pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +0 -26
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/auth_backend.py +0 -47
- pulumi_vault/aws/auth_backend_client.py +17 -253
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -56
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -139
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +22 -217
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -286
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +18 -226
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +9 -275
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +225 -91
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -288
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -286
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -350
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -459
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/__init__.py +0 -2
- pulumi_vault/pkisecret/_inputs.py +0 -30
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/outputs.py +0 -54
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -53
- pulumi_vault/quota_rate_limit.py +4 -49
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -94
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
- pulumi_vault/pkisecret/backend_config_est.py +0 -614
- pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
- pulumi_vault/plugin.py +0 -590
- pulumi_vault/plugin_pinned_version.py +0 -293
- pulumi_vault-6.2.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -17,7 +17,6 @@ class SecretBackendArgs:
|
|
17
17
|
binddn: pulumi.Input[str],
|
18
18
|
bindpass: pulumi.Input[str],
|
19
19
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
20
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
20
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
22
21
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
23
22
|
certificate: Optional[pulumi.Input[str]] = None,
|
@@ -25,21 +24,16 @@ class SecretBackendArgs:
|
|
25
24
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
26
25
|
connection_timeout: Optional[pulumi.Input[int]] = None,
|
27
26
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
28
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
29
27
|
description: Optional[pulumi.Input[str]] = None,
|
30
28
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
31
29
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
32
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
33
30
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
34
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
35
31
|
local: Optional[pulumi.Input[bool]] = None,
|
36
32
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
37
33
|
namespace: Optional[pulumi.Input[str]] = None,
|
38
34
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
39
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
40
35
|
password_policy: Optional[pulumi.Input[str]] = None,
|
41
36
|
path: Optional[pulumi.Input[str]] = None,
|
42
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
43
37
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
44
38
|
schema: Optional[pulumi.Input[str]] = None,
|
45
39
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -54,7 +48,6 @@ class SecretBackendArgs:
|
|
54
48
|
:param pulumi.Input[str] binddn: Distinguished name of object to bind when performing user and group search.
|
55
49
|
:param pulumi.Input[str] bindpass: Password to use along with binddn when performing user search.
|
56
50
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
57
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
58
51
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
59
52
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
60
53
|
:param pulumi.Input[str] certificate: CA certificate to use when verifying LDAP server certificate, must be
|
@@ -64,14 +57,11 @@ class SecretBackendArgs:
|
|
64
57
|
:param pulumi.Input[int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
65
58
|
the next URL in the configuration.
|
66
59
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
67
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
68
60
|
:param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
|
69
61
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
70
62
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
71
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
72
63
|
:param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
73
64
|
Defaults to `false`.
|
74
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
75
65
|
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
76
66
|
replication.Tolerance duration to use when checking the last rotation time.
|
77
67
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
@@ -80,11 +70,9 @@ class SecretBackendArgs:
|
|
80
70
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
81
71
|
*Available only for Vault Enterprise*.
|
82
72
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
83
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
84
73
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
85
74
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
86
75
|
not begin or end with a `/`. Defaults to `ldap`.
|
87
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
88
76
|
:param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
89
77
|
before returning back an error.
|
90
78
|
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
@@ -102,8 +90,6 @@ class SecretBackendArgs:
|
|
102
90
|
pulumi.set(__self__, "bindpass", bindpass)
|
103
91
|
if allowed_managed_keys is not None:
|
104
92
|
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
105
|
-
if allowed_response_headers is not None:
|
106
|
-
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
107
93
|
if audit_non_hmac_request_keys is not None:
|
108
94
|
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
109
95
|
if audit_non_hmac_response_keys is not None:
|
@@ -118,20 +104,14 @@ class SecretBackendArgs:
|
|
118
104
|
pulumi.set(__self__, "connection_timeout", connection_timeout)
|
119
105
|
if default_lease_ttl_seconds is not None:
|
120
106
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
121
|
-
if delegated_auth_accessors is not None:
|
122
|
-
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
123
107
|
if description is not None:
|
124
108
|
pulumi.set(__self__, "description", description)
|
125
109
|
if disable_remount is not None:
|
126
110
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
127
111
|
if external_entropy_access is not None:
|
128
112
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
129
|
-
if identity_token_key is not None:
|
130
|
-
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
131
113
|
if insecure_tls is not None:
|
132
114
|
pulumi.set(__self__, "insecure_tls", insecure_tls)
|
133
|
-
if listing_visibility is not None:
|
134
|
-
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
135
115
|
if local is not None:
|
136
116
|
pulumi.set(__self__, "local", local)
|
137
117
|
if max_lease_ttl_seconds is not None:
|
@@ -140,14 +120,10 @@ class SecretBackendArgs:
|
|
140
120
|
pulumi.set(__self__, "namespace", namespace)
|
141
121
|
if options is not None:
|
142
122
|
pulumi.set(__self__, "options", options)
|
143
|
-
if passthrough_request_headers is not None:
|
144
|
-
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
145
123
|
if password_policy is not None:
|
146
124
|
pulumi.set(__self__, "password_policy", password_policy)
|
147
125
|
if path is not None:
|
148
126
|
pulumi.set(__self__, "path", path)
|
149
|
-
if plugin_version is not None:
|
150
|
-
pulumi.set(__self__, "plugin_version", plugin_version)
|
151
127
|
if request_timeout is not None:
|
152
128
|
pulumi.set(__self__, "request_timeout", request_timeout)
|
153
129
|
if schema is not None:
|
@@ -203,18 +179,6 @@ class SecretBackendArgs:
|
|
203
179
|
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
204
180
|
pulumi.set(self, "allowed_managed_keys", value)
|
205
181
|
|
206
|
-
@property
|
207
|
-
@pulumi.getter(name="allowedResponseHeaders")
|
208
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
209
|
-
"""
|
210
|
-
List of headers to allow and pass from the request to the plugin
|
211
|
-
"""
|
212
|
-
return pulumi.get(self, "allowed_response_headers")
|
213
|
-
|
214
|
-
@allowed_response_headers.setter
|
215
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
216
|
-
pulumi.set(self, "allowed_response_headers", value)
|
217
|
-
|
218
182
|
@property
|
219
183
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
220
184
|
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -301,18 +265,6 @@ class SecretBackendArgs:
|
|
301
265
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
302
266
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
303
267
|
|
304
|
-
@property
|
305
|
-
@pulumi.getter(name="delegatedAuthAccessors")
|
306
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
307
|
-
"""
|
308
|
-
List of headers to allow and pass from the request to the plugin
|
309
|
-
"""
|
310
|
-
return pulumi.get(self, "delegated_auth_accessors")
|
311
|
-
|
312
|
-
@delegated_auth_accessors.setter
|
313
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
314
|
-
pulumi.set(self, "delegated_auth_accessors", value)
|
315
|
-
|
316
268
|
@property
|
317
269
|
@pulumi.getter
|
318
270
|
def description(self) -> Optional[pulumi.Input[str]]:
|
@@ -349,18 +301,6 @@ class SecretBackendArgs:
|
|
349
301
|
def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
|
350
302
|
pulumi.set(self, "external_entropy_access", value)
|
351
303
|
|
352
|
-
@property
|
353
|
-
@pulumi.getter(name="identityTokenKey")
|
354
|
-
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
355
|
-
"""
|
356
|
-
The key to use for signing plugin workload identity tokens
|
357
|
-
"""
|
358
|
-
return pulumi.get(self, "identity_token_key")
|
359
|
-
|
360
|
-
@identity_token_key.setter
|
361
|
-
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
362
|
-
pulumi.set(self, "identity_token_key", value)
|
363
|
-
|
364
304
|
@property
|
365
305
|
@pulumi.getter(name="insecureTls")
|
366
306
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -374,18 +314,6 @@ class SecretBackendArgs:
|
|
374
314
|
def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
|
375
315
|
pulumi.set(self, "insecure_tls", value)
|
376
316
|
|
377
|
-
@property
|
378
|
-
@pulumi.getter(name="listingVisibility")
|
379
|
-
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
380
|
-
"""
|
381
|
-
Specifies whether to show this mount in the UI-specific listing endpoint
|
382
|
-
"""
|
383
|
-
return pulumi.get(self, "listing_visibility")
|
384
|
-
|
385
|
-
@listing_visibility.setter
|
386
|
-
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
387
|
-
pulumi.set(self, "listing_visibility", value)
|
388
|
-
|
389
317
|
@property
|
390
318
|
@pulumi.getter
|
391
319
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -438,18 +366,6 @@ class SecretBackendArgs:
|
|
438
366
|
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
439
367
|
pulumi.set(self, "options", value)
|
440
368
|
|
441
|
-
@property
|
442
|
-
@pulumi.getter(name="passthroughRequestHeaders")
|
443
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
444
|
-
"""
|
445
|
-
List of headers to allow and pass from the request to the plugin
|
446
|
-
"""
|
447
|
-
return pulumi.get(self, "passthrough_request_headers")
|
448
|
-
|
449
|
-
@passthrough_request_headers.setter
|
450
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
451
|
-
pulumi.set(self, "passthrough_request_headers", value)
|
452
|
-
|
453
369
|
@property
|
454
370
|
@pulumi.getter(name="passwordPolicy")
|
455
371
|
def password_policy(self) -> Optional[pulumi.Input[str]]:
|
@@ -475,18 +391,6 @@ class SecretBackendArgs:
|
|
475
391
|
def path(self, value: Optional[pulumi.Input[str]]):
|
476
392
|
pulumi.set(self, "path", value)
|
477
393
|
|
478
|
-
@property
|
479
|
-
@pulumi.getter(name="pluginVersion")
|
480
|
-
def plugin_version(self) -> Optional[pulumi.Input[str]]:
|
481
|
-
"""
|
482
|
-
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
483
|
-
"""
|
484
|
-
return pulumi.get(self, "plugin_version")
|
485
|
-
|
486
|
-
@plugin_version.setter
|
487
|
-
def plugin_version(self, value: Optional[pulumi.Input[str]]):
|
488
|
-
pulumi.set(self, "plugin_version", value)
|
489
|
-
|
490
394
|
@property
|
491
395
|
@pulumi.getter(name="requestTimeout")
|
492
396
|
def request_timeout(self) -> Optional[pulumi.Input[int]]:
|
@@ -604,7 +508,6 @@ class _SecretBackendState:
|
|
604
508
|
def __init__(__self__, *,
|
605
509
|
accessor: Optional[pulumi.Input[str]] = None,
|
606
510
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
607
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
608
511
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
609
512
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
610
513
|
binddn: Optional[pulumi.Input[str]] = None,
|
@@ -614,21 +517,16 @@ class _SecretBackendState:
|
|
614
517
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
615
518
|
connection_timeout: Optional[pulumi.Input[int]] = None,
|
616
519
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
617
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
618
520
|
description: Optional[pulumi.Input[str]] = None,
|
619
521
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
620
522
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
621
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
622
523
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
623
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
624
524
|
local: Optional[pulumi.Input[bool]] = None,
|
625
525
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
626
526
|
namespace: Optional[pulumi.Input[str]] = None,
|
627
527
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
628
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
629
528
|
password_policy: Optional[pulumi.Input[str]] = None,
|
630
529
|
path: Optional[pulumi.Input[str]] = None,
|
631
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
632
530
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
633
531
|
schema: Optional[pulumi.Input[str]] = None,
|
634
532
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -642,7 +540,6 @@ class _SecretBackendState:
|
|
642
540
|
Input properties used for looking up and filtering SecretBackend resources.
|
643
541
|
:param pulumi.Input[str] accessor: Accessor of the mount
|
644
542
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
645
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
646
543
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
647
544
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
648
545
|
:param pulumi.Input[str] binddn: Distinguished name of object to bind when performing user and group search.
|
@@ -654,14 +551,11 @@ class _SecretBackendState:
|
|
654
551
|
:param pulumi.Input[int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
655
552
|
the next URL in the configuration.
|
656
553
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
657
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
658
554
|
:param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
|
659
555
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
660
556
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
661
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
662
557
|
:param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
663
558
|
Defaults to `false`.
|
664
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
665
559
|
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
666
560
|
replication.Tolerance duration to use when checking the last rotation time.
|
667
561
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
@@ -670,11 +564,9 @@ class _SecretBackendState:
|
|
670
564
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
671
565
|
*Available only for Vault Enterprise*.
|
672
566
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
673
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
674
567
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
675
568
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
676
569
|
not begin or end with a `/`. Defaults to `ldap`.
|
677
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
678
570
|
:param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
679
571
|
before returning back an error.
|
680
572
|
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
@@ -692,8 +584,6 @@ class _SecretBackendState:
|
|
692
584
|
pulumi.set(__self__, "accessor", accessor)
|
693
585
|
if allowed_managed_keys is not None:
|
694
586
|
pulumi.set(__self__, "allowed_managed_keys", allowed_managed_keys)
|
695
|
-
if allowed_response_headers is not None:
|
696
|
-
pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
|
697
587
|
if audit_non_hmac_request_keys is not None:
|
698
588
|
pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
|
699
589
|
if audit_non_hmac_response_keys is not None:
|
@@ -712,20 +602,14 @@ class _SecretBackendState:
|
|
712
602
|
pulumi.set(__self__, "connection_timeout", connection_timeout)
|
713
603
|
if default_lease_ttl_seconds is not None:
|
714
604
|
pulumi.set(__self__, "default_lease_ttl_seconds", default_lease_ttl_seconds)
|
715
|
-
if delegated_auth_accessors is not None:
|
716
|
-
pulumi.set(__self__, "delegated_auth_accessors", delegated_auth_accessors)
|
717
605
|
if description is not None:
|
718
606
|
pulumi.set(__self__, "description", description)
|
719
607
|
if disable_remount is not None:
|
720
608
|
pulumi.set(__self__, "disable_remount", disable_remount)
|
721
609
|
if external_entropy_access is not None:
|
722
610
|
pulumi.set(__self__, "external_entropy_access", external_entropy_access)
|
723
|
-
if identity_token_key is not None:
|
724
|
-
pulumi.set(__self__, "identity_token_key", identity_token_key)
|
725
611
|
if insecure_tls is not None:
|
726
612
|
pulumi.set(__self__, "insecure_tls", insecure_tls)
|
727
|
-
if listing_visibility is not None:
|
728
|
-
pulumi.set(__self__, "listing_visibility", listing_visibility)
|
729
613
|
if local is not None:
|
730
614
|
pulumi.set(__self__, "local", local)
|
731
615
|
if max_lease_ttl_seconds is not None:
|
@@ -734,14 +618,10 @@ class _SecretBackendState:
|
|
734
618
|
pulumi.set(__self__, "namespace", namespace)
|
735
619
|
if options is not None:
|
736
620
|
pulumi.set(__self__, "options", options)
|
737
|
-
if passthrough_request_headers is not None:
|
738
|
-
pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
|
739
621
|
if password_policy is not None:
|
740
622
|
pulumi.set(__self__, "password_policy", password_policy)
|
741
623
|
if path is not None:
|
742
624
|
pulumi.set(__self__, "path", path)
|
743
|
-
if plugin_version is not None:
|
744
|
-
pulumi.set(__self__, "plugin_version", plugin_version)
|
745
625
|
if request_timeout is not None:
|
746
626
|
pulumi.set(__self__, "request_timeout", request_timeout)
|
747
627
|
if schema is not None:
|
@@ -785,18 +665,6 @@ class _SecretBackendState:
|
|
785
665
|
def allowed_managed_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
786
666
|
pulumi.set(self, "allowed_managed_keys", value)
|
787
667
|
|
788
|
-
@property
|
789
|
-
@pulumi.getter(name="allowedResponseHeaders")
|
790
|
-
def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
791
|
-
"""
|
792
|
-
List of headers to allow and pass from the request to the plugin
|
793
|
-
"""
|
794
|
-
return pulumi.get(self, "allowed_response_headers")
|
795
|
-
|
796
|
-
@allowed_response_headers.setter
|
797
|
-
def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
798
|
-
pulumi.set(self, "allowed_response_headers", value)
|
799
|
-
|
800
668
|
@property
|
801
669
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
802
670
|
def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -907,18 +775,6 @@ class _SecretBackendState:
|
|
907
775
|
def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
|
908
776
|
pulumi.set(self, "default_lease_ttl_seconds", value)
|
909
777
|
|
910
|
-
@property
|
911
|
-
@pulumi.getter(name="delegatedAuthAccessors")
|
912
|
-
def delegated_auth_accessors(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
913
|
-
"""
|
914
|
-
List of headers to allow and pass from the request to the plugin
|
915
|
-
"""
|
916
|
-
return pulumi.get(self, "delegated_auth_accessors")
|
917
|
-
|
918
|
-
@delegated_auth_accessors.setter
|
919
|
-
def delegated_auth_accessors(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
920
|
-
pulumi.set(self, "delegated_auth_accessors", value)
|
921
|
-
|
922
778
|
@property
|
923
779
|
@pulumi.getter
|
924
780
|
def description(self) -> Optional[pulumi.Input[str]]:
|
@@ -955,18 +811,6 @@ class _SecretBackendState:
|
|
955
811
|
def external_entropy_access(self, value: Optional[pulumi.Input[bool]]):
|
956
812
|
pulumi.set(self, "external_entropy_access", value)
|
957
813
|
|
958
|
-
@property
|
959
|
-
@pulumi.getter(name="identityTokenKey")
|
960
|
-
def identity_token_key(self) -> Optional[pulumi.Input[str]]:
|
961
|
-
"""
|
962
|
-
The key to use for signing plugin workload identity tokens
|
963
|
-
"""
|
964
|
-
return pulumi.get(self, "identity_token_key")
|
965
|
-
|
966
|
-
@identity_token_key.setter
|
967
|
-
def identity_token_key(self, value: Optional[pulumi.Input[str]]):
|
968
|
-
pulumi.set(self, "identity_token_key", value)
|
969
|
-
|
970
814
|
@property
|
971
815
|
@pulumi.getter(name="insecureTls")
|
972
816
|
def insecure_tls(self) -> Optional[pulumi.Input[bool]]:
|
@@ -980,18 +824,6 @@ class _SecretBackendState:
|
|
980
824
|
def insecure_tls(self, value: Optional[pulumi.Input[bool]]):
|
981
825
|
pulumi.set(self, "insecure_tls", value)
|
982
826
|
|
983
|
-
@property
|
984
|
-
@pulumi.getter(name="listingVisibility")
|
985
|
-
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
986
|
-
"""
|
987
|
-
Specifies whether to show this mount in the UI-specific listing endpoint
|
988
|
-
"""
|
989
|
-
return pulumi.get(self, "listing_visibility")
|
990
|
-
|
991
|
-
@listing_visibility.setter
|
992
|
-
def listing_visibility(self, value: Optional[pulumi.Input[str]]):
|
993
|
-
pulumi.set(self, "listing_visibility", value)
|
994
|
-
|
995
827
|
@property
|
996
828
|
@pulumi.getter
|
997
829
|
def local(self) -> Optional[pulumi.Input[bool]]:
|
@@ -1044,18 +876,6 @@ class _SecretBackendState:
|
|
1044
876
|
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
1045
877
|
pulumi.set(self, "options", value)
|
1046
878
|
|
1047
|
-
@property
|
1048
|
-
@pulumi.getter(name="passthroughRequestHeaders")
|
1049
|
-
def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1050
|
-
"""
|
1051
|
-
List of headers to allow and pass from the request to the plugin
|
1052
|
-
"""
|
1053
|
-
return pulumi.get(self, "passthrough_request_headers")
|
1054
|
-
|
1055
|
-
@passthrough_request_headers.setter
|
1056
|
-
def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
1057
|
-
pulumi.set(self, "passthrough_request_headers", value)
|
1058
|
-
|
1059
879
|
@property
|
1060
880
|
@pulumi.getter(name="passwordPolicy")
|
1061
881
|
def password_policy(self) -> Optional[pulumi.Input[str]]:
|
@@ -1081,18 +901,6 @@ class _SecretBackendState:
|
|
1081
901
|
def path(self, value: Optional[pulumi.Input[str]]):
|
1082
902
|
pulumi.set(self, "path", value)
|
1083
903
|
|
1084
|
-
@property
|
1085
|
-
@pulumi.getter(name="pluginVersion")
|
1086
|
-
def plugin_version(self) -> Optional[pulumi.Input[str]]:
|
1087
|
-
"""
|
1088
|
-
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1089
|
-
"""
|
1090
|
-
return pulumi.get(self, "plugin_version")
|
1091
|
-
|
1092
|
-
@plugin_version.setter
|
1093
|
-
def plugin_version(self, value: Optional[pulumi.Input[str]]):
|
1094
|
-
pulumi.set(self, "plugin_version", value)
|
1095
|
-
|
1096
904
|
@property
|
1097
905
|
@pulumi.getter(name="requestTimeout")
|
1098
906
|
def request_timeout(self) -> Optional[pulumi.Input[int]]:
|
@@ -1211,7 +1019,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1211
1019
|
resource_name: str,
|
1212
1020
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1213
1021
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1214
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1215
1022
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1216
1023
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1217
1024
|
binddn: Optional[pulumi.Input[str]] = None,
|
@@ -1221,21 +1028,16 @@ class SecretBackend(pulumi.CustomResource):
|
|
1221
1028
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1222
1029
|
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1223
1030
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1224
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1225
1031
|
description: Optional[pulumi.Input[str]] = None,
|
1226
1032
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
1227
1033
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1228
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1229
1034
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
1230
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1231
1035
|
local: Optional[pulumi.Input[bool]] = None,
|
1232
1036
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1233
1037
|
namespace: Optional[pulumi.Input[str]] = None,
|
1234
1038
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1235
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1236
1039
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1237
1040
|
path: Optional[pulumi.Input[str]] = None,
|
1238
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
1239
1041
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
1240
1042
|
schema: Optional[pulumi.Input[str]] = None,
|
1241
1043
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -1249,18 +1051,20 @@ class SecretBackend(pulumi.CustomResource):
|
|
1249
1051
|
"""
|
1250
1052
|
## Example Usage
|
1251
1053
|
|
1054
|
+
<!--Start PulumiCodeChooser -->
|
1252
1055
|
```python
|
1253
1056
|
import pulumi
|
1254
1057
|
import pulumi_vault as vault
|
1255
1058
|
|
1256
1059
|
config = vault.ldap.SecretBackend("config",
|
1257
|
-
path="my-custom-ldap",
|
1258
1060
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1259
1061
|
bindpass="SuperSecretPassw0rd",
|
1260
|
-
url="ldaps://localhost",
|
1261
1062
|
insecure_tls=True,
|
1063
|
+
path="my-custom-ldap",
|
1064
|
+
url="ldaps://localhost",
|
1262
1065
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1263
1066
|
```
|
1067
|
+
<!--End PulumiCodeChooser -->
|
1264
1068
|
|
1265
1069
|
## Import
|
1266
1070
|
|
@@ -1273,7 +1077,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1273
1077
|
:param str resource_name: The name of the resource.
|
1274
1078
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1275
1079
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1276
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1277
1080
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1278
1081
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1279
1082
|
:param pulumi.Input[str] binddn: Distinguished name of object to bind when performing user and group search.
|
@@ -1285,14 +1088,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
1285
1088
|
:param pulumi.Input[int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1286
1089
|
the next URL in the configuration.
|
1287
1090
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
1288
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1289
1091
|
:param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
|
1290
1092
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
1291
1093
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1292
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1293
1094
|
:param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1294
1095
|
Defaults to `false`.
|
1295
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1296
1096
|
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
1297
1097
|
replication.Tolerance duration to use when checking the last rotation time.
|
1298
1098
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
@@ -1301,11 +1101,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
1301
1101
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1302
1102
|
*Available only for Vault Enterprise*.
|
1303
1103
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1304
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1305
1104
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
1306
1105
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
1307
1106
|
not begin or end with a `/`. Defaults to `ldap`.
|
1308
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1309
1107
|
:param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
1310
1108
|
before returning back an error.
|
1311
1109
|
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
@@ -1328,18 +1126,20 @@ class SecretBackend(pulumi.CustomResource):
|
|
1328
1126
|
"""
|
1329
1127
|
## Example Usage
|
1330
1128
|
|
1129
|
+
<!--Start PulumiCodeChooser -->
|
1331
1130
|
```python
|
1332
1131
|
import pulumi
|
1333
1132
|
import pulumi_vault as vault
|
1334
1133
|
|
1335
1134
|
config = vault.ldap.SecretBackend("config",
|
1336
|
-
path="my-custom-ldap",
|
1337
1135
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1338
1136
|
bindpass="SuperSecretPassw0rd",
|
1339
|
-
url="ldaps://localhost",
|
1340
1137
|
insecure_tls=True,
|
1138
|
+
path="my-custom-ldap",
|
1139
|
+
url="ldaps://localhost",
|
1341
1140
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1342
1141
|
```
|
1142
|
+
<!--End PulumiCodeChooser -->
|
1343
1143
|
|
1344
1144
|
## Import
|
1345
1145
|
|
@@ -1365,7 +1165,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1365
1165
|
resource_name: str,
|
1366
1166
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1367
1167
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1368
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1369
1168
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1370
1169
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1371
1170
|
binddn: Optional[pulumi.Input[str]] = None,
|
@@ -1375,21 +1174,16 @@ class SecretBackend(pulumi.CustomResource):
|
|
1375
1174
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1376
1175
|
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1377
1176
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1378
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1379
1177
|
description: Optional[pulumi.Input[str]] = None,
|
1380
1178
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
1381
1179
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1382
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1383
1180
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
1384
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1385
1181
|
local: Optional[pulumi.Input[bool]] = None,
|
1386
1182
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1387
1183
|
namespace: Optional[pulumi.Input[str]] = None,
|
1388
1184
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1389
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1390
1185
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1391
1186
|
path: Optional[pulumi.Input[str]] = None,
|
1392
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
1393
1187
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
1394
1188
|
schema: Optional[pulumi.Input[str]] = None,
|
1395
1189
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -1409,7 +1203,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1409
1203
|
__props__ = SecretBackendArgs.__new__(SecretBackendArgs)
|
1410
1204
|
|
1411
1205
|
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1412
|
-
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1413
1206
|
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1414
1207
|
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
1415
1208
|
if binddn is None and not opts.urn:
|
@@ -1423,21 +1216,16 @@ class SecretBackend(pulumi.CustomResource):
|
|
1423
1216
|
__props__.__dict__["client_tls_key"] = None if client_tls_key is None else pulumi.Output.secret(client_tls_key)
|
1424
1217
|
__props__.__dict__["connection_timeout"] = connection_timeout
|
1425
1218
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1426
|
-
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
1427
1219
|
__props__.__dict__["description"] = description
|
1428
1220
|
__props__.__dict__["disable_remount"] = disable_remount
|
1429
1221
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1430
|
-
__props__.__dict__["identity_token_key"] = identity_token_key
|
1431
1222
|
__props__.__dict__["insecure_tls"] = insecure_tls
|
1432
|
-
__props__.__dict__["listing_visibility"] = listing_visibility
|
1433
1223
|
__props__.__dict__["local"] = local
|
1434
1224
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
1435
1225
|
__props__.__dict__["namespace"] = namespace
|
1436
1226
|
__props__.__dict__["options"] = options
|
1437
|
-
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1438
1227
|
__props__.__dict__["password_policy"] = password_policy
|
1439
1228
|
__props__.__dict__["path"] = path
|
1440
|
-
__props__.__dict__["plugin_version"] = plugin_version
|
1441
1229
|
__props__.__dict__["request_timeout"] = request_timeout
|
1442
1230
|
__props__.__dict__["schema"] = schema
|
1443
1231
|
__props__.__dict__["seal_wrap"] = seal_wrap
|
@@ -1462,7 +1250,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1462
1250
|
opts: Optional[pulumi.ResourceOptions] = None,
|
1463
1251
|
accessor: Optional[pulumi.Input[str]] = None,
|
1464
1252
|
allowed_managed_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1465
|
-
allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1466
1253
|
audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1467
1254
|
audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1468
1255
|
binddn: Optional[pulumi.Input[str]] = None,
|
@@ -1472,21 +1259,16 @@ class SecretBackend(pulumi.CustomResource):
|
|
1472
1259
|
client_tls_key: Optional[pulumi.Input[str]] = None,
|
1473
1260
|
connection_timeout: Optional[pulumi.Input[int]] = None,
|
1474
1261
|
default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1475
|
-
delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1476
1262
|
description: Optional[pulumi.Input[str]] = None,
|
1477
1263
|
disable_remount: Optional[pulumi.Input[bool]] = None,
|
1478
1264
|
external_entropy_access: Optional[pulumi.Input[bool]] = None,
|
1479
|
-
identity_token_key: Optional[pulumi.Input[str]] = None,
|
1480
1265
|
insecure_tls: Optional[pulumi.Input[bool]] = None,
|
1481
|
-
listing_visibility: Optional[pulumi.Input[str]] = None,
|
1482
1266
|
local: Optional[pulumi.Input[bool]] = None,
|
1483
1267
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1484
1268
|
namespace: Optional[pulumi.Input[str]] = None,
|
1485
1269
|
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1486
|
-
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1487
1270
|
password_policy: Optional[pulumi.Input[str]] = None,
|
1488
1271
|
path: Optional[pulumi.Input[str]] = None,
|
1489
|
-
plugin_version: Optional[pulumi.Input[str]] = None,
|
1490
1272
|
request_timeout: Optional[pulumi.Input[int]] = None,
|
1491
1273
|
schema: Optional[pulumi.Input[str]] = None,
|
1492
1274
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -1505,7 +1287,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1505
1287
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
1506
1288
|
:param pulumi.Input[str] accessor: Accessor of the mount
|
1507
1289
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_managed_keys: List of managed key registry entry names that the mount in question is allowed to access
|
1508
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
|
1509
1290
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
1510
1291
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
|
1511
1292
|
:param pulumi.Input[str] binddn: Distinguished name of object to bind when performing user and group search.
|
@@ -1517,14 +1298,11 @@ class SecretBackend(pulumi.CustomResource):
|
|
1517
1298
|
:param pulumi.Input[int] connection_timeout: Timeout, in seconds, when attempting to connect to the LDAP server before trying
|
1518
1299
|
the next URL in the configuration.
|
1519
1300
|
:param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
|
1520
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
|
1521
1301
|
:param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
|
1522
1302
|
:param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
|
1523
1303
|
:param pulumi.Input[bool] external_entropy_access: Enable the secrets engine to access Vault's external entropy source
|
1524
|
-
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
|
1525
1304
|
:param pulumi.Input[bool] insecure_tls: Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
1526
1305
|
Defaults to `false`.
|
1527
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
1528
1306
|
:param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
1529
1307
|
replication.Tolerance duration to use when checking the last rotation time.
|
1530
1308
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
|
@@ -1533,11 +1311,9 @@ class SecretBackend(pulumi.CustomResource):
|
|
1533
1311
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1534
1312
|
*Available only for Vault Enterprise*.
|
1535
1313
|
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1536
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1537
1314
|
:param pulumi.Input[str] password_policy: Name of the password policy to use to generate passwords.
|
1538
1315
|
:param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
|
1539
1316
|
not begin or end with a `/`. Defaults to `ldap`.
|
1540
|
-
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1541
1317
|
:param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
1542
1318
|
before returning back an error.
|
1543
1319
|
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
@@ -1557,7 +1333,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1557
1333
|
|
1558
1334
|
__props__.__dict__["accessor"] = accessor
|
1559
1335
|
__props__.__dict__["allowed_managed_keys"] = allowed_managed_keys
|
1560
|
-
__props__.__dict__["allowed_response_headers"] = allowed_response_headers
|
1561
1336
|
__props__.__dict__["audit_non_hmac_request_keys"] = audit_non_hmac_request_keys
|
1562
1337
|
__props__.__dict__["audit_non_hmac_response_keys"] = audit_non_hmac_response_keys
|
1563
1338
|
__props__.__dict__["binddn"] = binddn
|
@@ -1567,21 +1342,16 @@ class SecretBackend(pulumi.CustomResource):
|
|
1567
1342
|
__props__.__dict__["client_tls_key"] = client_tls_key
|
1568
1343
|
__props__.__dict__["connection_timeout"] = connection_timeout
|
1569
1344
|
__props__.__dict__["default_lease_ttl_seconds"] = default_lease_ttl_seconds
|
1570
|
-
__props__.__dict__["delegated_auth_accessors"] = delegated_auth_accessors
|
1571
1345
|
__props__.__dict__["description"] = description
|
1572
1346
|
__props__.__dict__["disable_remount"] = disable_remount
|
1573
1347
|
__props__.__dict__["external_entropy_access"] = external_entropy_access
|
1574
|
-
__props__.__dict__["identity_token_key"] = identity_token_key
|
1575
1348
|
__props__.__dict__["insecure_tls"] = insecure_tls
|
1576
|
-
__props__.__dict__["listing_visibility"] = listing_visibility
|
1577
1349
|
__props__.__dict__["local"] = local
|
1578
1350
|
__props__.__dict__["max_lease_ttl_seconds"] = max_lease_ttl_seconds
|
1579
1351
|
__props__.__dict__["namespace"] = namespace
|
1580
1352
|
__props__.__dict__["options"] = options
|
1581
|
-
__props__.__dict__["passthrough_request_headers"] = passthrough_request_headers
|
1582
1353
|
__props__.__dict__["password_policy"] = password_policy
|
1583
1354
|
__props__.__dict__["path"] = path
|
1584
|
-
__props__.__dict__["plugin_version"] = plugin_version
|
1585
1355
|
__props__.__dict__["request_timeout"] = request_timeout
|
1586
1356
|
__props__.__dict__["schema"] = schema
|
1587
1357
|
__props__.__dict__["seal_wrap"] = seal_wrap
|
@@ -1609,14 +1379,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1609
1379
|
"""
|
1610
1380
|
return pulumi.get(self, "allowed_managed_keys")
|
1611
1381
|
|
1612
|
-
@property
|
1613
|
-
@pulumi.getter(name="allowedResponseHeaders")
|
1614
|
-
def allowed_response_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1615
|
-
"""
|
1616
|
-
List of headers to allow and pass from the request to the plugin
|
1617
|
-
"""
|
1618
|
-
return pulumi.get(self, "allowed_response_headers")
|
1619
|
-
|
1620
1382
|
@property
|
1621
1383
|
@pulumi.getter(name="auditNonHmacRequestKeys")
|
1622
1384
|
def audit_non_hmac_request_keys(self) -> pulumi.Output[Sequence[str]]:
|
@@ -1691,14 +1453,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1691
1453
|
"""
|
1692
1454
|
return pulumi.get(self, "default_lease_ttl_seconds")
|
1693
1455
|
|
1694
|
-
@property
|
1695
|
-
@pulumi.getter(name="delegatedAuthAccessors")
|
1696
|
-
def delegated_auth_accessors(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1697
|
-
"""
|
1698
|
-
List of headers to allow and pass from the request to the plugin
|
1699
|
-
"""
|
1700
|
-
return pulumi.get(self, "delegated_auth_accessors")
|
1701
|
-
|
1702
1456
|
@property
|
1703
1457
|
@pulumi.getter
|
1704
1458
|
def description(self) -> pulumi.Output[Optional[str]]:
|
@@ -1723,14 +1477,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1723
1477
|
"""
|
1724
1478
|
return pulumi.get(self, "external_entropy_access")
|
1725
1479
|
|
1726
|
-
@property
|
1727
|
-
@pulumi.getter(name="identityTokenKey")
|
1728
|
-
def identity_token_key(self) -> pulumi.Output[Optional[str]]:
|
1729
|
-
"""
|
1730
|
-
The key to use for signing plugin workload identity tokens
|
1731
|
-
"""
|
1732
|
-
return pulumi.get(self, "identity_token_key")
|
1733
|
-
|
1734
1480
|
@property
|
1735
1481
|
@pulumi.getter(name="insecureTls")
|
1736
1482
|
def insecure_tls(self) -> pulumi.Output[Optional[bool]]:
|
@@ -1740,14 +1486,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1740
1486
|
"""
|
1741
1487
|
return pulumi.get(self, "insecure_tls")
|
1742
1488
|
|
1743
|
-
@property
|
1744
|
-
@pulumi.getter(name="listingVisibility")
|
1745
|
-
def listing_visibility(self) -> pulumi.Output[Optional[str]]:
|
1746
|
-
"""
|
1747
|
-
Specifies whether to show this mount in the UI-specific listing endpoint
|
1748
|
-
"""
|
1749
|
-
return pulumi.get(self, "listing_visibility")
|
1750
|
-
|
1751
1489
|
@property
|
1752
1490
|
@pulumi.getter
|
1753
1491
|
def local(self) -> pulumi.Output[Optional[bool]]:
|
@@ -1784,14 +1522,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1784
1522
|
"""
|
1785
1523
|
return pulumi.get(self, "options")
|
1786
1524
|
|
1787
|
-
@property
|
1788
|
-
@pulumi.getter(name="passthroughRequestHeaders")
|
1789
|
-
def passthrough_request_headers(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1790
|
-
"""
|
1791
|
-
List of headers to allow and pass from the request to the plugin
|
1792
|
-
"""
|
1793
|
-
return pulumi.get(self, "passthrough_request_headers")
|
1794
|
-
|
1795
1525
|
@property
|
1796
1526
|
@pulumi.getter(name="passwordPolicy")
|
1797
1527
|
def password_policy(self) -> pulumi.Output[Optional[str]]:
|
@@ -1809,14 +1539,6 @@ class SecretBackend(pulumi.CustomResource):
|
|
1809
1539
|
"""
|
1810
1540
|
return pulumi.get(self, "path")
|
1811
1541
|
|
1812
|
-
@property
|
1813
|
-
@pulumi.getter(name="pluginVersion")
|
1814
|
-
def plugin_version(self) -> pulumi.Output[Optional[str]]:
|
1815
|
-
"""
|
1816
|
-
Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
1817
|
-
"""
|
1818
|
-
return pulumi.get(self, "plugin_version")
|
1819
|
-
|
1820
1542
|
@property
|
1821
1543
|
@pulumi.getter(name="requestTimeout")
|
1822
1544
|
def request_timeout(self) -> pulumi.Output[int]:
|