pulumi-vault 6.1.1__py3-none-any.whl → 6.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +26 -0
- pulumi_vault/auth_backend.py +47 -0
- pulumi_vault/aws/auth_backend_client.py +247 -7
- pulumi_vault/aws/secret_backend_role.py +54 -0
- pulumi_vault/azure/auth_backend_config.py +133 -0
- pulumi_vault/azure/backend.py +203 -0
- pulumi_vault/database/secrets_mount.py +282 -0
- pulumi_vault/gcp/auth_backend.py +244 -0
- pulumi_vault/gcp/secret_backend.py +271 -3
- pulumi_vault/jwt/auth_backend_role.py +28 -35
- pulumi_vault/kubernetes/secret_backend.py +282 -0
- pulumi_vault/ldap/secret_backend.py +282 -0
- pulumi_vault/mount.py +324 -0
- pulumi_vault/okta/auth_backend.py +453 -0
- pulumi_vault/pkisecret/__init__.py +2 -0
- pulumi_vault/pkisecret/_inputs.py +30 -0
- pulumi_vault/pkisecret/backend_config_est.py +614 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +233 -0
- pulumi_vault/pkisecret/outputs.py +54 -0
- pulumi_vault/plugin.py +590 -0
- pulumi_vault/plugin_pinned_version.py +293 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +47 -0
- pulumi_vault/quota_rate_limit.py +47 -0
- pulumi_vault/ssh/secret_backend_ca.py +94 -0
- {pulumi_vault-6.1.1.dist-info → pulumi_vault-6.2.0.dist-info}/METADATA +1 -1
- {pulumi_vault-6.1.1.dist-info → pulumi_vault-6.2.0.dist-info}/RECORD +29 -25
- {pulumi_vault-6.1.1.dist-info → pulumi_vault-6.2.0.dist-info}/WHEEL +1 -1
- {pulumi_vault-6.1.1.dist-info → pulumi_vault-6.2.0.dist-info}/top_level.txt +0 -0
@@ -17,6 +17,7 @@ class SecretBackendArgs:
|
|
17
17
|
binddn: pulumi.Input[str],
|
18
18
|
bindpass: pulumi.Input[str],
|
19
19
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
20
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
20
21
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
22
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
22
23
|
certificate: Optional[pulumi.Input[str]] = None,
|
@@ -24,16 +25,21 @@ class SecretBackendArgs:
|
|
24
25
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
25
26
|
connection_timeout: Optional[pulumi.Input[int]] = None,
|
26
27
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
28
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
27
29
|
description: Optional[pulumi.Input[str]] = None,
|
28
30
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
29
31
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
32
|
+
identity_token_key: Optional[pulumi.Input[str]] = None,
|
30
33
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
34
|
+
listing_visibility: Optional[pulumi.Input[str]] = None,
|
31
35
|
local: Optional[pulumi.Input[bool]] = None,
|
32
36
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
33
37
|
namespace: Optional[pulumi.Input[str]] = None,
|
34
38
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
39
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
35
40
|
password_policy: Optional[pulumi.Input[str]] = None,
|
36
41
|
path: Optional[pulumi.Input[str]] = None,
|
42
|
+
plugin_version: Optional[pulumi.Input[str]] = None,
|
37
43
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
38
44
|
schema: Optional[pulumi.Input[str]] = None,
|
39
45
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -48,6 +54,7 @@ class SecretBackendArgs:
|
|
48
54
|
:param pulumi.Input[str] binddn: Distinguished name of object to bind when performing user and group search.
|
49
55
|
:param pulumi.Input[str] bindpass: Password to use along with binddn when performing user search.
|
50
56
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
57
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
51
58
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
52
59
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
53
60
|
:param pulumi.Input[str] certificate: CA certificate to use when verifying LDAP server certificate, must be
|
@@ -57,11 +64,14 @@ class SecretBackendArgs:
|
|
57
64
|
:param pulumi.Input[int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
58
65
|
the next URL in the configuration.
|
59
66
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
67
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
60
68
|
:param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
|
61
69
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
62
70
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
71
|
+
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
63
72
|
:param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
64
73
|
Defaults to `false`.
|
74
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
65
75
|
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
66
76
|
replication.Tolerance duration to use when checking the last rotation time.
|
67
77
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
@@ -70,9 +80,11 @@ class SecretBackendArgs:
|
|
70
80
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
71
81
|
*Available only for Vault Enterprise*.
|
72
82
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
83
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
73
84
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
74
85
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
75
86
|
not begin or end with a `/`. Defaults to `ldap`.
|
87
|
+
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
76
88
|
:param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
77
89
|
before returning back an error.
|
78
90
|
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
@@ -90,6 +102,8 @@ class SecretBackendArgs:
|
|
90
102
|
pulumi.set(__self__, "bindpass", bindpass)
|
91
103
|
if allowed_managed_keys is not None:
|
92
104
|
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
105
|
+
if allowed_response_headers is not None:
|
106
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
93
107
|
if audit_non_hmac_request_keys is not None:
|
94
108
|
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
95
109
|
if audit_non_hmac_response_keys is not None:
|
@@ -104,14 +118,20 @@ class SecretBackendArgs:
|
|
104
118
|
pulumi.set(__self__, "connection_timeout", connection_timeout)
|
105
119
|
if default_lease_ttl_seconds is not None:
|
106
120
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
121
|
+
if delegated_auth_accessors is not None:
|
122
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
107
123
|
if description is not None:
|
108
124
|
pulumi.set(__self__, "description", description)
|
109
125
|
if disable_remount is not None:
|
110
126
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
111
127
|
if external_entropy_access is not None:
|
112
128
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
129
|
+
if identity_token_key is not None:
|
130
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
113
131
|
if insecure_tls is not None:
|
114
132
|
pulumi.set(__self__, "insecure_tls", insecure_tls)
|
133
|
+
if listing_visibility is not None:
|
134
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
115
135
|
if local is not None:
|
116
136
|
pulumi.set(__self__, "local", local)
|
117
137
|
if max_lease_ttl_seconds is not None:
|
@@ -120,10 +140,14 @@ class SecretBackendArgs:
|
|
120
140
|
pulumi.set(__self__, "namespace", namespace)
|
121
141
|
if options is not None:
|
122
142
|
pulumi.set(__self__, "options", options)
|
143
|
+
if passthrough_request_headers is not None:
|
144
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
123
145
|
if password_policy is not None:
|
124
146
|
pulumi.set(__self__, "password_policy", password_policy)
|
125
147
|
if path is not None:
|
126
148
|
pulumi.set(__self__, "path", path)
|
149
|
+
if plugin_version is not None:
|
150
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
127
151
|
if request_timeout is not None:
|
128
152
|
pulumi.set(__self__, "request_timeout", request_timeout)
|
129
153
|
if schema is not None:
|
@@ -179,6 +203,18 @@ class SecretBackendArgs:
|
|
179
203
|
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
180
204
|
pulumi.set(self, "allowed_managed_keys", value)
|
181
205
|
|
206
|
+
@property
|
207
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
208
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
209
|
+
"""
|
210
|
+
List of headers to allow and pass from the request to the plugin
|
211
|
+
"""
|
212
|
+
return pulumi.get(self, "allowed_response_headers")
|
213
|
+
|
214
|
+
@allowed_response_headers.setter
|
215
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
216
|
+
pulumi.set(self, "allowed_response_headers", value)
|
217
|
+
|
182
218
|
@property
|
183
219
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
184
220
|
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -265,6 +301,18 @@ class SecretBackendArgs:
|
|
265
301
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
266
302
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
267
303
|
|
304
|
+
@property
|
305
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
306
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
307
|
+
"""
|
308
|
+
List of headers to allow and pass from the request to the plugin
|
309
|
+
"""
|
310
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
311
|
+
|
312
|
+
@delegated_auth_accessors.setter
|
313
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
314
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
315
|
+
|
268
316
|
@property
|
269
317
|
@pulumi.getter
|
270
318
|
def description(self) -> Optional[pulumi.Input[str]]:
|
@@ -301,6 +349,18 @@ class SecretBackendArgs:
|
|
301
349
|
def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
|
302
350
|
pulumi.set(self, "external_entropy_access", value)
|
303
351
|
|
352
|
+
@property
|
353
|
+
@pulumi.getter(name="identityTokenKey")
|
354
|
+
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
355
|
+
"""
|
356
|
+
The key to use for signing plugin workload identity tokens
|
357
|
+
"""
|
358
|
+
return pulumi.get(self, "identity_token_key")
|
359
|
+
|
360
|
+
@identity_token_key.setter
|
361
|
+
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
362
|
+
pulumi.set(self, "identity_token_key", value)
|
363
|
+
|
304
364
|
@property
|
305
365
|
@pulumi.getter(name="insecureTls")
|
306
366
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -314,6 +374,18 @@ class SecretBackendArgs:
|
|
314
374
|
def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
|
315
375
|
pulumi.set(self, "insecure_tls", value)
|
316
376
|
|
377
|
+
@property
|
378
|
+
@pulumi.getter(name="listingVisibility")
|
379
|
+
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
380
|
+
"""
|
381
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
382
|
+
"""
|
383
|
+
return pulumi.get(self, "listing_visibility")
|
384
|
+
|
385
|
+
@listing_visibility.setter
|
386
|
+
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
387
|
+
pulumi.set(self, "listing_visibility", value)
|
388
|
+
|
317
389
|
@property
|
318
390
|
@pulumi.getter
|
319
391
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -366,6 +438,18 @@ class SecretBackendArgs:
|
|
366
438
|
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
367
439
|
pulumi.set(self, "options", value)
|
368
440
|
|
441
|
+
@property
|
442
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
443
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
444
|
+
"""
|
445
|
+
List of headers to allow and pass from the request to the plugin
|
446
|
+
"""
|
447
|
+
return pulumi.get(self, "passthrough_request_headers")
|
448
|
+
|
449
|
+
@passthrough_request_headers.setter
|
450
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
451
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
452
|
+
|
369
453
|
@property
|
370
454
|
@pulumi.getter(name="passwordPolicy")
|
371
455
|
def password_policy(self) -> Optional[pulumi.Input[str]]:
|
@@ -391,6 +475,18 @@ class SecretBackendArgs:
|
|
391
475
|
def path(self, value: Optional[pulumi.Input[str]]):
|
392
476
|
pulumi.set(self, "path", value)
|
393
477
|
|
478
|
+
@property
|
479
|
+
@pulumi.getter(name="pluginVersion")
|
480
|
+
def plugin_version(self) -> Optional[pulumi.Input[str]]:
|
481
|
+
"""
|
482
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
483
|
+
"""
|
484
|
+
return pulumi.get(self, "plugin_version")
|
485
|
+
|
486
|
+
@plugin_version.setter
|
487
|
+
def plugin_version(self, value: Optional[pulumi.Input[str]]):
|
488
|
+
pulumi.set(self, "plugin_version", value)
|
489
|
+
|
394
490
|
@property
|
395
491
|
@pulumi.getter(name="requestTimeout")
|
396
492
|
def request_timeout(self) -> Optional[pulumi.Input[int]]:
|
@@ -508,6 +604,7 @@ class _SecretBackendState:
|
|
508
604
|
def __init__(__self__, *,
|
509
605
|
accessor: Optional[pulumi.Input[str]] = None,
|
510
606
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
607
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
511
608
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
512
609
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
513
610
|
binddn: Optional[pulumi.Input[str]] = None,
|
@@ -517,16 +614,21 @@ class _SecretBackendState:
|
|
517
614
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
518
615
|
connection_timeout: Optional[pulumi.Input[int]] = None,
|
519
616
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
617
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
520
618
|
description: Optional[pulumi.Input[str]] = None,
|
521
619
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
522
620
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
621
|
+
identity_token_key: Optional[pulumi.Input[str]] = None,
|
523
622
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
623
|
+
listing_visibility: Optional[pulumi.Input[str]] = None,
|
524
624
|
local: Optional[pulumi.Input[bool]] = None,
|
525
625
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
526
626
|
namespace: Optional[pulumi.Input[str]] = None,
|
527
627
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
628
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
528
629
|
password_policy: Optional[pulumi.Input[str]] = None,
|
529
630
|
path: Optional[pulumi.Input[str]] = None,
|
631
|
+
plugin_version: Optional[pulumi.Input[str]] = None,
|
530
632
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
531
633
|
schema: Optional[pulumi.Input[str]] = None,
|
532
634
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -540,6 +642,7 @@ class _SecretBackendState:
|
|
540
642
|
Input properties used for looking up and filtering SecretBackend resources.
|
541
643
|
:param pulumi.Input[str] accessor: Accessor of the mount
|
542
644
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
645
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
543
646
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
544
647
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
545
648
|
:param pulumi.Input[str] binddn: Distinguished name of object to bind when performing user and group search.
|
@@ -551,11 +654,14 @@ class _SecretBackendState:
|
|
551
654
|
:param pulumi.Input[int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
552
655
|
the next URL in the configuration.
|
553
656
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
657
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
554
658
|
:param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
|
555
659
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
556
660
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
661
|
+
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
557
662
|
:param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
558
663
|
Defaults to `false`.
|
664
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
559
665
|
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
560
666
|
replication.Tolerance duration to use when checking the last rotation time.
|
561
667
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
@@ -564,9 +670,11 @@ class _SecretBackendState:
|
|
564
670
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
565
671
|
*Available only for Vault Enterprise*.
|
566
672
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
673
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
567
674
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
568
675
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
569
676
|
not begin or end with a `/`. Defaults to `ldap`.
|
677
|
+
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
570
678
|
:param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
571
679
|
before returning back an error.
|
572
680
|
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
@@ -584,6 +692,8 @@ class _SecretBackendState:
|
|
584
692
|
pulumi.set(__self__, "accessor", accessor)
|
585
693
|
if allowed_managed_keys is not None:
|
586
694
|
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
695
|
+
if allowed_response_headers is not None:
|
696
|
+
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
587
697
|
if audit_non_hmac_request_keys is not None:
|
588
698
|
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
589
699
|
if audit_non_hmac_response_keys is not None:
|
@@ -602,14 +712,20 @@ class _SecretBackendState:
|
|
602
712
|
pulumi.set(__self__, "connection_timeout", connection_timeout)
|
603
713
|
if default_lease_ttl_seconds is not None:
|
604
714
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
715
|
+
if delegated_auth_accessors is not None:
|
716
|
+
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
605
717
|
if description is not None:
|
606
718
|
pulumi.set(__self__, "description", description)
|
607
719
|
if disable_remount is not None:
|
608
720
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
609
721
|
if external_entropy_access is not None:
|
610
722
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
723
|
+
if identity_token_key is not None:
|
724
|
+
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
611
725
|
if insecure_tls is not None:
|
612
726
|
pulumi.set(__self__, "insecure_tls", insecure_tls)
|
727
|
+
if listing_visibility is not None:
|
728
|
+
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
613
729
|
if local is not None:
|
614
730
|
pulumi.set(__self__, "local", local)
|
615
731
|
if max_lease_ttl_seconds is not None:
|
@@ -618,10 +734,14 @@ class _SecretBackendState:
|
|
618
734
|
pulumi.set(__self__, "namespace", namespace)
|
619
735
|
if options is not None:
|
620
736
|
pulumi.set(__self__, "options", options)
|
737
|
+
if passthrough_request_headers is not None:
|
738
|
+
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
621
739
|
if password_policy is not None:
|
622
740
|
pulumi.set(__self__, "password_policy", password_policy)
|
623
741
|
if path is not None:
|
624
742
|
pulumi.set(__self__, "path", path)
|
743
|
+
if plugin_version is not None:
|
744
|
+
pulumi.set(__self__, "plugin_version", plugin_version)
|
625
745
|
if request_timeout is not None:
|
626
746
|
pulumi.set(__self__, "request_timeout", request_timeout)
|
627
747
|
if schema is not None:
|
@@ -665,6 +785,18 @@ class _SecretBackendState:
|
|
665
785
|
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
666
786
|
pulumi.set(self, "allowed_managed_keys", value)
|
667
787
|
|
788
|
+
@property
|
789
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
790
|
+
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
791
|
+
"""
|
792
|
+
List of headers to allow and pass from the request to the plugin
|
793
|
+
"""
|
794
|
+
return pulumi.get(self, "allowed_response_headers")
|
795
|
+
|
796
|
+
@allowed_response_headers.setter
|
797
|
+
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
798
|
+
pulumi.set(self, "allowed_response_headers", value)
|
799
|
+
|
668
800
|
@property
|
669
801
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
670
802
|
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -775,6 +907,18 @@ class _SecretBackendState:
|
|
775
907
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
776
908
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
777
909
|
|
910
|
+
@property
|
911
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
912
|
+
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
913
|
+
"""
|
914
|
+
List of headers to allow and pass from the request to the plugin
|
915
|
+
"""
|
916
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
917
|
+
|
918
|
+
@delegated_auth_accessors.setter
|
919
|
+
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
920
|
+
pulumi.set(self, "delegated_auth_accessors", value)
|
921
|
+
|
778
922
|
@property
|
779
923
|
@pulumi.getter
|
780
924
|
def description(self) -> Optional[pulumi.Input[str]]:
|
@@ -811,6 +955,18 @@ class _SecretBackendState:
|
|
811
955
|
def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
|
812
956
|
pulumi.set(self, "external_entropy_access", value)
|
813
957
|
|
958
|
+
@property
|
959
|
+
@pulumi.getter(name="identityTokenKey")
|
960
|
+
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
961
|
+
"""
|
962
|
+
The key to use for signing plugin workload identity tokens
|
963
|
+
"""
|
964
|
+
return pulumi.get(self, "identity_token_key")
|
965
|
+
|
966
|
+
@identity_token_key.setter
|
967
|
+
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
968
|
+
pulumi.set(self, "identity_token_key", value)
|
969
|
+
|
814
970
|
@property
|
815
971
|
@pulumi.getter(name="insecureTls")
|
816
972
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -824,6 +980,18 @@ class _SecretBackendState:
|
|
824
980
|
def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
|
825
981
|
pulumi.set(self, "insecure_tls", value)
|
826
982
|
|
983
|
+
@property
|
984
|
+
@pulumi.getter(name="listingVisibility")
|
985
|
+
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
986
|
+
"""
|
987
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
988
|
+
"""
|
989
|
+
return pulumi.get(self, "listing_visibility")
|
990
|
+
|
991
|
+
@listing_visibility.setter
|
992
|
+
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
993
|
+
pulumi.set(self, "listing_visibility", value)
|
994
|
+
|
827
995
|
@property
|
828
996
|
@pulumi.getter
|
829
997
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -876,6 +1044,18 @@ class _SecretBackendState:
|
|
876
1044
|
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
877
1045
|
pulumi.set(self, "options", value)
|
878
1046
|
|
1047
|
+
@property
|
1048
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1049
|
+
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1050
|
+
"""
|
1051
|
+
List of headers to allow and pass from the request to the plugin
|
1052
|
+
"""
|
1053
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1054
|
+
|
1055
|
+
@passthrough_request_headers.setter
|
1056
|
+
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
1057
|
+
pulumi.set(self, "passthrough_request_headers", value)
|
1058
|
+
|
879
1059
|
@property
|
880
1060
|
@pulumi.getter(name="passwordPolicy")
|
881
1061
|
def password_policy(self) -> Optional[pulumi.Input[str]]:
|
@@ -901,6 +1081,18 @@ class _SecretBackendState:
|
|
901
1081
|
def path(self, value: Optional[pulumi.Input[str]]):
|
902
1082
|
pulumi.set(self, "path", value)
|
903
1083
|
|
1084
|
+
@property
|
1085
|
+
@pulumi.getter(name="pluginVersion")
|
1086
|
+
def plugin_version(self) -> Optional[pulumi.Input[str]]:
|
1087
|
+
"""
|
1088
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1089
|
+
"""
|
1090
|
+
return pulumi.get(self, "plugin_version")
|
1091
|
+
|
1092
|
+
@plugin_version.setter
|
1093
|
+
def plugin_version(self, value: Optional[pulumi.Input[str]]):
|
1094
|
+
pulumi.set(self, "plugin_version", value)
|
1095
|
+
|
904
1096
|
@property
|
905
1097
|
@pulumi.getter(name="requestTimeout")
|
906
1098
|
def request_timeout(self) -> Optional[pulumi.Input[int]]:
|
@@ -1019,6 +1211,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1019
1211
|
resource_name: str,
|
1020
1212
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1021
1213
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1214
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1022
1215
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1023
1216
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1024
1217
|
binddn: Optional[pulumi.Input[str]] = None,
|
@@ -1028,16 +1221,21 @@ class SecretBackend(pulumi.CustomResource):
|
|
1028
1221
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1029
1222
|
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1030
1223
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1224
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1031
1225
|
description: Optional[pulumi.Input[str]] = None,
|
1032
1226
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
1033
1227
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1228
|
+
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1034
1229
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
1230
|
+
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1035
1231
|
local: Optional[pulumi.Input[bool]] = None,
|
1036
1232
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1037
1233
|
namespace: Optional[pulumi.Input[str]] = None,
|
1038
1234
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1235
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1039
1236
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1040
1237
|
path: Optional[pulumi.Input[str]] = None,
|
1238
|
+
plugin_version: Optional[pulumi.Input[str]] = None,
|
1041
1239
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
1042
1240
|
schema: Optional[pulumi.Input[str]] = None,
|
1043
1241
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -1075,6 +1273,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1075
1273
|
:param str resource_name: The name of the resource.
|
1076
1274
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1077
1275
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1276
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1078
1277
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1079
1278
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1080
1279
|
:param pulumi.Input[str] binddn: Distinguished name of object to bind when performing user and group search.
|
@@ -1086,11 +1285,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
1086
1285
|
:param pulumi.Input[int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1087
1286
|
the next URL in the configuration.
|
1088
1287
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
1288
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1089
1289
|
:param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
|
1090
1290
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
1091
1291
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1292
|
+
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1092
1293
|
:param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1093
1294
|
Defaults to `false`.
|
1295
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1094
1296
|
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
1095
1297
|
replication.Tolerance duration to use when checking the last rotation time.
|
1096
1298
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
@@ -1099,9 +1301,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
1099
1301
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1100
1302
|
*Available only for Vault Enterprise*.
|
1101
1303
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1304
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1102
1305
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
1103
1306
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
1104
1307
|
not begin or end with a `/`. Defaults to `ldap`.
|
1308
|
+
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1105
1309
|
:param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
1106
1310
|
before returning back an error.
|
1107
1311
|
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
@@ -1161,6 +1365,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1161
1365
|
resource_name: str,
|
1162
1366
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1163
1367
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1368
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1164
1369
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1165
1370
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1166
1371
|
binddn: Optional[pulumi.Input[str]] = None,
|
@@ -1170,16 +1375,21 @@ class SecretBackend(pulumi.CustomResource):
|
|
1170
1375
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1171
1376
|
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1172
1377
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1378
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1173
1379
|
description: Optional[pulumi.Input[str]] = None,
|
1174
1380
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
1175
1381
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1382
|
+
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1176
1383
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
1384
|
+
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1177
1385
|
local: Optional[pulumi.Input[bool]] = None,
|
1178
1386
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1179
1387
|
namespace: Optional[pulumi.Input[str]] = None,
|
1180
1388
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1389
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1181
1390
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1182
1391
|
path: Optional[pulumi.Input[str]] = None,
|
1392
|
+
plugin_version: Optional[pulumi.Input[str]] = None,
|
1183
1393
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
1184
1394
|
schema: Optional[pulumi.Input[str]] = None,
|
1185
1395
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -1199,6 +1409,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1199
1409
|
__props__ = SecretBackendArgs.__new__(SecretBackendArgs)
|
1200
1410
|
|
1201
1411
|
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1412
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1202
1413
|
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1203
1414
|
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
1204
1415
|
if binddn is None and not opts.urn:
|
@@ -1212,16 +1423,21 @@ class SecretBackend(pulumi.CustomResource):
|
|
1212
1423
|
__props__.__dict__["client_tls_key"] = None if client_tls_key is None else pulumi.Output.secret(client_tls_key)
|
1213
1424
|
__props__.__dict__["connection_timeout"] = connection_timeout
|
1214
1425
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1426
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
1215
1427
|
__props__.__dict__["description"] = description
|
1216
1428
|
__props__.__dict__["disable_remount"] = disable_remount
|
1217
1429
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1430
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1218
1431
|
__props__.__dict__["insecure_tls"] = insecure_tls
|
1432
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
1219
1433
|
__props__.__dict__["local"] = local
|
1220
1434
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
1221
1435
|
__props__.__dict__["namespace"] = namespace
|
1222
1436
|
__props__.__dict__["options"] = options
|
1437
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1223
1438
|
__props__.__dict__["password_policy"] = password_policy
|
1224
1439
|
__props__.__dict__["path"] = path
|
1440
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1225
1441
|
__props__.__dict__["request_timeout"] = request_timeout
|
1226
1442
|
__props__.__dict__["schema"] = schema
|
1227
1443
|
__props__.__dict__["seal_wrap"] = seal_wrap
|
@@ -1246,6 +1462,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1246
1462
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1247
1463
|
accessor: Optional[pulumi.Input[str]] = None,
|
1248
1464
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1465
|
+
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1249
1466
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1250
1467
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1251
1468
|
binddn: Optional[pulumi.Input[str]] = None,
|
@@ -1255,16 +1472,21 @@ class SecretBackend(pulumi.CustomResource):
|
|
1255
1472
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1256
1473
|
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1257
1474
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1475
|
+
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1258
1476
|
description: Optional[pulumi.Input[str]] = None,
|
1259
1477
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
1260
1478
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1479
|
+
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1261
1480
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
1481
|
+
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1262
1482
|
local: Optional[pulumi.Input[bool]] = None,
|
1263
1483
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1264
1484
|
namespace: Optional[pulumi.Input[str]] = None,
|
1265
1485
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1486
|
+
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1266
1487
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1267
1488
|
path: Optional[pulumi.Input[str]] = None,
|
1489
|
+
plugin_version: Optional[pulumi.Input[str]] = None,
|
1268
1490
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
1269
1491
|
schema: Optional[pulumi.Input[str]] = None,
|
1270
1492
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -1283,6 +1505,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1283
1505
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1284
1506
|
:param pulumi.Input[str] accessor: Accessor of the mount
|
1285
1507
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1508
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1286
1509
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1287
1510
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1288
1511
|
:param pulumi.Input[str] binddn: Distinguished name of object to bind when performing user and group search.
|
@@ -1294,11 +1517,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
1294
1517
|
:param pulumi.Input[int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1295
1518
|
the next URL in the configuration.
|
1296
1519
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
1520
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1297
1521
|
:param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
|
1298
1522
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
1299
1523
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1524
|
+
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1300
1525
|
:param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1301
1526
|
Defaults to `false`.
|
1527
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1302
1528
|
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
1303
1529
|
replication.Tolerance duration to use when checking the last rotation time.
|
1304
1530
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
@@ -1307,9 +1533,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
1307
1533
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1308
1534
|
*Available only for Vault Enterprise*.
|
1309
1535
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1536
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1310
1537
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
1311
1538
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
1312
1539
|
not begin or end with a `/`. Defaults to `ldap`.
|
1540
|
+
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1313
1541
|
:param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
1314
1542
|
before returning back an error.
|
1315
1543
|
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
@@ -1329,6 +1557,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1329
1557
|
|
1330
1558
|
__props__.__dict__["accessor"] = accessor
|
1331
1559
|
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1560
|
+
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1332
1561
|
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1333
1562
|
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
1334
1563
|
__props__.__dict__["binddn"] = binddn
|
@@ -1338,16 +1567,21 @@ class SecretBackend(pulumi.CustomResource):
|
|
1338
1567
|
__props__.__dict__["client_tls_key"] = client_tls_key
|
1339
1568
|
__props__.__dict__["connection_timeout"] = connection_timeout
|
1340
1569
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1570
|
+
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
1341
1571
|
__props__.__dict__["description"] = description
|
1342
1572
|
__props__.__dict__["disable_remount"] = disable_remount
|
1343
1573
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1574
|
+
__props__.__dict__["identity_token_key"] = identity_token_key
|
1344
1575
|
__props__.__dict__["insecure_tls"] = insecure_tls
|
1576
|
+
__props__.__dict__["listing_visibility"] = listing_visibility
|
1345
1577
|
__props__.__dict__["local"] = local
|
1346
1578
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
1347
1579
|
__props__.__dict__["namespace"] = namespace
|
1348
1580
|
__props__.__dict__["options"] = options
|
1581
|
+
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1349
1582
|
__props__.__dict__["password_policy"] = password_policy
|
1350
1583
|
__props__.__dict__["path"] = path
|
1584
|
+
__props__.__dict__["plugin_version"] = plugin_version
|
1351
1585
|
__props__.__dict__["request_timeout"] = request_timeout
|
1352
1586
|
__props__.__dict__["schema"] = schema
|
1353
1587
|
__props__.__dict__["seal_wrap"] = seal_wrap
|
@@ -1375,6 +1609,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
1375
1609
|
"""
|
1376
1610
|
return pulumi.get(self, "allowed_managed_keys")
|
1377
1611
|
|
1612
|
+
@property
|
1613
|
+
@pulumi.getter(name="allowedResponseHeaders")
|
1614
|
+
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1615
|
+
"""
|
1616
|
+
List of headers to allow and pass from the request to the plugin
|
1617
|
+
"""
|
1618
|
+
return pulumi.get(self, "allowed_response_headers")
|
1619
|
+
|
1378
1620
|
@property
|
1379
1621
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1380
1622
|
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[str]]:
|
@@ -1449,6 +1691,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
1449
1691
|
"""
|
1450
1692
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1451
1693
|
|
1694
|
+
@property
|
1695
|
+
@pulumi.getter(name="delegatedAuthAccessors")
|
1696
|
+
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1697
|
+
"""
|
1698
|
+
List of headers to allow and pass from the request to the plugin
|
1699
|
+
"""
|
1700
|
+
return pulumi.get(self, "delegated_auth_accessors")
|
1701
|
+
|
1452
1702
|
@property
|
1453
1703
|
@pulumi.getter
|
1454
1704
|
def description(self) -> pulumi.Output[Optional[str]]:
|
@@ -1473,6 +1723,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
1473
1723
|
"""
|
1474
1724
|
return pulumi.get(self, "external_entropy_access")
|
1475
1725
|
|
1726
|
+
@property
|
1727
|
+
@pulumi.getter(name="identityTokenKey")
|
1728
|
+
def identity_token_key(self) -> pulumi.Output[Optional[str]]:
|
1729
|
+
"""
|
1730
|
+
The key to use for signing plugin workload identity tokens
|
1731
|
+
"""
|
1732
|
+
return pulumi.get(self, "identity_token_key")
|
1733
|
+
|
1476
1734
|
@property
|
1477
1735
|
@pulumi.getter(name="insecureTls")
|
1478
1736
|
def insecure_tls(self) -> pulumi.Output[Optional[bool]]:
|
@@ -1482,6 +1740,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
1482
1740
|
"""
|
1483
1741
|
return pulumi.get(self, "insecure_tls")
|
1484
1742
|
|
1743
|
+
@property
|
1744
|
+
@pulumi.getter(name="listingVisibility")
|
1745
|
+
def listing_visibility(self) -> pulumi.Output[Optional[str]]:
|
1746
|
+
"""
|
1747
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
1748
|
+
"""
|
1749
|
+
return pulumi.get(self, "listing_visibility")
|
1750
|
+
|
1485
1751
|
@property
|
1486
1752
|
@pulumi.getter
|
1487
1753
|
def local(self) -> pulumi.Output[Optional[bool]]:
|
@@ -1518,6 +1784,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
1518
1784
|
"""
|
1519
1785
|
return pulumi.get(self, "options")
|
1520
1786
|
|
1787
|
+
@property
|
1788
|
+
@pulumi.getter(name="passthroughRequestHeaders")
|
1789
|
+
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1790
|
+
"""
|
1791
|
+
List of headers to allow and pass from the request to the plugin
|
1792
|
+
"""
|
1793
|
+
return pulumi.get(self, "passthrough_request_headers")
|
1794
|
+
|
1521
1795
|
@property
|
1522
1796
|
@pulumi.getter(name="passwordPolicy")
|
1523
1797
|
def password_policy(self) -> pulumi.Output[Optional[str]]:
|
@@ -1535,6 +1809,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
1535
1809
|
"""
|
1536
1810
|
return pulumi.get(self, "path")
|
1537
1811
|
|
1812
|
+
@property
|
1813
|
+
@pulumi.getter(name="pluginVersion")
|
1814
|
+
def plugin_version(self) -> pulumi.Output[Optional[str]]:
|
1815
|
+
"""
|
1816
|
+
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1817
|
+
"""
|
1818
|
+
return pulumi.get(self, "plugin_version")
|
1819
|
+
|
1538
1820
|
@property
|
1539
1821
|
@pulumi.getter(name="requestTimeout")
|
1540
1822
|
def request_timeout(self) -> pulumi.Output[int]:
|