pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,796 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class AuthBackendRoleSecretIdArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
role_name: pulumi.Input[_builtins.str],
|
|
23
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
24
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
25
|
+
metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
|
+
num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
28
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
29
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
30
|
+
with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
31
|
+
wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None):
|
|
32
|
+
"""
|
|
33
|
+
The set of arguments for constructing a AuthBackendRoleSecretId resource.
|
|
34
|
+
:param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
|
|
35
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
|
|
36
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
|
37
|
+
perform the login operation using this SecretID.
|
|
38
|
+
:param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
|
|
39
|
+
key-value pairs to be set on tokens issued with this SecretID.
|
|
40
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
41
|
+
The value should not contain leading or trailing forward slashes.
|
|
42
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
43
|
+
*Available only for Vault Enterprise*.
|
|
44
|
+
:param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
|
|
45
|
+
:param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
|
|
46
|
+
mode. Defaults to Vault auto-generating SecretIDs.
|
|
47
|
+
:param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
|
|
48
|
+
:param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
|
49
|
+
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
|
50
|
+
invalidated through unwrapping.
|
|
51
|
+
:param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
|
|
52
|
+
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
|
53
|
+
and available for the duration specified. Only a single unwrapping of the
|
|
54
|
+
token is allowed.
|
|
55
|
+
"""
|
|
56
|
+
pulumi.set(__self__, "role_name", role_name)
|
|
57
|
+
if backend is not None:
|
|
58
|
+
pulumi.set(__self__, "backend", backend)
|
|
59
|
+
if cidr_lists is not None:
|
|
60
|
+
pulumi.set(__self__, "cidr_lists", cidr_lists)
|
|
61
|
+
if metadata is not None:
|
|
62
|
+
pulumi.set(__self__, "metadata", metadata)
|
|
63
|
+
if namespace is not None:
|
|
64
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
65
|
+
if num_uses is not None:
|
|
66
|
+
pulumi.set(__self__, "num_uses", num_uses)
|
|
67
|
+
if secret_id is not None:
|
|
68
|
+
pulumi.set(__self__, "secret_id", secret_id)
|
|
69
|
+
if ttl is not None:
|
|
70
|
+
pulumi.set(__self__, "ttl", ttl)
|
|
71
|
+
if with_wrapped_accessor is not None:
|
|
72
|
+
pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
|
|
73
|
+
if wrapping_ttl is not None:
|
|
74
|
+
pulumi.set(__self__, "wrapping_ttl", wrapping_ttl)
|
|
75
|
+
|
|
76
|
+
@_builtins.property
|
|
77
|
+
@pulumi.getter(name="roleName")
|
|
78
|
+
def role_name(self) -> pulumi.Input[_builtins.str]:
|
|
79
|
+
"""
|
|
80
|
+
The name of the role to create the SecretID for.
|
|
81
|
+
"""
|
|
82
|
+
return pulumi.get(self, "role_name")
|
|
83
|
+
|
|
84
|
+
@role_name.setter
|
|
85
|
+
def role_name(self, value: pulumi.Input[_builtins.str]):
|
|
86
|
+
pulumi.set(self, "role_name", value)
|
|
87
|
+
|
|
88
|
+
@_builtins.property
|
|
89
|
+
@pulumi.getter
|
|
90
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
91
|
+
"""
|
|
92
|
+
Unique name of the auth backend to configure.
|
|
93
|
+
"""
|
|
94
|
+
return pulumi.get(self, "backend")
|
|
95
|
+
|
|
96
|
+
@backend.setter
|
|
97
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
98
|
+
pulumi.set(self, "backend", value)
|
|
99
|
+
|
|
100
|
+
@_builtins.property
|
|
101
|
+
@pulumi.getter(name="cidrLists")
|
|
102
|
+
def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
103
|
+
"""
|
|
104
|
+
If set, specifies blocks of IP addresses which can
|
|
105
|
+
perform the login operation using this SecretID.
|
|
106
|
+
"""
|
|
107
|
+
return pulumi.get(self, "cidr_lists")
|
|
108
|
+
|
|
109
|
+
@cidr_lists.setter
|
|
110
|
+
def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
111
|
+
pulumi.set(self, "cidr_lists", value)
|
|
112
|
+
|
|
113
|
+
@_builtins.property
|
|
114
|
+
@pulumi.getter
|
|
115
|
+
def metadata(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
116
|
+
"""
|
|
117
|
+
A JSON-encoded string containing metadata in
|
|
118
|
+
key-value pairs to be set on tokens issued with this SecretID.
|
|
119
|
+
"""
|
|
120
|
+
return pulumi.get(self, "metadata")
|
|
121
|
+
|
|
122
|
+
@metadata.setter
|
|
123
|
+
def metadata(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
124
|
+
pulumi.set(self, "metadata", value)
|
|
125
|
+
|
|
126
|
+
@_builtins.property
|
|
127
|
+
@pulumi.getter
|
|
128
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
129
|
+
"""
|
|
130
|
+
The namespace to provision the resource in.
|
|
131
|
+
The value should not contain leading or trailing forward slashes.
|
|
132
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
133
|
+
*Available only for Vault Enterprise*.
|
|
134
|
+
"""
|
|
135
|
+
return pulumi.get(self, "namespace")
|
|
136
|
+
|
|
137
|
+
@namespace.setter
|
|
138
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
139
|
+
pulumi.set(self, "namespace", value)
|
|
140
|
+
|
|
141
|
+
@_builtins.property
|
|
142
|
+
@pulumi.getter(name="numUses")
|
|
143
|
+
def num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
144
|
+
"""
|
|
145
|
+
The number of uses for the secret-id.
|
|
146
|
+
"""
|
|
147
|
+
return pulumi.get(self, "num_uses")
|
|
148
|
+
|
|
149
|
+
@num_uses.setter
|
|
150
|
+
def num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
151
|
+
pulumi.set(self, "num_uses", value)
|
|
152
|
+
|
|
153
|
+
@_builtins.property
|
|
154
|
+
@pulumi.getter(name="secretId")
|
|
155
|
+
def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
156
|
+
"""
|
|
157
|
+
The SecretID to be created. If set, uses "Push"
|
|
158
|
+
mode. Defaults to Vault auto-generating SecretIDs.
|
|
159
|
+
"""
|
|
160
|
+
return pulumi.get(self, "secret_id")
|
|
161
|
+
|
|
162
|
+
@secret_id.setter
|
|
163
|
+
def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
164
|
+
pulumi.set(self, "secret_id", value)
|
|
165
|
+
|
|
166
|
+
@_builtins.property
|
|
167
|
+
@pulumi.getter
|
|
168
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
169
|
+
"""
|
|
170
|
+
The TTL duration of the SecretID.
|
|
171
|
+
"""
|
|
172
|
+
return pulumi.get(self, "ttl")
|
|
173
|
+
|
|
174
|
+
@ttl.setter
|
|
175
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
176
|
+
pulumi.set(self, "ttl", value)
|
|
177
|
+
|
|
178
|
+
@_builtins.property
|
|
179
|
+
@pulumi.getter(name="withWrappedAccessor")
|
|
180
|
+
def with_wrapped_accessor(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
181
|
+
"""
|
|
182
|
+
Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
|
183
|
+
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
|
184
|
+
invalidated through unwrapping.
|
|
185
|
+
"""
|
|
186
|
+
return pulumi.get(self, "with_wrapped_accessor")
|
|
187
|
+
|
|
188
|
+
@with_wrapped_accessor.setter
|
|
189
|
+
def with_wrapped_accessor(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
190
|
+
pulumi.set(self, "with_wrapped_accessor", value)
|
|
191
|
+
|
|
192
|
+
@_builtins.property
|
|
193
|
+
@pulumi.getter(name="wrappingTtl")
|
|
194
|
+
def wrapping_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
195
|
+
"""
|
|
196
|
+
If set, the SecretID response will be
|
|
197
|
+
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
|
198
|
+
and available for the duration specified. Only a single unwrapping of the
|
|
199
|
+
token is allowed.
|
|
200
|
+
"""
|
|
201
|
+
return pulumi.get(self, "wrapping_ttl")
|
|
202
|
+
|
|
203
|
+
@wrapping_ttl.setter
|
|
204
|
+
def wrapping_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
205
|
+
pulumi.set(self, "wrapping_ttl", value)
|
|
206
|
+
|
|
207
|
+
|
|
208
|
+
@pulumi.input_type
|
|
209
|
+
class _AuthBackendRoleSecretIdState:
|
|
210
|
+
def __init__(__self__, *,
|
|
211
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
|
212
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
213
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
214
|
+
metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
|
215
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
216
|
+
num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
217
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
218
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
219
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
220
|
+
with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
221
|
+
wrapping_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
|
222
|
+
wrapping_token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
223
|
+
wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None):
|
|
224
|
+
"""
|
|
225
|
+
Input properties used for looking up and filtering AuthBackendRoleSecretId resources.
|
|
226
|
+
:param pulumi.Input[_builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
|
|
227
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
|
|
228
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
|
229
|
+
perform the login operation using this SecretID.
|
|
230
|
+
:param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
|
|
231
|
+
key-value pairs to be set on tokens issued with this SecretID.
|
|
232
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
233
|
+
The value should not contain leading or trailing forward slashes.
|
|
234
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
235
|
+
*Available only for Vault Enterprise*.
|
|
236
|
+
:param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
|
|
237
|
+
:param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
|
|
238
|
+
:param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
|
|
239
|
+
mode. Defaults to Vault auto-generating SecretIDs.
|
|
240
|
+
:param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
|
|
241
|
+
:param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
|
242
|
+
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
|
243
|
+
invalidated through unwrapping.
|
|
244
|
+
:param pulumi.Input[_builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
|
|
245
|
+
be safely logged.
|
|
246
|
+
:param pulumi.Input[_builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
|
|
247
|
+
:param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
|
|
248
|
+
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
|
249
|
+
and available for the duration specified. Only a single unwrapping of the
|
|
250
|
+
token is allowed.
|
|
251
|
+
"""
|
|
252
|
+
if accessor is not None:
|
|
253
|
+
pulumi.set(__self__, "accessor", accessor)
|
|
254
|
+
if backend is not None:
|
|
255
|
+
pulumi.set(__self__, "backend", backend)
|
|
256
|
+
if cidr_lists is not None:
|
|
257
|
+
pulumi.set(__self__, "cidr_lists", cidr_lists)
|
|
258
|
+
if metadata is not None:
|
|
259
|
+
pulumi.set(__self__, "metadata", metadata)
|
|
260
|
+
if namespace is not None:
|
|
261
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
262
|
+
if num_uses is not None:
|
|
263
|
+
pulumi.set(__self__, "num_uses", num_uses)
|
|
264
|
+
if role_name is not None:
|
|
265
|
+
pulumi.set(__self__, "role_name", role_name)
|
|
266
|
+
if secret_id is not None:
|
|
267
|
+
pulumi.set(__self__, "secret_id", secret_id)
|
|
268
|
+
if ttl is not None:
|
|
269
|
+
pulumi.set(__self__, "ttl", ttl)
|
|
270
|
+
if with_wrapped_accessor is not None:
|
|
271
|
+
pulumi.set(__self__, "with_wrapped_accessor", with_wrapped_accessor)
|
|
272
|
+
if wrapping_accessor is not None:
|
|
273
|
+
pulumi.set(__self__, "wrapping_accessor", wrapping_accessor)
|
|
274
|
+
if wrapping_token is not None:
|
|
275
|
+
pulumi.set(__self__, "wrapping_token", wrapping_token)
|
|
276
|
+
if wrapping_ttl is not None:
|
|
277
|
+
pulumi.set(__self__, "wrapping_ttl", wrapping_ttl)
|
|
278
|
+
|
|
279
|
+
@_builtins.property
|
|
280
|
+
@pulumi.getter
|
|
281
|
+
def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
282
|
+
"""
|
|
283
|
+
The unique ID for this SecretID that can be safely logged.
|
|
284
|
+
"""
|
|
285
|
+
return pulumi.get(self, "accessor")
|
|
286
|
+
|
|
287
|
+
@accessor.setter
|
|
288
|
+
def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
289
|
+
pulumi.set(self, "accessor", value)
|
|
290
|
+
|
|
291
|
+
@_builtins.property
|
|
292
|
+
@pulumi.getter
|
|
293
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
294
|
+
"""
|
|
295
|
+
Unique name of the auth backend to configure.
|
|
296
|
+
"""
|
|
297
|
+
return pulumi.get(self, "backend")
|
|
298
|
+
|
|
299
|
+
@backend.setter
|
|
300
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
301
|
+
pulumi.set(self, "backend", value)
|
|
302
|
+
|
|
303
|
+
@_builtins.property
|
|
304
|
+
@pulumi.getter(name="cidrLists")
|
|
305
|
+
def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
|
306
|
+
"""
|
|
307
|
+
If set, specifies blocks of IP addresses which can
|
|
308
|
+
perform the login operation using this SecretID.
|
|
309
|
+
"""
|
|
310
|
+
return pulumi.get(self, "cidr_lists")
|
|
311
|
+
|
|
312
|
+
@cidr_lists.setter
|
|
313
|
+
def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
|
314
|
+
pulumi.set(self, "cidr_lists", value)
|
|
315
|
+
|
|
316
|
+
@_builtins.property
|
|
317
|
+
@pulumi.getter
|
|
318
|
+
def metadata(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
319
|
+
"""
|
|
320
|
+
A JSON-encoded string containing metadata in
|
|
321
|
+
key-value pairs to be set on tokens issued with this SecretID.
|
|
322
|
+
"""
|
|
323
|
+
return pulumi.get(self, "metadata")
|
|
324
|
+
|
|
325
|
+
@metadata.setter
|
|
326
|
+
def metadata(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
327
|
+
pulumi.set(self, "metadata", value)
|
|
328
|
+
|
|
329
|
+
@_builtins.property
|
|
330
|
+
@pulumi.getter
|
|
331
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
332
|
+
"""
|
|
333
|
+
The namespace to provision the resource in.
|
|
334
|
+
The value should not contain leading or trailing forward slashes.
|
|
335
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
336
|
+
*Available only for Vault Enterprise*.
|
|
337
|
+
"""
|
|
338
|
+
return pulumi.get(self, "namespace")
|
|
339
|
+
|
|
340
|
+
@namespace.setter
|
|
341
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
342
|
+
pulumi.set(self, "namespace", value)
|
|
343
|
+
|
|
344
|
+
@_builtins.property
|
|
345
|
+
@pulumi.getter(name="numUses")
|
|
346
|
+
def num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
347
|
+
"""
|
|
348
|
+
The number of uses for the secret-id.
|
|
349
|
+
"""
|
|
350
|
+
return pulumi.get(self, "num_uses")
|
|
351
|
+
|
|
352
|
+
@num_uses.setter
|
|
353
|
+
def num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
354
|
+
pulumi.set(self, "num_uses", value)
|
|
355
|
+
|
|
356
|
+
@_builtins.property
|
|
357
|
+
@pulumi.getter(name="roleName")
|
|
358
|
+
def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
359
|
+
"""
|
|
360
|
+
The name of the role to create the SecretID for.
|
|
361
|
+
"""
|
|
362
|
+
return pulumi.get(self, "role_name")
|
|
363
|
+
|
|
364
|
+
@role_name.setter
|
|
365
|
+
def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
366
|
+
pulumi.set(self, "role_name", value)
|
|
367
|
+
|
|
368
|
+
@_builtins.property
|
|
369
|
+
@pulumi.getter(name="secretId")
|
|
370
|
+
def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
371
|
+
"""
|
|
372
|
+
The SecretID to be created. If set, uses "Push"
|
|
373
|
+
mode. Defaults to Vault auto-generating SecretIDs.
|
|
374
|
+
"""
|
|
375
|
+
return pulumi.get(self, "secret_id")
|
|
376
|
+
|
|
377
|
+
@secret_id.setter
|
|
378
|
+
def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
379
|
+
pulumi.set(self, "secret_id", value)
|
|
380
|
+
|
|
381
|
+
@_builtins.property
|
|
382
|
+
@pulumi.getter
|
|
383
|
+
def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
384
|
+
"""
|
|
385
|
+
The TTL duration of the SecretID.
|
|
386
|
+
"""
|
|
387
|
+
return pulumi.get(self, "ttl")
|
|
388
|
+
|
|
389
|
+
@ttl.setter
|
|
390
|
+
def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
391
|
+
pulumi.set(self, "ttl", value)
|
|
392
|
+
|
|
393
|
+
@_builtins.property
|
|
394
|
+
@pulumi.getter(name="withWrappedAccessor")
|
|
395
|
+
def with_wrapped_accessor(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
396
|
+
"""
|
|
397
|
+
Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
|
398
|
+
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
|
399
|
+
invalidated through unwrapping.
|
|
400
|
+
"""
|
|
401
|
+
return pulumi.get(self, "with_wrapped_accessor")
|
|
402
|
+
|
|
403
|
+
@with_wrapped_accessor.setter
|
|
404
|
+
def with_wrapped_accessor(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
405
|
+
pulumi.set(self, "with_wrapped_accessor", value)
|
|
406
|
+
|
|
407
|
+
@_builtins.property
|
|
408
|
+
@pulumi.getter(name="wrappingAccessor")
|
|
409
|
+
def wrapping_accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
410
|
+
"""
|
|
411
|
+
The unique ID for the response-wrapped SecretID that can
|
|
412
|
+
be safely logged.
|
|
413
|
+
"""
|
|
414
|
+
return pulumi.get(self, "wrapping_accessor")
|
|
415
|
+
|
|
416
|
+
@wrapping_accessor.setter
|
|
417
|
+
def wrapping_accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
418
|
+
pulumi.set(self, "wrapping_accessor", value)
|
|
419
|
+
|
|
420
|
+
@_builtins.property
|
|
421
|
+
@pulumi.getter(name="wrappingToken")
|
|
422
|
+
def wrapping_token(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
423
|
+
"""
|
|
424
|
+
The token used to retrieve a response-wrapped SecretID.
|
|
425
|
+
"""
|
|
426
|
+
return pulumi.get(self, "wrapping_token")
|
|
427
|
+
|
|
428
|
+
@wrapping_token.setter
|
|
429
|
+
def wrapping_token(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
430
|
+
pulumi.set(self, "wrapping_token", value)
|
|
431
|
+
|
|
432
|
+
@_builtins.property
|
|
433
|
+
@pulumi.getter(name="wrappingTtl")
|
|
434
|
+
def wrapping_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
435
|
+
"""
|
|
436
|
+
If set, the SecretID response will be
|
|
437
|
+
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
|
438
|
+
and available for the duration specified. Only a single unwrapping of the
|
|
439
|
+
token is allowed.
|
|
440
|
+
"""
|
|
441
|
+
return pulumi.get(self, "wrapping_ttl")
|
|
442
|
+
|
|
443
|
+
@wrapping_ttl.setter
|
|
444
|
+
def wrapping_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
445
|
+
pulumi.set(self, "wrapping_ttl", value)
|
|
446
|
+
|
|
447
|
+
|
|
448
|
+
@pulumi.type_token("vault:appRole/authBackendRoleSecretId:AuthBackendRoleSecretId")
|
|
449
|
+
class AuthBackendRoleSecretId(pulumi.CustomResource):
|
|
450
|
+
@overload
|
|
451
|
+
def __init__(__self__,
|
|
452
|
+
resource_name: str,
|
|
453
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
454
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
455
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
456
|
+
metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
|
457
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
458
|
+
num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
459
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
460
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
461
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
462
|
+
with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
463
|
+
wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
464
|
+
__props__=None):
|
|
465
|
+
"""
|
|
466
|
+
Manages an AppRole auth backend SecretID in a Vault server. See the [Vault
|
|
467
|
+
documentation](https://www.vaultproject.io/docs/auth/approle) for more
|
|
468
|
+
information.
|
|
469
|
+
|
|
470
|
+
## Example Usage
|
|
471
|
+
|
|
472
|
+
```python
|
|
473
|
+
import pulumi
|
|
474
|
+
import json
|
|
475
|
+
import pulumi_vault as vault
|
|
476
|
+
|
|
477
|
+
approle = vault.AuthBackend("approle", type="approle")
|
|
478
|
+
example = vault.approle.AuthBackendRole("example",
|
|
479
|
+
backend=approle.path,
|
|
480
|
+
role_name="test-role",
|
|
481
|
+
token_policies=[
|
|
482
|
+
"default",
|
|
483
|
+
"dev",
|
|
484
|
+
"prod",
|
|
485
|
+
])
|
|
486
|
+
id = vault.approle.AuthBackendRoleSecretId("id",
|
|
487
|
+
backend=approle.path,
|
|
488
|
+
role_name=example.role_name,
|
|
489
|
+
metadata=json.dumps({
|
|
490
|
+
"hello": "world",
|
|
491
|
+
}))
|
|
492
|
+
```
|
|
493
|
+
|
|
494
|
+
:param str resource_name: The name of the resource.
|
|
495
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
496
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
|
|
497
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
|
498
|
+
perform the login operation using this SecretID.
|
|
499
|
+
:param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
|
|
500
|
+
key-value pairs to be set on tokens issued with this SecretID.
|
|
501
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
502
|
+
The value should not contain leading or trailing forward slashes.
|
|
503
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
504
|
+
*Available only for Vault Enterprise*.
|
|
505
|
+
:param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
|
|
506
|
+
:param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
|
|
507
|
+
:param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
|
|
508
|
+
mode. Defaults to Vault auto-generating SecretIDs.
|
|
509
|
+
:param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
|
|
510
|
+
:param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
|
511
|
+
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
|
512
|
+
invalidated through unwrapping.
|
|
513
|
+
:param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
|
|
514
|
+
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
|
515
|
+
and available for the duration specified. Only a single unwrapping of the
|
|
516
|
+
token is allowed.
|
|
517
|
+
"""
|
|
518
|
+
...
|
|
519
|
+
@overload
|
|
520
|
+
def __init__(__self__,
|
|
521
|
+
resource_name: str,
|
|
522
|
+
args: AuthBackendRoleSecretIdArgs,
|
|
523
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
524
|
+
"""
|
|
525
|
+
Manages an AppRole auth backend SecretID in a Vault server. See the [Vault
|
|
526
|
+
documentation](https://www.vaultproject.io/docs/auth/approle) for more
|
|
527
|
+
information.
|
|
528
|
+
|
|
529
|
+
## Example Usage
|
|
530
|
+
|
|
531
|
+
```python
|
|
532
|
+
import pulumi
|
|
533
|
+
import json
|
|
534
|
+
import pulumi_vault as vault
|
|
535
|
+
|
|
536
|
+
approle = vault.AuthBackend("approle", type="approle")
|
|
537
|
+
example = vault.approle.AuthBackendRole("example",
|
|
538
|
+
backend=approle.path,
|
|
539
|
+
role_name="test-role",
|
|
540
|
+
token_policies=[
|
|
541
|
+
"default",
|
|
542
|
+
"dev",
|
|
543
|
+
"prod",
|
|
544
|
+
])
|
|
545
|
+
id = vault.approle.AuthBackendRoleSecretId("id",
|
|
546
|
+
backend=approle.path,
|
|
547
|
+
role_name=example.role_name,
|
|
548
|
+
metadata=json.dumps({
|
|
549
|
+
"hello": "world",
|
|
550
|
+
}))
|
|
551
|
+
```
|
|
552
|
+
|
|
553
|
+
:param str resource_name: The name of the resource.
|
|
554
|
+
:param AuthBackendRoleSecretIdArgs args: The arguments to use to populate this resource's properties.
|
|
555
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
556
|
+
"""
|
|
557
|
+
...
|
|
558
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
559
|
+
resource_args, opts = _utilities.get_resource_args_opts(AuthBackendRoleSecretIdArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
560
|
+
if resource_args is not None:
|
|
561
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
562
|
+
else:
|
|
563
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
564
|
+
|
|
565
|
+
def _internal_init(__self__,
|
|
566
|
+
resource_name: str,
|
|
567
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
568
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
569
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
570
|
+
metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
|
571
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
572
|
+
num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
573
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
574
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
575
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
576
|
+
with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
577
|
+
wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None,
|
|
578
|
+
__props__=None):
|
|
579
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
580
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
581
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
582
|
+
if opts.id is None:
|
|
583
|
+
if __props__ is not None:
|
|
584
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
585
|
+
__props__ = AuthBackendRoleSecretIdArgs.__new__(AuthBackendRoleSecretIdArgs)
|
|
586
|
+
|
|
587
|
+
__props__.__dict__["backend"] = backend
|
|
588
|
+
__props__.__dict__["cidr_lists"] = cidr_lists
|
|
589
|
+
__props__.__dict__["metadata"] = metadata
|
|
590
|
+
__props__.__dict__["namespace"] = namespace
|
|
591
|
+
__props__.__dict__["num_uses"] = num_uses
|
|
592
|
+
if role_name is None and not opts.urn:
|
|
593
|
+
raise TypeError("Missing required property 'role_name'")
|
|
594
|
+
__props__.__dict__["role_name"] = role_name
|
|
595
|
+
__props__.__dict__["secret_id"] = None if secret_id is None else pulumi.Output.secret(secret_id)
|
|
596
|
+
__props__.__dict__["ttl"] = ttl
|
|
597
|
+
__props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
|
|
598
|
+
__props__.__dict__["wrapping_ttl"] = wrapping_ttl
|
|
599
|
+
__props__.__dict__["accessor"] = None
|
|
600
|
+
__props__.__dict__["wrapping_accessor"] = None
|
|
601
|
+
__props__.__dict__["wrapping_token"] = None
|
|
602
|
+
alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="vault:appRole/authBackendRoleSecretID:AuthBackendRoleSecretID")])
|
|
603
|
+
opts = pulumi.ResourceOptions.merge(opts, alias_opts)
|
|
604
|
+
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["secretId", "wrappingToken"])
|
|
605
|
+
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
|
606
|
+
super(AuthBackendRoleSecretId, __self__).__init__(
|
|
607
|
+
'vault:appRole/authBackendRoleSecretId:AuthBackendRoleSecretId',
|
|
608
|
+
resource_name,
|
|
609
|
+
__props__,
|
|
610
|
+
opts)
|
|
611
|
+
|
|
612
|
+
@staticmethod
|
|
613
|
+
def get(resource_name: str,
|
|
614
|
+
id: pulumi.Input[str],
|
|
615
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
616
|
+
accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
|
617
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
618
|
+
cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
|
619
|
+
metadata: Optional[pulumi.Input[_builtins.str]] = None,
|
|
620
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
621
|
+
num_uses: Optional[pulumi.Input[_builtins.int]] = None,
|
|
622
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
623
|
+
secret_id: Optional[pulumi.Input[_builtins.str]] = None,
|
|
624
|
+
ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
625
|
+
with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
626
|
+
wrapping_accessor: Optional[pulumi.Input[_builtins.str]] = None,
|
|
627
|
+
wrapping_token: Optional[pulumi.Input[_builtins.str]] = None,
|
|
628
|
+
wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRoleSecretId':
|
|
629
|
+
"""
|
|
630
|
+
Get an existing AuthBackendRoleSecretId resource's state with the given name, id, and optional extra
|
|
631
|
+
properties used to qualify the lookup.
|
|
632
|
+
|
|
633
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
634
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
635
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
636
|
+
:param pulumi.Input[_builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
|
|
637
|
+
:param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
|
|
638
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
|
|
639
|
+
perform the login operation using this SecretID.
|
|
640
|
+
:param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
|
|
641
|
+
key-value pairs to be set on tokens issued with this SecretID.
|
|
642
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
643
|
+
The value should not contain leading or trailing forward slashes.
|
|
644
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
645
|
+
*Available only for Vault Enterprise*.
|
|
646
|
+
:param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
|
|
647
|
+
:param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
|
|
648
|
+
:param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
|
|
649
|
+
mode. Defaults to Vault auto-generating SecretIDs.
|
|
650
|
+
:param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
|
|
651
|
+
:param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
|
652
|
+
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
|
653
|
+
invalidated through unwrapping.
|
|
654
|
+
:param pulumi.Input[_builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
|
|
655
|
+
be safely logged.
|
|
656
|
+
:param pulumi.Input[_builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
|
|
657
|
+
:param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
|
|
658
|
+
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
|
659
|
+
and available for the duration specified. Only a single unwrapping of the
|
|
660
|
+
token is allowed.
|
|
661
|
+
"""
|
|
662
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
663
|
+
|
|
664
|
+
__props__ = _AuthBackendRoleSecretIdState.__new__(_AuthBackendRoleSecretIdState)
|
|
665
|
+
|
|
666
|
+
__props__.__dict__["accessor"] = accessor
|
|
667
|
+
__props__.__dict__["backend"] = backend
|
|
668
|
+
__props__.__dict__["cidr_lists"] = cidr_lists
|
|
669
|
+
__props__.__dict__["metadata"] = metadata
|
|
670
|
+
__props__.__dict__["namespace"] = namespace
|
|
671
|
+
__props__.__dict__["num_uses"] = num_uses
|
|
672
|
+
__props__.__dict__["role_name"] = role_name
|
|
673
|
+
__props__.__dict__["secret_id"] = secret_id
|
|
674
|
+
__props__.__dict__["ttl"] = ttl
|
|
675
|
+
__props__.__dict__["with_wrapped_accessor"] = with_wrapped_accessor
|
|
676
|
+
__props__.__dict__["wrapping_accessor"] = wrapping_accessor
|
|
677
|
+
__props__.__dict__["wrapping_token"] = wrapping_token
|
|
678
|
+
__props__.__dict__["wrapping_ttl"] = wrapping_ttl
|
|
679
|
+
return AuthBackendRoleSecretId(resource_name, opts=opts, __props__=__props__)
|
|
680
|
+
|
|
681
|
+
@_builtins.property
|
|
682
|
+
@pulumi.getter
|
|
683
|
+
def accessor(self) -> pulumi.Output[_builtins.str]:
|
|
684
|
+
"""
|
|
685
|
+
The unique ID for this SecretID that can be safely logged.
|
|
686
|
+
"""
|
|
687
|
+
return pulumi.get(self, "accessor")
|
|
688
|
+
|
|
689
|
+
@_builtins.property
|
|
690
|
+
@pulumi.getter
|
|
691
|
+
def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
692
|
+
"""
|
|
693
|
+
Unique name of the auth backend to configure.
|
|
694
|
+
"""
|
|
695
|
+
return pulumi.get(self, "backend")
|
|
696
|
+
|
|
697
|
+
@_builtins.property
|
|
698
|
+
@pulumi.getter(name="cidrLists")
|
|
699
|
+
def cidr_lists(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
|
700
|
+
"""
|
|
701
|
+
If set, specifies blocks of IP addresses which can
|
|
702
|
+
perform the login operation using this SecretID.
|
|
703
|
+
"""
|
|
704
|
+
return pulumi.get(self, "cidr_lists")
|
|
705
|
+
|
|
706
|
+
@_builtins.property
|
|
707
|
+
@pulumi.getter
|
|
708
|
+
def metadata(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
709
|
+
"""
|
|
710
|
+
A JSON-encoded string containing metadata in
|
|
711
|
+
key-value pairs to be set on tokens issued with this SecretID.
|
|
712
|
+
"""
|
|
713
|
+
return pulumi.get(self, "metadata")
|
|
714
|
+
|
|
715
|
+
@_builtins.property
|
|
716
|
+
@pulumi.getter
|
|
717
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
718
|
+
"""
|
|
719
|
+
The namespace to provision the resource in.
|
|
720
|
+
The value should not contain leading or trailing forward slashes.
|
|
721
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
722
|
+
*Available only for Vault Enterprise*.
|
|
723
|
+
"""
|
|
724
|
+
return pulumi.get(self, "namespace")
|
|
725
|
+
|
|
726
|
+
@_builtins.property
|
|
727
|
+
@pulumi.getter(name="numUses")
|
|
728
|
+
def num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
729
|
+
"""
|
|
730
|
+
The number of uses for the secret-id.
|
|
731
|
+
"""
|
|
732
|
+
return pulumi.get(self, "num_uses")
|
|
733
|
+
|
|
734
|
+
@_builtins.property
|
|
735
|
+
@pulumi.getter(name="roleName")
|
|
736
|
+
def role_name(self) -> pulumi.Output[_builtins.str]:
|
|
737
|
+
"""
|
|
738
|
+
The name of the role to create the SecretID for.
|
|
739
|
+
"""
|
|
740
|
+
return pulumi.get(self, "role_name")
|
|
741
|
+
|
|
742
|
+
@_builtins.property
|
|
743
|
+
@pulumi.getter(name="secretId")
|
|
744
|
+
def secret_id(self) -> pulumi.Output[_builtins.str]:
|
|
745
|
+
"""
|
|
746
|
+
The SecretID to be created. If set, uses "Push"
|
|
747
|
+
mode. Defaults to Vault auto-generating SecretIDs.
|
|
748
|
+
"""
|
|
749
|
+
return pulumi.get(self, "secret_id")
|
|
750
|
+
|
|
751
|
+
@_builtins.property
|
|
752
|
+
@pulumi.getter
|
|
753
|
+
def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
754
|
+
"""
|
|
755
|
+
The TTL duration of the SecretID.
|
|
756
|
+
"""
|
|
757
|
+
return pulumi.get(self, "ttl")
|
|
758
|
+
|
|
759
|
+
@_builtins.property
|
|
760
|
+
@pulumi.getter(name="withWrappedAccessor")
|
|
761
|
+
def with_wrapped_accessor(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
|
762
|
+
"""
|
|
763
|
+
Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
|
764
|
+
If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
|
765
|
+
invalidated through unwrapping.
|
|
766
|
+
"""
|
|
767
|
+
return pulumi.get(self, "with_wrapped_accessor")
|
|
768
|
+
|
|
769
|
+
@_builtins.property
|
|
770
|
+
@pulumi.getter(name="wrappingAccessor")
|
|
771
|
+
def wrapping_accessor(self) -> pulumi.Output[_builtins.str]:
|
|
772
|
+
"""
|
|
773
|
+
The unique ID for the response-wrapped SecretID that can
|
|
774
|
+
be safely logged.
|
|
775
|
+
"""
|
|
776
|
+
return pulumi.get(self, "wrapping_accessor")
|
|
777
|
+
|
|
778
|
+
@_builtins.property
|
|
779
|
+
@pulumi.getter(name="wrappingToken")
|
|
780
|
+
def wrapping_token(self) -> pulumi.Output[_builtins.str]:
|
|
781
|
+
"""
|
|
782
|
+
The token used to retrieve a response-wrapped SecretID.
|
|
783
|
+
"""
|
|
784
|
+
return pulumi.get(self, "wrapping_token")
|
|
785
|
+
|
|
786
|
+
@_builtins.property
|
|
787
|
+
@pulumi.getter(name="wrappingTtl")
|
|
788
|
+
def wrapping_ttl(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
789
|
+
"""
|
|
790
|
+
If set, the SecretID response will be
|
|
791
|
+
[response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
|
792
|
+
and available for the duration specified. Only a single unwrapping of the
|
|
793
|
+
token is allowed.
|
|
794
|
+
"""
|
|
795
|
+
return pulumi.get(self, "wrapping_ttl")
|
|
796
|
+
|