pulumi-vault 7.6.0__py3-none-any.whl → 7.6.0a1764138710__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/database/_inputs.py +0 -40
- pulumi_vault/database/outputs.py +0 -28
- pulumi_vault/database/secret_backend_connection.py +0 -66
- pulumi_vault/database/secret_backend_static_role.py +1 -157
- pulumi_vault/kubernetes/auth_backend_role.py +18 -64
- pulumi_vault/kubernetes/get_auth_backend_role.py +1 -15
- pulumi_vault/pulumi-plugin.json +1 -1
- {pulumi_vault-7.6.0.dist-info → pulumi_vault-7.6.0a1764138710.dist-info}/METADATA +1 -1
- {pulumi_vault-7.6.0.dist-info → pulumi_vault-7.6.0a1764138710.dist-info}/RECORD +11 -11
- {pulumi_vault-7.6.0.dist-info → pulumi_vault-7.6.0a1764138710.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.6.0.dist-info → pulumi_vault-7.6.0a1764138710.dist-info}/top_level.txt +0 -0
pulumi_vault/database/_inputs.py
CHANGED
|
@@ -2739,10 +2739,6 @@ if not MYPY:
|
|
|
2739
2739
|
"""
|
|
2740
2740
|
Version counter for root credential password write-only field
|
|
2741
2741
|
"""
|
|
2742
|
-
self_managed: NotRequired[pulumi.Input[_builtins.bool]]
|
|
2743
|
-
"""
|
|
2744
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
|
2745
|
-
"""
|
|
2746
2742
|
split_statements: NotRequired[pulumi.Input[_builtins.bool]]
|
|
2747
2743
|
"""
|
|
2748
2744
|
Set to true in order to split statements after semi-colons.
|
|
@@ -2769,7 +2765,6 @@ class SecretBackendConnectionOracleArgs:
|
|
|
2769
2765
|
password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2770
2766
|
password_wo: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2771
2767
|
password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
|
2772
|
-
self_managed: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2773
2768
|
split_statements: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
2774
2769
|
username: Optional[pulumi.Input[_builtins.str]] = None,
|
|
2775
2770
|
username_template: Optional[pulumi.Input[_builtins.str]] = None):
|
|
@@ -2783,7 +2778,6 @@ class SecretBackendConnectionOracleArgs:
|
|
|
2783
2778
|
:param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
2784
2779
|
Write-only field for the root credential password used in the connection URL
|
|
2785
2780
|
:param pulumi.Input[_builtins.int] password_wo_version: Version counter for root credential password write-only field
|
|
2786
|
-
:param pulumi.Input[_builtins.bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
|
2787
2781
|
:param pulumi.Input[_builtins.bool] split_statements: Set to true in order to split statements after semi-colons.
|
|
2788
2782
|
:param pulumi.Input[_builtins.str] username: The root credential username used in the connection URL
|
|
2789
2783
|
:param pulumi.Input[_builtins.str] username_template: Username generation template.
|
|
@@ -2804,8 +2798,6 @@ class SecretBackendConnectionOracleArgs:
|
|
|
2804
2798
|
pulumi.set(__self__, "password_wo", password_wo)
|
|
2805
2799
|
if password_wo_version is not None:
|
|
2806
2800
|
pulumi.set(__self__, "password_wo_version", password_wo_version)
|
|
2807
|
-
if self_managed is not None:
|
|
2808
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
|
2809
2801
|
if split_statements is not None:
|
|
2810
2802
|
pulumi.set(__self__, "split_statements", split_statements)
|
|
2811
2803
|
if username is not None:
|
|
@@ -2910,18 +2902,6 @@ class SecretBackendConnectionOracleArgs:
|
|
|
2910
2902
|
def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
2911
2903
|
pulumi.set(self, "password_wo_version", value)
|
|
2912
2904
|
|
|
2913
|
-
@_builtins.property
|
|
2914
|
-
@pulumi.getter(name="selfManaged")
|
|
2915
|
-
def self_managed(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
2916
|
-
"""
|
|
2917
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
|
2918
|
-
"""
|
|
2919
|
-
return pulumi.get(self, "self_managed")
|
|
2920
|
-
|
|
2921
|
-
@self_managed.setter
|
|
2922
|
-
def self_managed(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
2923
|
-
pulumi.set(self, "self_managed", value)
|
|
2924
|
-
|
|
2925
2905
|
@_builtins.property
|
|
2926
2906
|
@pulumi.getter(name="splitStatements")
|
|
2927
2907
|
def split_statements(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
@@ -9378,10 +9358,6 @@ if not MYPY:
|
|
|
9378
9358
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
9379
9359
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
9380
9360
|
"""
|
|
9381
|
-
self_managed: NotRequired[pulumi.Input[_builtins.bool]]
|
|
9382
|
-
"""
|
|
9383
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
|
9384
|
-
"""
|
|
9385
9361
|
split_statements: NotRequired[pulumi.Input[_builtins.bool]]
|
|
9386
9362
|
"""
|
|
9387
9363
|
Set to true in order to split statements after semi-colons.
|
|
@@ -9422,7 +9398,6 @@ class SecretsMountOracleArgs:
|
|
|
9422
9398
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
9423
9399
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
9424
9400
|
rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
|
|
9425
|
-
self_managed: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
9426
9401
|
split_statements: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
9427
9402
|
username: Optional[pulumi.Input[_builtins.str]] = None,
|
|
9428
9403
|
username_template: Optional[pulumi.Input[_builtins.str]] = None,
|
|
@@ -9453,7 +9428,6 @@ class SecretsMountOracleArgs:
|
|
|
9453
9428
|
:param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
|
|
9454
9429
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
9455
9430
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
9456
|
-
:param pulumi.Input[_builtins.bool] self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
|
9457
9431
|
:param pulumi.Input[_builtins.bool] split_statements: Set to true in order to split statements after semi-colons.
|
|
9458
9432
|
:param pulumi.Input[_builtins.str] username: The root credential username used in the connection URL
|
|
9459
9433
|
:param pulumi.Input[_builtins.str] username_template: Username generation template.
|
|
@@ -9493,8 +9467,6 @@ class SecretsMountOracleArgs:
|
|
|
9493
9467
|
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
|
9494
9468
|
if rotation_window is not None:
|
|
9495
9469
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
|
9496
|
-
if self_managed is not None:
|
|
9497
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
|
9498
9470
|
if split_statements is not None:
|
|
9499
9471
|
pulumi.set(__self__, "split_statements", split_statements)
|
|
9500
9472
|
if username is not None:
|
|
@@ -9716,18 +9688,6 @@ class SecretsMountOracleArgs:
|
|
|
9716
9688
|
def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
9717
9689
|
pulumi.set(self, "rotation_window", value)
|
|
9718
9690
|
|
|
9719
|
-
@_builtins.property
|
|
9720
|
-
@pulumi.getter(name="selfManaged")
|
|
9721
|
-
def self_managed(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
9722
|
-
"""
|
|
9723
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
|
9724
|
-
"""
|
|
9725
|
-
return pulumi.get(self, "self_managed")
|
|
9726
|
-
|
|
9727
|
-
@self_managed.setter
|
|
9728
|
-
def self_managed(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
9729
|
-
pulumi.set(self, "self_managed", value)
|
|
9730
|
-
|
|
9731
9691
|
@_builtins.property
|
|
9732
9692
|
@pulumi.getter(name="splitStatements")
|
|
9733
9693
|
def split_statements(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
pulumi_vault/database/outputs.py
CHANGED
|
@@ -1996,8 +1996,6 @@ class SecretBackendConnectionOracle(dict):
|
|
|
1996
1996
|
suggest = "password_wo"
|
|
1997
1997
|
elif key == "passwordWoVersion":
|
|
1998
1998
|
suggest = "password_wo_version"
|
|
1999
|
-
elif key == "selfManaged":
|
|
2000
|
-
suggest = "self_managed"
|
|
2001
1999
|
elif key == "splitStatements":
|
|
2002
2000
|
suggest = "split_statements"
|
|
2003
2001
|
elif key == "usernameTemplate":
|
|
@@ -2023,7 +2021,6 @@ class SecretBackendConnectionOracle(dict):
|
|
|
2023
2021
|
password: Optional[_builtins.str] = None,
|
|
2024
2022
|
password_wo: Optional[_builtins.str] = None,
|
|
2025
2023
|
password_wo_version: Optional[_builtins.int] = None,
|
|
2026
|
-
self_managed: Optional[_builtins.bool] = None,
|
|
2027
2024
|
split_statements: Optional[_builtins.bool] = None,
|
|
2028
2025
|
username: Optional[_builtins.str] = None,
|
|
2029
2026
|
username_template: Optional[_builtins.str] = None):
|
|
@@ -2037,7 +2034,6 @@ class SecretBackendConnectionOracle(dict):
|
|
|
2037
2034
|
:param _builtins.str password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
2038
2035
|
Write-only field for the root credential password used in the connection URL
|
|
2039
2036
|
:param _builtins.int password_wo_version: Version counter for root credential password write-only field
|
|
2040
|
-
:param _builtins.bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
|
2041
2037
|
:param _builtins.bool split_statements: Set to true in order to split statements after semi-colons.
|
|
2042
2038
|
:param _builtins.str username: The root credential username used in the connection URL
|
|
2043
2039
|
:param _builtins.str username_template: Username generation template.
|
|
@@ -2058,8 +2054,6 @@ class SecretBackendConnectionOracle(dict):
|
|
|
2058
2054
|
pulumi.set(__self__, "password_wo", password_wo)
|
|
2059
2055
|
if password_wo_version is not None:
|
|
2060
2056
|
pulumi.set(__self__, "password_wo_version", password_wo_version)
|
|
2061
|
-
if self_managed is not None:
|
|
2062
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
|
2063
2057
|
if split_statements is not None:
|
|
2064
2058
|
pulumi.set(__self__, "split_statements", split_statements)
|
|
2065
2059
|
if username is not None:
|
|
@@ -2132,14 +2126,6 @@ class SecretBackendConnectionOracle(dict):
|
|
|
2132
2126
|
"""
|
|
2133
2127
|
return pulumi.get(self, "password_wo_version")
|
|
2134
2128
|
|
|
2135
|
-
@_builtins.property
|
|
2136
|
-
@pulumi.getter(name="selfManaged")
|
|
2137
|
-
def self_managed(self) -> Optional[_builtins.bool]:
|
|
2138
|
-
"""
|
|
2139
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
|
2140
|
-
"""
|
|
2141
|
-
return pulumi.get(self, "self_managed")
|
|
2142
|
-
|
|
2143
2129
|
@_builtins.property
|
|
2144
2130
|
@pulumi.getter(name="splitStatements")
|
|
2145
2131
|
def split_statements(self) -> Optional[_builtins.bool]:
|
|
@@ -6690,8 +6676,6 @@ class SecretsMountOracle(dict):
|
|
|
6690
6676
|
suggest = "rotation_schedule"
|
|
6691
6677
|
elif key == "rotationWindow":
|
|
6692
6678
|
suggest = "rotation_window"
|
|
6693
|
-
elif key == "selfManaged":
|
|
6694
|
-
suggest = "self_managed"
|
|
6695
6679
|
elif key == "splitStatements":
|
|
6696
6680
|
suggest = "split_statements"
|
|
6697
6681
|
elif key == "usernameTemplate":
|
|
@@ -6728,7 +6712,6 @@ class SecretsMountOracle(dict):
|
|
|
6728
6712
|
rotation_period: Optional[_builtins.int] = None,
|
|
6729
6713
|
rotation_schedule: Optional[_builtins.str] = None,
|
|
6730
6714
|
rotation_window: Optional[_builtins.int] = None,
|
|
6731
|
-
self_managed: Optional[_builtins.bool] = None,
|
|
6732
6715
|
split_statements: Optional[_builtins.bool] = None,
|
|
6733
6716
|
username: Optional[_builtins.str] = None,
|
|
6734
6717
|
username_template: Optional[_builtins.str] = None,
|
|
@@ -6759,7 +6742,6 @@ class SecretsMountOracle(dict):
|
|
|
6759
6742
|
:param _builtins.int rotation_window: The maximum amount of time in seconds allowed to complete
|
|
6760
6743
|
a rotation when a scheduled token rotation occurs. The default rotation window is
|
|
6761
6744
|
unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
6762
|
-
:param _builtins.bool self_managed: If set, allows onboarding static roles with a rootless connection configuration.
|
|
6763
6745
|
:param _builtins.bool split_statements: Set to true in order to split statements after semi-colons.
|
|
6764
6746
|
:param _builtins.str username: The root credential username used in the connection URL
|
|
6765
6747
|
:param _builtins.str username_template: Username generation template.
|
|
@@ -6799,8 +6781,6 @@ class SecretsMountOracle(dict):
|
|
|
6799
6781
|
pulumi.set(__self__, "rotation_schedule", rotation_schedule)
|
|
6800
6782
|
if rotation_window is not None:
|
|
6801
6783
|
pulumi.set(__self__, "rotation_window", rotation_window)
|
|
6802
|
-
if self_managed is not None:
|
|
6803
|
-
pulumi.set(__self__, "self_managed", self_managed)
|
|
6804
6784
|
if split_statements is not None:
|
|
6805
6785
|
pulumi.set(__self__, "split_statements", split_statements)
|
|
6806
6786
|
if username is not None:
|
|
@@ -6954,14 +6934,6 @@ class SecretsMountOracle(dict):
|
|
|
6954
6934
|
"""
|
|
6955
6935
|
return pulumi.get(self, "rotation_window")
|
|
6956
6936
|
|
|
6957
|
-
@_builtins.property
|
|
6958
|
-
@pulumi.getter(name="selfManaged")
|
|
6959
|
-
def self_managed(self) -> Optional[_builtins.bool]:
|
|
6960
|
-
"""
|
|
6961
|
-
If set, allows onboarding static roles with a rootless connection configuration.
|
|
6962
|
-
"""
|
|
6963
|
-
return pulumi.get(self, "self_managed")
|
|
6964
|
-
|
|
6965
6937
|
@_builtins.property
|
|
6966
6938
|
@pulumi.getter(name="splitStatements")
|
|
6967
6939
|
def split_statements(self) -> Optional[_builtins.bool]:
|
|
@@ -1077,8 +1077,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
|
1077
1077
|
"""
|
|
1078
1078
|
## Example Usage
|
|
1079
1079
|
|
|
1080
|
-
### PostgreSQL Connection
|
|
1081
|
-
|
|
1082
1080
|
```python
|
|
1083
1081
|
import pulumi
|
|
1084
1082
|
import pulumi_vault as vault
|
|
@@ -1100,37 +1098,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
|
1100
1098
|
})
|
|
1101
1099
|
```
|
|
1102
1100
|
|
|
1103
|
-
### Oracle Connection with Self-Managed Mode (Rootless)
|
|
1104
|
-
|
|
1105
|
-
For Vault 1.18+ Enterprise, you can configure Oracle connections in self-managed mode,
|
|
1106
|
-
which allows a static role to manage its own database credentials without requiring root access:
|
|
1107
|
-
|
|
1108
|
-
```python
|
|
1109
|
-
import pulumi
|
|
1110
|
-
import pulumi_vault as vault
|
|
1111
|
-
|
|
1112
|
-
db = vault.Mount("db",
|
|
1113
|
-
path="database",
|
|
1114
|
-
type="database")
|
|
1115
|
-
oracle = vault.database.SecretBackendConnection("oracle",
|
|
1116
|
-
backend=db.path,
|
|
1117
|
-
name="oracle",
|
|
1118
|
-
allowed_roles=["my-role"],
|
|
1119
|
-
oracle={
|
|
1120
|
-
"connection_url": "{{username}}/{{password}}@//host:port/service",
|
|
1121
|
-
"self_managed": True,
|
|
1122
|
-
"plugin_name": "vault-plugin-database-oracle",
|
|
1123
|
-
})
|
|
1124
|
-
oracle_role = vault.database.SecretBackendStaticRole("oracle_role",
|
|
1125
|
-
backend=db.path,
|
|
1126
|
-
name="my-role",
|
|
1127
|
-
db_name=oracle.name,
|
|
1128
|
-
username="vault_user",
|
|
1129
|
-
password_wo="initial-password",
|
|
1130
|
-
password_wo_version=1,
|
|
1131
|
-
rotation_period=3600)
|
|
1132
|
-
```
|
|
1133
|
-
|
|
1134
1101
|
## Ephemeral Attributes Reference
|
|
1135
1102
|
|
|
1136
1103
|
The following write-only attributes are supported for all DBs that support username/password:
|
|
@@ -1204,8 +1171,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
|
1204
1171
|
"""
|
|
1205
1172
|
## Example Usage
|
|
1206
1173
|
|
|
1207
|
-
### PostgreSQL Connection
|
|
1208
|
-
|
|
1209
1174
|
```python
|
|
1210
1175
|
import pulumi
|
|
1211
1176
|
import pulumi_vault as vault
|
|
@@ -1227,37 +1192,6 @@ class SecretBackendConnection(pulumi.CustomResource):
|
|
|
1227
1192
|
})
|
|
1228
1193
|
```
|
|
1229
1194
|
|
|
1230
|
-
### Oracle Connection with Self-Managed Mode (Rootless)
|
|
1231
|
-
|
|
1232
|
-
For Vault 1.18+ Enterprise, you can configure Oracle connections in self-managed mode,
|
|
1233
|
-
which allows a static role to manage its own database credentials without requiring root access:
|
|
1234
|
-
|
|
1235
|
-
```python
|
|
1236
|
-
import pulumi
|
|
1237
|
-
import pulumi_vault as vault
|
|
1238
|
-
|
|
1239
|
-
db = vault.Mount("db",
|
|
1240
|
-
path="database",
|
|
1241
|
-
type="database")
|
|
1242
|
-
oracle = vault.database.SecretBackendConnection("oracle",
|
|
1243
|
-
backend=db.path,
|
|
1244
|
-
name="oracle",
|
|
1245
|
-
allowed_roles=["my-role"],
|
|
1246
|
-
oracle={
|
|
1247
|
-
"connection_url": "{{username}}/{{password}}@//host:port/service",
|
|
1248
|
-
"self_managed": True,
|
|
1249
|
-
"plugin_name": "vault-plugin-database-oracle",
|
|
1250
|
-
})
|
|
1251
|
-
oracle_role = vault.database.SecretBackendStaticRole("oracle_role",
|
|
1252
|
-
backend=db.path,
|
|
1253
|
-
name="my-role",
|
|
1254
|
-
db_name=oracle.name,
|
|
1255
|
-
username="vault_user",
|
|
1256
|
-
password_wo="initial-password",
|
|
1257
|
-
password_wo_version=1,
|
|
1258
|
-
rotation_period=3600)
|
|
1259
|
-
```
|
|
1260
|
-
|
|
1261
1195
|
## Ephemeral Attributes Reference
|
|
1262
1196
|
|
|
1263
1197
|
The following write-only attributes are supported for all DBs that support username/password:
|
|
@@ -26,8 +26,6 @@ class SecretBackendStaticRoleArgs:
|
|
|
26
26
|
credential_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
27
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
28
28
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
29
|
-
password_wo: Optional[pulumi.Input[_builtins.str]] = None,
|
|
30
|
-
password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
|
31
29
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
32
30
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
33
31
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
@@ -45,13 +43,6 @@ class SecretBackendStaticRoleArgs:
|
|
|
45
43
|
The value should not contain leading or trailing forward slashes.
|
|
46
44
|
The `namespace` is always relative to the provider's configured namespace.
|
|
47
45
|
*Available only for Vault Enterprise*.
|
|
48
|
-
:param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
49
|
-
The password corresponding to the username in the database.
|
|
50
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
51
|
-
Cannot be used with `self_managed_password`.
|
|
52
|
-
:param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
|
|
53
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
54
|
-
updating write-only attributes.
|
|
55
46
|
:param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
|
56
47
|
Mutually exclusive with `rotation_schedule`.
|
|
57
48
|
:param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
|
@@ -65,7 +56,6 @@ class SecretBackendStaticRoleArgs:
|
|
|
65
56
|
:param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
|
|
66
57
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
67
58
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
68
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
69
59
|
:param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
|
70
60
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
|
71
61
|
"""
|
|
@@ -80,10 +70,6 @@ class SecretBackendStaticRoleArgs:
|
|
|
80
70
|
pulumi.set(__self__, "name", name)
|
|
81
71
|
if namespace is not None:
|
|
82
72
|
pulumi.set(__self__, "namespace", namespace)
|
|
83
|
-
if password_wo is not None:
|
|
84
|
-
pulumi.set(__self__, "password_wo", password_wo)
|
|
85
|
-
if password_wo_version is not None:
|
|
86
|
-
pulumi.set(__self__, "password_wo_version", password_wo_version)
|
|
87
73
|
if rotation_period is not None:
|
|
88
74
|
pulumi.set(__self__, "rotation_period", rotation_period)
|
|
89
75
|
if rotation_schedule is not None:
|
|
@@ -181,35 +167,6 @@ class SecretBackendStaticRoleArgs:
|
|
|
181
167
|
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
182
168
|
pulumi.set(self, "namespace", value)
|
|
183
169
|
|
|
184
|
-
@_builtins.property
|
|
185
|
-
@pulumi.getter(name="passwordWo")
|
|
186
|
-
def password_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
187
|
-
"""
|
|
188
|
-
**NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
189
|
-
The password corresponding to the username in the database.
|
|
190
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
191
|
-
Cannot be used with `self_managed_password`.
|
|
192
|
-
"""
|
|
193
|
-
return pulumi.get(self, "password_wo")
|
|
194
|
-
|
|
195
|
-
@password_wo.setter
|
|
196
|
-
def password_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
197
|
-
pulumi.set(self, "password_wo", value)
|
|
198
|
-
|
|
199
|
-
@_builtins.property
|
|
200
|
-
@pulumi.getter(name="passwordWoVersion")
|
|
201
|
-
def password_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
202
|
-
"""
|
|
203
|
-
The version of the `password_wo` field.
|
|
204
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
205
|
-
updating write-only attributes.
|
|
206
|
-
"""
|
|
207
|
-
return pulumi.get(self, "password_wo_version")
|
|
208
|
-
|
|
209
|
-
@password_wo_version.setter
|
|
210
|
-
def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
211
|
-
pulumi.set(self, "password_wo_version", value)
|
|
212
|
-
|
|
213
170
|
@_builtins.property
|
|
214
171
|
@pulumi.getter(name="rotationPeriod")
|
|
215
172
|
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
@@ -271,7 +228,6 @@ class SecretBackendStaticRoleArgs:
|
|
|
271
228
|
The password corresponding to the username in the database.
|
|
272
229
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
273
230
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
274
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
275
231
|
"""
|
|
276
232
|
return pulumi.get(self, "self_managed_password")
|
|
277
233
|
|
|
@@ -302,8 +258,6 @@ class _SecretBackendStaticRoleState:
|
|
|
302
258
|
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
303
259
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
304
260
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
305
|
-
password_wo: Optional[pulumi.Input[_builtins.str]] = None,
|
|
306
|
-
password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
|
307
261
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
308
262
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
309
263
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
@@ -321,13 +275,6 @@ class _SecretBackendStaticRoleState:
|
|
|
321
275
|
The value should not contain leading or trailing forward slashes.
|
|
322
276
|
The `namespace` is always relative to the provider's configured namespace.
|
|
323
277
|
*Available only for Vault Enterprise*.
|
|
324
|
-
:param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
325
|
-
The password corresponding to the username in the database.
|
|
326
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
327
|
-
Cannot be used with `self_managed_password`.
|
|
328
|
-
:param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
|
|
329
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
330
|
-
updating write-only attributes.
|
|
331
278
|
:param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
|
332
279
|
Mutually exclusive with `rotation_schedule`.
|
|
333
280
|
:param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
|
@@ -341,7 +288,6 @@ class _SecretBackendStaticRoleState:
|
|
|
341
288
|
:param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
|
|
342
289
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
343
290
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
344
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
345
291
|
:param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
|
346
292
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
|
347
293
|
:param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
|
|
@@ -358,10 +304,6 @@ class _SecretBackendStaticRoleState:
|
|
|
358
304
|
pulumi.set(__self__, "name", name)
|
|
359
305
|
if namespace is not None:
|
|
360
306
|
pulumi.set(__self__, "namespace", namespace)
|
|
361
|
-
if password_wo is not None:
|
|
362
|
-
pulumi.set(__self__, "password_wo", password_wo)
|
|
363
|
-
if password_wo_version is not None:
|
|
364
|
-
pulumi.set(__self__, "password_wo_version", password_wo_version)
|
|
365
307
|
if rotation_period is not None:
|
|
366
308
|
pulumi.set(__self__, "rotation_period", rotation_period)
|
|
367
309
|
if rotation_schedule is not None:
|
|
@@ -449,35 +391,6 @@ class _SecretBackendStaticRoleState:
|
|
|
449
391
|
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
450
392
|
pulumi.set(self, "namespace", value)
|
|
451
393
|
|
|
452
|
-
@_builtins.property
|
|
453
|
-
@pulumi.getter(name="passwordWo")
|
|
454
|
-
def password_wo(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
455
|
-
"""
|
|
456
|
-
**NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
457
|
-
The password corresponding to the username in the database.
|
|
458
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
459
|
-
Cannot be used with `self_managed_password`.
|
|
460
|
-
"""
|
|
461
|
-
return pulumi.get(self, "password_wo")
|
|
462
|
-
|
|
463
|
-
@password_wo.setter
|
|
464
|
-
def password_wo(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
465
|
-
pulumi.set(self, "password_wo", value)
|
|
466
|
-
|
|
467
|
-
@_builtins.property
|
|
468
|
-
@pulumi.getter(name="passwordWoVersion")
|
|
469
|
-
def password_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
470
|
-
"""
|
|
471
|
-
The version of the `password_wo` field.
|
|
472
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
473
|
-
updating write-only attributes.
|
|
474
|
-
"""
|
|
475
|
-
return pulumi.get(self, "password_wo_version")
|
|
476
|
-
|
|
477
|
-
@password_wo_version.setter
|
|
478
|
-
def password_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
479
|
-
pulumi.set(self, "password_wo_version", value)
|
|
480
|
-
|
|
481
394
|
@_builtins.property
|
|
482
395
|
@pulumi.getter(name="rotationPeriod")
|
|
483
396
|
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
@@ -539,7 +452,6 @@ class _SecretBackendStaticRoleState:
|
|
|
539
452
|
The password corresponding to the username in the database.
|
|
540
453
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
541
454
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
542
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
543
455
|
"""
|
|
544
456
|
return pulumi.get(self, "self_managed_password")
|
|
545
457
|
|
|
@@ -585,8 +497,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
585
497
|
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
586
498
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
587
499
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
588
|
-
password_wo: Optional[pulumi.Input[_builtins.str]] = None,
|
|
589
|
-
password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
|
590
500
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
591
501
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
592
502
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
@@ -633,16 +543,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
633
543
|
rotation_schedule="0 0 * * SAT",
|
|
634
544
|
rotation_window=172800,
|
|
635
545
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
|
636
|
-
# configure a static role with a password (Vault 1.19+)
|
|
637
|
-
password_role = vault.database.SecretBackendStaticRole("password_role",
|
|
638
|
-
backend=db.path,
|
|
639
|
-
name="my-password-role",
|
|
640
|
-
db_name=postgres.name,
|
|
641
|
-
username="example",
|
|
642
|
-
password_wo="my-password",
|
|
643
|
-
password_wo_version=1,
|
|
644
|
-
rotation_period=3600,
|
|
645
|
-
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
|
646
546
|
```
|
|
647
547
|
|
|
648
548
|
## Import
|
|
@@ -663,13 +563,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
663
563
|
The value should not contain leading or trailing forward slashes.
|
|
664
564
|
The `namespace` is always relative to the provider's configured namespace.
|
|
665
565
|
*Available only for Vault Enterprise*.
|
|
666
|
-
:param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
667
|
-
The password corresponding to the username in the database.
|
|
668
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
669
|
-
Cannot be used with `self_managed_password`.
|
|
670
|
-
:param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
|
|
671
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
672
|
-
updating write-only attributes.
|
|
673
566
|
:param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
|
674
567
|
Mutually exclusive with `rotation_schedule`.
|
|
675
568
|
:param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
|
@@ -683,7 +576,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
683
576
|
:param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
|
|
684
577
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
685
578
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
686
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
687
579
|
:param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
|
688
580
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
|
689
581
|
:param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
|
|
@@ -732,16 +624,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
732
624
|
rotation_schedule="0 0 * * SAT",
|
|
733
625
|
rotation_window=172800,
|
|
734
626
|
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
|
735
|
-
# configure a static role with a password (Vault 1.19+)
|
|
736
|
-
password_role = vault.database.SecretBackendStaticRole("password_role",
|
|
737
|
-
backend=db.path,
|
|
738
|
-
name="my-password-role",
|
|
739
|
-
db_name=postgres.name,
|
|
740
|
-
username="example",
|
|
741
|
-
password_wo="my-password",
|
|
742
|
-
password_wo_version=1,
|
|
743
|
-
rotation_period=3600,
|
|
744
|
-
rotation_statements=["ALTER USER \\"{{name}}\\" WITH PASSWORD '{{password}}';"])
|
|
745
627
|
```
|
|
746
628
|
|
|
747
629
|
## Import
|
|
@@ -773,8 +655,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
773
655
|
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
774
656
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
775
657
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
776
|
-
password_wo: Optional[pulumi.Input[_builtins.str]] = None,
|
|
777
|
-
password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
|
778
658
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
779
659
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
780
660
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
@@ -801,8 +681,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
801
681
|
__props__.__dict__["db_name"] = db_name
|
|
802
682
|
__props__.__dict__["name"] = name
|
|
803
683
|
__props__.__dict__["namespace"] = namespace
|
|
804
|
-
__props__.__dict__["password_wo"] = None if password_wo is None else pulumi.Output.secret(password_wo)
|
|
805
|
-
__props__.__dict__["password_wo_version"] = password_wo_version
|
|
806
684
|
__props__.__dict__["rotation_period"] = rotation_period
|
|
807
685
|
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
|
808
686
|
__props__.__dict__["rotation_statements"] = rotation_statements
|
|
@@ -812,7 +690,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
812
690
|
if username is None and not opts.urn:
|
|
813
691
|
raise TypeError("Missing required property 'username'")
|
|
814
692
|
__props__.__dict__["username"] = username
|
|
815
|
-
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["
|
|
693
|
+
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["selfManagedPassword"])
|
|
816
694
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
|
817
695
|
super(SecretBackendStaticRole, __self__).__init__(
|
|
818
696
|
'vault:database/secretBackendStaticRole:SecretBackendStaticRole',
|
|
@@ -830,8 +708,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
830
708
|
db_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
831
709
|
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
832
710
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
833
|
-
password_wo: Optional[pulumi.Input[_builtins.str]] = None,
|
|
834
|
-
password_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
|
835
711
|
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
|
836
712
|
rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
|
|
837
713
|
rotation_statements: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
@@ -854,13 +730,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
854
730
|
The value should not contain leading or trailing forward slashes.
|
|
855
731
|
The `namespace` is always relative to the provider's configured namespace.
|
|
856
732
|
*Available only for Vault Enterprise*.
|
|
857
|
-
:param pulumi.Input[_builtins.str] password_wo: **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
858
|
-
The password corresponding to the username in the database.
|
|
859
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
860
|
-
Cannot be used with `self_managed_password`.
|
|
861
|
-
:param pulumi.Input[_builtins.int] password_wo_version: The version of the `password_wo` field.
|
|
862
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
863
|
-
updating write-only attributes.
|
|
864
733
|
:param pulumi.Input[_builtins.int] rotation_period: The amount of time Vault should wait before rotating the password, in seconds.
|
|
865
734
|
Mutually exclusive with `rotation_schedule`.
|
|
866
735
|
:param pulumi.Input[_builtins.str] rotation_schedule: A cron-style string that will define the schedule on which rotations should occur.
|
|
@@ -874,7 +743,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
874
743
|
:param pulumi.Input[_builtins.str] self_managed_password: The password corresponding to the username in the database.
|
|
875
744
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
876
745
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
877
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
878
746
|
:param pulumi.Input[_builtins.bool] skip_import_rotation: If set to true, Vault will skip the
|
|
879
747
|
initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
|
880
748
|
:param pulumi.Input[_builtins.str] username: The database username that this static role corresponds to.
|
|
@@ -889,8 +757,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
889
757
|
__props__.__dict__["db_name"] = db_name
|
|
890
758
|
__props__.__dict__["name"] = name
|
|
891
759
|
__props__.__dict__["namespace"] = namespace
|
|
892
|
-
__props__.__dict__["password_wo"] = password_wo
|
|
893
|
-
__props__.__dict__["password_wo_version"] = password_wo_version
|
|
894
760
|
__props__.__dict__["rotation_period"] = rotation_period
|
|
895
761
|
__props__.__dict__["rotation_schedule"] = rotation_schedule
|
|
896
762
|
__props__.__dict__["rotation_statements"] = rotation_statements
|
|
@@ -948,27 +814,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
948
814
|
"""
|
|
949
815
|
return pulumi.get(self, "namespace")
|
|
950
816
|
|
|
951
|
-
@_builtins.property
|
|
952
|
-
@pulumi.getter(name="passwordWo")
|
|
953
|
-
def password_wo(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
954
|
-
"""
|
|
955
|
-
**NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
956
|
-
The password corresponding to the username in the database.
|
|
957
|
-
This is a write-only field. Requires Vault 1.19+. Deprecates `self_managed_password` which was introduced in Vault 1.18.
|
|
958
|
-
Cannot be used with `self_managed_password`.
|
|
959
|
-
"""
|
|
960
|
-
return pulumi.get(self, "password_wo")
|
|
961
|
-
|
|
962
|
-
@_builtins.property
|
|
963
|
-
@pulumi.getter(name="passwordWoVersion")
|
|
964
|
-
def password_wo_version(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
965
|
-
"""
|
|
966
|
-
The version of the `password_wo` field.
|
|
967
|
-
Used for tracking changes to the write-only password field. For more info see
|
|
968
|
-
updating write-only attributes.
|
|
969
|
-
"""
|
|
970
|
-
return pulumi.get(self, "password_wo_version")
|
|
971
|
-
|
|
972
817
|
@_builtins.property
|
|
973
818
|
@pulumi.getter(name="rotationPeriod")
|
|
974
819
|
def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
@@ -1014,7 +859,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
|
1014
859
|
The password corresponding to the username in the database.
|
|
1015
860
|
Required when using the Rootless Password Rotation workflow for static roles. Only enabled for
|
|
1016
861
|
select DB engines (Postgres). Requires Vault 1.18+ Enterprise.
|
|
1017
|
-
**Deprecated**: Use `password_wo` instead. This field will be removed in a future version.
|
|
1018
862
|
"""
|
|
1019
863
|
return pulumi.get(self, "self_managed_password")
|
|
1020
864
|
|
|
@@ -20,13 +20,12 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
|
|
|
20
20
|
class AuthBackendRoleArgs:
|
|
21
21
|
def __init__(__self__, *,
|
|
22
22
|
bound_service_account_names: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
|
23
|
+
bound_service_account_namespaces: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
|
23
24
|
role_name: pulumi.Input[_builtins.str],
|
|
24
25
|
alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
25
26
|
alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
|
|
26
27
|
audience: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
28
|
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
28
|
-
bound_service_account_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
|
|
29
|
-
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
30
29
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
31
30
|
token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
32
31
|
token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
@@ -40,6 +39,7 @@ class AuthBackendRoleArgs:
|
|
|
40
39
|
"""
|
|
41
40
|
The set of arguments for constructing a AuthBackendRole resource.
|
|
42
41
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
|
42
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
|
43
43
|
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
|
44
44
|
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
|
|
45
45
|
This should be a list or map containing the metadata in key value pairs.
|
|
@@ -51,8 +51,6 @@ class AuthBackendRoleArgs:
|
|
|
51
51
|
before setting this to something other its default value. There are **important** security
|
|
52
52
|
implications to be aware of.
|
|
53
53
|
:param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
|
|
54
|
-
:param pulumi.Input[_builtins.str] bound_service_account_namespace_selector: A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
|
|
55
|
-
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
|
56
54
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
57
55
|
The value should not contain leading or trailing forward slashes.
|
|
58
56
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
@@ -68,6 +66,7 @@ class AuthBackendRoleArgs:
|
|
|
68
66
|
:param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
|
|
69
67
|
"""
|
|
70
68
|
pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
|
|
69
|
+
pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
|
|
71
70
|
pulumi.set(__self__, "role_name", role_name)
|
|
72
71
|
if alias_metadata is not None:
|
|
73
72
|
pulumi.set(__self__, "alias_metadata", alias_metadata)
|
|
@@ -77,10 +76,6 @@ class AuthBackendRoleArgs:
|
|
|
77
76
|
pulumi.set(__self__, "audience", audience)
|
|
78
77
|
if backend is not None:
|
|
79
78
|
pulumi.set(__self__, "backend", backend)
|
|
80
|
-
if bound_service_account_namespace_selector is not None:
|
|
81
|
-
pulumi.set(__self__, "bound_service_account_namespace_selector", bound_service_account_namespace_selector)
|
|
82
|
-
if bound_service_account_namespaces is not None:
|
|
83
|
-
pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
|
|
84
79
|
if namespace is not None:
|
|
85
80
|
pulumi.set(__self__, "namespace", namespace)
|
|
86
81
|
if token_bound_cidrs is not None:
|
|
@@ -114,6 +109,18 @@ class AuthBackendRoleArgs:
|
|
|
114
109
|
def bound_service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
|
115
110
|
pulumi.set(self, "bound_service_account_names", value)
|
|
116
111
|
|
|
112
|
+
@_builtins.property
|
|
113
|
+
@pulumi.getter(name="boundServiceAccountNamespaces")
|
|
114
|
+
def bound_service_account_namespaces(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
|
115
|
+
"""
|
|
116
|
+
List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
|
117
|
+
"""
|
|
118
|
+
return pulumi.get(self, "bound_service_account_namespaces")
|
|
119
|
+
|
|
120
|
+
@bound_service_account_namespaces.setter
|
|
121
|
+
def bound_service_account_namespaces(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
|
122
|
+
pulumi.set(self, "bound_service_account_namespaces", value)
|
|
123
|
+
|
|
117
124
|
@_builtins.property
|
|
118
125
|
@pulumi.getter(name="roleName")
|
|
119
126
|
def role_name(self) -> pulumi.Input[_builtins.str]:
|
|
@@ -180,30 +187,6 @@ class AuthBackendRoleArgs:
|
|
|
180
187
|
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
181
188
|
pulumi.set(self, "backend", value)
|
|
182
189
|
|
|
183
|
-
@_builtins.property
|
|
184
|
-
@pulumi.getter(name="boundServiceAccountNamespaceSelector")
|
|
185
|
-
def bound_service_account_namespace_selector(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
186
|
-
"""
|
|
187
|
-
A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
|
|
188
|
-
"""
|
|
189
|
-
return pulumi.get(self, "bound_service_account_namespace_selector")
|
|
190
|
-
|
|
191
|
-
@bound_service_account_namespace_selector.setter
|
|
192
|
-
def bound_service_account_namespace_selector(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
193
|
-
pulumi.set(self, "bound_service_account_namespace_selector", value)
|
|
194
|
-
|
|
195
|
-
@_builtins.property
|
|
196
|
-
@pulumi.getter(name="boundServiceAccountNamespaces")
|
|
197
|
-
def bound_service_account_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
198
|
-
"""
|
|
199
|
-
List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
|
200
|
-
"""
|
|
201
|
-
return pulumi.get(self, "bound_service_account_namespaces")
|
|
202
|
-
|
|
203
|
-
@bound_service_account_namespaces.setter
|
|
204
|
-
def bound_service_account_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
205
|
-
pulumi.set(self, "bound_service_account_namespaces", value)
|
|
206
|
-
|
|
207
190
|
@_builtins.property
|
|
208
191
|
@pulumi.getter
|
|
209
192
|
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
@@ -336,7 +319,6 @@ class _AuthBackendRoleState:
|
|
|
336
319
|
audience: Optional[pulumi.Input[_builtins.str]] = None,
|
|
337
320
|
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
338
321
|
bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
339
|
-
bound_service_account_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
|
|
340
322
|
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
341
323
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
342
324
|
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
@@ -362,7 +344,6 @@ class _AuthBackendRoleState:
|
|
|
362
344
|
implications to be aware of.
|
|
363
345
|
:param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
|
|
364
346
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
|
365
|
-
:param pulumi.Input[_builtins.str] bound_service_account_namespace_selector: A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
|
|
366
347
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
|
367
348
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
368
349
|
The value should not contain leading or trailing forward slashes.
|
|
@@ -389,8 +370,6 @@ class _AuthBackendRoleState:
|
|
|
389
370
|
pulumi.set(__self__, "backend", backend)
|
|
390
371
|
if bound_service_account_names is not None:
|
|
391
372
|
pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
|
|
392
|
-
if bound_service_account_namespace_selector is not None:
|
|
393
|
-
pulumi.set(__self__, "bound_service_account_namespace_selector", bound_service_account_namespace_selector)
|
|
394
373
|
if bound_service_account_namespaces is not None:
|
|
395
374
|
pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
|
|
396
375
|
if namespace is not None:
|
|
@@ -482,18 +461,6 @@ class _AuthBackendRoleState:
|
|
|
482
461
|
def bound_service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
483
462
|
pulumi.set(self, "bound_service_account_names", value)
|
|
484
463
|
|
|
485
|
-
@_builtins.property
|
|
486
|
-
@pulumi.getter(name="boundServiceAccountNamespaceSelector")
|
|
487
|
-
def bound_service_account_namespace_selector(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
488
|
-
"""
|
|
489
|
-
A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
|
|
490
|
-
"""
|
|
491
|
-
return pulumi.get(self, "bound_service_account_namespace_selector")
|
|
492
|
-
|
|
493
|
-
@bound_service_account_namespace_selector.setter
|
|
494
|
-
def bound_service_account_namespace_selector(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
495
|
-
pulumi.set(self, "bound_service_account_namespace_selector", value)
|
|
496
|
-
|
|
497
464
|
@_builtins.property
|
|
498
465
|
@pulumi.getter(name="boundServiceAccountNamespaces")
|
|
499
466
|
def bound_service_account_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
@@ -653,7 +620,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
|
653
620
|
audience: Optional[pulumi.Input[_builtins.str]] = None,
|
|
654
621
|
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
655
622
|
bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
656
|
-
bound_service_account_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
|
|
657
623
|
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
658
624
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
659
625
|
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
@@ -714,7 +680,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
|
714
680
|
implications to be aware of.
|
|
715
681
|
:param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
|
|
716
682
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
|
717
|
-
:param pulumi.Input[_builtins.str] bound_service_account_namespace_selector: A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
|
|
718
683
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
|
719
684
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
720
685
|
The value should not contain leading or trailing forward slashes.
|
|
@@ -791,7 +756,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
|
791
756
|
audience: Optional[pulumi.Input[_builtins.str]] = None,
|
|
792
757
|
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
793
758
|
bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
794
|
-
bound_service_account_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
|
|
795
759
|
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
796
760
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
797
761
|
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
@@ -820,7 +784,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
|
820
784
|
if bound_service_account_names is None and not opts.urn:
|
|
821
785
|
raise TypeError("Missing required property 'bound_service_account_names'")
|
|
822
786
|
__props__.__dict__["bound_service_account_names"] = bound_service_account_names
|
|
823
|
-
|
|
787
|
+
if bound_service_account_namespaces is None and not opts.urn:
|
|
788
|
+
raise TypeError("Missing required property 'bound_service_account_namespaces'")
|
|
824
789
|
__props__.__dict__["bound_service_account_namespaces"] = bound_service_account_namespaces
|
|
825
790
|
__props__.__dict__["namespace"] = namespace
|
|
826
791
|
if role_name is None and not opts.urn:
|
|
@@ -850,7 +815,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
|
850
815
|
audience: Optional[pulumi.Input[_builtins.str]] = None,
|
|
851
816
|
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
852
817
|
bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
853
|
-
bound_service_account_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
|
|
854
818
|
bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
855
819
|
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
856
820
|
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
@@ -881,7 +845,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
|
881
845
|
implications to be aware of.
|
|
882
846
|
:param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
|
|
883
847
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
|
|
884
|
-
:param pulumi.Input[_builtins.str] bound_service_account_namespace_selector: A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
|
|
885
848
|
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
|
886
849
|
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
887
850
|
The value should not contain leading or trailing forward slashes.
|
|
@@ -907,7 +870,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
|
907
870
|
__props__.__dict__["audience"] = audience
|
|
908
871
|
__props__.__dict__["backend"] = backend
|
|
909
872
|
__props__.__dict__["bound_service_account_names"] = bound_service_account_names
|
|
910
|
-
__props__.__dict__["bound_service_account_namespace_selector"] = bound_service_account_namespace_selector
|
|
911
873
|
__props__.__dict__["bound_service_account_namespaces"] = bound_service_account_namespaces
|
|
912
874
|
__props__.__dict__["namespace"] = namespace
|
|
913
875
|
__props__.__dict__["role_name"] = role_name
|
|
@@ -968,17 +930,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
|
968
930
|
"""
|
|
969
931
|
return pulumi.get(self, "bound_service_account_names")
|
|
970
932
|
|
|
971
|
-
@_builtins.property
|
|
972
|
-
@pulumi.getter(name="boundServiceAccountNamespaceSelector")
|
|
973
|
-
def bound_service_account_namespace_selector(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
974
|
-
"""
|
|
975
|
-
A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
|
|
976
|
-
"""
|
|
977
|
-
return pulumi.get(self, "bound_service_account_namespace_selector")
|
|
978
|
-
|
|
979
933
|
@_builtins.property
|
|
980
934
|
@pulumi.getter(name="boundServiceAccountNamespaces")
|
|
981
|
-
def bound_service_account_namespaces(self) -> pulumi.Output[
|
|
935
|
+
def bound_service_account_namespaces(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
|
982
936
|
"""
|
|
983
937
|
List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
|
|
984
938
|
"""
|
|
@@ -26,7 +26,7 @@ class GetAuthBackendRoleResult:
|
|
|
26
26
|
"""
|
|
27
27
|
A collection of values returned by getAuthBackendRole.
|
|
28
28
|
"""
|
|
29
|
-
def __init__(__self__, alias_metadata=None, alias_name_source=None, audience=None, backend=None, bound_service_account_names=None,
|
|
29
|
+
def __init__(__self__, alias_metadata=None, alias_name_source=None, audience=None, backend=None, bound_service_account_names=None, bound_service_account_namespaces=None, id=None, namespace=None, role_name=None, token_bound_cidrs=None, token_explicit_max_ttl=None, token_max_ttl=None, token_no_default_policy=None, token_num_uses=None, token_period=None, token_policies=None, token_ttl=None, token_type=None):
|
|
30
30
|
if alias_metadata and not isinstance(alias_metadata, dict):
|
|
31
31
|
raise TypeError("Expected argument 'alias_metadata' to be a dict")
|
|
32
32
|
pulumi.set(__self__, "alias_metadata", alias_metadata)
|
|
@@ -42,9 +42,6 @@ class GetAuthBackendRoleResult:
|
|
|
42
42
|
if bound_service_account_names and not isinstance(bound_service_account_names, list):
|
|
43
43
|
raise TypeError("Expected argument 'bound_service_account_names' to be a list")
|
|
44
44
|
pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
|
|
45
|
-
if bound_service_account_namespace_selector and not isinstance(bound_service_account_namespace_selector, str):
|
|
46
|
-
raise TypeError("Expected argument 'bound_service_account_namespace_selector' to be a str")
|
|
47
|
-
pulumi.set(__self__, "bound_service_account_namespace_selector", bound_service_account_namespace_selector)
|
|
48
45
|
if bound_service_account_namespaces and not isinstance(bound_service_account_namespaces, list):
|
|
49
46
|
raise TypeError("Expected argument 'bound_service_account_namespaces' to be a list")
|
|
50
47
|
pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
|
|
@@ -119,14 +116,6 @@ class GetAuthBackendRoleResult:
|
|
|
119
116
|
"""
|
|
120
117
|
return pulumi.get(self, "bound_service_account_names")
|
|
121
118
|
|
|
122
|
-
@_builtins.property
|
|
123
|
-
@pulumi.getter(name="boundServiceAccountNamespaceSelector")
|
|
124
|
-
def bound_service_account_namespace_selector(self) -> _builtins.str:
|
|
125
|
-
"""
|
|
126
|
-
A label selector for Kubernetes namespaces allowed to access this role. Accepts either a JSON or YAML object. The value should be of type LabelSelector. Currently, label selectors with matchExpressions are not supported. To use label selectors, Vault must have permission to read namespaces on the Kubernetes cluster. If set with bound_service_account_namespaces, the conditions are ORed. Requires Vault v1.16+.
|
|
127
|
-
"""
|
|
128
|
-
return pulumi.get(self, "bound_service_account_namespace_selector")
|
|
129
|
-
|
|
130
119
|
@_builtins.property
|
|
131
120
|
@pulumi.getter(name="boundServiceAccountNamespaces")
|
|
132
121
|
def bound_service_account_namespaces(self) -> Sequence[_builtins.str]:
|
|
@@ -255,7 +244,6 @@ class AwaitableGetAuthBackendRoleResult(GetAuthBackendRoleResult):
|
|
|
255
244
|
audience=self.audience,
|
|
256
245
|
backend=self.backend,
|
|
257
246
|
bound_service_account_names=self.bound_service_account_names,
|
|
258
|
-
bound_service_account_namespace_selector=self.bound_service_account_namespace_selector,
|
|
259
247
|
bound_service_account_namespaces=self.bound_service_account_namespaces,
|
|
260
248
|
id=self.id,
|
|
261
249
|
namespace=self.namespace,
|
|
@@ -363,7 +351,6 @@ def get_auth_backend_role(alias_metadata: Optional[Mapping[str, _builtins.str]]
|
|
|
363
351
|
audience=pulumi.get(__ret__, 'audience'),
|
|
364
352
|
backend=pulumi.get(__ret__, 'backend'),
|
|
365
353
|
bound_service_account_names=pulumi.get(__ret__, 'bound_service_account_names'),
|
|
366
|
-
bound_service_account_namespace_selector=pulumi.get(__ret__, 'bound_service_account_namespace_selector'),
|
|
367
354
|
bound_service_account_namespaces=pulumi.get(__ret__, 'bound_service_account_namespaces'),
|
|
368
355
|
id=pulumi.get(__ret__, 'id'),
|
|
369
356
|
namespace=pulumi.get(__ret__, 'namespace'),
|
|
@@ -468,7 +455,6 @@ def get_auth_backend_role_output(alias_metadata: Optional[pulumi.Input[Optional[
|
|
|
468
455
|
audience=pulumi.get(__response__, 'audience'),
|
|
469
456
|
backend=pulumi.get(__response__, 'backend'),
|
|
470
457
|
bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
|
|
471
|
-
bound_service_account_namespace_selector=pulumi.get(__response__, 'bound_service_account_namespace_selector'),
|
|
472
458
|
bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
|
|
473
459
|
id=pulumi.get(__response__, 'id'),
|
|
474
460
|
namespace=pulumi.get(__response__, 'namespace'),
|
pulumi_vault/pulumi-plugin.json
CHANGED
|
@@ -28,7 +28,7 @@ pulumi_vault/plugin.py,sha256=57QZXnzP9lPAU0TbErKMCaLggsm9MehQm9hjVgy36_k,25233
|
|
|
28
28
|
pulumi_vault/plugin_pinned_version.py,sha256=w3YbjWKRyKY_7Ufc45n7nIAhVxpuj352jqykNlzmk4Q,11340
|
|
29
29
|
pulumi_vault/policy.py,sha256=eOofckCLS7K3YRGh3GElW5jpXz_oK76xny4Fk5VrsR0,11666
|
|
30
30
|
pulumi_vault/provider.py,sha256=0rno_jWm-8NzVdJYUdgvtlhL5R15IjrWJxlcclfPc0c,44944
|
|
31
|
-
pulumi_vault/pulumi-plugin.json,sha256=
|
|
31
|
+
pulumi_vault/pulumi-plugin.json,sha256=Kf6NGMP1zM1fOxJsGxA-C6Ok7jFekvuXW3fw4W1mYvg,81
|
|
32
32
|
pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
33
33
|
pulumi_vault/quota_lease_count.py,sha256=CoqfUnFAx956hEU4610qCLLhfzYcB5Qey0Jfy3hkVwA,26157
|
|
34
34
|
pulumi_vault/quota_rate_limit.py,sha256=tI72HsW0lOMEMMHLyr3EQhW8d6F-FfgsEQyXGH5ebjU,43077
|
|
@@ -82,11 +82,11 @@ pulumi_vault/consul/__init__.py,sha256=rvV594Qo7hp6Ysz7aaxgrOVw1c6LlliyrD8nrCoKE
|
|
|
82
82
|
pulumi_vault/consul/secret_backend.py,sha256=qKboTfen7iw4PB46LMe_jH_C8TxLOztDRTsE0wKZg28,79364
|
|
83
83
|
pulumi_vault/consul/secret_backend_role.py,sha256=42QN0s2omlBnfwOiPV4EmNOlpOCRlf_vb_Cyk63HmCg,43973
|
|
84
84
|
pulumi_vault/database/__init__.py,sha256=IKf2lsiEPGWbulcje7pAgpeQqZ3kElNCrP3eDced97M,472
|
|
85
|
-
pulumi_vault/database/_inputs.py,sha256=
|
|
86
|
-
pulumi_vault/database/outputs.py,sha256=
|
|
87
|
-
pulumi_vault/database/secret_backend_connection.py,sha256
|
|
85
|
+
pulumi_vault/database/_inputs.py,sha256=ysrNEE-wfw_8R0aHl9OK09NNmgC99NGWfQC8aasyMkI,551551
|
|
86
|
+
pulumi_vault/database/outputs.py,sha256=BA-j4K5X2FcglxtV1TcOp59wGTVtjCoNUf-b8FoDC8o,382460
|
|
87
|
+
pulumi_vault/database/secret_backend_connection.py,sha256=-lETXtUXeiz1vmwG7glaFHi7v4iR8ghIwRHM9dwYchQ,93381
|
|
88
88
|
pulumi_vault/database/secret_backend_role.py,sha256=Sm4PtpIA3m0nfUtfIEAGjORXZamAQsEpMaPkNSPNr8U,39232
|
|
89
|
-
pulumi_vault/database/secret_backend_static_role.py,sha256=
|
|
89
|
+
pulumi_vault/database/secret_backend_static_role.py,sha256=nB2EZ39_M3Z3KOhnr4tXww92qlt2g9hjPNKbTDktz3Q,44519
|
|
90
90
|
pulumi_vault/database/secrets_mount.py,sha256=WAJEOlfp0dB2SZxh1GkTGXGMImweQxS42O3bdboPlIQ,122955
|
|
91
91
|
pulumi_vault/gcp/__init__.py,sha256=FEwIPfzcZ5RqQYSD27FtChXzHEMQfcnhJbDvOPlWSAE,563
|
|
92
92
|
pulumi_vault/gcp/_inputs.py,sha256=OLgraky8XbCZfbPIjQF6Q7G4Gglag_AIOKKZD97VsZk,20330
|
|
@@ -147,9 +147,9 @@ pulumi_vault/kmip/secret_role.py,sha256=hok_eaqx_Ws4l52mYY--V5N063fyKtSmWpmktK-v
|
|
|
147
147
|
pulumi_vault/kmip/secret_scope.py,sha256=Di7loWyXMtxuccPWb0R0Hqw7lVuegnCTVrXXdlQTj6g,15680
|
|
148
148
|
pulumi_vault/kubernetes/__init__.py,sha256=60lqFtbyb-uWFYGPVvTM7wfEx5nF0Pkc58Hw0ORuusA,530
|
|
149
149
|
pulumi_vault/kubernetes/auth_backend_config.py,sha256=NCjEhqwmk-_BpQKGpMxcCaz_EQGD1BoR29Tm1D8fhuI,36743
|
|
150
|
-
pulumi_vault/kubernetes/auth_backend_role.py,sha256=
|
|
150
|
+
pulumi_vault/kubernetes/auth_backend_role.py,sha256=1qv5SjaF6csyW2nmUc_bg1oIkGmDJwWQsc8yJio2MIc,53659
|
|
151
151
|
pulumi_vault/kubernetes/get_auth_backend_config.py,sha256=sOR4umTGQeNeuIVPPSFe6vAaMjvqeJu47FQd1XR123c,16139
|
|
152
|
-
pulumi_vault/kubernetes/get_auth_backend_role.py,sha256=
|
|
152
|
+
pulumi_vault/kubernetes/get_auth_backend_role.py,sha256=G0k8ovffHFAGR1IlcwffnceFiCf6llEOIftVBY9yxvE,25833
|
|
153
153
|
pulumi_vault/kubernetes/get_service_account_token.py,sha256=KfOe5q2QjffFkxxqqzOVCSmINtC5bQ7gvhN9bYx2e4M,15885
|
|
154
154
|
pulumi_vault/kubernetes/secret_backend.py,sha256=Hgo1KtRKKP9G_08xmqquFmIQVmdHc1LFJmkr43QyxC8,72817
|
|
155
155
|
pulumi_vault/kubernetes/secret_backend_role.py,sha256=GZhUBA0uT74tOw2c79b-SoaX30hlxzgLxQKaGiQcpdk,58361
|
|
@@ -268,7 +268,7 @@ pulumi_vault/transit/get_sign.py,sha256=zE2W22UeFyoNOOOcL4IACj7Vy_2xSdMW_TXhbJR4
|
|
|
268
268
|
pulumi_vault/transit/get_verify.py,sha256=MJyNdouCwsAfluPQ7YeGCNkj0OJUB1hVOWAmkodD6fY,17170
|
|
269
269
|
pulumi_vault/transit/secret_backend_key.py,sha256=4F_MJXEBzVsNY22HzSp79mPl0SLIVPCknk-D9klcW5A,68515
|
|
270
270
|
pulumi_vault/transit/secret_cache_config.py,sha256=v5enplOZynVxCUCPaav5df8d9zK2vi07C8F9SAQ73aA,13238
|
|
271
|
-
pulumi_vault-7.6.
|
|
272
|
-
pulumi_vault-7.6.
|
|
273
|
-
pulumi_vault-7.6.
|
|
274
|
-
pulumi_vault-7.6.
|
|
271
|
+
pulumi_vault-7.6.0a1764138710.dist-info/METADATA,sha256=Iaynup5cksvYggwsQvRYHcj16HijvKnQ8MTO3AG0rak,4926
|
|
272
|
+
pulumi_vault-7.6.0a1764138710.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
|
|
273
|
+
pulumi_vault-7.6.0a1764138710.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
|
|
274
|
+
pulumi_vault-7.6.0a1764138710.dist-info/RECORD,,
|
|
File without changes
|
|
File without changes
|