SecretBackendRole
Create a SecretBackendRole Resource
new SecretBackendRole(name: string, args: SecretBackendRoleArgs, opts?: CustomResourceOptions);def SecretBackendRole(resource_name, opts=None, backend=None, credential_type=None, default_sts_ttl=None, max_sts_ttl=None, name=None, policy_arns=None, policy_document=None, role_arns=None, __props__=None);func NewSecretBackendRole(ctx *Context, name string, args SecretBackendRoleArgs, opts ...ResourceOption) (*SecretBackendRole, error)public SecretBackendRole(string name, SecretBackendRoleArgs args, CustomResourceOptions? opts = null)- name string
- The unique name of the resource.
- args SecretBackendRoleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- opts ResourceOptions
- A bag of options that control this resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecretBackendRoleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecretBackendRoleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
SecretBackendRole Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Programming Model docs.
Inputs
The SecretBackendRole resource accepts the following input properties:
- Backend string
The path the AWS secret backend is mounted at, with no leading or trailing
/s.- Credential
Type string Specifies the type of credential to be used when retrieving credentials from the role. Must be one of
iam_user,assumed_role, orfederation_token.- Default
Sts intTtl The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when
credential_typeis one ofassumed_roleorfederation_token.- Max
Sts intTtl The max allowed TTL in seconds for STS credentials (credentials TTL are capped to
max_sts_ttl). Valid only whencredential_typeis one ofassumed_roleorfederation_token.- Name string
The name to identify this role within the backend. Must be unique within the backend.
- Policy
Arns List<string> Specifies a list of AWS managed policy ARNs. The behavior depends on the credential type. With
iam_user, the policies will be attached to IAM users when they are requested. Withassumed_roleandfederation_token, the policy ARNs will act as a filter on what the credentials can do, similar topolicy_document. Whencredential_typeisiam_userorfederation_token, at least one ofpolicy_documentorpolicy_arnsmust be specified.- Policy
Document string The IAM policy document for the role. The behavior depends on the credential type. With
iam_user, the policy document will be attached to the IAM user generated and augment the permissions the IAM user has. Withassumed_roleandfederation_token, the policy document will act as a filter on what the credentials can do, similar topolicy_arns.- Role
Arns List<string> Specifies the ARNs of the AWS roles this Vault role is allowed to assume. Required when
credential_typeisassumed_roleand prohibited otherwise.
- Backend string
The path the AWS secret backend is mounted at, with no leading or trailing
/s.- Credential
Type string Specifies the type of credential to be used when retrieving credentials from the role. Must be one of
iam_user,assumed_role, orfederation_token.- Default
Sts intTtl The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when
credential_typeis one ofassumed_roleorfederation_token.- Max
Sts intTtl The max allowed TTL in seconds for STS credentials (credentials TTL are capped to
max_sts_ttl). Valid only whencredential_typeis one ofassumed_roleorfederation_token.- Name string
The name to identify this role within the backend. Must be unique within the backend.
- Policy
Arns []string Specifies a list of AWS managed policy ARNs. The behavior depends on the credential type. With
iam_user, the policies will be attached to IAM users when they are requested. Withassumed_roleandfederation_token, the policy ARNs will act as a filter on what the credentials can do, similar topolicy_document. Whencredential_typeisiam_userorfederation_token, at least one ofpolicy_documentorpolicy_arnsmust be specified.- Policy
Document string The IAM policy document for the role. The behavior depends on the credential type. With
iam_user, the policy document will be attached to the IAM user generated and augment the permissions the IAM user has. Withassumed_roleandfederation_token, the policy document will act as a filter on what the credentials can do, similar topolicy_arns.- Role
Arns []string Specifies the ARNs of the AWS roles this Vault role is allowed to assume. Required when
credential_typeisassumed_roleand prohibited otherwise.
- backend string
The path the AWS secret backend is mounted at, with no leading or trailing
/s.- credential
Type string Specifies the type of credential to be used when retrieving credentials from the role. Must be one of
iam_user,assumed_role, orfederation_token.- default
Sts numberTtl The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when
credential_typeis one ofassumed_roleorfederation_token.- max
Sts numberTtl The max allowed TTL in seconds for STS credentials (credentials TTL are capped to
max_sts_ttl). Valid only whencredential_typeis one ofassumed_roleorfederation_token.- name string
The name to identify this role within the backend. Must be unique within the backend.
- policy
Arns string[] Specifies a list of AWS managed policy ARNs. The behavior depends on the credential type. With
iam_user, the policies will be attached to IAM users when they are requested. Withassumed_roleandfederation_token, the policy ARNs will act as a filter on what the credentials can do, similar topolicy_document. Whencredential_typeisiam_userorfederation_token, at least one ofpolicy_documentorpolicy_arnsmust be specified.- policy
Document string The IAM policy document for the role. The behavior depends on the credential type. With
iam_user, the policy document will be attached to the IAM user generated and augment the permissions the IAM user has. Withassumed_roleandfederation_token, the policy document will act as a filter on what the credentials can do, similar topolicy_arns.- role
Arns string[] Specifies the ARNs of the AWS roles this Vault role is allowed to assume. Required when
credential_typeisassumed_roleand prohibited otherwise.
- backend str
The path the AWS secret backend is mounted at, with no leading or trailing
/s.- credential_
type str Specifies the type of credential to be used when retrieving credentials from the role. Must be one of
iam_user,assumed_role, orfederation_token.- default_
sts_ floatttl The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when
credential_typeis one ofassumed_roleorfederation_token.- max_
sts_ floatttl The max allowed TTL in seconds for STS credentials (credentials TTL are capped to
max_sts_ttl). Valid only whencredential_typeis one ofassumed_roleorfederation_token.- name str
The name to identify this role within the backend. Must be unique within the backend.
- policy_
arns List[str] Specifies a list of AWS managed policy ARNs. The behavior depends on the credential type. With
iam_user, the policies will be attached to IAM users when they are requested. Withassumed_roleandfederation_token, the policy ARNs will act as a filter on what the credentials can do, similar topolicy_document. Whencredential_typeisiam_userorfederation_token, at least one ofpolicy_documentorpolicy_arnsmust be specified.- policy_
document str The IAM policy document for the role. The behavior depends on the credential type. With
iam_user, the policy document will be attached to the IAM user generated and augment the permissions the IAM user has. Withassumed_roleandfederation_token, the policy document will act as a filter on what the credentials can do, similar topolicy_arns.- role_
arns List[str] Specifies the ARNs of the AWS roles this Vault role is allowed to assume. Required when
credential_typeisassumed_roleand prohibited otherwise.
Outputs
All input properties are implicitly available as output properties. Additionally, the SecretBackendRole resource produces the following output properties:
Look up an Existing SecretBackendRole Resource
Get an existing SecretBackendRole resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecretBackendRoleState, opts?: CustomResourceOptions): SecretBackendRolestatic get(resource_name, id, opts=None, backend=None, credential_type=None, default_sts_ttl=None, max_sts_ttl=None, name=None, policy_arns=None, policy_document=None, role_arns=None, __props__=None);func GetSecretBackendRole(ctx *Context, name string, id IDInput, state *SecretBackendRoleState, opts ...ResourceOption) (*SecretBackendRole, error)public static SecretBackendRole Get(string name, Input<string> id, SecretBackendRoleState? state, CustomResourceOptions? opts = null)- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
The following state arguments are supported:
- Backend string
The path the AWS secret backend is mounted at, with no leading or trailing
/s.- Credential
Type string Specifies the type of credential to be used when retrieving credentials from the role. Must be one of
iam_user,assumed_role, orfederation_token.- Default
Sts intTtl The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when
credential_typeis one ofassumed_roleorfederation_token.- Max
Sts intTtl The max allowed TTL in seconds for STS credentials (credentials TTL are capped to
max_sts_ttl). Valid only whencredential_typeis one ofassumed_roleorfederation_token.- Name string
The name to identify this role within the backend. Must be unique within the backend.
- Policy
Arns List<string> Specifies a list of AWS managed policy ARNs. The behavior depends on the credential type. With
iam_user, the policies will be attached to IAM users when they are requested. Withassumed_roleandfederation_token, the policy ARNs will act as a filter on what the credentials can do, similar topolicy_document. Whencredential_typeisiam_userorfederation_token, at least one ofpolicy_documentorpolicy_arnsmust be specified.- Policy
Document string The IAM policy document for the role. The behavior depends on the credential type. With
iam_user, the policy document will be attached to the IAM user generated and augment the permissions the IAM user has. Withassumed_roleandfederation_token, the policy document will act as a filter on what the credentials can do, similar topolicy_arns.- Role
Arns List<string> Specifies the ARNs of the AWS roles this Vault role is allowed to assume. Required when
credential_typeisassumed_roleand prohibited otherwise.
- Backend string
The path the AWS secret backend is mounted at, with no leading or trailing
/s.- Credential
Type string Specifies the type of credential to be used when retrieving credentials from the role. Must be one of
iam_user,assumed_role, orfederation_token.- Default
Sts intTtl The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when
credential_typeis one ofassumed_roleorfederation_token.- Max
Sts intTtl The max allowed TTL in seconds for STS credentials (credentials TTL are capped to
max_sts_ttl). Valid only whencredential_typeis one ofassumed_roleorfederation_token.- Name string
The name to identify this role within the backend. Must be unique within the backend.
- Policy
Arns []string Specifies a list of AWS managed policy ARNs. The behavior depends on the credential type. With
iam_user, the policies will be attached to IAM users when they are requested. Withassumed_roleandfederation_token, the policy ARNs will act as a filter on what the credentials can do, similar topolicy_document. Whencredential_typeisiam_userorfederation_token, at least one ofpolicy_documentorpolicy_arnsmust be specified.- Policy
Document string The IAM policy document for the role. The behavior depends on the credential type. With
iam_user, the policy document will be attached to the IAM user generated and augment the permissions the IAM user has. Withassumed_roleandfederation_token, the policy document will act as a filter on what the credentials can do, similar topolicy_arns.- Role
Arns []string Specifies the ARNs of the AWS roles this Vault role is allowed to assume. Required when
credential_typeisassumed_roleand prohibited otherwise.
- backend string
The path the AWS secret backend is mounted at, with no leading or trailing
/s.- credential
Type string Specifies the type of credential to be used when retrieving credentials from the role. Must be one of
iam_user,assumed_role, orfederation_token.- default
Sts numberTtl The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when
credential_typeis one ofassumed_roleorfederation_token.- max
Sts numberTtl The max allowed TTL in seconds for STS credentials (credentials TTL are capped to
max_sts_ttl). Valid only whencredential_typeis one ofassumed_roleorfederation_token.- name string
The name to identify this role within the backend. Must be unique within the backend.
- policy
Arns string[] Specifies a list of AWS managed policy ARNs. The behavior depends on the credential type. With
iam_user, the policies will be attached to IAM users when they are requested. Withassumed_roleandfederation_token, the policy ARNs will act as a filter on what the credentials can do, similar topolicy_document. Whencredential_typeisiam_userorfederation_token, at least one ofpolicy_documentorpolicy_arnsmust be specified.- policy
Document string The IAM policy document for the role. The behavior depends on the credential type. With
iam_user, the policy document will be attached to the IAM user generated and augment the permissions the IAM user has. Withassumed_roleandfederation_token, the policy document will act as a filter on what the credentials can do, similar topolicy_arns.- role
Arns string[] Specifies the ARNs of the AWS roles this Vault role is allowed to assume. Required when
credential_typeisassumed_roleand prohibited otherwise.
- backend str
The path the AWS secret backend is mounted at, with no leading or trailing
/s.- credential_
type str Specifies the type of credential to be used when retrieving credentials from the role. Must be one of
iam_user,assumed_role, orfederation_token.- default_
sts_ floatttl The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when
credential_typeis one ofassumed_roleorfederation_token.- max_
sts_ floatttl The max allowed TTL in seconds for STS credentials (credentials TTL are capped to
max_sts_ttl). Valid only whencredential_typeis one ofassumed_roleorfederation_token.- name str
The name to identify this role within the backend. Must be unique within the backend.
- policy_
arns List[str] Specifies a list of AWS managed policy ARNs. The behavior depends on the credential type. With
iam_user, the policies will be attached to IAM users when they are requested. Withassumed_roleandfederation_token, the policy ARNs will act as a filter on what the credentials can do, similar topolicy_document. Whencredential_typeisiam_userorfederation_token, at least one ofpolicy_documentorpolicy_arnsmust be specified.- policy_
document str The IAM policy document for the role. The behavior depends on the credential type. With
iam_user, the policy document will be attached to the IAM user generated and augment the permissions the IAM user has. Withassumed_roleandfederation_token, the policy document will act as a filter on what the credentials can do, similar topolicy_arns.- role_
arns List[str] Specifies the ARNs of the AWS roles this Vault role is allowed to assume. Required when
credential_typeisassumed_roleand prohibited otherwise.
Package Details
- Repository
- https://github.com/pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
vaultTerraform Provider.