|
+
"""
|
169
|
+
External ID to set for assume role creds.
|
170
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
171
|
+
"""
|
172
|
+
return pulumi.get(self, "external_id")
|
173
|
+
|
174
|
+
@external_id.setter
|
175
|
+
def external_id(self, value: Optional[pulumi.Input[str]]):
|
176
|
+
pulumi.set(self, "external_id", value)
|
177
|
+
|
149
178
|
@property
|
150
179
|
@pulumi.getter(name="iamGroups")
|
151
180
|
def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -281,6 +310,20 @@ class SecretBackendRoleArgs:
|
|
281
310
|
def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
282
311
|
pulumi.set(self, "role_arns", value)
|
283
312
|
|
313
|
+
@property
|
314
|
+
@pulumi.getter(name="sessionTags")
|
315
|
+
def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
316
|
+
"""
|
317
|
+
A map of strings representing key/value pairs to be set
|
318
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
319
|
+
`assumed_role`.
|
320
|
+
"""
|
321
|
+
return pulumi.get(self, "session_tags")
|
322
|
+
|
323
|
+
@session_tags.setter
|
324
|
+
def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
325
|
+
pulumi.set(self, "session_tags", value)
|
326
|
+
|
284
327
|
@property
|
285
328
|
@pulumi.getter(name="userPath")
|
286
329
|
def user_path(self) -> Optional[pulumi.Input[str]]:
|
@@ -301,6 +344,7 @@ class _SecretBackendRoleState:
|
|
301
344
|
backend: Optional[pulumi.Input[str]] = None,
|
302
345
|
credential_type: Optional[pulumi.Input[str]] = None,
|
303
346
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
347
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
304
348
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
305
349
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
306
350
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -310,6 +354,7 @@ class _SecretBackendRoleState:
|
|
310
354
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
311
355
|
policy_document: Optional[pulumi.Input[str]] = None,
|
312
356
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
357
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
313
358
|
user_path: Optional[pulumi.Input[str]] = None):
|
314
359
|
"""
|
315
360
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
@@ -323,6 +368,8 @@ class _SecretBackendRoleState:
|
|
323
368
|
and a default TTL is specified on the role,
|
324
369
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
325
370
|
`assumed_role` or `federation_token`.
|
371
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
372
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
326
373
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
327
374
|
against this vault role will be added to these IAM Groups. For a credential
|
328
375
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -359,6 +406,9 @@ class _SecretBackendRoleState:
|
|
359
406
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
360
407
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
361
408
|
prohibited otherwise.
|
409
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
410
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
411
|
+
`assumed_role`.
|
362
412
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
363
413
|
`credential_type` is `iam_user`. Default is `/`.
|
364
414
|
"""
|
@@ -368,6 +418,8 @@ class _SecretBackendRoleState:
|
|
368
418
|
pulumi.set(__self__, "credential_type", credential_type)
|
369
419
|
if default_sts_ttl is not None:
|
370
420
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
421
|
+
if external_id is not None:
|
422
|
+
pulumi.set(__self__, "external_id", external_id)
|
371
423
|
if iam_groups is not None:
|
372
424
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
373
425
|
if iam_tags is not None:
|
@@ -386,6 +438,8 @@ class _SecretBackendRoleState:
|
|
386
438
|
pulumi.set(__self__, "policy_document", policy_document)
|
387
439
|
if role_arns is not None:
|
388
440
|
pulumi.set(__self__, "role_arns", role_arns)
|
441
|
+
if session_tags is not None:
|
442
|
+
pulumi.set(__self__, "session_tags", session_tags)
|
389
443
|
if user_path is not None:
|
390
444
|
pulumi.set(__self__, "user_path", user_path)
|
391
445
|
|
@@ -432,6 +486,19 @@ class _SecretBackendRoleState:
|
|
432
486
|
def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
|
433
487
|
pulumi.set(self, "default_sts_ttl", value)
|
434
488
|
|
489
|
+
@property
|
490
|
+
@pulumi.getter(name="externalId")
|
491
|
+
def external_id(self) -> Optional[pulumi.Input[str]]:
|
492
|
+
"""
|
493
|
+
External ID to set for assume role creds.
|
494
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
495
|
+
"""
|
496
|
+
return pulumi.get(self, "external_id")
|
497
|
+
|
498
|
+
@external_id.setter
|
499
|
+
def external_id(self, value: Optional[pulumi.Input[str]]):
|
500
|
+
pulumi.set(self, "external_id", value)
|
501
|
+
|
435
502
|
@property
|
436
503
|
@pulumi.getter(name="iamGroups")
|
437
504
|
def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -567,6 +634,20 @@ class _SecretBackendRoleState:
|
|
567
634
|
def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
568
635
|
pulumi.set(self, "role_arns", value)
|
569
636
|
|
637
|
+
@property
|
638
|
+
@pulumi.getter(name="sessionTags")
|
639
|
+
def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
640
|
+
"""
|
641
|
+
A map of strings representing key/value pairs to be set
|
642
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
643
|
+
`assumed_role`.
|
644
|
+
"""
|
645
|
+
return pulumi.get(self, "session_tags")
|
646
|
+
|
647
|
+
@session_tags.setter
|
648
|
+
def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
649
|
+
pulumi.set(self, "session_tags", value)
|
650
|
+
|
570
651
|
@property
|
571
652
|
@pulumi.getter(name="userPath")
|
572
653
|
def user_path(self) -> Optional[pulumi.Input[str]]:
|
@@ -589,6 +670,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
589
670
|
backend: Optional[pulumi.Input[str]] = None,
|
590
671
|
credential_type: Optional[pulumi.Input[str]] = None,
|
591
672
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
673
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
592
674
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
593
675
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
594
676
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -598,6 +680,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
598
680
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
599
681
|
policy_document: Optional[pulumi.Input[str]] = None,
|
600
682
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
683
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
601
684
|
user_path: Optional[pulumi.Input[str]] = None,
|
602
685
|
__props__=None):
|
603
686
|
"""
|
@@ -647,6 +730,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
647
730
|
and a default TTL is specified on the role,
|
648
731
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
649
732
|
`assumed_role` or `federation_token`.
|
733
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
734
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
650
735
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
651
736
|
against this vault role will be added to these IAM Groups. For a credential
|
652
737
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -683,6 +768,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
683
768
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
684
769
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
685
770
|
prohibited otherwise.
|
771
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
772
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
773
|
+
`assumed_role`.
|
686
774
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
687
775
|
`credential_type` is `iam_user`. Default is `/`.
|
688
776
|
"""
|
@@ -745,6 +833,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
745
833
|
backend: Optional[pulumi.Input[str]] = None,
|
746
834
|
credential_type: Optional[pulumi.Input[str]] = None,
|
747
835
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
836
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
748
837
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
749
838
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
750
839
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -754,6 +843,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
754
843
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
755
844
|
policy_document: Optional[pulumi.Input[str]] = None,
|
756
845
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
846
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
757
847
|
user_path: Optional[pulumi.Input[str]] = None,
|
758
848
|
__props__=None):
|
759
849
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -771,6 +861,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
771
861
|
raise TypeError("Missing required property 'credential_type'")
|
772
862
|
__props__.__dict__["credential_type"] = credential_type
|
773
863
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
864
|
+
__props__.__dict__["external_id"] = external_id
|
774
865
|
__props__.__dict__["iam_groups"] = iam_groups
|
775
866
|
__props__.__dict__["iam_tags"] = iam_tags
|
776
867
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
@@ -780,6 +871,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
780
871
|
__props__.__dict__["policy_arns"] = policy_arns
|
781
872
|
__props__.__dict__["policy_document"] = policy_document
|
782
873
|
__props__.__dict__["role_arns"] = role_arns
|
874
|
+
__props__.__dict__["session_tags"] = session_tags
|
783
875
|
__props__.__dict__["user_path"] = user_path
|
784
876
|
super(SecretBackendRole, __self__).__init__(
|
785
877
|
'vault:aws/secretBackendRole:SecretBackendRole',
|
@@ -794,6 +886,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
794
886
|
backend: Optional[pulumi.Input[str]] = None,
|
795
887
|
credential_type: Optional[pulumi.Input[str]] = None,
|
796
888
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
889
|
+
external_id: Optional[pulumi.Input[str]] = None,
|
797
890
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
798
891
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
799
892
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -803,6 +896,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
803
896
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
804
897
|
policy_document: Optional[pulumi.Input[str]] = None,
|
805
898
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
899
|
+
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
806
900
|
user_path: Optional[pulumi.Input[str]] = None) -> 'SecretBackendRole':
|
807
901
|
"""
|
808
902
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
@@ -821,6 +915,8 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
821
915
|
and a default TTL is specified on the role,
|
822
916
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
823
917
|
`assumed_role` or `federation_token`.
|
918
|
+
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
919
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
824
920
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
825
921
|
against this vault role will be added to these IAM Groups. For a credential
|
826
922
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -857,6 +953,9 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
857
953
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
858
954
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
859
955
|
prohibited otherwise.
|
956
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
957
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
958
|
+
`assumed_role`.
|
860
959
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
861
960
|
`credential_type` is `iam_user`. Default is `/`.
|
862
961
|
"""
|
@@ -867,6 +966,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
867
966
|
__props__.__dict__["backend"] = backend
|
868
967
|
__props__.__dict__["credential_type"] = credential_type
|
869
968
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
969
|
+
__props__.__dict__["external_id"] = external_id
|
870
970
|
__props__.__dict__["iam_groups"] = iam_groups
|
871
971
|
__props__.__dict__["iam_tags"] = iam_tags
|
872
972
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
@@ -876,6 +976,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
876
976
|
__props__.__dict__["policy_arns"] = policy_arns
|
877
977
|
__props__.__dict__["policy_document"] = policy_document
|
878
978
|
__props__.__dict__["role_arns"] = role_arns
|
979
|
+
__props__.__dict__["session_tags"] = session_tags
|
879
980
|
__props__.__dict__["user_path"] = user_path
|
880
981
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
881
982
|
|
@@ -910,6 +1011,15 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
910
1011
|
"""
|
911
1012
|
return pulumi.get(self, "default_sts_ttl")
|
912
1013
|
|
1014
|
+
@property
|
1015
|
+
@pulumi.getter(name="externalId")
|
1016
|
+
def external_id(self) -> pulumi.Output[Optional[str]]:
|
1017
|
+
"""
|
1018
|
+
External ID to set for assume role creds.
|
1019
|
+
Valid only when `credential_type` is set to `assumed_role`.
|
1020
|
+
"""
|
1021
|
+
return pulumi.get(self, "external_id")
|
1022
|
+
|
913
1023
|
@property
|
914
1024
|
@pulumi.getter(name="iamGroups")
|
915
1025
|
def iam_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
@@ -1009,6 +1119,16 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1009
1119
|
"""
|
1010
1120
|
return pulumi.get(self, "role_arns")
|
1011
1121
|
|
1122
|
+
@property
|
1123
|
+
@pulumi.getter(name="sessionTags")
|
1124
|
+
def session_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1125
|
+
"""
|
1126
|
+
A map of strings representing key/value pairs to be set
|
1127
|
+
during assume role creds creation. Valid only when `credential_type` is set to
|
1128
|
+
`assumed_role`.
|
1129
|
+
"""
|
1130
|
+
return pulumi.get(self, "session_tags")
|
1131
|
+
|
1012
1132
|
@property
|
1013
1133
|
@pulumi.getter(name="userPath")
|
1014
1134
|
def user_path(self) -> pulumi.Output[Optional[str]]:
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
pulumi_vault/azure/_inputs.py
CHANGED
@@ -4,16 +4,32 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'BackendRoleAzureGroupArgs',
|
19
|
+
'BackendRoleAzureGroupArgsDict',
|
14
20
|
'BackendRoleAzureRoleArgs',
|
21
|
+
'BackendRoleAzureRoleArgsDict',
|
15
22
|
]
|
16
23
|
|
24
|
+
MYPY = False
|
25
|
+
|
26
|
+
if not MYPY:
|
27
|
+
class BackendRoleAzureGroupArgsDict(TypedDict):
|
28
|
+
group_name: pulumi.Input[str]
|
29
|
+
object_id: NotRequired[pulumi.Input[str]]
|
30
|
+
elif False:
|
31
|
+
BackendRoleAzureGroupArgsDict: TypeAlias = Mapping[str, Any]
|
32
|
+
|
17
33
|
@pulumi.input_type
|
18
34
|
class BackendRoleAzureGroupArgs:
|
19
35
|
def __init__(__self__, *,
|
@@ -42,6 +58,14 @@ class BackendRoleAzureGroupArgs:
|
|
42
58
|
pulumi.set(self, "object_id", value)
|
43
59
|
|
44
60
|
|
61
|
+
if not MYPY:
|
62
|
+
class BackendRoleAzureRoleArgsDict(TypedDict):
|
63
|
+
scope: pulumi.Input[str]
|
64
|
+
role_id: NotRequired[pulumi.Input[str]]
|
65
|
+
role_name: NotRequired[pulumi.Input[str]]
|
66
|
+
elif False:
|
67
|
+
BackendRoleAzureRoleArgsDict: TypeAlias = Mapping[str, Any]
|
68
|
+
|
45
69
|
@pulumi.input_type
|
46
70
|
class BackendRoleAzureRoleArgs:
|
47
71
|
def __init__(__self__, *,
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
pulumi_vault/azure/backend.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['BackendArgs', 'Backend']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -450,8 +455,8 @@ class BackendRole(pulumi.CustomResource):
|
|
450
455
|
resource_name: str,
|
451
456
|
opts: Optional[pulumi.ResourceOptions] = None,
|
452
457
|
application_object_id: Optional[pulumi.Input[str]] = None,
|
453
|
-
azure_groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
454
|
-
azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
458
|
+
azure_groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureGroupArgs', 'BackendRoleAzureGroupArgsDict']]]]] = None,
|
459
|
+
azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]]] = None,
|
455
460
|
backend: Optional[pulumi.Input[str]] = None,
|
456
461
|
description: Optional[pulumi.Input[str]] = None,
|
457
462
|
max_ttl: Optional[pulumi.Input[str]] = None,
|
@@ -484,10 +489,10 @@ class BackendRole(pulumi.CustomResource):
|
|
484
489
|
],
|
485
490
|
ttl="300",
|
486
491
|
max_ttl="600",
|
487
|
-
azure_roles=[
|
488
|
-
role_name
|
489
|
-
scope
|
490
|
-
|
492
|
+
azure_roles=[{
|
493
|
+
"role_name": "Reader",
|
494
|
+
"scope": f"/subscriptions/{subscription_id}/resourceGroups/azure-vault-group",
|
495
|
+
}])
|
491
496
|
existing_object_id = vault.azure.BackendRole("existing_object_id",
|
492
497
|
backend=azure.path,
|
493
498
|
role="existing_object_id",
|
@@ -500,8 +505,8 @@ class BackendRole(pulumi.CustomResource):
|
|
500
505
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
501
506
|
:param pulumi.Input[str] application_object_id: Application Object ID for an existing service principal that will
|
502
507
|
be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
|
503
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
504
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
508
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureGroupArgs', 'BackendRoleAzureGroupArgsDict']]]] azure_groups: List of Azure groups to be assigned to the generated service principal.
|
509
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]] azure_roles: List of Azure roles to be assigned to the generated service principal.
|
505
510
|
:param pulumi.Input[str] backend: Path to the mounted Azure auth backend
|
506
511
|
:param pulumi.Input[str] description: Human-friendly description of the mount for the backend.
|
507
512
|
:param pulumi.Input[str] max_ttl: Specifies the maximum TTL for service principals generated using this role. Accepts time
|
@@ -547,10 +552,10 @@ class BackendRole(pulumi.CustomResource):
|
|
547
552
|
],
|
548
553
|
ttl="300",
|
549
554
|
max_ttl="600",
|
550
|
-
azure_roles=[
|
551
|
-
role_name
|
552
|
-
scope
|
553
|
-
|
555
|
+
azure_roles=[{
|
556
|
+
"role_name": "Reader",
|
557
|
+
"scope": f"/subscriptions/{subscription_id}/resourceGroups/azure-vault-group",
|
558
|
+
}])
|
554
559
|
existing_object_id = vault.azure.BackendRole("existing_object_id",
|
555
560
|
backend=azure.path,
|
556
561
|
role="existing_object_id",
|
@@ -575,8 +580,8 @@ class BackendRole(pulumi.CustomResource):
|
|
575
580
|
resource_name: str,
|
576
581
|
opts: Optional[pulumi.ResourceOptions] = None,
|
577
582
|
application_object_id: Optional[pulumi.Input[str]] = None,
|
578
|
-
azure_groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
579
|
-
azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
583
|
+
azure_groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureGroupArgs', 'BackendRoleAzureGroupArgsDict']]]]] = None,
|
584
|
+
azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]]] = None,
|
580
585
|
backend: Optional[pulumi.Input[str]] = None,
|
581
586
|
description: Optional[pulumi.Input[str]] = None,
|
582
587
|
max_ttl: Optional[pulumi.Input[str]] = None,
|
@@ -620,8 +625,8 @@ class BackendRole(pulumi.CustomResource):
|
|
620
625
|
id: pulumi.Input[str],
|
621
626
|
opts: Optional[pulumi.ResourceOptions] = None,
|
622
627
|
application_object_id: Optional[pulumi.Input[str]] = None,
|
623
|
-
azure_groups: Optional[pulumi.Input[Sequence[pulumi.Input[
|
624
|
-
azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[
|
628
|
+
azure_groups: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureGroupArgs', 'BackendRoleAzureGroupArgsDict']]]]] = None,
|
629
|
+
azure_roles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]]] = None,
|
625
630
|
backend: Optional[pulumi.Input[str]] = None,
|
626
631
|
description: Optional[pulumi.Input[str]] = None,
|
627
632
|
max_ttl: Optional[pulumi.Input[str]] = None,
|
@@ -640,8 +645,8 @@ class BackendRole(pulumi.CustomResource):
|
|
640
645
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
641
646
|
:param pulumi.Input[str] application_object_id: Application Object ID for an existing service principal that will
|
642
647
|
be used instead of creating dynamic service principals. If present, `azure_roles` and `permanently_delete` will be ignored.
|
643
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
644
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
648
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureGroupArgs', 'BackendRoleAzureGroupArgsDict']]]] azure_groups: List of Azure groups to be assigned to the generated service principal.
|
649
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['BackendRoleAzureRoleArgs', 'BackendRoleAzureRoleArgsDict']]]] azure_roles: List of Azure roles to be assigned to the generated service principal.
|
645
650
|
:param pulumi.Input[str] backend: Path to the mounted Azure auth backend
|
646
651
|
:param pulumi.Input[str] description: Human-friendly description of the mount for the backend.
|
647
652
|
:param pulumi.Input[str] max_ttl: Specifies the maximum TTL for service principals generated using this role. Accepts time
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -298,9 +303,6 @@ def get_access_credentials(backend: Optional[str] = None,
|
|
298
303
|
subscription_id=pulumi.get(__ret__, 'subscription_id'),
|
299
304
|
tenant_id=pulumi.get(__ret__, 'tenant_id'),
|
300
305
|
validate_creds=pulumi.get(__ret__, 'validate_creds'))
|
301
|
-
|
302
|
-
|
303
|
-
@_utilities.lift_output_func(get_access_credentials)
|
304
306
|
def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
305
307
|
environment: Optional[pulumi.Input[Optional[str]]] = None,
|
306
308
|
max_cred_validation_seconds: Optional[pulumi.Input[Optional[int]]] = None,
|
@@ -365,4 +367,34 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
|
|
365
367
|
credentials without checking whether they have fully propagated throughout
|
366
368
|
Azure Active Directory. Designating `true` activates testing.
|
367
369
|
"""
|
368
|
-
|
370
|
+
__args__ = dict()
|
371
|
+
__args__['backend'] = backend
|
372
|
+
__args__['environment'] = environment
|
373
|
+
__args__['maxCredValidationSeconds'] = max_cred_validation_seconds
|
374
|
+
__args__['namespace'] = namespace
|
375
|
+
__args__['numSecondsBetweenTests'] = num_seconds_between_tests
|
376
|
+
__args__['numSequentialSuccesses'] = num_sequential_successes
|
377
|
+
__args__['role'] = role
|
378
|
+
__args__['subscriptionId'] = subscription_id
|
379
|
+
__args__['tenantId'] = tenant_id
|
380
|
+
__args__['validateCreds'] = validate_creds
|
381
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
382
|
+
__ret__ = pulumi.runtime.invoke_output('vault:azure/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
|
383
|
+
return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
|
384
|
+
backend=pulumi.get(__response__, 'backend'),
|
385
|
+
client_id=pulumi.get(__response__, 'client_id'),
|
386
|
+
client_secret=pulumi.get(__response__, 'client_secret'),
|
387
|
+
environment=pulumi.get(__response__, 'environment'),
|
388
|
+
id=pulumi.get(__response__, 'id'),
|
389
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
390
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
391
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
392
|
+
lease_start_time=pulumi.get(__response__, 'lease_start_time'),
|
393
|
+
max_cred_validation_seconds=pulumi.get(__response__, 'max_cred_validation_seconds'),
|
394
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
395
|
+
num_seconds_between_tests=pulumi.get(__response__, 'num_seconds_between_tests'),
|
396
|
+
num_sequential_successes=pulumi.get(__response__, 'num_sequential_successes'),
|
397
|
+
role=pulumi.get(__response__, 'role'),
|
398
|
+
subscription_id=pulumi.get(__response__, 'subscription_id'),
|
399
|
+
tenant_id=pulumi.get(__response__, 'tenant_id'),
|
400
|
+
validate_creds=pulumi.get(__response__, 'validate_creds')))
|
pulumi_vault/azure/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['CertAuthBackendRoleArgs', 'CertAuthBackendRole']
|
pulumi_vault/config/__init__.pyi
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
|