pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -75,34 +75,15 @@ class CertAuthBackendRoleArgs:
|
|
75
75
|
Requires Vault version 1.13+.
|
76
76
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
|
77
77
|
client certificates
|
78
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
79
|
-
|
80
|
-
|
81
|
-
:param pulumi.Input[
|
82
|
-
|
83
|
-
|
84
|
-
|
85
|
-
:param pulumi.Input[int]
|
86
|
-
|
87
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
88
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
89
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
90
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
91
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
92
|
-
token generated using this role should never expire. The token should be renewed within the
|
93
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
94
|
-
value of this field. Specified in seconds.
|
95
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
96
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
97
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
98
|
-
Its current value will be referenced at renewal time.
|
99
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
100
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
101
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
102
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
103
|
-
requests a different type at generation time.
|
104
|
-
|
105
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
78
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
79
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
80
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
81
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
82
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
83
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
84
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
85
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
86
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
106
87
|
"""
|
107
88
|
pulumi.set(__self__, "certificate", certificate)
|
108
89
|
if allowed_common_names is not None:
|
@@ -380,9 +361,7 @@ class CertAuthBackendRoleArgs:
|
|
380
361
|
@pulumi.getter(name="tokenBoundCidrs")
|
381
362
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
382
363
|
"""
|
383
|
-
|
384
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
385
|
-
as well.
|
364
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
386
365
|
"""
|
387
366
|
return pulumi.get(self, "token_bound_cidrs")
|
388
367
|
|
@@ -394,10 +373,7 @@ class CertAuthBackendRoleArgs:
|
|
394
373
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
395
374
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
396
375
|
"""
|
397
|
-
|
398
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
399
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
400
|
-
`token_max_ttl` would otherwise allow a renewal.
|
376
|
+
Generated Token's Explicit Maximum TTL in seconds
|
401
377
|
"""
|
402
378
|
return pulumi.get(self, "token_explicit_max_ttl")
|
403
379
|
|
@@ -409,8 +385,7 @@ class CertAuthBackendRoleArgs:
|
|
409
385
|
@pulumi.getter(name="tokenMaxTtl")
|
410
386
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
411
387
|
"""
|
412
|
-
The maximum lifetime
|
413
|
-
Its current value will be referenced at renewal time.
|
388
|
+
The maximum lifetime of the generated token
|
414
389
|
"""
|
415
390
|
return pulumi.get(self, "token_max_ttl")
|
416
391
|
|
@@ -422,8 +397,7 @@ class CertAuthBackendRoleArgs:
|
|
422
397
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
423
398
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
424
399
|
"""
|
425
|
-
If
|
426
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
400
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
427
401
|
"""
|
428
402
|
return pulumi.get(self, "token_no_default_policy")
|
429
403
|
|
@@ -435,8 +409,7 @@ class CertAuthBackendRoleArgs:
|
|
435
409
|
@pulumi.getter(name="tokenNumUses")
|
436
410
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
437
411
|
"""
|
438
|
-
The
|
439
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
412
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
440
413
|
"""
|
441
414
|
return pulumi.get(self, "token_num_uses")
|
442
415
|
|
@@ -448,10 +421,7 @@ class CertAuthBackendRoleArgs:
|
|
448
421
|
@pulumi.getter(name="tokenPeriod")
|
449
422
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
450
423
|
"""
|
451
|
-
|
452
|
-
token generated using this role should never expire. The token should be renewed within the
|
453
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
454
|
-
value of this field. Specified in seconds.
|
424
|
+
Generated Token's Period
|
455
425
|
"""
|
456
426
|
return pulumi.get(self, "token_period")
|
457
427
|
|
@@ -463,8 +433,7 @@ class CertAuthBackendRoleArgs:
|
|
463
433
|
@pulumi.getter(name="tokenPolicies")
|
464
434
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
465
435
|
"""
|
466
|
-
|
467
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
436
|
+
Generated Token's Policies
|
468
437
|
"""
|
469
438
|
return pulumi.get(self, "token_policies")
|
470
439
|
|
@@ -476,8 +445,7 @@ class CertAuthBackendRoleArgs:
|
|
476
445
|
@pulumi.getter(name="tokenTtl")
|
477
446
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
478
447
|
"""
|
479
|
-
The
|
480
|
-
Its current value will be referenced at renewal time.
|
448
|
+
The initial ttl of the token to generate in seconds
|
481
449
|
"""
|
482
450
|
return pulumi.get(self, "token_ttl")
|
483
451
|
|
@@ -489,13 +457,7 @@ class CertAuthBackendRoleArgs:
|
|
489
457
|
@pulumi.getter(name="tokenType")
|
490
458
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
491
459
|
"""
|
492
|
-
The type of token
|
493
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
494
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
495
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
496
|
-
requests a different type at generation time.
|
497
|
-
|
498
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
460
|
+
The type of token to generate, service or batch
|
499
461
|
"""
|
500
462
|
return pulumi.get(self, "token_type")
|
501
463
|
|
@@ -568,34 +530,15 @@ class _CertAuthBackendRoleState:
|
|
568
530
|
Requires Vault version 1.13+.
|
569
531
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
|
570
532
|
client certificates
|
571
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
572
|
-
|
573
|
-
|
574
|
-
:param pulumi.Input[
|
575
|
-
|
576
|
-
|
577
|
-
|
578
|
-
:param pulumi.Input[int]
|
579
|
-
|
580
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
581
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
582
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
583
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
584
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
585
|
-
token generated using this role should never expire. The token should be renewed within the
|
586
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
587
|
-
value of this field. Specified in seconds.
|
588
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
589
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
590
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
591
|
-
Its current value will be referenced at renewal time.
|
592
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
593
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
594
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
595
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
596
|
-
requests a different type at generation time.
|
597
|
-
|
598
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
533
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
534
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
535
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
536
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
537
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
538
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
539
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
540
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
541
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
599
542
|
"""
|
600
543
|
if allowed_common_names is not None:
|
601
544
|
pulumi.set(__self__, "allowed_common_names", allowed_common_names)
|
@@ -874,9 +817,7 @@ class _CertAuthBackendRoleState:
|
|
874
817
|
@pulumi.getter(name="tokenBoundCidrs")
|
875
818
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
876
819
|
"""
|
877
|
-
|
878
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
879
|
-
as well.
|
820
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
880
821
|
"""
|
881
822
|
return pulumi.get(self, "token_bound_cidrs")
|
882
823
|
|
@@ -888,10 +829,7 @@ class _CertAuthBackendRoleState:
|
|
888
829
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
889
830
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
890
831
|
"""
|
891
|
-
|
892
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
893
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
894
|
-
`token_max_ttl` would otherwise allow a renewal.
|
832
|
+
Generated Token's Explicit Maximum TTL in seconds
|
895
833
|
"""
|
896
834
|
return pulumi.get(self, "token_explicit_max_ttl")
|
897
835
|
|
@@ -903,8 +841,7 @@ class _CertAuthBackendRoleState:
|
|
903
841
|
@pulumi.getter(name="tokenMaxTtl")
|
904
842
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
905
843
|
"""
|
906
|
-
The maximum lifetime
|
907
|
-
Its current value will be referenced at renewal time.
|
844
|
+
The maximum lifetime of the generated token
|
908
845
|
"""
|
909
846
|
return pulumi.get(self, "token_max_ttl")
|
910
847
|
|
@@ -916,8 +853,7 @@ class _CertAuthBackendRoleState:
|
|
916
853
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
917
854
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
918
855
|
"""
|
919
|
-
If
|
920
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
856
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
921
857
|
"""
|
922
858
|
return pulumi.get(self, "token_no_default_policy")
|
923
859
|
|
@@ -929,8 +865,7 @@ class _CertAuthBackendRoleState:
|
|
929
865
|
@pulumi.getter(name="tokenNumUses")
|
930
866
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
931
867
|
"""
|
932
|
-
The
|
933
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
868
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
934
869
|
"""
|
935
870
|
return pulumi.get(self, "token_num_uses")
|
936
871
|
|
@@ -942,10 +877,7 @@ class _CertAuthBackendRoleState:
|
|
942
877
|
@pulumi.getter(name="tokenPeriod")
|
943
878
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
944
879
|
"""
|
945
|
-
|
946
|
-
token generated using this role should never expire. The token should be renewed within the
|
947
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
948
|
-
value of this field. Specified in seconds.
|
880
|
+
Generated Token's Period
|
949
881
|
"""
|
950
882
|
return pulumi.get(self, "token_period")
|
951
883
|
|
@@ -957,8 +889,7 @@ class _CertAuthBackendRoleState:
|
|
957
889
|
@pulumi.getter(name="tokenPolicies")
|
958
890
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
959
891
|
"""
|
960
|
-
|
961
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
892
|
+
Generated Token's Policies
|
962
893
|
"""
|
963
894
|
return pulumi.get(self, "token_policies")
|
964
895
|
|
@@ -970,8 +901,7 @@ class _CertAuthBackendRoleState:
|
|
970
901
|
@pulumi.getter(name="tokenTtl")
|
971
902
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
972
903
|
"""
|
973
|
-
The
|
974
|
-
Its current value will be referenced at renewal time.
|
904
|
+
The initial ttl of the token to generate in seconds
|
975
905
|
"""
|
976
906
|
return pulumi.get(self, "token_ttl")
|
977
907
|
|
@@ -983,13 +913,7 @@ class _CertAuthBackendRoleState:
|
|
983
913
|
@pulumi.getter(name="tokenType")
|
984
914
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
985
915
|
"""
|
986
|
-
The type of token
|
987
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
988
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
989
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
990
|
-
requests a different type at generation time.
|
991
|
-
|
992
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
916
|
+
The type of token to generate, service or batch
|
993
917
|
"""
|
994
918
|
return pulumi.get(self, "token_type")
|
995
919
|
|
@@ -1035,17 +959,18 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1035
959
|
|
1036
960
|
## Example Usage
|
1037
961
|
|
1038
|
-
<!--Start PulumiCodeChooser -->
|
1039
962
|
```python
|
1040
963
|
import pulumi
|
964
|
+
import pulumi_std as std
|
1041
965
|
import pulumi_vault as vault
|
1042
966
|
|
1043
|
-
|
967
|
+
cert = vault.AuthBackend("cert",
|
1044
968
|
path="cert",
|
1045
969
|
type="cert")
|
1046
|
-
cert_cert_auth_backend_role = vault.CertAuthBackendRole("
|
1047
|
-
|
1048
|
-
|
970
|
+
cert_cert_auth_backend_role = vault.CertAuthBackendRole("cert",
|
971
|
+
name="foo",
|
972
|
+
certificate=std.file(input="/path/to/certs/ca-cert.pem").result,
|
973
|
+
backend=cert.path,
|
1049
974
|
allowed_names=[
|
1050
975
|
"foo.example.org",
|
1051
976
|
"baz.example.org",
|
@@ -1054,7 +979,6 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1054
979
|
token_max_ttl=600,
|
1055
980
|
token_policies=["foo"])
|
1056
981
|
```
|
1057
|
-
<!--End PulumiCodeChooser -->
|
1058
982
|
|
1059
983
|
:param str resource_name: The name of the resource.
|
1060
984
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -1091,34 +1015,15 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1091
1015
|
Requires Vault version 1.13+.
|
1092
1016
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
|
1093
1017
|
client certificates
|
1094
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1095
|
-
|
1096
|
-
|
1097
|
-
:param pulumi.Input[
|
1098
|
-
|
1099
|
-
|
1100
|
-
|
1101
|
-
:param pulumi.Input[int]
|
1102
|
-
|
1103
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1104
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1105
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
1106
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1107
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1108
|
-
token generated using this role should never expire. The token should be renewed within the
|
1109
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1110
|
-
value of this field. Specified in seconds.
|
1111
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1112
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1113
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1114
|
-
Its current value will be referenced at renewal time.
|
1115
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1116
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1117
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1118
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1119
|
-
requests a different type at generation time.
|
1120
|
-
|
1121
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
1018
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1019
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1020
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1021
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1022
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1023
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1024
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1025
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1026
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1122
1027
|
"""
|
1123
1028
|
...
|
1124
1029
|
@overload
|
@@ -1131,17 +1036,18 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1131
1036
|
|
1132
1037
|
## Example Usage
|
1133
1038
|
|
1134
|
-
<!--Start PulumiCodeChooser -->
|
1135
1039
|
```python
|
1136
1040
|
import pulumi
|
1041
|
+
import pulumi_std as std
|
1137
1042
|
import pulumi_vault as vault
|
1138
1043
|
|
1139
|
-
|
1044
|
+
cert = vault.AuthBackend("cert",
|
1140
1045
|
path="cert",
|
1141
1046
|
type="cert")
|
1142
|
-
cert_cert_auth_backend_role = vault.CertAuthBackendRole("
|
1143
|
-
|
1144
|
-
|
1047
|
+
cert_cert_auth_backend_role = vault.CertAuthBackendRole("cert",
|
1048
|
+
name="foo",
|
1049
|
+
certificate=std.file(input="/path/to/certs/ca-cert.pem").result,
|
1050
|
+
backend=cert.path,
|
1145
1051
|
allowed_names=[
|
1146
1052
|
"foo.example.org",
|
1147
1053
|
"baz.example.org",
|
@@ -1150,7 +1056,6 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1150
1056
|
token_max_ttl=600,
|
1151
1057
|
token_policies=["foo"])
|
1152
1058
|
```
|
1153
|
-
<!--End PulumiCodeChooser -->
|
1154
1059
|
|
1155
1060
|
:param str resource_name: The name of the resource.
|
1156
1061
|
:param CertAuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
|
@@ -1306,34 +1211,15 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1306
1211
|
Requires Vault version 1.13+.
|
1307
1212
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
|
1308
1213
|
client certificates
|
1309
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1310
|
-
|
1311
|
-
|
1312
|
-
:param pulumi.Input[
|
1313
|
-
|
1314
|
-
|
1315
|
-
|
1316
|
-
:param pulumi.Input[int]
|
1317
|
-
|
1318
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1319
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1320
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
1321
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1322
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1323
|
-
token generated using this role should never expire. The token should be renewed within the
|
1324
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1325
|
-
value of this field. Specified in seconds.
|
1326
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1327
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1328
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1329
|
-
Its current value will be referenced at renewal time.
|
1330
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1331
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1332
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1333
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1334
|
-
requests a different type at generation time.
|
1335
|
-
|
1336
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
1214
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1215
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1216
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1217
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1218
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1219
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1220
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1221
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1222
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1337
1223
|
"""
|
1338
1224
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1339
1225
|
|
@@ -1523,9 +1409,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1523
1409
|
@pulumi.getter(name="tokenBoundCidrs")
|
1524
1410
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1525
1411
|
"""
|
1526
|
-
|
1527
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1528
|
-
as well.
|
1412
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1529
1413
|
"""
|
1530
1414
|
return pulumi.get(self, "token_bound_cidrs")
|
1531
1415
|
|
@@ -1533,10 +1417,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1533
1417
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1534
1418
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1535
1419
|
"""
|
1536
|
-
|
1537
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1538
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1539
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1420
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1540
1421
|
"""
|
1541
1422
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1542
1423
|
|
@@ -1544,8 +1425,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1544
1425
|
@pulumi.getter(name="tokenMaxTtl")
|
1545
1426
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1546
1427
|
"""
|
1547
|
-
The maximum lifetime
|
1548
|
-
Its current value will be referenced at renewal time.
|
1428
|
+
The maximum lifetime of the generated token
|
1549
1429
|
"""
|
1550
1430
|
return pulumi.get(self, "token_max_ttl")
|
1551
1431
|
|
@@ -1553,8 +1433,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1553
1433
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1554
1434
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1555
1435
|
"""
|
1556
|
-
If
|
1557
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1436
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1558
1437
|
"""
|
1559
1438
|
return pulumi.get(self, "token_no_default_policy")
|
1560
1439
|
|
@@ -1562,8 +1441,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1562
1441
|
@pulumi.getter(name="tokenNumUses")
|
1563
1442
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1564
1443
|
"""
|
1565
|
-
The
|
1566
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1444
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1567
1445
|
"""
|
1568
1446
|
return pulumi.get(self, "token_num_uses")
|
1569
1447
|
|
@@ -1571,10 +1449,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1571
1449
|
@pulumi.getter(name="tokenPeriod")
|
1572
1450
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1573
1451
|
"""
|
1574
|
-
|
1575
|
-
token generated using this role should never expire. The token should be renewed within the
|
1576
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1577
|
-
value of this field. Specified in seconds.
|
1452
|
+
Generated Token's Period
|
1578
1453
|
"""
|
1579
1454
|
return pulumi.get(self, "token_period")
|
1580
1455
|
|
@@ -1582,8 +1457,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1582
1457
|
@pulumi.getter(name="tokenPolicies")
|
1583
1458
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1584
1459
|
"""
|
1585
|
-
|
1586
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1460
|
+
Generated Token's Policies
|
1587
1461
|
"""
|
1588
1462
|
return pulumi.get(self, "token_policies")
|
1589
1463
|
|
@@ -1591,8 +1465,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1591
1465
|
@pulumi.getter(name="tokenTtl")
|
1592
1466
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1593
1467
|
"""
|
1594
|
-
The
|
1595
|
-
Its current value will be referenced at renewal time.
|
1468
|
+
The initial ttl of the token to generate in seconds
|
1596
1469
|
"""
|
1597
1470
|
return pulumi.get(self, "token_ttl")
|
1598
1471
|
|
@@ -1600,13 +1473,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1600
1473
|
@pulumi.getter(name="tokenType")
|
1601
1474
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1602
1475
|
"""
|
1603
|
-
The type of token
|
1604
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1605
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1606
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1607
|
-
requests a different type at generation time.
|
1608
|
-
|
1609
|
-
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
1476
|
+
The type of token to generate, service or batch
|
1610
1477
|
"""
|
1611
1478
|
return pulumi.get(self, "token_type")
|
1612
1479
|
|
@@ -530,32 +530,28 @@ class SecretBackend(pulumi.CustomResource):
|
|
530
530
|
## Example Usage
|
531
531
|
|
532
532
|
### Creating a standard backend resource:
|
533
|
-
<!--Start PulumiCodeChooser -->
|
534
533
|
```python
|
535
534
|
import pulumi
|
536
535
|
import pulumi_vault as vault
|
537
536
|
|
538
537
|
test = vault.consul.SecretBackend("test",
|
539
|
-
address="127.0.0.1:8500",
|
540
|
-
description="Manages the Consul backend",
|
541
538
|
path="consul",
|
539
|
+
description="Manages the Consul backend",
|
540
|
+
address="127.0.0.1:8500",
|
542
541
|
token="4240861b-ce3d-8530-115a-521ff070dd29")
|
543
542
|
```
|
544
|
-
<!--End PulumiCodeChooser -->
|
545
543
|
|
546
544
|
### Creating a backend resource to bootstrap a new Consul instance:
|
547
|
-
<!--Start PulumiCodeChooser -->
|
548
545
|
```python
|
549
546
|
import pulumi
|
550
547
|
import pulumi_vault as vault
|
551
548
|
|
552
549
|
test = vault.consul.SecretBackend("test",
|
553
|
-
|
554
|
-
bootstrap=True,
|
550
|
+
path="consul",
|
555
551
|
description="Bootstrap the Consul backend",
|
556
|
-
|
552
|
+
address="127.0.0.1:8500",
|
553
|
+
bootstrap=True)
|
557
554
|
```
|
558
|
-
<!--End PulumiCodeChooser -->
|
559
555
|
|
560
556
|
## Import
|
561
557
|
|
@@ -600,32 +596,28 @@ class SecretBackend(pulumi.CustomResource):
|
|
600
596
|
## Example Usage
|
601
597
|
|
602
598
|
### Creating a standard backend resource:
|
603
|
-
<!--Start PulumiCodeChooser -->
|
604
599
|
```python
|
605
600
|
import pulumi
|
606
601
|
import pulumi_vault as vault
|
607
602
|
|
608
603
|
test = vault.consul.SecretBackend("test",
|
609
|
-
address="127.0.0.1:8500",
|
610
|
-
description="Manages the Consul backend",
|
611
604
|
path="consul",
|
605
|
+
description="Manages the Consul backend",
|
606
|
+
address="127.0.0.1:8500",
|
612
607
|
token="4240861b-ce3d-8530-115a-521ff070dd29")
|
613
608
|
```
|
614
|
-
<!--End PulumiCodeChooser -->
|
615
609
|
|
616
610
|
### Creating a backend resource to bootstrap a new Consul instance:
|
617
|
-
<!--Start PulumiCodeChooser -->
|
618
611
|
```python
|
619
612
|
import pulumi
|
620
613
|
import pulumi_vault as vault
|
621
614
|
|
622
615
|
test = vault.consul.SecretBackend("test",
|
623
|
-
|
624
|
-
bootstrap=True,
|
616
|
+
path="consul",
|
625
617
|
description="Bootstrap the Consul backend",
|
626
|
-
|
618
|
+
address="127.0.0.1:8500",
|
619
|
+
bootstrap=True)
|
627
620
|
```
|
628
|
-
<!--End PulumiCodeChooser -->
|
629
621
|
|
630
622
|
## Import
|
631
623
|
|