vault.kmip.SecretRole
Explore with Pulumi AI
Manages KMIP Secret roles in a Vault server. This feature requires Vault Enterprise. See the Vault documentation for more information.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const _default = new vault.kmip.SecretBackend("default", {
path: "kmip",
description: "Vault KMIP backend",
});
const dev = new vault.kmip.SecretScope("dev", {
path: _default.path,
scope: "dev",
force: true,
});
const admin = new vault.kmip.SecretRole("admin", {
path: dev.path,
scope: dev.scope,
role: "admin",
tlsClientKeyType: "ec",
tlsClientKeyBits: 256,
operationActivate: true,
operationGet: true,
operationGetAttributes: true,
operationCreate: true,
operationDestroy: true,
});
import pulumi
import pulumi_vault as vault
default = vault.kmip.SecretBackend("default",
path="kmip",
description="Vault KMIP backend")
dev = vault.kmip.SecretScope("dev",
path=default.path,
scope="dev",
force=True)
admin = vault.kmip.SecretRole("admin",
path=dev.path,
scope=dev.scope,
role="admin",
tls_client_key_type="ec",
tls_client_key_bits=256,
operation_activate=True,
operation_get=True,
operation_get_attributes=True,
operation_create=True,
operation_destroy=True)
package main
import (
"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kmip"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := kmip.NewSecretBackend(ctx, "default", &kmip.SecretBackendArgs{
Path: pulumi.String("kmip"),
Description: pulumi.String("Vault KMIP backend"),
})
if err != nil {
return err
}
dev, err := kmip.NewSecretScope(ctx, "dev", &kmip.SecretScopeArgs{
Path: _default.Path,
Scope: pulumi.String("dev"),
Force: pulumi.Bool(true),
})
if err != nil {
return err
}
_, err = kmip.NewSecretRole(ctx, "admin", &kmip.SecretRoleArgs{
Path: dev.Path,
Scope: dev.Scope,
Role: pulumi.String("admin"),
TlsClientKeyType: pulumi.String("ec"),
TlsClientKeyBits: pulumi.Int(256),
OperationActivate: pulumi.Bool(true),
OperationGet: pulumi.Bool(true),
OperationGetAttributes: pulumi.Bool(true),
OperationCreate: pulumi.Bool(true),
OperationDestroy: pulumi.Bool(true),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var @default = new Vault.Kmip.SecretBackend("default", new()
{
Path = "kmip",
Description = "Vault KMIP backend",
});
var dev = new Vault.Kmip.SecretScope("dev", new()
{
Path = @default.Path,
Scope = "dev",
Force = true,
});
var admin = new Vault.Kmip.SecretRole("admin", new()
{
Path = dev.Path,
Scope = dev.Scope,
Role = "admin",
TlsClientKeyType = "ec",
TlsClientKeyBits = 256,
OperationActivate = true,
OperationGet = true,
OperationGetAttributes = true,
OperationCreate = true,
OperationDestroy = true,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.kmip.SecretBackend;
import com.pulumi.vault.kmip.SecretBackendArgs;
import com.pulumi.vault.kmip.SecretScope;
import com.pulumi.vault.kmip.SecretScopeArgs;
import com.pulumi.vault.kmip.SecretRole;
import com.pulumi.vault.kmip.SecretRoleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var default_ = new SecretBackend("default", SecretBackendArgs.builder()
.path("kmip")
.description("Vault KMIP backend")
.build());
var dev = new SecretScope("dev", SecretScopeArgs.builder()
.path(default_.path())
.scope("dev")
.force(true)
.build());
var admin = new SecretRole("admin", SecretRoleArgs.builder()
.path(dev.path())
.scope(dev.scope())
.role("admin")
.tlsClientKeyType("ec")
.tlsClientKeyBits(256)
.operationActivate(true)
.operationGet(true)
.operationGetAttributes(true)
.operationCreate(true)
.operationDestroy(true)
.build());
}
}
resources:
default:
type: vault:kmip:SecretBackend
properties:
path: kmip
description: Vault KMIP backend
dev:
type: vault:kmip:SecretScope
properties:
path: ${default.path}
scope: dev
force: true
admin:
type: vault:kmip:SecretRole
properties:
path: ${dev.path}
scope: ${dev.scope}
role: admin
tlsClientKeyType: ec
tlsClientKeyBits: 256
operationActivate: true
operationGet: true
operationGetAttributes: true
operationCreate: true
operationDestroy: true
Create SecretRole Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecretRole(name: string, args: SecretRoleArgs, opts?: CustomResourceOptions);
@overload
def SecretRole(resource_name: str,
args: SecretRoleArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SecretRole(resource_name: str,
opts: Optional[ResourceOptions] = None,
path: Optional[str] = None,
scope: Optional[str] = None,
role: Optional[str] = None,
operation_destroy: Optional[bool] = None,
operation_register: Optional[bool] = None,
namespace: Optional[str] = None,
operation_discover_versions: Optional[bool] = None,
operation_get: Optional[bool] = None,
operation_get_attribute_list: Optional[bool] = None,
operation_get_attributes: Optional[bool] = None,
operation_locate: Optional[bool] = None,
operation_none: Optional[bool] = None,
operation_create: Optional[bool] = None,
operation_rekey: Optional[bool] = None,
operation_revoke: Optional[bool] = None,
operation_all: Optional[bool] = None,
operation_add_attribute: Optional[bool] = None,
operation_activate: Optional[bool] = None,
tls_client_key_bits: Optional[int] = None,
tls_client_key_type: Optional[str] = None,
tls_client_ttl: Optional[int] = None)
func NewSecretRole(ctx *Context, name string, args SecretRoleArgs, opts ...ResourceOption) (*SecretRole, error)
public SecretRole(string name, SecretRoleArgs args, CustomResourceOptions? opts = null)
public SecretRole(String name, SecretRoleArgs args)
public SecretRole(String name, SecretRoleArgs args, CustomResourceOptions options)
type: vault:kmip:SecretRole
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecretRoleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecretRoleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecretRoleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecretRoleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecretRoleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var vaultSecretRoleResource = new Vault.Kmip.SecretRole("vaultSecretRoleResource", new()
{
Path = "string",
Scope = "string",
Role = "string",
OperationDestroy = false,
OperationRegister = false,
Namespace = "string",
OperationDiscoverVersions = false,
OperationGet = false,
OperationGetAttributeList = false,
OperationGetAttributes = false,
OperationLocate = false,
OperationNone = false,
OperationCreate = false,
OperationRekey = false,
OperationRevoke = false,
OperationAll = false,
OperationAddAttribute = false,
OperationActivate = false,
TlsClientKeyBits = 0,
TlsClientKeyType = "string",
TlsClientTtl = 0,
});
example, err := kmip.NewSecretRole(ctx, "vaultSecretRoleResource", &kmip.SecretRoleArgs{
Path: pulumi.String("string"),
Scope: pulumi.String("string"),
Role: pulumi.String("string"),
OperationDestroy: pulumi.Bool(false),
OperationRegister: pulumi.Bool(false),
Namespace: pulumi.String("string"),
OperationDiscoverVersions: pulumi.Bool(false),
OperationGet: pulumi.Bool(false),
OperationGetAttributeList: pulumi.Bool(false),
OperationGetAttributes: pulumi.Bool(false),
OperationLocate: pulumi.Bool(false),
OperationNone: pulumi.Bool(false),
OperationCreate: pulumi.Bool(false),
OperationRekey: pulumi.Bool(false),
OperationRevoke: pulumi.Bool(false),
OperationAll: pulumi.Bool(false),
OperationAddAttribute: pulumi.Bool(false),
OperationActivate: pulumi.Bool(false),
TlsClientKeyBits: pulumi.Int(0),
TlsClientKeyType: pulumi.String("string"),
TlsClientTtl: pulumi.Int(0),
})
var vaultSecretRoleResource = new SecretRole("vaultSecretRoleResource", SecretRoleArgs.builder()
.path("string")
.scope("string")
.role("string")
.operationDestroy(false)
.operationRegister(false)
.namespace("string")
.operationDiscoverVersions(false)
.operationGet(false)
.operationGetAttributeList(false)
.operationGetAttributes(false)
.operationLocate(false)
.operationNone(false)
.operationCreate(false)
.operationRekey(false)
.operationRevoke(false)
.operationAll(false)
.operationAddAttribute(false)
.operationActivate(false)
.tlsClientKeyBits(0)
.tlsClientKeyType("string")
.tlsClientTtl(0)
.build());
vault_secret_role_resource = vault.kmip.SecretRole("vaultSecretRoleResource",
path="string",
scope="string",
role="string",
operation_destroy=False,
operation_register=False,
namespace="string",
operation_discover_versions=False,
operation_get=False,
operation_get_attribute_list=False,
operation_get_attributes=False,
operation_locate=False,
operation_none=False,
operation_create=False,
operation_rekey=False,
operation_revoke=False,
operation_all=False,
operation_add_attribute=False,
operation_activate=False,
tls_client_key_bits=0,
tls_client_key_type="string",
tls_client_ttl=0)
const vaultSecretRoleResource = new vault.kmip.SecretRole("vaultSecretRoleResource", {
path: "string",
scope: "string",
role: "string",
operationDestroy: false,
operationRegister: false,
namespace: "string",
operationDiscoverVersions: false,
operationGet: false,
operationGetAttributeList: false,
operationGetAttributes: false,
operationLocate: false,
operationNone: false,
operationCreate: false,
operationRekey: false,
operationRevoke: false,
operationAll: false,
operationAddAttribute: false,
operationActivate: false,
tlsClientKeyBits: 0,
tlsClientKeyType: "string",
tlsClientTtl: 0,
});
type: vault:kmip:SecretRole
properties:
namespace: string
operationActivate: false
operationAddAttribute: false
operationAll: false
operationCreate: false
operationDestroy: false
operationDiscoverVersions: false
operationGet: false
operationGetAttributeList: false
operationGetAttributes: false
operationLocate: false
operationNone: false
operationRegister: false
operationRekey: false
operationRevoke: false
path: string
role: string
scope: string
tlsClientKeyBits: 0
tlsClientKeyType: string
tlsClientTtl: 0
SecretRole Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The SecretRole resource accepts the following input properties:
- Path string
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - Role string
- Name of the role.
- Scope string
- Name of the scope.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - Operation
Activate bool - Grant permission to use the KMIP Activate operation.
- Operation
Add boolAttribute - Grant permission to use the KMIP Add Attribute operation.
- Operation
All bool - Grant all permissions to this role. May not be specified with any other
operation_*
params. - Operation
Create bool - Grant permission to use the KMIP Create operation.
- Operation
Destroy bool - Grant permission to use the KMIP Destroy operation.
- Operation
Discover boolVersions - Grant permission to use the KMIP Discover Version operation.
- Operation
Get bool - Grant permission to use the KMIP Get operation.
- Operation
Get boolAttribute List - Grant permission to use the KMIP Get Atrribute List operation.
- Operation
Get boolAttributes - Grant permission to use the KMIP Get Atrributes operation.
- Operation
Locate bool - Grant permission to use the KMIP Get Locate operation.
- Operation
None bool - Remove all permissions from this role. May not be specified with any other
operation_*
params. - Operation
Register bool - Grant permission to use the KMIP Register operation.
- Operation
Rekey bool - Grant permission to use the KMIP Rekey operation.
- Operation
Revoke bool - Grant permission to use the KMIP Revoke operation.
- Tls
Client intKey Bits - Client certificate key bits, valid values depend on key type.
- Tls
Client stringKey Type - Client certificate key type,
rsa
orec
. - Tls
Client intTtl - Client certificate TTL in seconds.
- Path string
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - Role string
- Name of the role.
- Scope string
- Name of the scope.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - Operation
Activate bool - Grant permission to use the KMIP Activate operation.
- Operation
Add boolAttribute - Grant permission to use the KMIP Add Attribute operation.
- Operation
All bool - Grant all permissions to this role. May not be specified with any other
operation_*
params. - Operation
Create bool - Grant permission to use the KMIP Create operation.
- Operation
Destroy bool - Grant permission to use the KMIP Destroy operation.
- Operation
Discover boolVersions - Grant permission to use the KMIP Discover Version operation.
- Operation
Get bool - Grant permission to use the KMIP Get operation.
- Operation
Get boolAttribute List - Grant permission to use the KMIP Get Atrribute List operation.
- Operation
Get boolAttributes - Grant permission to use the KMIP Get Atrributes operation.
- Operation
Locate bool - Grant permission to use the KMIP Get Locate operation.
- Operation
None bool - Remove all permissions from this role. May not be specified with any other
operation_*
params. - Operation
Register bool - Grant permission to use the KMIP Register operation.
- Operation
Rekey bool - Grant permission to use the KMIP Rekey operation.
- Operation
Revoke bool - Grant permission to use the KMIP Revoke operation.
- Tls
Client intKey Bits - Client certificate key bits, valid values depend on key type.
- Tls
Client stringKey Type - Client certificate key type,
rsa
orec
. - Tls
Client intTtl - Client certificate TTL in seconds.
- path String
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - role String
- Name of the role.
- scope String
- Name of the scope.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - operation
Activate Boolean - Grant permission to use the KMIP Activate operation.
- operation
Add BooleanAttribute - Grant permission to use the KMIP Add Attribute operation.
- operation
All Boolean - Grant all permissions to this role. May not be specified with any other
operation_*
params. - operation
Create Boolean - Grant permission to use the KMIP Create operation.
- operation
Destroy Boolean - Grant permission to use the KMIP Destroy operation.
- operation
Discover BooleanVersions - Grant permission to use the KMIP Discover Version operation.
- operation
Get Boolean - Grant permission to use the KMIP Get operation.
- operation
Get BooleanAttribute List - Grant permission to use the KMIP Get Atrribute List operation.
- operation
Get BooleanAttributes - Grant permission to use the KMIP Get Atrributes operation.
- operation
Locate Boolean - Grant permission to use the KMIP Get Locate operation.
- operation
None Boolean - Remove all permissions from this role. May not be specified with any other
operation_*
params. - operation
Register Boolean - Grant permission to use the KMIP Register operation.
- operation
Rekey Boolean - Grant permission to use the KMIP Rekey operation.
- operation
Revoke Boolean - Grant permission to use the KMIP Revoke operation.
- tls
Client IntegerKey Bits - Client certificate key bits, valid values depend on key type.
- tls
Client StringKey Type - Client certificate key type,
rsa
orec
. - tls
Client IntegerTtl - Client certificate TTL in seconds.
- path string
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - role string
- Name of the role.
- scope string
- Name of the scope.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - operation
Activate boolean - Grant permission to use the KMIP Activate operation.
- operation
Add booleanAttribute - Grant permission to use the KMIP Add Attribute operation.
- operation
All boolean - Grant all permissions to this role. May not be specified with any other
operation_*
params. - operation
Create boolean - Grant permission to use the KMIP Create operation.
- operation
Destroy boolean - Grant permission to use the KMIP Destroy operation.
- operation
Discover booleanVersions - Grant permission to use the KMIP Discover Version operation.
- operation
Get boolean - Grant permission to use the KMIP Get operation.
- operation
Get booleanAttribute List - Grant permission to use the KMIP Get Atrribute List operation.
- operation
Get booleanAttributes - Grant permission to use the KMIP Get Atrributes operation.
- operation
Locate boolean - Grant permission to use the KMIP Get Locate operation.
- operation
None boolean - Remove all permissions from this role. May not be specified with any other
operation_*
params. - operation
Register boolean - Grant permission to use the KMIP Register operation.
- operation
Rekey boolean - Grant permission to use the KMIP Rekey operation.
- operation
Revoke boolean - Grant permission to use the KMIP Revoke operation.
- tls
Client numberKey Bits - Client certificate key bits, valid values depend on key type.
- tls
Client stringKey Type - Client certificate key type,
rsa
orec
. - tls
Client numberTtl - Client certificate TTL in seconds.
- path str
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - role str
- Name of the role.
- scope str
- Name of the scope.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - operation_
activate bool - Grant permission to use the KMIP Activate operation.
- operation_
add_ boolattribute - Grant permission to use the KMIP Add Attribute operation.
- operation_
all bool - Grant all permissions to this role. May not be specified with any other
operation_*
params. - operation_
create bool - Grant permission to use the KMIP Create operation.
- operation_
destroy bool - Grant permission to use the KMIP Destroy operation.
- operation_
discover_ boolversions - Grant permission to use the KMIP Discover Version operation.
- operation_
get bool - Grant permission to use the KMIP Get operation.
- operation_
get_ boolattribute_ list - Grant permission to use the KMIP Get Atrribute List operation.
- operation_
get_ boolattributes - Grant permission to use the KMIP Get Atrributes operation.
- operation_
locate bool - Grant permission to use the KMIP Get Locate operation.
- operation_
none bool - Remove all permissions from this role. May not be specified with any other
operation_*
params. - operation_
register bool - Grant permission to use the KMIP Register operation.
- operation_
rekey bool - Grant permission to use the KMIP Rekey operation.
- operation_
revoke bool - Grant permission to use the KMIP Revoke operation.
- tls_
client_ intkey_ bits - Client certificate key bits, valid values depend on key type.
- tls_
client_ strkey_ type - Client certificate key type,
rsa
orec
. - tls_
client_ intttl - Client certificate TTL in seconds.
- path String
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - role String
- Name of the role.
- scope String
- Name of the scope.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - operation
Activate Boolean - Grant permission to use the KMIP Activate operation.
- operation
Add BooleanAttribute - Grant permission to use the KMIP Add Attribute operation.
- operation
All Boolean - Grant all permissions to this role. May not be specified with any other
operation_*
params. - operation
Create Boolean - Grant permission to use the KMIP Create operation.
- operation
Destroy Boolean - Grant permission to use the KMIP Destroy operation.
- operation
Discover BooleanVersions - Grant permission to use the KMIP Discover Version operation.
- operation
Get Boolean - Grant permission to use the KMIP Get operation.
- operation
Get BooleanAttribute List - Grant permission to use the KMIP Get Atrribute List operation.
- operation
Get BooleanAttributes - Grant permission to use the KMIP Get Atrributes operation.
- operation
Locate Boolean - Grant permission to use the KMIP Get Locate operation.
- operation
None Boolean - Remove all permissions from this role. May not be specified with any other
operation_*
params. - operation
Register Boolean - Grant permission to use the KMIP Register operation.
- operation
Rekey Boolean - Grant permission to use the KMIP Rekey operation.
- operation
Revoke Boolean - Grant permission to use the KMIP Revoke operation.
- tls
Client NumberKey Bits - Client certificate key bits, valid values depend on key type.
- tls
Client StringKey Type - Client certificate key type,
rsa
orec
. - tls
Client NumberTtl - Client certificate TTL in seconds.
Outputs
All input properties are implicitly available as output properties. Additionally, the SecretRole resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing SecretRole Resource
Get an existing SecretRole resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecretRoleState, opts?: CustomResourceOptions): SecretRole
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
namespace: Optional[str] = None,
operation_activate: Optional[bool] = None,
operation_add_attribute: Optional[bool] = None,
operation_all: Optional[bool] = None,
operation_create: Optional[bool] = None,
operation_destroy: Optional[bool] = None,
operation_discover_versions: Optional[bool] = None,
operation_get: Optional[bool] = None,
operation_get_attribute_list: Optional[bool] = None,
operation_get_attributes: Optional[bool] = None,
operation_locate: Optional[bool] = None,
operation_none: Optional[bool] = None,
operation_register: Optional[bool] = None,
operation_rekey: Optional[bool] = None,
operation_revoke: Optional[bool] = None,
path: Optional[str] = None,
role: Optional[str] = None,
scope: Optional[str] = None,
tls_client_key_bits: Optional[int] = None,
tls_client_key_type: Optional[str] = None,
tls_client_ttl: Optional[int] = None) -> SecretRole
func GetSecretRole(ctx *Context, name string, id IDInput, state *SecretRoleState, opts ...ResourceOption) (*SecretRole, error)
public static SecretRole Get(string name, Input<string> id, SecretRoleState? state, CustomResourceOptions? opts = null)
public static SecretRole get(String name, Output<String> id, SecretRoleState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - Operation
Activate bool - Grant permission to use the KMIP Activate operation.
- Operation
Add boolAttribute - Grant permission to use the KMIP Add Attribute operation.
- Operation
All bool - Grant all permissions to this role. May not be specified with any other
operation_*
params. - Operation
Create bool - Grant permission to use the KMIP Create operation.
- Operation
Destroy bool - Grant permission to use the KMIP Destroy operation.
- Operation
Discover boolVersions - Grant permission to use the KMIP Discover Version operation.
- Operation
Get bool - Grant permission to use the KMIP Get operation.
- Operation
Get boolAttribute List - Grant permission to use the KMIP Get Atrribute List operation.
- Operation
Get boolAttributes - Grant permission to use the KMIP Get Atrributes operation.
- Operation
Locate bool - Grant permission to use the KMIP Get Locate operation.
- Operation
None bool - Remove all permissions from this role. May not be specified with any other
operation_*
params. - Operation
Register bool - Grant permission to use the KMIP Register operation.
- Operation
Rekey bool - Grant permission to use the KMIP Rekey operation.
- Operation
Revoke bool - Grant permission to use the KMIP Revoke operation.
- Path string
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - Role string
- Name of the role.
- Scope string
- Name of the scope.
- Tls
Client intKey Bits - Client certificate key bits, valid values depend on key type.
- Tls
Client stringKey Type - Client certificate key type,
rsa
orec
. - Tls
Client intTtl - Client certificate TTL in seconds.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - Operation
Activate bool - Grant permission to use the KMIP Activate operation.
- Operation
Add boolAttribute - Grant permission to use the KMIP Add Attribute operation.
- Operation
All bool - Grant all permissions to this role. May not be specified with any other
operation_*
params. - Operation
Create bool - Grant permission to use the KMIP Create operation.
- Operation
Destroy bool - Grant permission to use the KMIP Destroy operation.
- Operation
Discover boolVersions - Grant permission to use the KMIP Discover Version operation.
- Operation
Get bool - Grant permission to use the KMIP Get operation.
- Operation
Get boolAttribute List - Grant permission to use the KMIP Get Atrribute List operation.
- Operation
Get boolAttributes - Grant permission to use the KMIP Get Atrributes operation.
- Operation
Locate bool - Grant permission to use the KMIP Get Locate operation.
- Operation
None bool - Remove all permissions from this role. May not be specified with any other
operation_*
params. - Operation
Register bool - Grant permission to use the KMIP Register operation.
- Operation
Rekey bool - Grant permission to use the KMIP Rekey operation.
- Operation
Revoke bool - Grant permission to use the KMIP Revoke operation.
- Path string
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - Role string
- Name of the role.
- Scope string
- Name of the scope.
- Tls
Client intKey Bits - Client certificate key bits, valid values depend on key type.
- Tls
Client stringKey Type - Client certificate key type,
rsa
orec
. - Tls
Client intTtl - Client certificate TTL in seconds.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - operation
Activate Boolean - Grant permission to use the KMIP Activate operation.
- operation
Add BooleanAttribute - Grant permission to use the KMIP Add Attribute operation.
- operation
All Boolean - Grant all permissions to this role. May not be specified with any other
operation_*
params. - operation
Create Boolean - Grant permission to use the KMIP Create operation.
- operation
Destroy Boolean - Grant permission to use the KMIP Destroy operation.
- operation
Discover BooleanVersions - Grant permission to use the KMIP Discover Version operation.
- operation
Get Boolean - Grant permission to use the KMIP Get operation.
- operation
Get BooleanAttribute List - Grant permission to use the KMIP Get Atrribute List operation.
- operation
Get BooleanAttributes - Grant permission to use the KMIP Get Atrributes operation.
- operation
Locate Boolean - Grant permission to use the KMIP Get Locate operation.
- operation
None Boolean - Remove all permissions from this role. May not be specified with any other
operation_*
params. - operation
Register Boolean - Grant permission to use the KMIP Register operation.
- operation
Rekey Boolean - Grant permission to use the KMIP Rekey operation.
- operation
Revoke Boolean - Grant permission to use the KMIP Revoke operation.
- path String
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - role String
- Name of the role.
- scope String
- Name of the scope.
- tls
Client IntegerKey Bits - Client certificate key bits, valid values depend on key type.
- tls
Client StringKey Type - Client certificate key type,
rsa
orec
. - tls
Client IntegerTtl - Client certificate TTL in seconds.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - operation
Activate boolean - Grant permission to use the KMIP Activate operation.
- operation
Add booleanAttribute - Grant permission to use the KMIP Add Attribute operation.
- operation
All boolean - Grant all permissions to this role. May not be specified with any other
operation_*
params. - operation
Create boolean - Grant permission to use the KMIP Create operation.
- operation
Destroy boolean - Grant permission to use the KMIP Destroy operation.
- operation
Discover booleanVersions - Grant permission to use the KMIP Discover Version operation.
- operation
Get boolean - Grant permission to use the KMIP Get operation.
- operation
Get booleanAttribute List - Grant permission to use the KMIP Get Atrribute List operation.
- operation
Get booleanAttributes - Grant permission to use the KMIP Get Atrributes operation.
- operation
Locate boolean - Grant permission to use the KMIP Get Locate operation.
- operation
None boolean - Remove all permissions from this role. May not be specified with any other
operation_*
params. - operation
Register boolean - Grant permission to use the KMIP Register operation.
- operation
Rekey boolean - Grant permission to use the KMIP Rekey operation.
- operation
Revoke boolean - Grant permission to use the KMIP Revoke operation.
- path string
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - role string
- Name of the role.
- scope string
- Name of the scope.
- tls
Client numberKey Bits - Client certificate key bits, valid values depend on key type.
- tls
Client stringKey Type - Client certificate key type,
rsa
orec
. - tls
Client numberTtl - Client certificate TTL in seconds.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - operation_
activate bool - Grant permission to use the KMIP Activate operation.
- operation_
add_ boolattribute - Grant permission to use the KMIP Add Attribute operation.
- operation_
all bool - Grant all permissions to this role. May not be specified with any other
operation_*
params. - operation_
create bool - Grant permission to use the KMIP Create operation.
- operation_
destroy bool - Grant permission to use the KMIP Destroy operation.
- operation_
discover_ boolversions - Grant permission to use the KMIP Discover Version operation.
- operation_
get bool - Grant permission to use the KMIP Get operation.
- operation_
get_ boolattribute_ list - Grant permission to use the KMIP Get Atrribute List operation.
- operation_
get_ boolattributes - Grant permission to use the KMIP Get Atrributes operation.
- operation_
locate bool - Grant permission to use the KMIP Get Locate operation.
- operation_
none bool - Remove all permissions from this role. May not be specified with any other
operation_*
params. - operation_
register bool - Grant permission to use the KMIP Register operation.
- operation_
rekey bool - Grant permission to use the KMIP Rekey operation.
- operation_
revoke bool - Grant permission to use the KMIP Revoke operation.
- path str
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - role str
- Name of the role.
- scope str
- Name of the scope.
- tls_
client_ intkey_ bits - Client certificate key bits, valid values depend on key type.
- tls_
client_ strkey_ type - Client certificate key type,
rsa
orec
. - tls_
client_ intttl - Client certificate TTL in seconds.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - operation
Activate Boolean - Grant permission to use the KMIP Activate operation.
- operation
Add BooleanAttribute - Grant permission to use the KMIP Add Attribute operation.
- operation
All Boolean - Grant all permissions to this role. May not be specified with any other
operation_*
params. - operation
Create Boolean - Grant permission to use the KMIP Create operation.
- operation
Destroy Boolean - Grant permission to use the KMIP Destroy operation.
- operation
Discover BooleanVersions - Grant permission to use the KMIP Discover Version operation.
- operation
Get Boolean - Grant permission to use the KMIP Get operation.
- operation
Get BooleanAttribute List - Grant permission to use the KMIP Get Atrribute List operation.
- operation
Get BooleanAttributes - Grant permission to use the KMIP Get Atrributes operation.
- operation
Locate Boolean - Grant permission to use the KMIP Get Locate operation.
- operation
None Boolean - Remove all permissions from this role. May not be specified with any other
operation_*
params. - operation
Register Boolean - Grant permission to use the KMIP Register operation.
- operation
Rekey Boolean - Grant permission to use the KMIP Rekey operation.
- operation
Revoke Boolean - Grant permission to use the KMIP Revoke operation.
- path String
- The unique path this backend should be mounted at. Must
not begin or end with a
/
. Defaults tokmip
. - role String
- Name of the role.
- scope String
- Name of the scope.
- tls
Client NumberKey Bits - Client certificate key bits, valid values depend on key type.
- tls
Client StringKey Type - Client certificate key type,
rsa
orec
. - tls
Client NumberTtl - Client certificate TTL in seconds.
Import
KMIP Secret role can be imported using the path
, e.g.
$ pulumi import vault:kmip/secretRole:SecretRole admin kmip
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
vault
Terraform Provider.