pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,1194 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = ['SecretRoleArgs', 'SecretRole']
|
|
18
|
+
|
|
19
|
+
@pulumi.input_type
|
|
20
|
+
class SecretRoleArgs:
|
|
21
|
+
def __init__(__self__, *,
|
|
22
|
+
path: pulumi.Input[_builtins.str],
|
|
23
|
+
role: pulumi.Input[_builtins.str],
|
|
24
|
+
scope: pulumi.Input[_builtins.str],
|
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
26
|
+
operation_activate: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
27
|
+
operation_add_attribute: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
28
|
+
operation_all: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
29
|
+
operation_create: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
30
|
+
operation_destroy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
31
|
+
operation_discover_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
32
|
+
operation_get: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
33
|
+
operation_get_attribute_list: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
34
|
+
operation_get_attributes: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
35
|
+
operation_locate: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
36
|
+
operation_none: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
37
|
+
operation_register: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
38
|
+
operation_rekey: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
39
|
+
operation_revoke: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
40
|
+
tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
41
|
+
tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
42
|
+
tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
|
43
|
+
"""
|
|
44
|
+
The set of arguments for constructing a SecretRole resource.
|
|
45
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
|
46
|
+
not begin or end with a `/`. Defaults to `kmip`.
|
|
47
|
+
:param pulumi.Input[_builtins.str] role: Name of the role.
|
|
48
|
+
:param pulumi.Input[_builtins.str] scope: Name of the scope.
|
|
49
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
50
|
+
The value should not contain leading or trailing forward slashes.
|
|
51
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
52
|
+
*Available only for Vault Enterprise*.
|
|
53
|
+
:param pulumi.Input[_builtins.bool] operation_activate: Grant permission to use the KMIP Activate operation.
|
|
54
|
+
:param pulumi.Input[_builtins.bool] operation_add_attribute: Grant permission to use the KMIP Add Attribute operation.
|
|
55
|
+
:param pulumi.Input[_builtins.bool] operation_all: Grant all permissions to this role. May not be specified with any other `operation_*` params.
|
|
56
|
+
:param pulumi.Input[_builtins.bool] operation_create: Grant permission to use the KMIP Create operation.
|
|
57
|
+
:param pulumi.Input[_builtins.bool] operation_destroy: Grant permission to use the KMIP Destroy operation.
|
|
58
|
+
:param pulumi.Input[_builtins.bool] operation_discover_versions: Grant permission to use the KMIP Discover Version operation.
|
|
59
|
+
:param pulumi.Input[_builtins.bool] operation_get: Grant permission to use the KMIP Get operation.
|
|
60
|
+
:param pulumi.Input[_builtins.bool] operation_get_attribute_list: Grant permission to use the KMIP Get Atrribute List operation.
|
|
61
|
+
:param pulumi.Input[_builtins.bool] operation_get_attributes: Grant permission to use the KMIP Get Atrributes operation.
|
|
62
|
+
:param pulumi.Input[_builtins.bool] operation_locate: Grant permission to use the KMIP Get Locate operation.
|
|
63
|
+
:param pulumi.Input[_builtins.bool] operation_none: Remove all permissions from this role. May not be specified with any other `operation_*` params.
|
|
64
|
+
:param pulumi.Input[_builtins.bool] operation_register: Grant permission to use the KMIP Register operation.
|
|
65
|
+
:param pulumi.Input[_builtins.bool] operation_rekey: Grant permission to use the KMIP Rekey operation.
|
|
66
|
+
:param pulumi.Input[_builtins.bool] operation_revoke: Grant permission to use the KMIP Revoke operation.
|
|
67
|
+
:param pulumi.Input[_builtins.int] tls_client_key_bits: Client certificate key bits, valid values depend on key type.
|
|
68
|
+
:param pulumi.Input[_builtins.str] tls_client_key_type: Client certificate key type, `rsa` or `ec`.
|
|
69
|
+
:param pulumi.Input[_builtins.int] tls_client_ttl: Client certificate TTL in seconds.
|
|
70
|
+
"""
|
|
71
|
+
pulumi.set(__self__, "path", path)
|
|
72
|
+
pulumi.set(__self__, "role", role)
|
|
73
|
+
pulumi.set(__self__, "scope", scope)
|
|
74
|
+
if namespace is not None:
|
|
75
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
76
|
+
if operation_activate is not None:
|
|
77
|
+
pulumi.set(__self__, "operation_activate", operation_activate)
|
|
78
|
+
if operation_add_attribute is not None:
|
|
79
|
+
pulumi.set(__self__, "operation_add_attribute", operation_add_attribute)
|
|
80
|
+
if operation_all is not None:
|
|
81
|
+
pulumi.set(__self__, "operation_all", operation_all)
|
|
82
|
+
if operation_create is not None:
|
|
83
|
+
pulumi.set(__self__, "operation_create", operation_create)
|
|
84
|
+
if operation_destroy is not None:
|
|
85
|
+
pulumi.set(__self__, "operation_destroy", operation_destroy)
|
|
86
|
+
if operation_discover_versions is not None:
|
|
87
|
+
pulumi.set(__self__, "operation_discover_versions", operation_discover_versions)
|
|
88
|
+
if operation_get is not None:
|
|
89
|
+
pulumi.set(__self__, "operation_get", operation_get)
|
|
90
|
+
if operation_get_attribute_list is not None:
|
|
91
|
+
pulumi.set(__self__, "operation_get_attribute_list", operation_get_attribute_list)
|
|
92
|
+
if operation_get_attributes is not None:
|
|
93
|
+
pulumi.set(__self__, "operation_get_attributes", operation_get_attributes)
|
|
94
|
+
if operation_locate is not None:
|
|
95
|
+
pulumi.set(__self__, "operation_locate", operation_locate)
|
|
96
|
+
if operation_none is not None:
|
|
97
|
+
pulumi.set(__self__, "operation_none", operation_none)
|
|
98
|
+
if operation_register is not None:
|
|
99
|
+
pulumi.set(__self__, "operation_register", operation_register)
|
|
100
|
+
if operation_rekey is not None:
|
|
101
|
+
pulumi.set(__self__, "operation_rekey", operation_rekey)
|
|
102
|
+
if operation_revoke is not None:
|
|
103
|
+
pulumi.set(__self__, "operation_revoke", operation_revoke)
|
|
104
|
+
if tls_client_key_bits is not None:
|
|
105
|
+
pulumi.set(__self__, "tls_client_key_bits", tls_client_key_bits)
|
|
106
|
+
if tls_client_key_type is not None:
|
|
107
|
+
pulumi.set(__self__, "tls_client_key_type", tls_client_key_type)
|
|
108
|
+
if tls_client_ttl is not None:
|
|
109
|
+
pulumi.set(__self__, "tls_client_ttl", tls_client_ttl)
|
|
110
|
+
|
|
111
|
+
@_builtins.property
|
|
112
|
+
@pulumi.getter
|
|
113
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
|
114
|
+
"""
|
|
115
|
+
The unique path this backend should be mounted at. Must
|
|
116
|
+
not begin or end with a `/`. Defaults to `kmip`.
|
|
117
|
+
"""
|
|
118
|
+
return pulumi.get(self, "path")
|
|
119
|
+
|
|
120
|
+
@path.setter
|
|
121
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
|
122
|
+
pulumi.set(self, "path", value)
|
|
123
|
+
|
|
124
|
+
@_builtins.property
|
|
125
|
+
@pulumi.getter
|
|
126
|
+
def role(self) -> pulumi.Input[_builtins.str]:
|
|
127
|
+
"""
|
|
128
|
+
Name of the role.
|
|
129
|
+
"""
|
|
130
|
+
return pulumi.get(self, "role")
|
|
131
|
+
|
|
132
|
+
@role.setter
|
|
133
|
+
def role(self, value: pulumi.Input[_builtins.str]):
|
|
134
|
+
pulumi.set(self, "role", value)
|
|
135
|
+
|
|
136
|
+
@_builtins.property
|
|
137
|
+
@pulumi.getter
|
|
138
|
+
def scope(self) -> pulumi.Input[_builtins.str]:
|
|
139
|
+
"""
|
|
140
|
+
Name of the scope.
|
|
141
|
+
"""
|
|
142
|
+
return pulumi.get(self, "scope")
|
|
143
|
+
|
|
144
|
+
@scope.setter
|
|
145
|
+
def scope(self, value: pulumi.Input[_builtins.str]):
|
|
146
|
+
pulumi.set(self, "scope", value)
|
|
147
|
+
|
|
148
|
+
@_builtins.property
|
|
149
|
+
@pulumi.getter
|
|
150
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
151
|
+
"""
|
|
152
|
+
The namespace to provision the resource in.
|
|
153
|
+
The value should not contain leading or trailing forward slashes.
|
|
154
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
155
|
+
*Available only for Vault Enterprise*.
|
|
156
|
+
"""
|
|
157
|
+
return pulumi.get(self, "namespace")
|
|
158
|
+
|
|
159
|
+
@namespace.setter
|
|
160
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
161
|
+
pulumi.set(self, "namespace", value)
|
|
162
|
+
|
|
163
|
+
@_builtins.property
|
|
164
|
+
@pulumi.getter(name="operationActivate")
|
|
165
|
+
def operation_activate(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
166
|
+
"""
|
|
167
|
+
Grant permission to use the KMIP Activate operation.
|
|
168
|
+
"""
|
|
169
|
+
return pulumi.get(self, "operation_activate")
|
|
170
|
+
|
|
171
|
+
@operation_activate.setter
|
|
172
|
+
def operation_activate(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
173
|
+
pulumi.set(self, "operation_activate", value)
|
|
174
|
+
|
|
175
|
+
@_builtins.property
|
|
176
|
+
@pulumi.getter(name="operationAddAttribute")
|
|
177
|
+
def operation_add_attribute(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
178
|
+
"""
|
|
179
|
+
Grant permission to use the KMIP Add Attribute operation.
|
|
180
|
+
"""
|
|
181
|
+
return pulumi.get(self, "operation_add_attribute")
|
|
182
|
+
|
|
183
|
+
@operation_add_attribute.setter
|
|
184
|
+
def operation_add_attribute(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
185
|
+
pulumi.set(self, "operation_add_attribute", value)
|
|
186
|
+
|
|
187
|
+
@_builtins.property
|
|
188
|
+
@pulumi.getter(name="operationAll")
|
|
189
|
+
def operation_all(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
190
|
+
"""
|
|
191
|
+
Grant all permissions to this role. May not be specified with any other `operation_*` params.
|
|
192
|
+
"""
|
|
193
|
+
return pulumi.get(self, "operation_all")
|
|
194
|
+
|
|
195
|
+
@operation_all.setter
|
|
196
|
+
def operation_all(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
197
|
+
pulumi.set(self, "operation_all", value)
|
|
198
|
+
|
|
199
|
+
@_builtins.property
|
|
200
|
+
@pulumi.getter(name="operationCreate")
|
|
201
|
+
def operation_create(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
202
|
+
"""
|
|
203
|
+
Grant permission to use the KMIP Create operation.
|
|
204
|
+
"""
|
|
205
|
+
return pulumi.get(self, "operation_create")
|
|
206
|
+
|
|
207
|
+
@operation_create.setter
|
|
208
|
+
def operation_create(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
209
|
+
pulumi.set(self, "operation_create", value)
|
|
210
|
+
|
|
211
|
+
@_builtins.property
|
|
212
|
+
@pulumi.getter(name="operationDestroy")
|
|
213
|
+
def operation_destroy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
214
|
+
"""
|
|
215
|
+
Grant permission to use the KMIP Destroy operation.
|
|
216
|
+
"""
|
|
217
|
+
return pulumi.get(self, "operation_destroy")
|
|
218
|
+
|
|
219
|
+
@operation_destroy.setter
|
|
220
|
+
def operation_destroy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
221
|
+
pulumi.set(self, "operation_destroy", value)
|
|
222
|
+
|
|
223
|
+
@_builtins.property
|
|
224
|
+
@pulumi.getter(name="operationDiscoverVersions")
|
|
225
|
+
def operation_discover_versions(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
226
|
+
"""
|
|
227
|
+
Grant permission to use the KMIP Discover Version operation.
|
|
228
|
+
"""
|
|
229
|
+
return pulumi.get(self, "operation_discover_versions")
|
|
230
|
+
|
|
231
|
+
@operation_discover_versions.setter
|
|
232
|
+
def operation_discover_versions(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
233
|
+
pulumi.set(self, "operation_discover_versions", value)
|
|
234
|
+
|
|
235
|
+
@_builtins.property
|
|
236
|
+
@pulumi.getter(name="operationGet")
|
|
237
|
+
def operation_get(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
238
|
+
"""
|
|
239
|
+
Grant permission to use the KMIP Get operation.
|
|
240
|
+
"""
|
|
241
|
+
return pulumi.get(self, "operation_get")
|
|
242
|
+
|
|
243
|
+
@operation_get.setter
|
|
244
|
+
def operation_get(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
245
|
+
pulumi.set(self, "operation_get", value)
|
|
246
|
+
|
|
247
|
+
@_builtins.property
|
|
248
|
+
@pulumi.getter(name="operationGetAttributeList")
|
|
249
|
+
def operation_get_attribute_list(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
250
|
+
"""
|
|
251
|
+
Grant permission to use the KMIP Get Atrribute List operation.
|
|
252
|
+
"""
|
|
253
|
+
return pulumi.get(self, "operation_get_attribute_list")
|
|
254
|
+
|
|
255
|
+
@operation_get_attribute_list.setter
|
|
256
|
+
def operation_get_attribute_list(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
257
|
+
pulumi.set(self, "operation_get_attribute_list", value)
|
|
258
|
+
|
|
259
|
+
@_builtins.property
|
|
260
|
+
@pulumi.getter(name="operationGetAttributes")
|
|
261
|
+
def operation_get_attributes(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
262
|
+
"""
|
|
263
|
+
Grant permission to use the KMIP Get Atrributes operation.
|
|
264
|
+
"""
|
|
265
|
+
return pulumi.get(self, "operation_get_attributes")
|
|
266
|
+
|
|
267
|
+
@operation_get_attributes.setter
|
|
268
|
+
def operation_get_attributes(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
269
|
+
pulumi.set(self, "operation_get_attributes", value)
|
|
270
|
+
|
|
271
|
+
@_builtins.property
|
|
272
|
+
@pulumi.getter(name="operationLocate")
|
|
273
|
+
def operation_locate(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
274
|
+
"""
|
|
275
|
+
Grant permission to use the KMIP Get Locate operation.
|
|
276
|
+
"""
|
|
277
|
+
return pulumi.get(self, "operation_locate")
|
|
278
|
+
|
|
279
|
+
@operation_locate.setter
|
|
280
|
+
def operation_locate(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
281
|
+
pulumi.set(self, "operation_locate", value)
|
|
282
|
+
|
|
283
|
+
@_builtins.property
|
|
284
|
+
@pulumi.getter(name="operationNone")
|
|
285
|
+
def operation_none(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
286
|
+
"""
|
|
287
|
+
Remove all permissions from this role. May not be specified with any other `operation_*` params.
|
|
288
|
+
"""
|
|
289
|
+
return pulumi.get(self, "operation_none")
|
|
290
|
+
|
|
291
|
+
@operation_none.setter
|
|
292
|
+
def operation_none(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
293
|
+
pulumi.set(self, "operation_none", value)
|
|
294
|
+
|
|
295
|
+
@_builtins.property
|
|
296
|
+
@pulumi.getter(name="operationRegister")
|
|
297
|
+
def operation_register(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
298
|
+
"""
|
|
299
|
+
Grant permission to use the KMIP Register operation.
|
|
300
|
+
"""
|
|
301
|
+
return pulumi.get(self, "operation_register")
|
|
302
|
+
|
|
303
|
+
@operation_register.setter
|
|
304
|
+
def operation_register(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
305
|
+
pulumi.set(self, "operation_register", value)
|
|
306
|
+
|
|
307
|
+
@_builtins.property
|
|
308
|
+
@pulumi.getter(name="operationRekey")
|
|
309
|
+
def operation_rekey(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
310
|
+
"""
|
|
311
|
+
Grant permission to use the KMIP Rekey operation.
|
|
312
|
+
"""
|
|
313
|
+
return pulumi.get(self, "operation_rekey")
|
|
314
|
+
|
|
315
|
+
@operation_rekey.setter
|
|
316
|
+
def operation_rekey(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
317
|
+
pulumi.set(self, "operation_rekey", value)
|
|
318
|
+
|
|
319
|
+
@_builtins.property
|
|
320
|
+
@pulumi.getter(name="operationRevoke")
|
|
321
|
+
def operation_revoke(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
322
|
+
"""
|
|
323
|
+
Grant permission to use the KMIP Revoke operation.
|
|
324
|
+
"""
|
|
325
|
+
return pulumi.get(self, "operation_revoke")
|
|
326
|
+
|
|
327
|
+
@operation_revoke.setter
|
|
328
|
+
def operation_revoke(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
329
|
+
pulumi.set(self, "operation_revoke", value)
|
|
330
|
+
|
|
331
|
+
@_builtins.property
|
|
332
|
+
@pulumi.getter(name="tlsClientKeyBits")
|
|
333
|
+
def tls_client_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
334
|
+
"""
|
|
335
|
+
Client certificate key bits, valid values depend on key type.
|
|
336
|
+
"""
|
|
337
|
+
return pulumi.get(self, "tls_client_key_bits")
|
|
338
|
+
|
|
339
|
+
@tls_client_key_bits.setter
|
|
340
|
+
def tls_client_key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
341
|
+
pulumi.set(self, "tls_client_key_bits", value)
|
|
342
|
+
|
|
343
|
+
@_builtins.property
|
|
344
|
+
@pulumi.getter(name="tlsClientKeyType")
|
|
345
|
+
def tls_client_key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
346
|
+
"""
|
|
347
|
+
Client certificate key type, `rsa` or `ec`.
|
|
348
|
+
"""
|
|
349
|
+
return pulumi.get(self, "tls_client_key_type")
|
|
350
|
+
|
|
351
|
+
@tls_client_key_type.setter
|
|
352
|
+
def tls_client_key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
353
|
+
pulumi.set(self, "tls_client_key_type", value)
|
|
354
|
+
|
|
355
|
+
@_builtins.property
|
|
356
|
+
@pulumi.getter(name="tlsClientTtl")
|
|
357
|
+
def tls_client_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
358
|
+
"""
|
|
359
|
+
Client certificate TTL in seconds.
|
|
360
|
+
"""
|
|
361
|
+
return pulumi.get(self, "tls_client_ttl")
|
|
362
|
+
|
|
363
|
+
@tls_client_ttl.setter
|
|
364
|
+
def tls_client_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
365
|
+
pulumi.set(self, "tls_client_ttl", value)
|
|
366
|
+
|
|
367
|
+
|
|
368
|
+
@pulumi.input_type
|
|
369
|
+
class _SecretRoleState:
|
|
370
|
+
def __init__(__self__, *,
|
|
371
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
372
|
+
operation_activate: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
373
|
+
operation_add_attribute: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
374
|
+
operation_all: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
375
|
+
operation_create: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
376
|
+
operation_destroy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
377
|
+
operation_discover_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
378
|
+
operation_get: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
379
|
+
operation_get_attribute_list: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
380
|
+
operation_get_attributes: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
381
|
+
operation_locate: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
382
|
+
operation_none: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
383
|
+
operation_register: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
384
|
+
operation_rekey: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
385
|
+
operation_revoke: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
386
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
387
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
|
388
|
+
scope: Optional[pulumi.Input[_builtins.str]] = None,
|
|
389
|
+
tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
390
|
+
tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
391
|
+
tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None):
|
|
392
|
+
"""
|
|
393
|
+
Input properties used for looking up and filtering SecretRole resources.
|
|
394
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
395
|
+
The value should not contain leading or trailing forward slashes.
|
|
396
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
397
|
+
*Available only for Vault Enterprise*.
|
|
398
|
+
:param pulumi.Input[_builtins.bool] operation_activate: Grant permission to use the KMIP Activate operation.
|
|
399
|
+
:param pulumi.Input[_builtins.bool] operation_add_attribute: Grant permission to use the KMIP Add Attribute operation.
|
|
400
|
+
:param pulumi.Input[_builtins.bool] operation_all: Grant all permissions to this role. May not be specified with any other `operation_*` params.
|
|
401
|
+
:param pulumi.Input[_builtins.bool] operation_create: Grant permission to use the KMIP Create operation.
|
|
402
|
+
:param pulumi.Input[_builtins.bool] operation_destroy: Grant permission to use the KMIP Destroy operation.
|
|
403
|
+
:param pulumi.Input[_builtins.bool] operation_discover_versions: Grant permission to use the KMIP Discover Version operation.
|
|
404
|
+
:param pulumi.Input[_builtins.bool] operation_get: Grant permission to use the KMIP Get operation.
|
|
405
|
+
:param pulumi.Input[_builtins.bool] operation_get_attribute_list: Grant permission to use the KMIP Get Atrribute List operation.
|
|
406
|
+
:param pulumi.Input[_builtins.bool] operation_get_attributes: Grant permission to use the KMIP Get Atrributes operation.
|
|
407
|
+
:param pulumi.Input[_builtins.bool] operation_locate: Grant permission to use the KMIP Get Locate operation.
|
|
408
|
+
:param pulumi.Input[_builtins.bool] operation_none: Remove all permissions from this role. May not be specified with any other `operation_*` params.
|
|
409
|
+
:param pulumi.Input[_builtins.bool] operation_register: Grant permission to use the KMIP Register operation.
|
|
410
|
+
:param pulumi.Input[_builtins.bool] operation_rekey: Grant permission to use the KMIP Rekey operation.
|
|
411
|
+
:param pulumi.Input[_builtins.bool] operation_revoke: Grant permission to use the KMIP Revoke operation.
|
|
412
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
|
413
|
+
not begin or end with a `/`. Defaults to `kmip`.
|
|
414
|
+
:param pulumi.Input[_builtins.str] role: Name of the role.
|
|
415
|
+
:param pulumi.Input[_builtins.str] scope: Name of the scope.
|
|
416
|
+
:param pulumi.Input[_builtins.int] tls_client_key_bits: Client certificate key bits, valid values depend on key type.
|
|
417
|
+
:param pulumi.Input[_builtins.str] tls_client_key_type: Client certificate key type, `rsa` or `ec`.
|
|
418
|
+
:param pulumi.Input[_builtins.int] tls_client_ttl: Client certificate TTL in seconds.
|
|
419
|
+
"""
|
|
420
|
+
if namespace is not None:
|
|
421
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
422
|
+
if operation_activate is not None:
|
|
423
|
+
pulumi.set(__self__, "operation_activate", operation_activate)
|
|
424
|
+
if operation_add_attribute is not None:
|
|
425
|
+
pulumi.set(__self__, "operation_add_attribute", operation_add_attribute)
|
|
426
|
+
if operation_all is not None:
|
|
427
|
+
pulumi.set(__self__, "operation_all", operation_all)
|
|
428
|
+
if operation_create is not None:
|
|
429
|
+
pulumi.set(__self__, "operation_create", operation_create)
|
|
430
|
+
if operation_destroy is not None:
|
|
431
|
+
pulumi.set(__self__, "operation_destroy", operation_destroy)
|
|
432
|
+
if operation_discover_versions is not None:
|
|
433
|
+
pulumi.set(__self__, "operation_discover_versions", operation_discover_versions)
|
|
434
|
+
if operation_get is not None:
|
|
435
|
+
pulumi.set(__self__, "operation_get", operation_get)
|
|
436
|
+
if operation_get_attribute_list is not None:
|
|
437
|
+
pulumi.set(__self__, "operation_get_attribute_list", operation_get_attribute_list)
|
|
438
|
+
if operation_get_attributes is not None:
|
|
439
|
+
pulumi.set(__self__, "operation_get_attributes", operation_get_attributes)
|
|
440
|
+
if operation_locate is not None:
|
|
441
|
+
pulumi.set(__self__, "operation_locate", operation_locate)
|
|
442
|
+
if operation_none is not None:
|
|
443
|
+
pulumi.set(__self__, "operation_none", operation_none)
|
|
444
|
+
if operation_register is not None:
|
|
445
|
+
pulumi.set(__self__, "operation_register", operation_register)
|
|
446
|
+
if operation_rekey is not None:
|
|
447
|
+
pulumi.set(__self__, "operation_rekey", operation_rekey)
|
|
448
|
+
if operation_revoke is not None:
|
|
449
|
+
pulumi.set(__self__, "operation_revoke", operation_revoke)
|
|
450
|
+
if path is not None:
|
|
451
|
+
pulumi.set(__self__, "path", path)
|
|
452
|
+
if role is not None:
|
|
453
|
+
pulumi.set(__self__, "role", role)
|
|
454
|
+
if scope is not None:
|
|
455
|
+
pulumi.set(__self__, "scope", scope)
|
|
456
|
+
if tls_client_key_bits is not None:
|
|
457
|
+
pulumi.set(__self__, "tls_client_key_bits", tls_client_key_bits)
|
|
458
|
+
if tls_client_key_type is not None:
|
|
459
|
+
pulumi.set(__self__, "tls_client_key_type", tls_client_key_type)
|
|
460
|
+
if tls_client_ttl is not None:
|
|
461
|
+
pulumi.set(__self__, "tls_client_ttl", tls_client_ttl)
|
|
462
|
+
|
|
463
|
+
@_builtins.property
|
|
464
|
+
@pulumi.getter
|
|
465
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
466
|
+
"""
|
|
467
|
+
The namespace to provision the resource in.
|
|
468
|
+
The value should not contain leading or trailing forward slashes.
|
|
469
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
470
|
+
*Available only for Vault Enterprise*.
|
|
471
|
+
"""
|
|
472
|
+
return pulumi.get(self, "namespace")
|
|
473
|
+
|
|
474
|
+
@namespace.setter
|
|
475
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
476
|
+
pulumi.set(self, "namespace", value)
|
|
477
|
+
|
|
478
|
+
@_builtins.property
|
|
479
|
+
@pulumi.getter(name="operationActivate")
|
|
480
|
+
def operation_activate(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
481
|
+
"""
|
|
482
|
+
Grant permission to use the KMIP Activate operation.
|
|
483
|
+
"""
|
|
484
|
+
return pulumi.get(self, "operation_activate")
|
|
485
|
+
|
|
486
|
+
@operation_activate.setter
|
|
487
|
+
def operation_activate(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
488
|
+
pulumi.set(self, "operation_activate", value)
|
|
489
|
+
|
|
490
|
+
@_builtins.property
|
|
491
|
+
@pulumi.getter(name="operationAddAttribute")
|
|
492
|
+
def operation_add_attribute(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
493
|
+
"""
|
|
494
|
+
Grant permission to use the KMIP Add Attribute operation.
|
|
495
|
+
"""
|
|
496
|
+
return pulumi.get(self, "operation_add_attribute")
|
|
497
|
+
|
|
498
|
+
@operation_add_attribute.setter
|
|
499
|
+
def operation_add_attribute(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
500
|
+
pulumi.set(self, "operation_add_attribute", value)
|
|
501
|
+
|
|
502
|
+
@_builtins.property
|
|
503
|
+
@pulumi.getter(name="operationAll")
|
|
504
|
+
def operation_all(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
505
|
+
"""
|
|
506
|
+
Grant all permissions to this role. May not be specified with any other `operation_*` params.
|
|
507
|
+
"""
|
|
508
|
+
return pulumi.get(self, "operation_all")
|
|
509
|
+
|
|
510
|
+
@operation_all.setter
|
|
511
|
+
def operation_all(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
512
|
+
pulumi.set(self, "operation_all", value)
|
|
513
|
+
|
|
514
|
+
@_builtins.property
|
|
515
|
+
@pulumi.getter(name="operationCreate")
|
|
516
|
+
def operation_create(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
517
|
+
"""
|
|
518
|
+
Grant permission to use the KMIP Create operation.
|
|
519
|
+
"""
|
|
520
|
+
return pulumi.get(self, "operation_create")
|
|
521
|
+
|
|
522
|
+
@operation_create.setter
|
|
523
|
+
def operation_create(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
524
|
+
pulumi.set(self, "operation_create", value)
|
|
525
|
+
|
|
526
|
+
@_builtins.property
|
|
527
|
+
@pulumi.getter(name="operationDestroy")
|
|
528
|
+
def operation_destroy(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
529
|
+
"""
|
|
530
|
+
Grant permission to use the KMIP Destroy operation.
|
|
531
|
+
"""
|
|
532
|
+
return pulumi.get(self, "operation_destroy")
|
|
533
|
+
|
|
534
|
+
@operation_destroy.setter
|
|
535
|
+
def operation_destroy(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
536
|
+
pulumi.set(self, "operation_destroy", value)
|
|
537
|
+
|
|
538
|
+
@_builtins.property
|
|
539
|
+
@pulumi.getter(name="operationDiscoverVersions")
|
|
540
|
+
def operation_discover_versions(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
541
|
+
"""
|
|
542
|
+
Grant permission to use the KMIP Discover Version operation.
|
|
543
|
+
"""
|
|
544
|
+
return pulumi.get(self, "operation_discover_versions")
|
|
545
|
+
|
|
546
|
+
@operation_discover_versions.setter
|
|
547
|
+
def operation_discover_versions(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
548
|
+
pulumi.set(self, "operation_discover_versions", value)
|
|
549
|
+
|
|
550
|
+
@_builtins.property
|
|
551
|
+
@pulumi.getter(name="operationGet")
|
|
552
|
+
def operation_get(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
553
|
+
"""
|
|
554
|
+
Grant permission to use the KMIP Get operation.
|
|
555
|
+
"""
|
|
556
|
+
return pulumi.get(self, "operation_get")
|
|
557
|
+
|
|
558
|
+
@operation_get.setter
|
|
559
|
+
def operation_get(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
560
|
+
pulumi.set(self, "operation_get", value)
|
|
561
|
+
|
|
562
|
+
@_builtins.property
|
|
563
|
+
@pulumi.getter(name="operationGetAttributeList")
|
|
564
|
+
def operation_get_attribute_list(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
565
|
+
"""
|
|
566
|
+
Grant permission to use the KMIP Get Atrribute List operation.
|
|
567
|
+
"""
|
|
568
|
+
return pulumi.get(self, "operation_get_attribute_list")
|
|
569
|
+
|
|
570
|
+
@operation_get_attribute_list.setter
|
|
571
|
+
def operation_get_attribute_list(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
572
|
+
pulumi.set(self, "operation_get_attribute_list", value)
|
|
573
|
+
|
|
574
|
+
@_builtins.property
|
|
575
|
+
@pulumi.getter(name="operationGetAttributes")
|
|
576
|
+
def operation_get_attributes(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
577
|
+
"""
|
|
578
|
+
Grant permission to use the KMIP Get Atrributes operation.
|
|
579
|
+
"""
|
|
580
|
+
return pulumi.get(self, "operation_get_attributes")
|
|
581
|
+
|
|
582
|
+
@operation_get_attributes.setter
|
|
583
|
+
def operation_get_attributes(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
584
|
+
pulumi.set(self, "operation_get_attributes", value)
|
|
585
|
+
|
|
586
|
+
@_builtins.property
|
|
587
|
+
@pulumi.getter(name="operationLocate")
|
|
588
|
+
def operation_locate(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
589
|
+
"""
|
|
590
|
+
Grant permission to use the KMIP Get Locate operation.
|
|
591
|
+
"""
|
|
592
|
+
return pulumi.get(self, "operation_locate")
|
|
593
|
+
|
|
594
|
+
@operation_locate.setter
|
|
595
|
+
def operation_locate(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
596
|
+
pulumi.set(self, "operation_locate", value)
|
|
597
|
+
|
|
598
|
+
@_builtins.property
|
|
599
|
+
@pulumi.getter(name="operationNone")
|
|
600
|
+
def operation_none(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
601
|
+
"""
|
|
602
|
+
Remove all permissions from this role. May not be specified with any other `operation_*` params.
|
|
603
|
+
"""
|
|
604
|
+
return pulumi.get(self, "operation_none")
|
|
605
|
+
|
|
606
|
+
@operation_none.setter
|
|
607
|
+
def operation_none(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
608
|
+
pulumi.set(self, "operation_none", value)
|
|
609
|
+
|
|
610
|
+
@_builtins.property
|
|
611
|
+
@pulumi.getter(name="operationRegister")
|
|
612
|
+
def operation_register(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
613
|
+
"""
|
|
614
|
+
Grant permission to use the KMIP Register operation.
|
|
615
|
+
"""
|
|
616
|
+
return pulumi.get(self, "operation_register")
|
|
617
|
+
|
|
618
|
+
@operation_register.setter
|
|
619
|
+
def operation_register(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
620
|
+
pulumi.set(self, "operation_register", value)
|
|
621
|
+
|
|
622
|
+
@_builtins.property
|
|
623
|
+
@pulumi.getter(name="operationRekey")
|
|
624
|
+
def operation_rekey(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
625
|
+
"""
|
|
626
|
+
Grant permission to use the KMIP Rekey operation.
|
|
627
|
+
"""
|
|
628
|
+
return pulumi.get(self, "operation_rekey")
|
|
629
|
+
|
|
630
|
+
@operation_rekey.setter
|
|
631
|
+
def operation_rekey(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
632
|
+
pulumi.set(self, "operation_rekey", value)
|
|
633
|
+
|
|
634
|
+
@_builtins.property
|
|
635
|
+
@pulumi.getter(name="operationRevoke")
|
|
636
|
+
def operation_revoke(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
637
|
+
"""
|
|
638
|
+
Grant permission to use the KMIP Revoke operation.
|
|
639
|
+
"""
|
|
640
|
+
return pulumi.get(self, "operation_revoke")
|
|
641
|
+
|
|
642
|
+
@operation_revoke.setter
|
|
643
|
+
def operation_revoke(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
644
|
+
pulumi.set(self, "operation_revoke", value)
|
|
645
|
+
|
|
646
|
+
@_builtins.property
|
|
647
|
+
@pulumi.getter
|
|
648
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
649
|
+
"""
|
|
650
|
+
The unique path this backend should be mounted at. Must
|
|
651
|
+
not begin or end with a `/`. Defaults to `kmip`.
|
|
652
|
+
"""
|
|
653
|
+
return pulumi.get(self, "path")
|
|
654
|
+
|
|
655
|
+
@path.setter
|
|
656
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
657
|
+
pulumi.set(self, "path", value)
|
|
658
|
+
|
|
659
|
+
@_builtins.property
|
|
660
|
+
@pulumi.getter
|
|
661
|
+
def role(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
662
|
+
"""
|
|
663
|
+
Name of the role.
|
|
664
|
+
"""
|
|
665
|
+
return pulumi.get(self, "role")
|
|
666
|
+
|
|
667
|
+
@role.setter
|
|
668
|
+
def role(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
669
|
+
pulumi.set(self, "role", value)
|
|
670
|
+
|
|
671
|
+
@_builtins.property
|
|
672
|
+
@pulumi.getter
|
|
673
|
+
def scope(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
674
|
+
"""
|
|
675
|
+
Name of the scope.
|
|
676
|
+
"""
|
|
677
|
+
return pulumi.get(self, "scope")
|
|
678
|
+
|
|
679
|
+
@scope.setter
|
|
680
|
+
def scope(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
681
|
+
pulumi.set(self, "scope", value)
|
|
682
|
+
|
|
683
|
+
@_builtins.property
|
|
684
|
+
@pulumi.getter(name="tlsClientKeyBits")
|
|
685
|
+
def tls_client_key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
686
|
+
"""
|
|
687
|
+
Client certificate key bits, valid values depend on key type.
|
|
688
|
+
"""
|
|
689
|
+
return pulumi.get(self, "tls_client_key_bits")
|
|
690
|
+
|
|
691
|
+
@tls_client_key_bits.setter
|
|
692
|
+
def tls_client_key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
693
|
+
pulumi.set(self, "tls_client_key_bits", value)
|
|
694
|
+
|
|
695
|
+
@_builtins.property
|
|
696
|
+
@pulumi.getter(name="tlsClientKeyType")
|
|
697
|
+
def tls_client_key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
698
|
+
"""
|
|
699
|
+
Client certificate key type, `rsa` or `ec`.
|
|
700
|
+
"""
|
|
701
|
+
return pulumi.get(self, "tls_client_key_type")
|
|
702
|
+
|
|
703
|
+
@tls_client_key_type.setter
|
|
704
|
+
def tls_client_key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
705
|
+
pulumi.set(self, "tls_client_key_type", value)
|
|
706
|
+
|
|
707
|
+
@_builtins.property
|
|
708
|
+
@pulumi.getter(name="tlsClientTtl")
|
|
709
|
+
def tls_client_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
|
|
710
|
+
"""
|
|
711
|
+
Client certificate TTL in seconds.
|
|
712
|
+
"""
|
|
713
|
+
return pulumi.get(self, "tls_client_ttl")
|
|
714
|
+
|
|
715
|
+
@tls_client_ttl.setter
|
|
716
|
+
def tls_client_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
|
|
717
|
+
pulumi.set(self, "tls_client_ttl", value)
|
|
718
|
+
|
|
719
|
+
|
|
720
|
+
@pulumi.type_token("vault:kmip/secretRole:SecretRole")
|
|
721
|
+
class SecretRole(pulumi.CustomResource):
|
|
722
|
+
@overload
|
|
723
|
+
def __init__(__self__,
|
|
724
|
+
resource_name: str,
|
|
725
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
726
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
727
|
+
operation_activate: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
728
|
+
operation_add_attribute: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
729
|
+
operation_all: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
730
|
+
operation_create: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
731
|
+
operation_destroy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
732
|
+
operation_discover_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
733
|
+
operation_get: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
734
|
+
operation_get_attribute_list: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
735
|
+
operation_get_attributes: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
736
|
+
operation_locate: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
737
|
+
operation_none: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
738
|
+
operation_register: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
739
|
+
operation_rekey: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
740
|
+
operation_revoke: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
741
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
742
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
|
743
|
+
scope: Optional[pulumi.Input[_builtins.str]] = None,
|
|
744
|
+
tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
745
|
+
tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
746
|
+
tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
747
|
+
__props__=None):
|
|
748
|
+
"""
|
|
749
|
+
Manages KMIP Secret roles in a Vault server. This feature requires
|
|
750
|
+
Vault Enterprise. See the [Vault documentation](https://www.vaultproject.io/docs/secrets/kmip)
|
|
751
|
+
for more information.
|
|
752
|
+
|
|
753
|
+
## Example Usage
|
|
754
|
+
|
|
755
|
+
```python
|
|
756
|
+
import pulumi
|
|
757
|
+
import pulumi_vault as vault
|
|
758
|
+
|
|
759
|
+
default = vault.kmip.SecretBackend("default",
|
|
760
|
+
path="kmip",
|
|
761
|
+
description="Vault KMIP backend")
|
|
762
|
+
dev = vault.kmip.SecretScope("dev",
|
|
763
|
+
path=default.path,
|
|
764
|
+
scope="dev",
|
|
765
|
+
force=True)
|
|
766
|
+
admin = vault.kmip.SecretRole("admin",
|
|
767
|
+
path=dev.path,
|
|
768
|
+
scope=dev.scope,
|
|
769
|
+
role="admin",
|
|
770
|
+
tls_client_key_type="ec",
|
|
771
|
+
tls_client_key_bits=256,
|
|
772
|
+
operation_activate=True,
|
|
773
|
+
operation_get=True,
|
|
774
|
+
operation_get_attributes=True,
|
|
775
|
+
operation_create=True,
|
|
776
|
+
operation_destroy=True)
|
|
777
|
+
```
|
|
778
|
+
|
|
779
|
+
## Import
|
|
780
|
+
|
|
781
|
+
KMIP Secret role can be imported using the `path`, e.g.
|
|
782
|
+
|
|
783
|
+
```sh
|
|
784
|
+
$ pulumi import vault:kmip/secretRole:SecretRole admin kmip
|
|
785
|
+
```
|
|
786
|
+
|
|
787
|
+
:param str resource_name: The name of the resource.
|
|
788
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
789
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
790
|
+
The value should not contain leading or trailing forward slashes.
|
|
791
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
792
|
+
*Available only for Vault Enterprise*.
|
|
793
|
+
:param pulumi.Input[_builtins.bool] operation_activate: Grant permission to use the KMIP Activate operation.
|
|
794
|
+
:param pulumi.Input[_builtins.bool] operation_add_attribute: Grant permission to use the KMIP Add Attribute operation.
|
|
795
|
+
:param pulumi.Input[_builtins.bool] operation_all: Grant all permissions to this role. May not be specified with any other `operation_*` params.
|
|
796
|
+
:param pulumi.Input[_builtins.bool] operation_create: Grant permission to use the KMIP Create operation.
|
|
797
|
+
:param pulumi.Input[_builtins.bool] operation_destroy: Grant permission to use the KMIP Destroy operation.
|
|
798
|
+
:param pulumi.Input[_builtins.bool] operation_discover_versions: Grant permission to use the KMIP Discover Version operation.
|
|
799
|
+
:param pulumi.Input[_builtins.bool] operation_get: Grant permission to use the KMIP Get operation.
|
|
800
|
+
:param pulumi.Input[_builtins.bool] operation_get_attribute_list: Grant permission to use the KMIP Get Atrribute List operation.
|
|
801
|
+
:param pulumi.Input[_builtins.bool] operation_get_attributes: Grant permission to use the KMIP Get Atrributes operation.
|
|
802
|
+
:param pulumi.Input[_builtins.bool] operation_locate: Grant permission to use the KMIP Get Locate operation.
|
|
803
|
+
:param pulumi.Input[_builtins.bool] operation_none: Remove all permissions from this role. May not be specified with any other `operation_*` params.
|
|
804
|
+
:param pulumi.Input[_builtins.bool] operation_register: Grant permission to use the KMIP Register operation.
|
|
805
|
+
:param pulumi.Input[_builtins.bool] operation_rekey: Grant permission to use the KMIP Rekey operation.
|
|
806
|
+
:param pulumi.Input[_builtins.bool] operation_revoke: Grant permission to use the KMIP Revoke operation.
|
|
807
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
|
808
|
+
not begin or end with a `/`. Defaults to `kmip`.
|
|
809
|
+
:param pulumi.Input[_builtins.str] role: Name of the role.
|
|
810
|
+
:param pulumi.Input[_builtins.str] scope: Name of the scope.
|
|
811
|
+
:param pulumi.Input[_builtins.int] tls_client_key_bits: Client certificate key bits, valid values depend on key type.
|
|
812
|
+
:param pulumi.Input[_builtins.str] tls_client_key_type: Client certificate key type, `rsa` or `ec`.
|
|
813
|
+
:param pulumi.Input[_builtins.int] tls_client_ttl: Client certificate TTL in seconds.
|
|
814
|
+
"""
|
|
815
|
+
...
|
|
816
|
+
@overload
|
|
817
|
+
def __init__(__self__,
|
|
818
|
+
resource_name: str,
|
|
819
|
+
args: SecretRoleArgs,
|
|
820
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
821
|
+
"""
|
|
822
|
+
Manages KMIP Secret roles in a Vault server. This feature requires
|
|
823
|
+
Vault Enterprise. See the [Vault documentation](https://www.vaultproject.io/docs/secrets/kmip)
|
|
824
|
+
for more information.
|
|
825
|
+
|
|
826
|
+
## Example Usage
|
|
827
|
+
|
|
828
|
+
```python
|
|
829
|
+
import pulumi
|
|
830
|
+
import pulumi_vault as vault
|
|
831
|
+
|
|
832
|
+
default = vault.kmip.SecretBackend("default",
|
|
833
|
+
path="kmip",
|
|
834
|
+
description="Vault KMIP backend")
|
|
835
|
+
dev = vault.kmip.SecretScope("dev",
|
|
836
|
+
path=default.path,
|
|
837
|
+
scope="dev",
|
|
838
|
+
force=True)
|
|
839
|
+
admin = vault.kmip.SecretRole("admin",
|
|
840
|
+
path=dev.path,
|
|
841
|
+
scope=dev.scope,
|
|
842
|
+
role="admin",
|
|
843
|
+
tls_client_key_type="ec",
|
|
844
|
+
tls_client_key_bits=256,
|
|
845
|
+
operation_activate=True,
|
|
846
|
+
operation_get=True,
|
|
847
|
+
operation_get_attributes=True,
|
|
848
|
+
operation_create=True,
|
|
849
|
+
operation_destroy=True)
|
|
850
|
+
```
|
|
851
|
+
|
|
852
|
+
## Import
|
|
853
|
+
|
|
854
|
+
KMIP Secret role can be imported using the `path`, e.g.
|
|
855
|
+
|
|
856
|
+
```sh
|
|
857
|
+
$ pulumi import vault:kmip/secretRole:SecretRole admin kmip
|
|
858
|
+
```
|
|
859
|
+
|
|
860
|
+
:param str resource_name: The name of the resource.
|
|
861
|
+
:param SecretRoleArgs args: The arguments to use to populate this resource's properties.
|
|
862
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
863
|
+
"""
|
|
864
|
+
...
|
|
865
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
866
|
+
resource_args, opts = _utilities.get_resource_args_opts(SecretRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
867
|
+
if resource_args is not None:
|
|
868
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
869
|
+
else:
|
|
870
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
871
|
+
|
|
872
|
+
def _internal_init(__self__,
|
|
873
|
+
resource_name: str,
|
|
874
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
875
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
876
|
+
operation_activate: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
877
|
+
operation_add_attribute: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
878
|
+
operation_all: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
879
|
+
operation_create: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
880
|
+
operation_destroy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
881
|
+
operation_discover_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
882
|
+
operation_get: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
883
|
+
operation_get_attribute_list: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
884
|
+
operation_get_attributes: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
885
|
+
operation_locate: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
886
|
+
operation_none: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
887
|
+
operation_register: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
888
|
+
operation_rekey: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
889
|
+
operation_revoke: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
890
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
891
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
|
892
|
+
scope: Optional[pulumi.Input[_builtins.str]] = None,
|
|
893
|
+
tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
894
|
+
tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
895
|
+
tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None,
|
|
896
|
+
__props__=None):
|
|
897
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
898
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
899
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
900
|
+
if opts.id is None:
|
|
901
|
+
if __props__ is not None:
|
|
902
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
903
|
+
__props__ = SecretRoleArgs.__new__(SecretRoleArgs)
|
|
904
|
+
|
|
905
|
+
__props__.__dict__["namespace"] = namespace
|
|
906
|
+
__props__.__dict__["operation_activate"] = operation_activate
|
|
907
|
+
__props__.__dict__["operation_add_attribute"] = operation_add_attribute
|
|
908
|
+
__props__.__dict__["operation_all"] = operation_all
|
|
909
|
+
__props__.__dict__["operation_create"] = operation_create
|
|
910
|
+
__props__.__dict__["operation_destroy"] = operation_destroy
|
|
911
|
+
__props__.__dict__["operation_discover_versions"] = operation_discover_versions
|
|
912
|
+
__props__.__dict__["operation_get"] = operation_get
|
|
913
|
+
__props__.__dict__["operation_get_attribute_list"] = operation_get_attribute_list
|
|
914
|
+
__props__.__dict__["operation_get_attributes"] = operation_get_attributes
|
|
915
|
+
__props__.__dict__["operation_locate"] = operation_locate
|
|
916
|
+
__props__.__dict__["operation_none"] = operation_none
|
|
917
|
+
__props__.__dict__["operation_register"] = operation_register
|
|
918
|
+
__props__.__dict__["operation_rekey"] = operation_rekey
|
|
919
|
+
__props__.__dict__["operation_revoke"] = operation_revoke
|
|
920
|
+
if path is None and not opts.urn:
|
|
921
|
+
raise TypeError("Missing required property 'path'")
|
|
922
|
+
__props__.__dict__["path"] = path
|
|
923
|
+
if role is None and not opts.urn:
|
|
924
|
+
raise TypeError("Missing required property 'role'")
|
|
925
|
+
__props__.__dict__["role"] = role
|
|
926
|
+
if scope is None and not opts.urn:
|
|
927
|
+
raise TypeError("Missing required property 'scope'")
|
|
928
|
+
__props__.__dict__["scope"] = scope
|
|
929
|
+
__props__.__dict__["tls_client_key_bits"] = tls_client_key_bits
|
|
930
|
+
__props__.__dict__["tls_client_key_type"] = tls_client_key_type
|
|
931
|
+
__props__.__dict__["tls_client_ttl"] = tls_client_ttl
|
|
932
|
+
super(SecretRole, __self__).__init__(
|
|
933
|
+
'vault:kmip/secretRole:SecretRole',
|
|
934
|
+
resource_name,
|
|
935
|
+
__props__,
|
|
936
|
+
opts)
|
|
937
|
+
|
|
938
|
+
@staticmethod
|
|
939
|
+
def get(resource_name: str,
|
|
940
|
+
id: pulumi.Input[str],
|
|
941
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
942
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
|
943
|
+
operation_activate: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
944
|
+
operation_add_attribute: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
945
|
+
operation_all: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
946
|
+
operation_create: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
947
|
+
operation_destroy: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
948
|
+
operation_discover_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
949
|
+
operation_get: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
950
|
+
operation_get_attribute_list: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
951
|
+
operation_get_attributes: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
952
|
+
operation_locate: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
953
|
+
operation_none: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
954
|
+
operation_register: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
955
|
+
operation_rekey: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
956
|
+
operation_revoke: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
957
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
958
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
|
959
|
+
scope: Optional[pulumi.Input[_builtins.str]] = None,
|
|
960
|
+
tls_client_key_bits: Optional[pulumi.Input[_builtins.int]] = None,
|
|
961
|
+
tls_client_key_type: Optional[pulumi.Input[_builtins.str]] = None,
|
|
962
|
+
tls_client_ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretRole':
|
|
963
|
+
"""
|
|
964
|
+
Get an existing SecretRole resource's state with the given name, id, and optional extra
|
|
965
|
+
properties used to qualify the lookup.
|
|
966
|
+
|
|
967
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
968
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
969
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
970
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
|
971
|
+
The value should not contain leading or trailing forward slashes.
|
|
972
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
973
|
+
*Available only for Vault Enterprise*.
|
|
974
|
+
:param pulumi.Input[_builtins.bool] operation_activate: Grant permission to use the KMIP Activate operation.
|
|
975
|
+
:param pulumi.Input[_builtins.bool] operation_add_attribute: Grant permission to use the KMIP Add Attribute operation.
|
|
976
|
+
:param pulumi.Input[_builtins.bool] operation_all: Grant all permissions to this role. May not be specified with any other `operation_*` params.
|
|
977
|
+
:param pulumi.Input[_builtins.bool] operation_create: Grant permission to use the KMIP Create operation.
|
|
978
|
+
:param pulumi.Input[_builtins.bool] operation_destroy: Grant permission to use the KMIP Destroy operation.
|
|
979
|
+
:param pulumi.Input[_builtins.bool] operation_discover_versions: Grant permission to use the KMIP Discover Version operation.
|
|
980
|
+
:param pulumi.Input[_builtins.bool] operation_get: Grant permission to use the KMIP Get operation.
|
|
981
|
+
:param pulumi.Input[_builtins.bool] operation_get_attribute_list: Grant permission to use the KMIP Get Atrribute List operation.
|
|
982
|
+
:param pulumi.Input[_builtins.bool] operation_get_attributes: Grant permission to use the KMIP Get Atrributes operation.
|
|
983
|
+
:param pulumi.Input[_builtins.bool] operation_locate: Grant permission to use the KMIP Get Locate operation.
|
|
984
|
+
:param pulumi.Input[_builtins.bool] operation_none: Remove all permissions from this role. May not be specified with any other `operation_*` params.
|
|
985
|
+
:param pulumi.Input[_builtins.bool] operation_register: Grant permission to use the KMIP Register operation.
|
|
986
|
+
:param pulumi.Input[_builtins.bool] operation_rekey: Grant permission to use the KMIP Rekey operation.
|
|
987
|
+
:param pulumi.Input[_builtins.bool] operation_revoke: Grant permission to use the KMIP Revoke operation.
|
|
988
|
+
:param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
|
|
989
|
+
not begin or end with a `/`. Defaults to `kmip`.
|
|
990
|
+
:param pulumi.Input[_builtins.str] role: Name of the role.
|
|
991
|
+
:param pulumi.Input[_builtins.str] scope: Name of the scope.
|
|
992
|
+
:param pulumi.Input[_builtins.int] tls_client_key_bits: Client certificate key bits, valid values depend on key type.
|
|
993
|
+
:param pulumi.Input[_builtins.str] tls_client_key_type: Client certificate key type, `rsa` or `ec`.
|
|
994
|
+
:param pulumi.Input[_builtins.int] tls_client_ttl: Client certificate TTL in seconds.
|
|
995
|
+
"""
|
|
996
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
997
|
+
|
|
998
|
+
__props__ = _SecretRoleState.__new__(_SecretRoleState)
|
|
999
|
+
|
|
1000
|
+
__props__.__dict__["namespace"] = namespace
|
|
1001
|
+
__props__.__dict__["operation_activate"] = operation_activate
|
|
1002
|
+
__props__.__dict__["operation_add_attribute"] = operation_add_attribute
|
|
1003
|
+
__props__.__dict__["operation_all"] = operation_all
|
|
1004
|
+
__props__.__dict__["operation_create"] = operation_create
|
|
1005
|
+
__props__.__dict__["operation_destroy"] = operation_destroy
|
|
1006
|
+
__props__.__dict__["operation_discover_versions"] = operation_discover_versions
|
|
1007
|
+
__props__.__dict__["operation_get"] = operation_get
|
|
1008
|
+
__props__.__dict__["operation_get_attribute_list"] = operation_get_attribute_list
|
|
1009
|
+
__props__.__dict__["operation_get_attributes"] = operation_get_attributes
|
|
1010
|
+
__props__.__dict__["operation_locate"] = operation_locate
|
|
1011
|
+
__props__.__dict__["operation_none"] = operation_none
|
|
1012
|
+
__props__.__dict__["operation_register"] = operation_register
|
|
1013
|
+
__props__.__dict__["operation_rekey"] = operation_rekey
|
|
1014
|
+
__props__.__dict__["operation_revoke"] = operation_revoke
|
|
1015
|
+
__props__.__dict__["path"] = path
|
|
1016
|
+
__props__.__dict__["role"] = role
|
|
1017
|
+
__props__.__dict__["scope"] = scope
|
|
1018
|
+
__props__.__dict__["tls_client_key_bits"] = tls_client_key_bits
|
|
1019
|
+
__props__.__dict__["tls_client_key_type"] = tls_client_key_type
|
|
1020
|
+
__props__.__dict__["tls_client_ttl"] = tls_client_ttl
|
|
1021
|
+
return SecretRole(resource_name, opts=opts, __props__=__props__)
|
|
1022
|
+
|
|
1023
|
+
@_builtins.property
|
|
1024
|
+
@pulumi.getter
|
|
1025
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1026
|
+
"""
|
|
1027
|
+
The namespace to provision the resource in.
|
|
1028
|
+
The value should not contain leading or trailing forward slashes.
|
|
1029
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
1030
|
+
*Available only for Vault Enterprise*.
|
|
1031
|
+
"""
|
|
1032
|
+
return pulumi.get(self, "namespace")
|
|
1033
|
+
|
|
1034
|
+
@_builtins.property
|
|
1035
|
+
@pulumi.getter(name="operationActivate")
|
|
1036
|
+
def operation_activate(self) -> pulumi.Output[_builtins.bool]:
|
|
1037
|
+
"""
|
|
1038
|
+
Grant permission to use the KMIP Activate operation.
|
|
1039
|
+
"""
|
|
1040
|
+
return pulumi.get(self, "operation_activate")
|
|
1041
|
+
|
|
1042
|
+
@_builtins.property
|
|
1043
|
+
@pulumi.getter(name="operationAddAttribute")
|
|
1044
|
+
def operation_add_attribute(self) -> pulumi.Output[_builtins.bool]:
|
|
1045
|
+
"""
|
|
1046
|
+
Grant permission to use the KMIP Add Attribute operation.
|
|
1047
|
+
"""
|
|
1048
|
+
return pulumi.get(self, "operation_add_attribute")
|
|
1049
|
+
|
|
1050
|
+
@_builtins.property
|
|
1051
|
+
@pulumi.getter(name="operationAll")
|
|
1052
|
+
def operation_all(self) -> pulumi.Output[_builtins.bool]:
|
|
1053
|
+
"""
|
|
1054
|
+
Grant all permissions to this role. May not be specified with any other `operation_*` params.
|
|
1055
|
+
"""
|
|
1056
|
+
return pulumi.get(self, "operation_all")
|
|
1057
|
+
|
|
1058
|
+
@_builtins.property
|
|
1059
|
+
@pulumi.getter(name="operationCreate")
|
|
1060
|
+
def operation_create(self) -> pulumi.Output[_builtins.bool]:
|
|
1061
|
+
"""
|
|
1062
|
+
Grant permission to use the KMIP Create operation.
|
|
1063
|
+
"""
|
|
1064
|
+
return pulumi.get(self, "operation_create")
|
|
1065
|
+
|
|
1066
|
+
@_builtins.property
|
|
1067
|
+
@pulumi.getter(name="operationDestroy")
|
|
1068
|
+
def operation_destroy(self) -> pulumi.Output[_builtins.bool]:
|
|
1069
|
+
"""
|
|
1070
|
+
Grant permission to use the KMIP Destroy operation.
|
|
1071
|
+
"""
|
|
1072
|
+
return pulumi.get(self, "operation_destroy")
|
|
1073
|
+
|
|
1074
|
+
@_builtins.property
|
|
1075
|
+
@pulumi.getter(name="operationDiscoverVersions")
|
|
1076
|
+
def operation_discover_versions(self) -> pulumi.Output[_builtins.bool]:
|
|
1077
|
+
"""
|
|
1078
|
+
Grant permission to use the KMIP Discover Version operation.
|
|
1079
|
+
"""
|
|
1080
|
+
return pulumi.get(self, "operation_discover_versions")
|
|
1081
|
+
|
|
1082
|
+
@_builtins.property
|
|
1083
|
+
@pulumi.getter(name="operationGet")
|
|
1084
|
+
def operation_get(self) -> pulumi.Output[_builtins.bool]:
|
|
1085
|
+
"""
|
|
1086
|
+
Grant permission to use the KMIP Get operation.
|
|
1087
|
+
"""
|
|
1088
|
+
return pulumi.get(self, "operation_get")
|
|
1089
|
+
|
|
1090
|
+
@_builtins.property
|
|
1091
|
+
@pulumi.getter(name="operationGetAttributeList")
|
|
1092
|
+
def operation_get_attribute_list(self) -> pulumi.Output[_builtins.bool]:
|
|
1093
|
+
"""
|
|
1094
|
+
Grant permission to use the KMIP Get Atrribute List operation.
|
|
1095
|
+
"""
|
|
1096
|
+
return pulumi.get(self, "operation_get_attribute_list")
|
|
1097
|
+
|
|
1098
|
+
@_builtins.property
|
|
1099
|
+
@pulumi.getter(name="operationGetAttributes")
|
|
1100
|
+
def operation_get_attributes(self) -> pulumi.Output[_builtins.bool]:
|
|
1101
|
+
"""
|
|
1102
|
+
Grant permission to use the KMIP Get Atrributes operation.
|
|
1103
|
+
"""
|
|
1104
|
+
return pulumi.get(self, "operation_get_attributes")
|
|
1105
|
+
|
|
1106
|
+
@_builtins.property
|
|
1107
|
+
@pulumi.getter(name="operationLocate")
|
|
1108
|
+
def operation_locate(self) -> pulumi.Output[_builtins.bool]:
|
|
1109
|
+
"""
|
|
1110
|
+
Grant permission to use the KMIP Get Locate operation.
|
|
1111
|
+
"""
|
|
1112
|
+
return pulumi.get(self, "operation_locate")
|
|
1113
|
+
|
|
1114
|
+
@_builtins.property
|
|
1115
|
+
@pulumi.getter(name="operationNone")
|
|
1116
|
+
def operation_none(self) -> pulumi.Output[_builtins.bool]:
|
|
1117
|
+
"""
|
|
1118
|
+
Remove all permissions from this role. May not be specified with any other `operation_*` params.
|
|
1119
|
+
"""
|
|
1120
|
+
return pulumi.get(self, "operation_none")
|
|
1121
|
+
|
|
1122
|
+
@_builtins.property
|
|
1123
|
+
@pulumi.getter(name="operationRegister")
|
|
1124
|
+
def operation_register(self) -> pulumi.Output[_builtins.bool]:
|
|
1125
|
+
"""
|
|
1126
|
+
Grant permission to use the KMIP Register operation.
|
|
1127
|
+
"""
|
|
1128
|
+
return pulumi.get(self, "operation_register")
|
|
1129
|
+
|
|
1130
|
+
@_builtins.property
|
|
1131
|
+
@pulumi.getter(name="operationRekey")
|
|
1132
|
+
def operation_rekey(self) -> pulumi.Output[_builtins.bool]:
|
|
1133
|
+
"""
|
|
1134
|
+
Grant permission to use the KMIP Rekey operation.
|
|
1135
|
+
"""
|
|
1136
|
+
return pulumi.get(self, "operation_rekey")
|
|
1137
|
+
|
|
1138
|
+
@_builtins.property
|
|
1139
|
+
@pulumi.getter(name="operationRevoke")
|
|
1140
|
+
def operation_revoke(self) -> pulumi.Output[_builtins.bool]:
|
|
1141
|
+
"""
|
|
1142
|
+
Grant permission to use the KMIP Revoke operation.
|
|
1143
|
+
"""
|
|
1144
|
+
return pulumi.get(self, "operation_revoke")
|
|
1145
|
+
|
|
1146
|
+
@_builtins.property
|
|
1147
|
+
@pulumi.getter
|
|
1148
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
|
1149
|
+
"""
|
|
1150
|
+
The unique path this backend should be mounted at. Must
|
|
1151
|
+
not begin or end with a `/`. Defaults to `kmip`.
|
|
1152
|
+
"""
|
|
1153
|
+
return pulumi.get(self, "path")
|
|
1154
|
+
|
|
1155
|
+
@_builtins.property
|
|
1156
|
+
@pulumi.getter
|
|
1157
|
+
def role(self) -> pulumi.Output[_builtins.str]:
|
|
1158
|
+
"""
|
|
1159
|
+
Name of the role.
|
|
1160
|
+
"""
|
|
1161
|
+
return pulumi.get(self, "role")
|
|
1162
|
+
|
|
1163
|
+
@_builtins.property
|
|
1164
|
+
@pulumi.getter
|
|
1165
|
+
def scope(self) -> pulumi.Output[_builtins.str]:
|
|
1166
|
+
"""
|
|
1167
|
+
Name of the scope.
|
|
1168
|
+
"""
|
|
1169
|
+
return pulumi.get(self, "scope")
|
|
1170
|
+
|
|
1171
|
+
@_builtins.property
|
|
1172
|
+
@pulumi.getter(name="tlsClientKeyBits")
|
|
1173
|
+
def tls_client_key_bits(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1174
|
+
"""
|
|
1175
|
+
Client certificate key bits, valid values depend on key type.
|
|
1176
|
+
"""
|
|
1177
|
+
return pulumi.get(self, "tls_client_key_bits")
|
|
1178
|
+
|
|
1179
|
+
@_builtins.property
|
|
1180
|
+
@pulumi.getter(name="tlsClientKeyType")
|
|
1181
|
+
def tls_client_key_type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
|
1182
|
+
"""
|
|
1183
|
+
Client certificate key type, `rsa` or `ec`.
|
|
1184
|
+
"""
|
|
1185
|
+
return pulumi.get(self, "tls_client_key_type")
|
|
1186
|
+
|
|
1187
|
+
@_builtins.property
|
|
1188
|
+
@pulumi.getter(name="tlsClientTtl")
|
|
1189
|
+
def tls_client_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
|
|
1190
|
+
"""
|
|
1191
|
+
Client certificate TTL in seconds.
|
|
1192
|
+
"""
|
|
1193
|
+
return pulumi.get(self, "tls_client_ttl")
|
|
1194
|
+
|