pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -18,20 +18,16 @@ class SecretsMountArgs:
|
|
18
18
|
def __init__(__self__, *,
|
19
19
|
path: pulumi.Input[str],
|
20
20
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
22
21
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
23
22
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
24
23
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
|
25
24
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
|
26
25
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
27
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
28
26
|
description: Optional[pulumi.Input[str]] = None,
|
29
27
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
|
30
28
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
31
29
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
|
32
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
33
30
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
|
34
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
35
31
|
local: Optional[pulumi.Input[bool]] = None,
|
36
32
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
37
33
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
|
@@ -44,8 +40,6 @@ class SecretsMountArgs:
|
|
44
40
|
namespace: Optional[pulumi.Input[str]] = None,
|
45
41
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
46
42
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
47
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
48
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
49
43
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
|
50
44
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
|
51
45
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
|
@@ -58,7 +52,6 @@ class SecretsMountArgs:
|
|
58
52
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
59
53
|
|
60
54
|
The following arguments are common to all database engines:
|
61
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
62
55
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
63
56
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
64
57
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
|
@@ -66,17 +59,14 @@ class SecretsMountArgs:
|
|
66
59
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
|
67
60
|
*See Configuration Options for more info*
|
68
61
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
69
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
70
62
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
71
63
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
72
64
|
*See Configuration Options for more info*
|
73
65
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
74
66
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
75
67
|
*See Configuration Options for more info*
|
76
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
77
68
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
78
69
|
*See Configuration Options for more info*
|
79
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
80
70
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
81
71
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
82
72
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
@@ -97,8 +87,6 @@ class SecretsMountArgs:
|
|
97
87
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
98
88
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
99
89
|
*See Configuration Options for more info*
|
100
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
101
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
102
90
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
103
91
|
*See Configuration Options for more info*
|
104
92
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
|
@@ -114,8 +102,6 @@ class SecretsMountArgs:
|
|
114
102
|
pulumi.set(__self__, "path", path)
|
115
103
|
if allowed_managed_keys is not None:
|
116
104
|
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
117
|
-
if allowed_response_headers is not None:
|
118
|
-
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
119
105
|
if audit_non_hmac_request_keys is not None:
|
120
106
|
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
121
107
|
if audit_non_hmac_response_keys is not None:
|
@@ -126,8 +112,6 @@ class SecretsMountArgs:
|
|
126
112
|
pulumi.set(__self__, "couchbases", couchbases)
|
127
113
|
if default_lease_ttl_seconds is not None:
|
128
114
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
129
|
-
if delegated_auth_accessors is not None:
|
130
|
-
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
131
115
|
if description is not None:
|
132
116
|
pulumi.set(__self__, "description", description)
|
133
117
|
if elasticsearches is not None:
|
@@ -136,12 +120,8 @@ class SecretsMountArgs:
|
|
136
120
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
137
121
|
if hanas is not None:
|
138
122
|
pulumi.set(__self__, "hanas", hanas)
|
139
|
-
if identity_token_key is not None:
|
140
|
-
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
141
123
|
if influxdbs is not None:
|
142
124
|
pulumi.set(__self__, "influxdbs", influxdbs)
|
143
|
-
if listing_visibility is not None:
|
144
|
-
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
145
125
|
if local is not None:
|
146
126
|
pulumi.set(__self__, "local", local)
|
147
127
|
if max_lease_ttl_seconds is not None:
|
@@ -166,10 +146,6 @@ class SecretsMountArgs:
|
|
166
146
|
pulumi.set(__self__, "options", options)
|
167
147
|
if oracles is not None:
|
168
148
|
pulumi.set(__self__, "oracles", oracles)
|
169
|
-
if passthrough_request_headers is not None:
|
170
|
-
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
171
|
-
if plugin_version is not None:
|
172
|
-
pulumi.set(__self__, "plugin_version", plugin_version)
|
173
149
|
if postgresqls is not None:
|
174
150
|
pulumi.set(__self__, "postgresqls", postgresqls)
|
175
151
|
if redis is not None:
|
@@ -209,18 +185,6 @@ class SecretsMountArgs:
|
|
209
185
|
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
210
186
|
pulumi.set(self, "allowed_managed_keys", value)
|
211
187
|
|
212
|
-
@property
|
213
|
-
@pulumi.getter(name="allowedResponseHeaders")
|
214
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
215
|
-
"""
|
216
|
-
List of headers to allow and pass from the request to the plugin
|
217
|
-
"""
|
218
|
-
return pulumi.get(self, "allowed_response_headers")
|
219
|
-
|
220
|
-
@allowed_response_headers.setter
|
221
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
222
|
-
pulumi.set(self, "allowed_response_headers", value)
|
223
|
-
|
224
188
|
@property
|
225
189
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
226
190
|
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -283,18 +247,6 @@ class SecretsMountArgs:
|
|
283
247
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
284
248
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
285
249
|
|
286
|
-
@property
|
287
|
-
@pulumi.getter(name="delegatedAuthAccessors")
|
288
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
289
|
-
"""
|
290
|
-
List of headers to allow and pass from the request to the plugin
|
291
|
-
"""
|
292
|
-
return pulumi.get(self, "delegated_auth_accessors")
|
293
|
-
|
294
|
-
@delegated_auth_accessors.setter
|
295
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
296
|
-
pulumi.set(self, "delegated_auth_accessors", value)
|
297
|
-
|
298
250
|
@property
|
299
251
|
@pulumi.getter
|
300
252
|
def description(self) -> Optional[pulumi.Input[str]]:
|
@@ -345,18 +297,6 @@ class SecretsMountArgs:
|
|
345
297
|
def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
|
346
298
|
pulumi.set(self, "hanas", value)
|
347
299
|
|
348
|
-
@property
|
349
|
-
@pulumi.getter(name="identityTokenKey")
|
350
|
-
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
351
|
-
"""
|
352
|
-
The key to use for signing plugin workload identity tokens
|
353
|
-
"""
|
354
|
-
return pulumi.get(self, "identity_token_key")
|
355
|
-
|
356
|
-
@identity_token_key.setter
|
357
|
-
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
358
|
-
pulumi.set(self, "identity_token_key", value)
|
359
|
-
|
360
300
|
@property
|
361
301
|
@pulumi.getter
|
362
302
|
def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
|
@@ -370,18 +310,6 @@ class SecretsMountArgs:
|
|
370
310
|
def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
|
371
311
|
pulumi.set(self, "influxdbs", value)
|
372
312
|
|
373
|
-
@property
|
374
|
-
@pulumi.getter(name="listingVisibility")
|
375
|
-
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
376
|
-
"""
|
377
|
-
Specifies whether to show this mount in the UI-specific listing endpoint
|
378
|
-
"""
|
379
|
-
return pulumi.get(self, "listing_visibility")
|
380
|
-
|
381
|
-
@listing_visibility.setter
|
382
|
-
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
383
|
-
pulumi.set(self, "listing_visibility", value)
|
384
|
-
|
385
313
|
@property
|
386
314
|
@pulumi.getter
|
387
315
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -534,30 +462,6 @@ class SecretsMountArgs:
|
|
534
462
|
def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
|
535
463
|
pulumi.set(self, "oracles", value)
|
536
464
|
|
537
|
-
@property
|
538
|
-
@pulumi.getter(name="passthroughRequestHeaders")
|
539
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
540
|
-
"""
|
541
|
-
List of headers to allow and pass from the request to the plugin
|
542
|
-
"""
|
543
|
-
return pulumi.get(self, "passthrough_request_headers")
|
544
|
-
|
545
|
-
@passthrough_request_headers.setter
|
546
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
547
|
-
pulumi.set(self, "passthrough_request_headers", value)
|
548
|
-
|
549
|
-
@property
|
550
|
-
@pulumi.getter(name="pluginVersion")
|
551
|
-
def plugin_version(self) -> Optional[pulumi.Input[str]]:
|
552
|
-
"""
|
553
|
-
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
554
|
-
"""
|
555
|
-
return pulumi.get(self, "plugin_version")
|
556
|
-
|
557
|
-
@plugin_version.setter
|
558
|
-
def plugin_version(self, value: Optional[pulumi.Input[str]]):
|
559
|
-
pulumi.set(self, "plugin_version", value)
|
560
|
-
|
561
465
|
@property
|
562
466
|
@pulumi.getter
|
563
467
|
def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
|
@@ -641,21 +545,17 @@ class _SecretsMountState:
|
|
641
545
|
def __init__(__self__, *,
|
642
546
|
accessor: Optional[pulumi.Input[str]] = None,
|
643
547
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
644
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
645
548
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
646
549
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
647
550
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]]] = None,
|
648
551
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]]] = None,
|
649
552
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
650
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
651
553
|
description: Optional[pulumi.Input[str]] = None,
|
652
554
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]]] = None,
|
653
555
|
engine_count: Optional[pulumi.Input[int]] = None,
|
654
556
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
655
557
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]] = None,
|
656
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
657
558
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]] = None,
|
658
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
659
559
|
local: Optional[pulumi.Input[bool]] = None,
|
660
560
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
661
561
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]]] = None,
|
@@ -668,9 +568,7 @@ class _SecretsMountState:
|
|
668
568
|
namespace: Optional[pulumi.Input[str]] = None,
|
669
569
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
670
570
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
|
671
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
672
571
|
path: Optional[pulumi.Input[str]] = None,
|
673
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
674
572
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]] = None,
|
675
573
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]]] = None,
|
676
574
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountRedisElasticachArgs']]]] = None,
|
@@ -683,7 +581,6 @@ class _SecretsMountState:
|
|
683
581
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
684
582
|
|
685
583
|
The following arguments are common to all database engines:
|
686
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
687
584
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
688
585
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
689
586
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCassandraArgs']]] cassandras: A nested block containing configuration options for Cassandra connections.
|
@@ -691,7 +588,6 @@ class _SecretsMountState:
|
|
691
588
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountCouchbaseArgs']]] couchbases: A nested block containing configuration options for Couchbase connections.
|
692
589
|
*See Configuration Options for more info*
|
693
590
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
694
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
695
591
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
696
592
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountElasticsearchArgs']]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
697
593
|
*See Configuration Options for more info*
|
@@ -699,10 +595,8 @@ class _SecretsMountState:
|
|
699
595
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
700
596
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
701
597
|
*See Configuration Options for more info*
|
702
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
703
598
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
704
599
|
*See Configuration Options for more info*
|
705
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
706
600
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
707
601
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
708
602
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountMongodbatlaArgs']]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
@@ -723,9 +617,7 @@ class _SecretsMountState:
|
|
723
617
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
724
618
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
|
725
619
|
*See Configuration Options for more info*
|
726
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
727
620
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
728
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
729
621
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
730
622
|
*See Configuration Options for more info*
|
731
623
|
:param pulumi.Input[Sequence[pulumi.Input['SecretsMountRediArgs']]] redis: A nested block containing configuration options for Redis connections.
|
@@ -742,8 +634,6 @@ class _SecretsMountState:
|
|
742
634
|
pulumi.set(__self__, "accessor", accessor)
|
743
635
|
if allowed_managed_keys is not None:
|
744
636
|
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
745
|
-
if allowed_response_headers is not None:
|
746
|
-
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
747
637
|
if audit_non_hmac_request_keys is not None:
|
748
638
|
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
749
639
|
if audit_non_hmac_response_keys is not None:
|
@@ -754,8 +644,6 @@ class _SecretsMountState:
|
|
754
644
|
pulumi.set(__self__, "couchbases", couchbases)
|
755
645
|
if default_lease_ttl_seconds is not None:
|
756
646
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
757
|
-
if delegated_auth_accessors is not None:
|
758
|
-
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
759
647
|
if description is not None:
|
760
648
|
pulumi.set(__self__, "description", description)
|
761
649
|
if elasticsearches is not None:
|
@@ -766,12 +654,8 @@ class _SecretsMountState:
|
|
766
654
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
767
655
|
if hanas is not None:
|
768
656
|
pulumi.set(__self__, "hanas", hanas)
|
769
|
-
if identity_token_key is not None:
|
770
|
-
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
771
657
|
if influxdbs is not None:
|
772
658
|
pulumi.set(__self__, "influxdbs", influxdbs)
|
773
|
-
if listing_visibility is not None:
|
774
|
-
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
775
659
|
if local is not None:
|
776
660
|
pulumi.set(__self__, "local", local)
|
777
661
|
if max_lease_ttl_seconds is not None:
|
@@ -796,12 +680,8 @@ class _SecretsMountState:
|
|
796
680
|
pulumi.set(__self__, "options", options)
|
797
681
|
if oracles is not None:
|
798
682
|
pulumi.set(__self__, "oracles", oracles)
|
799
|
-
if passthrough_request_headers is not None:
|
800
|
-
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
801
683
|
if path is not None:
|
802
684
|
pulumi.set(__self__, "path", path)
|
803
|
-
if plugin_version is not None:
|
804
|
-
pulumi.set(__self__, "plugin_version", plugin_version)
|
805
685
|
if postgresqls is not None:
|
806
686
|
pulumi.set(__self__, "postgresqls", postgresqls)
|
807
687
|
if redis is not None:
|
@@ -841,18 +721,6 @@ class _SecretsMountState:
|
|
841
721
|
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
842
722
|
pulumi.set(self, "allowed_managed_keys", value)
|
843
723
|
|
844
|
-
@property
|
845
|
-
@pulumi.getter(name="allowedResponseHeaders")
|
846
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
847
|
-
"""
|
848
|
-
List of headers to allow and pass from the request to the plugin
|
849
|
-
"""
|
850
|
-
return pulumi.get(self, "allowed_response_headers")
|
851
|
-
|
852
|
-
@allowed_response_headers.setter
|
853
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
854
|
-
pulumi.set(self, "allowed_response_headers", value)
|
855
|
-
|
856
724
|
@property
|
857
725
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
858
726
|
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -915,18 +783,6 @@ class _SecretsMountState:
|
|
915
783
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
916
784
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
917
785
|
|
918
|
-
@property
|
919
|
-
@pulumi.getter(name="delegatedAuthAccessors")
|
920
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
921
|
-
"""
|
922
|
-
List of headers to allow and pass from the request to the plugin
|
923
|
-
"""
|
924
|
-
return pulumi.get(self, "delegated_auth_accessors")
|
925
|
-
|
926
|
-
@delegated_auth_accessors.setter
|
927
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
928
|
-
pulumi.set(self, "delegated_auth_accessors", value)
|
929
|
-
|
930
786
|
@property
|
931
787
|
@pulumi.getter
|
932
788
|
def description(self) -> Optional[pulumi.Input[str]]:
|
@@ -989,18 +845,6 @@ class _SecretsMountState:
|
|
989
845
|
def hanas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountHanaArgs']]]]):
|
990
846
|
pulumi.set(self, "hanas", value)
|
991
847
|
|
992
|
-
@property
|
993
|
-
@pulumi.getter(name="identityTokenKey")
|
994
|
-
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
995
|
-
"""
|
996
|
-
The key to use for signing plugin workload identity tokens
|
997
|
-
"""
|
998
|
-
return pulumi.get(self, "identity_token_key")
|
999
|
-
|
1000
|
-
@identity_token_key.setter
|
1001
|
-
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
1002
|
-
pulumi.set(self, "identity_token_key", value)
|
1003
|
-
|
1004
848
|
@property
|
1005
849
|
@pulumi.getter
|
1006
850
|
def influxdbs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]:
|
@@ -1014,18 +858,6 @@ class _SecretsMountState:
|
|
1014
858
|
def influxdbs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountInfluxdbArgs']]]]):
|
1015
859
|
pulumi.set(self, "influxdbs", value)
|
1016
860
|
|
1017
|
-
@property
|
1018
|
-
@pulumi.getter(name="listingVisibility")
|
1019
|
-
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
1020
|
-
"""
|
1021
|
-
Specifies whether to show this mount in the UI-specific listing endpoint
|
1022
|
-
"""
|
1023
|
-
return pulumi.get(self, "listing_visibility")
|
1024
|
-
|
1025
|
-
@listing_visibility.setter
|
1026
|
-
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
1027
|
-
pulumi.set(self, "listing_visibility", value)
|
1028
|
-
|
1029
861
|
@property
|
1030
862
|
@pulumi.getter
|
1031
863
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -1178,18 +1010,6 @@ class _SecretsMountState:
|
|
1178
1010
|
def oracles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]]):
|
1179
1011
|
pulumi.set(self, "oracles", value)
|
1180
1012
|
|
1181
|
-
@property
|
1182
|
-
@pulumi.getter(name="passthroughRequestHeaders")
|
1183
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1184
|
-
"""
|
1185
|
-
List of headers to allow and pass from the request to the plugin
|
1186
|
-
"""
|
1187
|
-
return pulumi.get(self, "passthrough_request_headers")
|
1188
|
-
|
1189
|
-
@passthrough_request_headers.setter
|
1190
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
1191
|
-
pulumi.set(self, "passthrough_request_headers", value)
|
1192
|
-
|
1193
1013
|
@property
|
1194
1014
|
@pulumi.getter
|
1195
1015
|
def path(self) -> Optional[pulumi.Input[str]]:
|
@@ -1202,18 +1022,6 @@ class _SecretsMountState:
|
|
1202
1022
|
def path(self, value: Optional[pulumi.Input[str]]):
|
1203
1023
|
pulumi.set(self, "path", value)
|
1204
1024
|
|
1205
|
-
@property
|
1206
|
-
@pulumi.getter(name="pluginVersion")
|
1207
|
-
def plugin_version(self) -> Optional[pulumi.Input[str]]:
|
1208
|
-
"""
|
1209
|
-
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1210
|
-
"""
|
1211
|
-
return pulumi.get(self, "plugin_version")
|
1212
|
-
|
1213
|
-
@plugin_version.setter
|
1214
|
-
def plugin_version(self, value: Optional[pulumi.Input[str]]):
|
1215
|
-
pulumi.set(self, "plugin_version", value)
|
1216
|
-
|
1217
1025
|
@property
|
1218
1026
|
@pulumi.getter
|
1219
1027
|
def postgresqls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountPostgresqlArgs']]]]:
|
@@ -1298,20 +1106,16 @@ class SecretsMount(pulumi.CustomResource):
|
|
1298
1106
|
resource_name: str,
|
1299
1107
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1300
1108
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1301
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1302
1109
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1303
1110
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1304
1111
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]]] = None,
|
1305
1112
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]]] = None,
|
1306
1113
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1307
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1308
1114
|
description: Optional[pulumi.Input[str]] = None,
|
1309
1115
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]]] = None,
|
1310
1116
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1311
1117
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]]] = None,
|
1312
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1313
1118
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]]] = None,
|
1314
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1315
1119
|
local: Optional[pulumi.Input[bool]] = None,
|
1316
1120
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1317
1121
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]]] = None,
|
@@ -1324,9 +1128,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1324
1128
|
namespace: Optional[pulumi.Input[str]] = None,
|
1325
1129
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1326
1130
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]]] = None,
|
1327
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1328
1131
|
path: Optional[pulumi.Input[str]] = None,
|
1329
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
1330
1132
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]]] = None,
|
1331
1133
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]]] = None,
|
1332
1134
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedisElasticachArgs']]]]] = None,
|
@@ -1337,6 +1139,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1337
1139
|
"""
|
1338
1140
|
## Example Usage
|
1339
1141
|
|
1142
|
+
<!--Start PulumiCodeChooser -->
|
1340
1143
|
```python
|
1341
1144
|
import pulumi
|
1342
1145
|
import pulumi_vault as vault
|
@@ -1359,7 +1162,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1359
1162
|
allowed_roles=["dev2"],
|
1360
1163
|
)])
|
1361
1164
|
dev1 = vault.database.SecretBackendRole("dev1",
|
1362
|
-
name="dev1",
|
1363
1165
|
backend=db.path,
|
1364
1166
|
db_name=db.mssqls[0].name,
|
1365
1167
|
creation_statements=[
|
@@ -1368,7 +1170,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1368
1170
|
"GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
|
1369
1171
|
])
|
1370
1172
|
dev2 = vault.database.SecretBackendRole("dev2",
|
1371
|
-
name="dev2",
|
1372
1173
|
backend=db.path,
|
1373
1174
|
db_name=db.postgresqls[0].name,
|
1374
1175
|
creation_statements=[
|
@@ -1376,6 +1177,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1376
1177
|
"GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
|
1377
1178
|
])
|
1378
1179
|
```
|
1180
|
+
<!--End PulumiCodeChooser -->
|
1379
1181
|
|
1380
1182
|
## Import
|
1381
1183
|
|
@@ -1390,7 +1192,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1390
1192
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
1391
1193
|
|
1392
1194
|
The following arguments are common to all database engines:
|
1393
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1394
1195
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1395
1196
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1396
1197
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]] cassandras: A nested block containing configuration options for Cassandra connections.
|
@@ -1398,17 +1199,14 @@ class SecretsMount(pulumi.CustomResource):
|
|
1398
1199
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]] couchbases: A nested block containing configuration options for Couchbase connections.
|
1399
1200
|
*See Configuration Options for more info*
|
1400
1201
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1401
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1402
1202
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
1403
1203
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
1404
1204
|
*See Configuration Options for more info*
|
1405
1205
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1406
1206
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
1407
1207
|
*See Configuration Options for more info*
|
1408
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1409
1208
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
1410
1209
|
*See Configuration Options for more info*
|
1411
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1412
1210
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1413
1211
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1414
1212
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
@@ -1429,9 +1227,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1429
1227
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1430
1228
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]] oracles: A nested block containing configuration options for Oracle connections.
|
1431
1229
|
*See Configuration Options for more info*
|
1432
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1433
1230
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
1434
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1435
1231
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
1436
1232
|
*See Configuration Options for more info*
|
1437
1233
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]] redis: A nested block containing configuration options for Redis connections.
|
@@ -1453,6 +1249,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1453
1249
|
"""
|
1454
1250
|
## Example Usage
|
1455
1251
|
|
1252
|
+
<!--Start PulumiCodeChooser -->
|
1456
1253
|
```python
|
1457
1254
|
import pulumi
|
1458
1255
|
import pulumi_vault as vault
|
@@ -1475,7 +1272,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1475
1272
|
allowed_roles=["dev2"],
|
1476
1273
|
)])
|
1477
1274
|
dev1 = vault.database.SecretBackendRole("dev1",
|
1478
|
-
name="dev1",
|
1479
1275
|
backend=db.path,
|
1480
1276
|
db_name=db.mssqls[0].name,
|
1481
1277
|
creation_statements=[
|
@@ -1484,7 +1280,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1484
1280
|
"GRANT SELECT ON SCHEMA::dbo TO [{{name}}];",
|
1485
1281
|
])
|
1486
1282
|
dev2 = vault.database.SecretBackendRole("dev2",
|
1487
|
-
name="dev2",
|
1488
1283
|
backend=db.path,
|
1489
1284
|
db_name=db.postgresqls[0].name,
|
1490
1285
|
creation_statements=[
|
@@ -1492,6 +1287,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1492
1287
|
"GRANT SELECT ON ALL TABLES IN SCHEMA public TO \\"{{name}}\\";",
|
1493
1288
|
])
|
1494
1289
|
```
|
1290
|
+
<!--End PulumiCodeChooser -->
|
1495
1291
|
|
1496
1292
|
## Import
|
1497
1293
|
|
@@ -1517,20 +1313,16 @@ class SecretsMount(pulumi.CustomResource):
|
|
1517
1313
|
resource_name: str,
|
1518
1314
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1519
1315
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1520
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1521
1316
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1522
1317
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1523
1318
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]]] = None,
|
1524
1319
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]]] = None,
|
1525
1320
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1526
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1527
1321
|
description: Optional[pulumi.Input[str]] = None,
|
1528
1322
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]]] = None,
|
1529
1323
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1530
1324
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]]] = None,
|
1531
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1532
1325
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]]] = None,
|
1533
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1534
1326
|
local: Optional[pulumi.Input[bool]] = None,
|
1535
1327
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1536
1328
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]]] = None,
|
@@ -1543,9 +1335,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1543
1335
|
namespace: Optional[pulumi.Input[str]] = None,
|
1544
1336
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1545
1337
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]]] = None,
|
1546
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1547
1338
|
path: Optional[pulumi.Input[str]] = None,
|
1548
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
1549
1339
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]]] = None,
|
1550
1340
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]]] = None,
|
1551
1341
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedisElasticachArgs']]]]] = None,
|
@@ -1562,20 +1352,16 @@ class SecretsMount(pulumi.CustomResource):
|
|
1562
1352
|
__props__ = SecretsMountArgs.__new__(SecretsMountArgs)
|
1563
1353
|
|
1564
1354
|
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1565
|
-
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1566
1355
|
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1567
1356
|
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
1568
1357
|
__props__.__dict__["cassandras"] = cassandras
|
1569
1358
|
__props__.__dict__["couchbases"] = couchbases
|
1570
1359
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1571
|
-
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
1572
1360
|
__props__.__dict__["description"] = description
|
1573
1361
|
__props__.__dict__["elasticsearches"] = elasticsearches
|
1574
1362
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1575
1363
|
__props__.__dict__["hanas"] = hanas
|
1576
|
-
__props__.__dict__["identity_token_key"] = identity_token_key
|
1577
1364
|
__props__.__dict__["influxdbs"] = influxdbs
|
1578
|
-
__props__.__dict__["listing_visibility"] = listing_visibility
|
1579
1365
|
__props__.__dict__["local"] = local
|
1580
1366
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
1581
1367
|
__props__.__dict__["mongodbatlas"] = mongodbatlas
|
@@ -1588,11 +1374,9 @@ class SecretsMount(pulumi.CustomResource):
|
|
1588
1374
|
__props__.__dict__["namespace"] = namespace
|
1589
1375
|
__props__.__dict__["options"] = options
|
1590
1376
|
__props__.__dict__["oracles"] = oracles
|
1591
|
-
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1592
1377
|
if path is None and not opts.urn:
|
1593
1378
|
raise TypeError("Missing required property 'path'")
|
1594
1379
|
__props__.__dict__["path"] = path
|
1595
|
-
__props__.__dict__["plugin_version"] = plugin_version
|
1596
1380
|
__props__.__dict__["postgresqls"] = postgresqls
|
1597
1381
|
__props__.__dict__["redis"] = redis
|
1598
1382
|
__props__.__dict__["redis_elasticaches"] = redis_elasticaches
|
@@ -1613,21 +1397,17 @@ class SecretsMount(pulumi.CustomResource):
|
|
1613
1397
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1614
1398
|
accessor: Optional[pulumi.Input[str]] = None,
|
1615
1399
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1616
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1617
1400
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1618
1401
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1619
1402
|
cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]]] = None,
|
1620
1403
|
couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]]] = None,
|
1621
1404
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1622
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1623
1405
|
description: Optional[pulumi.Input[str]] = None,
|
1624
1406
|
elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]]] = None,
|
1625
1407
|
engine_count: Optional[pulumi.Input[int]] = None,
|
1626
1408
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1627
1409
|
hanas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]]] = None,
|
1628
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1629
1410
|
influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]]] = None,
|
1630
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1631
1411
|
local: Optional[pulumi.Input[bool]] = None,
|
1632
1412
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1633
1413
|
mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]]] = None,
|
@@ -1640,9 +1420,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1640
1420
|
namespace: Optional[pulumi.Input[str]] = None,
|
1641
1421
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1642
1422
|
oracles: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]]] = None,
|
1643
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1644
1423
|
path: Optional[pulumi.Input[str]] = None,
|
1645
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
1646
1424
|
postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]]] = None,
|
1647
1425
|
redis: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]]] = None,
|
1648
1426
|
redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedisElasticachArgs']]]]] = None,
|
@@ -1660,7 +1438,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1660
1438
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: Set of managed key registry entry names that the mount in question is allowed to access
|
1661
1439
|
|
1662
1440
|
The following arguments are common to all database engines:
|
1663
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1664
1441
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1665
1442
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1666
1443
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]] cassandras: A nested block containing configuration options for Cassandra connections.
|
@@ -1668,7 +1445,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1668
1445
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]] couchbases: A nested block containing configuration options for Couchbase connections.
|
1669
1446
|
*See Configuration Options for more info*
|
1670
1447
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
|
1671
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1672
1448
|
:param pulumi.Input[str] description: Human-friendly description of the mount
|
1673
1449
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
|
1674
1450
|
*See Configuration Options for more info*
|
@@ -1676,10 +1452,8 @@ class SecretsMount(pulumi.CustomResource):
|
|
1676
1452
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
1677
1453
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
|
1678
1454
|
*See Configuration Options for more info*
|
1679
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1680
1455
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
|
1681
1456
|
*See Configuration Options for more info*
|
1682
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1683
1457
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
1684
1458
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1685
1459
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
|
@@ -1700,9 +1474,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1700
1474
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1701
1475
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]] oracles: A nested block containing configuration options for Oracle connections.
|
1702
1476
|
*See Configuration Options for more info*
|
1703
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1704
1477
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
1705
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1706
1478
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
|
1707
1479
|
*See Configuration Options for more info*
|
1708
1480
|
:param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]] redis: A nested block containing configuration options for Redis connections.
|
@@ -1721,21 +1493,17 @@ class SecretsMount(pulumi.CustomResource):
|
|
1721
1493
|
|
1722
1494
|
__props__.__dict__["accessor"] = accessor
|
1723
1495
|
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1724
|
-
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1725
1496
|
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1726
1497
|
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
1727
1498
|
__props__.__dict__["cassandras"] = cassandras
|
1728
1499
|
__props__.__dict__["couchbases"] = couchbases
|
1729
1500
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1730
|
-
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
1731
1501
|
__props__.__dict__["description"] = description
|
1732
1502
|
__props__.__dict__["elasticsearches"] = elasticsearches
|
1733
1503
|
__props__.__dict__["engine_count"] = engine_count
|
1734
1504
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1735
1505
|
__props__.__dict__["hanas"] = hanas
|
1736
|
-
__props__.__dict__["identity_token_key"] = identity_token_key
|
1737
1506
|
__props__.__dict__["influxdbs"] = influxdbs
|
1738
|
-
__props__.__dict__["listing_visibility"] = listing_visibility
|
1739
1507
|
__props__.__dict__["local"] = local
|
1740
1508
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
1741
1509
|
__props__.__dict__["mongodbatlas"] = mongodbatlas
|
@@ -1748,9 +1516,7 @@ class SecretsMount(pulumi.CustomResource):
|
|
1748
1516
|
__props__.__dict__["namespace"] = namespace
|
1749
1517
|
__props__.__dict__["options"] = options
|
1750
1518
|
__props__.__dict__["oracles"] = oracles
|
1751
|
-
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1752
1519
|
__props__.__dict__["path"] = path
|
1753
|
-
__props__.__dict__["plugin_version"] = plugin_version
|
1754
1520
|
__props__.__dict__["postgresqls"] = postgresqls
|
1755
1521
|
__props__.__dict__["redis"] = redis
|
1756
1522
|
__props__.__dict__["redis_elasticaches"] = redis_elasticaches
|
@@ -1777,14 +1543,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1777
1543
|
"""
|
1778
1544
|
return pulumi.get(self, "allowed_managed_keys")
|
1779
1545
|
|
1780
|
-
@property
|
1781
|
-
@pulumi.getter(name="allowedResponseHeaders")
|
1782
|
-
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1783
|
-
"""
|
1784
|
-
List of headers to allow and pass from the request to the plugin
|
1785
|
-
"""
|
1786
|
-
return pulumi.get(self, "allowed_response_headers")
|
1787
|
-
|
1788
1546
|
@property
|
1789
1547
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1790
1548
|
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[str]]:
|
@@ -1827,14 +1585,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1827
1585
|
"""
|
1828
1586
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1829
1587
|
|
1830
|
-
@property
|
1831
|
-
@pulumi.getter(name="delegatedAuthAccessors")
|
1832
|
-
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1833
|
-
"""
|
1834
|
-
List of headers to allow and pass from the request to the plugin
|
1835
|
-
"""
|
1836
|
-
return pulumi.get(self, "delegated_auth_accessors")
|
1837
|
-
|
1838
1588
|
@property
|
1839
1589
|
@pulumi.getter
|
1840
1590
|
def description(self) -> pulumi.Output[Optional[str]]:
|
@@ -1877,14 +1627,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1877
1627
|
"""
|
1878
1628
|
return pulumi.get(self, "hanas")
|
1879
1629
|
|
1880
|
-
@property
|
1881
|
-
@pulumi.getter(name="identityTokenKey")
|
1882
|
-
def identity_token_key(self) -> pulumi.Output[Optional[str]]:
|
1883
|
-
"""
|
1884
|
-
The key to use for signing plugin workload identity tokens
|
1885
|
-
"""
|
1886
|
-
return pulumi.get(self, "identity_token_key")
|
1887
|
-
|
1888
1630
|
@property
|
1889
1631
|
@pulumi.getter
|
1890
1632
|
def influxdbs(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountInfluxdb']]]:
|
@@ -1894,14 +1636,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
1894
1636
|
"""
|
1895
1637
|
return pulumi.get(self, "influxdbs")
|
1896
1638
|
|
1897
|
-
@property
|
1898
|
-
@pulumi.getter(name="listingVisibility")
|
1899
|
-
def listing_visibility(self) -> pulumi.Output[Optional[str]]:
|
1900
|
-
"""
|
1901
|
-
Specifies whether to show this mount in the UI-specific listing endpoint
|
1902
|
-
"""
|
1903
|
-
return pulumi.get(self, "listing_visibility")
|
1904
|
-
|
1905
1639
|
@property
|
1906
1640
|
@pulumi.getter
|
1907
1641
|
def local(self) -> pulumi.Output[Optional[bool]]:
|
@@ -2006,14 +1740,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
2006
1740
|
"""
|
2007
1741
|
return pulumi.get(self, "oracles")
|
2008
1742
|
|
2009
|
-
@property
|
2010
|
-
@pulumi.getter(name="passthroughRequestHeaders")
|
2011
|
-
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
2012
|
-
"""
|
2013
|
-
List of headers to allow and pass from the request to the plugin
|
2014
|
-
"""
|
2015
|
-
return pulumi.get(self, "passthrough_request_headers")
|
2016
|
-
|
2017
1743
|
@property
|
2018
1744
|
@pulumi.getter
|
2019
1745
|
def path(self) -> pulumi.Output[str]:
|
@@ -2022,14 +1748,6 @@ class SecretsMount(pulumi.CustomResource):
|
|
2022
1748
|
"""
|
2023
1749
|
return pulumi.get(self, "path")
|
2024
1750
|
|
2025
|
-
@property
|
2026
|
-
@pulumi.getter(name="pluginVersion")
|
2027
|
-
def plugin_version(self) -> pulumi.Output[Optional[str]]:
|
2028
|
-
"""
|
2029
|
-
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
2030
|
-
"""
|
2031
|
-
return pulumi.get(self, "plugin_version")
|
2032
|
-
|
2033
1751
|
@property
|
2034
1752
|
@pulumi.getter
|
2035
1753
|
def postgresqls(self) -> pulumi.Output[Optional[Sequence['outputs.SecretsMountPostgresql']]]:
|