pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -75,15 +75,34 @@ class CertAuthBackendRoleArgs:
|
|
75
75
|
Requires Vault version 1.13+.
|
76
76
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
|
77
77
|
client certificates
|
78
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
79
|
-
|
80
|
-
|
81
|
-
:param pulumi.Input[
|
82
|
-
|
83
|
-
|
84
|
-
|
85
|
-
:param pulumi.Input[int]
|
86
|
-
|
78
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
79
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
80
|
+
as well.
|
81
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
82
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
83
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
84
|
+
`token_max_ttl` would otherwise allow a renewal.
|
85
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
86
|
+
Its current value will be referenced at renewal time.
|
87
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
88
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
89
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
90
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
91
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
92
|
+
token generated using this role should never expire. The token should be renewed within the
|
93
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
94
|
+
value of this field. Specified in seconds.
|
95
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
96
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
97
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
98
|
+
Its current value will be referenced at renewal time.
|
99
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
100
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
101
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
102
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
103
|
+
requests a different type at generation time.
|
104
|
+
|
105
|
+
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
87
106
|
"""
|
88
107
|
pulumi.set(__self__, "certificate", certificate)
|
89
108
|
if allowed_common_names is not None:
|
@@ -361,7 +380,9 @@ class CertAuthBackendRoleArgs:
|
|
361
380
|
@pulumi.getter(name="tokenBoundCidrs")
|
362
381
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
363
382
|
"""
|
364
|
-
|
383
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
384
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
385
|
+
as well.
|
365
386
|
"""
|
366
387
|
return pulumi.get(self, "token_bound_cidrs")
|
367
388
|
|
@@ -373,7 +394,10 @@ class CertAuthBackendRoleArgs:
|
|
373
394
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
374
395
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
375
396
|
"""
|
376
|
-
|
397
|
+
If set, will encode an
|
398
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
399
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
400
|
+
`token_max_ttl` would otherwise allow a renewal.
|
377
401
|
"""
|
378
402
|
return pulumi.get(self, "token_explicit_max_ttl")
|
379
403
|
|
@@ -385,7 +409,8 @@ class CertAuthBackendRoleArgs:
|
|
385
409
|
@pulumi.getter(name="tokenMaxTtl")
|
386
410
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
387
411
|
"""
|
388
|
-
The maximum lifetime
|
412
|
+
The maximum lifetime for generated tokens in number of seconds.
|
413
|
+
Its current value will be referenced at renewal time.
|
389
414
|
"""
|
390
415
|
return pulumi.get(self, "token_max_ttl")
|
391
416
|
|
@@ -397,7 +422,8 @@ class CertAuthBackendRoleArgs:
|
|
397
422
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
398
423
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
399
424
|
"""
|
400
|
-
If
|
425
|
+
If set, the default policy will not be set on
|
426
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
401
427
|
"""
|
402
428
|
return pulumi.get(self, "token_no_default_policy")
|
403
429
|
|
@@ -409,7 +435,8 @@ class CertAuthBackendRoleArgs:
|
|
409
435
|
@pulumi.getter(name="tokenNumUses")
|
410
436
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
411
437
|
"""
|
412
|
-
The maximum number
|
438
|
+
The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
439
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
413
440
|
"""
|
414
441
|
return pulumi.get(self, "token_num_uses")
|
415
442
|
|
@@ -421,7 +448,10 @@ class CertAuthBackendRoleArgs:
|
|
421
448
|
@pulumi.getter(name="tokenPeriod")
|
422
449
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
423
450
|
"""
|
424
|
-
|
451
|
+
If set, indicates that the
|
452
|
+
token generated using this role should never expire. The token should be renewed within the
|
453
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
454
|
+
value of this field. Specified in seconds.
|
425
455
|
"""
|
426
456
|
return pulumi.get(self, "token_period")
|
427
457
|
|
@@ -433,7 +463,8 @@ class CertAuthBackendRoleArgs:
|
|
433
463
|
@pulumi.getter(name="tokenPolicies")
|
434
464
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
435
465
|
"""
|
436
|
-
|
466
|
+
List of policies to encode onto generated tokens. Depending
|
467
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
437
468
|
"""
|
438
469
|
return pulumi.get(self, "token_policies")
|
439
470
|
|
@@ -445,7 +476,8 @@ class CertAuthBackendRoleArgs:
|
|
445
476
|
@pulumi.getter(name="tokenTtl")
|
446
477
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
447
478
|
"""
|
448
|
-
The
|
479
|
+
The incremental lifetime for generated tokens in number of seconds.
|
480
|
+
Its current value will be referenced at renewal time.
|
449
481
|
"""
|
450
482
|
return pulumi.get(self, "token_ttl")
|
451
483
|
|
@@ -457,7 +489,13 @@ class CertAuthBackendRoleArgs:
|
|
457
489
|
@pulumi.getter(name="tokenType")
|
458
490
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
459
491
|
"""
|
460
|
-
The type of token
|
492
|
+
The type of token that should be generated. Can be `service`,
|
493
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
494
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
495
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
496
|
+
requests a different type at generation time.
|
497
|
+
|
498
|
+
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
461
499
|
"""
|
462
500
|
return pulumi.get(self, "token_type")
|
463
501
|
|
@@ -530,15 +568,34 @@ class _CertAuthBackendRoleState:
|
|
530
568
|
Requires Vault version 1.13+.
|
531
569
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
|
532
570
|
client certificates
|
533
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
534
|
-
|
535
|
-
|
536
|
-
:param pulumi.Input[
|
537
|
-
|
538
|
-
|
539
|
-
|
540
|
-
:param pulumi.Input[int]
|
541
|
-
|
571
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
572
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
573
|
+
as well.
|
574
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
575
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
576
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
577
|
+
`token_max_ttl` would otherwise allow a renewal.
|
578
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
579
|
+
Its current value will be referenced at renewal time.
|
580
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
581
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
582
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
583
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
584
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
585
|
+
token generated using this role should never expire. The token should be renewed within the
|
586
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
587
|
+
value of this field. Specified in seconds.
|
588
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
589
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
590
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
591
|
+
Its current value will be referenced at renewal time.
|
592
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
593
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
594
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
595
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
596
|
+
requests a different type at generation time.
|
597
|
+
|
598
|
+
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
542
599
|
"""
|
543
600
|
if allowed_common_names is not None:
|
544
601
|
pulumi.set(__self__, "allowed_common_names", allowed_common_names)
|
@@ -817,7 +874,9 @@ class _CertAuthBackendRoleState:
|
|
817
874
|
@pulumi.getter(name="tokenBoundCidrs")
|
818
875
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
819
876
|
"""
|
820
|
-
|
877
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
878
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
879
|
+
as well.
|
821
880
|
"""
|
822
881
|
return pulumi.get(self, "token_bound_cidrs")
|
823
882
|
|
@@ -829,7 +888,10 @@ class _CertAuthBackendRoleState:
|
|
829
888
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
830
889
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
831
890
|
"""
|
832
|
-
|
891
|
+
If set, will encode an
|
892
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
893
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
894
|
+
`token_max_ttl` would otherwise allow a renewal.
|
833
895
|
"""
|
834
896
|
return pulumi.get(self, "token_explicit_max_ttl")
|
835
897
|
|
@@ -841,7 +903,8 @@ class _CertAuthBackendRoleState:
|
|
841
903
|
@pulumi.getter(name="tokenMaxTtl")
|
842
904
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
843
905
|
"""
|
844
|
-
The maximum lifetime
|
906
|
+
The maximum lifetime for generated tokens in number of seconds.
|
907
|
+
Its current value will be referenced at renewal time.
|
845
908
|
"""
|
846
909
|
return pulumi.get(self, "token_max_ttl")
|
847
910
|
|
@@ -853,7 +916,8 @@ class _CertAuthBackendRoleState:
|
|
853
916
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
854
917
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
855
918
|
"""
|
856
|
-
If
|
919
|
+
If set, the default policy will not be set on
|
920
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
857
921
|
"""
|
858
922
|
return pulumi.get(self, "token_no_default_policy")
|
859
923
|
|
@@ -865,7 +929,8 @@ class _CertAuthBackendRoleState:
|
|
865
929
|
@pulumi.getter(name="tokenNumUses")
|
866
930
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
867
931
|
"""
|
868
|
-
The maximum number
|
932
|
+
The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
933
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
869
934
|
"""
|
870
935
|
return pulumi.get(self, "token_num_uses")
|
871
936
|
|
@@ -877,7 +942,10 @@ class _CertAuthBackendRoleState:
|
|
877
942
|
@pulumi.getter(name="tokenPeriod")
|
878
943
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
879
944
|
"""
|
880
|
-
|
945
|
+
If set, indicates that the
|
946
|
+
token generated using this role should never expire. The token should be renewed within the
|
947
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
948
|
+
value of this field. Specified in seconds.
|
881
949
|
"""
|
882
950
|
return pulumi.get(self, "token_period")
|
883
951
|
|
@@ -889,7 +957,8 @@ class _CertAuthBackendRoleState:
|
|
889
957
|
@pulumi.getter(name="tokenPolicies")
|
890
958
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
891
959
|
"""
|
892
|
-
|
960
|
+
List of policies to encode onto generated tokens. Depending
|
961
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
893
962
|
"""
|
894
963
|
return pulumi.get(self, "token_policies")
|
895
964
|
|
@@ -901,7 +970,8 @@ class _CertAuthBackendRoleState:
|
|
901
970
|
@pulumi.getter(name="tokenTtl")
|
902
971
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
903
972
|
"""
|
904
|
-
The
|
973
|
+
The incremental lifetime for generated tokens in number of seconds.
|
974
|
+
Its current value will be referenced at renewal time.
|
905
975
|
"""
|
906
976
|
return pulumi.get(self, "token_ttl")
|
907
977
|
|
@@ -913,7 +983,13 @@ class _CertAuthBackendRoleState:
|
|
913
983
|
@pulumi.getter(name="tokenType")
|
914
984
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
915
985
|
"""
|
916
|
-
The type of token
|
986
|
+
The type of token that should be generated. Can be `service`,
|
987
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
988
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
989
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
990
|
+
requests a different type at generation time.
|
991
|
+
|
992
|
+
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
917
993
|
"""
|
918
994
|
return pulumi.get(self, "token_type")
|
919
995
|
|
@@ -959,18 +1035,17 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
959
1035
|
|
960
1036
|
## Example Usage
|
961
1037
|
|
1038
|
+
<!--Start PulumiCodeChooser -->
|
962
1039
|
```python
|
963
1040
|
import pulumi
|
964
|
-
import pulumi_std as std
|
965
1041
|
import pulumi_vault as vault
|
966
1042
|
|
967
|
-
|
1043
|
+
cert_auth_backend = vault.AuthBackend("certAuthBackend",
|
968
1044
|
path="cert",
|
969
1045
|
type="cert")
|
970
|
-
cert_cert_auth_backend_role = vault.CertAuthBackendRole("
|
971
|
-
|
972
|
-
|
973
|
-
backend=cert.path,
|
1046
|
+
cert_cert_auth_backend_role = vault.CertAuthBackendRole("certCertAuthBackendRole",
|
1047
|
+
certificate=(lambda path: open(path).read())("/path/to/certs/ca-cert.pem"),
|
1048
|
+
backend=cert_auth_backend.path,
|
974
1049
|
allowed_names=[
|
975
1050
|
"foo.example.org",
|
976
1051
|
"baz.example.org",
|
@@ -979,6 +1054,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
979
1054
|
token_max_ttl=600,
|
980
1055
|
token_policies=["foo"])
|
981
1056
|
```
|
1057
|
+
<!--End PulumiCodeChooser -->
|
982
1058
|
|
983
1059
|
:param str resource_name: The name of the resource.
|
984
1060
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -1015,15 +1091,34 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1015
1091
|
Requires Vault version 1.13+.
|
1016
1092
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
|
1017
1093
|
client certificates
|
1018
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1019
|
-
|
1020
|
-
|
1021
|
-
:param pulumi.Input[
|
1022
|
-
|
1023
|
-
|
1024
|
-
|
1025
|
-
:param pulumi.Input[int]
|
1026
|
-
|
1094
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
1095
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1096
|
+
as well.
|
1097
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
1098
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1099
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1100
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1101
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
1102
|
+
Its current value will be referenced at renewal time.
|
1103
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1104
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1105
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
1106
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1107
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
1108
|
+
token generated using this role should never expire. The token should be renewed within the
|
1109
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1110
|
+
value of this field. Specified in seconds.
|
1111
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1112
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1113
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1114
|
+
Its current value will be referenced at renewal time.
|
1115
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1116
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1117
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1118
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1119
|
+
requests a different type at generation time.
|
1120
|
+
|
1121
|
+
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
1027
1122
|
"""
|
1028
1123
|
...
|
1029
1124
|
@overload
|
@@ -1036,18 +1131,17 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1036
1131
|
|
1037
1132
|
## Example Usage
|
1038
1133
|
|
1134
|
+
<!--Start PulumiCodeChooser -->
|
1039
1135
|
```python
|
1040
1136
|
import pulumi
|
1041
|
-
import pulumi_std as std
|
1042
1137
|
import pulumi_vault as vault
|
1043
1138
|
|
1044
|
-
|
1139
|
+
cert_auth_backend = vault.AuthBackend("certAuthBackend",
|
1045
1140
|
path="cert",
|
1046
1141
|
type="cert")
|
1047
|
-
cert_cert_auth_backend_role = vault.CertAuthBackendRole("
|
1048
|
-
|
1049
|
-
|
1050
|
-
backend=cert.path,
|
1142
|
+
cert_cert_auth_backend_role = vault.CertAuthBackendRole("certCertAuthBackendRole",
|
1143
|
+
certificate=(lambda path: open(path).read())("/path/to/certs/ca-cert.pem"),
|
1144
|
+
backend=cert_auth_backend.path,
|
1051
1145
|
allowed_names=[
|
1052
1146
|
"foo.example.org",
|
1053
1147
|
"baz.example.org",
|
@@ -1056,6 +1150,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1056
1150
|
token_max_ttl=600,
|
1057
1151
|
token_policies=["foo"])
|
1058
1152
|
```
|
1153
|
+
<!--End PulumiCodeChooser -->
|
1059
1154
|
|
1060
1155
|
:param str resource_name: The name of the resource.
|
1061
1156
|
:param CertAuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
|
@@ -1211,15 +1306,34 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1211
1306
|
Requires Vault version 1.13+.
|
1212
1307
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
|
1213
1308
|
client certificates
|
1214
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1215
|
-
|
1216
|
-
|
1217
|
-
:param pulumi.Input[
|
1218
|
-
|
1219
|
-
|
1220
|
-
|
1221
|
-
:param pulumi.Input[int]
|
1222
|
-
|
1309
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
1310
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1311
|
+
as well.
|
1312
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
1313
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1314
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1315
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1316
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
1317
|
+
Its current value will be referenced at renewal time.
|
1318
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1319
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1320
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
1321
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1322
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
1323
|
+
token generated using this role should never expire. The token should be renewed within the
|
1324
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1325
|
+
value of this field. Specified in seconds.
|
1326
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1327
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1328
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1329
|
+
Its current value will be referenced at renewal time.
|
1330
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1331
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1332
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1333
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1334
|
+
requests a different type at generation time.
|
1335
|
+
|
1336
|
+
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
1223
1337
|
"""
|
1224
1338
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1225
1339
|
|
@@ -1409,7 +1523,9 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1409
1523
|
@pulumi.getter(name="tokenBoundCidrs")
|
1410
1524
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1411
1525
|
"""
|
1412
|
-
|
1526
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
1527
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1528
|
+
as well.
|
1413
1529
|
"""
|
1414
1530
|
return pulumi.get(self, "token_bound_cidrs")
|
1415
1531
|
|
@@ -1417,7 +1533,10 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1417
1533
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1418
1534
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1419
1535
|
"""
|
1420
|
-
|
1536
|
+
If set, will encode an
|
1537
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1538
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1539
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1421
1540
|
"""
|
1422
1541
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1423
1542
|
|
@@ -1425,7 +1544,8 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1425
1544
|
@pulumi.getter(name="tokenMaxTtl")
|
1426
1545
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1427
1546
|
"""
|
1428
|
-
The maximum lifetime
|
1547
|
+
The maximum lifetime for generated tokens in number of seconds.
|
1548
|
+
Its current value will be referenced at renewal time.
|
1429
1549
|
"""
|
1430
1550
|
return pulumi.get(self, "token_max_ttl")
|
1431
1551
|
|
@@ -1433,7 +1553,8 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1433
1553
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1434
1554
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1435
1555
|
"""
|
1436
|
-
If
|
1556
|
+
If set, the default policy will not be set on
|
1557
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1437
1558
|
"""
|
1438
1559
|
return pulumi.get(self, "token_no_default_policy")
|
1439
1560
|
|
@@ -1441,7 +1562,8 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1441
1562
|
@pulumi.getter(name="tokenNumUses")
|
1442
1563
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1443
1564
|
"""
|
1444
|
-
The maximum number
|
1565
|
+
The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
|
1566
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1445
1567
|
"""
|
1446
1568
|
return pulumi.get(self, "token_num_uses")
|
1447
1569
|
|
@@ -1449,7 +1571,10 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1449
1571
|
@pulumi.getter(name="tokenPeriod")
|
1450
1572
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1451
1573
|
"""
|
1452
|
-
|
1574
|
+
If set, indicates that the
|
1575
|
+
token generated using this role should never expire. The token should be renewed within the
|
1576
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1577
|
+
value of this field. Specified in seconds.
|
1453
1578
|
"""
|
1454
1579
|
return pulumi.get(self, "token_period")
|
1455
1580
|
|
@@ -1457,7 +1582,8 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1457
1582
|
@pulumi.getter(name="tokenPolicies")
|
1458
1583
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1459
1584
|
"""
|
1460
|
-
|
1585
|
+
List of policies to encode onto generated tokens. Depending
|
1586
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1461
1587
|
"""
|
1462
1588
|
return pulumi.get(self, "token_policies")
|
1463
1589
|
|
@@ -1465,7 +1591,8 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1465
1591
|
@pulumi.getter(name="tokenTtl")
|
1466
1592
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1467
1593
|
"""
|
1468
|
-
The
|
1594
|
+
The incremental lifetime for generated tokens in number of seconds.
|
1595
|
+
Its current value will be referenced at renewal time.
|
1469
1596
|
"""
|
1470
1597
|
return pulumi.get(self, "token_ttl")
|
1471
1598
|
|
@@ -1473,7 +1600,13 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1473
1600
|
@pulumi.getter(name="tokenType")
|
1474
1601
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1475
1602
|
"""
|
1476
|
-
The type of token
|
1603
|
+
The type of token that should be generated. Can be `service`,
|
1604
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1605
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1606
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1607
|
+
requests a different type at generation time.
|
1608
|
+
|
1609
|
+
For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
1477
1610
|
"""
|
1478
1611
|
return pulumi.get(self, "token_type")
|
1479
1612
|
|
@@ -530,28 +530,32 @@ class SecretBackend(pulumi.CustomResource):
|
|
530
530
|
## Example Usage
|
531
531
|
|
532
532
|
### Creating a standard backend resource:
|
533
|
+
<!--Start PulumiCodeChooser -->
|
533
534
|
```python
|
534
535
|
import pulumi
|
535
536
|
import pulumi_vault as vault
|
536
537
|
|
537
538
|
test = vault.consul.SecretBackend("test",
|
538
|
-
path="consul",
|
539
|
-
description="Manages the Consul backend",
|
540
539
|
address="127.0.0.1:8500",
|
540
|
+
description="Manages the Consul backend",
|
541
|
+
path="consul",
|
541
542
|
token="4240861b-ce3d-8530-115a-521ff070dd29")
|
542
543
|
```
|
544
|
+
<!--End PulumiCodeChooser -->
|
543
545
|
|
544
546
|
### Creating a backend resource to bootstrap a new Consul instance:
|
547
|
+
<!--Start PulumiCodeChooser -->
|
545
548
|
```python
|
546
549
|
import pulumi
|
547
550
|
import pulumi_vault as vault
|
548
551
|
|
549
552
|
test = vault.consul.SecretBackend("test",
|
550
|
-
path="consul",
|
551
|
-
description="Bootstrap the Consul backend",
|
552
553
|
address="127.0.0.1:8500",
|
553
|
-
bootstrap=True
|
554
|
+
bootstrap=True,
|
555
|
+
description="Bootstrap the Consul backend",
|
556
|
+
path="consul")
|
554
557
|
```
|
558
|
+
<!--End PulumiCodeChooser -->
|
555
559
|
|
556
560
|
## Import
|
557
561
|
|
@@ -596,28 +600,32 @@ class SecretBackend(pulumi.CustomResource):
|
|
596
600
|
## Example Usage
|
597
601
|
|
598
602
|
### Creating a standard backend resource:
|
603
|
+
<!--Start PulumiCodeChooser -->
|
599
604
|
```python
|
600
605
|
import pulumi
|
601
606
|
import pulumi_vault as vault
|
602
607
|
|
603
608
|
test = vault.consul.SecretBackend("test",
|
604
|
-
path="consul",
|
605
|
-
description="Manages the Consul backend",
|
606
609
|
address="127.0.0.1:8500",
|
610
|
+
description="Manages the Consul backend",
|
611
|
+
path="consul",
|
607
612
|
token="4240861b-ce3d-8530-115a-521ff070dd29")
|
608
613
|
```
|
614
|
+
<!--End PulumiCodeChooser -->
|
609
615
|
|
610
616
|
### Creating a backend resource to bootstrap a new Consul instance:
|
617
|
+
<!--Start PulumiCodeChooser -->
|
611
618
|
```python
|
612
619
|
import pulumi
|
613
620
|
import pulumi_vault as vault
|
614
621
|
|
615
622
|
test = vault.consul.SecretBackend("test",
|
616
|
-
path="consul",
|
617
|
-
description="Bootstrap the Consul backend",
|
618
623
|
address="127.0.0.1:8500",
|
619
|
-
bootstrap=True
|
624
|
+
bootstrap=True,
|
625
|
+
description="Bootstrap the Consul backend",
|
626
|
+
path="consul")
|
620
627
|
```
|
628
|
+
<!--End PulumiCodeChooser -->
|
621
629
|
|
622
630
|
## Import
|
623
631
|
|