pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,45 +19,45 @@ __all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SyncAwsDestinationArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
access_key_id: Optional[pulumi.Input[
|
24
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
25
|
-
external_id: Optional[pulumi.Input[
|
26
|
-
granularity: Optional[pulumi.Input[
|
27
|
-
name: Optional[pulumi.Input[
|
28
|
-
namespace: Optional[pulumi.Input[
|
29
|
-
region: Optional[pulumi.Input[
|
30
|
-
role_arn: Optional[pulumi.Input[
|
31
|
-
secret_access_key: Optional[pulumi.Input[
|
32
|
-
secret_name_template: Optional[pulumi.Input[
|
22
|
+
access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
23
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
24
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
region: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
30
|
+
secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
31
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None):
|
33
32
|
"""
|
34
33
|
The set of arguments for constructing a SyncAwsDestination resource.
|
35
|
-
:param pulumi.Input[
|
34
|
+
:param pulumi.Input[_builtins.str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
36
35
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
37
36
|
variable.
|
38
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
39
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
38
|
+
:param pulumi.Input[_builtins.str] external_id: Optional extra protection that must match the trust policy granting access to the
|
40
39
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
41
40
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
42
41
|
relationship condition they set on AWS otherwise sync operations will start to fail due to client-side access
|
43
42
|
denied errors. Ignored if the `role_arn` field is empty.
|
44
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
45
44
|
at the destination. Supports `secret-path` and `secret-key`.
|
46
|
-
:param pulumi.Input[
|
47
|
-
:param pulumi.Input[
|
45
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the AWS destination.
|
46
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
48
47
|
The value should not contain leading or trailing forward slashes.
|
49
48
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
50
|
-
:param pulumi.Input[
|
49
|
+
:param pulumi.Input[_builtins.str] region: Region where to manage the secrets manager entries.
|
51
50
|
Can be omitted and directly provided to Vault using the `AWS_REGION` environment
|
52
51
|
variable.
|
53
|
-
:param pulumi.Input[
|
52
|
+
:param pulumi.Input[_builtins.str] role_arn: Specifies a role to assume when connecting to AWS. When assuming a role,
|
54
53
|
Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
|
55
54
|
exist for Vault to be able to assume this role. The role can be in a different account.
|
56
55
|
The value is mutable as long as the new role targets the same AWS account ID. If not, the BE will return an error.
|
57
56
|
It is possible to provide both an access key pair and a role to assume.
|
58
|
-
:param pulumi.Input[
|
57
|
+
:param pulumi.Input[_builtins.str] secret_access_key: Secret access key to authenticate against the AWS secrets manager.
|
59
58
|
Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
|
60
59
|
variable.
|
61
|
-
:param pulumi.Input[
|
60
|
+
:param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
|
62
61
|
Supports a subset of the Go Template syntax.
|
63
62
|
"""
|
64
63
|
if access_key_id is not None:
|
@@ -82,9 +81,9 @@ class SyncAwsDestinationArgs:
|
|
82
81
|
if secret_name_template is not None:
|
83
82
|
pulumi.set(__self__, "secret_name_template", secret_name_template)
|
84
83
|
|
85
|
-
@property
|
84
|
+
@_builtins.property
|
86
85
|
@pulumi.getter(name="accessKeyId")
|
87
|
-
def access_key_id(self) -> Optional[pulumi.Input[
|
86
|
+
def access_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
88
87
|
"""
|
89
88
|
Access key id to authenticate against the AWS secrets manager.
|
90
89
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
@@ -93,24 +92,24 @@ class SyncAwsDestinationArgs:
|
|
93
92
|
return pulumi.get(self, "access_key_id")
|
94
93
|
|
95
94
|
@access_key_id.setter
|
96
|
-
def access_key_id(self, value: Optional[pulumi.Input[
|
95
|
+
def access_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
97
96
|
pulumi.set(self, "access_key_id", value)
|
98
97
|
|
99
|
-
@property
|
98
|
+
@_builtins.property
|
100
99
|
@pulumi.getter(name="customTags")
|
101
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
100
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
102
101
|
"""
|
103
102
|
Custom tags to set on the secret managed at the destination.
|
104
103
|
"""
|
105
104
|
return pulumi.get(self, "custom_tags")
|
106
105
|
|
107
106
|
@custom_tags.setter
|
108
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
107
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
109
108
|
pulumi.set(self, "custom_tags", value)
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter(name="externalId")
|
113
|
-
def external_id(self) -> Optional[pulumi.Input[
|
112
|
+
def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
114
113
|
"""
|
115
114
|
Optional extra protection that must match the trust policy granting access to the
|
116
115
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
@@ -121,12 +120,12 @@ class SyncAwsDestinationArgs:
|
|
121
120
|
return pulumi.get(self, "external_id")
|
122
121
|
|
123
122
|
@external_id.setter
|
124
|
-
def external_id(self, value: Optional[pulumi.Input[
|
123
|
+
def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
125
124
|
pulumi.set(self, "external_id", value)
|
126
125
|
|
127
|
-
@property
|
126
|
+
@_builtins.property
|
128
127
|
@pulumi.getter
|
129
|
-
def granularity(self) -> Optional[pulumi.Input[
|
128
|
+
def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
|
130
129
|
"""
|
131
130
|
Determines what level of information is synced as a distinct resource
|
132
131
|
at the destination. Supports `secret-path` and `secret-key`.
|
@@ -134,24 +133,24 @@ class SyncAwsDestinationArgs:
|
|
134
133
|
return pulumi.get(self, "granularity")
|
135
134
|
|
136
135
|
@granularity.setter
|
137
|
-
def granularity(self, value: Optional[pulumi.Input[
|
136
|
+
def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
|
138
137
|
pulumi.set(self, "granularity", value)
|
139
138
|
|
140
|
-
@property
|
139
|
+
@_builtins.property
|
141
140
|
@pulumi.getter
|
142
|
-
def name(self) -> Optional[pulumi.Input[
|
141
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
143
142
|
"""
|
144
143
|
Unique name of the AWS destination.
|
145
144
|
"""
|
146
145
|
return pulumi.get(self, "name")
|
147
146
|
|
148
147
|
@name.setter
|
149
|
-
def name(self, value: Optional[pulumi.Input[
|
148
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
150
149
|
pulumi.set(self, "name", value)
|
151
150
|
|
152
|
-
@property
|
151
|
+
@_builtins.property
|
153
152
|
@pulumi.getter
|
154
|
-
def namespace(self) -> Optional[pulumi.Input[
|
153
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
155
154
|
"""
|
156
155
|
The namespace to provision the resource in.
|
157
156
|
The value should not contain leading or trailing forward slashes.
|
@@ -160,12 +159,12 @@ class SyncAwsDestinationArgs:
|
|
160
159
|
return pulumi.get(self, "namespace")
|
161
160
|
|
162
161
|
@namespace.setter
|
163
|
-
def namespace(self, value: Optional[pulumi.Input[
|
162
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
164
163
|
pulumi.set(self, "namespace", value)
|
165
164
|
|
166
|
-
@property
|
165
|
+
@_builtins.property
|
167
166
|
@pulumi.getter
|
168
|
-
def region(self) -> Optional[pulumi.Input[
|
167
|
+
def region(self) -> Optional[pulumi.Input[_builtins.str]]:
|
169
168
|
"""
|
170
169
|
Region where to manage the secrets manager entries.
|
171
170
|
Can be omitted and directly provided to Vault using the `AWS_REGION` environment
|
@@ -174,12 +173,12 @@ class SyncAwsDestinationArgs:
|
|
174
173
|
return pulumi.get(self, "region")
|
175
174
|
|
176
175
|
@region.setter
|
177
|
-
def region(self, value: Optional[pulumi.Input[
|
176
|
+
def region(self, value: Optional[pulumi.Input[_builtins.str]]):
|
178
177
|
pulumi.set(self, "region", value)
|
179
178
|
|
180
|
-
@property
|
179
|
+
@_builtins.property
|
181
180
|
@pulumi.getter(name="roleArn")
|
182
|
-
def role_arn(self) -> Optional[pulumi.Input[
|
181
|
+
def role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
183
182
|
"""
|
184
183
|
Specifies a role to assume when connecting to AWS. When assuming a role,
|
185
184
|
Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
|
@@ -190,12 +189,12 @@ class SyncAwsDestinationArgs:
|
|
190
189
|
return pulumi.get(self, "role_arn")
|
191
190
|
|
192
191
|
@role_arn.setter
|
193
|
-
def role_arn(self, value: Optional[pulumi.Input[
|
192
|
+
def role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
194
193
|
pulumi.set(self, "role_arn", value)
|
195
194
|
|
196
|
-
@property
|
195
|
+
@_builtins.property
|
197
196
|
@pulumi.getter(name="secretAccessKey")
|
198
|
-
def secret_access_key(self) -> Optional[pulumi.Input[
|
197
|
+
def secret_access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
199
198
|
"""
|
200
199
|
Secret access key to authenticate against the AWS secrets manager.
|
201
200
|
Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
|
@@ -204,12 +203,12 @@ class SyncAwsDestinationArgs:
|
|
204
203
|
return pulumi.get(self, "secret_access_key")
|
205
204
|
|
206
205
|
@secret_access_key.setter
|
207
|
-
def secret_access_key(self, value: Optional[pulumi.Input[
|
206
|
+
def secret_access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
208
207
|
pulumi.set(self, "secret_access_key", value)
|
209
208
|
|
210
|
-
@property
|
209
|
+
@_builtins.property
|
211
210
|
@pulumi.getter(name="secretNameTemplate")
|
212
|
-
def secret_name_template(self) -> Optional[pulumi.Input[
|
211
|
+
def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
213
212
|
"""
|
214
213
|
Template describing how to generate external secret names.
|
215
214
|
Supports a subset of the Go Template syntax.
|
@@ -217,55 +216,55 @@ class SyncAwsDestinationArgs:
|
|
217
216
|
return pulumi.get(self, "secret_name_template")
|
218
217
|
|
219
218
|
@secret_name_template.setter
|
220
|
-
def secret_name_template(self, value: Optional[pulumi.Input[
|
219
|
+
def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
221
220
|
pulumi.set(self, "secret_name_template", value)
|
222
221
|
|
223
222
|
|
224
223
|
@pulumi.input_type
|
225
224
|
class _SyncAwsDestinationState:
|
226
225
|
def __init__(__self__, *,
|
227
|
-
access_key_id: Optional[pulumi.Input[
|
228
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
229
|
-
external_id: Optional[pulumi.Input[
|
230
|
-
granularity: Optional[pulumi.Input[
|
231
|
-
name: Optional[pulumi.Input[
|
232
|
-
namespace: Optional[pulumi.Input[
|
233
|
-
region: Optional[pulumi.Input[
|
234
|
-
role_arn: Optional[pulumi.Input[
|
235
|
-
secret_access_key: Optional[pulumi.Input[
|
236
|
-
secret_name_template: Optional[pulumi.Input[
|
237
|
-
type: Optional[pulumi.Input[
|
226
|
+
access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
227
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
228
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
229
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
230
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
231
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
232
|
+
region: Optional[pulumi.Input[_builtins.str]] = None,
|
233
|
+
role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
234
|
+
secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
235
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
236
|
+
type: Optional[pulumi.Input[_builtins.str]] = None):
|
238
237
|
"""
|
239
238
|
Input properties used for looking up and filtering SyncAwsDestination resources.
|
240
|
-
:param pulumi.Input[
|
239
|
+
:param pulumi.Input[_builtins.str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
241
240
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
242
241
|
variable.
|
243
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
244
|
-
:param pulumi.Input[
|
242
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
243
|
+
:param pulumi.Input[_builtins.str] external_id: Optional extra protection that must match the trust policy granting access to the
|
245
244
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
246
245
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
247
246
|
relationship condition they set on AWS otherwise sync operations will start to fail due to client-side access
|
248
247
|
denied errors. Ignored if the `role_arn` field is empty.
|
249
|
-
:param pulumi.Input[
|
248
|
+
:param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
250
249
|
at the destination. Supports `secret-path` and `secret-key`.
|
251
|
-
:param pulumi.Input[
|
252
|
-
:param pulumi.Input[
|
250
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the AWS destination.
|
251
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
253
252
|
The value should not contain leading or trailing forward slashes.
|
254
253
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
255
|
-
:param pulumi.Input[
|
254
|
+
:param pulumi.Input[_builtins.str] region: Region where to manage the secrets manager entries.
|
256
255
|
Can be omitted and directly provided to Vault using the `AWS_REGION` environment
|
257
256
|
variable.
|
258
|
-
:param pulumi.Input[
|
257
|
+
:param pulumi.Input[_builtins.str] role_arn: Specifies a role to assume when connecting to AWS. When assuming a role,
|
259
258
|
Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
|
260
259
|
exist for Vault to be able to assume this role. The role can be in a different account.
|
261
260
|
The value is mutable as long as the new role targets the same AWS account ID. If not, the BE will return an error.
|
262
261
|
It is possible to provide both an access key pair and a role to assume.
|
263
|
-
:param pulumi.Input[
|
262
|
+
:param pulumi.Input[_builtins.str] secret_access_key: Secret access key to authenticate against the AWS secrets manager.
|
264
263
|
Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
|
265
264
|
variable.
|
266
|
-
:param pulumi.Input[
|
265
|
+
:param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
|
267
266
|
Supports a subset of the Go Template syntax.
|
268
|
-
:param pulumi.Input[
|
267
|
+
:param pulumi.Input[_builtins.str] type: The type of the secrets destination (`aws-sm`).
|
269
268
|
"""
|
270
269
|
if access_key_id is not None:
|
271
270
|
pulumi.set(__self__, "access_key_id", access_key_id)
|
@@ -290,9 +289,9 @@ class _SyncAwsDestinationState:
|
|
290
289
|
if type is not None:
|
291
290
|
pulumi.set(__self__, "type", type)
|
292
291
|
|
293
|
-
@property
|
292
|
+
@_builtins.property
|
294
293
|
@pulumi.getter(name="accessKeyId")
|
295
|
-
def access_key_id(self) -> Optional[pulumi.Input[
|
294
|
+
def access_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
296
295
|
"""
|
297
296
|
Access key id to authenticate against the AWS secrets manager.
|
298
297
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
@@ -301,24 +300,24 @@ class _SyncAwsDestinationState:
|
|
301
300
|
return pulumi.get(self, "access_key_id")
|
302
301
|
|
303
302
|
@access_key_id.setter
|
304
|
-
def access_key_id(self, value: Optional[pulumi.Input[
|
303
|
+
def access_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
305
304
|
pulumi.set(self, "access_key_id", value)
|
306
305
|
|
307
|
-
@property
|
306
|
+
@_builtins.property
|
308
307
|
@pulumi.getter(name="customTags")
|
309
|
-
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
308
|
+
def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
310
309
|
"""
|
311
310
|
Custom tags to set on the secret managed at the destination.
|
312
311
|
"""
|
313
312
|
return pulumi.get(self, "custom_tags")
|
314
313
|
|
315
314
|
@custom_tags.setter
|
316
|
-
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
315
|
+
def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
317
316
|
pulumi.set(self, "custom_tags", value)
|
318
317
|
|
319
|
-
@property
|
318
|
+
@_builtins.property
|
320
319
|
@pulumi.getter(name="externalId")
|
321
|
-
def external_id(self) -> Optional[pulumi.Input[
|
320
|
+
def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
322
321
|
"""
|
323
322
|
Optional extra protection that must match the trust policy granting access to the
|
324
323
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
@@ -329,12 +328,12 @@ class _SyncAwsDestinationState:
|
|
329
328
|
return pulumi.get(self, "external_id")
|
330
329
|
|
331
330
|
@external_id.setter
|
332
|
-
def external_id(self, value: Optional[pulumi.Input[
|
331
|
+
def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
333
332
|
pulumi.set(self, "external_id", value)
|
334
333
|
|
335
|
-
@property
|
334
|
+
@_builtins.property
|
336
335
|
@pulumi.getter
|
337
|
-
def granularity(self) -> Optional[pulumi.Input[
|
336
|
+
def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
|
338
337
|
"""
|
339
338
|
Determines what level of information is synced as a distinct resource
|
340
339
|
at the destination. Supports `secret-path` and `secret-key`.
|
@@ -342,24 +341,24 @@ class _SyncAwsDestinationState:
|
|
342
341
|
return pulumi.get(self, "granularity")
|
343
342
|
|
344
343
|
@granularity.setter
|
345
|
-
def granularity(self, value: Optional[pulumi.Input[
|
344
|
+
def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
|
346
345
|
pulumi.set(self, "granularity", value)
|
347
346
|
|
348
|
-
@property
|
347
|
+
@_builtins.property
|
349
348
|
@pulumi.getter
|
350
|
-
def name(self) -> Optional[pulumi.Input[
|
349
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
351
350
|
"""
|
352
351
|
Unique name of the AWS destination.
|
353
352
|
"""
|
354
353
|
return pulumi.get(self, "name")
|
355
354
|
|
356
355
|
@name.setter
|
357
|
-
def name(self, value: Optional[pulumi.Input[
|
356
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
358
357
|
pulumi.set(self, "name", value)
|
359
358
|
|
360
|
-
@property
|
359
|
+
@_builtins.property
|
361
360
|
@pulumi.getter
|
362
|
-
def namespace(self) -> Optional[pulumi.Input[
|
361
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
363
362
|
"""
|
364
363
|
The namespace to provision the resource in.
|
365
364
|
The value should not contain leading or trailing forward slashes.
|
@@ -368,12 +367,12 @@ class _SyncAwsDestinationState:
|
|
368
367
|
return pulumi.get(self, "namespace")
|
369
368
|
|
370
369
|
@namespace.setter
|
371
|
-
def namespace(self, value: Optional[pulumi.Input[
|
370
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
372
371
|
pulumi.set(self, "namespace", value)
|
373
372
|
|
374
|
-
@property
|
373
|
+
@_builtins.property
|
375
374
|
@pulumi.getter
|
376
|
-
def region(self) -> Optional[pulumi.Input[
|
375
|
+
def region(self) -> Optional[pulumi.Input[_builtins.str]]:
|
377
376
|
"""
|
378
377
|
Region where to manage the secrets manager entries.
|
379
378
|
Can be omitted and directly provided to Vault using the `AWS_REGION` environment
|
@@ -382,12 +381,12 @@ class _SyncAwsDestinationState:
|
|
382
381
|
return pulumi.get(self, "region")
|
383
382
|
|
384
383
|
@region.setter
|
385
|
-
def region(self, value: Optional[pulumi.Input[
|
384
|
+
def region(self, value: Optional[pulumi.Input[_builtins.str]]):
|
386
385
|
pulumi.set(self, "region", value)
|
387
386
|
|
388
|
-
@property
|
387
|
+
@_builtins.property
|
389
388
|
@pulumi.getter(name="roleArn")
|
390
|
-
def role_arn(self) -> Optional[pulumi.Input[
|
389
|
+
def role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
391
390
|
"""
|
392
391
|
Specifies a role to assume when connecting to AWS. When assuming a role,
|
393
392
|
Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
|
@@ -398,12 +397,12 @@ class _SyncAwsDestinationState:
|
|
398
397
|
return pulumi.get(self, "role_arn")
|
399
398
|
|
400
399
|
@role_arn.setter
|
401
|
-
def role_arn(self, value: Optional[pulumi.Input[
|
400
|
+
def role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
402
401
|
pulumi.set(self, "role_arn", value)
|
403
402
|
|
404
|
-
@property
|
403
|
+
@_builtins.property
|
405
404
|
@pulumi.getter(name="secretAccessKey")
|
406
|
-
def secret_access_key(self) -> Optional[pulumi.Input[
|
405
|
+
def secret_access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
|
407
406
|
"""
|
408
407
|
Secret access key to authenticate against the AWS secrets manager.
|
409
408
|
Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
|
@@ -412,12 +411,12 @@ class _SyncAwsDestinationState:
|
|
412
411
|
return pulumi.get(self, "secret_access_key")
|
413
412
|
|
414
413
|
@secret_access_key.setter
|
415
|
-
def secret_access_key(self, value: Optional[pulumi.Input[
|
414
|
+
def secret_access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
|
416
415
|
pulumi.set(self, "secret_access_key", value)
|
417
416
|
|
418
|
-
@property
|
417
|
+
@_builtins.property
|
419
418
|
@pulumi.getter(name="secretNameTemplate")
|
420
|
-
def secret_name_template(self) -> Optional[pulumi.Input[
|
419
|
+
def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
|
421
420
|
"""
|
422
421
|
Template describing how to generate external secret names.
|
423
422
|
Supports a subset of the Go Template syntax.
|
@@ -425,19 +424,19 @@ class _SyncAwsDestinationState:
|
|
425
424
|
return pulumi.get(self, "secret_name_template")
|
426
425
|
|
427
426
|
@secret_name_template.setter
|
428
|
-
def secret_name_template(self, value: Optional[pulumi.Input[
|
427
|
+
def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
|
429
428
|
pulumi.set(self, "secret_name_template", value)
|
430
429
|
|
431
|
-
@property
|
430
|
+
@_builtins.property
|
432
431
|
@pulumi.getter
|
433
|
-
def type(self) -> Optional[pulumi.Input[
|
432
|
+
def type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
434
433
|
"""
|
435
434
|
The type of the secrets destination (`aws-sm`).
|
436
435
|
"""
|
437
436
|
return pulumi.get(self, "type")
|
438
437
|
|
439
438
|
@type.setter
|
440
|
-
def type(self, value: Optional[pulumi.Input[
|
439
|
+
def type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
441
440
|
pulumi.set(self, "type", value)
|
442
441
|
|
443
442
|
|
@@ -447,16 +446,16 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
447
446
|
def __init__(__self__,
|
448
447
|
resource_name: str,
|
449
448
|
opts: Optional[pulumi.ResourceOptions] = None,
|
450
|
-
access_key_id: Optional[pulumi.Input[
|
451
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
452
|
-
external_id: Optional[pulumi.Input[
|
453
|
-
granularity: Optional[pulumi.Input[
|
454
|
-
name: Optional[pulumi.Input[
|
455
|
-
namespace: Optional[pulumi.Input[
|
456
|
-
region: Optional[pulumi.Input[
|
457
|
-
role_arn: Optional[pulumi.Input[
|
458
|
-
secret_access_key: Optional[pulumi.Input[
|
459
|
-
secret_name_template: Optional[pulumi.Input[
|
449
|
+
access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
450
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
451
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
452
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
453
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
454
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
455
|
+
region: Optional[pulumi.Input[_builtins.str]] = None,
|
456
|
+
role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
457
|
+
secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
458
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
460
459
|
__props__=None):
|
461
460
|
"""
|
462
461
|
## Example Usage
|
@@ -488,33 +487,33 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
488
487
|
|
489
488
|
:param str resource_name: The name of the resource.
|
490
489
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
491
|
-
:param pulumi.Input[
|
490
|
+
:param pulumi.Input[_builtins.str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
492
491
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
493
492
|
variable.
|
494
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
495
|
-
:param pulumi.Input[
|
493
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
494
|
+
:param pulumi.Input[_builtins.str] external_id: Optional extra protection that must match the trust policy granting access to the
|
496
495
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
497
496
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
498
497
|
relationship condition they set on AWS otherwise sync operations will start to fail due to client-side access
|
499
498
|
denied errors. Ignored if the `role_arn` field is empty.
|
500
|
-
:param pulumi.Input[
|
499
|
+
:param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
501
500
|
at the destination. Supports `secret-path` and `secret-key`.
|
502
|
-
:param pulumi.Input[
|
503
|
-
:param pulumi.Input[
|
501
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the AWS destination.
|
502
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
504
503
|
The value should not contain leading or trailing forward slashes.
|
505
504
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
506
|
-
:param pulumi.Input[
|
505
|
+
:param pulumi.Input[_builtins.str] region: Region where to manage the secrets manager entries.
|
507
506
|
Can be omitted and directly provided to Vault using the `AWS_REGION` environment
|
508
507
|
variable.
|
509
|
-
:param pulumi.Input[
|
508
|
+
:param pulumi.Input[_builtins.str] role_arn: Specifies a role to assume when connecting to AWS. When assuming a role,
|
510
509
|
Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
|
511
510
|
exist for Vault to be able to assume this role. The role can be in a different account.
|
512
511
|
The value is mutable as long as the new role targets the same AWS account ID. If not, the BE will return an error.
|
513
512
|
It is possible to provide both an access key pair and a role to assume.
|
514
|
-
:param pulumi.Input[
|
513
|
+
:param pulumi.Input[_builtins.str] secret_access_key: Secret access key to authenticate against the AWS secrets manager.
|
515
514
|
Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
|
516
515
|
variable.
|
517
|
-
:param pulumi.Input[
|
516
|
+
:param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
|
518
517
|
Supports a subset of the Go Template syntax.
|
519
518
|
"""
|
520
519
|
...
|
@@ -566,16 +565,16 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
566
565
|
def _internal_init(__self__,
|
567
566
|
resource_name: str,
|
568
567
|
opts: Optional[pulumi.ResourceOptions] = None,
|
569
|
-
access_key_id: Optional[pulumi.Input[
|
570
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
571
|
-
external_id: Optional[pulumi.Input[
|
572
|
-
granularity: Optional[pulumi.Input[
|
573
|
-
name: Optional[pulumi.Input[
|
574
|
-
namespace: Optional[pulumi.Input[
|
575
|
-
region: Optional[pulumi.Input[
|
576
|
-
role_arn: Optional[pulumi.Input[
|
577
|
-
secret_access_key: Optional[pulumi.Input[
|
578
|
-
secret_name_template: Optional[pulumi.Input[
|
568
|
+
access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
569
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
570
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
571
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
572
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
573
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
574
|
+
region: Optional[pulumi.Input[_builtins.str]] = None,
|
575
|
+
role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
576
|
+
secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
577
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
579
578
|
__props__=None):
|
580
579
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
581
580
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -608,17 +607,17 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
608
607
|
def get(resource_name: str,
|
609
608
|
id: pulumi.Input[str],
|
610
609
|
opts: Optional[pulumi.ResourceOptions] = None,
|
611
|
-
access_key_id: Optional[pulumi.Input[
|
612
|
-
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
613
|
-
external_id: Optional[pulumi.Input[
|
614
|
-
granularity: Optional[pulumi.Input[
|
615
|
-
name: Optional[pulumi.Input[
|
616
|
-
namespace: Optional[pulumi.Input[
|
617
|
-
region: Optional[pulumi.Input[
|
618
|
-
role_arn: Optional[pulumi.Input[
|
619
|
-
secret_access_key: Optional[pulumi.Input[
|
620
|
-
secret_name_template: Optional[pulumi.Input[
|
621
|
-
type: Optional[pulumi.Input[
|
610
|
+
access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
|
611
|
+
custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
612
|
+
external_id: Optional[pulumi.Input[_builtins.str]] = None,
|
613
|
+
granularity: Optional[pulumi.Input[_builtins.str]] = None,
|
614
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
615
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
616
|
+
region: Optional[pulumi.Input[_builtins.str]] = None,
|
617
|
+
role_arn: Optional[pulumi.Input[_builtins.str]] = None,
|
618
|
+
secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
|
619
|
+
secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
|
620
|
+
type: Optional[pulumi.Input[_builtins.str]] = None) -> 'SyncAwsDestination':
|
622
621
|
"""
|
623
622
|
Get an existing SyncAwsDestination resource's state with the given name, id, and optional extra
|
624
623
|
properties used to qualify the lookup.
|
@@ -626,35 +625,35 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
626
625
|
:param str resource_name: The unique name of the resulting resource.
|
627
626
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
628
627
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
629
|
-
:param pulumi.Input[
|
628
|
+
:param pulumi.Input[_builtins.str] access_key_id: Access key id to authenticate against the AWS secrets manager.
|
630
629
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
631
630
|
variable.
|
632
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
633
|
-
:param pulumi.Input[
|
631
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
|
632
|
+
:param pulumi.Input[_builtins.str] external_id: Optional extra protection that must match the trust policy granting access to the
|
634
633
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
635
634
|
The field is mutable with no special condition, but users must be careful that the new value fits with the trust
|
636
635
|
relationship condition they set on AWS otherwise sync operations will start to fail due to client-side access
|
637
636
|
denied errors. Ignored if the `role_arn` field is empty.
|
638
|
-
:param pulumi.Input[
|
637
|
+
:param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
|
639
638
|
at the destination. Supports `secret-path` and `secret-key`.
|
640
|
-
:param pulumi.Input[
|
641
|
-
:param pulumi.Input[
|
639
|
+
:param pulumi.Input[_builtins.str] name: Unique name of the AWS destination.
|
640
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
642
641
|
The value should not contain leading or trailing forward slashes.
|
643
642
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
644
|
-
:param pulumi.Input[
|
643
|
+
:param pulumi.Input[_builtins.str] region: Region where to manage the secrets manager entries.
|
645
644
|
Can be omitted and directly provided to Vault using the `AWS_REGION` environment
|
646
645
|
variable.
|
647
|
-
:param pulumi.Input[
|
646
|
+
:param pulumi.Input[_builtins.str] role_arn: Specifies a role to assume when connecting to AWS. When assuming a role,
|
648
647
|
Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
|
649
648
|
exist for Vault to be able to assume this role. The role can be in a different account.
|
650
649
|
The value is mutable as long as the new role targets the same AWS account ID. If not, the BE will return an error.
|
651
650
|
It is possible to provide both an access key pair and a role to assume.
|
652
|
-
:param pulumi.Input[
|
651
|
+
:param pulumi.Input[_builtins.str] secret_access_key: Secret access key to authenticate against the AWS secrets manager.
|
653
652
|
Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
|
654
653
|
variable.
|
655
|
-
:param pulumi.Input[
|
654
|
+
:param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
|
656
655
|
Supports a subset of the Go Template syntax.
|
657
|
-
:param pulumi.Input[
|
656
|
+
:param pulumi.Input[_builtins.str] type: The type of the secrets destination (`aws-sm`).
|
658
657
|
"""
|
659
658
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
660
659
|
|
@@ -673,9 +672,9 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
673
672
|
__props__.__dict__["type"] = type
|
674
673
|
return SyncAwsDestination(resource_name, opts=opts, __props__=__props__)
|
675
674
|
|
676
|
-
@property
|
675
|
+
@_builtins.property
|
677
676
|
@pulumi.getter(name="accessKeyId")
|
678
|
-
def access_key_id(self) -> pulumi.Output[Optional[
|
677
|
+
def access_key_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
679
678
|
"""
|
680
679
|
Access key id to authenticate against the AWS secrets manager.
|
681
680
|
Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
|
@@ -683,17 +682,17 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
683
682
|
"""
|
684
683
|
return pulumi.get(self, "access_key_id")
|
685
684
|
|
686
|
-
@property
|
685
|
+
@_builtins.property
|
687
686
|
@pulumi.getter(name="customTags")
|
688
|
-
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str,
|
687
|
+
def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
689
688
|
"""
|
690
689
|
Custom tags to set on the secret managed at the destination.
|
691
690
|
"""
|
692
691
|
return pulumi.get(self, "custom_tags")
|
693
692
|
|
694
|
-
@property
|
693
|
+
@_builtins.property
|
695
694
|
@pulumi.getter(name="externalId")
|
696
|
-
def external_id(self) -> pulumi.Output[Optional[
|
695
|
+
def external_id(self) -> pulumi.Output[Optional[_builtins.str]]:
|
697
696
|
"""
|
698
697
|
Optional extra protection that must match the trust policy granting access to the
|
699
698
|
AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
|
@@ -703,26 +702,26 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
703
702
|
"""
|
704
703
|
return pulumi.get(self, "external_id")
|
705
704
|
|
706
|
-
@property
|
705
|
+
@_builtins.property
|
707
706
|
@pulumi.getter
|
708
|
-
def granularity(self) -> pulumi.Output[Optional[
|
707
|
+
def granularity(self) -> pulumi.Output[Optional[_builtins.str]]:
|
709
708
|
"""
|
710
709
|
Determines what level of information is synced as a distinct resource
|
711
710
|
at the destination. Supports `secret-path` and `secret-key`.
|
712
711
|
"""
|
713
712
|
return pulumi.get(self, "granularity")
|
714
713
|
|
715
|
-
@property
|
714
|
+
@_builtins.property
|
716
715
|
@pulumi.getter
|
717
|
-
def name(self) -> pulumi.Output[
|
716
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
718
717
|
"""
|
719
718
|
Unique name of the AWS destination.
|
720
719
|
"""
|
721
720
|
return pulumi.get(self, "name")
|
722
721
|
|
723
|
-
@property
|
722
|
+
@_builtins.property
|
724
723
|
@pulumi.getter
|
725
|
-
def namespace(self) -> pulumi.Output[Optional[
|
724
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
726
725
|
"""
|
727
726
|
The namespace to provision the resource in.
|
728
727
|
The value should not contain leading or trailing forward slashes.
|
@@ -730,9 +729,9 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
730
729
|
"""
|
731
730
|
return pulumi.get(self, "namespace")
|
732
731
|
|
733
|
-
@property
|
732
|
+
@_builtins.property
|
734
733
|
@pulumi.getter
|
735
|
-
def region(self) -> pulumi.Output[Optional[
|
734
|
+
def region(self) -> pulumi.Output[Optional[_builtins.str]]:
|
736
735
|
"""
|
737
736
|
Region where to manage the secrets manager entries.
|
738
737
|
Can be omitted and directly provided to Vault using the `AWS_REGION` environment
|
@@ -740,9 +739,9 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
740
739
|
"""
|
741
740
|
return pulumi.get(self, "region")
|
742
741
|
|
743
|
-
@property
|
742
|
+
@_builtins.property
|
744
743
|
@pulumi.getter(name="roleArn")
|
745
|
-
def role_arn(self) -> pulumi.Output[Optional[
|
744
|
+
def role_arn(self) -> pulumi.Output[Optional[_builtins.str]]:
|
746
745
|
"""
|
747
746
|
Specifies a role to assume when connecting to AWS. When assuming a role,
|
748
747
|
Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
|
@@ -752,9 +751,9 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
752
751
|
"""
|
753
752
|
return pulumi.get(self, "role_arn")
|
754
753
|
|
755
|
-
@property
|
754
|
+
@_builtins.property
|
756
755
|
@pulumi.getter(name="secretAccessKey")
|
757
|
-
def secret_access_key(self) -> pulumi.Output[Optional[
|
756
|
+
def secret_access_key(self) -> pulumi.Output[Optional[_builtins.str]]:
|
758
757
|
"""
|
759
758
|
Secret access key to authenticate against the AWS secrets manager.
|
760
759
|
Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
|
@@ -762,18 +761,18 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
762
761
|
"""
|
763
762
|
return pulumi.get(self, "secret_access_key")
|
764
763
|
|
765
|
-
@property
|
764
|
+
@_builtins.property
|
766
765
|
@pulumi.getter(name="secretNameTemplate")
|
767
|
-
def secret_name_template(self) -> pulumi.Output[
|
766
|
+
def secret_name_template(self) -> pulumi.Output[_builtins.str]:
|
768
767
|
"""
|
769
768
|
Template describing how to generate external secret names.
|
770
769
|
Supports a subset of the Go Template syntax.
|
771
770
|
"""
|
772
771
|
return pulumi.get(self, "secret_name_template")
|
773
772
|
|
774
|
-
@property
|
773
|
+
@_builtins.property
|
775
774
|
@pulumi.getter
|
776
|
-
def type(self) -> pulumi.Output[
|
775
|
+
def type(self) -> pulumi.Output[_builtins.str]:
|
777
776
|
"""
|
778
777
|
The type of the secrets destination (`aws-sm`).
|
779
778
|
"""
|